Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (11)
- Physical Sciences and Mathematics (11)
- Artificial Intelligence and Robotics (8)
- Numerical Analysis and Scientific Computing (8)
- Operations Research, Systems Engineering and Industrial Engineering (8)
-
- Systems Science (8)
- Electrical and Computer Engineering (3)
- Social and Behavioral Sciences (3)
- Education (2)
- Other Computer Engineering (2)
- Arts and Humanities (1)
- Civil Engineering (1)
- Civil and Environmental Engineering (1)
- Computer and Systems Architecture (1)
- Data Storage Systems (1)
- Digital Communications and Networking (1)
- Environmental Engineering (1)
- Forensic Science and Technology (1)
- Hydraulic Engineering (1)
- Information Security (1)
- Legal Studies (1)
- Other Civil and Environmental Engineering (1)
- Philosophy (1)
- Psychology (1)
- Public Affairs, Public Policy and Public Administration (1)
- Quantitative Psychology (1)
- Institution
- Publication Year
- Publication
-
- Journal of System Simulation (8)
- Departmental Papers (CS) (3)
- Turkish Journal of Electrical Engineering and Computer Sciences (2)
- Archived Theses and Dissertations (1)
- Articles (1)
-
- Conference papers (1)
- Departmental Technical Reports (CS) (1)
- Dissertations (1)
- Electrical & Computer Engineering and Computer Science Faculty Publications (1)
- Emirates Journal for Engineering Research (1)
- International Congress on Environmental Modelling and Software (1)
- LSU Master's Theses (1)
- Master's Theses and Doctoral Dissertations (1)
- Masters Theses (1)
- Other resources (1)
- Robert Oddy (1)
- Steven R Ray (1)
- Theses and Dissertations (1)
- USF Tampa Graduate Theses and Dissertations (1)
- Publication Type
- File Type
Articles 1 - 29 of 29
Full-Text Articles in Computer Engineering
The First Annual Teaching And Research Showcase Poster Tu Dublin – The Proof Is In The Pudding – Using Perceived Stress To Measure Short-Term Impact In Initiatives To Enhance Gender Balance In Computing Education, Alina Berry, Sarah Jane Delany
The First Annual Teaching And Research Showcase Poster Tu Dublin – The Proof Is In The Pudding – Using Perceived Stress To Measure Short-Term Impact In Initiatives To Enhance Gender Balance In Computing Education, Alina Berry, Sarah Jane Delany
Other resources
The problem of gender imbalance in computing higher education has forced academics and professionals to implement a wide range of initiatives. Many initiatives use recruitment or retention numbers as their most obvious evidence of impact. This type of evidence of impact is, however, more resource heavy to obtain, as well as often requires a longitudinal approach. There are many shorter term initiatives that use other ways to measure their success.
First, this poster presents with a review of existing evaluation measures in interventions to recruit and retain women in computing education across the board. Three main groups of evaluation come …
Evaluation Of E-Government Information Systems Agility: A Method And Case Study, Soumia Aggoune, Maohamed Amine Riahla
Evaluation Of E-Government Information Systems Agility: A Method And Case Study, Soumia Aggoune, Maohamed Amine Riahla
Emirates Journal for Engineering Research
Development of e-government evaluation frameworks began around 2000s. Most of the developed approaches are technologically driven in which they focus on the “E” rather than the “Government”. Moreover, they tend to evaluate tangible measures (such as costs, benefits, etc.) and neglects important intangible measures (such as agility, sustainability, etc.). The state of the art tells that the evaluation of agility within e-government has been proved to be important but complex. However, the importance is due to the increasing need for governments to justify investments, assess impacts and monitor progress in the ever-changing environment. On the other side, the complexity comes …
Towards More Task-Generalized And Explainable Ai Through Psychometrics, Alec Braynen
Towards More Task-Generalized And Explainable Ai Through Psychometrics, Alec Braynen
USF Tampa Graduate Theses and Dissertations
In this work, we propose that adopting the methods, principles, and guidelines of the field of psychometrics can help the Artificial Intelligence (AI) community to build more task-generalizable and explainable AI. Three arguments are presented and explored. These arguments are that psychometrics can help by providing 1) a framework for formulating better datasets, 2) psychometric AI data that can lead to models of generalization in AI, and 3) explainable AI through more informative evaluations.
