1,258 research outputs found

    Beyond “Quasi-Norms”: The Challenges and Potential of Engaging with Norms in Cyberspace

    Get PDF
    As in any realm of human activity, norms are unavoidable in cyberspace. Yet cyber- space is a singularly complex setting within which to understand and try to shape norms. The problem is not simply the nature of cyberspace, although, as we will address below, acknowledging the unique characteristics of cyberspace is crucial when exploring norms in this realm. Rather, the challenge lies in the often over- looked nature of norms themselves and how their defining features render them especially difficult to decipher – and, by extension, to attempt to design – in the context of cyberspace. Norms are widely-accepted and internalised principles or codes of conduct that indicate what is deemed to be permitted, prohibited, or required of agents within a specific community. The modest aim of our chapter is to explore the challenges and potential of engaging with norms in cyberspace. By ‘engaging with norms in cyberspace’ we mean both understanding existing norms and the more prominent endeavour (prevalent in recent discussions of policies related to both cyber security and Internet governance) of what is variously described as ‘cultivating’, ‘promoting’ or ‘developing’ new norms.2 Our focus throughout most of this chapter will be on the former. Indeed, a central point of the argument that will follow is that one can- not hope to ‘cultivate’ norms in cyberspace without first understanding the existing normative landscape. In order to explore the challenges and potential of engaging with norms in cyberspace, we will take five steps. First, we will elaborate upon the definition of ‘norms’ offered above. In doing this, we will draw on influential work from within the discipline of International Relations (IR), and specifically from the multifaceted approaches labelled ‘normative IR theory’ and ‘constructivism’.3 Second, we will introduce a task that is fundamental to understanding existing norms in any realm, including cyberspace: interpreting the norms themselves. Third, we will highlight the characteristics of cyberspace that render this crucial task particularly difficult; namely, that it is a new and rapidly changing realm in which underlying values are contested and relevant agents are often difficult to identify. Fourth, we will link the difficulties of addressing norms in such a realm with the tendency to invoke what we will call ‘quasi-norms’, or merely purported norms. Fifth and finally, we will turn to the potential to engage with norms in cyberspace, regardless of obstacles, by uncovering what we will call the ‘norm of de-territorialised data’ and, in the process, demonstrating how evidence for its status as such can be uncovered in the justifications and judgements that agents in international politics offer when it is violated. Our hope is that these preliminary steps will take us some distance towards establishing a conceptual framework for speaking more coherently about norms in cyberspace

    Survey of Desktop Virtualization in Higher Education: An Energy- and Cost-Savings Perspective

    Get PDF
    Benefits of utilizing desktop virtualization technology in higher education environments include the ability to deploy numerous applications, which may conflict on a traditional desktop, into a single image. Additionally, the utilization of thin-clients could produce substantial energy savings and reduce physical desktop replacement costs. Finally, virtualized desktops can be delivered to numerous non-enterprise devices, particularly student’s personal laptops or dorm-room computers. While there appear to be numerous benefits to desktop virtualization, there are many barriers to adoption. This paper outlines the substantial energy- and cost-savings provided through desktop virtualization in higher education. A literature review of relevant works and findings of a university implementation workgroup are presented using a case-study approach

    Mineral exploration potential of ERTS-1 data

    Get PDF
    The author has identified the following significant results. ERTS-1 imagery of an area approximately 15,000 square miles in Arizona was interpreted for regional structure and tectonic units. Eight fault systems were identified by trend, of which two, northeast and northwest, are considered to be related to porphyry copper mineralization. Nine tectonic units can be identified on the imagery as distinct geological identities. The boundaries between these units can be correlated with theoretical shear directions related to the San Andreas stress system. Fourier analysis of the N 50 W fault trend indicates a fundamental spacing between Fourier energy maxima that can be related to distances between copper deposits

