Free Essay

Msc-Thesis-Protocol 2012 Vs3

In: Other Topics

Submitted By hrrasel127
Words 2335
Pages 10
MSc Thesis PROTOCOL

Faculty of Science Master School of Life and Earth Sciences

Master Thesis PROTOCOL

Master Thesis PROJECT The master thesis project is a compulsory part of the MSc in Earth Sciences; the scheduled amount of credits for the Master thesis research project differs per track.
Earth Sciences Geo-ecological Dynamics Environmental Management

42 EC 30 EC code AW4006 code AW4065

2. OBJECTIVES OF THE MSc Thesis PROJECT The objective of the Master thesis project is to learn to carry out earth scientific research including The master thesis project provides students to acquire academic skills in: problem definition, literature research, design of research, approach, data acquisition, validation of results and reporting.

o formulating a clear problem statement and research aim o planning of the research o reading of relevant literature and, in due time, an adequate incorporation thereof in the written report o accumulating sufficient reliable data o processing (statistics etc.) of these data and critically judging the obtained results in relation to the goals and the line of research of which the research is part of o discuss the results of own work in the context of the relevant scientific literature o presentation of findings during informal colloquia and scientific meetings o describing and critically discussing the above activities in a written thesis (in English), in which the methodology is accounted for and the original phrasing is substantiated o an oral presentation and discussion of the results in English

1

MSc Thesis PROTOCOL

3. OUTLINE OF THE MSc THESIS PROJECT

The research is carried out within one of the research groups (Geo-ecological Modeling, Earth Surface Science or Paleo and Landscape Ecology). The Master thesis research should comply with the research themes of the research institution IBED and graduate school. Once a year, a list of available research topics is published from which a master thesis topic can be selected. The list can be obtained from the MSc thesis coordinator and can be downloaded from Blackboard (Master Earth Science / Documents / MSc Research Topics). In case the student proposes a research topic (pre-concerted with the responsible lecturer) not mentioned on the approved list of master thesis topics, this needs approval by the Master track coordinator. A MSc thesis research project usually begins with a study of a topic. Studying the relevant literature is included in the project time. However, practical work such as laboratory experiments, fieldwork or computer simulations, make up the larger part of a MSc thesis research project . The MSc thesis research project should be completed with a written report and oral presentation.

The intensity of supervision can also vary; it therefore is very important that unambiguous agreements are made between student and supervisor prior to the start of the MSc thesis research project by filling in the MSc approval form. This protocol can act as a guideline when making these agreements. 4. SUPERVISION (Principal SUPERVISOR/ EXAMINER, CO-ASSESSOR supervisor)
AND

External

In the MSc thesis project several people are involved, most notably the supervisor/examiner, the co-assessor, and an external supervisor when the research not is carried out at IBED. The principal supervisor (or examiner) is supervising the research conducted and is always a permanent staff member of IBED. The supervisor will supervise the daily work and assesses and grades the thesis, in which case he is also the examiner. The co-assessor is a permanent staff member of the faculty of Science. The co-assessor also reads, assesses and grades the MSc thesis. The daily supervision can also be carried out by a PhD student or postdoctoral fellow at the Faculty, or by a researcher at an institute or company where the MSc thesis research project is performed. In such a case, the final responsibility for the MSc thesis research is attributed to the principal supervisor, (as defined above) and who will be in close contact with the daily supervisor on the progress and quality of the student’s work. The supervisor supports the student in writing the time plan at the beginning of the project based on the Research Proposal, which is separately graded, and the supervisor and external supervisor (if appropriate) will evaluate the MSc thesis research project halfway with the student, and finally assess the project. A (daily) supervisor is expected to teach students any techniques needed for the research project or provide means to acquire this knowledge. During the MSc thesis project the (daily) supervisor should be available to discuss problems within a reasonable time. Daily (informal) discussion might not be unusual. In case a supervisor is unavailable for a longer period of time, he should ensure that there is somebody else available for urgent questions. The principal supervisor will determine a final grade, and the daily supervisor (if this is someone else then the principal supervisor) only gives advice on the final grade. If the supervisor and co-assessor disagree more than 1 point in grade, a third assessor should evaluate the MSc thesis work to settle the question of the final mark.

