57 research outputs found

    Diagnosing collaboration in practice-based learning: Equality and intra-individual variability of physical interactivity

    Get PDF
    Collaborative problem solving (CPS), as a teaching and learning approach, is considered to have the potential to improve some of the most important skills to prepare students for their future. CPS often differs in its nature, practice, and learning outcomes from other kinds of peer learning approaches, including peer tutoring and cooperation; and it is important to establish what identifies collaboration in problem-solving situations. The identification of indicators of collaboration is a challenging task. However, students physical interactivity can hold clues of such indicators. In this paper, we investigate two non-verbal indexes of student physical interactivity to interpret collaboration in practice-based learning environments: equality and intra-individual variability. Our data was generated from twelve groups of three Engineering students working on open-ended tasks using a learning analytics system. The results show that high collaboration groups have member students who present high and equal amounts of physical interactivity and low and equal amounts of intra-individual variability

    Effects of zilpaterol hydrochloride and zinc methionine on growth performance and carcass characteristics of beef bulls

    Get PDF
    Sixty beef bulls with a body weight (BW) of 314.79 16.2 kg were used to evaluate the effects of zilpaterol hydrochloride (ZH) and zinc methionine (ZM) on growth performance and carcass characteristics. The experimental design was a randomized complete block, with a factorial 22 arrangement of treatments (ZH: 0 and 0.15 mg kg 1 BW; ZM: 0 and 80 mg kg 1 dry matter). The ZH increased (PB0.05) the final BW, average daily gain, feed conversion, carcass yield and longissimus dorsi area. Bulls fed ZH plus ZM had less (PB0.01) backfat thickness and intramuscular fat (IMF) compared with those fed ZH or ZM alone. The ZH increased (PB0.02) the meat crude protein content and cooking loss. It is therefore concluded that ZH increases growth performance, carcass yield, longissimus dorsi area, and meat crude protein. The interaction of ZM and ZH did not present additional advantages. The reason for the reduction in backfat thickness and IMF by ZH plus ZM is unclear, and implies that our knowledge of b-agonistic adrenergic substances and their interactions with minerals is incomplete

    Evidence for a retroviral insertion in TRPM1 as the cause of congenital stationary night blindness and leopard complex spotting in the horse

    Get PDF
    Leopard complex spotting is a group of white spotting patterns in horses caused by an incompletely dominant gene (LP) where homozygotes (LP/LP) are also affected with congenital stationary night blindness. Previous studies implicated Transient Receptor Potential Cation Channel, Subfamily M, Member 1 (TRPM1) as the best candidate gene for both CSNB and LP. RNA-Seq data pinpointed a 1378 bp insertion in intron 1 of TRPM1 as the potential cause. This insertion, a long terminal repeat (LTR) of an endogenous retrovirus, was completely associated with LP, testing 511 horses (χ²=1022.00, p<<0.0005), and CSNB, testing 43 horses (χ2=43, p<<0.0005). The LTR was shown to disrupt TRPM1 transcription by premature poly-adenylation. Furthermore, while deleterious transposable element insertions should be quickly selected against the identification of this insertion in three ancient DNA samples suggests it has been maintained in the horse gene pool for at least 17,000 years. This study represents the first description of an LTR insertion being associated with both a pigmentation phenotype and an eye disorder.Rebecca R. Bellone … David L. Adelson, Sim Lin Lim … et al

    Towards complete node enumeration in a peer-to-peer botnet

    No full text
    Modern advanced botnets may employ a decentralized peer-to-peer overlay network to bootstrap and maintain their command and control channels, making them more resilient to traditional mitigation efforts such as server incapacitation. As an alternative strategy, the malware defense community has been trying to identify the bot-infected hosts and enumerate the IP addresses of the participating nodes so that the list can be used by system administrators to identify local infections, block spam emails sent from bots, and configure firewalls to protect local users. Enumerating the infected hosts, however, has presented challenges. One cannot identify infected hosts behind firewalls or NAT devices by employing crawlers, a commonly used enumeration technique where recursive get-peerlist lookup requests are sent newly discovered IP addresses of infected hosts. As many bot-infected machines in homes or office

    The Harvester, the Botmaster, and the Spammer : On the Relations Between the Different Actors in the Spam Landscape

    No full text
    A spammer needs three elements to run a spam operation: a list of victim email addresses, content to be sent, and a bot-net to send it. Each of these three elements are critical for the success of the spam operation: a good email list should be composed of valid email addresses, a good email content should be both convincing to the reader and evades anti-spam filters, and a good botnet should efficiently sent spam. Given how critical these three elements are, figures special-ized on each of these elements have emerged in the spam ecosystem. Email harvesters crawl the web and compile email lists, botmasters infect victim computers and main-tain efficient botnets for spam dissemination, and spammers rent botnets and buy email lists to run spam campaigns. Previous research suggested that email harvesters and bot-masters sell their services to spammers in a prosperous un-derground economy. No rigorous research has been per-formed, however, on understanding the relations between these three actors. This paper aims to shed some light on the relations between harvesters, botmasters, and spam-mers. By disseminating email addresses on the Internet, fingerprinting the botnets that contact these addresses, and looking at the content of these emails, we can infer the re-lations between the actors involved in the spam ecosystem. Our observations can be used by researchers to develop more effective anti-spam systems. Categories and Subject Descriptors K.4.1 [Computers and Society]: Abuse and crime involv-ing computer
    • …
    corecore