1,427,800 research outputs found

    Cloud Protocols

    Get PDF
    This PDF document discusses a field activity for K-12 students. The purpose of the activity is to observe type and cover of clouds including contrails. Students will observe ten types of clouds and how many of three types of contrails are visible, how much of the sky is covered with clouds, and how much is covered by contrails. The PDF is an instructor guide with detailed advice for administering the activity and data sheets. Educational levels: High school, Intermediate elementary, Middle school, Primary elementary, Undergraduate lower division

    Precipitation Protocols

    Get PDF
    The purpose of this activity is to determine the amount of moisture input to the local environment by measuring rain and snowfall and to measure the pH of precipitation. To do so students use a rain gauge and a snowboard to measure the daily amount of precipitation. Special pH measuring techniques for precipitation are used to determine the pH of rain and melted snow. Intended outcomes are that students will understand that precipitation is measured in depth and this depth is assumed to apply to a large area, that precipitation has a pH that can vary, and that snow is an input of water to the surface just like rain and each snowfall is equivalent to some amount of rainfall. Supporting background materials for both student and teacher are included. Educational levels: Primary elementary, Intermediate elementary, Middle school, High school

    Privacy protocols

    Full text link
    Security protocols enable secure communication over insecure channels. Privacy protocols enable private interactions over secure channels. Security protocols set up secure channels using cryptographic primitives. Privacy protocols set up private channels using secure channels. But just like some security protocols can be broken without breaking the underlying cryptography, some privacy protocols can be broken without breaking the underlying security. Such privacy attacks have been used to leverage e-commerce against targeted advertising from the outset; but their depth and scope became apparent only with the overwhelming advent of influence campaigns in politics. The blurred boundaries between privacy protocols and privacy attacks present a new challenge for protocol analysis. Covert channels turn out to be concealed not only below overt channels, but also above: subversions, and the level-below attacks are supplemented by sublimations and the level-above attacks.Comment: 38 pages, 6 figure

    Practicing Your Protocols

    Get PDF
    The purpose of this resource is to have students learn to use the hydrology instruments and collect the hydrology data accurately. In the classroom, students practice using the instruments or kits for protocols, exploring the range of measurements and sources of variation and error. Educational levels: Primary elementary, Intermediate elementary, Middle school, High school

    Fair Access Protocols

    Get PDF

    Protocols for Scholarly Communication

    Get PDF
    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full open access publishing environment for the particle physics community and the related sciences in the next few years.Comment: 8 pages, to appear in Library and Information Systems in Astronomy
    • 

    corecore