• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 142
  • 37
  • 36
  • 31
  • 29
  • 10
  • 9
  • 7
  • 6
  • 5
  • 5
  • 4
  • 4
  • 4
  • 2
  • Tagged with
  • 359
  • 45
  • 39
  • 34
  • 29
  • 29
  • 29
  • 26
  • 26
  • 25
  • 25
  • 25
  • 23
  • 22
  • 22
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
171

Recomendações de projeto de interface de um aplicativo móvel de registro de aula para pessoas com deficiência visual

Silva, Janaina Cristina da January 2016 (has links)
Orientadora: Profa. Dra. Juliana Cristina Braga / Dissertação (mestrado) - Universidade Federal do ABC, Programa de Pós-Graduação em Ciência da Computação, 2016. / O presente trabalho tem como objetivo o estudo de aplicativos móveis a serem utilizados no âmbito acadêmico pelas pessoas com deficiência visual, devido ao fato dos dispositivos móveis apresentarem grande potencial de uso por parte dos deficientes visuais para a melhoria da vida cotidiana no âmbito acadêmico. No entanto, os aplicativos existentes possuem baixa acessibilidade, dificultando o uso destes pelas pessoas com deficiência visual na vida acadêmica, pois no desenvolvimento destes aplicativos não foram levados em conta as suas necessidades e capacidades específicas. A ideia que se procura fundamentar ao longo deste trabalho é a de que as tecnologias móveis, quando inseridas nos contextos educacionais, são importantes aliadas que possibilitam a formação dos alunos com deficiência visual e a transformação de suas práticas no ambiente escolar. O método utilizado para responder a uma das questões de pesquisa, foi à pesquisa qualitativa, de natureza exploratória, por meio de uma pesquisa em campo, mediante coleta de dados através de reuniões, diários, questionários, observações direta e conversas informais. Outro método utilizado foi o da revisão sistemática que permitiu a identificação de subsídios e aplicativos móveis acessíveis, desenvolvidos para a inclusão das pessoas com deficiência visual no âmbito acadêmico. Em complementação a este estudo de campo foi realizado um estudo de usabilidade de uma ferramenta escolhida, em que as interfaces desta ferramenta foram avaliadas por meio de um método empírico (testes com usuários). Durante o teste de usabilidade foi constatado uma grande dificuldade dos participantes em relação ao uso do teclado virtual, e a correta utilização das cores podem ajudar as pessoas de Baixa Visão e Visão Subnormal a lerem textos e a identificarem figuras (ícones, formas geométricas e etc.). Por meio dos resultados obtidos nas etapas anteriores, foi possível o desenvolvimento de soluções que puderam ser tangibilizadas na prototipação. Durante todas as etapas do trabalho foi feita a adoção da metodologia Design Thinking, que representou uma forma de pensar de maneira criativa, além de olhar para os problemas como oportunidades na construção de soluções para estes problemas. Por fim, o trabalho revela a importância de se atentar aos requisitos de usabilidade, de modo a garantir a qualidade e satisfação de uso das interfaces dos aplicativos móveis por pessoas com deficiência visual. / The study aims to study mobile applications to be used in the academic field by people with visual impairment, due to the fact that mobile devices present great potential for use by the visually impaired to improve daily life in the academic scope. However, existing applications have low accessibility, making it difficult by people with visual impairment to use in academic life, because their specific needs and abilities were not taken into account in the development of these applications. The idea behind this study is that mobile technologies, when inserted in educational contexts, are important allies that enable the training of visually impaired students and the transformation of their practices in the school environment. The method used to answer one of the research questions was qualitative research, of an exploratory nature, through field research, through data collection through meetings, journals, questionnaires, direct observations and informal conversations. Another method used was the systematic review that allowed the identification of subsidies and accessible mobile applications developed for the inclusion of people with visual impairment in the academic field. In addition to this field study, a usability study of a chosen tool was done, in which the interface of this tool was evaluated through an empirical method (tests with users). During the usability test it was observed that participants had a great difficulty in using the virtual keyboard and the correct use of colors can help people of Low Vision and Subnormal Vision to read texts and to identify pictures (icons, geometric shapes and so on). Through the results obtained in the previous steps, it was possible to develop solutions that could be tangibilized in prototyping. During all stages of the work was adopted the Design Thinking methodology that represented a way of thinking in a creative way, besides looking at problems as opportunities in the construction of solutions to these problems. Finally, the work reveals the importance of paying attention to usability requirements, in order to guarantee the quality and satisfaction of using the mobile application interfaces by people with visual impairment.
172

