68 research outputs found

    Use of computers in the early elementary classroom

    Get PDF
    Microcomputers are becoming increasingly more common in today\u27s society. The cost of the unit Is decreasing, more software is available, and the quality has improved. As computer usage becomes more common in society, schools must respond through educational preparation and utilization. The number of pub I le school computers more than tripled between 1980 and 1982, increasing to nearly 100,000 by the spring of 1982 (Magarrel I, 1982). Between 1980 and 1982 the number of home computers l n use grew more than seven-fold and the number of educational programs available for these micros increased more than ten-fold (Zlajku, 1983). Due to this growing availability, the curriculum in many schools currently includes work on the microcomputer. Given the potential impact of the computer on the educational development of children, it ls essential that computer training be offered in the schools. There ls much controversy, however, over the question of the age, or grade at which computer instruction should begin

    Infection of Mice with the Agent of Human Granulocytic Ehrlichiosis after Different Routes of Inoculation

    Get PDF
    Population kinetics of the agent of human granulocytic ehrlichiosis (aoHGE) were examined after needle and tickborne inoculation of C3H mice. Blood, skin, lung, spleen, liver, kidney, brain, lymph node, and bone marrow samples were analyzed by using real-time polymerase chain reaction (PCR) at various intervals after inoculation, using a p44 gene target. The highest number of copies of the p44 gene target occurred in blood and bone marrow samples, emphasizing aoHGE leukocytotropism. Numbers of copies of the p44 gene target in other tissues reflected vascular perfusion rather than replication. Needle-inoculated infected mice had earlier dissemination, but kinetics of infection in both groups were parallel, with declining rates of infection by day 20 and recovery in some mice on days 20-60 after inoculation. On the basis of an aoHGE lysate ELISA, mice seroconverted by day 10 after inoculation. Therefore, real-time PCR is useful for quantitative studies with the aoHGE in experimental infections, and results showed that needle inoculation can be used to study the aoHGE infection because of its similarity to tickborne inoculatio

    Behavioural responses to unexpected changes in reward quality

    Get PDF
    Successive negative contrast (SNC) effects are changes in anticipatory or consummatory behaviour when animals unexpectedly receive a lower value reward than they have received previously. SNC effects are often assumed to reflect frustration and appear to be influenced by background affective state. However, alternative explanations of SNC, such as the functional-search hypothesis, do not necessarily imply an aversive affective state. We tested 18 dogs in a SNC paradigm using a patch foraging task. Dogs were tested in two conditions, once with the low value reward in all of five trials (unshifted) and once when reward value was altered between high and low (shifted). Following a reward downshift, subjects showed a SNC effect by switching significantly more often between patches compared to the unshifted condition. However, approach latency, foraging time and quantity consumed did not differ between conditions, suggesting non-affective functional search behaviour rather than frustration. There was no relationship between strength of SNC and anxiety-related behaviours as measured in a novel object test and a personality questionnaire (C-BARQ). However, associations with the C-BARQ scores for Trainability and Stranger directed aggression suggest a possible link with behavioural flexibility and coping style. While reward quality clearly affects incentive motivation, the relationship between SNC, frustration and background affective state requires further exploration

    Customer Segments

    No full text
    Presented on January 27, 2016 at 11:00 a.m. in the TSRB Banquet Hall.Paul Freet teaches entrepreneurship for the National Science Foundation and at universities throughout the southeast. Paul also works with professors and researchers at Georgia Tech to create startup companies based on their research. He was the founder and CEO of VC-backed ATDC graduate company Racemi.Runtime: 48:30 minutesWho's the customer? User? Payer? How are they different? Why do they buy? How can you reach them? How is a business customer different from a consumer? What's a multi-sided market? What's segmentation? What's an archetype