2

MSc Thesis PROTOCOL

5. APPROVAL PROCEDURE All MSc thesis research projects are subject to approval by the MSc thesis coordinator for subjects chosen from the published list. When a subject is studied that is not on the list approval of the Examination board is required. Students should submit their Research Project Approval Form including approval of the track coordinator (this form is be downloaded from www.student.uva.nl) prior to the start of the MSc thesis research project to the Examination Board. The student should hand in these forms at the Service desk ESC at least 4 weeks before the planned starting date. After the MSc thesis research project has been approved the student, supervisor, examiner and track coordinator will receive the signed forms.

6. DESCRIPTION AND PLANNING OF THE MSC THESIS The student should hand in the Research Proposal in consultation with the involved supervisor and MSc thesis coordinator. The Research Proposal should be finished, be presented and graded before the MSc thesis research starts. This proposal should at least contain the following items: o Research phrasing (title, hypothesis, (sub)questions); o Methods and materials (specification of the MSc thesis research project , which techniques are used, which new techniques the student will learn); o Initial literature o Planning of the research o If applicable: fieldwork o Cost estimation o Summary

7. PLANNING OF THE MSc Thesis PROJECT After the MSc thesis project has been approved, the student can start with the experimental work. Three weeks before the final date of the project the student has to send a draft version of the report to the examiner. At latest one week before the final date, the student has to provide the final copy of the report to the assessors (supervisor, examiner/co-assessor). This final report has to be uploaded to UvA Dare by the student and Ephorus by the supervisor in order to be checked for plagiarism. The MSc thesis project is concluded with an oral scientific presentation in English. The MSc thesis project has to be presented publically. The supervisor and examiner have to be present. The presentation consists of two parts: presentation and defense/discussion. It is the responsibility of the student to set a time and day for the presentation with the supervisor.
IMPORTANT On the MSc thesis Approval Form the student and supervisor are requested to fill in a time schedule for the MSc thesis research project. In practice, it turns out that most students extend the amount of time for the actual research, and do not leave enough time for their report. Students are advised to plan their MSc thesis research project carefully and to stick to the (initial) time schedule. Students are advised to make a more detailed plan before starting the practical work, and to discuss this with their supervisor. The supervisor has the obligation to make sure that the planned amount of work can be completed by the student within the planned time. If this plan is jeopardized by extra work not included in the plan, the student and supervisor should discuss this and come to an agreement. Planning problems may always be discussed with the track coordinator. If in the course of the project it transpires that extra time is necessary, an application to the Examination Board has to be made. The student and supervisor should explain in a letter why extension of the period is necessary, what activities will take place in the extension of the research period and the number of weeks (EC) requested. When a project exceeds the planned deadline the supervisor may grade the project lower (see grading form).

3

MSc Thesis PROTOCOL

8. REPORT WRITING The format (scientific journal set up) in which the MSc thesis project is written, depends highly on the project itself. In general, the student can pursue the following guidelines:

o The report should be an account of:
-

all the researched (sub)questions all used methods and techniques scientific discussion of all discovered results with reference to other published scientific work include a statement on the scientific innovative aspects of the work include a paragraph on the societal relevance of the study.

o Outline of chapter division

Abstract Introduction Materials and Methods Results Discussion Conclusion Reference list

o The Thesis is approximately 10.000 words (30 EC) to 15.000 words (42 EC) (30-45 pages respectively) excluding the literature list. The report is written in English.

o The following information should be stated on the front page of your report:
Title of MSc thesis research project Number of credits Period in which the MSc thesis research project was carried out Student’s name and student’s ID Master programme and track Name of daily supervisor, supervisor and co-supervisor Name of research institute Date