A review of psychometrics and psychological generalization is performed, along with an overview of evaluation, generalization, and explainability in AI. Various ideas are presented throughout for …
Effectiveness Evaluation Method Of Space-Based Information Systems Based On Sem, Chi Han, Wei Xiong, Wenwen Liu, Xiaolan Yu, Ping Jian
Effectiveness Evaluation Method Of Space-Based Information Systems Based On Sem, Chi Han, Wei Xiong, Wenwen Liu, Xiaolan Yu, Ping Jian
Journal of System Simulation
Abstract: Aiming at the nonlinear emergence of effectiveness of the coupling and interaction of space-based information system (SIS), an operational effectiveness evaluation (OEE) model based on structural equation modeling (SEM) is proposed. Through the analysis of capacity requirements and system composition, the internal connections of sub-systems are obtained, and the effectiveness evaluation index system is constructed. By considering the synergistic interaction within SIS, the linear and nonlinear SEMs are constructed respectively to evaluate the effectiveness, and the analytical model of OEE is established on the basis of the corresponding parameter equations. With the background of integrated joint operations under …
Evaluation Of Social Bot Detection Models, Muhammet Buğra Torusdağ, Mücahi̇d Kutlu, Ali̇ Aydin Selçuk
Evaluation Of Social Bot Detection Models, Muhammet Buğra Torusdağ, Mücahi̇d Kutlu, Ali̇ Aydin Selçuk
Turkish Journal of Electrical Engineering and Computer Sciences
Social bots are employed to automatically perform online social network activities; thereby, they can also be utilized in spreading misinformation and malware. Therefore, many researchers have focused on the automatic detection of social bots to reduce their negative impact on society. However, it is challenging to evaluate and compare existing studies due to difficulties and limitations in sharing datasets and models. In this study, we conduct a comparative study and evaluate four different bot detection systems in various settings using 20 different public datasets. We show that high-quality datasets covering various social bots are critical for a reliable evaluation of …
Evaluation Method On Multi-Stage Bayes Information Fusion For Scatters Hwil Simulation, Yecheng Wang, Ma Jing, Congjun Jin, Jie Li, Bin Shi
Evaluation Method On Multi-Stage Bayes Information Fusion For Scatters Hwil Simulation, Yecheng Wang, Ma Jing, Congjun Jin, Jie Li, Bin Shi
Journal of System Simulation
Abstract: In order to simulate the complex 3D target in the RF HWIL (hardware in the loop simulation) system, the equivalence framework of multiple scattering centers of complex 3D target for three stages of outfield test data, mathematics simulation data and HWIL data are introduced. Using the pre-test information as each stage for transmission, evaluation method is designed by multi-stage Bayes information fusion for HWIL simulation. Based on prior information of outfield test data and mathematics simulation data, by using Bayes information fusion theory, the average data reconstruction of each stage is obtained and compared and high reliability …
Simulation Research On Armored Equipment Maintenance Support Resource Optimization, Huiqi Zhang, Chunliang Chen, Junyan Liu, Liu Shuai, Yongqing Zhang
Simulation Research On Armored Equipment Maintenance Support Resource Optimization, Huiqi Zhang, Chunliang Chen, Junyan Liu, Liu Shuai, Yongqing Zhang
Journal of System Simulation
Abstract: Contraposing the problem of armored equipment maintenance resource computation and optimization, the armored equipment maintenance support process was analyzed. The armored equipment maintenance support process concept model and the mathematic model were constructed based on discrete system modeling theory; while the simulation model based on net discrete event was given in apply of Anylogic software. The armored equipment maintenance support task fulfilling degree, the resource utilization degree, and the mean maintenance time were got by simulation computation. As a result that maintenance support resource was evaluated based on index weight, and the optimized values of the maintenance support resource …
Simulation And Improvement Of Automobile Front Cover Assembly Work Based On Delmia, Lizhen Zhang, Shao Qi, Jiaqing Yang, Mengmeng Yang, Song Zheng, Dai Peng
Simulation And Improvement Of Automobile Front Cover Assembly Work Based On Delmia, Lizhen Zhang, Shao Qi, Jiaqing Yang, Mengmeng Yang, Song Zheng, Dai Peng
Journal of System Simulation
