5,680 research outputs found

    A Homological Approach to Factorization

    Full text link
    Mott noted a one-to-one correspondence between saturated multiplicatively closed subsets of a domain D and directed convex subgroups of the group of divisibility D. With this, we construct a functor between inclusions into saturated localizations of D and projections onto partially ordered quotient groups of G(D). We use this functor to construct many cochain complexes of o-homomorphisms of po-groups. These complexes naturally lead to some fundamental structure theorems and some natural homology theory that provide insight into the factorization behavior of D.Comment: Submitted for publication 12/15/201

    Student-Centered Learning: Functional Requirements for Integrated Systems to Optimize Learning

    Get PDF
    The realities of the 21st-century learner require that schools and educators fundamentally change their practice. "Educators must produce college- and career-ready graduates that reflect the future these students will face. And, they must facilitate learning through means that align with the defining attributes of this generation of learners."Today, we know more than ever about how students learn, acknowledging that the process isn't the same for every student and doesn't remain the same for each individual, depending upon maturation and the content being learned. We know that students want to progress at a pace that allows them to master new concepts and skills, to access a variety of resources, to receive timely feedback on their progress, to demonstrate their knowledge in multiple ways and to get direction, support and feedback from—as well as collaborate with—experts, teachers, tutors and other students.The result is a growing demand for student-centered, transformative digital learning using competency education as an underpinning.iNACOL released this paper to illustrate the technical requirements and functionalities that learning management systems need to shift toward student-centered instructional models. This comprehensive framework will help districts and schools determine what systems to use and integrate as they being their journey toward student-centered learning, as well as how systems integration aligns with their organizational vision, educational goals and strategic plans.Educators can use this report to optimize student learning and promote innovation in their own student-centered learning environments. The report will help school leaders understand the complex technologies needed to optimize personalized learning and how to use data and analytics to improve practices, and can assist technology leaders in re-engineering systems to support the key nuances of student-centered learning

    A Decentralised Digital Identity Architecture

    Get PDF
    Current architectures to validate, certify, and manage identity are based on centralised, top-down approaches that rely on trusted authorities and third-party operators. We approach the problem of digital identity starting from a human rights perspective, with a primary focus on identity systems in the developed world. We assert that individual persons must be allowed to manage their personal information in a multitude of different ways in different contexts and that to do so, each individual must be able to create multiple unrelated identities. Therefore, we first define a set of fundamental constraints that digital identity systems must satisfy to preserve and promote privacy as required for individual autonomy. With these constraints in mind, we then propose a decentralised, standards-based approach, using a combination of distributed ledger technology and thoughtful regulation, to facilitate many-to-many relationships among providers of key services. Our proposal for digital identity differs from others in its approach to trust in that we do not seek to bind credentials to each other or to a mutually trusted authority to achieve strong non-transferability. Because the system does not implicitly encourage its users to maintain a single aggregated identity that can potentially be constrained or reconstructed against their interests, individuals and organisations are free to embrace the system and share in its benefits.Comment: 30 pages, 10 figures, 3 table

    Announcement from the Veils of Angels

    Get PDF

    Overview of MultiLayer Metal Insulation Development for Small Stirling Convertors at NASA Glenn Research Center

    Get PDF
    A small Stirling convertor is currently under development at the NASA Glenn Research Center to produce one watt of electrical power from eight watts of heat. Previous radioisotope power systems made use of the General-Purpose Heat Source (GPHS) which produces 250 watts of heat but is unsuitable for a one-watt Stirling convertor. The only other qualified heat source available is the Light-Weight Radioisotope Heating Unit (LWRHU), which produces one watt of heat and is primarily used to provide heat to electronics and instrumentation to maintain their appropriate operating temperature. Unfortunately, the LWRHU has a heat flux of 272 W/meters squared compared to the GPHS heat flux of 6000 W/m2 which greatly increases the demands on the insulation to ensure that enough of the heat produced is available to the convertor and not lost to the environment. An analysis was performed that showed that the insulation must have an effective thermal conductivity of 0.005 W/mK or better for the system to function. A multi-layer metal insulation package was designed and a prototype was fabricated and tested to investigate the feasibility of this design. While the prototype did not meet the requirements perfectly, the lessons learned are being used to generate an improved thermal model using the test data so that a second iteration can developed that will meet the performance requirements with a much higher confidence

    Government Responsibility for the Acts of Jailhouse Informants Under the Sixth Amendment

    Get PDF
    Once a criminal investigation has identified a suspect, and adversarial proceedings have begun, the Sixth Amendment confers a right to be represented by counsel at the critical stages of the process. The Supreme Court has made clear that the government cannot circumvent this requirement merely by designating a civilian informant to engage in questioning on its behalf. Less clear is when the government is responsible for the actions of an informant; particularly in the case of jailhouse informants, incarcerated individuals who question fellow inmates, government responsibility is a difficult issue for which no clear legal standard has emerged. An examination of federal appellate and state supreme court case law reveals two distinct factors that courts accord the most weight in making their decisions: the agreement between the informant and the government, and the government\u27s targeting of a particular defendant. Federal appellate and state supreme courts disagree about whether one, both, or either are required. The relevant Sixth Amendment principle was first articulated in 1964 in United States v. Massiah. The defendant was a merchant seaman accused of possession of narcotics, and released on bail. Unbeknownst to him, government agents had struck a deal with his co-defendant to allow them to install a radio transmitter in his car and listen in on their conversation. The court held that the defendant\u27s Sixth Amendment rights were violated by the use in evidence against him of incriminating statements which Government agents had deliberately elicited from him after he had been indicted and in absence of his retained counsel. This is the core Massiah standard

    Before Crenshaw: A Historiographical Look at Intersectional Identity in Three Twentieth-Century American Plays by Eaton, Grimké, and Treadwell

    Get PDF
    This thesis anachronistically applies Kimberlé Crenshaw’s term intersectionality to three dramatic texts using Thomas Postlewait’s model of theatre historiography. These plays were authored by twentieth century female playwrights who had similar intersectional lives as the leads discussed. Yuki, from the 1901 novel turned 1903 Broadway play A Japanese Nightingale, was crafted by Winnifred Eaton. Yuki’s identity will be the subject of the first chapter. The second chapter examines the identity of Rachel from Angelina Weld Grimke’s anti-lynching play Rachel. For the third chapter, the identities of both female leads fromHope for a Harvest by Sophie Treadwell are analyzed. Each chapter will also investigate the strong autobiographical ties the playwrights have to their material in terms of intersectional identity and historical context
    • …
    corecore