9. ASSESSMENT The research project will be assessed by at least two persons i.e. the supervisor and coassessor. The assessment consists of four components:
1 Research Quality Theoretical knowledge Technical Skills Independence/initiative Original contribution Working attitude Accuracy Cooperation with others Efficiency General efficiency Followed schedule □ □ □ □ □ □ □ □ □ □ 2 □ □ □ □ □ □ □ □ □ □ 3 □ □ □ □ □ □ □ □ □ □ 4 □ □ □ □ □ □ □ □ □ □ 5 □ □ □ □ □ □ □ □ □ □ MSc thesis Context Structure Methods Data collection Contents Discussion Use of literature Conclusion Lay-out Presentation Contents Media use Discussion 1 □ □ □ □ □ □ □ □ □ □ □ □ 2 □ □ □ □ □ □ □ □ □ □ □ □ 3 □ □ □ □ □ □ □ □ □ □ □ □ 4 □ □ □ □ □ □ □ □ □ □ □ □ 5 □ □ □ □ □ □ □ □ □ □ □ □

The final assessment has to be filled in and signed using the standard form for the final assessment of the MSc thesis report, which has to be handed in at the ESC. 4

MSc Thesis PROTOCOL

Experimental work: This component of the MSc thesis research project should develop and contain a number of skills for the student on which the student will be assessed. MSc thesis: The assessment of the MSc thesis is based on the draft and final version of the report. The thesis will be tested for plagiarism using Ephorus. Contents of the report that are assessed are described in paragraph 8.

Presentation Students have to present their research publically in the Research Workshop. The supervisor and co-supervisor should be present. The presentation consists of two parts: presentation and defense/discussion. The language of the scientific presentation is English. Efficiency The work should be carried out according to the predefined plan as given and agreed upon in the MSc thesis research contract. In that case the category ‘Followed schedule’ in the assessment scheme should be marked with 5. If the time limit agreed upon in the research contract is exceeded then the final grade 8.0 or higher for the MSc thesis CANNOT be obtained. The relative weight of the various parts of the project are stated on the Final Assessment MSc. Research Project form (experimental work 40%, thesis 40%, efficiency, and oral presentation 10%). The final assessment takes place after the report has been submitted and the project has been presented. Experimental work, report and presentation are assessed by the supervisor and co-assessor and interim evaluations are taken into account in the final assessment. The grade should be stated on the Assessment Form (see http://www.student.uva.nl) and should be explained to the student. If the members of the assessment committee cannot come to a uniform/concise grade, all members write their grades on paper after which the Examination Board will set the final grade.

Uploading your approved MSc thesis Before you can actually graduate, your MSc thesis has to be uploaded at the UvA data repository. This has to be the final version that has been approved by the examiners. You have to upload a digital version of your thesis in either pdf or word format or as a zip-file. The upload address is: http://www.science.uva.nl/onderwijs/thesis/submit.php.

It is recommended to do this immediately after your thesis has been graded by your examiners. The supervisor will be approached directly by the repository to accept your thesis as being the final one and will also have the opportunity to indicate whether the whole thesis will be freely accessible or only the abstract. 10. QUESTIONS, REMARKS, PROBLEMS OR INFORMATION Try to solve a complaint or conflict with the person in question, if necessary with the track coordinator or student advisor present as an independent third party. Problems that cannot be solved in this manner may be submitted to the Examination Board.

Halfway the project, the progress of the project will be evaluated (Mid-term evaluation; see http://www.student.uva.nl);. The student or supervisor may initiate this meeting with the supervisor. The evaluation should help the student improve the quality and progress of the research project. 5

MSc Thesis PROTOCOL

11. INSURANCE POLICY AND REGULATIONS For the regulations with regard to insurance and safety is referred to the blackboard site Verzekering & Veiligheid Veldwerk (Insurance & Fieldwork Safety) http://blackboard.ic.uva.nl/webapps/portal/frameset.jsp?tab_tab_group_id=_2_1&url=%2Fweba pps%2Fblackboard%2Fexecute%2Flauncher%3Ftype%3DCourse%26id%3D_42608_1%26url%3D For questions with regard to these regulations please contact the MSc thesis coordinator (Dr. L.H. Cammeraat) or your examiner, prior to starting your research.

6…...

