3,004 research outputs found

    How and why do student teachers use ICT?

    Get PDF
    This paper examines how and why student teachers made use of information and communication technology (ICT) during a 1-year initial teacher education programme from 2008 to 2009. This is a mixed methods study involving a survey (N = 340) of the entire cohort and a series of semi-structured interviews with a sample of student teachers within the cohort (N = 21). The study explored several themes, including the nature of student teachers' use of ICT; variation in the use of ICT; support for, and constraints on, using ICT; attitudes to ICT and to teaching and learning more generally. It was found that nearly all teachers were receptive to using ICT – more so than their in-service counterparts – and made frequent use of it during their placement (internship) experience. The Interactive Whiteboard (IWB) was central to nearly all student teachers' use of ICT, in good part, because it was already used by their mentors and was widely accessible. Student teachers' use of ICT was categorized in three levels. Routine users focused mostly on the use of the IWB for whole class teaching; extended users gave greater opportunities for pupils to use ICT for themselves; innovative student teachers used ICT in a greater range of contexts and made more effort to overcome barriers such as access. ICT use was seen as emerging from a mix of factors: chiefly student teachers' access to ICT; their feeling of ‘self-efficacy’ when using ICT; and their belief that ICT had a positive impact on learning – in particular, the impact on pupils' behavioural and affective engagement. Factors which influenced ICT use included mentoring, training and support. Limitations on student teachers' use of ICT are explored and it is suggested that new teachers need to be supported in developing a more discerning use as they begin their teaching careers

    4d Strain Path Recorded In The Lower Crust During The Transition From Convergence To Continental Rifting, Doubtful Sound, Fiordland, New Zealand

    Get PDF
    ABSTRACT Doubtful Sound, in SW New Zealand, exposes an exhumed section of lower crust that represents the root of an Early Cretaceous magmatic arc. Here, the lower crust underwent a change from contraction to extension and these tectonic cycles are fundamental to the growth of continental crust. Mafic-intermediate granulite gneisses occur below the extensional Doubtful Sound shear zone (DSSZ) which records the retrogression and transposition of granulite fabrics at the upper amphibolite facies. I compared 3D rock fabrics, microstructures and textures within and below the DSSZ to determine the processes involved in the shift from contraction to extension and to infer the sequential processes of transforming L\u3eS granulites to L=S amphibolites. Below the DSSZ, dehydration zones around felsic veins and leucosome in migmatitic orthogneiss record granulite facies metamorphism. Aggregates of clinopyroxene (cpx) and orthopyroxene (opx) that are rimmed by garnet (grt) and interstitial melt are set in a plagioclase (pl) matrix. Peritectic grt, pl-grt symplectites, beads of pl along grain boundaries, and elongate, inclusion-free pl reflect the anatexis. Pl exhibits a crystal preferred orientation (CPO) and evidence of subgrain rotational recrystallization and grain boundary migration, indicating subsolidus deformation outlasted melting. Mafic aggregates are boudinaged and opx developed subgrains. During peak metamorphism high strain was partitioned to locations enriched in melt, producing L\u3eS fabrics and an upward trajectory in the strain path. A comparison of mineral grain shapes indicates that pl accommodated most of the strain. Granulite-amphibolite transitional rocks inside the DSSZ record a heterogeneous retrogression of the granulites to a polyphase metamorphic assemblage of hornblende (hbl), biotite (bt), and fine pl. Also preserved is the resetting of high strain L\u3eS granulite to low strain, L=S amphibolite. Folia of porphyroblastic hbl + bt progressively penetrate the pl matrix via solution mass transfer. Porphyroblastic pl in the rock matrix becomes increasingly transposed to gneissic layering. A path of decreasing gradient from high strain L\u3eS granulite to low strain L=S amphibolite reflects the development of the DSSZ fabric, growth of new minerals and onset to deformation at the amphibolite facies. Inside the DSSZ, amphibolites show an increasing strain gradient from low strain L=S amphibolite to high strain L=S amphibolite. Pl aggregates lack a CPO and are mostly annealed but preserve grain boundary migration microstructures. Hbl is recrystallized and forms asymmetric fish. Evidence of high fluid activity and reaction softening within the DSSZ include increased hbl + bt and bt beards on pl relative to rocks outside the DSSZ. My observations suggest that magma, heat, and melting initially weakened the lower crust, facilitating the development of high strain zones with L\u3eS fabrics. Partially molten regions deformed by suprasolidus flow and solid portions deformed mostly by dislocation creep in pl and boudinage of cpx + opx. Later, the lower crust was weakened and high strain fabrics were reset from overprinting and transposition as retrogression progressed and low strain L=S fabrics formed. During extension there was an upward trajectory in the strain path to high strain L=S fabrics within the DSSZ, where hbl and bt accommodated more strain. My results illustrate the importance of 1) melting, cooling, and hydration in controlling strain partitioning and the rheological evolution of lower crustal shear zones, and 2) the importance of integrating microstructural and fabric analysis to determine strain paths

