5,672 research outputs found

    Honoring and Maintaining a Dual Identity

    Full text link
    My father taught at a church-affiliated college as a professor of philosophy. My mother, for much of my growing-up years, was a fifth-grade public school teacher. Although I was shaped by both of these models, and attracted to each, I initially came down on the side of elementary teaching. For close to 10 years I worked, mostly happily, with upper-elementary children in both public and private settings. Professionally, at least, I seemed to have much more to talk about with my mother. Having subsequently completed a doctorate in the history of education (including much formal and informal study of philosophy) and having taught now for 15 years at a small Christian liberal arts college, friends often point out how much my life resembles that of my father

    Search, choice, and revealed preference

    Get PDF
    With complete information, choice of one option over another conveys preference. Yet when search is incomplete, this is not necessarily the case. It may instead reflect unawareness that a superior alternative was available. To separate these phenomena, we consider non-standard data on the evolution of provisional choices with contemplation time. We characterize precisely when the resulting data could have been generated by a general form of sequential search. We characterize also search that terminates based on a reservation utility stopping rule. We outline an experimental design that captures provisional choices in the pre-decision period.Revealed preference, search theory, stochastic choice

    Yutaka Imai and the OECD

    Full text link

    Design of a processor to support the teaching of computer systems

    Get PDF
    Teaching computer systems, including computer architecture, assembly language programming and operating system implementation, is a challenging occupation. At the University of Waikato this is made doubly true because we require all computer science and information systems students study this material at second year. The challenges of teaching difficult material to a wide range of students have driven us to find ways of making the material more accessible. The corner stone of our strategy for delivering this material is the design and implementation of a custom CPU that meets the needs of teaching. This paper describes our motivation and these needs. We present the CPU and board design and describe the implementation of the CPU in an FPGA. The paper also includes some reflections on the use of a real CPU rather than a simulation environment. We conclude with a discussion of how the CPU can be used for advanced classes in computer architecture and a description of the current status of the project

    Predator Perception of Batesian Mimicry and Conspicuousness in a Salamander

    Get PDF
    In Batesian mimicry a palatable mimic deceives predators by resembling an unpalatable model. The evolution of Batesian mimicry relies on the visual capabilities of the potential predators, as prey detection provides the selective force driving evolutionary change. We compared the visual capabilities of several potential predators to test predictions stemming from the hypothesis of Batesian mimicry between two salamanders: the model species Notophthalmus viridescens, and polymorphic mimic, Plethodon cinereus. First, we found mimicry to be restricted to coloration, but not brightness. Second, only bird predators appeared able to discriminate between the colors of models and non-mimic P. cinereus. Third, estimates of salamander conspicuousness were background-dependent, corresponding to predictions only for backgrounds against which salamanders are most active. These results support the hypothesis that birds influence the evolution of Batesian mimicry in P. cinereus, as they are the only group examined capable of differentiating N. viridescens and non-mimetic P. cinereus. Additionally, patterns of conspicuousness suggest that selection from predators may drive the evolution of conspicuousness in this system. This study confirms the expectation that the visual abilities of predators may influence the evolution of Batesian mimicry, but the role of conspicuousness may be more complex than previously thought

    A Comparison of Models for the Fulton-Macpherson Operads

    Get PDF
    In this thesis we explore the structure of the Fulton-Macpherson operads F_N by providing two new models for them. It is shown in work of Salvatore that these operads are cofibrant by claiming the existence of an isomorphism of operads from WF_N to F_N. Here, W is a functor which, for a large class of topological operads, produces cofibrant replacements. It would be satisfying to be able to write down explicitly what these isomorphisms are. Our new models are an attempt to move towards this. The building blocks of the first model appeared in the Ph.D. thesis of Daniel Singh but they were not assembled into an operad here. This model has a more algebraic feel than others in the literature which gives it technical advantages. We use this to demonstrate many of the well-known properties of the Fulton-Macpherson operads. In particular, we are able to write down explicit isomorphisms between F_1 and the Stasheff operad which we have not seen previously in the literature. This model is isomorphic to other models of the Fulton-Macpherson operads. The second model is a realisation of an operad in posets. This poset operad is built from combinatorial objects called chains of preorders. These objects encode maps from a finite set A to some Euclidean space R^N. In particular, we can impose restrictions to encode injective maps of this type. This model is equivalent up to homotopy to the Fulton-Macpherson operads in a way which we define. It is also homotopy equivalent to the Smith operads, another example of topological operads defined combinatorially. The main advantage of this model is that it has an obvious spine which may pave the way to writing down the desired isomorphisms from WF_N to F_N

