458 research outputs found

    The Information Behaviors of Fiction Writers: A Systematic Approach to an Understudied Information Community

    Get PDF
    Within the context of creative information communities in general, fiction writers remain a relatively understudied community. This article seeks to rectify that gap by highlighting the information behaviors of fiction writers, including the ways in which they network, as well as the processes they use when writing. In doing so, it reveals that fiction writers of all genres have many experiences in common, such as the seed incident that serves as the starting point when writing fiction. In addition, it examines fiction writers\u27 impact on readers, with the implication that everyone--writers and non-writers alike--would benefit from understanding fiction writers\u27 information behaviors. Most importantly, this literature review argues that further research on writers\u27 authorial archives would greatly enhance our understanding of this group\u27s information behaviors. These archives are arguably the single most valuable tool to understanding both fiction writers themselves and the writing process in general

    An Economic Analysis of Sediment Control Use at Construction Sites in Greenville County, South Carolina

    Get PDF
    Soil erosion from construction sites can cause sedimentation of nearby water bodies. Mandatory sediment controls can reduce sedimentation. What determines the degree to which sediment controls meet regulatory standards for installation and maintenance? A conditional-multinomial logit model is estimated with data from 85 construction sites that were audited in 2001 or 2005 in Greenville County, SC to determine whether 147 sediment ponds or traps were installed correctly, properly maintained, or both. Costs of maintenance positively affect the probability that a sediment pond or trap is properly maintained. Engineering experience positively affects the probability that a structure is properly maintained. Construction site distance from the county\u27s regulatory office positively affects the probability that a sediment control is installed incorrectly

    Learning Styles of Physical Therapy and Physical Therapist Assistant Students in Accredited Physical Therapy Programs

    Get PDF
    The purpose of this study was to determine the learning styles of Doctor of Physical Therapy (DPT) students and associate degree Physical Therapist Assistant (PTA) students and identify any association between their learning styles and examine the association between gender and age by learning style. Participants included 337 DPT and PTA students attending CAPTE accredited institutions with doctoral DPT or associate PTA programs in Tennessee and southwest Virginia. The Felder (1996) and Soloman Index of Learning Styles (ILS) was used to determine learning style preferences within 4 learning style dimensions (active-reflective, sensing-intuitive, visual-verbal, and sequential-global). Demographics included program of study, gender, age, ethnicity, and highest level of education. Participants were 18-63 years (mean age 25.87, standard deviation 5.62, median age 24); 205 (60.8%) DPT students, 132 (39.2%) PTA students; 205 (60.8%) female, 132 (39.2%) male. Five research questions with 20 null hypotheses were evaluated using Cross-tabulated tables with frequency counts, percentages, and chi square tests. Statistical significance was established using an .05 alpha. Only 1 null hypothesis was rejected (Ho51: There is no difference in the active-reflective learning style among PTA students by age). There was no significant difference between the learning styles of DPT and PTA students. Participants were found to be balanced on the active-reflective dimension, sensing on the sensing-intuitive dimension, visual on the visual-verbal dimension, and balanced on the sequential-global dimension; preferences were toward the active, sensing, visual, and sequential learning styles. This study demonstrated that DPT and PTA students have a balanced learning style with a strong preference toward active, sensing, visual, and sequential. Therefore, teaching methods should provide an instructional environment that addresses these learning style preferences. The student’s awareness of his or her learning style will enable the learner to capitalize on strengths and develop areas of weakness. This ability to employ effective learning strategies will equip an individual for the challenges of his or her chosen profession and lifelong learning

    Mathematical modeling of incompressible flow through a collapsible tube

    Get PDF
    An in-depth examination of eight articles pertaining to collapsible tube phenomenon is provided. Experimental models and mathematical models are explored. Two mathematical models are developed by the author, each of which attempt to reproduce experimental data provided by Lyon [37]. Respective models produce sets of coupled differential equations, and Advanced Continuous Simulation Language (ACSL) is utilized to solve these equations. Neither of the author\u27s models provides total numerical reproductions of the experimental data under consideration. However, general trends are obtained which correspond to those observed in Lyon\u27s data. General responses to variations in system parameters are provided for both models

