Usage of computers on the ground floor in UOW library
VerifiedAdded on 2021/06/17
|16
|3800
|435
AI Summary
Usage of computers on the ground floor in UOW library Abstract The main purpose of this study was to assess the usage of computers on the ground floor library in the UOW, which then resulted to the research study question “what is the computer usage in the ground floor library in UOW?” This was done by collecting data from the library through observation where the researcher visited the library and literally counted the number of computers in the library that were in use by the students and record their numbers. The
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Usage of computers on the ground floor in
UOW library
i
UOW library
i
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Abstract
The main purpose of this study was to assess the usage of computers on the ground floor library
in the UOW, which then resulted to the research study question “what is the computer usage in
the ground floor library in UOW?” This was done by collecting data from the library through
observation where the researcher visited the library and literally counted the number of
computers in the library that were in use by the students and record their numbers. The library
was visited 20 times resulting to a sample size of 20. From the resulting quantitative data,
quantitative analysis was then conducted where RStudio was the statistical software used in the
data analysis process. The hypothesis that the number computers in use were at least greater than
half the number of computers in the ground floor library was tested using the one sample t-test.
From the test, the results confirmed that the number of computers that were in use in the ground
floor library were less than half the total number of total computers available in the library. As a
result, it was concluded and recommended that it was not necessary to add some more computers
in the ground floor library.
ii
The main purpose of this study was to assess the usage of computers on the ground floor library
in the UOW, which then resulted to the research study question “what is the computer usage in
the ground floor library in UOW?” This was done by collecting data from the library through
observation where the researcher visited the library and literally counted the number of
computers in the library that were in use by the students and record their numbers. The library
was visited 20 times resulting to a sample size of 20. From the resulting quantitative data,
quantitative analysis was then conducted where RStudio was the statistical software used in the
data analysis process. The hypothesis that the number computers in use were at least greater than
half the number of computers in the ground floor library was tested using the one sample t-test.
From the test, the results confirmed that the number of computers that were in use in the ground
floor library were less than half the total number of total computers available in the library. As a
result, it was concluded and recommended that it was not necessary to add some more computers
in the ground floor library.
ii
Contents
Abstract......................................................................................................................................................ii
Introduction...............................................................................................................................................1
Background................................................................................................................................................1
Research problem......................................................................................................................................3
Research objective.....................................................................................................................................3
Specific objective...................................................................................................................................3
Research question..................................................................................................................................3
Specific research question.....................................................................................................................4
Hypothesis..............................................................................................................................................4
Significance of the problem.......................................................................................................................4
Literature review.......................................................................................................................................5
Methodologies............................................................................................................................................7
Results, discussion and conclusion...........................................................................................................7
Quantitative analysis.............................................................................................................................7
Data collection........................................................................................................................................7
Statistical analysis..................................................................................................................................9
Hypothesis..........................................................................................................................................9
Summary statistics...............................................................................................................................10
R Script................................................................................................................................................10
Discussion.............................................................................................................................................11
Conclusion................................................................................................................................................11
Recommendation.....................................................................................................................................11
References................................................................................................................................................12
List of figures
Table 1: Sample data………………………………………………………………………………..…….8
Table 2: Cross-tabulation output for time and computers……………………………………………..9
iii
Abstract......................................................................................................................................................ii
Introduction...............................................................................................................................................1
Background................................................................................................................................................1
Research problem......................................................................................................................................3
Research objective.....................................................................................................................................3
Specific objective...................................................................................................................................3
Research question..................................................................................................................................3
Specific research question.....................................................................................................................4
Hypothesis..............................................................................................................................................4
Significance of the problem.......................................................................................................................4
Literature review.......................................................................................................................................5
Methodologies............................................................................................................................................7
Results, discussion and conclusion...........................................................................................................7
Quantitative analysis.............................................................................................................................7
Data collection........................................................................................................................................7
Statistical analysis..................................................................................................................................9
Hypothesis..........................................................................................................................................9
Summary statistics...............................................................................................................................10
R Script................................................................................................................................................10
Discussion.............................................................................................................................................11
Conclusion................................................................................................................................................11
Recommendation.....................................................................................................................................11
References................................................................................................................................................12
List of figures
Table 1: Sample data………………………………………………………………………………..…….8
Table 2: Cross-tabulation output for time and computers……………………………………………..9
iii
Introduction
Background
Libraries are the most fundamental facilities in all learning institutions of all levels. All the
reference materials that enhance the learning process are stored in the libraries (Bomhold, 2015).
