2,052 research outputs found

    Cartographic evaluation of Skylab S-192 scanner images

    Get PDF
    There are no author-identified significant results in this report

    Cartographic evaluation of Skylab-A S-192 scanner images

    Get PDF
    There are no author-identified significant results in this report

    A tale of two courses: challenging Millenials to experience culture through film

    Get PDF
    In this article, we discuss how adding a final film project to a revised \u27Culture through Film\u27 course led to deeper student learning and higher rates of student success, as well as increased student satisfaction. Ultimately, we urge social science educators to include experiential projects in their courses that connect to all learning styles. Such projects should also challenge students to \u27create\u27, a task that requires generating ideas, planning and ultimately producing something, which, according to Bloom\u27s taxonomy, engages students in the highest cognitive process (Anderson and Krathwohl 2000). Although this class focused on the intersections of culture and film and was taught at an American university, we believe these lessons apply more broadly

    Homophobia: An Autoethnographic Story

    Get PDF
    This article is an autoethnographic account of one person’s struggle with homophobia. It chronicles the experiences and internal battle of the author as she struggles to understand and be accepting of homosexuality. The author identifies and discusses messages received, in early childhood and adulthood, as it relates to homosexuality and gender. These messages encompass religious ideology, as well as family and community beliefs toward gay/lesbian individuals

    Making Cyberspace Safe for Democracy: The Challenge Posed by Denial-of-Service Attacks

    Get PDF
    In December 2010, the British government braced itself for a sudden threat: Overnight, tens of thousands of people had acquired a weapon called the Low Orbit lon Cannon (LOIC). The good news for British authorities was that this cannon is not actually a space laser or hardly even a weapon; it is an old diagnostic computer program that allows an individual to test a network\u27s capacity to handle traffic by sending information to the network\u27s servers. The bad news was that a nebulous online hacking collective called Anonymous was successfully encouraging these tens of thousands of people to use this tool to disrupt the availability of the websites of a few major corporations. The program allowed individuals to participate in organized attempts to overwhelm each company\u27s servers with information-so much information that those servers could not process other users\u27 normal requests for access. The goal of this type of assault, known as a denial-of-service (DOS) attack, is to disrupt a target organization\u27s online presence for as long as the attacking computers continue to send such information. The immediate consequence of a successful attack is somewhat anticlimactic: The target organization\u27s website simply fails to load upon request. Nevertheless, the idea that thousands of nameless, faceless individuals could have banded together to produce that result adds social significance to what would otherwise be a purely technical problem

    Chicken Bog and the Shared Traditions of Horry County, SC

    Get PDF
    This paper discusses the shared traditions of a dish local to Horry County, SC. That dish is Chicken Bog or Pilau. This dish tells us a rich story about the diversity of South Carolina

    A comparison of performance on a tele-robotic search task under different conditions of navigation

    Get PDF
    This study investigated the impact of the design of robotic navigation algorithms on human performance in a searching task. Participants searched for targets in a real-world environment using a tele-robot in the context of an urban search-and-rescue task. Participants were assigned to one of three conditions for the navigation of the tele-robot around the search area: tele-operation or automated navigation using one of two different algorithms. Participants in the left-wall algorithm condition found significantly more targets that were of medium-high difficulty to identify. In addition, participants in the tele-operation condition used two distinctly different approaches to navigate around the search area. This evidence suggests that the development of path planning algorithms needs to be tailored to the operator. The knowledge that there are differences in algorithms from the human perspective provides an additional metric for the robotics community to decide between algorithms that are otherwise equivalent. Acknowledging the effect of differences in these algorithms when making design choices is important for the success of the human-robot partnership

    With Effort Things Can Change

    Get PDF

    Some Problems in the Formal Definition of Interior Monologue

    Get PDF
    Article人文科学論集 11: 63-72(1976)departmental bulletin pape
    • …
    corecore