989 resultados para university scheduling
Resumo:
Background Previous studies (mostly questionnaire-based in children) suggest that outdoor activity is protective against myopia. There are few studies on young adults investigating both the impact of simply being outdoors versus performing physical activity. The aim was to study the relationship between the refractive error of young adults and their physical activity patterns. Methods Twenty-seven university students, aged 18 to 25 years, wore a pedometer (Omron HJ720ITE) for seven days both during the semester and holiday periods. They simultaneously recorded the type of activity performed, its duration, the number of steps taken (from the pedometer) and their location (indoors/outdoors) in a logbook. Mean spherical refractive error was used to divide participants into three groups (emmetropes: +1.00 to -0.50 D, low myopes: -0.62 to -3.00 D, higher myopes: -3.12 D or greater myopia). Results There were no significant differences between the refractive groups during the semester or holiday periods; the average daily times spent outdoors, the duration of physical activity, the ratio of physical activity performed outdoors to indoors and amount of near work performed were similar. The peak exercise intensity was similar across all groups: approximately 100 steps perminute, a brisk walk. Up to one-third of all physical activity was performed outdoors. There were some significant differences in activities performed during semester and holiday times. For example, lowmyopes spent significantly less time outside (49 ± 47 versus 74 ± 41 minutes, p = 0.005) and performed less physical activity (6,388 ± 1,747 versus 6,779 ± 2,746 steps per day; p = 0.03) during the holidays compared to during semester. Conclusions The fact that all groups had similar low exercise intensity butmany were notmyopic suggests that physical activity levels are not critical. There were differences in the activity patterns of lowmyopes during semester and holiday periods. This study highlights the need for a larger longitudinal-based study with particular emphasis on how discretionary time is spent.
Resumo:
This paper addresses the ways in which humour is used by university academics to shape teaching personas. Based upon the work of Mauss and Foucault, and employing semi-structured, in-depth interviews with a range of university teachers, this research suggests that most tertiary teachers deliberately fashion various kinds of teaching persona, which they then perform in lectures and tutorials. The use of humour is widely seen as an important component within this form of self-shaping, as it fits within dominant frameworks of expectation regarding contemporary models of “edutainment”. This research demonstrates that a wide range of practices of the self—including physical, verbal, and relational elements—are employed by academics as part of shaping various humorous teaching personas. Some boundaries exist limiting the use of these pedagogic characters; for example, arguments about natural ability with humour prefigure who is most likely to deploy humour as a practice of professional self-formation. Also, professional concerns regarding seniority and job security are also factored into decision-making regarding those humorous personas likely to be considered appropriate within particular tertiary teaching contexts.
Resumo:
This study examined the nature and lifetime prevalence of two types of victimization among Finnish university students: stalking and violence victimization (i.e. general violence). This study was a cross-sectional study using two different datasets of Finnish university students. The stalking data was collected via an electronic questionnaire and the violence victimization data was collected via a postal questionnaire. There were 615 participants in the stalking study (I-III) and 905 participants in the violence victimization study. The thesis consists of four studies. The aims regarding the stalking substudies (Studies I-III) were to examine the lifetime prevalence of stalking among university students and to analyze how stalking is related to victim and stalker characteristics and certain central variables of stalking (victim-stalker relationship, stalking episodes, stalking duration). Specifically, the aim was to identify factors that are associated with stalking violence and to factors contributing to the stalking duration. Furthermore, the aim was also to investigate how university students cope with stalking and whether coping is related to victim and stalker background characteristics and to certain other core variables (victim-stalker relationship, stalking episodes, stalking duration, prior victimization, and stalking violence). The aims for the violence victimization substudy (Study IV) were to examine the prevalence of violence victimization, i.e. general violence (minor and serious physical violence and threats) and how violence victimization is associated with victim/abuser characteristics, symptomology, and the use of student health care services. The present study shows that both stalking and violence victimization (i.e. general violence) are markedly prevalent among Finnish university students. The lifetime prevalence rate for stalking was 48.5% and 46.5% for violence victimization. When the lifetime prevalence rate was restricted to violent stalking and physical violence only, the prevalence decreased to 22% and 42% respectively. The students reported exposure to multiple forms of stalking and violence victimization, demonstrating the diversity of victimization among university students. Stalking victimization was found to be more prevalent among female students, while violence victimization was found to be more prevalent among male students. Most of the victims of stalking knew their stalkers, while the offender in general violence was typically a stranger. Stalking victimization often included violence and continued for a lengthy period. The victim-stalking relationship and stalking behaviors were found to be associated with stalking violence and stalking duration. Based on three identified stalking dimensions (violence, surveillance, contact seeking), the present study found five distinct victim subgroups (classes). Along with the victim-stalker relationship, the victim subgroups emerged as important factors contributing to the stalking duration. Victims of violent stalking did not differ greatly from victims of non-violent stalking in their use of behavioral coping tactics, while exposure to violent stalking had an effect on the use of coping strategies. The victim-offender relationship was also associated to a set of symptoms regarding violence victimization. Furthermore, violence victimization had a significant main effect on specific symptoms (mental health symptoms, alcohol consumption, symptom index), while gender had a significant main effect on most symptoms, yet no interaction effect was found. The present results also show that victims of violence are overrepresented among frequent health care users. The present findings add to the literature on the prevalence and nature of stalking and violence victimization among Finnish university students. Moreover, the present findings stress the importance of violence prevention and intervention in student health care, and may be used as a guideline for policy makers, as well as health care and law enforcement professionals dealing with youth violence prevention.
