1,099 research outputs found

    Managing affect in learners' questions in undergraduate science

    Get PDF
    This is the author's accepted manuscript. The final published article is available from the link below. Copyright @ 2012 Society for Research into Higher Education.This article aims to position students' classroom questioning within the literature surrounding affect and its impact on learning. The article consists of two main sections. First, the act of questioning is discussed in order to highlight how affect shapes the process of questioning, and a four-part genesis to question-asking that we call CARE is described: the construction, asking, reception and evaluation of a learner's question. This work is contextualised through studies in science education and through our work with university students in undergraduate chemistry, although conducted in the firm belief that it has more general application. The second section focuses on teaching strategies to encourage and manage learners' questions, based here upon the conviction that university students in this case learn through questioning, and that an inquiry-based environment promotes better learning than a simple ‘transmission’ setting. Seven teaching strategies developed from the authors' work are described, where university teachers ‘scaffold’ learning through supporting learners' questions, and working with these to structure and organise the content and the shape of their teaching. The article concludes with a summary of the main issues, highlighting the impact of the affective dimension of learning through questioning, and a discussion of the implications for future research

    Militarising Mumbai? The ‘politics’ of response

    Get PDF
    This article focuses on how urban security has been governed in Mumbai in the aftermath of the 2008 terrorist attacks (26/11). The event was widely cited as a major turning point in the securitisation and militarisation of Indian cities. It also produced significant political upheaval, which in turn generated calls for a major institutional overhaul of the governmental architecture for handling terrorism. This article takes the political and policy repercussions of 26/11 as an intervention into critical debates about the (para-)militarisation of policing and the politics of urban security. Here I shift the focus from the disciplinary and divisive effects of policies towards an emphasis on their spectacular and theatrical dimensions. If we are to make sense of the ‘militarised’ focus of the policy response to 26/11, I argue, we need to take seriously its populist, aspirational qualities

    Application of Statistical Methods for Gas Turbine Plant Operation Monitoring

    Get PDF

    Cloud and mobile infrastructure monitoring for latency and bandwidth sensitive applications

    Get PDF
    This PhD thesis involves the study of cloud computing infrastructures (from the networking perspective) to assess the feasibility of applications gaining increasing popularity over recent years, including multimedia and telemedicine applications, demanding low, bounded latency and sufficient bandwidth. I also focus on the case of telemedicine, where remote imaging applications (for example, telepathology or telesurgery) need to achieve a low and stable latency for the remote transmission of images, and also for the remote control of such equipment. Another important use case for telemedicine is denoted as remote computation, which involves the offloading of image processing to help diagnosis; also in this case, bandwidth and latency requirements should be enforced to ensure timely results, although they are less strict compared to the previous scenario. Nowadays, the capability of gaining access to IT resources in a rapid and on-demand fashion, according to a pay-as-you-go model, has made the cloud computing a key-enabler for innovative multimedia and telemedicine services. However, the partial obscurity of cloud performance, and also security concerns are still hindering the adoption of cloud infrastructure. To ensure that the requirements of applications running on the cloud are satisfied, there is the need to design and evaluate proper methodologies, according to the metric of interest. Moreover, some kinds of applications have specific requirements that cannot be satisfied by the current cloud infrastructure. In particular, since the cloud computing involves communication to remote servers, two problems arise: firstly, the core network infrastructure can be overloaded, considering the massive amount of data that has to flow through it to allow clients to reach the datacenters; secondly, the latency resulting from this remote interaction between clients and servers is increased. For these, and many other cases also beyond the field of telemedicine, the Edge and Fog computing paradigms were introduced. In these new paradigms, the IT resources are deployed not only in the core cloud datacenters, but also at the edge of the network, either in the telecom operator access network or even leveraging other users' devices. The proximity of resources to end-users allows to alleviate the burden on the core network and at the same time to reduce latency towards users. Indeed, the latency from users to remote cloud datacenters encompasses delays from the access and core networks, as well as the intra-datacenter delay. Therefore, this latency is expected to be higher than that required to interconnect users to edge servers, which in the envisioned paradigm are deployed in the access network, that is, nearby final users. Therefore, the edge latency is expected to be reduced to only a portion of the overall cloud delay. Moreover, the edge and central resources can be used in conjunction, and therefore attention to core cloud monitoring is of capital importance even when edge architectures will have a widespread adoption, which is not the case yet. While a lot of research work has been presented for monitoring several network-related metrics, such as bandwidth, latency, jitter and packet loss, less attention was given to the monitoring of latency in cloud and edge cloud infrastructures. In detail, while some works target cloud-latency monitoring, the evaluation is lacking a fine-grained analysis of latency considering spatial and temporal trends. Furthermore, the widespread adoption of mobile devices, and the Internet of Things paradigm further accelerate the shift towards the cloud paradigm for the additional benefits it can provide in this context, allowing energy savings and augmenting the computation capabilities of these devices, creating a new scenario denoted as mobile cloud. This scenario poses additional challenges for its bandwidth constraints, accentuating the need for tailored methodologies that can ensure that the crucial requirements of the aforementioned applications can be met by the current infrastructure. In this sense, there is still a gap of works monitoring bandwidth-related metrics in mobile networks, especially when performing in-the-wild assessment targeting actual mobile networks and operators. Moreover, even the few works testing real scenarios typically consider only one provider in one country for a limited period of time, lacking an in-depth assessment of bandwidth variability over space and time. In this thesis, I therefore consider monitoring methodologies for challenging scenarios, focusing on latency perceived by customers of public cloud providers, and bandwidth in mobile broadband networks. Indeed, as described, achieving low latency is a critical requirement for core cloud infrastructures, while providing enough bandwidth is still challenging in mobile networks compared to wired settings, even with the adoption of 4G mobile broadband networks, expecting to overcome this issue only with the widespread availability of 5G connections (with half of total traffic expected to come from 5G networks by 2026). Therefore, in the research activities carried on during my PhD, I focused on monitoring latency and bandwidth on cloud and mobile infrastructures, assessing to which extent the current public cloud infrastructure and mobile network make multimedia and telemedicine applications (as well as others having similar requirements) feasible

