864 resultados para service design
Resumo:
The purpose of this inquiry was to investigate the perceptions of former service personnel, students and their parents about the organizational effectiveness of the Ghana National Service Scheme (GNSS). The inquiry addressed the following questions: How do the participants perceive the effectiveness of the national service program on the Ghanaian society? What are the perceptions of school administrators who worked with service personnel, parents and students vis-à-vis the over all impact of the GNSS on the educational system? What are the perceptions of former service personnel, students and their parents in regard to the impact of the GNSS on them? ^ The GNSS is a part within the ministry of education, which is also part in the Ghanaian social structure. Hence, a systems theory approach which asks, “How and why a system as a whole functions as it does” (Patton, 1990), was utilized in the study. Methodologies included purposive sampling; interviews; participant observation, and follow-up interviews. The study was conducted over a six-moth period. ^ A cross-sectional survey design was used to generate data. The survey was followed up with an ethnographic study where in-depth, face-to-face interviews were conducted together with observations. The results were described and interpreted. ^ The summary of findings concludes that perceptional determinants of the effectiveness of the GNSS were biased by the age and zone of origin but not gender. This partially agrees with Marenin's (1990) except for gender. A significant difference was detected between the responses of those who were officials of the National service Secretariat and of former service personnel. The administrators defended the status quo and demonstrated their deeper knowledge about the scheme. The former personnel and parents freely criticized the program when necessary and did not seem to know much about the GNSS. Respondents mostly stressed the need for the secretariat to focus on the following areas: (1) involvement in the agricultural sector of the economy, (2) involvement in rural mass, civic and health education, (3) adequacy of remuneration and personnel welfare, and (4) ensuring posting of personnel to areas of their expertise. Recommendation for further research concluded the study. ^
Resumo:
This study explored the strategies that community-based, consumer-focused advocacy, alternative service organizations (ASOs), implemented to adapt to the changes in the nonprofit funding environment (Oliver & McShane, 1979; Perlmutter, 1988a, 1994). It is not clear as to the extent to which current funding trends have influenced ASOs as little empirical research has been conducted in this area (Magnus, 2001; Marquez, 2003; Powell, 1986). ^ This study used a qualitative research design to investigate strategies implemented by these organizations to adapt to changes such as decreasing government, foundation, and corporate funding and an increasing number of nonprofit organizations. More than 20 community informants helped to identify, locate, and provide information about ASOs. Semi-structured interviews were conducted with a sample of 30 ASO executive directors from diverse organizations in Miami-bade and Broward Counties, in South Florida. ^ Data analysis was facilitated by the use of ATLAS.ti, version 5, a qualitative data analysis computer software program designed for grounded theory research. This process generated five major themes: Funding Environment; Internal Structure; Strategies for Survival; Sustainability; and Committing to the Cause, Mission, and Vision. ^ The results indicate that ASOs are struggling to survive financially by cutting programs, decreasing staff, and limiting service to consumers. They are also exploring ways to develop fundraising strategies; for example, increasing the number of proposals written for grants, focusing on fund development, and establishing for-profit ventures. Even organizations that state that they are currently financially stable are concerned about their financial vulnerability. There is little flexibility or cushioning to adjust to "funding jolts." The fear of losing current funding levels and being placed in a tenuous financial situation is a constant concern for these ASOs. ^ Further data collected from the self-administered Funding Checklist and demographic forms were coded and analyzed using Statistical Package for the Social Sciences (SPSS). Descriptive information and frequencies generated findings regarding the revenue, staff compliment, use of volunteers and fundraising consultants, and fundraising practices. The study proposes a model of funding relationships and presents implications for social work practice, and policy, along with recommendations for future research. ^
Resumo:
Next-generation integrated wireless local area network (WLAN) and 3G cellular networks aim to take advantage of the roaming ability in a cellular network and the high data rate services of a WLAN. To ensure successful implementation of an integrated network, many issues must be carefully addressed, including network architecture design, resource management, quality-of-service (QoS), call admission control (CAC) and mobility management. ^ This dissertation focuses on QoS provisioning, CAC, and the network architecture design in the integration of WLANs and cellular networks. First, a new scheduling algorithm and a call admission control mechanism in IEEE 802.11 WLAN are presented to support multimedia services with QoS provisioning. The proposed scheduling algorithms make use of the idle system time to reduce the average packet loss of realtime (RT) services. The admission control mechanism provides long-term transmission quality for both RT and NRT services by ensuring the packet loss ratio for RT services and the throughput for non-real-time (NRT) services. ^ A joint CAC