4,483 research outputs found

    Real World Application of CCT Tools: How Reflection, Dialogue Processes and Action Research were used to promote organizational change and student success in Re-Engagement Work

    Get PDF
    I started the CCT program while also beginning a new role as a Dropout Recovery Specialist, working in partnership with a local school district. I work with students who have dropped out or are at risk of dropping out explore alternative options to finish their high school diploma or an equivalent. As the newest member of the center, the transition into a new organization created an internal struggle in finding my place. I was also seeing opportunities to improve current routines and practices as demands from district partners were increasing. Overwhelmed by the challenges before me, I was struggling to determine a place to start. This project explores how tools learned from the CCT program supported my transition into a new environment and supported me in promoting organizational change and collaboration within the center, and inspired my personal growth and reflection as an outcome of this program. Three tools have been integral to this process: regular reflection, dialogue processes and action research. Throughout this synthesis, I demonstrate the process of utilizing and implementing these tools for myself and my team, the progress to date, and the implications for work in the future

    Thoracic Injury Effects Of Linear And Angular Karate Impacts

    Get PDF
    Skilled karate practitioners are reputed to be able to completely disable an opponent with one blow -- when necessary. Immediate questions arise as to whether karate participants: (a) can, in fact, deliver disabling injurious blows to the thorax, (b) can have a greater ability to damage the body with some technique types over others, and (c) can wear readily available safety equipment to temper blows to below the level of medically severe injury. The viscous response criteria (VCmax), based on chest compression and compression velocity, has been devised to estimate level of injury to the thorax or chest. Accordingly, a VCmax =1.0 m/s is the level for a 25% probability of severe injury, such as liver or lung laceration. Twelve international class karate competitors of 3rd, 4th, and 5th degree or higher (master class) black belt ranks, were evaluated impacting the thorax of an instrumented anthropometric test dummy (ATD) to determine the probable injury effects of linear (thrusting) and angular (striking or snapping) types of karate blows, with and without a chest protector. Techniques evaluated were the roundhouse kick, backfist strike, side-thrust kick, and the reverse punch. Data were analyzed using a 2*3*4 ANOVA design with Tukey's Studentized Range follow-up tests to discriminate within condition differences. The adjusted viscous response (VCmax) was the variable used for evaluation. Of the three skill classes evaluated, 3rd (M =1.2096, SD =.5309) and 4th (M =1.1127, SD =.4304) degree ranks generated statistically higher VCmax levels than master class competitors (M =.8036, SD =.2797) across all conaitions, F (2, 60) =7.57, F = .0012. The chest protector was found to be effective, F 0,60) =4.28, F =.0430, in attenuating the impact effects below the serious injury level (M =1.1382, SD = .4423 and M =.9535, SD = .4575, without and with the chest protector, respectively). The roundhouse kick (M =1.3778, SD =.4674) generated higher .VCmax than all other techniques, F (3, 60) =7.17, F = .0003,: the reverse punch (M =1.0122, SD =.3923); the side-thrust kick (M =.9538, SD =.4976); or the backfist strike (M =.8189, SD =.2986). No statistical difference was detected among the technique conditions. It was concluded that the highly skilled karate competitor could deliver severe or greater levels of damage to the thorax with karate techniques, especially the roundhouse kick. The level of damage to the thorax can be reduced below the "serious" level with the use of a chest protector

    Design of a low cost earth resources system

    Get PDF
    The author has identified the following significant results. Survey results indicated that users of remote sensing data in the Southeastern U.S. were increasingly turning to digital processing techniques. All the states surveyed have had some involvement in projects using digitally processed data. Even those states which do not yet have in-house capabilities for digital processing were extremely interested in and were planning to develop such capabilities

    Computer processing of peach tree decline data

    Get PDF
    There are no author-identified significant results in this report

    The chaining lemma and its application

    Get PDF
    We present a new information-theoretic result which we call the Chaining Lemma. It considers a so-called “chain” of random variables, defined by a source distribution X(0)with high min-entropy and a number (say, t in total) of arbitrary functions (T1,…, Tt) which are applied in succession to that source to generate the chain (Formula presented). Intuitively, the Chaining Lemma guarantees that, if the chain is not too long, then either (i) the entire chain is “highly random”, in that every variable has high min-entropy; or (ii) it is possible to find a point j (1 ≤ j ≤ t) in the chain such that, conditioned on the end of the chain i.e. (Formula presented), the preceding part (Formula presented) remains highly random. We think this is an interesting information-theoretic result which is intuitive but nevertheless requires rigorous case-analysis to prove. We believe that the above lemma will find applications in cryptography. We give an example of this, namely we show an application of the lemma to protect essentially any cryptographic scheme against memory tampering attacks. We allow several tampering requests, the tampering functions can be arbitrary, however, they must be chosen from a bounded size set of functions that is fixed a prior

    The microscopic theory of fission

    Full text link
    Fission-fragment properties have been calculated for thermal neutron-induced fission on a 239Pu^{239}\textrm{Pu} target, using constrained Hartree-Fock-Bogoliubov calculations with a finite-range effective interaction. A quantitative criterion based on the interaction energy between the nascent fragments is introduced to define the scission configurations. The validity of this criterion is benchmarked against experimental measurements of the kinetic energies and of multiplicities of neutrons emitted by the fragments.Comment: 8 page, 4 figures, to be published in Proceedings of the 4th International Workshop on Fission and Fission Product Spectroscop

    Non-malleable codes for space-bounded tampering

    Get PDF
    Non-malleable codes—introduced by Dziembowski, Pietrzak and Wichs at ICS 2010—are key-less coding schemes in which mauling attempts to an encoding of a given message, w.r.t. some class of tampering adversaries, result in a decoded value that is either identical or unrelated to the original message. Such codes are very useful for protecting arbitrary cryptographic primitives against tampering attacks against the memory. Clearly, non-malleability is hopeless if the class of tampering adversaries includes the decoding and encoding algorithm. To circumvent this obstacle, the majority of past research focused on designing non-malleable codes for various tampering classes, albeit assuming that the adversary is unable to decode. Nonetheless, in many concrete settings, this assumption is not realistic
    corecore