In the earlier days, books used to be arranged on the shelves in the libraries according to the
departments and subjects (Siguenza-Guzman, Saquicela, Avila-Ordóñez, Vandewalle and
Cattrysse, 2015). Development of information technologies have transformed the whole process
of how materials in the libraries are stored (Moran and Morner, 2017). Through the help of
computers, materials in the library found new ways of storage and also making the information
long lasting and safe (Char, Geddes, Gonnet, Leong, Monagan and Watt, 2013). Libraries have
transformed from ordinary to ultramodern libraries which are well equipped with the computers
for use in search of the reading materials. Books in the libraries are then stored electronically in
the soft copies which can be accessible to the students and researchers when researching for any
given topic thus offering references (Goodfellow et al., 2013; Kuzlu, Pipattanasomporn, and
Rahman, 2014). Simple computer skills are required for efficient operation and easy access to the
materials. Broadband access networks of different types are installed in the libraries to make the
retrieval of the materials stored in the institutions’ website easy (Han, Gopalakrishnan, Ji, and
Lee, 2015). Libraries depending in their environmental set up, there are computer use polices
that govern the use of computers in the libraries (Aabø, and Audunson, 2012). The policies are
aimed at ensuring for the proper use of computers while in the libraries and that internet is not
used for other purposes but specifically for research and learning purposes. Dire consequences
are put in place to deal with the cases of misuse of the library internet as outlined in the
regulatory rules (Morel, Palier and Palme, 2012). Such policies had been employed in Dormant
1
Background
Libraries are the most fundamental facilities in all learning institutions of all levels. All the
reference materials that enhance the learning process are stored in the libraries (Bomhold, 2015).
In the earlier days, books used to be arranged on the shelves in the libraries according to the
departments and subjects (Siguenza-Guzman, Saquicela, Avila-Ordóñez, Vandewalle and
Cattrysse, 2015). Development of information technologies have transformed the whole process
of how materials in the libraries are stored (Moran and Morner, 2017). Through the help of
computers, materials in the library found new ways of storage and also making the information
long lasting and safe (Char, Geddes, Gonnet, Leong, Monagan and Watt, 2013). Libraries have
transformed from ordinary to ultramodern libraries which are well equipped with the computers
for use in search of the reading materials. Books in the libraries are then stored electronically in
the soft copies which can be accessible to the students and researchers when researching for any
given topic thus offering references (Goodfellow et al., 2013; Kuzlu, Pipattanasomporn, and
Rahman, 2014). Simple computer skills are required for efficient operation and easy access to the
materials. Broadband access networks of different types are installed in the libraries to make the
retrieval of the materials stored in the institutions’ website easy (Han, Gopalakrishnan, Ji, and
Lee, 2015). Libraries depending in their environmental set up, there are computer use polices
that govern the use of computers in the libraries (Aabø, and Audunson, 2012). The policies are
aimed at ensuring for the proper use of computers while in the libraries and that internet is not
used for other purposes but specifically for research and learning purposes. Dire consequences
are put in place to deal with the cases of misuse of the library internet as outlined in the
regulatory rules (Morel, Palier and Palme, 2012). Such policies had been employed in Dormant
1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Public Library in their struggle to come up with collection development, services and the
resources that meet educational, cultural and informational of the diverse community. Violation
of the library policies were resulting to suspension or denial of access to library resources.
In order to have access to the library electronic resources, computers, internet and Wi-Fi could
be installed for use in the libraries making the access of these resources free when within the
library premises. In order to have access, security details might be required in the log in details
using the particulars provided during registration (Ullah, Mohaisen and Alnuem, 2013; Ruj and
Nayak, 2013.). The login details are password protected to avoid unnecessary access of the
institutions’ resources (i.e. details are username and password). In this case, priority is given to
the students who are carrying out research activities. The resources available to be accessed
using the computers on the internet from the libraries are in most cases copyright protected and
read only (Krstev and Trtovac, 2014). That means that they cannot be written on or be edited by
the researchers since they are only available for knowledge boosting and reference purposes.
Libraries operate at different hours of the days of the week while others serve 24 hour of the day
in seven days of the week.