Software Process Improvement and Lifecycle Models in Automotive Industry

Sabar, Suneel January 2011 (has links)
The quality of a product depends on the quality of the underlying process is a well known fact. Software development organizations have been struggling to decrease their cost, increase their ROI, reduce time-to-market, and enhance the quality of their products. This all depends upon the improvement in the processes they are following inside their organizations. A number of software process improvement models exist in market, e.g., CMMI, SPICE and Automotive SPICE. But before an organization can improve its development and management processes, it is very important to know whether it is following the right processes. There exist a number of software development process models, mainly categorized into Traditional and Agile, which provide the step-by-step guidance to develop and manage the software projects.The current thesis presents a study of software process improvement models in automotive industry, their weaknesses and strengths and presents a comparison of how do they relate to each other. This thesis also explores some software development models which are more famous in automotive industry, and the applicability of process improvement models in conjunction with the Agile software development models. A case study was performed at an automotive software supplier organization to investigate the experience of combining Agile practices with organization’s company-tailored software development model that was incorporating Automotive SPICE standards.
173

Působnost práva EU / Scope of EU law

Hanák, Radek January 2017 (has links)
Scope of EU law This thesis deals with scope of EU law. Scope of EU law in concrete situation is defined by meeting conditions layed down for material, territorial, personal and temporal scope of EU law. The aim of the thesis is to define when those conditions are met and to analyse situations, where it's not clear which legal order to apply and to give the reader an insight into situations when union law applies. This thesis is divided into two parts - first part gives insight and definitions about fundametal terms used in second part of this thesis. Part two deals with topic of this thesis. First chapter of the second part analyses material scope of Union law, thus answers the question in which legal relations has Union law material scope and divides material scope of Union law into two categories: exlusive material scope of Union law and non-exlusive material scope of Union law. This thesis also analyses criteria, which are used to determine, if in specific legal relations has material scope Union law or national law. Second chapter of the second part describes territorial scope of EU law by defining in which territories specific EU legal act can by applied, in which territories Union law has full scope and in which limited scope, whereas it's needed to take into account provisions of specific...
174

Smluvní odpovědnost a její limitace / Contractual liability and its limitation

Tůma, Martin January 2017 (has links)
Thesis title: Contractual liability and its limitation The aim of the thesis is to assess the options of parties to a contract when settling liability rules diversify from the standards of Czech Civil Code (Act. 89/2012 Coll). The author provides introduction of multiple ways of how the parties can limit their contractual liability and emphasize that the aim of any liability is to motivate subjects to pay attention to the opposite party's rights and assets, but in the context of Civil Code its main function is to repair damages and satisfy the injured party. The subject which is in breach of its duties therefore gets new or alternated duties, as well as the injured party gains more rights on its side. For the scope of liability, it is important to define the content of the contract as the parties see it in the moment of the contract's conclusion. The content does not consist only of rights and duties connected to the fulfilment of the contract object matter, but it also consists of duties to respect other interests of the opposite party, so the status quo in respect to matters not connected with the fulfilment of the obligations remain untouched. Such a protective aim arises out of strengthened confidence of the relation between contractual parties and can be mainly seen as a duty of prevention and...
175

Podpora rozhodování o testování mobilních aplikací / Reasoning for decisions on mobile application testing

