Lessons Learnt from CSCL to Enrich E-Learning
Computer Supported Collaborative learning (CSCL) is nowadays well mature and it is able to set guide-lines to enrich e-learning. On its side, e-learning does not fully exploit its potentialities yet. Suggestions from CSCL could be useful to empower the presence on the e-learning on the market and would foster a vision of learning as not a simple further "commercial product". The European Commission funded many projects involving several countries, numerous students, teachers and researchers, a
Geospatially aware social software and Africa
We present a proposal for the development and implementation of a group of tools that will support the collection and sharing of georeferenced information. Locations such as rural Africa suffer from a technical problem hampering their participation in the global information community: infrastructures and terminals for Internet access are non-existent or of poor quality. We believe that cell-phone software can be leveraged as a way to bridge this. One important contribution that local communities
Creole identity in a globalized world
Conférence prononcée le 14 avril 2006 sur le campus de Cave Hill, University of the West-Indies, dans l'île de Barbade/Barbados
Internet Scout Project
The National Technical Information Service offers this website with technical and research reports received during the last month related to homeland security. Grouped into two categories, On the Homefront and Beyond Our Borders. Topics addressed include Air Cargo Security, Biosecurity, Border Security and Unmanned Aerial Vehicles, and Diplomacy of Counterterrorism. Visitors must pay to download the reports, but abstracts are available for browsing free of charge.
Internet Scout Project
The inaugural issue of the IEEE Power and Energy magazine, which premiered in January 2003, is available online with unrestricted access for a limited time. The five featured articles cover the areas of "distributed generation, 'green' power, and power engineering education." Additionally, a focus on security considers what is being done to protect the energy grid from terrorist acts. Other columns of Power and Energy highlight history, industry news, standards, and opinion articles.
Database Management Systems
A more formal approach to Relational Database Management Systems, compared the way they were covered during Web Applications. Database systems are discussed from the physical layer of B-trees and file servers to the abstract layer of relational design. Also includes alternative and generic approaches to database design and database management system including relational, object-relational, and object-oriented systems, SQL standards, algebraic query languages, integrity constraints, triggers, fun
Intellectual Property and Information Law, Fall 2008
Explores related and sometimes competing legal and policy frameworks for the development and dissemination of ideas and expression in the Information Age. The ways in which principles of free speech and expression compare and contrast with intellectual property rights are explored in relation to the advancement of knowledge and innovation, with particular focus on the impact of the Internet and new technology. The impact of other legal considerations and values on the development and disseminati
Middle School Portal: Math and Science Pathways (MSP2)
This challenge asks students to determine possible ways for combining stamps costing 15 and 33 cents to total 1 dollar 77 cents. It notes that this type of problem is similar to a process used for creating security codes. This online student activity is part of the Figure This! collection of 80 mathematical challenges. Students are encouraged to make a chart as they explore possible number combinations. The answer page describes and illustrates four different approaches to finding the solution,
From Algorithms to Z-Scores: Probabilistic and Statistical Modeling in Computer Science
The materials here form a textbook for a course in mathematical probability and statistics for computer science students. Computer science examples are used throughout, in areas such as: computer networks; data and text mining; computer security; remote sensing; computer performance evaluation; software engineering; data management; etc.
Healthy People 2010 disease prevalence in the Marshfield Clinic Personalized Medicine Research Proje
Objectives: The purpose of this study was to estimate the prevalence of Healthy People 2010 disease conditions in a large population-based cohort in central Wisconsin (WI, USA) and to consider how these conditions can be prioritized for research based on the use of healthcare services, the prevalence of various disease states and the resulting study power. Methods: Healthy People 2010 diagnoses were estimated for participants in the Personalized Medicine Research Project (PMRP), a large popula
Why 2009 is a crucial year for Europe
Bruno Le Maire is the French minister of state for European affairs, prior to this he was principal private secretary to the Prime Minister, 2006-2007, advisor to the Prime Minister, 2005-2006, advisor to the Minister of the Interior, 2004-2005 and advisor to the Minister of Foreign Affairs, 2002-2004. Bruno has been National Assembly deputy for Eure since 2007, and is a member of the National Assembly Finance Committee. He is also the Finance Committee special rapporteur on health security an
Are women still experiencing gender discrimination in income and employment positions?
The purpose of this research is to examine the gender pay-gap and the potential factors that contribute to income inequality. Since passing the Equal Pay Act the median weekly earnings of women is still just $0.72 for every dollar men earn. To put this in context the pay-gap in 1970 was $0.62 and in 1992 it was $0.75 (Institute for Women’s Policy Research, 1993). Secondary data analysis of the 2003 American Time Use Survey purports the potential reasons why the pay-gap still continues. This re
Conversations with Berkeley Faculty: Michael Nacht (1/9/03)
Conversations with History Presents Faculty Research at the University of California, Berkeley Michael Nacht Dean and Professor of Public Policy, UC Berkeley "Changing Paradigms in National Security Policy" January 9, 2003. A complete transcript is available. Professor Nacht teaches and writes in the fields of U.S. national security and foreign policy, and on management strategies for public organizations. He was a founding coeditor of the journal International Security, and he served in the
History of the Internet
History of the internet is an animated documentary explaining the inventions from time-sharing to filesharing, from Arpanet to Internet. (8:10)
Disappearing Red Shrimp
These legendary creatures may have something to teach us about survival, even as the clock is ticking on their habitats "As a child in Hawaii, I grew up exploring. Those experiences shaped my direction and interest in science," recalls molecular biologist Scott Santos. He remembers playing along the shore and swimming in the ponds imbedded in lava rocks. http://www.nsf.gov/news/special_reports/science_nation/index.jsp
White Netting with Flocking
White netting with large floral flocked pattern in white and pink - from the The Betty Smithers Design Collection at Staffordshire University.
Mini project : internet security mechanisms - application of a fingerprint reader in Windows using J
This is Mini Project documentation about internet security mechanisms. It is part of the 2009/10 BSc in Internet Technology and E-Commerce (course number 2ELE0076) from the University of Hertfordshire. All the mini projects are designed as level two modules of the undergraduate programmes. It includes a project introduction, class structure and tasks for days 1 and 2 of the project brief. This project requires an understanding of a medium complexity Java API. The student will be expected t
Rapid Application Development - Reports, VBA in Reports and Coursework
This task guide forms part of the "Reports, VBA in Reports and Coursework" topic in the Rapid Application Development module.
Qauntum Mechanics I (web)
This is a first course in quantum Mechanics. Discusses Schroedinger equation, tunnelling through barriers, time dependence and some aspects of 3D problems. Contains detailed Notes (web and pdf), exercises, figures with sources, etc. etc.