    Explaining Weapon System Sustainment\u27s Impact to Aircraft Availability

    Get PDF
    This research focused on understanding the phenomena behind the cost growth of Weapon System Sustainment (WSS) and the simultaneous degradation in USAF aircraft system availability. The primary modelling technique used was Ordinary Least Squares (OLS) while incorporating temporal effect. Other studies have looked at cost factors related to the Flying Hour Program, flying conditions and age. This study found empirical relationships between each of the four WSS business processes and the lead time in months it takes to realize improvements in system aircraft availability

    Mice Infected with Low-virulence Strains of Toxoplasma gondii Lose their Innate Aversion to Cat Urine, Even after Extensive Parasite Clearance

    Get PDF
    Toxoplasma gondii chronic infection in rodent secondary hosts has been reported to lead to a loss of innate, hard-wired fear toward cats, its primary host. However the generality of this response across T. gondii strains and the underlying mechanism for this pathogen mediated behavioral change remain unknown. To begin exploring these questions, we evaluated the effects of infection with two previously uninvestigated isolates from the three major North American clonal lineages of T. gondii, Type III and an attenuated strain of Type I. Using an hour-long open field activity assay optimized for this purpose, we measured mouse aversion toward predator and non-predator urines. We show that loss of innate aversion of cat urine is a general trait caused by infection with any of the three major clonal lineages of parasite. Surprisingly, we found that infection with the attenuated Type I parasite results in sustained loss of aversion at times post infection when neither parasite nor ongoing brain inflammation were detectable. This suggests that T. gondii-mediated interruption of mouse innate aversion toward cat urine may occur during early acute infection in a permanent manner, not requiring persistence of parasitecysts or continuing brain inflammation.Comment: 14 pages, 3 figure

    Managing the managers managing people: Lessons for recreation and water management in protected areas

    Get PDF
    Many of Australia’s critical urban water resources are located within protected areas, originally reserved for their timber production, recreation and aesthetic values. Later, these areas were also recognised for their conservation value and as reliable, potable water supplies. This paper presents a case study of water source protection planning in urban water catchments and impoundments in the south west of Western Australia and the impacts on recreation and tourism access in protected areas. Inland water catchments in the Southwest of Western Australia have historically been, and are currently, popular resources for public recreation. Recreation includes a broad range of leisure, pastime and entertainment activities ranging from passive through to active pursuits that vary in their character and potential for environmental impacts

    Renewable Energy\u27s Role in Georgia\u27s Energy Regulatory Compact

    Get PDF
    Exploring Georgia’s complex legal and regulatory landscape, this blog post examines the challenges and opportunities for renewable energy integration within the state\u27s investor-owned utilities