scheme is proposed to efficiently balance traffic load in the integrated environment. A channel searching and replacement algorithm (CSR) is developed to relieve traffic congestion in the cellular network by using idle channels in the WLAN. The CSR is optimized to minimize the system cost in terms of the blocking probability in the interworking environment. Specifically, it is proved that there exists an optimal admission probability for passive handoffs that minimizes the total system cost. Also, a method of searching the probability is designed based on linear-programming techniques. ^ Finally, a new integration architecture, Hybrid Coupling with Radio Access System (HCRAS), is proposed for lowering the average cost of intersystem communication (IC) and the vertical handoff latency. An analytical model is presented to evaluate the system performance of the HCRAS in terms of the intersystem communication cost function and the handoff cost function. Based on this model, an algorithm is designed to determine the optimal route for each intersystem communication. Additionally, a fast handoff algorithm is developed to reduce the vertical handoff latency.^
Resumo:
The purpose of this study was to identify the factors that motivate nursing faculty to use service learning. The study was based on the theory of planned behavior (TPB), which implies that the target behavior of intention to use service learning in higher education is influenced by the predictor variables of behavior beliefs (attitude), normative beliefs (peer influence), and control beliefs (confidence and resources). External variables were also considered (years of teaching experience, tenure status, and the type of curriculum). ^ Group interviews and a pilot test were conducted to create the instrument for the study, and Cronbach alpha were calculated for survey item reliability. The participants were full time undergraduate nursing faculty members ( n = 160) in the Southeastern United States who taught in universities with accredited nurse education programs. Demographic data as well as scores on scaled survey responses were used to evaluate the intention of nursing faculty to use service learning in their classes. ^ Pearson product moment correlation coefficient and path analysis were applied to the data. The correlation findings indicated that there were statistically significant relationships between behavior beliefs, normative beliefs, and control beliefs and nursing faculty intention to use service learning. The path analysis also indicated that behavior beliefs and normative beliefs were significant, while control beliefs were not a strong influence on intention to use service learning. Normative beliefs showed the strongest direct influence. The use of a community based curriculum also had a positive influence on intention, and faculty with tenure status were more likely to have positive behavior beliefs (attitude) towards service learning. Finally, as teaching experience increased, positive attitudes towards the intention to use service learning decreased. Seventy-nine percent of the variation in the intention to use service learning was explained by the theory of planned behavior, the type of curriculum, teaching experience, and tenure status. These results will assist nursing administration and faculty to design strategies to facilitate the implementation of service learning pedagogy, as well as a community based curriculum which will help meet the 21st century goals set forth from the American Association of Colleges of Nursing. ^
Resumo:
With the rapid growth of the Internet, computer attacks are increasing at a fast pace and can easily cause millions of dollar in damage to an organization. Detecting these attacks is an important issue of computer security. There are many types of attacks and they fall into four main categories, Denial of Service (DoS) attacks, Probe, User to Root (U2R) attacks, and Remote to Local (R2L) attacks. Within these categories, DoS and Probe attacks continuously show up with greater frequency in a short period of time when they attack systems. They are different from the normal traffic data and can be easily separated from normal activities. On the contrary, U2R and R2L attacks are embedded in the data portions of the packets and normally involve only a single connection. It becomes difficult to achieve satisfactory detection accuracy for detecting these two attacks. Therefore, we focus on studying the ambiguity problem between normal activities and U2R/R2L attacks. The goal is to build a detection system that can accurately and quickly detect these two attacks. In this dissertation, we design a two-phase intrusion detection approach. In the first phase, a correlation-based feature selection algorithm is proposed to advance the speed of detection. Features with poor prediction ability for the signatures of attacks and features inter-correlated with one or more other features are considered redundant. Such features are removed and only indispensable information about the original feature space remains. In the second phase, we develop an ensemble intrusion detection system to achieve accurate detection performance. The proposed method includes multiple feature selecting intrusion detectors and a data mining intrusion detector. The former ones consist of a set of detectors, and each of them uses a fuzzy clustering technique and belief theory to solve the ambiguity problem. The latter one applies data mining technique to automatically extract computer users’ normal behavior from training network traffic data. The final decision is a combination of the outputs of feature selecting and data mining detectors. The experimental results indicate that our ensemble approach not only significantly reduces the detection time but also effectively detect U2R and R2L attacks that contain degrees of ambiguous information.