    An antiviral disinfectant research and development process model for small to medium enterprises based within the United Kingdom

    Get PDF
    Viral infections have produced commercial drivers to develop products to treat and reduce viral outbreaks and infections. Antiviral disinfectants have found particular favour in limiting new infections. The nature of viruses has however necessitated a continued stream of products successfully moving through the research and development (R&D) stage into commercial usage. With high product failure rates in R&D, and difficulties for executive and R&D managers to communicate effectively in the R&D stage, there was a perceived need from within the sector to further elucidate antiviral disinfectant R&D. Prior research had shown that the R&D stage is technically sophisticated with a requirement for management to engage in the technical, scientific and business aspects. This can be challenging for management decision-making, as many aspects of R&D, have different levels of knowledge required as well as language used. The use of models has received much attention in simplifying the R&D stage, but with little attention paid to creating shared meaning between different managers. In this study, executive and R&D managers from antiviral disinfectant UK based R&D SMEs were examined, using semi-structured case study interviews within a phenomenological paradigm. Explicitation was used to draw out meaning from respondent interviews, which showed that executive and R&D managers were from business and scientific backgrounds respectively. This resulted in difficulties in communication about R&D between manager types, which added to the opacity of R&D. It was noted that executive managers had greater knowledge of wider organisational aims for R&D, but little knowledge about what was carried out in the R&D stage. Conversely, R&D managers had greater knowledge about the scientific testing carried out in R&D, but little understanding of the business drivers of R&D. Using interview information, an alpha and beta model were constructed that showed a linear path through R&D, based predominantly on technical stages. An expanded view of the model was utilised to aid in R&D and executive management sense made of the R&D. This model contributed to the knowledge base through shared and warranted knowledge between R&D and executive managers as well as expanded model views of each of the R&D process stages. Both of these factors are novel and have created new academic knowledge as well as this model currently being used by three respondent companies

    Easing the Transition from Inspiration to Implementation: A Rapid Prototyping Platform for Wireless Medium Access Control Protocols

    Get PDF
    Packet broadcast networks are in widespread use in modern wireless communication systems. Medium access control is a key functionality within such technologies. A substantial research effort has been and continues to be invested into the study of existing protocols and the development of new and specialised ones. Academic researchers are restricted in their studies by an absence of suitable wireless MAC protocol development methods. This thesis describes an environment which allows rapid prototyping and evaluation of wireless medium access control protocols. The proposed design flow allows specification of the protocol using the specification and description language (SDL) formal description technique. A tool is presented to convert the SDL protocol description into a C++ model suitable for integration into both simulation and implementation environments. Simulations at various levels of abstraction are shown to be relevant at different stages of protocol design. Environments based on the Cinderella SDL simulator and the ns-2 network simulator have been developed which allow early functional verification, along with detailed and accurate performance analysis of protocols under development. A hardware platform is presented which allows implementation of protocols with flexibility in the hardware/software trade-off. Measurement facilities are integral to the hardware framework, and provide a means for accurate real-world feedback on protocol performance

    Put the Pedal to the Metal: Exploring the Resources of the Modern Electric Vibraphone

    Get PDF
    ABSTRACT The process of applying pickups to acoustic vibraphones began in the early twentieth century in order to provide means of amplification for live performances other than the use of microphones alone. Artists and innovators in the industry quickly realized the possibilities of adding effects, such as tremolo, reverb, delays, and other sound processing devices, to create a pallet of sounds not possible on an acoustic vibraphone. This concept applied to modern signal routing, yields a copious amount of sonic possibilities, extending the creative universe of the performer. Due to the amount of technology involved with the electric vibraphone, it is critical the performer has a working knowledge of live sound reinforcement techniques, analog signal processing, gain staging, along with proficiency in MIDI and non-MIDI software applications, in order to achieve the best results. The use of effects on the electric vibraphone presents a unique set of challenges: most effects utilized are designed for guitar, thus the performer must be aware of not only the types of effects, but how to perform with them. The purpose of this study is to identify the strengths and weaknesses of different signal routing possibilities, discuss effects classification and application and to provide a composition for electric vibraphone and percussion ensemble entitled Put the Pedal to the Metal, that highlights the electric vibraphone as a solo instrument. From this study an individual should ascertain the information needed in order to achieve optimum results with this instrument and obtain skills needed to utilize effects appropriately
    corecore