    Externally Dispersed Interferometry for Precision Radial Velocimetry

    Get PDF
    Externally Dispersed Interferometry (EDI) is the series combination of a fixed-delay field-widened Michelson interferometer with a dispersive spectrograph. This combination boosts the spectrograph performance for both Doppler velocimetry and high resolution spectroscopy. The interferometer creates a periodic spectral comb that multiplies against the input spectrum to create moire fringes, which are recorded in combination with the regular spectrum. The moire pattern shifts in phase in response to a Doppler shift. Moire patterns are broader than the underlying spectral features and more easily survive spectrograph blurring and common distortions. Thus, the EDI technique allows lower resolution spectrographs having relaxed optical tolerances (and therefore higher throughput) to return high precision velocity measurements, which otherwise would be imprecise for the spectrograph alone.Comment: 7 Pages, White paper submitted to the AAAC Exoplanet Task Forc

    Low-cost point-focus solar concentrator, phase 1

    Get PDF
    The results of the preliminary design study for the low cost point focus solar concentrator (LCPFSC) development program are presented. A summary description of the preliminary design is given. The design philosophy used to achieve a cost effective design for mass production is described. The concentrator meets all design requirements specified and is based on practical design solutions in every possible way

    Coupling of Mouse Olfactory Bulb Projection Neurons to Fluctuating Odor Pulses

    Get PDF
    Odours are transported by turbulent air currents, creating complex temporal fluctuations in odour concentration that provide a potentially informative stimulus dimension. Recently, we have shown that mice are able to discriminate odour stimuli based on their temporal structure, indicating that information contained in the temporal structure of odour plumes can be extracted by the mouse olfactory system. Here, using in vivo extra- and intracellular electrophysiological recordings, we show that mitral and tufted cells (M/TCs) of the male C57BL/6 mouse olfactory bulb can encode the dominant temporal frequencies present in odour stimuli up to at least 20 Hz. A substantial population of cell-odour pairs showed significant coupling of their subthreshold membrane potential with the odour stimulus at both 2Hz (29/70) and the supra-sniff frequency 20Hz (24/70). Furthermore, M/TCs show differential coupling of their membrane potential to odour concentration fluctuations with tufted cells coupling more strongly for the 20Hz stimulation. Frequency coupling was always observed to be invariant to odour identity and M/TCs that coupled well to a mixture also coupled to at least one of the components of the mixture. Interestingly, pharmacological blocking of the inhibitory circuitry strongly modulated frequency coupling of cell-odour pairs at both 2Hz (10/15) and 20Hz (9/15). These results provide insight into how both cellular and circuit properties contribute to the encoding of temporal odour features in the mouse olfactory bulb.SIGNIFICANCE STATEMENTOdours in the natural environment have a strong temporal structure which can be extracted and used by mice in their behaviour. Here, using in vivo extra- and intracellular electrophysiological techniques, we show that the projection neurons in the olfactory bulb can encode and couple to the dominant frequency present in an odour stimulus. Furthermore, frequency coupling was observed to be differential between mitral and tufted cells, was odour-invariant but strongly modulated by local inhibitory circuits. In summary, this study provides insight into how both cellular and circuit properties modulate encoding of odour temporal features in the mouse olfactory bulb

    A Geospatial Habitat Suitability Model to Determine the Spatial and Temporal Variability of \u3ci\u3eUlva\u3c/i\u3e Blooms in Jamaica Bay, New York

