1,496,444 research outputs found

    Lessons Learned from Students' Research Experiences

    Get PDF
    Teaching graduate students how to do research can be a challenge for many instructors because "research education" is not an established field of research like other areas of teaching such as mathematics education, nursing education, science education, and statistics education. There are no scholarly journals devoted solely to teaching research methods; these sources are instead scattered across disciplines and journals (e.g., Nurse Researcher, Volume 13, Number 2, 2005; Sociology, Volume 15, Issue 4, 1981; and Scandinavian Journal of Educational Research, Volume 49, Issue 1, 2005). Furthermore, even though research methods courses are a staple in most graduate training programs, instructors were rarely taught how to teach research methods as part of their own graduate programs. Left to their own devices, instructors of research courses must rely on a network of peers, scattered research literature, and much trial-and-error as they develop and improve upon their own research methods courses

    I-Light Applications Workshop 2002 Proceedings

    Get PDF
    Editing for this document was provided by Gregory Moore and Craig A. Stewart.Indiana Governor Frank O'Bannon symbolically lit the fiber of the I-Light network on December 11, 2001. I-Light is a unique, high-speed fiber optic network connecting Indiana University Bloomington, Indiana University–Purdue University Indianapolis, and Purdue University West Lafayette with each other and with Abilene, the national high-speed Internet2 research and education network. This unique university-owned high speed network connects three of the Indiana's great research campuses. One year after the lighting of the network, we invited researchers from Indiana University and Purdue University to come together to discuss some of the research and instructional achievements that have been made possible in just one short year of the existence of I-Light. The results were dramatic: on December 4, 2002, more than 150 researchers gathered together in Indianapolis to discuss research and instructional breakthroughs made possible by I-Light.The I-Light Applications Workshop 2002 was sponsored by the Office of the Vice President for Information Technology and CIO, Indiana University; and the Office of the Vice President for Information Technology and CIO, Purdue University. I-Light was made possible by a special appropriation by the State of Indiana. The research described at the I-Light Applications Workshop has been supported by numerous grants from several sources, mentioned in the individual presentations included in this proceedings volume. Many of the scientific research projects discussed in this volume have been supported by the National Science Foundation and/or the National Institutes of Health. Some Purdue projects also received support from Indiana's 21st Century Fund. Multiple presentations featured work supported by the Lilly Endowment, Inc., through grants to Indiana University in support of the Pervasive Technology Laboratories and the Indiana Genomics Initiative, both at Indiana University. Purdue University projects received support from the National Science Foundation and the 21st Century Fund. Any opinions, findings and conclusions, or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the granting agencies

    Digital Forensics and Cyber Crime: Second International ICST Conference ICDF2C 2010 Abu Dhabi, United Arab Emirates, October 4-6, 2010 Revised Selected Papers

    Get PDF
    This book contains a selection of thoroughly refereed and revised papers from the Second International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2010, held October 4-6, 2010 in Abu Dhabi, United Arab Emirates. The field of digital forensics is becoming increasingly important for law enforcement, network security, and information assurance. It is a multidisciplinary area that encompasses a number of fields, including law, computer science, finance, networking, data mining, and criminal justice. The 14 papers in this volume descibe the various applications of this technology and cover a wide range of topics including law enforcement, disaster recovery, accounting frauds, homeland security, and information warfare.https://digitalcommons.newhaven.edu/electricalcomputerengineering-books/1004/thumbnail.jp

    Random Walks: A Review of Algorithms and Applications

    Get PDF
    A random walk is known as a random process which describes a path including a succession of random steps in the mathematical space. It has increasingly been popular in various disciplines such as mathematics and computer science. Furthermore, in quantum mechanics, quantum walks can be regarded as quantum analogues of classical random walks. Classical random walks and quantum walks can be used to calculate the proximity between nodes and extract the topology in the network. Various random walk related models can be applied in different fields, which is of great significance to downstream tasks such as link prediction, recommendation, computer vision, semi-supervised learning, and network embedding. In this paper, we aim to provide a comprehensive review of classical random walks and quantum walks. We first review the knowledge of classical random walks and quantum walks, including basic concepts and some typical algorithms. We also compare the algorithms based on quantum walks and classical random walks from the perspective of time complexity. Then we introduce their applications in the field of computer science. Finally we discuss the open issues from the perspectives of efficiency, main-memory volume, and computing time of existing algorithms. This study aims to contribute to this growing area of research by exploring random walks and quantum walks together.Comment: 13 pages, 4 figure

    Historical SDI, thematic maps and analysis of a complex network of medieval towers (13th-15th century) in the moorish strip

    Get PDF
    The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Volume XLII-4, 2018 ISPRS TC IV Mid-term Symposium “3D Spatial Information Science – The Engine of Change”, 1–5 October 2018, Delft, The NetherlandsThis work is part of an investigation into the use of GIS for the documentation and comprehension of medieval architectural heritage in the ancient Kingdom of Seville. The research was done in the framework of the project “Sustainable guardianship of cultural heritage through digital BIM and GIS models: contribution to knowledge and social innovation”, an interdisciplinary project focused on the applications of information technology in architectural heritage in Spain. The study case of this paper is located in the Guadalquivir valley during the period between 13th and 15th centuries. It concerns the Moorish Strip site, fortified by the Christian Kingdom of Castile with the aim of creating a barrier with the Moorish Kingdom. Its deteriorated state has led us to create a historical and spatial database in order to contribute to its conservation management plan. Apart from the historical documentation research and the data gathering, intensive fieldwork was also done to collect information about the buildings. In this paper we present a Historical SDI to investigate the hypothesis that the spatial patterns of the Moorish Band obey rules of “inter-visibility” control. Some analysis has been done on the site scale, such as: i) a thematic map of building material; ii) a spatiotemporal analysis; iii) the density of the distribution of towers over the territory; iv) a simulation of the territory visibility from the towers; v) the inter-visibility among towers; iv) thematic maps using attribute values. These analyses permitted us to highlight the need to create a preservation plan that should consider the network visibility system as an important value for heritage interpretation and knowledge.Spain’s Ministry of Economy and Competitiveness HAR2016–78113-
    • …
    corecore