    The Gestalt: A Secure, High Performance, Low Cost Satellite Ground Station Architecture and its Implementation

    Get PDF
    In this paper we present The Gestalt, a novel security methodology developed with support from the Office of Naval Research for satellite ground stations systems. While security is often a stated priority for these systems, often it is traded off for better performance, lower cost and reduced design complexity. We identified two main classes of security vulnerabilities that can be exploited by attackers in small-sat systems: 1) intentionally introduced supply chain vulnerabilities in both software and hardware, and 2) inadvertent coding and logic vulnerabilities in code. Our engineering methodology reduces the risk of attacks through four methods: 1. Debloating: Ground stations are complex and involve the integration of many hardware and software systems. This complexity makes them vulnerable to a range of software, and hardware based attacks. Our method of implementing what was previously software functionality in hardware through system debloating achieves this attack surface reduction. 2. Hardware synthesis from Specifications: The use of legacy-free high-level synthesis (HLS) for the specification of processing functions reduces implementation errors, increases productivity, and permits hardware validation using commercial software fuzz testing techniques. 3. Use of hardware scanning techniques: We use a novel method for performing security scans of hardware blocks generated by High-level Synthesis. This step reduces the risk of backdoors inserted by specification developers, attackers modifying the code without knowledge of developers or high-level synthesis tools going undetected. 4. Static memory allocation: A majority of software attacks today are due to memory safety problems in software: Microsoft revealed that 70% of the exploited software vulnerabilities are related to the absence of memory safety. When we use software in the The Gestalt, we take a radical approach to solving the pervasive memory safety problem by completely eliminating the use of dynamic memory. Instead, data processing takes place in hardware using static memory allocation. The result of these approaches is the Exos FEP, a tightly-integrated ground station system that operates in a bit-serial manner. Compared to conventional designs, the Exos FEP achieves high performance by implementing all data processing functions in hardware. Our solution is able to achieve data rates up to 125 Mbps per FPGA in a commodity, commercially cloud-based environment. Perhaps, the most important benefit is a 1000-fold reduction in lines of code compared to state-of-the-art FEP implementation, and achieves Zero Trust supply chain guarantees. With the increased adoption of smallsats, the security problems normally only associated with large military control centers are now spreading to smaller organizations which may not have the necessary security infrastructure to fully understand or cope with the threats. The possibility of using a security-forward approach such as The Gestalt methodology and the resulting ground system architecture and implementation are a promising approach for protecting the smallsat ecosystem

    Generation of frequency shifted picosecond pulses with low temporal jitter

    Get PDF
    Transient stimulated Raman scattering is used for the generation of a frequency shifted picosecond light pulse; part of this Raman shifted pulse is subsequently coherently scattered at a material excitation of a second Raman cell. Starting with the second harmonic pulse (tp = 4 ps) of a mode-locked Nd : glass laser system, both the stimulated and the coherently produced pulses have durations of 2.3 ps at different wavelengths. By the appropriate choice of the Raman medium pulses between 13 000 and 21 000 cm-1 can be generated. The coherent generation process minimizes the temporal jitter between the two pulses and allows to obtain a high time resolution of better than 0.3 ps in excite and probe experiments

    It’s the Experience Not the Format: Successful Techniques to Transition Social Justice Coursework To a Distance Delivery Format

    Get PDF
    “Research on multicultural learning has focused on formal and local settings, such as schools, but young people are interacting with, and therefore learning from, informal settings and nonlocal contexts, including online platforms.” (Kim, 2016, p. 1). The instructor must be vigilant in selecting online teaching pedagogy when offering sensitive topics of courses because face-to-face intimacy is usually a component of more traditional courses in diversity (Matloob Haghanikar, 2019). The purpose of this current paper is to align critical parts of an experiential race relations curriculum (Clarke, 2019; Kranz & Lund, 2004) in a face-to-face setting with digital technologies available for use in distance education, specifically synchronous and asynchronous online delivery. We outline the original course components and show how technology can be aligned
    corecore