    Selected Manifestations of Social Deviance in Organizational Culture

    Get PDF
    The objective of this paper is to contribute to the discourse about the issues of trust in management, authority and meaningfulness of human labour, which are inseparably connected with effectiveness, productivity, competitiveness of companies, organizations and the whole society as well. The authors want to provide a conceptual theoretical framework for further studies of social deviance in organizational culture and that is why it has a form of a theoretical study providing a platform for future empirical researches. This study is opened with defining the concept of social deviance as a deviation from the normality and by reminding of difficulties related to determination of normality. The organizational culture is defined as a coherent set of values, norms and patterns of behaviour that determine the manners and forms of behaviour of employees, their relationships inside (but also outside) the social system of the organization. Further the paper is focused on selected social deviances, which undermine the effectiveness of organizational structures to fulfil their objectives and missions. Based on the empirical analyses the attention is paid particularly to nepotism, clientelism and cronyism as tools for reaching latent goals of individuals and groups in the organization. The issue is set in the contemporary society and solved from the view of social psychological mechanisms of human behaviour in the group. The authors also remind the issue of responsibility, conscience and the negative effects of conformity, group thinking, obedience and the authoritarian leadership which is even more obvious when the employees are under the pressure (e.g. economic sanctions). In conclusion are outlined the tools of control of clientelism and similar phenomena and possibilities of applications of Weber’s socio-analytical model of bureaucracy in organizations

    The Bird's Ear View: Audification for the Spectral Analysis of Heliospheric Time Series Data.

    Full text link
    The sciences are inundated with a tremendous volume of data, and the analysis of rapidly expanding data archives presents a persistent challenge. Previous research in the field of data sonification suggests that auditory display may serve a valuable function in the analysis of complex data sets. This dissertation uses the heliospheric sciences as a case study to empirically evaluate the use of audification (a specific form of sonification) for the spectral analysis of large time series. Three primary research questions guide this investigation, the first of which addresses the comparative capabilities of auditory and visual analysis methods in applied analysis tasks. A number of controlled within-subject studies revealed a strong correlation between auditory and visual observations, and demonstrated that auditory analysis provided a heightened sensitivity and accuracy in the detection of spectral features. The second research question addresses the capability of audification methods to reveal features that may be overlooked through visual analysis of spectrograms. A number of open-ended analysis tasks quantitatively demonstrated that participants using audification regularly discovered a greater percentage of embedded phenomena such as low-frequency wave storms. In addition, four case studies document collaborative research initiatives in which audification contributed to the acquisition of new domain-specific knowledge. The final question explores the potential benefits of audification when introduced into the workflow of a research scientist. A case study is presented in which a heliophysicist incorporated audification into their working practice, and the “Think-Aloud” protocol is applied to gain a sense for how audification augmented the researcher’s analytical abilities. Auditory observations are demonstrated to make significant contributions to ongoing research, including the detection of previously unidentified equipment-induced artifacts. This dissertation provides three primary contributions to the field: 1) an increased understanding of the comparative capabilities of auditory and visual analysis methods, 2) a methodological framework for conducting audification that may be transferred across scientific domains, and 3) a set of well-documented cases in which audification was applied to extract new knowledge from existing data archives. Collectively, this work presents a “bird’s ear view” afforded by audification methods—a macro understanding of time series data that preserves micro-level detail.PhDDesign ScienceUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttp://deepblue.lib.umich.edu/bitstream/2027.42/111561/1/rlalexan_1.pd

    Cybersecurity of Digital Service Chains

    Get PDF
    This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios. We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems
    • 

    corecore