Similar Documents

Premium Essay

Msc 337

...functions such as brand, function, and hedonics fail to influence personal values. Townsend cites studies that reveal the following about the consumer relationship with aesthetic products. “In study 1 a prior self-affirming task leads to a decrease in choice share of a highly aesthetic option. Studies 2 and 3 mimic prior research on self-affirmation with, however, choice of a highly aesthetic product replacing a traditional self-affirmation manipulation. Choosing a product with good design resulted in increased openness to counter-attitudinal arguments and reduced propensity to escalate commitment toward a failing course of action. There are numerous implications of this form of self-affirmation, from public policy to retail therapy.”(Townsend 2012). With new studies on how the look of a product can affect the consumer, organizations need to be aware of these effects, and adjust their products to appease the aesthetics traits that consumers are looking for. Markets and demand are constantly changing. Former products generated by firms eventually die. It has also been established that firms generate most of their profit from new products. Firms need to be flexible, and ready to adjust to constant changes in trends, and needs. This focus is most needed when generating product ideas. When firms do this they need to take into account: the customer, economic change, sociological and demographic change, technological change, political and legal changes as well. In the article......

Words: 1764 - Pages: 8

Premium Essay

Thesis

...influential are CSR activities in order to create brand awareness? 29 5.0 Discussions 20-21 6.0 Conclusions and Implications 22 Limitations and Suggestions Appendix Referencing Statement of Authorship I hereby affirms that the work presented in this research thesis has been performed solely by myself and the acknowledgement has been given in the references to all sources be they printed, electronic or personal. The word count of this project is 7914 words Name : NG CHER HWA Student ID : 0301547 Signed : Date : 09/07/2012 Acknowledgements Foremost, I would like to express my sincere gratitude to Taylor’s Lakeside University College This thesis has allowed me to explore and understand more about Corporate Social Responsibility which I believe it would be a valuable experience that would be of help in my future business path. Moreover, searching and receiving the relevant information turned out to be a great learning experience that provides many insights to CSR as a business strategy. Besides Taylors, I would like to take this opportunity to show my appreciations to Padini Holding Bhd, without them, this thesis would not have been completed. It was a great learning experience that allows me to understand the importance of CSR from a commercial point of view. Lastly, I would like to express my thanks to my supervisor, Mr. Lim Chee Leong for his support and time in assisting my research study along the way......

Words: 9526 - Pages: 39

Premium Essay

Bath Msc

...The Bath MSc MSc in Accounting and Finance, MSc in Finance, MSc in Finance with Banking, MSc in Finance with Risk Management MSc in Advanced Management Practice MSc in Human Resource Management and Consulting MSc in Innovation and Technology Management MSc in International Management MSc in Management MSc in Marketing MSc in Sustainability and Management Hugh Ayling MSc in Marketing graduate now at L’Oréal Contents 01 Welcome to the Bath Advantage 02 Why choose Bath? 03 Enhancing your career prospects 04 What else can I expect? 05 The Bath Management Alumni Community that’s right for you 06 Choosing the programme 08 MSc in Accounting and Finance, MSc in Finance, MSc in Finance with Banking, MSc in Finance with Risk Management Management Practice Management and Consulting 12 MSc in Advanced 20 MSc in Human Resource 24 MSc in Innovation and 30 MSc in International Technology Management Management 34 MSc in Management 38 MSc in Marketing 44 MSc in Sustainability and Management 48 Life on campus 49 Accommodation and living costs 51 Life in Bath 52 How to apply 53 How to find us Contact us (back cover) www.bath.ac.uk/management University of Bath School of Management 01 Welcome to the Bath Advantage. Research intensive and practice driven, we are consistently rated as one of the best-performing business schools in the UK. To equip students with the best possible opportunities, our academics conduct......