Balák, Martin January 2015 (has links)
Thesis analyses the problematics of determining both qualitative and quantitative parameters for testing on projects involving development of mobile applications. First, content and scope of testing is fixed, followed by the specification of influence model. Methodology is proposed to ascertain the financial and temporal extent of the testing based on obtained influence model.
176

Aplicación de los estándares globales del PMI para la dirección de proyectos en el lanzamiento del celular Nokia 5.1 por una empresa de diseño, fabricación, importación, distribución y comercialización de teléfonos celulares a través de un operador de telefonía móvil en Perú, en el año 2018

Acevedo Bravo, Junior Luigi, Ruiz Torricelli, Gianfranco, Zegarra Marcelo, Luis Arturo 12 April 2020 (has links)
En el ámbito de las telecomunicaciones, contar con un teléfono celular es indispensable. Esta necesidad genera que los fabricantes de celulares cuenten con un plan que permita lanzar nuevos modelos de manera periódica, a fin de brindar a los operadores móviles (y, entonces, al usuario final) nuevas alternativas de celulares no solo al alcance de sus posibilidades económicas, sino que otorguen las funcionalidades esperadas. Para llevar a cabo estos lanzamientos, la empresa de diseño, fabricación, distribución, importación y comercialización de celulares (en adelante, empresa de celulares) cuenta con proyectos que buscan cumplir con los acuerdos comerciales firmados con operadores móviles de cada país para la entrega de modelos de celulares en un plazo determinado. Estos proyectos, al lanzar un teléfono celular de gama media, generan un ingreso aproximado de USD 1,800,000. El presente trabajo de investigación refiere a una fase del lanzamiento -cuya duración es 09 meses- que incluye la certificación, importación, gestión de marketing y venta de un primer lote de celulares, contemplando una inversión máxima de USD 385,000 para obtener una rentabilidad total del 40%, preparando al mercado para las siguientes dos órdenes de compra que se acuerdan con un operador telefónico en el acuerdo comercial. El éxito de estos proyectos requieren alinearse con los objetivos organizacionales, gestionar los interesados, conocer y cumplir los estándares de calidad necesarios para fabricar y distribuir celulares, cumplir con los requerimientos de costos establecidos, brindar capacitación al soporte de ventas, identificar y gestionar los riesgos involucrados y, gestionar el cronograma para los lanzamientos. / Nowadays, having a smartphone is essential. This necessity make that the manufacturers of these devices take in consideration a plan that allows them to launch several new models of smartphones periodically. Manufacturers offer mobile operators (and hence also to end-user) new affordable models with all the features they seek. In order to have succesuful launches, the company of design, manufacturing, distribution, import and sale of smartphones (from this point forward, smartphone company) have projects which main objective is to comply with the operators’ commercial agreements in each country. These projects, launch of a mid range smartphone, generate revenues of USD 1,800,000. This research cover the launching phase -which last nine months- and it includes the certification, import, management of marketing activites and sell of the first shipment. It considers a maximum investment of USD 385,000 to obtain a 40% profit and prepares the market for future purchase orders from the operator’s commercial agreements. The key to successful projects require to be aligned with the organization objectives, manage the stakeholers, know and comply with the quality standards needed to develop and manufacture smartphones, comply with the cost’s requirements defined, provide training to support the sales force, identify and manage the risks and the schedule stablished for the launch of the product.. / Trabajo de investigación
177

