717 research outputs found
Addressing the Needs of Doctoral Students as Academic Practitioners: A Collaborative Inquiry on Teaching in Higher Education
This paper presents preliminary findings from a pilot study whose purpose was to explore how we, a tenure-track faculty member and a doctoral student, understood and developed our teaching practice when engaged in a formal faculty–student relationship. Using a hybrid of collaborative inquiry and collaborative self-study—which included verbal and written dialogue, interrogation, as well as observation—we sought to understand how that formal faculty–student relationship promoted the development of strong teaching pedagogy. The motivation for this study was a commitment to fostering high-quality teaching in undergraduate courses in our faculty of education. Driving this study was the research question: How are we investigating and improving upon our practices as teachers in post-secondary education?
Cet article présente les résultats préliminaires d’une étude pilote dont le but était d’explorer la façon dont nous, une professeure et une doctorante, avons compris et élaboré notre pratique d’enseignement lorsqu’engagées dans une relation formelle professeur-étudiant. En combinant recherche et autoétude collaborative, comprenant dialogue verbal et écrit, interrogation et observation, nous avons cherché à comprendre comment cette relation formelle professeur-étudiant favorisait l’évolution d’une pédagogie d’enseignement efficace. Le but de cette étude était d’assurer la qualité élevée des cours de premier cycle au sein de notre faculté d’éducation. La question de recherche à l’origine de cette étude était la suivante : Comment étudier et améliorer nos pratiques pédagogiques en matière d’enseignement postsecondaire
Adversarial attacks on crowdsourcing quality control
Crowdsourcing is a popular methodology to collect manual labels at scale. Such labels are often used to train AI models and, thus, quality control is a key aspect in the process. One of the most popular quality assurance mechanisms in paid micro-task crowdsourcing is based on gold questions: the use of a small set of tasks of which the requester knows the correct answer and, thus, is able to directly assess crowd work quality. In this paper, we show that such mechanism is prone to an attack carried out by a group of colluding crowd workers that is easy to implement and deploy: the inherent size limit of the gold set can be exploited by building an inferential system to detect which parts of the job are more likely to be gold questions. The described attack is robust to various forms of randomisation and programmatic generation of gold questions. We present the architecture of the proposed system, composed of a browser plug-in and an external server used to share information, and briefly introduce its potential evolution to a decentralised implementation. We implement and experimentally validate the gold detection system, using real-world data from a popular crowdsourcing platform. Our experimental results show that crowd workers using the proposed system spend more time on signalled gold questions but do not neglect the others thus achieving an increased overall work quality. Finally, we discuss the economic and sociological implications of this kind of attack
All That Glitters is Gold -- An Attack Scheme on Gold Questions in Crowdsourcing
One of the most popular quality assurance mechanisms in paid micro-task crowdsourcing is based on gold questions: the use of a small set of tasks of which the requester knows the correct answer and, thus, is able to directly assess crowd work quality. In this paper, we show that such mechanism is prone to an attack carried out by a group of colluding crowd workers that is easy to implement and deploy: the inherent size limit of the gold set can be exploited by building an inferential system to detect which parts of the job are more likely to be gold questions. The described attack is robust to various forms of randomisation and programmatic generation of gold questions. We present the architecture of the proposed system, composed of a browser plug-in and an external server used to share information, and briefly introduce its potential evolution to a decentralised implementation. We implement and experimentally validate the gold detection system, using real-world data from a popular crowdsourcing platform. Finally, we discuss the economic and sociological implications of this kind of attack
Recommended from our members
The Thiol-Rich Interlayer in the Shell/Core Architecture of Mussel Byssal Threads.
The mussel byssus thread is an extremely tough core-shelled fiber that dissipates substantial amounts of energy during tensile loading. The mechanical performance of the shell is critically reliant on 3,4-dihydroxyphenylalanine's (Dopa) ability to form reversible iron-catecholate complexes at pH 8. However, the formation of these coordinate cross-links is undercut by Dopa's oxidation to Dopa-quinone, a spontaneous process at seawater conditions. The large mechanical mismatch between the cuticle and the core lends itself to further complications. Despite these challenges, the mussel byssus thread performs its tethering function over long periods of time. Here, we address these two major questions: (1) how does the mussel slow/prevent oxidation in the cuticle, and (2) how is the mechanical mismatch at the core/shell interface mitigated? By combining a number of microscopy and spectroscopy techniques we have discerned a previously undescribed layer. Our results indicate this interlayer is thiol rich and thus will be called the thiol-rich interlayer (TRL). We propose the TRL serves as a long-lasting redox reservoir as well as a mechanical barrier
An efficient numerical approach to modeling the effects of particle shape on rubble-pile dynamics
We present an approach for the inclusion of non-spherical constituents in
high-resolution N-body discrete element method (DEM) simulations. We use
aggregates composed of bonded spheres to model non-spherical components. Though
the method may be applied more generally, we detail our implementation in the
existing N-body code pkdgrav. It has long been acknowledged that non-spherical
grains confer additional shear strength and resistance to flow when compared
with spheres. As a result, we expect that rubble-pile asteroids will also
exhibit these properties and may behave differently than comparable rubble
piles composed of idealized spheres. Since spherical particles avoid some