For instance, the UOW library operates for 24 hours in every day of the week and is accessible
from academic block and main foyer and the access of the library materials in the university is
by security cards at any time students or researchers need to have access to the materials in the
library. The library is filled with 16 computers with one MFD (printer, copier scanner). And the
room is supplied with the wireless as well as SNS. In regards to the use and importance of
computers in the libraries in the institutions, this proposal is then aimed at assessing the usage of
computers on the ground floor library in the UOW. Various activities in the process are then in
regards to supporting the subject under investigation as so stated.
2
resources that meet educational, cultural and informational of the diverse community. Violation
of the library policies were resulting to suspension or denial of access to library resources.
In order to have access to the library electronic resources, computers, internet and Wi-Fi could
be installed for use in the libraries making the access of these resources free when within the
library premises. In order to have access, security details might be required in the log in details
using the particulars provided during registration (Ullah, Mohaisen and Alnuem, 2013; Ruj and
Nayak, 2013.). The login details are password protected to avoid unnecessary access of the
institutions’ resources (i.e. details are username and password). In this case, priority is given to
the students who are carrying out research activities. The resources available to be accessed
using the computers on the internet from the libraries are in most cases copyright protected and
read only (Krstev and Trtovac, 2014). That means that they cannot be written on or be edited by
the researchers since they are only available for knowledge boosting and reference purposes.
Libraries operate at different hours of the days of the week while others serve 24 hour of the day
in seven days of the week.
For instance, the UOW library operates for 24 hours in every day of the week and is accessible
from academic block and main foyer and the access of the library materials in the university is
by security cards at any time students or researchers need to have access to the materials in the
library. The library is filled with 16 computers with one MFD (printer, copier scanner). And the
room is supplied with the wireless as well as SNS. In regards to the use and importance of
computers in the libraries in the institutions, this proposal is then aimed at assessing the usage of
computers on the ground floor library in the UOW. Various activities in the process are then in
regards to supporting the subject under investigation as so stated.
2
Research problem
The benefits of computers as a result of development of technology have made it easier for
storage of materials thus e-library accessible through the internet using computers. Engagement
of computers in the library activities such as storage of research materials was expected to have
additional value in the functionalities of the library in their service provision to the students and
researchers. Wireless access internet and the Wi-Fi are made available but particularly for
research purposes not browsing and surfing on the social media. Not all the people that access
the library use the computers but they used hard copy books from shelves. As a result therefore,
computers in the library were at sometimes scrambled for when the students outnumbered the
number of computers installed in the library. Also, some time students don’t occupy all the
computers though in the library and in that case some computers run while other remain shut.
That therefore sparked the determination of the computer usage in the UOW library particularly
the ground floor library.
Research objective
This was the main goal that need to be met by the end of the research findings. This study
proposed to investigate the computer usage in the UOW library.
Specific objective
1. To determine if the mean number of computers used in the ground floor library at
different time intervals are at least half the total number of computers in the library.
Research question
This study was guided by research question that states, “What is the computer usage in the
ground floor library in the UOW?”
3
The benefits of computers as a result of development of technology have made it easier for
storage of materials thus e-library accessible through the internet using computers. Engagement
of computers in the library activities such as storage of research materials was expected to have
additional value in the functionalities of the library in their service provision to the students and
researchers. Wireless access internet and the Wi-Fi are made available but particularly for
research purposes not browsing and surfing on the social media. Not all the people that access
the library use the computers but they used hard copy books from shelves. As a result therefore,
computers in the library were at sometimes scrambled for when the students outnumbered the
number of computers installed in the library. Also, some time students don’t occupy all the
computers though in the library and in that case some computers run while other remain shut.
That therefore sparked the determination of the computer usage in the UOW library particularly
the ground floor library.
Research objective
This was the main goal that need to be met by the end of the research findings. This study
proposed to investigate the computer usage in the UOW library.
Specific objective
1. To determine if the mean number of computers used in the ground floor library at
different time intervals are at least half the total number of computers in the library.
Research question
This study was guided by research question that states, “What is the computer usage in the
ground floor library in the UOW?”
3
Specific research question
1. Is the mean number of computers used in the ground floor library at different times at
least half the total number of computers in the library?
Hypothesis
H0: μ ≥ 8
H1: μ<8
Significance of the problem
The purpose of this report was to bring to light the usage of computers in the library. Meeting
this primary goal would help the UOW institution if adopted on whether they should add the
number of computers in the ground floor library. On the same, it would as well help them to
know if the number of computers were too many for the students who used them in the ground
floor library. Adopting the results of this study might save costs in the procurement process for
the institution on the facilities to be added in the UOW learning institution.