Measures of Privacy Protection on Social Environments

Alemany Bordera, José 13 October 2020 (has links)
[EN] Nowadays, online social networks (OSNs) have become a mainstream cultural phenomenon for millions of Internet users. Social networks are an ideal environment for generating all kinds of social benefits for users. Users share experiences, keep in touch with their family, friends and acquaintances, and earn economic benefits from the power of their influence (which is translated into new job opportunities). However, the use of social networks and the action of sharing information imply the loss of the users’ privacy. Recently, a great interest in protecting the privacy of users has emerged. This situation has been due to documented cases of regrets in users’ actions, company scandals produced by misuse of personal information, and the biases introduced by privacy mechanisms. Social network providers have included improvements in their systems to reduce users’ privacy risks; for example, restricting privacy policies by default, adding new privacy settings, and designing quick and easy shortcuts to configure user privacy settings. In the privacy researcher area, new advances are proposed to improve privacy mechanisms, most of them focused on automation, fine-grained systems, and the usage of features extracted from the user’s profile information and interactions to recommend the best privacy policy for the user. Despite these advances, many studies have shown that users’ concern for privacy does not match the decisions they ultimately make in social networks. This misalignment in the users’ behavior might be due to the complexity of the privacy concept itself. This drawback causes users to disregard privacy risks, or perceive them as temporarily distant. Another cause of users’ behavior misalignment might be due to the complexity of the privacy decision-making process. This is because users should consider all possible scenarios and the factors involved (e.g., the number of friends, the relationship type, the context of the information, etc.) to make an appropriate privacy decision. The main contributions of this thesis are the development of metrics to assess privacy risks, and the proposal of explainable privacy mechanisms (using the developed metrics) to assist and raise awareness among users during the privacy decision process. Based on the definition of the concept of privacy, the dimensions of information scope and information sensitivity have been considered in this thesis to assess privacy risks. For explainable privacy mechanisms, soft paternalism techniques and gamification elements that make use of the proposed metrics have been designed. These mechanisms have been integrated into the social network PESEDIA and evaluated in experiments with real users. PESEDIA is a social network developed in the framework of the Master’s thesis of the Ph.D. student [15], this thesis, and the national projects “Privacy in Social Educational Environments during Childhood and Adolescence” (TIN2014-55206- R) and “Intelligent Agents for Privacy Advice in Social Networks” (TIN2017-89156-R). The findings confirm the validity of the proposed metrics for computing the users’ scope and the sensitivity of social network publications. For the scope metric, the results also showed the possibility of estimating it through local and social centrality metrics for scenarios with limited information access. For the sensitivity metric, the results also remarked the users’ misalignment for some information types and the consensus for a majority of them. The usage of these metrics as part of messages about potential consequences of privacy policy choices and information sharing actions to users showed positive effects on users’ behavior regarding privacy. Furthermore, the findings of exploring the users’ trade-off between costs and benefits during disclosure actions of personal information showed significant relationships with the usual social circles (family members, friends, coworkers, and unknown users) and their properties. This allowed designing better privacy mechanisms that appropriately restrict access to information and reduce regrets. Finally, gamification elements applied to social networks and users’ privacy showed a positive effect on the users’ behavior towards privacy and safe practices in social networks. / [ES] En la actualidad, las redes sociales se han convertido en un fenómeno cultural dominante para millones de usuarios de Internet. Las redes sociales son un entorno ideal para la generación de todo tipo de beneficios sociales para los usuarios. Los usuarios comparten experiencias, mantienen el contacto con sus familiares, amigos y conocidos, y obtienen beneficios económicos gracias al poder de su influencia (lo que se traduce en nuevas oportunidades de trabajo). Sin embargo, el uso de las redes sociales y la