Statistical rethinking: a Bayesian course with examples in R and Stan
In: Chapman & Hall/CRC texts in statistical science series
905462 Ergebnisse
Sortierung:
In: Chapman & Hall/CRC texts in statistical science series
World Affairs Online
In: Canadian journal of political and social theory: Revue canadienne de théorie politique et sociale, Band 8, Heft 3, S. 70
ISSN: 0380-9420
In: Canadian journal of political and social theory: Revue canadienne de théorie politique et sociale, Band 8, S. 70-85
ISSN: 0380-9420
Following a first wave of interventions that employed the style hackers have used since the 1960s —intervening in networks by mirroring their technology— a second wave is now engaged in questioning the needs and use of networks, claiming to re-think them through a perspective of withdrawal. One option for other kinds of networks may be "ad hoc networking," altering the structures, politics, and economics of commercial platforms as well as the pure functionality of algorithms. Instead of doing unpaid work, which we all do as users of the Internet, thoughtless about our data-behavior, a space of imagination and invention should be opened to enable creative possibilities.
BASE
A railway route contains a number of bridge structures along its path. Consequently during operation, these bridges go through different type of load and stresses; as a result the bridges get damaged. The severity of the damage is mainly dependent on the volume of traffic, tonnage of the rolling stock, service year of the bridge, maneuver of users, etc. But in order to determine whether a bridge needs to be maintained or reconstructed, there must be an investigation, either thorough or timely scheduled investigation. Asset management is a strategic and systematic process through which an organization procures, operates, maintains, rehabilitates, and replaces assets to manage their performance, risks, and costs over their lifecycle to provide safe, cost-effective, and reliable service to current and future customers. For an organization to have a proficient bridge asset management, incorporating BMS in the system is very important. BMS is a formal procedure for collecting, processing, and updating data, predicting deterioration, identifying alternative actions and predicting their costs, and identifying optimal preservation policies. For an effective bridge management, computer aided management system is a very valuable choice that would serve the need of the authorized legal entity management personnel those responsible for monitoring of Railway Bridges, and managing bridge maintenance, rehabilitation, and reconstruction. This research study is focused to develop and introduce a computer program that could assist specially bridge asset management decision making. Transportation accesses are critical to the well being of the nation. And one of the biggest factors to influence transportation is railway transport service. It supports everyday social, political and economic activities by linking communities and connecting people with services. Hence, keeping the railway infrastructures in good condition is keeping the railway transport service efficiently. The computer program graphical interface is designed using Visual Basic Programming tool which is user friendly and easy to slot in all necessary information in to the computer. The data encoded in to the software are stored for fast and reliable accessibility using SQL (Server Query Language) Server, which allows all authorized computers on the network to access the information on their desk. The computer program does bridge registration and inventory, inspection data processing, priority ranking, maintenance cost estimation and maintenance plan generation.
BASE
A railway route contains a number of bridge structures along its path. Consequently during operation, these bridges go through different type of load and stresses; as a result the bridges get damaged. The severity of the damage is mainly dependent on the volume of traffic, tonnage of the rolling stock, service year of the bridge, maneuver of users, etc. But in order to determine whether a bridge needs to be maintained or reconstructed, there must be an investigation, either thorough or timely scheduled investigation. Asset management is a strategic and systematic process through which an organization procures, operates, maintains, rehabilitates, and replaces assets to manage their performance, risks, and costs over their lifecycle to provide safe, cost-effective, and reliable service to current and future customers. For an organization to have a proficient bridge asset management, incorporating BMS in the system is very important. BMS is a formal procedure for collecting, processing, and updating data, predicting deterioration, identifying alternative actions and predicting their costs, and identifying optimal preservation policies. For an effective bridge management, computer aided management system is a very valuable choice that would serve the need of the authorized legal entity management personnel those responsible for monitoring of Railway Bridges, and managing bridge maintenance, rehabilitation, and reconstruction. This research study is focused to develop and introduce a computer program that could assist specially bridge asset management decision making. Transportation accesses are critical to the well being of the nation. And one of the biggest factors to influence transportation is railway transport service. It supports everyday social, political and economic activities by linking communities and connecting people with services. Hence, keeping the railway infrastructures in good condition is keeping the railway transport service efficiently. The computer program graphical interface is designed using Visual Basic Programming tool which is user friendly and easy to slot in all necessary information in to the computer. The data encoded in to the software are stored for fast and reliable accessibility using SQL (Server Query Language) Server, which allows all authorized computers on the network to access the information on their desk. The computer program does bridge registration and inventory, inspection data processing, priority ranking, maintenance cost estimation and maintenance plan generation.
