826 research outputs found
Recommended from our members
Summer of Code: Assisting Distance-Learning Students with Open-Ended Programming Tasks
A significant difficulty in teaching programming lies in the transition from novice to intermediate programmer, characterised by the assimilation and use of schemas of standard programming approaches. A significant factor assisting this transition is practice with tasks which develop this schema use. We describe the Summer of Code, a two-week activity for part-time, distance-learning students which gave them some additional programming practice. We analysed their submissions, forum postings, and results of a terminal survey. We found learners were keen to share and discuss their solutions and persevered with individual problems and the challenge overall. 93% respondents rated the activity 3 or better on a 5-point Likert scale (n=58). However, a quarter of participants, mainly those who described themselves as average or poor programmers, felt less confident in their abilities after the activity, though half of these students liked the activity overall. 54% of all participants said the greatest challenge was developing a general approach to the problems, such as selecting appropriate data structures. This is corroborated by forum comments, where students greatly appreciated “think aloud” presentations by faculty tackling the problems. These results strongly suggest that students would benefit from more open-ended practice, where they have to select and design their own solutions to a range of problems
Participatory design with Individuals who have Amnesia
We present experiences and insights into participatory design with individuals who have anterograde amnesia and therefore have extreme difficulty storing new memories. We discuss our design of the design process, and present a set of techniques used to support memory during and between design sessions. From this experience, we identify cognitive assumptions of participatory design that break down when working with amnestics. We generalize these ideas into an analytical framework for researchers and practitioners who intend to use participatory design with persons having various kinds of cognitive impairments. We illustrate the framework by analyzing a cognitive deficit unrelated to memory that we encountered, and an unanticipated benefit from what at first appeared to be a liability in working with this design team
Stable carbon, nitrogen and sulphur isotope analysis of permafrost preserved human hair from rescue excavations (2009, 2010) at the precontact site of Nunalleq, Alaska
Acknowledgments This work was funded by an Arts and Humanities Research Council (AH/K006029/1) grant awarded to Rick Knecht, Kate Britton and Charlotta Hillerdal (Aberdeen); an AHRC-LabEx award (AH/N504543/1) to KB, RK, Keith Dobney (Liverpool) and Isabelle Sidéra (Nanterre); the Carnegie Trust to the Universities of Scotland (travel grant to KB); and the Max Planck Institute for Evolutionary Anthropology. The onsite collection of samples was carried out by staff and students from the University of Aberdeen, volunteer excavators and the residents of Quinhagak. We had logistical and planning support for fieldwork by the Qanirtuuq Incorporated, Quinhagak, Alaska, and the people of Quinhagak, who we also thank for sampling permissions. Special thanks to Warren Jones and Qanirtuuq Incorporated (especially Michael Smith and Lynn Church), and to all Nunalleq project team members, in Aberdeen and at other institutions, particularly Charlotta Hillerdal and Edouard Masson-Maclean (Aberdeen) for comments on earlier versions of this manuscript, and also to Véronique Forbes, Ana Jorge, Carly Ameen and Ciara Mannion (Aberdeen) for their inputs. Thanks also to Michelle Alexander (York). Finally, thank you to Ian Scharlotta (Alberta) for inviting us to contribute to this special issue, to the Editor, and to three anonymous reviewers, whose suggestions and recommended changes to an earlier version of this manuscript greatly improved the paper.Peer reviewedPublisher PD
Reviews
Successful Instructional Diagrams by Ric Lowe, London, Kogan Page, 1993. ISBN: 0–7494–0711–5
Improved Hexahedral Meshing on Biological Models
Certain applications of the finite element method require hexahedral meshes for the underlying discretization. A procedure, known as THexing, which is guaranteed to produce an all-hex mesh is to begin with a tetrahedral mesh and then subdivide each element into four hexahedra. This research presents a method for improving the THex approach, known as Diced THexing, or DTHexing. The DTHex approach is based on general coarsening tools. An initial triangle surface mesh is coarsened and smoothed iteratively until a coarse mesh of reasonable quality is obtained. The volume is then easily meshed using a tetrahedral scheme, then refined using ’h’ type modifications. The goal of this method is to 1) improve the quality of elements in the finite element mesh and 2) decrease the number of overall nodes. The DTHex approach has been successful at improving models on biological meshes without increasing node count. This research was conducted using the CUBIT software
Placing computer security at the heart of learning
In this paper we present the approach adopted at the UK’s Open University for teaching computer security to large numbers of students at a distance through supported open learning. We discuss how the production of learning materials at the university has had to change to reflect the ever-increasing rate of technological, legislative and social change within the computing discipline, and how the university has had to rethink the role of the academic in the course development process. We argue that computer security is best taught starting at the earliest level of undergraduate teaching and continuing through in-depth postgraduate study. We discuss our approach which combines the traditional technical aspects of security with discussions on the professional and ethical issues surrounding security and privacy. This approach presents computer security and privacy in the light of relevant legislative and regulatory regimes, thus the students have a firm grounding in the relevant national and international laws. We discuss the importance of international standards for information security risk assessment and management and as well as the relevance of forensic computing to a computer security curriculum. We conclude with an examination of our course development methodology and argue for a practitioner-led approach to teaching
Leafless roughness of complex tree morphology using terrestrial LiDAR
Strategies for extracting roughness parameters from riparian forests need to address the issue that the trees are more than just stems and that in large rivers flow can rise into the canopy. Remote sensing information with 3-D capabilities such as lidar can be used to extract information on trees. However, first and last pulse airborne lidar data are insufficient to characterize the complex vertical structure of vegetation because by definition, there are few data at intermediate levels. Terrestrial laser scanning (TLS) is used in this study to define complex structures at a millimetric scanning resolution for the purpose of extracting canopy parameters relevant for the parameterization of the flow resistance equations. We will mainly be concerned with the projected area of leafless trees, estimating the total tree dimensions using several different methods. These include manipulating mass point cloud data obtained from TLS to create stage-dependent projected areas through complex meshing techniques and voxelization. Stage-dependent projected areas were defined for natural and planted poplar forests in the riparian zone of the Garonne and Allier rivers in southern and central France, respectively. Roughness values for planted poplar forests dominant in many western European river floodplains range from Manning's n = 0.037–0.094 and n = 0.140–0.330 for below-canopy flow (2 m) and extreme in-canopy flow (8 m), respectively. Roughness values for natural poplar forests ranged from n = 0.066–0.210 and n = 0.202–0.720 for below-canopy flow (2 m) and extreme in-canopy flow (8 m), respectively
Recommended from our members
The impact of the COVID-19 pandemic on cancer care.
The COVID-19 pandemic has disrupted the spectrum of cancer care, including delaying diagnoses and treatment and halting clinical trials. In response, healthcare systems are rapidly reorganizing cancer services to ensure that patients continue to receive essential care while minimizing exposure to SARS-CoV-2 infection
- …