4
1. Is the mean number of computers used in the ground floor library at different times at
least half the total number of computers in the library?
Hypothesis
H0: μ ≥ 8
H1: μ<8
Significance of the problem
The purpose of this report was to bring to light the usage of computers in the library. Meeting
this primary goal would help the UOW institution if adopted on whether they should add the
number of computers in the ground floor library. On the same, it would as well help them to
know if the number of computers were too many for the students who used them in the ground
floor library. Adopting the results of this study might save costs in the procurement process for
the institution on the facilities to be added in the UOW learning institution.
4
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Literature review
Through technology development, computers have become more important and vital in all
working environments making activities faster and time saving (Brynjolfsson and McAfee,
2014). Libraries are places where materials are kept mainly for the purpose of reference.
Previous literatures show that libraries uphold the work and store academic materials for
understanding betterment of the students and future researchers (Jeschek, Gerngross and Panke,
2016). Among various facilities contained in the library, computers play important role in
storage and safety of academic materials in the library (Rao, 2013). Before the emergence and
gain popularity, traditional methods that were used in the storage of books were particularly
shelves and cabinets. The books then were arranged in the libraries according to the subjects and
departments following certain order letters (Brandes and Brook, 2013). In the current world,
research and academic sources have been made accessible to the students almost everywhere
anytime through the incorporation of the mobile broadband networks that makes it easy for
people through search engines to have access of library materials (Ahamed and Lawrence, 2012).
The earlier researches show that since the incorporation of computers in learning, it have made
the learning process virtual i.e. with no physical contact between tutors and learners
(Kottomtharayil et al., 2015). The road is never to an end and the computers had also been
adopted for use in the libraries where they are used for making the research process easy.
Computers are connected to the internet where all the materials are uploaded on the library
website that can be accessed by the researchers once they load the library web page (Johnson,
Becker, Estrada and Freeman, 2015). It is as well stated that access to the libraries through the
website is only accessible through the provision of login details such as username and the
password (Dewe, 2016). In response to that, it was further stated that the login details are the
5
Through technology development, computers have become more important and vital in all
working environments making activities faster and time saving (Brynjolfsson and McAfee,
2014). Libraries are places where materials are kept mainly for the purpose of reference.
Previous literatures show that libraries uphold the work and store academic materials for
understanding betterment of the students and future researchers (Jeschek, Gerngross and Panke,
2016). Among various facilities contained in the library, computers play important role in
storage and safety of academic materials in the library (Rao, 2013). Before the emergence and
gain popularity, traditional methods that were used in the storage of books were particularly
shelves and cabinets. The books then were arranged in the libraries according to the subjects and
departments following certain order letters (Brandes and Brook, 2013). In the current world,
research and academic sources have been made accessible to the students almost everywhere
anytime through the incorporation of the mobile broadband networks that makes it easy for
people through search engines to have access of library materials (Ahamed and Lawrence, 2012).
The earlier researches show that since the incorporation of computers in learning, it have made
the learning process virtual i.e. with no physical contact between tutors and learners
(Kottomtharayil et al., 2015). The road is never to an end and the computers had also been
adopted for use in the libraries where they are used for making the research process easy.
Computers are connected to the internet where all the materials are uploaded on the library
website that can be accessed by the researchers once they load the library web page (Johnson,
Becker, Estrada and Freeman, 2015). It is as well stated that access to the libraries through the
website is only accessible through the provision of login details such as username and the
password (Dewe, 2016). In response to that, it was further stated that the login details are the
5
requirements through which access to the library resources is validated and prohibit unauthorized
use of resources (Dewe, 2016).
6
use of resources (Dewe, 2016).
6
Methodologies
These are the techniques employed by the researchers in the data collection procedure
(Håkansson, 2013). In this research, the researcher used observational research technique. This
was the special type of survey where the researcher presented himself or herself to the
phenomenon area and took the number of elements of interest under study (computers) that were
in use by the students at different time intervals i.e. morning hours and in the afternoon or
evening hours. Quantitative data was resulted to by the researcher through the observations made
and number of computers recorded.
In the data analysis of the collected data, one sample t-test was used to test the hypothesis that
the mean number of computers occupied in the ground floor library were at least half the total
number of computers in the library.