    Network motifs: structure does not determine function

    Get PDF
    BACKGROUND: A number of publications have recently examined the occurrence and properties of the feed-forward motif in a variety of networks, including those that are of interest in genome biology, such as gene networks. The present work looks in some detail at the dynamics of the bi-fan motif, using systems of ordinary differential equations to model the populations of transcription factors, mRNA and protein, with the aim of extending our understanding of what appear to be important building blocks of gene network structure. RESULTS: We develop an ordinary differential equation model of the bi-fan motif and analyse variants of the motif corresponding to its behaviour under various conditions. In particular, we examine the effects of different steady and pulsed inputs to five variants of the bifan motif, based on evidence in the literature of bifan motifs found in Saccharomyces cerevisiae (commonly known as baker's yeast). Using this model, we characterize the dynamical behaviour of the bi-fan motif for a wide range of biologically plausible parameters and configurations. We find that there is no characteristic behaviour for the motif, and with the correct choice of parameters and of internal structure, very different, indeed even opposite behaviours may be obtained. CONCLUSION: Even with this relatively simple model, the bi-fan motif can exhibit a wide range of dynamical responses. This suggests that it is difficult to gain significant insights into biological function simply by considering the connection architecture of a gene network, or its decomposition into simple structural motifs. It is necessary to supplement such structural information by kinetic parameters, or dynamic time series experimental data, both of which are currently difficult to obtain

    Dynamic Analysis of Executables to Detect and Characterize Malware

    Full text link
    It is needed to ensure the integrity of systems that process sensitive information and control many aspects of everyday life. We examine the use of machine learning algorithms to detect malware using the system calls generated by executables-alleviating attempts at obfuscation as the behavior is monitored rather than the bytes of an executable. We examine several machine learning techniques for detecting malware including random forests, deep learning techniques, and liquid state machines. The experiments examine the effects of concept drift on each algorithm to understand how well the algorithms generalize to novel malware samples by testing them on data that was collected after the training data. The results suggest that each of the examined machine learning algorithms is a viable solution to detect malware-achieving between 90% and 95% class-averaged accuracy (CAA). In real-world scenarios, the performance evaluation on an operational network may not match the performance achieved in training. Namely, the CAA may be about the same, but the values for precision and recall over the malware can change significantly. We structure experiments to highlight these caveats and offer insights into expected performance in operational environments. In addition, we use the induced models to gain a better understanding about what differentiates the malware samples from the goodware, which can further be used as a forensics tool to understand what the malware (or goodware) was doing to provide directions for investigation and remediation.Comment: 9 pages, 6 Tables, 4 Figure

    Self-Updating Models with Error Remediation

    Full text link
    Many environments currently employ machine learning models for data processing and analytics that were built using a limited number of training data points. Once deployed, the models are exposed to significant amounts of previously-unseen data, not all of which is representative of the original, limited training data. However, updating these deployed models can be difficult due to logistical, bandwidth, time, hardware, and/or data sensitivity constraints. We propose a framework, Self-Updating Models with Error Remediation (SUMER), in which a deployed model updates itself as new data becomes available. SUMER uses techniques from semi-supervised learning and noise remediation to iteratively retrain a deployed model using intelligently-chosen predictions from the model as the labels for new training iterations. A key component of SUMER is the notion of error remediation as self-labeled data can be susceptible to the propagation of errors. We investigate the use of SUMER across various data sets and iterations. We find that self-updating models (SUMs) generally perform better than models that do not attempt to self-update when presented with additional previously-unseen data. This performance gap is accentuated in cases where there is only limited amounts of initial training data. We also find that the performance of SUMER is generally better than the performance of SUMs, demonstrating a benefit in applying error remediation. Consequently, SUMER can autonomously enhance the operational capabilities of existing data processing systems by intelligently updating models in dynamic environments.Comment: 17 pages, 13 figures, published in the proceedings of the Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications II conference in the SPIE Defense + Commercial Sensing, 2020 symposiu
    • …
    corecore