What differentiates technical people?

Author(s):  
Joanie B. Connell
Keyword(s):  
2008 ◽  
pp. 678-698
Author(s):  
Jacopo Armani ◽  
Luca Botturi

This chapter presents MAID, a complete design method for adaptive courseware tailored for non-technical people. Adaptive hypermedia systems represent a great potential for e-learning. Nevertheless, instructors and designers find it difficult to develop adaptive applications in real educational environments, mainly because no structured design method is available. The main principle upon which the method relies is that the basis for the exploitation of adaptive features in education is the definition and implementation of an instructional strategy. The MAID approach provides guidelines and tools that foster and enhance the communication between the technical staff in charge of managing the hypermedia system and the instructor by adopting her/his instructional strategy as the pivotal point for the communication.


Author(s):  
Jacopo Armani ◽  
Luca Botturi

This chapter presents MAID, a complete design method for adaptive courseware tailored for non-technical people. Adaptive hypermedia systems represent a great potential for e-learning. Nevertheless, instructors and designers find it difficult to develop adaptive applications in real educational environments, mainly because no structured design method is available. The main principle upon which the method relies is that the basis for the exploitation of adaptive features in education is the definition and implementation of an instructional strategy. The MAID approach provides guidelines and tools that foster and enhance the communication between the technical staff in charge of managing the hypermedia system and the instructor by adopting her/his instructional strategy as the pivotal point for the communication.


2019 ◽  
Vol 49 (2) ◽  
pp. 229-240 ◽  
Author(s):  
Mehdi Dadkhah ◽  
Mohammad Lagzian ◽  
Gabriele Santoro

Purpose Internet of Things (IoT) as the new technological paradigm has found many applications in different domains. Nowadays, more than 30,000 records related to IoT research can be accessed in Scopus (Scopus.com). Health care is the one of domains which benefits from IoT. However, observations indicate that most active researchers in this area are technical people not health professionals. The purpose of this paper is to understand how health professionals can contribute to the IoT body of knowledge. Design/methodology/approach IoT professionals are asked to provide their views regarding research concerns, and the collected data are analyzed by phenomenography research methodology. Findings Findings indicate that health professionals can contribute through providing information, requirement or standards for developing IoT systems or devices. They can also introduce new applications or domains for which IoT is fit. Originality/value This paper tries to fill the gap concerning the lack of attention to undertaking IoT-related research from health professionals’ side and highlights ways that health professionals can contribute IoT body of knowledge.


1967 ◽  
Vol 71 (683) ◽  
pp. 762-765
Author(s):  
S. M. Harris

I am More than a little nervous standing here, because I am the non-expert in a room full of experts, or if you will, a single sheep among a number of wolves.I have been asked to represent the fare-paying passenger's point of view to a symposium of technical people, and as such I want to make it clear at the outset that what I am going to say is opinion, not entirely uninformed but certainly not expert. If out of what follows I am wrong from time to time, then I hope you will understand that it is not a deliberate attempt to make noise for noise sake, but is really representing the thoughts of the fare-paying passenger.


1961 ◽  
Vol 16 (04) ◽  
pp. 287-308
Author(s):  
J. R. Bradley

The most difficult problem which faces the young actuary is undoubtedly that of explaining to his non-actuarial friends and relatives exactly how he earns his living. This problem is one small part of the more general problem of communication between the actuarial profession and the outside world. A further specific aspect of the problem arises, for example, when a valuation has been completed and its results have to be expressed in the form of a report to be read by a group of non-technical people.The purpose of this paper is to discuss some of the principles which should be followed when writing such a report. There is more than one such possible set of principles and other actuaries may have rather different views on the preparation and presentation of reports. The basic approach which gives rise to the principles is, however, fundamental to report writing and this is the need for communication between the actuary and his client.


2013 ◽  
Vol 431 ◽  
pp. 253-257
Author(s):  
Qing Zhong He ◽  
Pu Quan Wang ◽  
Peng Duan ◽  
Shuai Guo ◽  
Ming Zhang ◽  
...  

This paper tries using Inventor software to create the three-dimensional model of the the palletizing robots operation rear arm, and then importing this model to ABAQUS to proceed finite element analysis of statics. We verified these two softwares interface issues, the correctness of the calculation method and the steps by analyzing. From analyzing we found the security issues in the operation rear arm. Then we checked and optimized the model for the issues. From the result, the optimized model meets the strength design requirements. The study has reference value for engineering and technical people.


Author(s):  
Ratheesh Kumar R ◽  
Jabin Mathew

Almost all technical people know about images and image encryption, but some of them are not aware of the security and performance of the encryption systems. All image encryption systems are capable of encrypting the images, but some are not so secure. However, the question is how to evaluate the encryption systems. This paper gives you what are the analyses that are possible for evaluating the security and performance of the encryption systems. We hope this paper gives you an insight into Images, Image encryption, Security attacks, Noise and information loss, Evaluation Criteria, Analysis, Resistance, Key, Speed, Complexity, and other parameters.


2014 ◽  
Vol 16 (4) ◽  
pp. 56-61
Author(s):  
Mohammed A. Othman ◽  
◽  
Sherif A. Mazen ◽  
Ehab Ezzat

Sign in / Sign up

Export Citation Format

Share Document