The Theoretical Analysis of Experimental Research
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6
Abstract
Abstract: Among the various research methods, the experiment is particularly suitable for cause and effect relationships. Through observation one finds many things that occur together, but observation alone cannot determine whether one thing is the cause of another. All the alternative explanations must be ruled out. A classic example is the relationship between cigarette smoking and lung cancer. Doubts about the contribution of cigarette to lung cancer were removed when experiment on animals showed that the substances in cigarette were carcinogenic (cancer causing). Other environmental factors such as air pollution may also affect the relationship. The experiment enables each of these factors to be tested in a systematic way. An artificial situation is created in which events that generally go together may be pulled apart (Sommer & Sommer 1980).
Authors and Affiliations
Dr. Mcchester Odoh
Performance Analysis of Three Hop Reliability Model forWireless Sensor Networks in Nuclear Power Plants
Abstract: Wireless sensor networks(WSN) are a good choice for Nuclear Power Plants because of low costand flexibility. Reliability is a crucial factor for WSN in Nuclear Power Plants since all the data collected aretime...
Enabling Lazy Learning for Uncertain Data Streams
Abstract: Lazy learning concept is performing the k-nearest neighbor algorithm, Is used to classification andsimilarly to clustering of k-nearest neighbor algorithm both are based on Euclidean distance based algori...
An encrypted mechanism for securing cloud data from data mining attacks
Abstract: Cloud Computing is a vast infrastructural and rising pool which provides huge storage of data in one sphere. Organizations nowadays are in the marathon of equipping the whole system in a cloud form. In th...
The Approaches to Amalgamate the Anti-Network Attacks Technologies in Intrusion Detection and Prevention Systems
Abstract: A Network Intrusion Detection Prevention System (IDPS) is a mechanism that continuously monitors the network traffic and finds out the malicious, suspicious and undesired network activities. After ide...
Transforming XML into Object-Relational Schema
Abstract: Recently, there is a vast increase in the use of XML for describing and exchanging data. To manipulate efficiently these data, it would be wise to use database systems which represent an appropriate tool to sto...