522 research outputs found

    In-Service Support for a Technological Approach to Science Education

    Get PDF
    Teaching/Communication/Extension/Profession,

    Bob Campbell statement about full participation within the system

    Get PDF
    Bob Campbell\u27s statement to the Bill of Rights Committee regarding proposal number 13 and full participation within the system.https://scholarworks.umt.edu/montanaconstitution/1142/thumbnail.jp

    Bob Campbell statement about the right to privacy

    Get PDF
    Bob Campbell\u27s statement to the Bill of Rights Committee regarding proposal number 33, the right to privacy.https://scholarworks.umt.edu/montanaconstitution/1143/thumbnail.jp

    The Writing and Ratification Of The 1992 Montana Constitution

    Get PDF

    Demonstration of adaptive overcurrent protection using IEC 61850 communications

    Get PDF
    This paper contains a description of an adaptive protection scheme that has been implemented and demonstrated in a hardware in the loop simulation environment using commercially available protection hardware and IEC 61850 communications.The implementation is based on an actual 11kV system which includes distributed generation and network automation. IEC 61850 communications offers several benefits for the implementation of adaptive protection, but also presents some limitations which are discussed in the paper. An alternative approach to overcome a number of the limitations is also presented

    Overcoming Privacy Challenges In Mobile-Cloud Computing

    Get PDF
    The integration of mobile devices with cloud computing systems results in a platform which is well-suited for the aggregation of customer behavior. Many organizations are capitalizing on this opportunity to harvest user data. They offer free software, content, and services in order to observe customer behavior. However, users have grown wary of increasingly comprehensive and granular profiling. The public’s rejection of certain applications show there is growing resistance to this business practice. The present study overcomes these concerns by proposing four alternative privacy models. The viability of these privacy models is assessed using a broad public survey. The results suggest that organizations can alleviate consumers’ privacy concerns by incorporating elements of the proposed alternative privacy models into their businesses

    Transcript for Episode 24: For Future Generations: Preamble & Environmental Provisions of 1972 Montana Constitution

    Get PDF
    https://digitalcommons.mtech.edu/crucible_transcriptions/1023/thumbnail.jp

    Talking science: the research evidence on the use of small-group discussions in science teaching

    Full text link
    This paper reports the findings of two systematic reviews of the use and effects of small-group discussions in high school science teaching. 94 studies were included in an overview (systematic map) of work in the area, and 24 studies formed the basis of the in-depth reviews. The reviews indicate that there is considerable diversity in the topics used to promote small-group discussions. They also demonstrate that students often struggle to formulate and express coherent arguments, and demonstrate a low level of engagement with tasks. The reviews suggest that groups function more purposefully, and understanding improves most, when specifically constituted such that differing views are represented, when some form of training is provided for students on effective group work, and when help in structuring discussions is provided in the form of 'cues'. Single sex groups function more purposefully than mixed sex groups, though improvements in understanding are independent of gender composition of groups. Finally, the reviews demonstrate very clearly that, for small-group discussions to be effective, teachers and students need to be given explicit teaching in the skills associated with the development of arguments and the characteristics associated with effective group discussions. In addition to the substantive findings, the paper also reports on key features of the methods employed to gather and analyse data. Of particular note are the two contrasting approaches to data analysis, one adopting a grounded theory approach and the other drawing on established methods of discourse analysis

    A Safety Net for Social Networking: Development of a Predictive Tool for Domestic Terrorism

    Get PDF
    There is a growing trend of disturbed individuals expressing their unhappiness with elements of government or society in general by committing violent acts. In a high number of these cases, the perpetrators gave clues through social networks as to what they planned to do beforehand. While technology can identify certain key words and phrases, it has not advanced to the point of being able to quickly discern between trivial and non-trivial threats. This paper describes ongoing research into developing a tool that can assist in the prediction of terroristic behavior using data from social networks combined with personal knowledge of the individual
    • …
    corecore