Results, discussion and conclusion
Quantitative analysis
This is the method that applies mathematical measurement and calculation in the research
modelling resulting to understanding and predicting the behaviors or events and the economic,
business financial analysis. Realities are represented using numerical values to fulfill the aim of
quantitative analysis. At the end of this kind of analysis, there is always rejection of the
hypothesis or otherwise.
Data collection
In the data collection procedure, the student (researcher) kept constant visit to the ground floor
library. The visit to the library was with the aim of collecting data concerning the computers that
were in use. The number of computers were recorded two times in a day i.e. morning and
afternoon or evening. A sample size of 20 was used and recorded as in the requirement of the
7
These are the techniques employed by the researchers in the data collection procedure
(Håkansson, 2013). In this research, the researcher used observational research technique. This
was the special type of survey where the researcher presented himself or herself to the
phenomenon area and took the number of elements of interest under study (computers) that were
in use by the students at different time intervals i.e. morning hours and in the afternoon or
evening hours. Quantitative data was resulted to by the researcher through the observations made
and number of computers recorded.
In the data analysis of the collected data, one sample t-test was used to test the hypothesis that
the mean number of computers occupied in the ground floor library were at least half the total
number of computers in the library.
Results, discussion and conclusion
Quantitative analysis
This is the method that applies mathematical measurement and calculation in the research
modelling resulting to understanding and predicting the behaviors or events and the economic,
business financial analysis. Realities are represented using numerical values to fulfill the aim of
quantitative analysis. At the end of this kind of analysis, there is always rejection of the
hypothesis or otherwise.
Data collection
In the data collection procedure, the student (researcher) kept constant visit to the ground floor
library. The visit to the library was with the aim of collecting data concerning the computers that
were in use. The number of computers were recorded two times in a day i.e. morning and
afternoon or evening. A sample size of 20 was used and recorded as in the requirement of the
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
research structured question. Every time the researcher visited the library, observations were
made on the number of computers that were in use and have the numbers recorded on paper. In
guide to do so, the researcher ended up with two questions; 1) At what time was the observation
made? And what is the number of computers occupied or in use by the students in the library?
Consequently, two variables were resulted to and the running computers recorded as shown in
the below table for the 20 observations made;
Table 1: Sample data
time computers
2:20 2
10:30 3
14:00 3
9:20 2
15:40 4
8:00 3
16:25 6
9:30 1
14:40 6
10:30 4
15:40 4
9:30 2
14:20 5
11:20 3
16:00 2
10:30 4
14:00 6
11:25 2
15:10 4
10:30 3
8
made on the number of computers that were in use and have the numbers recorded on paper. In
guide to do so, the researcher ended up with two questions; 1) At what time was the observation
made? And what is the number of computers occupied or in use by the students in the library?
Consequently, two variables were resulted to and the running computers recorded as shown in
the below table for the 20 observations made;
Table 1: Sample data
time computers
2:20 2
10:30 3
14:00 3
9:20 2
15:40 4
8:00 3
16:25 6
9:30 1
14:40 6
10:30 4
15:40 4
9:30 2
14:20 5
11:20 3
16:00 2
10:30 4
14:00 6
11:25 2
15:10 4
10:30 3
8
Table 2: Cross-tabulation output for time and computers
Comps
Time 1 2 3 4 5 6
10:30 0 0 2 2 0 0
11:20 0 0 1 0 0 0
11:25 0 1 0 0 0 0
14:00 0 0 1 0 0 1
14:20 0 0 0 0 1 0
14:40 0 0 0 0 0 1
15:10 0 0 0 1 0 0
15:40 0 0 0 2 0 0
16:00 0 1 0 0 0 0
16:25 0 0 0 0 0 1
2:20 0 1 0 0 0 0
8:00 0 0 1 0 0 0
9:20 0 1 0 0 0 0
9:30 1 1 0 0 0 0
Statistical analysis
In order to understand the even described in this study and to help us come up with the reliable
conclusions about those events require statistical analysis. From the data collected, the data was
analyzed with the aim of testing the hypothesis that the mean number of computers in use in the
ground floor were at least 8 in the given time intervals for which data was collected. In order to
test this claim, one sample t-test was used in the RStudio for which the results were as below.
