630 research outputs found

    Cliff top habitats provide important alternative feeding resources for wading birds of conservation importance wintering on non-estuarine coasts

    Get PDF
    Rocky shores and beaches are important over-wintering areas for non-estuarine waders but have rarely been studied. We examined cliff top habitat use by 6 species of wader over 75 km of coast to assess their potential value as alternative feeding sites to rocky and sandy shores. Both the regional and local survey showed that waders occurred on golf courses and recreational grasslands in higher frequencies than expected but arable and pasture use was lower than expected. We also compared local wader densities on rocky and sandy shores, pastures, golf courses, caravan parks and recreational grasslands over two winters. Sanderling predominantly fed on the beach whereas Oystercatcher, Dunlin, Turnstone and Redshank numbers significantly increased on golf courses and recreational grasslands over the winter period, with pasture being rarely used. General linear models were used to relate environmental factors to the presence and absence of each species on the cliff top habitats. Redshank was the only species that showed a higher probability of occurrence on cliff top habitats at high tide whereas the probability of Turnstone, Oystercatcher and Redshank occurring increased as temperatures declined. Using core sampling, we determined that invertebrate richness and abundance was significantly higher on the recreational grasslands and golf courses than on the pasture or the beach. Our data demonstrated that cliff top habitats are important alternative feeding areas for over-wintering waders in areas where the intertidal is bounded by cliffs. Current management creates short sward, open field habitats with a diverse and abundant invertebrate food supply exploited by waders. Any alterations to the land use of these areas should be carefully considered by planning authorities in light of the fact that they support species that are of conservation concern

    Are we all on the same page? Teacher, graduate and student perceptions of the importance of skills thought to enhance employability

    Get PDF
    Graduate employability is a key issue for Higher Education Institutions (HEIs), academic faculty and of course for students themselves. It is recognised that to be employable graduates require both discipline specific skills/knowledge and more generic skills for employment. A key step to the development of the latter is an understanding of their significance on the part of those designing courses and the students who take them. Here we compare the perceived importance of key skills from the perspective of teachers, current students and recent graduates. We find that the three groups differ in the relative importance they ascribe to several key skills. Staff rated all skills as being important and saw many as being more important than did their students. With hindsight, graduates prioritized skills that were not seen as being very important by current students. As a result of our synthesizing the views of current undergraduates, employed graduates and lecturing staff, we recommend that proper signposting of the significance of key skills to students is vital

    Investigating attitudes towards online safety and security, and evaluating a peer-led Internet safety programme for 14– to 16-year-olds: final report

    Get PDF
    Research Grants 2009 - Harnessing Technology Project. Recognising the significant e-safety issues facing young people, students aged between 14 and 16 were encouraged to engage peer-based activities to raise their own awareness of threats and appropriate responses

    A user-oriented network forensic analyser: the design of a high-level protocol analyser

    Get PDF
    Network forensics is becoming an increasingly important tool in the investigation of cyber and computer-assisted crimes. Unfortunately, whilst much effort has been undertaken in developing computer forensic file system analysers (e.g. Encase and FTK), such focus has not been given to Network Forensic Analysis Tools (NFATs). The single biggest barrier to effective NFATs is the handling of large volumes of low-level traffic and being able to exact and interpret forensic artefacts and their context – for example, being able extract and render application-level objects (such as emails, web pages and documents) from the low-level TCP/IP traffic but also understand how these applications/artefacts are being used. Whilst some studies and tools are beginning to achieve object extraction, results to date are limited to basic objects. No research has focused upon analysing network traffic to understand the nature of its use – not simply looking at the fact a person requested a webpage, but how long they spend on the application and what interactions did they have with whilst using the service (e.g. posting an image, or engaging in an instant message chat). This additional layer of information can provide an investigator with a far more rich and complete understanding of a suspect’s activities. To this end, this paper presents an investigation into the ability to derive high-level application usage characteristics from low-level network traffic meta-data. The paper presents a three application scenarios – web surfing, communications and social networking and demonstrates it is possible to derive the user interactions (e.g. page loading, chatting and file sharing ) within these systems. The paper continues to present a framework that builds upon this capability to provide a robust, flexible and user-friendly NFAT that provides access to a greater range of forensic information in a far easier format

    Strategies Used by Hospitals in a Southeastern State to Reduce Catheter Associated Urinary Tract Infections: Comparing the Outcomes by Hospital Structure and Processes

    Get PDF
    Catheter-Associated Urinary Tract Infections are considered a clinical indicator of quality of care. A descriptive research study was conducted to identify the strategies used by hospitals to reduce or eliminate CAUTIs. Infection Control Preventionists were surveyed. In a predominately rural southeastern state, this study demonstrated that about 40% of hospitals surveyed are implementing CAUTI prevention processes

