tool evaluation
Recently Published Documents


TOTAL DOCUMENTS

103
(FIVE YEARS 20)

H-INDEX

9
(FIVE YEARS 1)

Author(s):  
Thomas M. Schnieders ◽  
Colten W. Fales ◽  
Ahmad Abdelhafiz Mumani ◽  
Erik Danford Klein ◽  
Joseph Yun Ming Kim ◽  
...  

2021 ◽  
Vol 10 (02) ◽  
pp. 136-145
Author(s):  
Nour Mheidly

The COVID-19 pandemic forced lockdowns that severely affected the educational sector. The necessary shift to online learning was hindered in countries that lack communication technologies. In addition, the inadequate media and information literacy among educators and students alike exposed deficiencies in disaster preparedness. This resulted in the use of commonly used applications, such as WhatsApp, as a learning platform. We hereby present the learning experience of a mathematics class of the 10th grade through WhatsApp in a Lebanese public school. After analysis, we assess the initiative using the Rubric for eLearning Tool Evaluation. Although WhatsApp, as a learning tool, was functional, accessible, and technically effective, it hindered the learning experience with the lack of social, teaching, and cognitive presence. We offer our insights and recommendations on improving the learning and communication experience as we continue to navigate the current and any future pandemic.


2021 ◽  
Vol 10 (5) ◽  
pp. 2696-2706
Author(s):  
Isaac Odun-Ayo ◽  
Marion Adebiyi ◽  
Olatunji Okesola ◽  
Olufunke Vincent

Cloud computing currently plays a crucial role in the delivery of vital information technology services. A unique aspect of cloud computing is the cloud middleware and other related entities that support applications and networks. A specific field of research may be considered, particularly as regards cloud middleware and services at all levels, and thus needs analysis and paper surveys to elucidate possible study limitations. The purpose of this paper is to perform a systematic mapping for studies that capture cloud computing middleware, stacks, tools and services. The methodology adopted for this study is a systematic mapping review. The results showed that more papers on the contribution facet were published with tool, model, method and process having 18.10%, 13.79%, 6.03% and 8.62% respectively. In addition, in terms of tool, evaluation and solution research had the largest number of articles with 14.17% and 26.77% respectively. A striking feature of the systemic map is the high number of articles in solution research with respect to all aspects of the features applied in the studies. This study showed clearly that there are gaps in cloud computing middleware and delivery services that would interest researchers and industry professionals desirous of research in this area.


Author(s):  
Zhonglun Wang ◽  
Richard Stone ◽  
Joseph Kim ◽  
Steffen Baumann

The goal of purchasing hand tools is to improve financial outcomes for buyers. These financialgains can come from multiple aspects of hand tools, such as increased productivity, improved product quality, and decreased injury rate. Based on a literature review, current hand tool purchasingdecisions are frequently made by professionals without specialized scientific backgrounds; however, the hand tool selection methods they receive are solely based on ergonomic evaluations. Heuristic evaluation, created by Nielsen & Molich (1990), has been proven effective in discoveringusability issues quickly. Combined with the knowledge from hand tool evaluation literature andNielsen & Molich’s (1990) heuristic evaluation platform, two versions of financially orientatedhand tool heuristic evaluations were created: a buyer version and a seller version. The buyer versionhelps hand tool buyers make financially orientated purchasing decisions; the designer version helpsquickly assess the financial viability of the hand tool design under review.