Hypothesis
H0: μ ≥ 8
H1: μ<8
One Sample t-test
data: data$computers
t = -13.86, df = 19, p-value = 1.095e-11
alternative hypothesis: true mean is less than 8
95 percent confidence interval:
-Inf 4.017628
sample estimates:
9
Comps
Time 1 2 3 4 5 6
10:30 0 0 2 2 0 0
11:20 0 0 1 0 0 0
11:25 0 1 0 0 0 0
14:00 0 0 1 0 0 1
14:20 0 0 0 0 1 0
14:40 0 0 0 0 0 1
15:10 0 0 0 1 0 0
15:40 0 0 0 2 0 0
16:00 0 1 0 0 0 0
16:25 0 0 0 0 0 1
2:20 0 1 0 0 0 0
8:00 0 0 1 0 0 0
9:20 0 1 0 0 0 0
9:30 1 1 0 0 0 0
Statistical analysis
In order to understand the even described in this study and to help us come up with the reliable
conclusions about those events require statistical analysis. From the data collected, the data was
analyzed with the aim of testing the hypothesis that the mean number of computers in use in the
ground floor were at least 8 in the given time intervals for which data was collected. In order to
test this claim, one sample t-test was used in the RStudio for which the results were as below.
Hypothesis
H0: μ ≥ 8
H1: μ<8
One Sample t-test
data: data$computers
t = -13.86, df = 19, p-value = 1.095e-11
alternative hypothesis: true mean is less than 8
95 percent confidence interval:
-Inf 4.017628
sample estimates:
9
mean of x
3.45
From the test, t(19) = -13.86, p-value < 0.05 thus we reject the null hypothesis i.e. H0: μ ≥ 8 since
the actual mean of the number of computers that were running or occupied by the students by the
time observations were being made by the researcher. As a result, it can be concluded that the
mean number of computers that were in run any time the students conduct research in the library
was less than half the total number of computers installed in the ground floor UOW library.
Summary statistics
> summary(data$computers)
Min. 1st Qu. Median Mean 3rd Qu. Max.
1.00 2.00 3.00 3.45 4.00 6.00
The minimum number of computers that were recorded to be running and thus occupied was 1
with the maximum of 6 computers recorded and the mean of 3.45 running and occupied
computers.
R Script
The R script for the entire RStudio analysis process right from loading the dataset were as
provided below;
data<-read.csv("C:\\Users\\ABRAHAM\\Desktop\\732747 data.csv",header = T)
str (data)
fix (data)
t.test (data$computers, mu = 8, alternative = "less")
time <-as.factor (data$time)
comps <-as.factor (data$computers)
table (time,comps)
summary(data$computers)
10
3.45
From the test, t(19) = -13.86, p-value < 0.05 thus we reject the null hypothesis i.e. H0: μ ≥ 8 since
the actual mean of the number of computers that were running or occupied by the students by the
time observations were being made by the researcher. As a result, it can be concluded that the
mean number of computers that were in run any time the students conduct research in the library
was less than half the total number of computers installed in the ground floor UOW library.
Summary statistics
> summary(data$computers)
Min. 1st Qu. Median Mean 3rd Qu. Max.
1.00 2.00 3.00 3.45 4.00 6.00
The minimum number of computers that were recorded to be running and thus occupied was 1
with the maximum of 6 computers recorded and the mean of 3.45 running and occupied
computers.
R Script
The R script for the entire RStudio analysis process right from loading the dataset were as
provided below;
data<-read.csv("C:\\Users\\ABRAHAM\\Desktop\\732747 data.csv",header = T)
str (data)
fix (data)
t.test (data$computers, mu = 8, alternative = "less")
time <-as.factor (data$time)
comps <-as.factor (data$computers)
table (time,comps)
summary(data$computers)
10
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Discussion
From the test conducted in this research on the usage of computers in UOW ground floor library,
the results proved that the mean number of computers was less than the half total number of
computers that were installed in the ground floor computers. This could mean that the students
would visit the library but prefer using hard copy books from the shelves other than using
computers while in the library premises. In regard to this, it can then be thought of by the
institution to reduce the number of computers installed in the ground floor library.
Conclusion
In conclusion to this research, the results showed that the total number of computers installed in
the ground floor library were more and additional computers would not be necessary. These
findings are important in the consideration of the purchase of additional institution’s facilities.
Rejecting the null hypothesis gave way for the alternative hypothesis as in the one sample t-test
carried out.
Recommendation
It is recommended that the number of computers on the ground floor library to be reduced by the
library management since at all time interval the number of computers that were occupied and
running were less than half the number of computers in the ground floor library.