    Full text link
    The main objective of this study involves the development of a habitat suitability model for the Ulva genus in Jamaica Bay, New York. This incorporates several steps that were initiated by the selection of the most suitable water quality parameters that facilitate the successful growth of Ulva. These water quality parameters include dissolved oxygen, pH, temperature, salinity, nitrate + nitrite, ammonium, phosphates, dissolved organic nitrogen, dissolved organic carbon, depth and Secchi depth. This water quality data was generated by the Department of Environmental Protection. The Secchi depth and Jamaica Bay bathymetry data were necessary for the calculation of the % light to bottom that has been vital to the development of this model. For model development, inverse distance weighted interpolation was used to generate water quality surfaces. Because Jamaica Bay possesses islands, a modelling challenge is presented. In order to take into account the presence of these islands, polyline data was included in the creation of the IDW surfaces so that hard lines can delineate the water column from the islands. This allowed better water quality analyses to be carried out. After the development of the IDW surfaces, scored ranges and weights were applied so that the more influential and important parameters for Ulva growth such as light, temperature and nutrients were highlighted and given higher weights than the other parameters. After the assignment of the scored ranges and weights using the reclassify and weighted sum tool in ArcGIS, these surfaces were summed to create habitat suitability models. These models were then validated using Ulva biomass data and subsequently, composite bands and iso cluster analysis using ArcGIS Pro. Ulva biomass data were collected in 2012, 2015 and 2017. The 2017 sampling sites that were used in both biomass and satellite imagery analyses were Marine Park, Plumb beach, Big Egg, Cross bay bridge and Norton basin. In the iso cluster and composite band analyses, several band combinations were applied to visualize the algal/phytoplankton content of the bay. The most effective visualizations were obtained from 12-8-3, 12-11-4 and 4-8-11 based on the combined comparisons for both random and non-random analyses for biomass, composite bands and iso clusters. Additionally, for the biomass-model prediction comparisons, there was a 40.6% match rate. However, when biomass data comparisons were combined with that of the iso clusters and the composite bands, the model assessment was increased to 73.4% for 12-8-3 and 70.3% for several other combinations that includes 11-8-2, 12-8-4, 8-3-2, 12-11-4 and 4-8-11. However, for the random point model assessment, there was a 62.4% overall model accuracy for band combination 12-11-4. Overall, the model assessment has shown acceptability based on Holmes et al. (2008): 67-84%, Renken and Mumby (2009): 55-100%, and Zavalas et al. (2014): \u3e70% acceptability scales

    Training duration may not be a predisposing factor in potential maladaptations in talent development programmes that promote early specialisation in elite youth soccer

    Get PDF
    Purpose To determine whether training duration is a predisposing factor in potential maladaptations in talent development programmes that promote early specialisation in elite youth soccer. Methods Training times and type of 184 elite soccer players, from the under-9 to under-21 age groups (age 9.4 to 18.4 yrs; stature 1.38 to 1.82 m; body mass 32.2 to 76.2 kg) were recorded. Results Total training time progressively increased between the under-9 (268 ± 25 min/week) and under-14 (477 ± 19 min/week) groups with the majority of training time (96.5 ± 3.9%) consisting of soccer training and matches. Total training time then subsequently reduced from under-14 to under-15 (266 ± 77 min/week) groups, with no differences in training time between under-15 and under-21. Only under-15 to under-21 players completed resistance training; this inclusion coincided with a reduction in soccer training and match play when compared to time spent in these activities for younger groups (73.8 ± 3.2% of total training). Conclusion Data suggest that although the majority of training is focused on technical development, the training duration as a whole is unlikely to contribute to potential maladaptations in talent development programmes in elite youth soccer

    Software engineering group work - Personality, patterns and performance

    Full text link
    This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in SIGMIS-CPR '10, http://dx.doi.org/10.1145/1796900.1796921Proceedings of the 2010 Special Interest Group on Management Information System's 48th annual conference on Computer personnel research on Computer personnel research (Vancouver, BC, Canada)Software Engineering has been a fundamental part of many computing undergraduate courses for a number of years. Although many of the tools and techniques used to undertake software engineering have changed, the assessment has typically stayed the same. Students are commonly tasked with producing a number of software artefacts, for example designs using the Unified Modelling Language (UML). We recently attempted to extend the software engineering experience for a group of second year students with them participating in groups that attempt to replicate industrial practice. This paper reports our investigation into the correlation between the personality of group members, their approach with respect to using design patterns and their learning achievements

    Proton-Neutron Interaction near Closed Shells

    Full text link
    Odd-odd nuclei around double shell closures are a direct source of information on the proton-neutron interaction between valence nucleons. We have performed shell-model calculations for doubly odd nuclei close to 208^{208}Pb, 132^{132}Sn and 100^{100}Sn using realistic effective interactions derived from the CD-Bonn nucleon-nucleon potential. The calculated results are compared with the available experimental data, attention being focused on particle-hole and particle-particle multiplets. While a good agreement is obtained for all the nuclei considered, a detailed analysis of the matrix elements of the effective interaction shows that a stronger core-polarization contribution seems to be needed in the particle-particle case.Comment: 8 pages, 6 figures, Proccedings of the International Conference "Nuclear Structure and Related Topics", Dubna, Russia, September 2-6, 2003, to be published in Yadernaia Fizika (Physics of Atomic Nuclei
    corecore