19,811 research outputs found

    GeV Gamma-Ray Sources

    Get PDF
    We report on the preliminary extension of our work on cataloging the GeV sky to approximately 7 years of CGRO/EGRET observations with special emphasis on a search for transient sources. The search method and significance levels are presented. Our initial results on 13 possible transients indicate that 3 may be new gamma-ray sources. Sixteen new steady GeV sources are also detected, 3 of which have never been reported as gamma-ray sources

    Extending the Research on 1:1 Technology Integration in Middle Schools: A Call for Using Institutional Theory in Educational Technology Research

    Get PDF
    In this essay, we argue institutional lenses are a vital but largely missing part of understanding how 1:1 technology programs can effect change in teaching and learning in middle schools. Indeed, while current research highlights the positive effects technology integration efforts, and 1:1 programs in particular, have on student learning and engagement, much has focused on the knowledge, skills, and beliefs of individuals or groups of actors. There is less research considering how the institutional context may impact teacher and administrator behavior regarding these and other technology-focused efforts thus limiting our ability to fully support schools and teachers in these efforts. We conclude by calling on researchers to use institutional theory to further understand and support implementation efforts and enhance outcomes for schools, teachers, and students alike

    What happens when interviewers ask repeated questions in forensic interviews with children alleging abuse?

    Get PDF
    This study was designed to explore 1) the ways in which interviewers refocus alleged victims of abuse on their previous responses and 2) how children responded when they were refocused on their previous responses. Transcripts of 37 forensic interviews conducted by British police officers trained using the best practices spelled out in the Memorandum of Good Practice were examined. The instances in which interviewers asked repeated questions were isolated and coded into categories with respect to the reasons why interviewers needed to ask the repeated question (i.e., there was no apparent reason, to challenge a child’s response, clarification, no answer the first time the question was asked, digression, or compound question). The children’s responses to the repeated questions were further categorised into mutually exclusive categories (i.e., elaboration, repetition, contradiction, or no answer). On average interviewers asked children 8 repeated questions per interview. Most of the time interviewers asked repeated questions to challenge a previous response (62%), but they were also sometimes asked for no apparent reason (20%). Children repeated previous responses or elaborated on a previous response 81% of the time and contradicted themselves 7% of the time when re-asked the same question. We conclude that children did not appear unduly pressured to change their answers, and, more importantly, did not contradict themselves when interviewers attempted to refocus them on particular responses

    A framework for the forensic investigation of unstructured email relationship data

    Get PDF
    Our continued reliance on email communications ensures that it remains a major source of evidence during a digital investigation. Emails comprise both structured and unstructured data. Structured data provides qualitative information to the forensics examiner and is typically viewed through existing tools. Unstructured data is more complex as it comprises information associated with social networks, such as relationships within the network, identification of key actors and power relations, and there are currently no standardised tools for its forensic analysis. Moreover, email investigations may involve many hundreds of actors and thousands of messages. This paper posits a framework for the forensic investigation of email data. In particular, it focuses on the triage and analysis of unstructured data to identify key actors and relationships within an email network. This paper demonstrates the applicability of the approach by applying relevant stages of the framework to the Enron email corpus. The paper illustrates the advantage of triaging this data to identify (and discount) actors and potential sources of further evidence. It then applies social network analysis techniques to key actors within the data set. This paper posits that visualisation of unstructured data can greatly aid the examiner in their analysis of evidence discovered during an investigation

    Ultrasonography in the diagnosis and management of cats with ureteral obstruction

    Get PDF
    This was a retrospective cross-sectional study of cats with azotaemia (serum creatinine >180 μmol/l) that had ultrasonography of the urinary tract, ultrasound images available for review and received treatment for azotaemia. Cats with pre-renal azotaemia or urethral obstruction were excluded. Associations between clinical and ultrasonographic results and the dependent variables ‘tentative diagnosis of ureteral obstruction’, ‘pyelography positive for ureteral obstruction’ and ‘death in hospital’ were tested using binary logistic regression

    Gamma-Ray Bursts as a Probe of the Very High Redshift Universe

    Get PDF
    We show that, if many GRBs are indeed produced by the collapse of massive stars, GRBs and their afterglows provide a powerful probe of the very high redshift (z > 5) universe.Comment: To appear in Proc. of the 5th Huntsville Gamma-Ray Burst Symposium, 5 pages, LaTe
    • …
    corecore