69,252 research outputs found

    Supporting learning beyond the classroom: developing the Northumbria Learner Support Model

    Get PDF
    Academic Libraries traditionally offered support for a variety of information related queries. As the storage and delivery of information changed, libraries increasingly became involved in supporting students to use the new technologies and the widening focus of Higher Education to encompass the development of skills for life, added another new dimension. It was no longer enough simply to provide students with an answer but rather to support them to develop the skills to enable them to find answers themselves. The impact of the widening participation agenda meant that different levels and methods of support were required as standard and often over a 24x7 period. The deficit support model began to give way to a more holistic, collaborative view of student support within libraries and learning styles/ help seeking behaviours began to be taken into account (Weaver 2008). The ‘Learner Support Model’ was introduced by Library and Learning Services in 2004/5 as part of an overall strategy to enhance student learning, retention, performance and achievement. All students do not automatically have effective research, IT or study skills but those who do develop those skills will make increased use of high quality information sources, are liable to return better academic performances and are therefore more likely to complete their programmes. The generic nature of the support model ensures that students can access support wherever they are; in whatever discipline area they are working and at whatever time they need it. In the four years since the model was implemented it has moved from a theoretical ideal to a well subscribed support service handling around 90,000 enquiries per year. The Learner Support Model has been showcased at conferences, evaluated through feedback and now developed to a position where it can be extended to other services and student facing academic support areas of Northumbria University and beyond

    Development of an Ant Colony Optimization Algorithm to improve Maintenance Process Efficiency

    Get PDF
    Efficient maintenance policies are of fundamental importance because of their fallbacks into the safety and economics of air traffic operations. Usually the optimization of maintenance process is limited to a resource optimization in position and number. But it should be considered that maintenance tasks are performed by man whose excessive workload has negative falls-out not only for workers well-being but also for process safety and efficiency. Thus, in maintenance process optimization it is necessary to take into account also ergonomic aspects of workplace. This gives rise to an optimization of the maintenance process by using an ergonomic approach. In this way, the result of the optimization could allow improvements in the quality of the work of maintenance, but also a greater efficiency of the whole maintenance system. An ant colony optimization algorithm has been developed in order to optimize the system efficiency. This kind of algorithm natively permits to improve man movements into the workplace; furthermore the optimization of the workplace ergonomics has been added. To do this, an objective function of efficiency levels has been determined, linked to any task performed by man. Some protocols have been created on the basis of a literature survey and experimental results. This paper illustrates an applied research in which a method for the optimization of the maintenance process efficiency has been developed in order to show the applicability of a tool offering benefits on both sides: the maintenance process and the related human factors

    Supporting Constructive Learning with a Feedback Planner

    Get PDF
    A promising approach to constructing more effective computer tutors is implementing tutorial strategies that extend over multiple turns. This means that computer tutors must deal with (1) failure, (2) interruptions, (3) the need to revise their tactics, and (4) basic dialogue phenomena such as acknowledgment. To deal with these issues, we need to combine ITS technology with advances from robotics and computational linguistics. We can use reactive planning techniques from robotics to allow us to modify tutorial plans, adapting them to student input. Computational linguistics will give us guidance in handling communication management as well as building a reusable architecture for tutorial dialogue systems. A modular and reusable architecture is critical given the difficulty in constructing tutorial dialogue systems and the many domains to which we would like to apply them. In this paper, we propose such an architecture and discuss how a reactive planner in the context of this architecture can implement multi-turn tutorial strategies

    Multivariate Hierarchical Frameworks for Modelling Delayed Reporting in Count Data

    Get PDF
    In many fields and applications count data can be subject to delayed reporting. This is where the total count, such as the number of disease cases contracted in a given week, may not be immediately available, instead arriving in parts over time. For short term decision making, the statistical challenge lies in predicting the total count based on any observed partial counts, along with a robust quantification of uncertainty. In this article we discuss previous approaches to modelling delayed reporting and present a multivariate hierarchical framework where the count generating process and delay mechanism are modelled simultaneously. Unlike other approaches, the framework can also be easily adapted to allow for the presence of under-reporting in the final observed count. To compare our approach with existing frameworks, one of which we extend to potentially improve predictive performance, we present a case study of reported dengue fever cases in Rio de Janeiro. Based on both within-sample and out-of-sample posterior predictive model checking and arguments of interpretability, adaptability, and computational efficiency, we discuss the advantages and disadvantages of each modelling framework.Comment: Biometrics (2019

    Assessment of available anatomical characters for linking living mammals to fossil taxa in phylogenetic analyses

    Get PDF
    ORCID: 0000-0003-4919-8655© 2016 The Authors. Published by the Royal Society under the terms of the Creative Commons Attribution License http://creativecommons.org/licenses/by/4.0/, which permits unrestricted use, provided the original author and source are credited. The file attached is the published version of the article

    Are U.S. CEOs Paid More than U.K. CEOs? Inferences from Risk- Adjusted Pay (CRI 2009-003)

    Get PDF
    We compute and compare risk-adjusted pay for US and UK CEOs, where the adjustment is based on estimated risk premiums stemming from the equity incentives borne by CEOs. Controlling for firm and industry characteristics, we find that US CEOs have higher pay, but also bear much higher stock and option incentives than UK CEOs. Using reasonable estimates of risk premiums, we find that risk-adjusted US CEO pay does not appear large compared to that of UK CEOs. We also examine differences in pay and equity incentives between a sample of non-UK European CEOs and a matched sample of US CEOs, and find that risk-adjusting pay may explain about half of the apparent higher pay for US CEOs

    InternalBlue - Bluetooth Binary Patching and Experimentation Framework

    Full text link
    Bluetooth is one of the most established technologies for short range digital wireless data transmission. With the advent of wearables and the Internet of Things (IoT), Bluetooth has again gained importance, which makes security research and protocol optimizations imperative. Surprisingly, there is a lack of openly available tools and experimental platforms to scrutinize Bluetooth. In particular, system aspects and close to hardware protocol layers are mostly uncovered. We reverse engineer multiple Broadcom Bluetooth chipsets that are widespread in off-the-shelf devices. Thus, we offer deep insights into the internal architecture of a popular commercial family of Bluetooth controllers used in smartphones, wearables, and IoT platforms. Reverse engineered functions can then be altered with our InternalBlue Python framework---outperforming evaluation kits, which are limited to documented and vendor-defined functions. The modified Bluetooth stack remains fully functional and high-performance. Hence, it provides a portable low-cost research platform. InternalBlue is a versatile framework and we demonstrate its abilities by implementing tests and demos for known Bluetooth vulnerabilities. Moreover, we discover a novel critical security issue affecting a large selection of Broadcom chipsets that allows executing code within the attacked Bluetooth firmware. We further show how to use our framework to fix bugs in chipsets out of vendor support and how to add new security features to Bluetooth firmware

    Habitual accountability routines in the boardroom: How boards balance control and collaboration

    Get PDF
    open3siCorporate accountability is a complex chain of reporting that reaches from external stakeholders into the organization’s management structure. The transition from external to internal accountability mechanisms primarily occurs at the board of directors. Yet outside of incentive mechanisms, we know surprisingly little about how internal actors (management) are held to account by the representatives of external shareholders (the board). This paper explores the process of accountability at this transition point by documenting the routines used by boards to hold the firm’s management to account. In so doing we develop our understanding of the important transition between internal and external firm accountability.embargoed_20190401Nicholson, Gavin; Pugliese, Amedeo; Bezemer, Pieter JanNicholson, Gavin; Pugliese, Amedeo; Bezemer, Pieter Ja
    • 

    corecore