Help


[permalink] [id link]
+
Page "Educational psychology" ¶ 38
from Wikipedia
Edit
Promote Demote Fragment Fix

Some Related Sentences

protocol and analysis
One of the most commonly used methods for qualitative research in educational psychology is protocol analysis.
The most fundamental operations in both protocol and verbal analysis are segmenting ( isolating ) and categorizing sections of verbal data.
Analysis of data from an observational study is guided by the study protocol, although exploratory data analysis may by useful for generating new hypotheses.
The study of human problem solving required new kinds of human measurements and, with Anders Ericsson, Simon developed the experimental technique of verbal protocol analysis.
Andrew Tridgell developed the first version of Samba Unix in December 1991 and January 1992, as a PhD student at the Australian National University, using a packet sniffer to do network analysis of the protocol used by DEC Pathworks server software.
In a randomized experiment, the method of randomization specified in the experimental protocol guides the statistical analysis, which is usually specified also by the experimental protocol.
* Western blot analysis of sub-cellular fractionated samples using the Odyssey Infrared Imaging System ( a protocol )
In 1971, before the implementation in 1981 of the modern Draize protocol, toxicologists Carrol Weil and Robert Scala of Carnegie Mellon University distributed three test substances for comparative analysis to 24 different university and state laboratories.
* The highest locker protocol which requires off-line analysis of all task conflicts to find a " ceiling priority "
Certain specialised imaging contract research organizations provide to end medical imaging services, from protocol design and site management through to data quality assurance and image analysis.
The majority of intrusion prevention systems utilize one of three detection methods: signature-based, statistical anomaly-based, and stateful protocol analysis.
The method was developed based on the techniques of protocol analysis by Ericsson and Simon.
German technology web site tecchannel. de published an analysis of the Windows Update communication protocol in February 2003, which received wide attention on technology web sites.
* protocol analysis
Reverse-engineering, network sniffing, protocol analysis, system administration, programming, and cryptanalysis are all skills which have been required by prior CTF contests at DEF CON.
The decision on when to start treatment for HIV is not yet settled, although one small, under-powered trial ( when restricting to a " per protocol analysis ") suggested that delaying the start of treatment for several weeks may be beneficial in avoiding deaths from Immune reconstitution inflammatory syndrome ( IRIS ).
Snort performs protocol analysis, content searching, and content matching.
In July 2007, Robb Topolski, a self-described “ networking and protocol expert ” conducted an independent analysis of most accusations leveled against BitComet including the DHT Exploit and Super-seeding controversies mentioned above.
The initial analysis of the data from properly randomized studies often follows the study protocol.
Talk is seen as ( and in experimental psychology and protocol analysis used as ) descriptions of people's mental content.
Certain meta data fields in the Project 25 protocol are not encrypted, allowing an attacker to perform traffic analysis to identify users.
* Assessment of awareness ; protocol analysis
Reflective markers are part of the scientific protocol and allow further quantified motion analysis for joint disorders follow-up.

protocol and data
Networks may be classified according to a wide variety of characteristics such as the medium used to transport the data, communications protocol used, scale, topology, and organizational scope.
* Congestion Experienced, a protocol element of the Explicit Congestion Notification data networking protocol
It defines the DNS protocol, a detailed specification of the data structures and communication exchanges used in DNS, as part of the Internet Protocol Suite.
The primary motivation for replacing RARP with BOOTP was that RARP was a data link layer protocol.
The DECT data link layer uses LAPC ( Link Access Protocol Control ), a specially designed variant of the ISDN data link protocol called LAPD.
The 802. 11a standard uses the same data link layer protocol and frame format as the original standard, but an OFDM based air interface ( physical layer ).
To transfer data reliably, applications must utilize an appropriate Transport Layer protocol, such as Transmission Control Protocol ( TCP ), which provides a reliable stream.
Some applications use a simpler, connection-less transport protocol, User Datagram Protocol ( UDP ), for tasks which do not require reliable delivery of data or that require real-time service, such as video streaming or voice chat.
Telnet 3270, or TN3270 describes either the process of sending and receiving 3270 data streams using the Telnet protocol or the software that emulates a 3270 class terminal that communicates using that process.
These aspects, including data integrity, are addressed by an upper layer transport protocol, such as the Transmission Control Protocol ( TCP ).
Sample encapsulation of application data from User Datagram Protocol | UDP to a Link protocol frame
For example, an upper layer protocol may cache data to make sure that it is in the correct order, before giving the data to an application.
The Kermit protocol evolved through the 1980s into a de facto data communications standard for transferring files between dissimilar computer systems.
MPEG also standardizes the protocol and syntax under which it is possible to combine or multiplex audio data with video data to produce a digital equivalent of a television program.
In the end, the 68000 did retain a bus protocol compatibility mode for existing 6800 peripheral devices, and a version with an 8-bit data bus was produced.
MPLS operates at a layer that is generally considered to lie between traditional definitions of layer 2 ( data link layer ) and layer 3 ( network layer ), and thus is often referred to as a " layer 2. 5 " protocol.
Additionally, freedb clients can access MusicBrainz data through the freedb protocol by using the MusicBrainz to FreeDB gateway ( mb2freedb ) service.

protocol and is
If the response variable is expected to follow a parametric family of probability distributions, then the statistician may specify ( in the protocol for the experiment or observational study ) that the responses be transformed to stabilize the variance.
is written in the experimental protocol before the experiment is conducted, is examined in grant applications and administrative review boards.
The Apple Filing Protocol ( AFP ), formerly AppleTalk Filing Protocol, is the protocol for communicating with AppleShare file servers.
AEP ( AppleTalk Echo Protocol ) is a transport layer protocol designed to test the reachability of network nodes.
ATM is a core protocol used over the SONET / SDH backbone of the public switched telephone network ( PSTN ) and Integrated Services Digital Network ( ISDN ), but its use is declining in favour of All IP.
AOL Instant Messenger ( AIM ) is an instant messaging and presence computer program which uses the proprietary OSCAR instant messaging protocol and the TOC protocol to allow registered users to communicate in real time.
The term octet is used to unambiguously specify a size of eight bits, and is used extensively in protocol definitions, for example.
Bluetooth is a packet-based protocol with a master-slave structure.
Bluetooth is a standard wire-replacement communications protocol primarily designed for low power consumption, with a short range ( power-class-dependent, but effective ranges vary in practice ; see table below ) based on low-cost transceiver microchips in each device.
The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite ( TCP / IP ) to serve billions of users worldwide.
Computation is a process following a well-defined model understood and expressed as, for example, an algorithm, or a protocol.
Although Diffie – Hellman key agreement itself is an anonymous ( non-authenticated ) key-agreement protocol, it provides the basis for a variety of authenticated protocols, and is used to provide perfect forward secrecy in Transport Layer Security's ephemeral modes ( referred to as EDH or DHE depending on the cipher suite ).
The simplest, and original, implementation of the protocol uses the multiplicative group of integers modulo p, where p is prime and g is primitive root mod p. Here is an example of the protocol, with non-secret values in < span style =" color: blue "> blue </ span >, and secret values in < span style =" color: red "> boldface red </ span >:
In this case typically middleware for distribution is used which typically includes an atomic commit protocol ( ACP ), e. g., the two-phase commit protocol, to allow distributed ( global ) transactions ( vs. local transactions confined to a single DBMS ) across the participating databases.

1.206 seconds.