Resumo:
Replacement of deteriorated water pipes is a capital-intensive activity for utility companies. Replacement planning aims to minimize total costs while maintaining a satisfactory level of service and is usually conducted for individual pipes. Scheduling replacement in groups is seen to be a better method and has the potential to provide benefits such as the reduction of maintenance costs and service interruptions. However, developing group replacement schedules is a complex task and often beyond the ability of a human expert, especially when multiple or conflicting objectives need to be catered for, such as minimization of total costs and service interruptions. This paper describes the development of a novel replacement decision optimization model for group scheduling (RDOM-GS), which enables multiple group-scheduling criteria by integrating new cost functions, a service interruption model, and optimization algorithms into a unified procedure. An industry case study demonstrates that RDOM-GS can improve replacement planning significantly and reduce costs and service interruptions.
Resumo:
In this paper, we consider the bi-criteria single machine scheduling problem of n jobs with a learning effect. The two objectives considered are the total completion time (TC) and total absolute differences in completion times (TADC). The objective is to find a sequence that performs well with respect to both the objectives: the total completion time and the total absolute differences in completion times. In an earlier study, a method of solving bi-criteria transportation problem is presented. In this paper, we use the methodology of solvin bi-criteria transportation problem, to our bi-criteria single machine scheduling problem with a learning effect, and obtain the set of optimal sequences,. Numerical examples are presented for illustrating the applicability and ease of understanding.
Resumo:
The aim of this dissertation was to explore how different types of prior knowledge influence student achievement and how different assessment methods influence the observed effect of prior knowledge. The project started by creating a model of prior knowledge which was tested in various science disciplines. Study I explored the contribution of different components of prior knowledge on student achievement in two different mathematics courses. The results showed that the procedural knowledge components which require higher-order cognitive skills predicted the final grades best and were also highly related to previous study success. The same pattern regarding the influence of prior knowledge was also seen in Study III which was a longitudinal study of the accumulation of prior knowledge in the context of pharmacy. The study analysed how prior knowledge from previous courses was related to student achievement in the target course. The results implied that students who possessed higher-level prior knowledge, that is, procedural knowledge, from previous courses also obtained higher grades in the more advanced target course. Study IV explored the impact of different types of prior knowledge on students’ readiness to drop out from the course, on the pace of completing the course and on the final grade. The study was conducted in the context of chemistry. The results revealed again that students who performed well in the procedural prior-knowledge tasks were also likely to complete the course in pre-scheduled time and get higher final grades. On the other hand, students whose performance was weak in the procedural prior-knowledge tasks were more likely to drop out or take a longer time to complete the course. Study II explored the issue of prior knowledge from another perspective. Study II aimed to analyse the interrelations between academic self-beliefs, prior knowledge and student achievement in the context of mathematics. The results revealed that prior knowledge was more predictive of student achievement than were other variables included in the study. Self-beliefs were also strongly related to student achievement, but the predictive power of prior knowledge overruled the influence of self-beliefs when they were included in the same model. There was also a strong correlation between academic self-beliefs and prior-knowledge performance. The results of all the four studies were consistent with each other indicating that the model of prior knowledge may be used as a potential tool for prior knowledge assessment. It is useful to make a distinction between different types of prior knowledge in assessment since the type of prior knowledge students possess appears to make a difference. The results implied that there indeed is variation between students’ prior knowledge and academic self-beliefs which influences student achievement. This should be taken into account in instruction.
Resumo:
In the modern business environment, meeting due dates and avoiding delay penalties are very important goals that can be accomplished by minimizing total weighted tardiness. We consider a scheduling problem in a system of parallel processors with the objective of minimizing total weighted tardiness. Our aim in the present work is to develop an efficient algorithm for solving the parallel processor problem as compared to the available heuristics in the literature and we propose the ant colony optimization approach for this problem. An extensive experimentation is conducted to evaluate the performance of the ACO approach on different problem sizes with the varied tardiness factors. Our experimentation shows that the proposed ant colony optimization algorithm is giving promising results compared to the best of the available heuristics.
Resumo:
Dedication: Freundlichste Erinnerung an Herrn Prof. Einstein und seine Frau Gemahlin. I-Jing Wang, Shanghai, China
Resumo:
Thomas Krakauer's father, Hans Krakauer is second from left in the rear row.
Resumo:
We study the performance of greedy scheduling in multihop wireless networks where the objective is aggregate utility maximization. Following standard approaches, we consider the dual of the original optimization problem. Optimal scheduling requires selecting independent sets of maximum aggregate price, but this problem is known to be NP-hard. We propose and evaluate a simple greedy heuristic. We suggest how the greedy heuristic can be implemented in a distributed manner. We evaluate an analytical bound in detail, for the special case of a line graph and also provide a loose bound on the greedy heuristic for the case of an arbitrary graph.