Words: 18997 - Pages: 76

Premium Essay

Protocols

...LAB 3.1-3.4 3.1.1 – WHAT WOULD HAPPEN IF WIRELESS DEVICES WERE NOT GOVERNED BY THE WI-FI ALLIANCE AND EACH VENDOR HAD ITS OWN STANDARDS AND PROTOCOLS? A. WIRELESS DEVICES WOULD HAVE DIFFICULTY COMMUNICATING. WHAT IS OKAY WITH ONE VENDOR MAY NOT BE OKAY WITH ANOTHER VENDOR. PRICES OF DEVICES AND CONNECTIONS WOULD ALSO CHANGE. 3.1.2 – GIVE AN EXAMPLE OF A MODEL THAT IS USED TO VISUALIZE SOMETHING THAT IS DIFFICULT TO OBSERVE OR PERCEIVE. A. CONNECTIONS REQUIRING ROUTER EQUIPMENT – HUBS, SWITCHES AND ROUTERS. 3.1.3 – WHAT ARE THE DIFFERENT LAYERS YOU THINK WOULD BE NECESSARY FOR COMMUNICATION TO BE MAPPED TO A MODEL? A. APPLICATION LAYER, PRESENTATION LAYER, SESSION LAYER, TRANSPORT LAYER, DATA LINK LAYER AND PHYSICAL LAYER. 3.1.4 – WHAT WILL HAPPEN IF A MODEL IS TOO GENERAL? TOO GRANULAR? A. THE MODEL WOULD NOT BE FLEXIBLE IF TOO GENERAL; IF TOO GRANULAR, A LOAD IMBALANCE WOULD OCCUR. 3.1 REVIEW – 1. WHY WOULD A 3-LAYER MODEL OF COMMUNICATION THAT HAS THE LAYERS PHYSICAL, NETWORK AND APPLICATIONS BE INSUFFICIENT TO ADEQUATELY DESCRIBE NETWORK COMMUNICATIONS? A. THE 7-LAYER COMMUNICATION MODEL WAS TESTED AND SUCCESSFULLY PROVEN TO WORK. IF A LAYER IS MISSING THE MODEL WILL NOT WORK PROPERLY. 2. WHAT IS THE HISTORY OF THE OSI REFERENCE MODEL? A. TO SERVE AS THE FOUNDATION OF THE ESTABLISHED WIDELY ADOPTED SUITE OF PROTOCOLS THAT ARE USED BY INTERNATIONAL INTERNETWORKS. 3. WHAT IS THE HISTORY OF THE TCP/IP MODEL? A. BOTH DEVELOPED TOGETHER (INTERNET AND TCP/IP)...

Words: 996 - Pages: 4

Free Essay

Protocols

...A protocol is a set of invisible compute rules that govern how an Internet document will be transmitted onto the screen. For two computers to communicate with one another, they must be able to understand one another through the same language. In order for computers to exchange information there must be a preexisting agreement as to how the information will be structured and how the sides will send and be received. The most important that defines the common networking protocols is the OSI known as Open Systems Interconnection. Introducing the TCP and the IP are two different protocols that are often linked together. The linking of several protocols is fairly common since the functions of different protocols may be complementary so that together they carry out particular tasks that are bases of operation layers. These suits of protocols are often used with many local area networks and carries out the basic operations of the Internet. Emailing also has its own set of protocols that has a variety of both for sending and receiving mail. The most common protocol for sending mail is the SMTP that is known for as Simple Mail Transfer Protocol. Then for receiving emails, the protocol being most commonly used is the Post Office Protocol, POP for short. Both the SMTP and the POP is used for managing the transmission for delivery of mail across the Internet. Web pages that are constructed to a standard method are called Hypertext Markup Language known as HTMO. The HTMP......

Words: 413 - Pages: 2

Premium Essay

Thesis

...BSC. # The BSC controls a number of base stations, handles signaling traffic, operations and maintenance messages to and from all BTSs under its control. The BSC is also involved in some switching functionality. It provides the switching link between terrestrial circuits on the Mobile Switching Centre (MSC) side and radio circuits on the BTS side. Although there is a terrestrial line between the BSC and the BTS, it can be considered as hard-wired to a particular logical traffic channel on the air interface. It also handles intra and inter-BTS handoffs as BTS has no switching function. 3. Network and switching subsystem (NSS) The NSS, as the name implies, handles the networking issues like hando_s between different BSS and trafficking of data between the wired and wireless networks. It consists of: # The Mobile Switching Centre (MSC), which acts as a switching station and at the same time provides all the necessary services to a mobile station, such as registration, authentication, handoffs, connection to the fixed networks (such as the PSTN or ISDN), etc. # The Home Location Register (HLR) and the Visitor Location Register (VLR), together with the MSC, provide the call routing and roaming capabilities of GSM. The HLR contains all the administrative information for each subscriber registered in the corresponding GSM network, along with the current location the mobile. The VLR contains the selected administrative information from the HLR, necessary for......