Resumo:
Today, the development of domain-specific communication applications is both time-consuming and error-prone because the low-level communication services provided by the existing systems and networks are primitive and often heterogeneous. Multimedia communication applications are typically built on top of low-level network abstractions such as TCP/UDP socket, SIP (Session Initiation Protocol) and RTP (Real-time Transport Protocol) APIs. The User-centric Communication Middleware (UCM) is proposed to encapsulate the networking complexity and heterogeneity of basic multimedia and multi-party communication for upper-layer communication applications. And UCM provides a unified user-centric communication service to diverse communication applications ranging from a simple phone call and video conferencing to specialized communication applications like disaster management and telemedicine. It makes it easier to the development of domain-specific communication applications. The UCM abstraction and API is proposed to achieve these goals. The dissertation also tries to integrate the formal method into UCM development process. The formal model is created for UCM using SAM methodology. Some design errors are found during model creation because the formal method forces to give the precise description of UCM. By using the SAM tool, formal UCM model is translated to Promela formula model. In the dissertation, some system properties are defined as temporal logic formulas. These temporal logic formulas are manually translated to promela formulas which are individually integrated with promela formula model of UCM and verified using SPIN tool. Formal analysis used here helps verify the system properties (for example multiparty multimedia protocol) and dig out the bugs of systems.
Resumo:
The total time a customer spends in the business process system, called the customer cycle-time, is a major contributor to overall customer satisfaction. Business process analysts and designers are frequently asked to design process solutions with optimal performance. Simulation models have been very popular to quantitatively evaluate the business processes; however, simulation is time-consuming and it also requires extensive modeling experiences to develop simulation models. Moreover, simulation models neither provide recommendations nor yield optimal solutions for business process design. A queueing network model is a good analytical approach toward business process analysis and design, and can provide a useful abstraction of a business process. However, the existing queueing network models were developed based on telephone systems or applied to manufacturing processes in which machine servers dominate the system. In a business process, the servers are usually people. The characteristics of human servers should be taken into account by the queueing model, i.e. specialization and coordination. ^ The research described in this dissertation develops an open queueing network model to do a quick analysis of business processes. Additionally, optimization models are developed to provide optimal business process designs. The queueing network model extends and improves upon existing multi-class open-queueing network models (MOQN) so that the customer flow in the human-server oriented processes can be modeled. The optimization models help business process designers to find the optimal design of a business process with consideration of specialization and coordination. ^ The main findings of the research are, first, parallelization can reduce the cycle-time for those customer classes that require more than one parallel activity; however, the coordination time due to the parallelization overwhelms the savings from parallelization under the high utilization servers since the waiting time significantly increases, thus the cycle-time increases. Third, the level of industrial technology employed by a company and coordination time to mange the tasks have strongest impact on the business process design; as the level of industrial technology employed by the company is high; more division is required to improve the cycle-time; as the coordination time required is high; consolidation is required to improve the cycle-time. ^
Effects of service-learning on student attitudes toward academic engagement and civic responsibility
Resumo:
This empirical study explored the impact of service-learning participation on high school students' attitudes toward academic engagement and civic responsibility. This study focused whether a group of high school students who participated in a service-learning project had more positive attitudes toward academic engagement and civic responsibility than their high school peers who did not participate in a service learning project. ^ Data were collected from 67 volunteer students as participants in grades 9–12. A service-learning treatment group of 34 high school students was examined relative to a comparison group of 33 high school students with similar demographic and academic characteristics. The investigator used questionnaires, an oral history/service-learning project, and interviews with the teacher-coordinators of the project to collect the data. The two surveys, one investigating high school students' attitudes about academic engagement, the other investigating high school students' attitudes toward civic responsibility, were administered in a pre-treatment/post-treatment design. There were 90 days between the pre-treatment and post-treatment administrations. A factor analysis of the civic responsibility instrument and multivariate analysis of gain scores were used to compare the means of the total aggregate scores of the treatment and comparison groups. Factor analysis was performed on the academic engagement instrument but it was determined that only the total scores could be used in subsequent analyses. Results were used to determine the efficacy of service-learning as interpreted in student attitudes toward academic engagement and student attitudes toward civic responsibility. ^ The study found no significant difference between the academic engagement and the civic responsibility attitudes of a high school service-learning project group and a high school comparison group with comparable school and similar demographic characteristics. One of the implications for educational practice and policy from the study results is a need to design and implement more powerful studies, studies implemented at many sites rather than just at two sites that were the basis of this study, and studies that investigate the research questions over longer time periods. Although it was not a focus of the study, the investigator concluded that service learning projects such as this might be more effective if they were better aligned with Dewey's principles. ^
Resumo:
A model is presented that captures the complex nature of the service experience in an attempt to aid in the design, development and evaluation of service delivery personnel and systems.