Resumo:
In our earlier work ([1]) we proposed WLAN Manager (or WM) a centralised controller for QoS management of infrastructure WLANs based on the IEEE 802.11 DCF standards. The WM approach is based on queueing and scheduling packets in a device that sits between all traffic flowing between the APs and the wireline LAN, requires no changes to the AP or the STAs, and can be viewed as implementing a "Split-MAC" architecture. The objectives of WM were to manage various TCP performance related issues (such as the throughput "anomaly" when STAs associate with an AP with mixed PHY rates, and upload-download unfairness induced by finite AP buffers), and also to serve as the controller for VoIP admission control and handovers, and for other QoS management measures. In this paper we report our experiences in implementing the proposals in [1]: the insights gained, new control techniques developed, and the effectiveness of the WM approach in managing TCP performance in an infrastructure WLAN. We report results from a hybrid experiment where a physical WM manages actual TCP controlled packet flows between a server and clients, with the WLAN being simulated, and also from a small physical testbed with an actual AP.
Resumo:
Determining Optimum Irrigation Scheduling Techniques for Key Wildflower Crops.
Resumo:
Virotherapy, the use of oncolytic properties of viruses for eradication of tumor cells, is an attractive strategy for treating cancers resistant to traditional modalities. Adenoviruses can be genetically modified to selectively replicate in and destroy tumor cells through exploitation of molecular differences between normal and cancer cells. The lytic life cycle of adenoviruses results in oncolysis of infected cells and spreading of virus progeny to surrounding cells. In this study, we evaluated different strategies for improving safety and efficacy of oncolytic virotherapy against human ovarian adenocarcinoma. We examined the antitumor efficacy of Ad5/3-Δ24, a serotype 3 receptor-targeted pRb-p16 pathway-selective oncolytic adenovirus, in combination with conventional chemotherapeutic agents. We observed synergistic activity in ovarian cancer cells when Ad5/3-Δ24 was given with either gemcitabine or epirubicin, common second-line treatment options for ovarian cancer. Our results also indicate that gemcitabine reduces the initial rate of Ad5/3-Δ24 replication without affecting the total amount of virus produced. In an orthotopic murine model of peritoneally disseminated ovarian cancer, combining Ad5/3-Δ24 with either gemcitabine or epirubicin resulted in greater therapeutic benefit than either agent alone. Another useful approach for increasing the efficacy of oncolytic agents is to arm viruses with therapeutic transgenes such as genes encoding prodrug-converting enzymes. We constructed Ad5/3-Δ24-TK-GFP, an oncolytic adenovirus encoding the thymidine kinase (TK) green fluorescent protein (GFP) fusion protein. This novel virus replicated efficiently on ovarian cancer cells, which correlated with increased GFP expression. Delivery of prodrug ganciclovir (GCV) immediately after infection abrogated viral replication, which might have utility as a safety switch mechanism. Oncolytic potency in vitro was enhanced by GCV in one cell line, and the interaction was not dependent on scheduling of the treatments. However, in murine models of metastatic ovarian cancer, administration of GCV did not add therapeutic benefit to this highly potent oncolytic agent. Detection of tumor progression and virus replication with bioluminescence and fluorescence imaging provided insight into the in vivo kinetics of oncolysis in living mice. For optimizing protocols for upcoming clinical trials, we utilized orthotopic murine models of ovarian cancer to analyze the effect of dose and scheduling of intraperitoneally delivered Ad5/3-Δ24. Weekly administration of Ad5/3-Δ24 did not significantly enhance antitumor efficacy over a single treatment. Our results also demonstrate that even a single intraperitoneal injection of only 100 viral particles significantly increased the survival of mice compared with untreated animals. Improved knowledge of adenovirus biology has resulted in creation of more effective oncolytic agents. However, with more potent therapy regimens an increase in unwanted side-effects is also possible. Therefore, inhibiting viral replication when necessary would be beneficial. We evaluated the antiviral activity of chlorpromazine and apigenin on adenovirus replication and associated toxicity in fresh human liver samples, normal cells, and ovarian cancer cells. Further, human xenografts in mice were utilized to evaluate antitumor efficacy, viral replication, and liver toxicity. Our data suggest that these agents can reduce replication of adenoviruses, which could provide a safety switch in case of replication-associated side-effects. In conclusion, we demonstrate that Ad5/3-Δ24 is a useful oncolytic agent for treatment of ovarian cancer either alone or in combination with conventional chemotherapeutic drugs. Insertion of genes encoding prodrug-converting enzymes into the genome of Ad5/3-Δ24 might not lead to enhanced antitumor efficacy with this highly potent oncolytic virus. As a safety feature, viral activity can be inhibited with pharmacological substances. Clinical trials are however needed to confirm if these preclinical results can be translated into efficacy in humans. Promising safety data seen here, and in previous publications suggest that clinical evaluation of the agent is feasible.