1,990 research outputs found

    Studies in the genetics and the cytology of ustilago avenae and ustilago levis

    Get PDF
    This archival publication may not reflect current scientific knowledge or recommendations

    Using journals to assess non-STEM student learning in STEM courses: A case study in cybersecurity education

    Get PDF
    Embry-Riddle Aeronautical University offers a minor course of study in cybersecurity as an option in our undergraduate Homeland Security program. Since the students are, by and large, social scientists, the focus of the program is to build hyper-awareness of how cybersecurity integrates within their professional aspirations rather than to provide cybersecurity career-level proficiency. Assessing student learning of the technical aspects cannot be performed using traditional tests, as they would not properly measure what the students are learning in a practical sense. Instead, we employ journals and self-reflection to ask the students to express and demonstrate their learning. Although somewhat harder to grade, the journals have huge benefits to the learning environment as well as to actual learning

    El Niño and the delayed action oscillator

    Get PDF
    We study the dynamics of the El Niño phenomenon using the mathematical model of delayedaction oscillator (DAO). Topics such as the influence of the annual cycle, global warming, stochastic influences due to weather conditions and even off-equatorial heat-sinks can all be discussed using only modest analytical and numerical resources. Thus the DAO allows for a pedagogical introduction to the science of El Niño and La Niña while at the same time avoiding the need for large-scale computing resources normally associated with much more sophisticated coupled atmosphere-ocean general circulation models. It is an approach which is ideally suited for student projects both at high school and undergraduate level

    Reduce Smut Losses

    Get PDF
    This archival publication may not reflect current scientific knowledge or recommendations. Current information available from the University of Minnesota Extension: https://www.extension.umn.edu

    Coriolis force in Geophysics: an elementary introduction and examples

    Get PDF
    We show how Geophysics may illustrate and thus improve classical Mechanics lectures concerning the study of Coriolis force effects. We are then interested in atmospheric as well as oceanic phenomena we are familiar with, and are for that reason of pedagogical and practical interest. Our aim is to model them in a very simple way to bring out the physical phenomena that are involved.Comment: Accepted for publication in European Journal of Physic

    A real Lorentz-FitzGerald contraction

    Get PDF
    Many condensed matter systems are such that their collective excitations at low energies can be described by fields satisfying equations of motion formally indistinguishable from those of relativistic field theory. The finite speed of propagation of the disturbances in the effective fields (in the simplest models, the speed of sound) plays here the role of the speed of light in fundamental physics. However, these apparently relativistic fields are immersed in an external Newtonian world (the condensed matter system itself and the laboratory can be considered Newtonian, since all the velocities involved are much smaller than the velocity of light) which provides a privileged coordinate system and therefore seems to destroy the possibility of having a perfectly defined relativistic emergent world. In this essay we ask ourselves the following question: In a homogeneous condensed matter medium, is there a way for internal observers, dealing exclusively with the low-energy collective phenomena, to detect their state of uniform motion with respect to the medium? By proposing a thought experiment based on the construction of a Michelson-Morley interferometer made of quasi-particles, we show that a real Lorentz-FitzGerald contraction takes place, so that internal observers are unable to find out anything about their `absolute ' state of motion. Therefore, we also show that an effective but perfectly defined relativistic world can emerge in a fishbowl world situated inside a Newtonian (laboratory) system. This leads us to reflect on the various levels of description in physics, in particular regarding the quest towards a theory of quantum gravity.Comment: 6 pages, no figures. Minor changes reflect published versio

    Excerpts from the paper: Research Status and Recommendation from the Alaska Workshop on Gravity Waves and Turbulence in the Middle Atmosphere, part 1.3A

    Get PDF
    Internal gravity waves are disturbances whose intrinsic frequencies k(c - u) are smaller than the Brunt-Vaisala frequency (N). Their importance arises because: they are the major components of the total flow and temperature variability fields of the mesosphere (i.e., shears and lapse rates) and hence constitute the likely sources of turbulence; and they are associated with fluxes of momentum that communicate stresses over large distances. For example, gravity waves exert a drag on the flow in the upper mesosphere. However, in order for gravity waves to exert a net drag on the atmosphere, they must be attenuated. There are two general types of processes that seek to attenuate gravity waves: dissipation and saturation. Dissipation is any process that is effective independent of the wave amplitude, while saturation occurs when certain wave amplitude conditions are met. Radiative damping is an example of dissipation, while convective overturning is an example of saturation. The two processes are not mutually exclusive

    'I would rather die': reasons given by 16-year-olds for not continuing their study of mathematics

    Get PDF
    Improving participation rates in specialist mathematics after the subject ceases to be compulsory at age 16 is part of government policy in England. This article provides independent and recent support for earlier findings concerning reasons for non- participation, based on free response and closed items in a questionnaire with a sample of over 1500 students in 17 schools, close to the moment of choice. The analysis supports findings that perceived difficulty and lack of confidence are important reasons for students not continuing with mathematics, and that perceived dislike and boredom, and lack of relevance, are also factors. There is a close relationship between reasons for non-participation and predicted grade, and a weaker relation to gender. An analysis of the effects of schools, demonstrates that enjoyment is the main factor differentiating schools with high and low participation indices. Building on discussion of these findings, ways of improving participation are briefly suggested

    Intelligent Financial Fraud Detection Practices: An Investigation

    Full text link
    Financial fraud is an issue with far reaching consequences in the finance industry, government, corporate sectors, and for ordinary consumers. Increasing dependence on new technologies such as cloud and mobile computing in recent years has compounded the problem. Traditional methods of detection involve extensive use of auditing, where a trained individual manually observes reports or transactions in an attempt to discover fraudulent behaviour. This method is not only time consuming, expensive and inaccurate, but in the age of big data it is also impractical. Not surprisingly, financial institutions have turned to automated processes using statistical and computational methods. This paper presents a comprehensive investigation on financial fraud detection practices using such data mining methods, with a particular focus on computational intelligence-based techniques. Classification of the practices based on key aspects such as detection algorithm used, fraud type investigated, and success rate have been covered. Issues and challenges associated with the current practices and potential future direction of research have also been identified.Comment: Proceedings of the 10th International Conference on Security and Privacy in Communication Networks (SecureComm 2014
    corecore