Abstract: In order to prevent potential occupational disease in automobile front cover assembly location caused by manual handling, a comprehensive evaluation and improvement method of ergonomics was proposed aiming at front cover assembly work ergonomics based on DELMIA. The ergonomics problems in automobile front cover assembly were evaluated quantitatively and comprehensively by using the methods of rapid upper limb assessment (RULA) and lifting equation analysis (NIOSH), and the process or tools were judged whether they should be improved according to the evaluation results. By simulation, analysis and improvement of front cover assembly work, the improvement plans which aimed at the …
Evaluation And Analysis Of Land Intensive Utilization Based On Parameters Optimization Of Svm, Chen Li, Jiaojiao Li, Shulu Xiao
Evaluation And Analysis Of Land Intensive Utilization Based On Parameters Optimization Of Svm, Chen Li, Jiaojiao Li, Shulu Xiao
Journal of System Simulation
Abstract: Based on relevant literature research of evaluation on intensive land-use both at home and abroad, the theory of Support Vector Machine (SVM) and Ant Colony Algorithm (ACO) was discussed. A new method of Correlation Coefficient, the Ant Colony Algorithm and Support Vector Machine (cACO-SVM) was proposed, which analyzed the relevant indicators to determine index set, using ACO, optimization of SVM parameters to draw a good penalty factor C and kernel function sigma and epsilon insensitive coefficient and training SVM, the method improved the training accuracy. Optimization of the land intensive utilization evaluation based on cACO-SVM was put forward, comparing …
Evaluation Method Of Simulation Results Based On Principal Component Analysis, Rusheng Ju, Zimin Cai, Yang Mei, Wang Song
Evaluation Method Of Simulation Results Based On Principal Component Analysis, Rusheng Ju, Zimin Cai, Yang Mei, Wang Song
Journal of System Simulation
Abstract: A large amount of result data are produced by complex system simulation. These data types are diverse and complex. Usually they cannot be used directly. The inner pattern can only be found by effective evaluation. Based on the characteristics of complex combat simulation results, this paper utilizes the Principal Component Analysis method to reduce the dimension of data analysis and explore the relationship between the system input data and output data. The key influence factors of the measure of force effectiveness is found. The application verification is done by typical examples. The selected principle factors are explored in …
Simulation Evaluation Method Of Mission Sustainability For Operational Unit, Yan Xu, Junhai Cao, Tailiang Song, Gao Long, Zhang Qiang
Simulation Evaluation Method Of Mission Sustainability For Operational Unit, Yan Xu, Junhai Cao, Tailiang Song, Gao Long, Zhang Qiang
Journal of System Simulation
Abstract: To analyze and evaluate support capabilities of operational units and scientifically describe the operational mission sustainability of weapon systems, the typical mission models for individual operational unit and operational units were established according to system engineering ideology. The mission status of operational units was defined, and the parameters including mission sustainability and equipment availability of operational units were proposed. An operational unit mission process simulation model was established with the agent-based method, which provides a simulation method for operational unit mission sustainability evaluation and technical means for the operational unit support capability assessment problem. A case study of …
Research On Maturity Evaluation Technology Of Complex Digital Industrial System, Geng Chao, Shiyou Qu, Tingyu Lin, Guoqiang Shi, Yingying Xiao, Wang Mei, Qiudan Ma, Ji Hang
Research On Maturity Evaluation Technology Of Complex Digital Industrial System, Geng Chao, Shiyou Qu, Tingyu Lin, Guoqiang Shi, Yingying Xiao, Wang Mei, Qiudan Ma, Ji Hang
Journal of System Simulation
Abstract: Under the background of a new round of the innovation of science and technology and the revolution of industry, the complex digital industrial system is constantly innovating and shaping. Firstly, the paper established maturity evaluation model of the complex digital industrial system based on system engineering. Then, the paper proposed multi - index maturity analysis method and multi - enterprise maturity synthesis method of the complex digital industrial system. Combined with the digital industrial system of aerospace complex product, an evaluation example is presented. The results show that the maturity evaluation method can be used to standardize and guide …
Resampling Methods And Visualization Tools For Computer Performance Comparisons In The Presence Of Performance Variation, Samuel Oridge Irving
Resampling Methods And Visualization Tools For Computer Performance Comparisons In The Presence Of Performance Variation, Samuel Oridge Irving