Resumo:
As the hotel industry grows more competitive, quality guest service becomes an increasingly important part of managers' responsibility measuring the quality of service delivery is facilitated when managers know what types of assessment methods are available to them. The authors present and discuss the following available measurement techniques and describe the situations where they best meet the needs of hotel managers: management observation, employee feedback programs, comment cards, mailed surveys, personal and telephone interviews, focus groups, and mystery shopping.
Resumo:
Consultants can help a food service operator with almost any problem which needs solving. Howeve6 the manager must "manage" the consultant. The author offers a design for planning for hiring and evaluating the work of anyone given the job of analyzing existing systems and diagnosing problems.
Resumo:
The purpose of this study was to identify the factors that motivate nursing faculty to use service learning. The study was based on the theory of planned behavior (TPB), which implies that the target behavior of intention to use service learning in higher education is influenced by the predictor variables of behavior beliefs (attitude), normative beliefs (peer influence), and control beliefs (confidence and resources). External variables were also considered (years of teaching experience, tenure status, and the type of curriculum). Group interviews and a pilot test were conducted to create the instrument for the study, and Cronbach alpha were calculated for survey item reliability. The participants were full time undergraduate nursing faculty members (n=-160) in the Southeastern United States who taught in universities with accredited nurse education programs. Demographic data as well as scores on scaled survey responses were used to evaluate the intention of nursing faculty to use service learning in their classes. Pearson product moment correlation coefficient and path analysis were applied to the data. The correlation findings indicated that there were statistically significant relationships between behavior beliefs, normative beliefs, and control beliefs and nursing faculty intention to use service learning. The path analysis also indicated that behavior beliefs and normative beliefs were significant, while control beliefs were not a strong influence on intention to use service learning. Normative beliefs showed the strongest direct influence. The use of a community based curriculum also had a positive influence on intention, and faculty with tenure status were more likely to have positive behavior beliefs (attitude) towards service learning. Finally, as teaching experience increased, positive attitudes towards the intention to use service learning decreased. Seventy-nine percent of the variation in the intention to use service learning was explained by the theory of planned behavior, the type of curriculum, teaching experience, and tenure status. These results will assist nursing administration and faculty to design strategies to facilitate the implementation of service learning pedagogy, as well as a community based curriculum which will help meet the 21st century goals set forth from the American Association of Colleges of Nursing.