11
From the test conducted in this research on the usage of computers in UOW ground floor library,
the results proved that the mean number of computers was less than the half total number of
computers that were installed in the ground floor computers. This could mean that the students
would visit the library but prefer using hard copy books from the shelves other than using
computers while in the library premises. In regard to this, it can then be thought of by the
institution to reduce the number of computers installed in the ground floor library.
Conclusion
In conclusion to this research, the results showed that the total number of computers installed in
the ground floor library were more and additional computers would not be necessary. These
findings are important in the consideration of the purchase of additional institution’s facilities.
Rejecting the null hypothesis gave way for the alternative hypothesis as in the one sample t-test
carried out.
Recommendation
It is recommended that the number of computers on the ground floor library to be reduced by the
library management since at all time interval the number of computers that were occupied and
running were less than half the number of computers in the ground floor library.
11
References
Aabø, S. and Audunson, R., 2012. Use of library space and the library as place. Library &
Information Science Research, 34(2), pp.138-149.
Ahamed, S.V. and Lawrence, V.B., 2012. Intelligent Broadband Multimedia Networks: Generic
Aspects and Architectures Wireless, ISDN, Current and Future Intelligent Networks. Springer
Science & Business Media.
Bomhold, C., 2015. Research and discovery functions in mobile academic libraries: Are
university libraries serving mobile researchers?. Library Hi Tech, 33(1), pp.32-40.
Brandes, E.A. and Brook, G.B. eds., 2013. Smithells metals reference book. Elsevier.
Brynjolfsson, E. and McAfee, A., 2014. The second machine age: Work, progress, and
prosperity in a time of brilliant technologies. WW Norton & Company.
Char, B.W., Geddes, K.O., Gonnet, G.H., Leong, B.L., Monagan, M.B. and Watt, S.,
2013. Maple V library reference manual. Springer Science & Business Media.
Dewe, M., 2016. Planning public library buildings: Concepts and issues for the librarian.
Routledge.
Goodfellow, I.J., Warde-Farley, D., Lamblin, P., Dumoulin, V., Mirza, M., Pascanu, R.,
Bergstra, J., Bastien, F. and Bengio, Y., 2013. Pylearn2: a machine learning research
library. arXiv preprint arXiv:1308.4214.
Håkansson, A., 2013, January. Portal of research methods and methodologies for research
projects and degree projects. In Proceedings of the International Conference on Frontiers in
Education: Computer Science and Computer Engineering (FECS) (p. 1). The Steering
Committee of The World Congress in Computer Science, Computer Engineering and Applied
Computing (WorldComp).
Han, B., Gopalakrishnan, V., Ji, L. and Lee, S., 2015. Network function virtualization:
Challenges and opportunities for innovations. IEEE Communications Magazine, 53(2), pp.90-97.
Jeschek, M., Gerngross, D. and Panke, S., 2016. Rationally reduced libraries for combinatorial
pathway optimization minimizing experimental effort. Nature communications, 7, p.11163.
Johnson, L., Becker, S.A., Estrada, V. and Freeman, A., 2015. NMC horizon report: 2015
library edition (pp. 1-54). The New Media Consortium.
Kottomtharayil, R., Gokhale, P., Prahlad, A., Vijayan, M.K., Ngo, D. and Devassy, V.,
CommVault Systems Inc, 2015. System and method for sharing media in a computer network.
U.S. Patent 9,021,213.
Krstev, C. and Trtovac, A., 2014. Teaching Multimedia Documents to LIS Students. The Journal
of Academic Librarianship, 40(2), pp.152-162.
12
Aabø, S. and Audunson, R., 2012. Use of library space and the library as place. Library &
Information Science Research, 34(2), pp.138-149.
Ahamed, S.V. and Lawrence, V.B., 2012. Intelligent Broadband Multimedia Networks: Generic
Aspects and Architectures Wireless, ISDN, Current and Future Intelligent Networks. Springer
Science & Business Media.
Bomhold, C., 2015. Research and discovery functions in mobile academic libraries: Are
university libraries serving mobile researchers?. Library Hi Tech, 33(1), pp.32-40.
Brandes, E.A. and Brook, G.B. eds., 2013. Smithells metals reference book. Elsevier.
Brynjolfsson, E. and McAfee, A., 2014. The second machine age: Work, progress, and
prosperity in a time of brilliant technologies. WW Norton & Company.
Char, B.W., Geddes, K.O., Gonnet, G.H., Leong, B.L., Monagan, M.B. and Watt, S.,
2013. Maple V library reference manual. Springer Science & Business Media.
Dewe, M., 2016. Planning public library buildings: Concepts and issues for the librarian.