LSU Master's Theses
Performance variability, stemming from non-deterministic hardware and software behaviors or deterministic behaviors such as measurement bias, is a well-known phenomenon of computer systems which increases the difficulty of comparing computer performance metrics and is slated to become even more of a concern as interest in Big Data Analytics increases. Conventional methods use various measures (such as geometric mean) to quantify the performance of different benchmarks to compare computers without considering this variability which may lead to wrong conclusions. In this paper, we propose three resampling methods for performance evaluation and comparison: a randomization test for a general performance comparison between …
The Design, Development, And Evaluation Of A Usable And Privacy-Enhanced Telepresence Interface For Older Adults, Xian Wu
Theses and Dissertations
Maintaining health and wellness while aging-in-place independently is crucial for older adults. Telepresence technology can be potentially beneficial for this target population to stay socially connected. However, this technology is not specifically designed for older adults. For this target population to adopt such technology successfully, it is important to ensure that they do not experience usability barriers. This research uses HCI/HRI concepts and technology design principles for older adults to design, develop and test telepresence user interfaces (UI). This addresses the following research questions: 1): What are the essential usability and privacy-enhanced features needed to inform the design and development …
Behaviour Change And Incentive Modelling For Water Saving: First Results From The Smarth2o Project, J. Novak, M. Melenhorst, I. Micheel, C. Pasini, P. Fraternali, A. E. Rizzoli
Behaviour Change And Incentive Modelling For Water Saving: First Results From The Smarth2o Project, J. Novak, M. Melenhorst, I. Micheel, C. Pasini, P. Fraternali, A. E. Rizzoli
International Congress on Environmental Modelling and Software
Stimulating users to save water is a challenge and an opportunity for water demand management. Existing ICT-based systems for behavioural change often do not consider the underlying behavioural determinants in a systematic way. This paper discusses the design of the behavioural change and incentive model for the SmartH2O system, combining smart meter data with consumption visualisation and gamified incentive mechanisms to stimulate water saving. We show how the design of such a system can be related to a holistic behavioural change model and how this systematic mapping can inform the design of an integrated incentive model combining different incentive types …
A Method And A Case Study For The Selection Of The Best Available Tool For Mobile Device Forensics Using Decision Analysis, Shahzad Saleem, Oliver Popov, Ibrahim Baggili
A Method And A Case Study For The Selection Of The Best Available Tool For Mobile Device Forensics Using Decision Analysis, Shahzad Saleem, Oliver Popov, Ibrahim Baggili
Electrical & Computer Engineering and Computer Science Faculty Publications
The omnipresence of mobile devices (or small scale digital devices - SSDD) and more importantly the utility of their associated applications for our daily activities, which range from financial transactions to learning, and from entertainment to distributed social presence, create an abundance of digital evidence for each individual. Some of the evidence may be a result of illegal activities that need to be identified, understood and eventually prevented in the future. There are numerous tools for acquiring and analyzing digital evidence extracted from mobile devices. The diversity of SSDDs, types of evidence generated and the number of tools used to …
Information And Communication Technology (Ict) Literacy: Refining A Construct For Assessment, Louis Michael Verdusco
Information And Communication Technology (Ict) Literacy: Refining A Construct For Assessment, Louis Michael Verdusco
Master's Theses and Doctoral Dissertations
This research effort conceptualized, developed, implemented, and examined the psychometric properties of an Information & Communication Technology (ICT) literacy assessment instrument designed for students entering college. This process began with the development of a working definition of the ICT literacy based on the literature and the input of a panel of experts regarding the proposed literacy sub-constructs and the individual test items. A pilot test was conducted to identify areas for improvement. Once these improvements were incorporated, the final assessment instrument was administered to the freshmen class at a private Midwestern comprehensive university with religious affiliation.
