12,399 research outputs found

    Rethinking practitioner research in education: not transcribing but reflecting and some reflections on the nature of practitioner research (2nd iteration – Cambridge)

    Get PDF
    This paper is intended to provoke discussion regarding how different types of research, particularly practitioner research and arts-based research, can inform each other and develop their own rationale for collecting and analysing research data as well as for generating new knowledge. The authors have different backgrounds, one in practitioner research (James), one in arts-based research (Selena) and one in leadership research (Joelma). This paper explores the commonalities they have found, in terms of searching for alternative methodologies for themselves and for those they work with. In this paper, we question some of the dominant approaches to qualitative research, including those that are highly influenced by grounded theory and that typically include creating new data through interviews, then transcribing and coding interviews. The pressure on teachers to find concrete strategies rather than investigate perceptions is discussed in the final section. The paper makes a case for original contributions and alternative approaches towards educational research freed from methodological conventions. It is intended to provoke discussion regarding where the boundaries of innovation may lie in terms of producing research that can still be seen as valid and useful to the researcher and to others. It is one of two papers written concurrently and delivered at conferences just a month apart. The other paper focuses explicitly on the dissemination of research and is entitled: Torn Between Expectations and Imagination: Alternative Forms of Communicating Educational Research (a short discussion paper reflecting on a workshop) (Yuan & Underwood, 2015)

    The M33 Synoptic Stellar Survey. II. Mira Variables

    Get PDF
    We present the discovery of 1847 Mira candidates in the Local Group galaxy M33 using a novel semi-parametric periodogram technique coupled with a Random Forest classifier. The algorithms were applied to ~2.4x10^5 I-band light curves previously obtained by the M33 Synoptic Stellar Survey. We derive preliminary Period-Luminosity relations at optical, near- & mid-infrared wavelengths and compare them to the corresponding relations in the Large Magellanic Cloud.Comment: Includes small corrections to match the published versio

    A Fallacy of Division: The Failure of Market Concentration as a Measure of Competition in U.S. Banking

    Get PDF
    Empirical literature and related legal practice using concentration as a proxy for competition measurement are prone to a fallacy of division, as concentration measures are appropriate for perfect competition and perfect collusion but not intermediate levels of competition. Extending the classic Cournot-type competition model of Cowling and Waterson (1976) and Cowling (1976) used to derive the Hirschman-Herfindahl Index (HHI) of market concentration, we propose an adaptation of this model that allows collusive rents for all, none, or some of the firms in a market. Application of our model to data for U.S. commercial banks in the period 1984-2004 confirms that concentration measures are unreliable competition metrics. While collusion is prevalent in the banking industry at the state level, the critical market shares at which market power is achieved, rents earned from collusion, and collusive concentration levels vary widely across states. These and other results lead us to conclude that a fallacy of division exists in concentration-based competition tests.SCP hypothesis, competition, Cournot, conjectural variation, efficiency hypothesis

    A study of turbulent flows about oscillating airfoils

    Get PDF
    Issued as Progress reports [1-6], and Technical report, Project no. E-16-66

    Practical security bounds against the Trojan-horse attack in quantum key distribution

    Full text link
    In the quantum version of a Trojan-horse attack, photons are injected into the optical modules of a quantum key distribution system in an attempt to read information direct from the encoding devices. To stop the Trojan photons, the use of passive optical components has been suggested. However, to date, there is no quantitative bound that specifies such components in relation to the security of the system. Here, we turn the Trojan-horse attack into an information leakage problem. This allows us quantify the system security and relate it to the specification of the optical elements. The analysis is supported by the experimental characterization, within the operation regime, of reflectivity and transmission of the optical components most relevant to security.Comment: 18 pages, 11 figures. Some typos correcte
    • …
    corecore