scholarly journals IDENTIFIKASI KEANEKARAGAMAN DAN POLA PENYEBARAN MAKROALGA DI DAERAH PASANG SURUT PANTAI PIDAKAN KABUPATEN PACITAN SEBAGAI SUMBER BELAJAR BIOLOGI

2015 ◽  
Vol 1 (1) ◽  
Author(s):  
Ilham Budi Setyawan ◽  
Wahyu Prihanta ◽  
Elly Purwanti

IDENTIFIKASI KEANEKARAGAMAN DAN POLA PENYEBARAN MAKROALGA DI DAERAH PASANG SURUT PANTAI PIDAKAN KABUPATEN PACITAN SEBAGAI SUMBER BELAJAR BIOLOGI   Ilham Budi Setyawan1, Wahyu Prihanta1, dan Elly Purwanti1 1Program Studi Pendidikan Biologi, FKIP, Universitas Muhammadiyah Malang e-mail: [email protected]     ABSTRACT   This research aimed to find out variance, ecology parameter,variance index,and dispersion pattern of macroalgae existed in intertidal pidakan beach sub-district Pacitan Residence.The results of research in the area of tidal beach Pidakan on 90 plots was found in 1925 with 17 individual macro algae species originating from the third division Rhodophyta, Chlorophyta and Phaeophyta.Variance index of (H’) was high richness category and value (E) was means community tend to flat. Index of Morisita (IM) mean dispersion of all Macroalgae was clumped. As a complement to the results of the study are used as a learning module macroalgae for SMA/MA. Keywords: identification, diversity, macroalgae, beach, Pacitan

Hypatia ◽  
1997 ◽  
Vol 12 (3) ◽  
pp. 7-16 ◽  
Author(s):  
Rita Alfonso ◽  
Jo Trigilio

As third wave feminist philosophers attending graduate schools in different parts of the country, we decided to use our e-mail discussion as the format for presenting our thinking on the subject of third wave feminism. Our analogue takes us through the subjects of postmodernism, the relationship between theory and practice, the generation gap, and the power relations associated with feminist philosophy as an established part of the academy.


Author(s):  
Vicenç Torra ◽  
Yasuo Narukawa ◽  
Sadaaki Miyamoto

This special issue presents seven papers that are revised and expanded versions of papers presented at the 2nd International Conference on "Modeling Decisions for Artificial Intelligence" (MDAI). This conference, that took place in Tsukuba (Japan) in July 2005, was the second of the series of MDAI conferences that were initiated in 2004 in Barcelona (Catalonia, Spain). In April 2006, the third edition was held in Tarragona (Catalonia, Spain) and the fourth one is planned in Kitakyushu (Japan) in August 2007. These series of conferences were initiated to foster the use of decision related tools as well as information fusion technologies within artificial intelligence applications. In this issue, we present enhanced version of seven papers presented in the conference. The first paper describes a tool that uses fuzzy logic and neural networks for assigning a treatment to rheumatism. The selection of the appropriate treatment follows oriental medicine. The second paper by Wanyama and Far describes a tool for trade-off analysis to be used in those situations related with decision making in which there is no dominant solution. The third paper is devoted to autonomous mobile robots. The authors describe a multi-layered fuzzy control system for the self-localization of the robot. Two papers devoted to fuzzy clustering follow in this issue. First, one that presents a regularization approach with nonlinear membership weights. One of the proposed methods makes not only possible to perform attraction of data to clusters but also repulsion between different clusters. The second paper on clustering proposes the simultaneous application of homogeneity analysis and fuzzy clustering through the consideration of an appropriate objective function that includes two types of memberships. The sixth paper presents a tool for e-mail classification. The tool brings the name of FIS-CRM that stands for Fuzzy Interrelations and Synonymy Conceptual Representation Model. The issue finishes with a paper on meta-heuristic algorithms for a class of container loading problems. To finish this introduction, we would like to thank the referees for their work on the review process as well as to thank Prof. Hirota, Editor-in-Chief of this journal, for providing us with the opportunity to edit this special issue. The help of Kazuki Ohmori and Kenta Uchino from Fuji Technology Press Ltd. is also acknowledged.