BASE
In: Human factors: the journal of the Human Factors Society, Band 16, Heft 3, S. 258-277
ISSN: 1547-8181
This experiment represents a new approach to the study of the psychology of programming, and demonstrates the feasibility of studying an isolated part of the programming process in the laboratory. Thirty experienced FORTRAN programmers debugged 12 one-page FORTRAN listings, each of which was syntactically correct but contained one non-syntactic error (bug). Three classes of bugs (Array bugs, Iteration bugs, and bugs in Assignment Statements) in each of four different programs were debugged. The programmers were divided into five groups, based upon the information, or debugging "aids", given them. Key results were that debug times were short (median = 6 min.). The aids groups did not debug faster than the control group; programmers adopted their debugging strategies based upon the information available to them. The results suggest that programmers often identify the intended state of a program before they find the bug. Assignment bugs were more difficult to find than Array and Iteration bugs, probably because the latter could be detected from a high-level understanding of the programming language itself. Debugging was at least twice as efficient the second time programmers debugged a program (though with a different bug in it). A simple hierarchical description of debugging was suggested, and some possible "principles" of debugging were identified.
In: Methods for social inquiry
"This book offers a hands-on introduction and teaching resource for students, users, and teachers of Qualitative Comparative Analysis (QCA; Ragin, 1987, 2000, 2008b). Given its superior ability to model certain aspects of complexity, QCA has made inroads into virtually every social science discipline and beyond. Software solutions for QCA have also been developing at a fast pace. This book seeks to reduce the time and effort required when we first encounter the logic of not just a new method but also new software. It offers a genuinely simple, intuitive, and hands-on resource for implementing the state-of-the-art protocol of QCA using R, the most advanced software environment for QCA. Our book has an applied and practical focus"--
World Affairs Online
In: Journal of visual impairment & blindness: JVIB, Band 83, Heft 1, S. 73-74
ISSN: 1559-1476
The author presents the rationale and procedures for an innovative protocol for producing braille in English and indigenous languages for the blind and visually impaired population of Commonwealth Africa. Issues addressed include: essential technological changes; modes of transport and communication; and manpower and training demands.
Software applications have taken over our lives. We use and are used by software many times a day. Nevertheless, we know very little about the invisibly ubiquitous workers who write software. Who are they and how do they perceive their own practice? How does that shape the ways in which they collaborate to build the myriad of apps that we use every day?
Coderspeak provides a critical approach to the digital transformation of our world through an engaging and thoughtful analysis of the people who write software. It is a focused and in-depth look at one programming language and its community – Ruby - based on ethnographic research at a London company and conversations with members of the wider Ruby community in Europe, the Americas and Japan. This book shows that the place people write code, the language they write it in and the stories shared by that community are crucial in questioning and unpacking what it means to be a 'coder'. Understanding this social group is essential if we are to grasp a future (and a present) in which computer programming increasingly dominates our lives.
Praise for Coderspeak
'Heurich perfectly captures the generous camaraderie, quirky spirit and intellectual curiosity at the heart of the Ruby world. Packed with tidbits of Ruby history, code snippets, and fascinating conversations, this book has something to teach every Rubyist.'
Jemma Issroff, Ruby Core Team
Handbook of Graphs and Networks in People Analytics: With Examples in R and Python covers the theory and practical implementation of graph methods in R and Python for the analysis of people and organizational networks. Starting with an overview of the origins of graph theory and its current applications in the social sciences, the book proceeds to give in-depth technical instruction on how to construct and store graphs from data, how to visualize those graphs compellingly and how to convert common data structures into graph-friendly form. The book explores critical elements of network analysis in detail, including the measurement of distance and centrality, the detection of communities and cliques, and the analysis of assortativity and similarity. An extension chapter offers an introduction to graph database technologies. Real data sets from various research contexts are used for both instruction and for end of chapter practice exercises and a final chapter contains data sets and exercises ideal for larger personal or group projects of varying difficulty level. Key features: Immediately implementable code, with extensive and varied illustrations of graph variants and layouts. Examples and exercises across a variety of real-life contexts including business, politics, education, social media and crime investigation. Dedicated chapter on graph visualization methods. Practical walkthroughs of common methodological uses: finding influential actors in groups, discovering hidden community structures, facilitating diverse interaction in organizations, detecting political alignment, determining what influences connection and attachment. Various downloadable data sets for use both in class and individual learning projects. Final chapter dedicated to individual or group project examples.
In: Philosophy & technology, Band 33, Heft 2, S. 309-321
ISSN: 2210-5441
In: Revue économique, Band 17, Heft 4, S. 692
ISSN: 1950-6694
In: Behavioral science, Band 15, Heft 4, S. 380-385