31 |
Music Teacher Mentor Experiences and Perceptions of the Mentor RoleJanuary 2019 (has links)
abstract: Experienced mentor teachers that are prepared for the task of mentoring pre-service teachers are highly valued. Few studies in music education address the music teachers’ role of mentor or the music mentor’s perceptions and practices within the mentoring process. This study investigates the experiences and practices of music mentor teachers and how they construct an understanding of their mentoring role. Guiding questions were: 1) How do music teachers describe their mentoring experiences and practices? 2) What do music teachers’ descriptions of their mentoring experiences and practices reveal about their understanding of the mentoring role? and 3) What types of preparation and support do music teachers feel they need to serve in this role? Four music teacher mentors served as participants for this study. Participants described their mentoring experiences and practices in working with student teachers and responded to questions in three in-depth interviews over three semesters. Each interview was audio-recorded, transcribed, and verified for accuracy and clarification. Findings indicate that 1) Mentors tend to rely on their own student teaching experience and beliefs about teaching when working with student teachers; 2) Mentors construct their own conceptions of the mentor role, mentoring style and relationships based on personality and their beliefs about what mentoring is and is not; 3) The rewards of mentoring are closely tied to student teacher growth and successful relationships, and challenged by issues of time and student teacher readiness; and 4) Learning to mentor is like learning to teach. It is a process learned over time and requires experience. Music education programs and teacher educators should consider preparing student teachers and the cooperating mentor teachers who work with them, by discussing mentor relationships and role expectations within the student teacher triad. / Dissertation/Thesis / Doctoral Dissertation Music Education 2019
|
32 |
Spolupracující obviněný / Cooperating defendantKonopa, Štěpán January 2020 (has links)
Cooperating defendant Abstract The cooperating defendant represents a relatively new instrument of Czech criminal law, it was introduced into the Czech legal system with effect from 1 January 2010. The main purpose of this legal instrument is to fight organized crime, which is characterized by its high social danger and is extremely difficult to combat for law enforcement agencies due to the considerable sophistication of the internal hierarchy of organized criminal groups. The legal instrument consists of the cooperation of the defendant with a public prosecutor, who designates them as a cooperating defendant in the indictment in exchange for information capable of making a significant contribution to the uncovering of organized criminal groups. The cooperating defendant is rewarded for their cooperation with a mitigation of their sentence and the sentence may even be dropped altogether. The first chapter of this thesis analyzes the terms of cooperating defendant and crown witness, describes the process of introducing the legal instrument of cooperating defendant into the Czech legal system and also mentions some similar legal instruments. The second chapter deals with the current legislation, some of its shortcomings and their possible solutions. The third chapter lists some of the most important benefits...
|
33 |
Spolupracující obviněný / Cooperating defendantKarásková, Eva January 2020 (has links)
Cooperating defendant Abstract This thesis on Cooperating defendant is focused on the development of this institute, its connection to organized crime and relevant international and Czech legislation. The thesis consists of the introduction, five chapters, that each presents individual topics in detail, and the conclusion. The first chapter analyses historical development of the institute of crown witness and its connection to the institute of cooperating defendant, the context of adoption of this institute into the Czech legislation and the subsequent amendment of the relevant provisions. At the same time, it summarizes the planned changes concerning the institute of cooperating defendant within the framework of recodification of criminal procedure. The second chapter analyses organized crime in connection to the institute of cooperating defendant. It focuses on the occurrence of organized crime in the Czech Republic, its specific features and legislation, the purpose of which is to fight organized crime. The third chapter is focused on the international legislation of the institute of cooperating defendant, which is mainly defined by international organizations, such as the UN, the European Union and the Council of Europe. The current legal regulation of the institute of cooperating defendant is analysed...
|
34 |
Bespoke Security for Resource Constrained Cyber-Physical SystemsArroyo, Miguel Angel January 2021 (has links)
Cyber-Physical Systems (CPSs) are critical to many aspects of our daily lives. Autonomous cars, life saving medical devices, drones for package delivery, and robots for manufacturing are all prime examples of CPSs. The dual cyber/physical operating nature and highly integrated feedback control loops of CPSs means that they inherit security problems from traditional computing systems (e.g., software vulnerabilities, hardware side-channels) and physical systems (e.g., theft, tampering), while additionally introducing challenges of their own. The challenges to achieving security for CPSs stem not only from the interaction of the cyber and physical domains, but from the additional pressures of resource constraints imposed due to cost, limited energy budgets, and real-time nature of workloads. Due to the tight resource constraints of CPSs, there is often little headroom to devote for security. Thus, there is a need for low overhead deployable solutions to harden resource constrained CPSs. This dissertation shows that security can be effectively integrated into resource constrained cyber-physical system devices by leveraging fundamental physical properties, & tailoring and extending age-old abstractions in computing.