The psychometric aspects of …
Evaluation Of Two-Dimensional Codes For Digital Information Security In Physical Documents, Shuai Chen
Evaluation Of Two-Dimensional Codes For Digital Information Security In Physical Documents, Shuai Chen
Masters Theses
Nowadays, paper documents are still frequently used and exchanged in our daily life. To safely manage confidential paper information such as medical and financial records has increasingly become a challenge. If a patient's medical diagnosis get stolen or dumped without shredding, his or her private information would be leaked. Some companies and organizations do not pay enough attention to the problem, letting their customers suffer the loss. In the thesis, I designed a hybrid system to solve this problem effectively and economically. This hybrid system integrates physical document properties with digital security technology, which brings in a revolutionary idea for …
A New Approach In The Evaluation Of Hospital Information Systems, Güney Gürsel, Neşe Zayi̇m, Kemal Hakan Gülkesen, Ali̇ Ari̇foğlu, Osman Saka
A New Approach In The Evaluation Of Hospital Information Systems, Güney Gürsel, Neşe Zayi̇m, Kemal Hakan Gülkesen, Ali̇ Ari̇foğlu, Osman Saka
Turkish Journal of Electrical Engineering and Computer Sciences
Hospital information system (HIS) evaluation frameworks have largely been discussed in the literature. However, existing frameworks lack one important aspect: to what extent user expectations of HISs are met. In this study, user expectation data are collected by means of the 'expectation questionnaire'. The internal consistencies of the answers to the questionnaire are measured by Cronbach's alpha coefficient. Fuzzy logic methodologies are used to evaluate the expectation variables in the proposed evaluation framework. The evaluation variables are not represented in the results equally; they are reflected by the weights assigned by the users. Our proposed framework provides the overall degree …
Helmsman, Set A Course : Using A Compass And Rfid Tags For Indoor Localisation And Navigation, Yan Li, Brian Mac Namee, John D. Kelleher
Helmsman, Set A Course : Using A Compass And Rfid Tags For Indoor Localisation And Navigation, Yan Li, Brian Mac Namee, John D. Kelleher
Conference papers
Localisation and navigation are still two of the most important issues in mobile robotics. In certain indoor application scenarios RFID (radio frequency identification)-based absolute localisation has been found to be especially successful in supporting navigation. In this paper we evaluate the feasibility of an RFID and compass based approach to robot localisation and navigation for indoor environments that are dominated by corridors. We describe our system and evaluate its performance in a small, but full-scale, test environment.
Social Networking Sites: Evaluating And Investigating Their Use In Academic Research, Fiona Redmond
Social Networking Sites: Evaluating And Investigating Their Use In Academic Research, Fiona Redmond
Dissertations
Researchers must collect and analyse new data that will enhance the body of knowledge. It is for this reason that data is of major importance to researchers. All aspects of a research project involve data, from navigating existing data, to understanding how data is used in the world and why it is important to learn to collect data and make predictions. Researchers need to consider the types of data that are possible and examine and weight each option so they can determine what sources of data will answer the research questions or hypotheses.
Researchers, who require a large amount of …
Usability Inspection Methods After 15 Years Of Research And Practice, David G. Novick, Tasha Hollingsed
Usability Inspection Methods After 15 Years Of Research And Practice, David G. Novick, Tasha Hollingsed
Departmental Papers (CS)
Usability inspection methods, such as heuristic evaluation, the cognitive walkthrough, formal usability inspections, and the pluralistic usability walkthrough, were introduced fifteen years ago. Since then, these methods, analyses of their comparative effectiveness, and their use have evolved in different ways. In this paper, we track the fortunes of the methods and analyses, looking at which led to use and to further research, and which led to relative methodological dead ends. Heuristic evaluation and the cognitive walkthrough appear to be the most actively used and researched techniques. The pluralistic walkthrough remains a recognized technique, although not the subject of significant further …
Toward A More Accurate View Of When And How People Seek Help With Computer Applications, David G. Novick, Edith Elizalde, Nathaniel Bean
Toward A More Accurate View Of When And How People Seek Help With Computer Applications, David G. Novick, Edith Elizalde, Nathaniel Bean
Departmental Papers (CS)
Based on 40 interviews and 11 on-site workplace observations of people using computer applications at work, we confirm that use of printed and on-line help is very low and find that providing greater detail of categories solution methods can present a more realistic picture of users’ behaviors. Observed study participants encountered a usability problem on average about once every 75 minutes and typically spent about a minute looking for a solution. Participants consumed much more time when they were unaware of a direct way of doing something and instead used less effective methods. Comparison of results from different data-collection methods …
Chapter 7: The Evaluation Of Ontologies, Leo Obrst, Benjamin Ashpole, Werner Ceusters, Inderjeet Mani, Steven Ray, Barry Smith
Chapter 7: The Evaluation Of Ontologies, Leo Obrst, Benjamin Ashpole, Werner Ceusters, Inderjeet Mani, Steven Ray, Barry Smith
Steven R Ray
Recent years have seen rapid progress in the development of ontologies as semantic models intended to capture and represent aspects of the real world. There is, however, great variation in the quality of ontologies. If ontologies are to become progressively better in the future, more rigorously developed, and more appropriately compared, then a systematic discipline of ontology evaluation must be created to ensure quality of content and methodology. Systematic methods for ontology evaluation will take into account representation of individual ontologies, performance and accuracy on tasks for which the ontology is designed and used, degree of alignment with other ontologies …
Some Usability Issues And Research Priorities In Spoken Dialog Applications, Nigel Ward, Anais G. Rivera, Karen Ward, David G. Novick
Some Usability Issues And Research Priorities In Spoken Dialog Applications, Nigel Ward, Anais G. Rivera, Karen Ward, David G. Novick
Departmental Technical Reports (CS)
As a priority-setting exercise, we examined interactions between users and a simple spoken dialog system in comparison to interactions with a human operator. Based on analysis of the observed usability differences and their root causes we propose seven priority issues for spoken dialog systems research.