Resumo:
With the rapid growth of the Internet, computer attacks are increasing at a fast pace and can easily cause millions of dollar in damage to an organization. Detecting these attacks is an important issue of computer security. There are many types of attacks and they fall into four main categories, Denial of Service (DoS) attacks, Probe, User to Root (U2R) attacks, and Remote to Local (R2L) attacks. Within these categories, DoS and Probe attacks continuously show up with greater frequency in a short period of time when they attack systems. They are different from the normal traffic data and can be easily separated from normal activities. On the contrary, U2R and R2L attacks are embedded in the data portions of the packets and normally involve only a single connection. It becomes difficult to achieve satisfactory detection accuracy for detecting these two attacks. Therefore, we focus on studying the ambiguity problem between normal activities and U2R/R2L attacks. The goal is to build a detection system that can accurately and quickly detect these two attacks. In this dissertation, we design a two-phase intrusion detection approach. In the first phase, a correlation-based feature selection algorithm is proposed to advance the speed of detection. Features with poor prediction ability for the signatures of attacks and features inter-correlated with one or more other features are considered redundant. Such features are removed and only indispensable information about the original feature space remains. In the second phase, we develop an ensemble intrusion detection system to achieve accurate detection performance. The proposed method includes multiple feature selecting intrusion detectors and a data mining intrusion detector. The former ones consist of a set of detectors, and each of them uses a fuzzy clustering technique and belief theory to solve the ambiguity problem. The latter one applies data mining technique to automatically extract computer users’ normal behavior from training network traffic data. The final decision is a combination of the outputs of feature selecting and data mining detectors. The experimental results indicate that our ensemble approach not only significantly reduces the detection time but also effectively detect U2R and R2L attacks that contain degrees of ambiguous information.
Resumo:
The different characteristics and needs of mobile device users, the situations in which these devices are operated and the limitations and characteristics of these devices are all factors which influence usability and ergonomics; two elements highly required for achieving successful interaction between users and devices. This research aims to identify characteristics of interface design for apps in mobile device applications, focussing on design, visual publishing and content editing, and the actual process of creation of these interfaces, with a view to guarantee quality interaction through touch technology, in observance of service limitations, the opportunities offered by the devices and the application requirements. The study will examine the interface of the mobile device application titled “Brasil 247” which provides news broadcasts using the concept of usability and ergonomics mainly in the field of adaptation, searching and browsing informative articles, as well as clarifying the processes and techniques necessary to carry out interaction tests which seek to evaluate the usability of interface.
Resumo:
The main focus of this thesis is to address the relative localization problem of a heterogenous team which comprises of both ground and micro aerial vehicle robots. This team configuration allows to combine the advantages of increased accessibility and better perspective provided by aerial robots with the higher computational and sensory resources provided by the ground agents, to realize a cooperative multi robotic system suitable for hostile autonomous missions. However, in such a scenario, the strict constraints in flight time, sensor pay load, and computational capability of micro aerial vehicles limits the practical applicability of popular map-based localization schemes for GPS denied navigation. Therefore, the resource limited aerial platforms of this team demand simpler localization means for autonomous navigation. Relative localization is the process of estimating the formation of a robot team using the acquired inter-robot relative measurements. This allows the team members to know their relative formation even without a global localization reference, such as GPS or a map. Thus a typical robot team would benefit from a relative localization service since it would allow the team to implement formation control, collision avoidance, and supervisory control tasks, independent of a global localization service. More importantly, a heterogenous team such as ground robots and computationally constrained aerial vehicles would benefit from a relative localization service since it provides the crucial localization information required for autonomous operation of the weaker agents. This enables less capable robots to assume supportive roles and contribute to the more powerful robots executing the mission. Hence this study proposes a relative localization-based approach for ground and micro aerial vehicle cooperation, and develops inter-robot measurement, filtering, and distributed computing modules, necessary to realize the system. The research study results in three significant contributions. First, the work designs and validates a novel inter-robot relative measurement hardware solution which has accuracy, range, and scalability characteristics, necessary for relative localization. Second, the research work performs an analysis and design of a novel nonlinear filtering method, which allows the implementation of relative localization modules and attitude reference filters on low cost devices with optimal tuning parameters. Third, this work designs and validates a novel distributed relative localization approach, which harnesses the distributed computing capability of the team to minimize communication requirements, achieve consistent estimation, and enable efficient data correspondence within the network. The work validates the complete relative localization-based system through multiple indoor experiments and numerical simulations. The relative localization based navigation concept with its sensing, filtering, and distributed computing methods introduced in this thesis complements system limitations of a ground and micro aerial vehicle team, and also targets hostile environmental conditions. Thus the work constitutes an essential step towards realizing autonomous navigation of heterogenous teams in real world applications.