Routledge.
Goodfellow, I.J., Warde-Farley, D., Lamblin, P., Dumoulin, V., Mirza, M., Pascanu, R.,
Bergstra, J., Bastien, F. and Bengio, Y., 2013. Pylearn2: a machine learning research
library. arXiv preprint arXiv:1308.4214.
Håkansson, A., 2013, January. Portal of research methods and methodologies for research
projects and degree projects. In Proceedings of the International Conference on Frontiers in
Education: Computer Science and Computer Engineering (FECS) (p. 1). The Steering
Committee of The World Congress in Computer Science, Computer Engineering and Applied
Computing (WorldComp).
Han, B., Gopalakrishnan, V., Ji, L. and Lee, S., 2015. Network function virtualization:
Challenges and opportunities for innovations. IEEE Communications Magazine, 53(2), pp.90-97.
Jeschek, M., Gerngross, D. and Panke, S., 2016. Rationally reduced libraries for combinatorial
pathway optimization minimizing experimental effort. Nature communications, 7, p.11163.
Johnson, L., Becker, S.A., Estrada, V. and Freeman, A., 2015. NMC horizon report: 2015
library edition (pp. 1-54). The New Media Consortium.
Kottomtharayil, R., Gokhale, P., Prahlad, A., Vijayan, M.K., Ngo, D. and Devassy, V.,
CommVault Systems Inc, 2015. System and method for sharing media in a computer network.
U.S. Patent 9,021,213.
Krstev, C. and Trtovac, A., 2014. Teaching Multimedia Documents to LIS Students. The Journal
of Academic Librarianship, 40(2), pp.152-162.
12
Kuzlu, M., Pipattanasomporn, M. and Rahman, S., 2014. Communication network requirements
for major smart grid applications in HAN, NAN and WAN. Computer Networks, 67, pp.74-88.
Menezes, A.J., 2012. Elliptic curve public key cryptosystems (Vol. 234). Springer Science &
Business Media.
Moran, B.B. and Morner, C.J., 2017. Library and information center management. ABC-CLIO.
Morel, N., Palier, B. and Palme, J. eds., 2012. Towards a social investment welfare state?: ideas,
policies and challenges. Policy Press.
Rao, S.S., 2013. The Finite Element Method in Engineering: Pergamon International Library of
Science, Technology, Engineering and Social Studies. Elsevier.
Ruj, S. and Nayak, A., 2013. A decentralized security framework for data aggregation and access
control in smart grids. IEEE transactions on smart grid, 4(1), pp.196-205.
Siguenza-Guzman, L., Saquicela, V., Avila-Ordóñez, E., Vandewalle, J. and Cattrysse, D., 2015.
Literature review of data mining applications in academic libraries. The Journal of Academic
Librarianship, 41(4), pp.499-510.
Ullah, S., Mohaisen, M. and Alnuem, M.A., 2013. A review of IEEE 802.15. 6 MAC, PHY, and
security specifications. International Journal of Distributed Sensor Networks, 9(4), p.950704.
13
for major smart grid applications in HAN, NAN and WAN. Computer Networks, 67, pp.74-88.
Menezes, A.J., 2012. Elliptic curve public key cryptosystems (Vol. 234). Springer Science &
Business Media.
Moran, B.B. and Morner, C.J., 2017. Library and information center management. ABC-CLIO.
Morel, N., Palier, B. and Palme, J. eds., 2012. Towards a social investment welfare state?: ideas,
policies and challenges. Policy Press.
Rao, S.S., 2013. The Finite Element Method in Engineering: Pergamon International Library of
Science, Technology, Engineering and Social Studies. Elsevier.
Ruj, S. and Nayak, A., 2013. A decentralized security framework for data aggregation and access
control in smart grids. IEEE transactions on smart grid, 4(1), pp.196-205.
Siguenza-Guzman, L., Saquicela, V., Avila-Ordóñez, E., Vandewalle, J. and Cattrysse, D., 2015.
Literature review of data mining applications in academic libraries. The Journal of Academic
Librarianship, 41(4), pp.499-510.
Ullah, S., Mohaisen, M. and Alnuem, M.A., 2013. A review of IEEE 802.15. 6 MAC, PHY, and
security specifications. International Journal of Distributed Sensor Networks, 9(4), p.950704.
13
1 out of 16
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.