308 research outputs found

    Student experiences of technology integration in school subjects: A comparison across four middle schools

    Get PDF
    This research examined student perspectives on their in-school, subject specific, technology use in four U.S. public schools. Considering students’ perspectives may provide a significant reframing of adult-created rhetoric of the utopian power of digital technologies for changing teaching and learning. A survey and focus group interviews were administered to 6th and 7th students (n=1,544) in four public middle schools, with varying demographics, that rely on local funding. These four schools revealed moderate use of many well-established digital technologies, such as word processing, presentation software, and quiz games. Students voiced outright hatred for teacher-directed PowerPoint-supported lectures, the most prominent technology activity students experienced, yet reported enjoying creation activities. The students in the rural school with a Hispanic-majority and high economically disadvantaged population reported much lower technology use. Discussion frame the digital inequities in the four schools and emphasizes the need for awareness and inclusion of students’ digital experiences to form any trajectory toward establishing digital equity and learning in schools

    Second-order schedules: Manipulation of brief-stimulus duration at component completion

    Get PDF
    In a second-order schedule, fixed-interval components were reinforced according to a variable-interval schedule. A brief stimulus accompanied the completion of each fixed interval. Brief-stimulus duration was varied across conditions from 0.5 to 8 sec. Patterning was greater the longer the duration of the stimulus. Additionally, exposure to relatively long brief-stimulus durations enhanced patterning upon reexposure to shorter brief-stimulus durations

    The effectiveness of the blended learning approach on digital literacy of middle school students with different daily Internet usage patterns

    Get PDF
    This study examined changes to middle school students’ digital literacy after engagement in a blended, technology-rich, project-based learning (BTP) environment. Guided by the social constructivist epistemology and the European Union’s DigComp 2.0 framework, this study attempted to understand how students’ digital literacy changes in a BTP environment differed, with respect to participants’ levels of daily Internet access time, and daily Internet usage purposes. Thus, this study applied a cross-sectional case study approach to middle-school participants of a BTP after-school program, across the spring and fall semesters of 2017 and 2018. Eighty middle school students completed the whole program and provided valid pre- and postdigital literacy questionaries’ responses, which presented different degrees of digital literacy changes. To investigate such variation, 58 out of the 80 students further completed an Internet use questionnaire and indicated a non-significance between (1) the students’ daily Internet use (access time and usage purposes) and digital literacy changes as well as (2) the students’ daily Internet usages purposes and digital literacy changes

    Event Horizons in Numerical Relativity I: Methods and Tests

    Full text link
    This is the first paper in a series on event horizons in numerical relativity. In this paper we present methods for obtaining the location of an event horizon in a numerically generated spacetime. The location of an event horizon is determined based on two key ideas: (1) integrating backward in time, and (2) integrating the whole horizon surface. The accuracy and efficiency of the methods are examined with various sample spacetimes, including both analytic (Schwarzschild and Kerr) and numerically generated black holes. The numerically evolved spacetimes contain highly distorted black holes, rotating black holes, and colliding black holes. In all cases studied, our methods can find event horizons to within a very small fraction of a grid zone.Comment: 22 pages, LaTeX with RevTeX 3.0 macros, 20 uuencoded gz-compressed postscript figures. Also available at http://jean-luc.ncsa.uiuc.edu/Papers/ Submitted to Physical Review

    CowPI::A rumen microbiome focussed version of the PICRUSt functional inference software

    Get PDF
    Metataxonomic 16S rDNA based studies are a commonplace and useful tool in the research of the microbiome, but they do not provide the full investigative power of metagenomics and metatranscriptomics for revealing the functional potential of microbial communities. However, the use of metagenomic and metatranscriptomic technologies is hindered by high costs and skills barrier necessary to generate and interpret the data. To address this, a tool for Phylogenetic Investigation of Communities by Reconstruction of Unobserved States (PICRUSt) was developed for inferring the functional potential of an observed microbiome profile, based on 16S data. This allows functional inferences to be made from metataxonomic 16S rDNA studies with little extra work or cost, but its accuracy relies on the availability of completely sequenced genomes of representative organisms from the community being investigated. The rumen microbiome is an example of a community traditionally underrepresented in genome and sequence databases, but recent efforts by projects such as the Global Rumen Census and Hungate 1000 have resulted in a wide sampling of 16S rDNA profiles and over 500 fully sequenced microbial genomes from this environment. Using this information we have developed ?CowPI? a focused version of the PICRUSt tool provided for use by the wider scientific community in the study of the rumen microbiome. We evaluated the accuracy of CowPI and PICRUSt using two 16S datasets from the rumen microbiome: one generated from rDNA and the other from rRNA where corresponding metagenomic and metatranscriptomic data was also available. We show that the functional profiles predicted by CowPI better match estimates for both the meta-genomic and transcriptomic datasets than PICRUSt, and captures the higher degree of genetic variation and larger pangenomes of rumen organisms. Nonetheless, whilst being closer in terms of predictive power for the rumen microbiome, there were differences when compared to both the metagenomic and metatranscriptome data and so we recommend where possible, functional inferences from 16S data should not replace metagenomic and metatranscriptomic approaches. The tool can be accessed at http://www.cowpi.org and is provided to the wider scientific community for use in the study of the rumen microbiomepublishersversionPeer reviewe