To provide context on the state of security for CPSs, this document begins with the development of a unifying framework that can be used to identify threats and opportunities for enforcing security policies while providing a systematic survey of the field. This dissertation characterizes the properties of CPSs and typical components (e.g., sensors, actuators, computing devices) in addition to the software commonly used. We discuss available security primitives and their limitations for both hardware and software. In particular, we focus on software security threats targeting memory safety. The rest of the thesis focuses on the design and implementation of novel, deployable approaches to combat memory safety on resource constrained devices used by CPSs (e.g., 32-bit processors and microcontrollers). We first discuss how cyber-physical system properties such as inertia and feedback can be used to harden software efficiently with minimal modification to both hardware and software. We develop the framework You Only Live Once (YOLO) that proactively resets a device and restores it from a secure verified snapshot. YOLO relies on inertia, to tolerate periods of resets, and on feedback to rebuild state when recovering from a snapshot. YOLO is built upon a theoretical model that is used to determine safe operating parameters to aid a system designer in deployment. We evaluate YOLO in simulation and two real-world CPSs, an engine and drone.
Second, we explore how rethinking of core computing concepts can lead to new fundamental abstractions that can efficiently hide performance overheads usually associated with hardening software against memory safety issues. To this end, we present two techniques: (i) The Phantom Address Space (PAS) is a new architectural concept that can be used to improve N-version systems by (almost) eliminating the overheads associated with handling replicated execution. Specifically, PAS can be used to provide an efficient implementation of a diversification concept known as execution path randomization aimed at thwarting code-reuse attacks. The goal of execution path randomization is to frequently switch between two distinct program variants forcing the attacker to gamble on which code to reuse. (ii) Cache Line Formats (Califorms) introduces a novel method to efficiently store memory in caches. Califorms makes the novel insight that dead spaces in program data due to its memory layout can be used to efficiently implement the concept of memory blacklisting, which prohibits a program from accessing certain memory regions based on program semantics. Califorms not onlyconsumes less memory than prior approaches, but can provide byte-granular protection while limiting the scope of its hardware changes to caches. While both PAS and Califorms were originally designed to target resource constrained devices, it's worth noting that they are widely applicable and can efficiently scale up to mobile, desktop, and server class processors.
As CPSs continue to proliferate and become integrated in more critical infrastructure, security is an increasing concern. However, security will undoubtedly always play second fiddle to financial concerns that affect business bottom lines. Thus, it is important that there be easily deployable, low-overhead solutions that can scale from the most constrained of devices to more featureful systems for future migration. This dissertation is one step towards the goal of providing inexpensive mechanisms to ensure the security of cyber-physical system software.
|
35 |
Software-hardware Cooperative Embedded Verification System Fusing Fingerprint Verification and Shared-key AuthenticationYan, Weiwei January 2011 (has links)
In order to protect the security of the commercial information, personnel information, military information, governmental information on the Internet, the claimed identity should be authenticated. Now there are three main security authentication methods: first: using user PIN, such as password; second: using physical key, such as USBKey; third: using biological authentication technology, such as fingerprint, iris, voice and palm prints, etc. Because of the uniqueness, invariance, and ubiquity properties of biometric authentication, biometric authentication is becoming popular, especially fingerprint recognition. However, when the fingerprint recognition information is transported on the public channel, it may be attacked, such as the fingerprint information is stolen. So a cryptology mechanism is needed to protect the fingerprint recognition information. In the field of embedded security authentication system, the traditional hardware implementation mechanism, such as ASIC, can satisfy requires of functions and performances, but it is not configurable, flexible, and easy to expand; the traditional software implementation mechanism, such as general purpose processor, is flexible, but the cost and the power consumption are higher than hardware implementation. In order to take the advantages of biometrics, cryptology, hardware implementation, and software implementation, a hardware-software cooperating embedded authentication system based on shared-key authentication and fingerprint verification is proposed. First, this system authenticates the identities of client and server by shared-key authentication, creates the current encrypt key and hash key, and then authenticates the identity of them via fingerprint recognition. During fingerprint recognition, the information of fingerprint is not needed to transmit over the public channel, so the security of fingerprint is increased. Theoretic analysis and experiments show that, this system reach very high authentication rate and security. This system can resist replay attack, server template attack, device template attack, effectively.