Words: 6883 - Pages: 28

Premium Essay

Protocols

...Protocols Just like wired and TCP/IP communications, wireless communications has its own set of protocols. These protocols exist to govern wireless communications for mobile phones, pagers, and other wireless devices (Protocols.com). Protocols that exist for wireless communications such as wireless session protocol, wireless transaction protocol, wireless transport layer security, and wireless datagram protocol each covering different aspects of the communications model (Protocols.com). Just like wired and TCP/IP communications, wired communication protocols exist in a wireless communications OSI model (Protocols.com). The wireless communications OSI model is divided into the following layers; application layer, session layer, transaction layer, security layer, transport layer (Protocols.com). Each layer of the wireless communications OSI model has is associated protocols. The necessity for different protocols for wireless communications comes from this “WAP Stack” which is the model for wireless data transfer (Protocols.com). Each layer of the model is governed by different protocols, and are divided as follows. * Application Layer Protocols * WAE or Wireless Application Environment * WTA or Wireless Telephony Application (Protocols.com) * Session Layer Protocols * WSP or Wireless Session Protocol (Protocols.com) * Transaction Layer Protocols * WTP or Wireless Transaction Protocol (Protocols.com) * Security Layer Protocols * WTLS or Wireless Transport Layer......

Words: 278 - Pages: 2

Free Essay

Protocols

...The four major protocols for circuit switching and packet switching are as follows: • X.25 • Frame Relay • ATM or Asynchronous Transfer Mode protocol • TCP/IP X.25 is probably one of the very first of packet switching protocols. It performs really well, especially considering how long it has been around. X.25 uses a virtual circuit approach, mainly using POTS or plain old telephone service lines, which are different from lines such as ISDN. The POTS lines are analog copper lines, so they can experience a lot of errors. But, once the lines have been connected, X.25 connections are really reliable. It's quite an efficient way to send packets across various data networks, with the X.25 protocol redundant error checking at each of the nodes. Frame relay is different because it doesn't require the need for analog wires or overhead wires like X.25 does. But this means that Frame Relay doesn't have the added framing and processing that X.25 has that provide guaranteed data transfers. It also doesn't have link to link reliability. So if a frame is corrupted, it is discarded, which is different than TCP as it detects and recovers any and all discarded frames. Asynchronous Transfer Mode protocol is used with either a coaxial cable, twisted pair, or fiber. ATM also takes advantage of a 53-btye cell, having 48 application bytes and 5 bytes are allocated for the ATM headers. ATM shows a lot more enhancements over Frame......

Words: 487 - Pages: 2

Free Essay

Thesis

...associated with casting ballots over the Internet were more serious and challenging to overcome (NIST, 2008).Another recent NIST report (2011) concluded that Internet voting systems cannot currently be audited with a comparable level of confidence in the audit results as those for polling place systems. Other researchers point out that building secure online voting systems is far from being possible and that a small configuration or implementation error would undermine the entire voting process (Wolchok et al., 2012). Reference is made to the pilot project of an online voting in Washington, D.C. and how researchers at University of Michigan were able to break through the security functions and gained complete control of the election server in less than 48 hours. Researchers argue that fundamental advances still need to be made in security before e-voting will truly be safe (Cramer et al., 1996; Ikonomopoulos et al., 2002; Schoenmakers, 1999; Wolchok et al., 2012). Researchers indicated that operationally, no commercial system is likely to ever meet all requirements, and that developing a suitable custom system would be extremely difficult and prohibitively expensive (Neumann, 1993). Others indicated that any catastrophic failures and sweeping fraud made possible by imperfections in electronic voting machines are also likely to occur in a real election (Shamos, 1993). Shamos (1993) refers to the fact that the real source of election problems is the result of human......