    Finding Apparent Horizons in Dynamic 3D Numerical Spacetimes

    Get PDF
    We have developed a general method for finding apparent horizons in 3D numerical relativity. Instead of solving for the partial differential equation describing the location of the apparent horizons, we expand the closed 2D surfaces in terms of symmetric trace--free tensors and solve for the expansion coefficients using a minimization procedure. Our method is applied to a number of different spacetimes, including numerically constructed spacetimes containing highly distorted axisymmetric black holes in spherical coordinates, and 3D rotating, and colliding black holes in Cartesian coordinates.Comment: 19 pages, 13 figures, LaTex, to appear in Phys. Rev. D. Minor changes mad

    R.A.Fisher, design theory, and the Indian connection

    Get PDF
    Design Theory, a branch of mathematics, was born out of the experimental statistics research of the population geneticist R. A. Fisher and of Indian mathematical statisticians in the 1930s. The field combines elements of combinatorics, finite projective geometries, Latin squares, and a variety of further mathematical structures, brought together in surprising ways. This essay will present these structures and ideas as well as how the field came together, in itself an interesting story.Comment: 11 pages, 3 figure

    Response to reduced nicotine content cigarettes among smokers differing in tobacco dependence severity

    Get PDF
    This study examines whether tobacco dependence severity moderates the acute effects of reducing nicotine content in cigarettes on the addiction potential of smoking, craving/withdrawal, or smoking topography. Participants (N = 169) were daily smokers with mild, moderate, or high tobacco-dependence severity using the Heaviness of Smoking Index. Following brief abstinence, participants smoked research cigarettes varying in nicotine content (0.4, 2.4, 5.2, 15.8 mg nicotine/g tobacco) in a within-subject design. Results were analyzed using repeated measures analysis of co-variance. No main effects of dependence severity or interactions with nicotine dose were noted in relative reinforcing effects in concurrent choice testing or subjective effects on the modified Cigarette Evaluation Questionnaire. Demand for smoking in the Cigarette Purchase Task was greater among more dependent smokers, but reducing nicotine content decreased demand independent of dependence severity. Dependence severity did not significantly alter response to reduced nicotine content cigarettes on the Minnesota Tobacco Withdrawal Scale nor Questionnaire of Smoking Urges-brief (QSU) Factor-2 scale; dependence severity and dose interacted significantly on the QSU-brief Factor-1 scale, with reductions dependent on dose among highly but not mildly or moderately dependent smokers. Dependence severity and dose interacted significantly on only one of six measures of smoking topography (i.e., maximum flow rate), which increased as dose increased among mildly and moderately but not highly dependent smokers. These results suggest that dependence severity has no moderating influence on the ability of reduced nicotine content cigarettes to lower the addiction potential of smoking, and minimal effects on relief from craving/withdrawal or smoking topography

    The vertebrate phylotypic stage and an early bilaterian-related stage in mouse embryogenesis defined by genomic information