Cross-Language Retrieval For Arabic Texts: The Creation Of An English-Arabic Cross-Language Information Retrieval Environment, Robert N. Oddy, Anne R. Diekema, Jean Hannouche, Grant Ingersoll, Elizabeth D. Liddy
Cross-Language Retrieval For Arabic Texts: The Creation Of An English-Arabic Cross-Language Information Retrieval Environment, Robert N. Oddy, Anne R. Diekema, Jean Hannouche, Grant Ingersoll, Elizabeth D. Liddy
Robert Oddy
An English-Arabic Cross-Language Information Retrieval Environment was created in which the user can query an Arabic database in English and retrieve a set of relevant Arabic documents. The retrieved Arabic documents will be automatically translated into English to facilitate readability by the English language user. Proper names of people, places, and organizations are extracted from the retrieved documents and transliterated from Arabic into English. They are presented to the user and serve to provide a brief summarization of the retrieved document. Another feature of the AIR design is the user’s ability to group searches and search results into what we …
Performance Evaluation Of Auc Backbone Network Using Simulation And Monitoring Tools, Nabawia Khalil Abdel-Karim
Performance Evaluation Of Auc Backbone Network Using Simulation And Monitoring Tools, Nabawia Khalil Abdel-Karim
Archived Theses and Dissertations
Networks in the past were defined by the traffic they carried. The network management systems that can track performance statistics, alarms and diagnostics are usually called operations support systems. As number of applications carried over a network grew, networks cannot scale economically. They become large, complex and expensive. Network performance became an important issue to network designers, operators and implementers to design, implement and maintain scalable, reliable and resilient networks. In this research, we developed a comparative analysis for two tools commonly utilized to aid network operations support to arrive at decisions related to network scalability, performance evaluation and renewal. …
Accounting For Domain Context In Evaluation, Meriem Chater, David G. Novick
Accounting For Domain Context In Evaluation, Meriem Chater, David G. Novick
Departmental Papers (CS)
Work is situated activity. Taking into account human factors in evaluation involves considering not only users but also their contexts of use. Consequently, the evaluation of systems — from video-games to safetycritical interfaces — requires analysis of context to understand not only the effect of context on usability but also the impact of artifacts' usability on users' environments. In the case of safety-critical systems (SCS), errors (by users or designers) may threaten human lives.
To assess the degree to which interface evaluation methods currently account for context, we have used the research strategy taxonomy of McGrath as a framework for …
Strategies For Evaluating Software Usability, Ronan Fitzpatrick
Strategies For Evaluating Software Usability, Ronan Fitzpatrick
Articles
This paper presents a usage analysis and taxonomy of methods which are used to evaluate the usability of computer systems. To accommodate the analysis and taxonomy, a matrix of strategies which can be used for effective usability evaluation is presented. Such an analysis, taxonomy and strategies support human-computer interaction (HCI) professionals who have the responsibility for ensuring computer system usability. The strategies outlined are named Virtual Engineering, Soft Modelling, Hard Review and Real World. This paper also uses a composite set of existing popular generic evaluation methods which can be used as part of these strategies. The methods used are …