Words: 4590 - Pages: 19

Free Essay

Msc Thesis

...Note: achieves a distinction but the report does not fully reflect what was shown at demo] Mobile Devices and Their Impact on the Learning Environment. By Stuart Greig – GT320827 MSc Web Development A project submitted in partial fulfilment of the award of Master of Science In Web Development from Staffordshire University Supervised by Philip Windridge and Alastair Dawes March 2014 Word Count: 14422 For the Attention of Philip Windridge 1|Page Faculty of Computing, Engineering and Sciences Table of Contents Table of Contents 2 Abstract 5 Acknowledgements 6 List of Figures 7 Introduction 8 Chapter 1: Research Methods 9 1.1 Qualitative or Quantitative? 9 1.1.1 Quantitative Research 9 1.1.2 Qualitative Research 10 1.2 Methods to be used 10 1.3 Conclusion 10 Chapter 2: Current Mobile Learning Initiatives 11 2.1 Entrust: Learn Anywhere 11 2.2 Apple in Education 11 2.3 Conclusions 12 Chapter 3: Barriers to E-Learning 14 3.1 Introduction 14 3.2 Attitudes as a barrier to E-Learning and M-Learning 3.3 Financial Barriers to E-Learning and M-Learning 3.4 Conclusions 20 Chapter 4: The Benefits of E-Learning 21 4.1 Distance and Collaborative Learning 21 4.2 Personalised Learning 22 4.3 Increased Interactivity 23 4.4 Additional Resources 23 4.5 Conclusions 24 Chapter 5: Educational Theory 26 5.1 Student Centred Learning (SCL) 26 Chapter 6: Application Development 29 6.1 Initial Web, Database and Application Design 29 6.1.1 Requirements List 29 6.1.2 UML Use Case Diagram......

Words: 38347 - Pages: 154

Premium Essay

The Kioto Protocol

...The Kyoto Protocol is an international agreement which is mainly linked to ‘the 1992 United Nations Framework Convention on Climate Change (UNFCCC)’ and thus it has set international State Parties to reduce green house emissions, based on premise that man-made carbon dioxide and global warming have caused it.It is thus a climate control protocol that controls the world’s economy and the power of the United Nations by ensuring that all the industrialized nations have submitted to restrictions on the production of carbon dioxide.`In essence its believed that it is the developed countries which are mainly responsible for the very high levels of the emissions due to the many years of industrial acivities that have been rampant in the countries. The Kyoto Protocol implemented the objectives of the UNFCCC, which was to fight global warming by reducing greenhouse gas concentrations in the atmosphere to a level that would prevent anthropogenic interference with climate system. Climatic Change Convention is not all about pollution abatement and conversation in usual sense of those terms but it is mainly about the transformation which in essence brings about greater efficiency in the use of resources and also a greater equity in accessing them. It is not this convention on global environment; it is rather the convention on the sustainable development of the global economy and also the scientific community that has put it clear that we are in bq,/;l;’jle. This is a global issue......

Words: 1693 - Pages: 7

Free Essay

Protocols

...LAYER PROTOCOLS • IP (Internet Protocol) • ICMP (Internet Control Message Protocol) • ARP (Address Resolution Protocol) • RARP (Reverse Address Resolution Protocol) 4.7.1 The IP PROTOCOL • IP represents the heart of the Internet Protocol suite • Provides the main service of the layer: data transmission in connectionless mode – datagram IP Header Format IP Header Format (Including user data, this makes an IP packet) IP Header fields: • Version - Indicates the version of IP currently used (now 4); • IP Header Length - Indicates the datagram header length in 32-bit words (value = 5); • Type-of-service - Specifies how a particular upper-layer protocol would like the current datagram to be handled. Datagrams can be assigned various levels of importance through this field; • Total length - Specifies the length of the entire IP packet, including data and header, in bytes. • Identification - Contains an integer that identifies the current datagram (sequence number). This field is used for re-assembling the datagram fragments; • Flags - A 3-bit field for fragmentation control:  000 - last fragment;  001 - not last fragment;  010 - the fragmentation not allowed. • Fragment offset - measured in double-words (offset from main datagram); • Time-to-live - Maintains a counter that gradually decrements down to zero, at which point the datagram is discarded. This keeps packets from looping endlessly; • Protocol - Indicates which upper-layer protocol......