    Get PDF
    BACKGROUND: Embryos of taxonomically different vertebrates are thought to pass through a stage in which they resemble one another morphologically. This "vertebrate phylotypic stage" may represent the basic vertebrate body plan that was established in the common ancestor of vertebrates. However, much controversy remains about when the phylotypic stage appears, and whether it even exists. To overcome the limitations of studies based on morphological comparison, we explored a comprehensive quantitative method for defining the constrained stage using expressed sequence tag (EST) data, gene ontologies (GO), and available genomes of various animals. If strong developmental constraints occur during the phylotypic stage of vertebrate embryos, then genes conserved among vertebrates would be highly expressed at this stage. RESULTS: We established a novel method for evaluating the ancestral nature of mouse embryonic stages that does not depend on comparative morphology. The numerical "ancestor index" revealed that the mouse indeed has a highly conserved embryonic period at embryonic day 8.0–8.5, the time of appearance of the pharyngeal arch and somites. During this period, the mouse prominently expresses GO-determined developmental genes shared among vertebrates. Similar analyses revealed the existence of a bilaterian-related period, during which GO-determined developmental genes shared among bilaterians are markedly expressed at the cleavage-to-gastrulation period. The genes associated with the phylotypic stage identified by our method are essential in embryogenesis. CONCLUSION: Our results demonstrate that the mid-embryonic stage of the mouse is indeed highly constrained, supporting the existence of the phylotypic stage. Furthermore, this candidate stage is preceded by a putative bilaterian ancestor-related period. These results not only support the developmental hourglass model, but also highlight the hierarchical aspect of embryogenesis proposed by von Baer. Identification of conserved stages and tissues by this method in various animals would be a powerful tool to examine the phylotypic stage hypothesis, and to understand which kinds of developmental events and gene sets are evolutionarily constrained and how they limit the possible variations of animal basic body plans