acción de compartir información implica la perdida de la privacidad de los usuarios. Recientemente ha emergido un gran interés en proteger la privacidad de los usuarios. Esta situación se ha debido a los casos de arrepentimientos documentados en las acciones de los usuarios, escándalos empresariales producidos por usos indebidos de la información personal, y a los sesgos que introducen los mecanismos de privacidad. Los proveedores de redes sociales han incluido mejoras en sus sistemas para reducir los riesgos en privacidad de los usuarios; por ejemplo, restringiendo las políticas de privacidad por defecto, añadiendo nuevos elementos de configuración de la privacidad, y diseñando accesos fáciles y directos para configurar la privacidad de los usuarios. En el campo de la investigación de la privacidad, nuevos avances se proponen para mejorar los mecanismos de privacidad la mayoría centrados en la automatización, selección de grano fino, y uso de características extraídas de la información y sus interacciones para recomendar la mejor política de privacidad para el usuario. A pesar de estos avances, muchos estudios han demostrado que la preocupación de los usuarios por la privacidad no se corresponde con las decisiones que finalmente toman en las redes sociales. Este desajuste en el comportamiento de los usuarios podría deberse a la complejidad del propio concepto de privacidad. Este inconveniente hace que los usuarios ignoren los riesgos de privacidad, o los perciban como temporalmente distantes. Otra causa del desajuste en el comportamiento de los usuarios podría deberse a la complejidad del proceso de toma de decisiones sobre la privacidad. Esto se debe a que los usuarios deben considerar todos los escenarios posibles y los factores involucrados (por ejemplo, el número de amigos, el tipo de relación, el contexto de la información, etc.) para tomar una decisión apropiada sobre la privacidad. Las principales contribuciones de esta tesis son el desarrollo de métricas para evaluar los riesgos de privacidad, y la propuesta de mecanismos de privacidad explicables (haciendo uso de las métricas desarrolladas) para asistir y concienciar a los usuarios durante el proceso de decisión sobre la privacidad. Atendiendo a la definición del concepto de la privacidad, las dimensiones del alcance de la información y la sensibilidad de la información se han considerado en esta tesis para evaluar los riesgos de privacidad. En cuanto a los mecanismos de privacidad explicables, se han diseñado utilizando técnicas de paternalismo blando y elementos de gamificación que hacen uso de las métricas propuestas. Estos mecanismos se han integrado en la red social PESEDIA y evaluado en experimentos con usuarios reales. PESEDIA es una red social desarrollada en el marco de la tesina de Master del doctorando [15], esta tesis y los proyectos nacionales “Privacidad en Entornos Sociales Educativos durante la Infancia y la Adolescencia” (TIN2014-55206-R) y “Agentes inteligentes para asesorar en privacidad en redes sociales” (TIN2017-89156-R). Los resultados confirman la validez de las métricas propuestas para calcular el alcance de los usuarios y la sensibilidad de las publicaciones de las redes sociales. En cuanto a la métrica del alcance, los resultados también mostraron la posibilidad de estimarla mediante métricas de centralidad local y social para escenarios con acceso limitado a la información. En cuanto a la métrica de sensibilidad, los resultados también pusieron de manifiesto la falta de concordancia de los usuarios en el caso de algunos tipos de información y el consenso en el caso de la mayoría de ellos. El uso de estas métricas como parte de los mensajes sobre las posibles consecuencias de las opciones de política de privacidad y las acciones de intercambio de información a los usuarios mostró efectos positivos en el comportamiento de los usuarios con respecto a la privacidad. Además, los resultados de la exploración de la compensación de los usuarios entre los costos y los beneficios durante las acciones de divulgación de información personal mostraron relaciones significativas con los círculos sociales habituales (familiares, amigos, compañeros de trabajo y usuarios desconocidos) y sus propiedades. Esto permitió diseñar mejores mecanismos de privacidad que restringen adecuadamente el acceso a la información y reducen los arrepentimientos. Por último, los elementos de gamificación aplicados a las redes sociales y a la privacidad de los usuarios mostraron un efecto positivo en el comportamiento de los usuarios hacia la privacidad y las prácticas seguras en las redes sociales. / [CA] En l’actualitat, les xarxes socials s’han convertit en un fenomen cultural dominant per a milions d’usuaris d’Internet. Les xarxes socials són un entorn ideal per a la generació de tota mena de beneficis socials per als usuaris. Els usuaris comparteixen