    A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency

    No full text
    The flood of raw data generated by intrusion detection and other network monitoring devices can be so overwhelming that it causes great difficulty in detecting patterns that might indicate malicious traffic. In order to more effectively monitor and process network and forensic data within a virtualized environment, Security Visualization (SecViz) provides software-based visual interfaces to analyze live and logged network data within the domains of network security, network and cloud forensics, attack prevention, compliance management, wireless security, secure coding, and penetration testing. Modern networks generate enormous amounts of data that is often stored in logs. Due to the lack of effective approaches to organizing and visualizing log data, most network monitoring tools focus at a high level on data throughput and efficiency, or dig too far down into the packet level to allow for useful analysis by network administrators. SecViz offers a simpler and more effective approach to analyzing the massive amounts of log data generated on a regular basis. Graphical representations make it possible to identify and detect malicious activity, and spot general trends and relationships among individual data points. The human brain can rapidly process visual information in a detailed and meaningful manner. By converting network security and forensic data into a human-readable picture, SecViz can address and solve complex data analysis challenges and significantly increase the efficiency by which data is processed by information security professionals. This study utilizes the Snort intrusion detection system and SecViz tools to monitor and analyze various attack scenarios in a virtualized cloud computing environment. Real-time attacks are conducted in order to generate traffic and log data that can then be re-played in a number of software applications for analysis. A Java-based program is written to aggregate and display Snort data, and then incorporated into a custom Linux-based software environment along with select open-source SecViz tools. A methodology is developed to correlate Snort intrusion alerts with log data in order to create a visual picture that can significantly enhance the identification of malicious network activity and discrimination from normal traffic within a virtualized cloud-based network

    Immunogenicity of Borrelia burgdorferi Arthritis-Related Protein

    No full text
    Immunization against arthritis-related protein (Arp) elicits antibody in mice that resolves arthritis but is not protective against challenge with Borrelia burgdorferi. In mice immunized against Arp, an unrelated 37-kDa protein (P37-42), outer surface protein A (OspA), or glutathione S-transferase (GT) and then challenged by syringe or tick, only OspA conferred protection. Passive transfer of Arp antiserum into infected SCID mice induced arthritis resolution, but antisera to P37-42, OspA, GT, or six overlapping Arp peptide fragments did not. Results suggest that the arthritis-resolving immunogenicity is specific to Arp, but the relevant epitopes may be conformational

    Is prophylactic immunosuppressive therapy for patients with a history of postsurgical pyoderma gangrenosum necessary?

    No full text
    Postsurgical pyoderma gangrenosum (PSPG) is a rare but serious surgical complication with a predilection for the breast and abdomen. Immunosuppression is the mainstay of treatment of PSPG. In addition, it has become a common practice for clinicians to prophylactically treat patients with a history of PSPG with corticosteroids or immunomodulators during subsequent operative procedures to prevent recurrence. Although many practitioners have reported successful outcomes with these measures, currently no protocol exists for prophylactic perioperative therapy. Here, we present the clinical course and 10-year follow-up of a woman who developed PSPG after undergoing body-contouring surgery, subsequently underwent multiple operative procedures without prophylactic immunosuppression, and has not experienced recurrence of PSPG. This case suggests that prophylactic therapy may not be necessary in all patients with a history of PSPG and shows that further research into the use of perioperative immunosuppression to prevent PSPG recurrence may be warranted

    Open source cloud management platforms and hypervisor technologies: A review and comparison

    No full text
    International audienceCloud computing continues to redefine the way in which organizations utilize information technology by providing increased flexibility, reduced cost of ownership and maintenance, massive scalability, and on-demand/pay-as-you-go services. Virtual and cloud technology replaces traditional IT products with services that can be purchased as-needed without the overhead of dedicated IT resources and staff. Public and private clouds are deployed using many different software platforms such as Eucalyptus, Xen, OpenStack, CloudStack and Amazon Web Services. This paper compares many popular cloud deployment platforms and related hypervisor technologies for implementing effective cloud-based computing services

    Open source cloud management platforms and hypervisor technologies: A review and comparison

    No full text
    International audienceCloud computing continues to redefine the way in which organizations utilize information technology by providing increased flexibility, reduced cost of ownership and maintenance, massive scalability, and on-demand/pay-as-you-go services. Virtual and cloud technology replaces traditional IT products with services that can be purchased as-needed without the overhead of dedicated IT resources and staff. Public and private clouds are deployed using many different software platforms such as Eucalyptus, Xen, OpenStack, CloudStack and Amazon Web Services. This paper compares many popular cloud deployment platforms and related hypervisor technologies for implementing effective cloud-based computing services
    • …
    corecore