significant technical challenges, most DEM gravity codes have used only
spherical particles, or have been confined to relatively low resolutions. We
also discuss the work that has gone into improving performance with
non-spherical grains, building on pkdgrav's existing leading-edge computational
efficiency among DEM gravity codes. This allows for the addition of
non-spherical shapes while maintaining the efficiencies afforded by pkdgrav's
tree implementation and parallelization. As a test, we simulated the
gravitational collapse of 25,000 non-spherical bodies in parallel. In this
case, the efficiency improvements allowed for an increase in speed by nearly a
factor of three when compared with the naive implementation. Without these
enhancements, large runs with non-spherical components would remain
prohibitively expensive. Finally, we present the results of several small-scale
tests: spinup due to the YORP effect, tidal encounters, and the Brazil-nut
Effect. In all cases, we find that the inclusion of non-spherical constituents
has a measurable impact on simulation outcomes.Comment: 35 pages, 8 figure
Universal quantum Controlled-NOT gate
An investigation of an optimal universal unitary Controlled-NOT gate that
performs a specific operation on two unknown states of qubits taken from a
great circle of the Bloch sphere is presented. The deep analogy between the
optimal universal C-NOT gate and the `equatorial' quantum cloning machine (QCM)
is shown. In addition, possible applications of the universal C-NOT gate are
briefly discussed.Comment: 18 reference
How chip size impacts steam pretreatment effectiveness for biological conversion of poplar wood into fermentable sugars
Background Woody biomass is highly recalcitrant to enzymatic sugar release and often requires significant size reduction and severe pretreatments to achieve economically viable sugar yields in biological production of sustainable fuels and chemicals. However, because mechanical size reduction of woody biomass can consume significant amounts of energy, it is desirable to minimize size reduction and instead pretreat larger wood chips prior to biological conversion. To date, however, most laboratory research has been performed on materials that are significantly smaller than applicable in a commercial setting. As a result, there is a limited understanding of the effects that larger biomass particle size has on the effectiveness of steam explosion pretreatment and subsequent enzymatic hydrolysis of wood chips. Results To address these concerns, novel downscaled analysis and high throughput pretreatment and hydrolysis (HTPH) were applied to examine whether differences exist in the composition and digestibility within a single pretreated wood chip due to heterogeneous pretreatment across its thickness. Heat transfer modeling, Simons’ stain testing, magnetic resonance imaging (MRI), and scanning electron microscopy (SEM) were applied to probe the effects of pretreatment within and between pretreated wood samples to shed light on potential causes of variation, pointing to enzyme accessibility (i.e., pore size) distribution being a key factor dictating enzyme digestibility in these samples. Application of these techniques demonstrated that the effectiveness of pretreatment of Populus tremuloides can vary substantially over the chip thickness at short pretreatment times, resulting in spatial digestibility effects and overall lower sugar yields in subsequent enzymatic hydrolysis. Conclusions These results indicate that rapid decompression pretreatments (e.g., steam explosion) that specifically alter accessibility at lower temperature conditions are well suited for larger wood chips due to the non-uniformity in temperature and digestibility profiles that can result from high temperature and short pretreatment times. Furthermore, this study also demonstrated that wood chips were hydrated primarily through the natural pore structure during pretreatment, suggesting that preserving the natural grain and transport systems in wood during storage and chipping processes could likely promote pretreatment efficacy and uniformity
Lung cancer induced in mice by the envelope protein of jaagsiekte sheep retrovirus (JSRV) closely resembles lung cancer in sheep infected with JSRV
BACKGROUND: Jaagsiekte sheep retrovirus (JSRV) causes a lethal lung cancer in sheep and goats. Expression of the JSRV envelope (Env) protein in mouse lung, by using a replication-defective adeno-associated virus type 6 (AAV6) vector, induces tumors resembling those seen in sheep. However, the mouse and sheep tumors have not been carefully compared to determine if Env expression alone in mice can account for the disease features observed in sheep, or whether additional aspects of virus replication in sheep are important, such as oncogene activation following retrovirus integration into the host cell genome. RESULTS: We have generated mouse monoclonal antibodies (Mab) against JSRV Env and have used these to study mouse and sheep lung tumor histology. These Mab detect Env expression in tumors in sheep infected with JSRV from around the world with high sensitivity and specificity. Mouse and sheep tumors consisted mainly of well-differentiated adenomatous foci with little histological evidence of anaplasia, but at long times after vector exposure some mouse tumors did have a more malignant appearance typical of adenocarcinoma. In addition to epithelial cell tumors, lungs of three of 29 sheep examined contained fibroblastic cell masses that expressed Env and appeared to be separate neoplasms. The Mab also stained nasal adenocarcinoma tissue from one United States sheep, which we show was due to expression of Env from ovine enzootic nasal tumor virus (ENTV), a virus closely related to JSRV. Systemic administration of the AAV6 vector encoding JSRV Env to mice produced numerous hepatocellular tumors, and some hemangiomas and hemangiosarcomas, showing that the Env protein can induce tumors in multiple cell types. CONCLUSION: Lung cancers induced by JSRV infection in sheep and by JSRV Env expression in mice have similar histologic features and are primarily characterized by adenomatous proliferation of peripheral lung epithelial cells. Thus it is unnecessary to invoke a role for insertional mutagenesis, gene activation, viral replication, or expression of other viral gene products in sheep lung tumorigenesis, although these processes may play a role in other clinically less important sequelae of JSRV infection such as metastasis observed with variable frequency in sheep
- …