experiències, mantenen el contacte amb els seus familiars, amics i coneguts, i obtenen beneficis econòmics gràcies al poder de la seva influència (el que es tradueix en noves oportunitats de treball). No obstant això, l’ús de les xarxes socials i l’acció de compartir informació implica la perduda de la privacitat dels usuaris. Recentment ha emergit un gran interès per protegir la privacitat dels usuaris. Aquesta situació s’ha degut als casos de penediments documentats en les accions dels usuaris, escàndols empresarials produïts per usos indeguts de la informació personal, i als caires que introdueixen els mecanismes de privacitat. Els proveïdors de xarxes socials han inclòs millores en els seus sistemes per a reduir els riscos en privacitat dels usuaris; per exemple, restringint les polítiques de privacitat per defecte, afegint nous elements de configuració de la privacitat, i dissenyant accessos fàcils i directes per a configurar la privacitat dels usuaris. En el camp de la recerca de la privacitat, nous avanços es proposen per a millorar els mecanismes de privacitat la majoria centrats en l’automatització, selecció de gra fi, i ús de característiques extretes de la informació i les seues interaccions per a recomanar la millor política de privacitat per a l’usuari. Malgrat aquests avanços, molts estudis han demostrat que la preocupació dels usuaris per la privacitat no es correspon amb les decisions que finalment prenen en les xarxes socials. Aquesta desalineació en el comportament dels usuaris podria deure’s a la complexitat del propi concepte de privacitat. Aquest inconvenient fa que els usuaris ignorin els riscos de privacitat, o els percebin com temporalment distants. Una altra causa de la desalineació en el comportament dels usuaris podria deure’s a la complexitat del procés de presa de decisions sobre la privacitat. Això es deu al fet que els usuaris han de considerar tots els escenaris possibles i els factors involucrats (per exemple, el nombre d’amics, el tipus de relació, el context de la informació, etc.) per a prendre una decisió apropiada sobre la privacitat. Les principals contribucions d’aquesta tesi són el desenvolupament de mètriques per a avaluar els riscos de privacitat, i la proposta de mecanismes de privacitat explicables (fent ús de les mètriques desenvolupades) per a assistir i conscienciar als usuaris durant el procés de decisió sobre la privacitat. Atesa la definició del concepte de la privacitat, les dimensions de l’abast de la informació i la sensibilitat de la informació s’han considerat en aquesta tesi per a avaluar els riscos de privacitat. Respecte als mecanismes de privacitat explicables, aquests s’han dissenyat utilitzant tècniques de paternalisme bla i elements de gamificació que fan ús de les mètriques propostes. Aquests mecanismes s’han integrat en la xarxa social PESEDIA i avaluat en experiments amb usuaris reals. PESEDIA és una xarxa social desenvolupada en el marc de la tesina de Màster del doctorant [15], aquesta tesi i els projectes nacionals “Privacitat en Entorns Socials Educatius durant la Infància i l’Adolescència” (TIN2014-55206-R) i “Agents Intel·ligents per a assessorar en Privacitat en xarxes socials” (TIN2017-89156-R). Els resultats confirmen la validesa de les mètriques propostes per a calcular l’abast de les accions dels usuaris i la sensibilitat de les publicacions de les xarxes socials. Respecte a la mètrica de l’abast, els resultats també van mostrar la possibilitat d’estimarla mitjançant mètriques de centralitat local i social per a escenaris amb accés limitat a la informació. Respecte a la mètrica de sensibilitat, els resultats també van posar de manifest la falta de concordança dels usuaris en el cas d’alguns tipus d’informació i el consens en el cas de la majoria d’ells. L’ús d’aquestes mètriques com a part dels missatges sobre les possibles conseqüències de les opcions de política de privacitat i les accions d’intercanvi d’informació als usuaris va mostrar efectes positius en el comportament dels usuaris respecte a la privacitat. A més, els resultats de l’exploració de la compensació dels usuaris entre els costos i els beneficis durant les accions de divulgació d’informació personal van mostrar relacions significatives amb els cercles socials habituals (familiars, amics, companys de treball i usuaris desconeguts) i les seves propietats. Això ha permés dissenyar millors mecanismes de privacitat que restringeixen adequadament l’accés a la informació i redueixen els penediments. Finalment, els elements de gamificació aplicats a les xarxes socials i a la privacitat dels usuaris van mostrar un efecte positiu en el comportament dels usuaris cap a la privacitat i les pràctiques segures en les xarxes socials. / Alemany Bordera, J. (2020). Measures of Privacy Protection on Social Environments [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/151456 / TESIS
178