    On the nature and impact of self-similarity in real-time systems

    Full text link
    In real-time systems with highly variable task execution times simplistic task models are insufficient to accurately model and to analyze the system. Variability can be tackled using distributions rather than a single value, but the proper charac- terization depends on the degree of variability. Self-similarity is one of the deep- est kinds of variability. It characterizes the fact that a workload is not only highly variable, but it is also bursty on many time-scales. This paper identifies in which situations this source of indeterminism can appear in a real-time system: the com- bination of variability in task inter-arrival times and execution times. Although self- similarity is not a claim for all systems with variable execution times, it is not unusual in some applications with real-time requirements, like video processing, networking and gaming. The paper shows how to properly model and to analyze self-similar task sets and how improper modeling can mask deadline misses. The paper derives an analyti- cal expression for the dependence of the deadline miss ratio on the degree of self- similarity and proofs its negative impact on real-time systems performance through systemÂżs modeling and simulation. This study about the nature and impact of self- similarity on soft real-time systems can help to reduce its effects, to choose the proper scheduling policies, and to avoid its causes at system design time.This work was developed under a grant from the European Union (FRESCOR-FP6/2005/IST/5-03402).Enrique HernĂĄndez-Orallo; Vila CarbĂł, JA. (2012). On the nature and impact of self-similarity in real-time systems. Real-Time Systems. 48(3):294-319. doi:10.1007/s11241-012-9146-0S294319483Abdelzaher TF, Sharma V, Lu C (2004) A utilization bound for aperiodic tasks and priority driven scheduling. IEEE Trans Comput 53(3):334–350Abeni L, Buttazzo G (1999) QoS guarantee using probabilistic deadlines. In: Proc of the Euromicro confererence on real-time systemsAbeni L, Buttazzo G (2004) Resource reservation in dynamic real-time systems. Real-Time Syst 37(2):123–167Anantharam V (1999) Scheduling strategies and long-range dependence. Queueing Syst 33(1–3):73–89Beran J (1994) Statistics for long-memory processes. Chapman and Hall, LondonBeran J, Sherman R, Taqqu M, Willinger W (1995) Long-range dependence in variable-bit-rate video traffic. IEEE Trans Commun 43(2):1566–1579Boxma O, Zwart B (2007) Tails in scheduling. SIGMETRICS Perform Eval Rev 34(4):13–20Brichet F, Roberts J, Simonian A, Veitch D (1996) Heavy traffic analysis of a storage model with long range dependent on/off sources. Queueing Syst 23(1):197–215Crovella M, Bestavros A (1997) Self-similarity in world wide web traffic: evidence and possible causes. IEEE/ACM Trans Netw 5(6):835–846DĂŹaz J, GarcĂŹa D, Kim K, Lee C, Bello LL, LĂłpez J, Min LS, Mirabella O (2002) Stochastic analysis of periodic real-time systems. In: Proc of the 23rd IEEE real-time systems symposium, pp 289–300Erramilli A, Narayan O, Willinger W (1996) Experimental queueing analysis with long-range dependent packet traffic. IEEE/ACM Trans Netw 4(2):209–223Erramilli A, Roughan M, Veitch D, Willinger W (2002) Self-similar traffic and network dynamics. Proc IEEE 90(5):800–819Gardner M (1999) Probabilistic analysis and scheduling of critical soft real-time systems. Phd thesis, University of Illinois, Urbana-ChampaignGarrett MW, Willinger W (1994) Analysis, modeling and generation of self-similar vbr video traffic. In: ACM SIGCOMMHarchol-Balter M (2002) Task assignment with unknown duration. J ACM 49(2):260–288Harchol-Balter M (2007) Foreword: Special issue on new perspective in scheduling. SIGMETRICS Perform Eval Rev 34(4):2–3Harchol-Balter M, Downey AB (1997) Exploiting process lifetime distributions for dynamic load balancing. ACM Trans Comput Syst 15(3):253–285Hernandez-Orallo E, Vila-Carbo J (2007) Network performance analysis based on histogram workload models. In: Proceedings of the 15th international symposium on modeling, analysis, and simulation of computer and telecommunication systems (MASCOTS), pp 331–336Hernandez-Orallo E, Vila-Carbo J (2010) Analysis of self-similar workload on real-time systems. In: IEEE real-time and embedded technology and applications symposium (RTAS). IEEE Computer Society, Washington, pp 343–352HernĂĄndez-Orallo E, Vila-CarbĂł J (2010) Network queue and loss analysis using histogram-based traffic models. Comput Commun 33(2):190–201Hughes CJ, Kaul P, Adve SV, Jain R, Park C, Srinivasan J (2001) Variability in the execution of multimedia applications and implications for architecture. SIGARCH Comput Archit News 29(2):254–265Leland W, Ott TJ (1986) Load-balancing heuristics and process behavior. SIGMETRICS Perform Eval Rev 14(1):54–69Leland WE, Taqqu MS, Willinger W, Wilson DV (1994) On the self-similar nature of ethernet traffic (extended version). IEEE/ACM Trans Netw 2(1):1–15Liu CL, Layland JW (1973) Scheduling algorithms for multiprogramming in a hard-real-time environment. J ACM 20(1):46–61Mandelbrot B (1965) Self-similar error clusters in communication systems and the concept of conditional stationarity. IEEE Trans Commun 13(1):71–90Mandelbrot BB (1969) Long run linearity, locally Gaussian processes, h-spectra and infinite variances. Int Econ Rev 10:82–113Norros I (1994) A storage model with self-similar input. Queueing Syst 16(3):387–396Norros I (2000) Queueing behavior under fractional Brownian traffic. In: Park K, Willinger W (eds) Self-similar network traffic and performance evaluation. Willey, New York, Chap 4Park K, Willinger W (2000) Self-similar network traffic: An overview. In: Park K, Willinger W (eds) Self-similar network traffic and performance evaluation. Willey, New York, Chap 1Paxson V, Floyd S (1995) Wide area traffic: the failure of Poisson modeling. IEEE/ACM Trans Netw 3(3):226–244Rolls DA, Michailidis G, HernĂĄndez-Campos F (2005) Queueing analysis of network traffic: methodology and visualization tools. Comput Netw 48(3):447–473Rose O (1995) Statistical properties of mpeg video traffic and their impact on traffic modeling in atm systems. In: Conference on local computer networksRoy N, Hamm N, Madhukar M, Schmidt DC, Dowdy L (2009) The impact of variability on soft real-time system scheduling. In: RTCSA ’09: Proceedings of the 2009 15th IEEE international conference on embedded and real-time computing systems and applications. IEEE Computer Society, Washington, pp 527–532Sha L, Abdelzaher T, ÅrzĂ©n KE, Cervin A, Baker T, Burns A, Buttazzo G, Caccamo M, Lehoczky J, Mok AK (2004) Real time scheduling theory: A historical perspective. Real-Time Syst 28(2):101–155Taqqu MS, Willinger W, Sherman R (1997) Proof of a fundamental result in self-similar traffic modeling. SIGCOMM Comput Commun Rev 27(2):5–23Tia T, Deng Z, Shankar M, Storch M, Sun J, Wu L, Liu J (1995) Probabilistic performance guarantee for real-time tasks with varying computation times. In: Proc of the real-time technology and applications symposium, pp 164–173Vila-CarbĂł J, HernĂĄndez-Orallo E (2008) An analysis method for variable execution time tasks based on histograms. Real-Time Syst 38(1):1–37Willinger W, Taqqu M, Erramilli A (1996) A bibliographical guide to self-similar traffic and performance modeling for modern high-speed networks. In: Stochastic networks: Theory and applications, pp 339–366Willinger W, Taqqu MS, Sherman R, Wilson DV (1997) Self-similarity through high-variability: statistical analysis of ethernet lan traffic at the source level. IEEE/ACM Trans Netw 5(1):71–8
    • 

    corecore