    First results from the LUCID-Timepix spacecraft payload onboard the TechDemoSat-1 satellite in Low Earth Orbit

    Full text link
    The Langton Ultimate Cosmic ray Intensity Detector (LUCID) is a payload onboard the satellite TechDemoSat-1, used to study the radiation environment in Low Earth Orbit (\sim635km). LUCID operated from 2014 to 2017, collecting over 2.1 million frames of radiation data from its five Timepix detectors on board. LUCID is one of the first uses of the Timepix detector technology in open space, with the data providing useful insight into the performance of this technology in new environments. It provides high-sensitivity imaging measurements of the mixed radiation field, with a wide dynamic range in terms of spectral response, particle type and direction. The data has been analysed using computing resources provided by GridPP, with a new machine learning algorithm that uses the Tensorflow framework. This algorithm provides a new approach to processing Medipix data, using a training set of human labelled tracks, providing greater particle classification accuracy than other algorithms. For managing the LUCID data, we have developed an online platform called Timepix Analysis Platform at School (TAPAS). This provides a swift and simple way for users to analyse data that they collect using Timepix detectors from both LUCID and other experiments. We also present some possible future uses of the LUCID data and Medipix detectors in space.Comment: Accepted for publication in Advances in Space Researc

    A forensically-enabled IASS cloud computing architecture

    Get PDF
    Current cloud architectures do not support digital forensic investigators, nor comply with today’s digital forensics procedures largely due to the dynamic nature of the cloud. Whilst much research has focused upon identifying the problems that are introduced with a cloud-based system, to date there is a significant lack of research on adapting current digital forensic tools and techniques to a cloud environment. Data acquisition is the first and most important process within digital forensics – to ensure data integrity and admissibility. However, access to data and the control of resources in the cloud is still very much provider-dependent and complicated by the very nature of the multi-tenanted operating environment. Thus, investigators have no option but to rely on cloud providers to acquire evidence, assuming they would be willing or are required to by law. Furthermore, the evidence collected by the Cloud Service Providers (CSPs) is still questionable as there is no way to verify the validity of this evidence and whether evidence has already been lost. This paper proposes a forensic acquisition and analysis model that fundamentally shifts responsibility of the data back to the data owner rather than relying upon a third party. In this manner, organisations are free to undertaken investigations at will requiring no intervention or cooperation from the cloud provider. The model aims to provide a richer and complete set of admissible evidence than what current CSPs are able to provide

    Is Restorative Justice Doing Enough To Address The Power Imbalances Caused By Systems of Privilege and Oppression

    Get PDF
    Restorative justice is an ever growing philosophy which is causing a paradigm shift in the way society understands and responds to crime, punishment and victimization. The State of Vermont has become a pioneer and an example of how to implement restorative practices into the official criminal justice system, developing an alternative process to traditional punitive approaches. However, it is now more important than ever to ensure that there is not a false sense of success or a level of complacency in the further development of restorative practices. It is time to critically analyse the current restorative process and explore the difficult question of whether these practices are doing enough to address the power imbalances caused by systems of privilege and oppression. This study conducts an Oppression Theory based analysis of the restorative practices taking place at a Vermont Community Justice Center and a Vermont High School. The analysis breaks down the impacts of systems of privilege and oppression at the micro and macro level. At the micro level, it explores how conferred dominance and learned societal behaviours that are dictated by an individual’s social identity groups, can impact their willingness and ability to meaningfully engage in restorative practices. At the macro level, it explores the concept of a societal disequilibrium and the danger of restorative practices perpetuating systems of inequality and oppression. This study finds that several individuals engaging in the restorative practices it explored did not acknowledge the impacts that systems of privilege and oppression can have of the restorative process. Those who were able to identify the negative effects that inequalities can have on restorative practices, did not appear to have the knowledge or resources to address such issues. Therefore, the author of this study designed “A Restorative Justice Course: Understanding Privilege and Oppression” (pg. 28-49), which is a practical Oppression Theory based framework to help restorative practitioners better understand the impacts of societal inequality. It is an easily accessible, adaptable and implementable framework which can be used to further develop restorative practices and to ensure those who engage in restorative processes do so in a more socially conscious way

    Teacher and student perceptions of the development of learner autonomy : a case study in the biological sciences

    Get PDF
    Biology teachers in a UK university expressed a majority view that student learning autonomy increases with progression through university. A minority suggested that pre-existing diversity in learning autonomy was more important and that individuals not cohorts differ in their learning autonomy. They suggested that personal experience prior to university and age were important and that mature students are more autonomous than 18-20 year olds. Our application of an autonomous learning scale (ALS) to four year-groups of biology students confirmed that the learning autonomy of students increases through their time at university but not that mature students are necessarily more autonomous than their younger peers. It was evident however that year of study explained relatively little
    corecore