|
36 |
Mathematics Student Teaching in Japan: A Multi-Case StudyShwalb, Allison Turley 11 November 2008 (has links) (PDF)
Nearly all research that seeks to assist in reforming mathematics student teaching in the United States has been limited in that it (1) does not consider student teaching models in non-Western cultures, and (2) has not sufficiently studied the unique context of mathematics in student teacher-cooperating teacher interactions. This multi-case study addresses these issues by analyzing the interactions between three cooperating teachers and two student teachers in the mathematics student teaching setting in Japan. Four conclusions are presented to generate a coherent picture of the principles of teaching and learning to teach that are emphasized during this Japanese student teaching experience.
|
37 |
Towards Self-Managing Networked Cyber-Physical SystemsJanak, Jan January 2024 (has links)
Networked systems integrating software with the physical world are known as cyber-physical systems (CPSs). CPSs have been used in diverse sectors, including power generation and distribution, transportation, industrial systems, and building management. The diversity of applications and interdisciplinary nature make CPSs exciting to design and build but challenging to manage once deployed. Deployed CPSs must adapt to changes in the operating environment or the system's architecture, e.g., when outdated or malfunctioning components need to be replaced. Skilled human operators have traditionally performed such adaptations using centralized management protocols. As the CPS grows, management tasks become more complex, tedious, and error-prone.
This dissertation studies management challenges in deployed CPSs. It is based on practical research with CPSs of various sizes and diverse application domains, from the large geographically dispersed electrical grid to small-scale consumer Internet of Things (IoT) systems. We study the management challenges unique to each system and propose network services and protocols specifically designed to reduce the amount of management overhead, drawing inspiration from autonomic systems and networking research.
We first introduce PhoenixSEN, a self-managing ad hoc network designed to restore connectivity in the electrical grid after a large-scale outage. The electrical grid is a large, heterogeneous, geographically dispersed CPS. We analyze the U.S. electrical grid network subsystem, propose an ad hoc network to temporarily replace the network subsystem during a blackout, and discuss the experimental evaluation of the network on a one-of-a-kind physical electrical grid testbed. The novel aspects of PhoenixSEN lie in a combination of existing and new network technologies and manageability by power distribution industry operators.
Motivated by the challenges of running unmodified third-party applications in an ad hoc network like PhoenixSEN, we propose a geographic resource discovery and query processing service for federated CPSs called SenSQL. The service combines a resource discovery protocol inspired by the LoST protocol with a standard SQL-based query interface. SenSQL aims to simplify the development of applications for federated or administratively decoupled autonomous cyber-physical systems without a single administrative or technological point of failure. The SenSQL framework balances control over autonomous cyber-physical devices and their data with service federation, limiting the application's reliance on centralized infrastructures or services.
We conclude the first part of the dissertation by presenting the design and implementation of a testbed for usability experiments with mission-critical voice, a vital communication modality in PhoenixSEN, and during emergency scenarios in general. The testbed can be used to conduct human-subject studies under emulated network conditions to assess the influence of various network parameters on the end-user's quality of experience.
The second dissertation part focuses on network enrollment of IoT devices, a management process that is often complicated, frustrating, and error-prone, particularly in consumer-oriented systems. We motivate the work by reverse-engineering and analyzing Amazon Echo's network enrollment protocol. The Echo is one of the most widely deployed IoT devices and, thus, an excellent case study. We learn that the process is rather complicated and cumbersome.
We then present a systematic study of IoT network enrollment with a focus on consumer IoT devices in advanced deployment scenarios, e.g., third-party installations, shared physical spaces, or evolving IoT systems. We evaluate existing frameworks and their shortcoming and propose WIDE, a network-independent enrollment framework designed to minimize user interactions to enable advanced deployment scenarios. WIDE is designed for large-scale or heterogeneous IoT systems where multiple independent entities cooperate to set the system up. We also discuss the design of a human-subject study to compare and contrast the usability of network enrollment frameworks.