Words: 1379 - Pages: 6

Premium Essay

Thesis

...University of Phoenix, 2015 Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Science Psychology University of Phoenix March, 2015 Abstract Psychopathic and sociopathic general characteristic traits are found in both genders in various populations. More research on the general characteristic traits of females is needed. Research for the female populations will give professionals information about the differences displayed between genders. Different applied sciences will also further their knowledge in treatment options for either tendency. The study used explored if any differences existed between genders with intensified levels of psychopathic traits in regard to psychopathy factor scores. The sample consisted of 2,500 people of both genders (52.6% women) (M=22.15; SD=1.38) from the generalized population, aged 20-24. Results displayed women with psychopathic personality traits had significantly higher levels of behavioral tendencies than men of the same. The genders did display a difference in aggressive behavior. The men showed a significant amount of aggressive behaviors compared to the women. The gender differences displayed in the seven psychopathic features show the variations needed for treatment options. Differences and Similarities in Generalized Characteristic Traits among Genders: The Sociopath and Psychopath by Evelyn J. Dotson MS, University of Phoenix, 2015 Thesis Submitted in Partial......

Words: 8016 - Pages: 33

Free Essay

Ethics Protocol

...[pic] Summary Protocol Form (SPF) University Human Research Ethics Committee [pic]Office of Research – Ethics and Compliance Unit: GM 1000 – 514.848.2424 ex. 2425 Important Approval of a Summary Protocol Form (SPF) must be issued by the applicable Human Research Ethics Committee prior to beginning any research involving human participants. The University Human Research Ethics Committee (UHREC) reviews all Faculty and Staff research, as well as some student research (in cases where the research involves more than minimal risk - please see below). Research funds cannot be released until appropriate certification has been obtained. For faculty and staff research Please submit one signed copy of this form to the UHREC c/o the Research Ethics and Compliance Unit, GM-1000. Please allow one month for the UHREC to complete the review. Electronic signatures will be accepted via e-mail at ethics@alcor.concordia.ca For graduate or undergraduate student research • If your project is included in your supervising faculty member’s SPF, no new SPF is required. • Departmental Research Ethics Committees are responsible for reviewing all student research, including graduate thesis research, where the risk is less than minimal. In Departments where an ethics committee has not been established, please contact the Research Ethics and Compliance Unit. • In cases where the student research is more than minimal risk (i.e. the research involves participants......

Words: 1622 - Pages: 7

Free Essay

Thesis

...origin and their relation to deviant knowledge, the thesis determines that both terrorism and organised crime are nurtured by a constant trickle from minor sources rather than by large financial transfers; and that anti-money laundering provisions are misapplied, taken too far, too expensive, and incapable of demonstrating their effectiveness. In lieu of more traditional policy recommendations, the thesis develops a complexity-theory based intelligence function, capillary intelligence, to improve the present information-gathering systems and generate consistent and context-relevant intelligence for the consideration of policy-makers. The intelligence function takes into account also the concept of self-organised criticality. The thesis fully adheres to the principle that efficiently applied intelligence-led approaches for detection of organised crime are demonstrably superior to a “follow the money” approach. An extended concept of deviant knowledge is developed and five methodological techniques employed: Complexity theory, network theory, self-organised criticality, scaling theory, and intelligence treatment. The thesis is multidisciplinary and calls on contributions from International Law, Economics, Criminal Justice Studies, and Governance and Ethics. Its approach is illustrative and fits Baudrillard’s 1981 methodological principles known as bricolage. Using five methodologies and six major case studies, the thesis reaches four conclusions. First, the rapid......

Words: 99119 - Pages: 397