Change for the Ohio Nurse Practitioner Treating Worker's Compensation Patients: A Needs Analysis

Huff, Jessica A. 25 April 2022 (has links)
No description available.
179

Kindergarten Literacy Readiness Before and After HighScope Implementation

Youngblood, Chandra Kathleen 01 January 2017 (has links)
Students who attended preschool in an urban Michigan district are not entering kindergarten with the necessary skills. The preschool implemented the HighScope curriculum and the effect of this curriculum on kindergarten readiness was unknown. The purpose of this causal-comparative study was to investigate the difference in kindergarten readiness scores of students who attended a preschool before and after the High Scope curriculum was implemented. The pedagogical practices of preschool and the HighScope curriculum align with Dewey and Vygotsky's theories on experiential learning which were the foundation that guided this causal comparative study. The research questions examined preschool letter identification and sound identification, kindergarten letter identification and sound identification, and end of kindergarten reading level for students before and after the HighScope implementation. A MANOVA was used to examine ex post facto scores of the preschool and kindergarten Michigan Literacy Progress Profile and kindergarten end of the year Fountas and Pinnell Benchmark Assessment reading level data to analyze the 5 dependent variables of 218 students who attended preschool before and after the implementation of the HighScope curriculum. The MANOVA indicated that there was a statistically significant difference between the literacy scores, F (10, 424) = 10.286, p = <.0005, Pillai's Trace = .39, partial ï?¨2 = .195. By examining data on literacy outcomes, the effectiveness of the HighScope curriculum in the preschool was highlighted for district leaders. The findings of this study may contribute to positive social change by encouraging early learning educators to plan curriculum and professional development that focuses on letter identification and letter sound skills to improve the literacy foundation of entering kindergarten students.
180

Elnätets klimatavtryck : Utveckling av ett klimatberäkningsverktyg för kvantifiering av växthusgasutsläpp för elnätsbolag

Segelsjö Duvernoy, Rebecca, Lundblad, Johanna January 2021 (has links)
The electrical transmission and distribution grid play a vital role in reaching the Paris agreement by electrification of society. Although the climate impact of electricity production is well documented, the climate impact of the distribution of electricity has only been investigated in a few previous studies. Therefore, this study aims to present the carbon footprint of the distribution grid in Sweden. The study has developed a tool to map the carbon footprint by applying a case study of an electrical grid company in Sweden. The tool includes activities in the company’s value chain associated with material production, installation, usage, maintenance, transportation of the electrical grid and office activities during one year in an electrical grid company. The tool was developed in excel by implementing the theoretical framework of the Greenhouse Gas protocol and life cycle assessment. According to the guidelines of the Greenhouse Gas protocol the CO2 emissions were allocated in scope 1, scope 2 and scope 3. Scope 1 includes direct emissions controlled or owned by the company. Scope 2 are emissions from purchased heat and electricity consumed by the company, and scope 3 includes other indirect emissions from the company's activities throughout the value chain. The result shows the carbon footprint of the electrical distribution grid during 2020 was 2,02 kg CO2e per distributed MWh. The total carbon footprint of the distribution company was 54 329 ton CO2e. A majority, 97 % of the CO2e emissions originated from indirect emissions within scope 3, where capital goods stand for 76 % of the company’s total emissions followed by 12 % from fuel and energy rated activities. This result indicates the importance of including indirect emissions when analyzing the carbon footprint of a company’s value chain. Our study also indicates, in line with previous studies, that a majority of the emissions originate from the manufacturing of cables.

Page generated in 0.078 seconds