A secure network must authenticate a new device before it can be enrolled. The authentication step usually requires physical device access, which may be impossible in many advanced deployment scenarios, e.g., when IoT devices are installed by a specialist in physically unreachable locations. We propose Lighthouse, a visible-light authentication protocol for physically inaccessible IoT devices. We discuss the protocol's design, develop transmitter and receiver prototypes, and evaluate the system. Our measurements with off-the-shelf components over realistic distances indicate authentication times shorter or comparable with existing methods involving gaining physical access to the device. We also illustrate how the visible-light authentication protocol could be used as another authentication method in other network enrollment frameworks.
|
38 |
Mentoring Abilities and Beliefs of Ohio Secondary Agricultural Education Mentor TeachersFoor, Ryan M. 03 September 2010 (has links)
No description available.
|
39 |
Cooperating Teacher Effectiveness as Perceived by Student Teachers and Cooperating Teachers in Ohio Agricultural EducationEpps, Rebekah Barnes 28 September 2010 (has links)
No description available.
|
40 |
Gestion de la variation de la qualité des sols par les agriculteurs : enjeux pour la rentabilité et la durabilité des exploitations agricoles françaises / Soil quality management by farmers : profitability and sustainability issues for agricultural farmsIssanchou, Alice 21 December 2017 (has links)
Gestion de la variation de la qualité des sols par les agriculteurs : enjeux pour la rentabilité et la durabilité des exploitations agricoles françaisesLa qualité des sols constitue un enjeu majeur en termes d’environnement et de préservation du potentiel agronomique et économique des exploitations agricoles. Les pratiques agricoles ont des impacts sur la qualité des sols, dont certains entraînent une dégradation des sols et mènent à une réduction de leur productivité. La thèse a pour objectif de caractériser et d'éclairer les enjeux économiques de moyen et long terme de la variation de la qualité des sols en mobilisant des outils théoriques, statistiques et empiriques. Nous tentons, en simulant différents scénarios économiques, d’identifier les leviers permettant de préserver le potentiel des sols. Nous utilisons un modèle dynamique de contrôle optimal où l'agent-agriculteur rationnel maximise son profit dans le temps sous contrainte de la dynamique de la qualité des sols.Il y a deux facteurs de production : les intrants productifs (tels les engrais minéraux azotés) et la qualité du sol, capturée par sa matière organique (MO). La qualité du sol est impactée par les intrants productifs utilisés par l'agriculteur, qui peut investir dans la qualité de ses sols via l'utilisation des résidus de culture, l'intensité de labour et les choix des rotations. Nos résultats montrent que l'investissement dans la qualité des sols fait partie d'une stratégie optimale de l'agriculteur qui, face à l'augmentation des prix des engrais et de l'énergie, substitue ainsi les fonctionnalités / Soil quality is a major issue for the environment and the preservation of the agronomic and economic potential of farms. Farming practices have substantial impacts on soil quality; some are detrimental and lead to a long-term decrease in productivity. The objective of this thesis is to characterize the mid-term and long-term economic issues related to soil quality changes using theoretical, statistical and empirical tools and to propose a dynamic bioeconomic model that highlights these issues. Using the simulations of different economic scenarios, we seek to identify the levers that make it possible to preserve the agronomic and economic potential of soil. The model used is a dynamic optimal control model where the rational agent-farmer with perfect information maximizes his profits over time under a soil quality dynamics constraint. We consider two production factors: productive inputs (such as mineral nitrogen fertilizers) and soil quality, captured by the quantity of soil organic mSoil quality is negatively impacted by the productive inputs used by the farmer, who can invest in his soil quality (crop residue use, tillage intensity, crop rotation choice). Our results show that soil quality investment is a component of the farmer's optimal strategy. The farmer substitutes the ecosystemic functionalities of his soil for chemical inputs in response to the increase in fertilizers and energy prices. However, the mitigated results of our empirical model in terms of SOM final values show the importance of considering a large range of farming practices. Our results offer a ba
|
Page generated in 1.0008 seconds