3,671 research outputs found

    On Pottery

    Full text link
    One of my life’s most poignant moments came during my first lesson at the potter’s wheel. I’ll never forget how my teacher laid his hands over mine and helped direct the pressure needed to guide the clay into center. That moment when the clay ‘found’ center was absolutely electric. It tickled my innermost being in much the same way as feeling the faint kick of our first child in my expectant wife’s womb. Life yet-to-be-born was announcing itself

    Assessment of the Distribution and Abundance of Coastal Sharks in the U.S. Gulf of Mexico and Eastern Seaboard, 1995 and 1996

    Get PDF
    During 1995 and 1996, the National Marine Fisheries Service (NMFS), conducted pilot studies to develop survey methodology and a sampling strategy for assessment of coastal shark populations in the Gulf of Mexico and western North Atlantic. Longline gear similar to that used in the commercial shark fishery was deployed at randomly selected stations within three depth strata per 60 nautical mile gridf rom Brownsville, Tex. to Cape Ann, Mass. The survey methodology and gear design used in these surveys proved effective for capturing many of the small and large coastal sharks regulated under the auspices of the 1993 Fisheries Management Plan (FMP) for Sharks oft he Atlantic Ocean. Shark catch rates, species composition, and relative abundance documented in these pilot surveys were similar to those reported from observer programs monitoring commercial activities. During 78 survey days, 269 bottom longline sets were completed with 879 sharks captured

    An evaluation of the RAPID assessment-based process improvement method for small firms

    Get PDF
    [Abstract]: With increasing interest by the software development community in software process improvement (SPI), it is vital that SPI programs are evaluated and the reports of lessons learned disseminated. This paper presents an evaluation of a program in which low-rigour, one-day SPI assessments were offered at no cost to 22 small Australian software development firms. The assessment model was based on ISO/IEC 15504 (SPICE). About twelve months after the assessment, the firms were contacted to arrange a follow-up meeting to determine the extent to which they had implemented the recommendations from the assessment. Comparison of the process capability levels at the time of assessment and the follow-up meetings revealed that the process improvement program was effective in improving the process capability of many of these small software development firms. Analysis of the assessment and follow-up reports explored important issues relating to SPI: elapsed time from assessment to follow-up meeting, the need for mentoring, the readiness of firms for SPI, the role of the owner/manager, the advice provided by the assessors, and the need to record costs and benefits. Based on a meta-analysis of the program and its outcomes, advice and recommendations are provided to small firms and assessors. As well as providing validation of the assessment model and method, the outcomes from this research have the potential to better equip practitioners and consultants to undertake software process improvement, hence increasing the success of small software development firms in domestic and global markets

    Engaging Student Veterans as Researchers: Libraries Initiating Campus Collaborations

    Get PDF
    Student veteran enrollment in higher education has increased significantly following the Post-9/11 GI Bill (Molina & Morse, 2015). The professional literature of academic libraries includes several examples of outreach to this growing population, most of which involve marketing to student veterans differently, customizing existing services and spaces for student veterans, and honoring student veterans for their military service. But reaching out to student veterans can be difficult. Student veterans frequently have work and family responsibilities competing for their time and attention, and, as outreach librarian and former Army sergeant Sarah LeMire notes in her 2015 ACRL contributed paper, they are often reluctant to participate in programs that make them seem more needy than other students. We expanded our library’s outreach to student veterans by hosting a symposium for student veterans to present their research projects. This approach is distinctive insofar as we address potential participants foremost as competent researchers, emphasizing their strengths rather than their needs. We also collaborated with various campus offices to integrate student veteran researchers into campus-wide research showcase events. This paper shares strategies for working with student veteran researchers and for securing buy-in among relevant campus stakeholders

    Extracting information from the signature of a financial data stream

    Full text link
    Market events such as order placement and order cancellation are examples of the complex and substantial flow of data that surrounds a modern financial engineer. New mathematical techniques, developed to describe the interactions of complex oscillatory systems (known as the theory of rough paths) provides new tools for analysing and describing these data streams and extracting the vital information. In this paper we illustrate how a very small number of coefficients obtained from the signature of financial data can be sufficient to classify this data for subtle underlying features and make useful predictions. This paper presents financial examples in which we learn from data and then proceed to classify fresh streams. The classification is based on features of streams that are specified through the coordinates of the signature of the path. At a mathematical level the signature is a faithful transform of a multidimensional time series. (Ben Hambly and Terry Lyons \cite{uniqueSig}), Hao Ni and Terry Lyons \cite{NiLyons} introduced the possibility of its use to understand financial data and pointed to the potential this approach has for machine learning and prediction. We evaluate and refine these theoretical suggestions against practical examples of interest and present a few motivating experiments which demonstrate information the signature can easily capture in a non-parametric way avoiding traditional statistical modelling of the data. In the first experiment we identify atypical market behaviour across standard 30-minute time buckets sampled from the WTI crude oil future market (NYMEX). The second and third experiments aim to characterise the market "impact" of and distinguish between parent orders generated by two different trade execution algorithms on the FTSE 100 Index futures market listed on NYSE Liffe

    The governance of European security

    Get PDF
    This article seeks to develop a concept of ‘security governance’ in the context of post-Cold War Europe. The validity of a governance approach lies in its ability to locate some of the distinctive ways in which European security has been coordinated, managed and regulated. Based on an examination of the way governance is utilised in other political fields of political analysis, the article identifies the concept of security governance as involving the coordinated management and regulation of issues by multiple and separate authorities, the interventions of both public and private actors (depending upon the issue), formal and informal arrangements, in turn structured by discourse and norms, and purposefully directed toward particular policy outcomes. Three issues are examined to demonstrate the utility of the concept of security governance for understanding security in post-Cold War Europe: the transformation of NATO, the Europeanisation of security accomplished through EU-led initiatives and, finally, the resultant dynamic relationship between forms of exclusion and inclusion in governance
    corecore