Author(s):  
Amit R. Patil

Abstract: Automatic Transmissions in vehicles are becoming the norm today and with the need to reduce fuel consumption, electric vehicles are increasing in number too. As the vehicles get smarter, transmissions have also felt the need to adapt so as to cope with the demands of the 21st century. Apart from providing the user with different driving modes, vehicles with an Automatic Transmission and electric vehicles have a device called a Park Lock. Park Lock Mechanisms are devices that are fitted to vehicles with an automatic transmission or electric vehicles which can secure the vehicle mechanically in addition to the parking brakes to prevent an unintended movement of the vehicle when the vehicle is brought to a stop. This system can face various kinds of loads coming from the transmission or from the wheel side. So, it is necessary to design a system which can withstand against it. Today, when a park lock mechanism is designed, it is designed in a way that it not only fits one vehicle variant but many variants (these variants can include either front wheel drive, rear wheel drive, vehicles with varying final gear to park lock gear ratios etc). Therefore, one Park Lock Mechanism needs to satisfy various conditions and requirements. Carrying out calculations with different notations for each variant becomes a cumbersome procedure, therefore it is prudent to have one common platform which can do the calculation in the early phases of design. In this paper, a closed form calculationsbased Excel VBA tool can able to estimate the loads coming on to the Park lock mechanism by doing some background calculation is presented followed by the simulation performed using Multi Body Dynamics software (‘ADAMS’). Results from MBD tool and a 1D tool are corelated to the test data to gain some confidence on the tool which created in Excel VBA. Keywords: Park Lock Mechanism, ADAMS, 1D Tool, Excel VBA, Drop in Speed, Torque Build up.


STED JOURNAL ◽  
2021 ◽  
Vol 3 (1) ◽  
Author(s):  
Jefto Džino ◽  
Branko Latinović ◽  
Živan Đuračković ◽  
Stefan Džino

The development intelligence tools is gaining a new dimension every day, and this is an area of dynamic development. The importance of this paper is to select the tool that represents the best solution for the given needs in public administration. A multi-stage, broad- based survey with clear selection criteria leads to the choice of three tools. Criteria for tool evaluation were set, virtual machines were created, tests and analyzes were performed. The evaluations carried out give the choice of the most accepTable business intelligence tool for use and interoperability in public administration.


2021 ◽  
Author(s):  
Nis Ilyani Mohmad ◽  
Danu Ismadi ◽  
Nor Hajjar Salleh ◽  
Amirul Nur Romle ◽  
Syarifah Puteh Syed Abd Rahim ◽  
...  

Abstract History matching is one of the paramount steps in reservoir model validation to describe, analyze and mimic the overall behavior of reservoir performance. Performing history matching on highly faulted and multi layered reservoirs is always challenging, especially when the wells are completed with multiple zones either with single selective or dual strings. The history matching complexity is also compounded with uncertainties in production allocation, well history and downhole equipment integrity overtime. It is a common practice for deterministic history matching in reservoir numerical simulation to modify the both static and dynamic model parameters within the subsurface uncertainty window. However, for multi layered reservoirs completed with dual strings, another parameter that is most often get overlooked is the completion string’s leaking phenomenon that tremendously impacting the history matching. The objective of this paper is to introduce dual strings leaking diagnostics methodology from various disciplines’ angles. We demonstrate these dual strings leaking phenomenon impact on history matching. This paper covers dual strings leak diagnostic methodology which includes production logging tool evaluation, well’s production performance and recovery factor analysis. Possible factors that gives rise to the string’s leaks including material corrosion from high CO2 and sand production will also be discussed. We will demonstrate on how the leak phenomenon could be mimicked in the reservoir numerical model. Possible risks on future infill well identification if the leaks phenomenon is not incorporated will be also discussed. The dual strings leaks diagnosis and application in numerical simulation is illustrated on a case study of Field "D", a multilayered sandstone reservoir in Malaysia of almost 3 decades of production. This proven leak identification and reservoir model history matching methodology has been replicated for all the fault blocks across the field. It potentially unlocks more than 100 MMSTB of additional oil recovery by drilling more oil producers and water injectors in future drilling campaigns.


2021 ◽  
pp. 109-125
Author(s):  
Tina Katika ◽  
Spyridon Nektarios Bolierakis ◽  
Nikolaos Tousert ◽  
Ioannis Karaseitanidis ◽  
Angelos Amditis

Sign in / Sign up

Export Citation Format

Share Document