2020 ◽  
Vol 39 (4) ◽  
pp. 291-291

The March 2020 TLE article by Alexandrov et al., “Normal faulting activated by hydraulic fracturing: A case study from the Barnett Shale, Fort Worth Basin,” contained an error in the third author's affiliation and e-mail address. Umair bin Waheed's correct affiliation is King Fahd University of Petroleum and Minerals, and the correct e-mail address for the author is [email protected] .


2014 ◽  
Vol 631-632 ◽  
pp. 902-905
Author(s):  
Yan Wang ◽  
Jun Hui Zheng

By analyzing a variety of computer network architectures, we can find that researchers establish different computer network models from their different starting points and get different computer network architectures by different modularization methods. We establish a well modularized non-layered computer network architecture. This paper compares it with the layered architecture and obtains a conclusion that it is superior to the layered architecture. We have developed two framework prototypes of it. In the one of them we develop some application softwares of TCP/IP, including E-mail, FTP, Web and standard IP telephone, which have been tested by the third-party. It could show the accuracy and easily implemented property of this architecture.


10.28945/3302 ◽  
2009 ◽  
Author(s):  
Pao-Nan Chou ◽  
Wei-Fan Chen

In Taiwan, instant messenger usage has become the third most frequently engaged online activity following web cyberspace’s web surfing and e-mail. Among different kinds of instant messengers, Windows Live Messenger (WLM) is the most popular software program. The purpose of this study is to explore users’ name-display behaviors on WLM from a self-disclosure perspective. The study employs phenomenological methodology to elicit lived experiences of using the name-display feature in the WLM. Twelve subjects, 3 women and 9 men, participated in this study. From 12 verbatim transcripts, after identifying significant statements, clustering the formulated meanings resulted in 9 themes. The key findings are: (1) Self-disclosure behavior exists in the name-display feature in the instant messenger; (2) Participants revealed disclosure topics to achieve self-expression purpose; (3) Social support occurred when participants identified other online users’ nicknames; (4) Participants revealed their nicknames for social validation; (5) Self-disclosures would not reveal messages that provoke threats; (6) In order to create a certain desired impression, participants would manipulate the disclosure messages; and (7) Silent self-disclosure with verbal forms is participants’ preference in cyberspace.


Author(s):  
Janet Richards ◽  
Steve Haberlin

Little research portrays collaborative analytic inquiry in practice. Drawing on our dual lenses, we, a professor and a doctoral student in an advanced qualitative methods course, applied principles of collaborative analytic inquiry to construct new understandings about key events that occurred during an advanced qualitative research class. Using asynchronous e-mail communication, we shared, affirmed, and questioned each other’s and our own storied recollections of moments of joy and learning intertwined with some challenging issues. To begin our inquiry, we planned and negotiated our responsibilities, voiced our concerns and questions pertinent to the project, and avowed our willingness to risk emotional vulnerability and discomfort as we confronted our truths. We also studied the extant literature to learn about analytic inquiry since our work, followed some tenets of this research method. We conducted our work in three phases. In the third phase of our study we documented what we believed were significant, problematic issues in the course and responded to each other’s and our own assumptions. Our reflections helped us establish the value of collaborative analytic inquiry to create space for self-study. In the process of our work we came to recognize that the broad themes in our research, although not generalizable, might occur in any teaching context.


2020 ◽  
Vol 6 (1) ◽  
pp. 32-53
Author(s):  
Kadar M. Yusuf ◽  
Alwizar Alwizar ◽  
Irawati Irawati

Three are three main problems to focus of this research. First, the form of learning tools for Economics is integrated with Islamic sharia, which includes Semester Learning Plans (RPS) and modules. Second, the use of these two tools in learning. Furthermore, the third evaluation of the results of its use, which is found in students, which includes asking them to learn it and their mastery of teaching material. This research uses the R & D research model, which begins with designing the RPS and Economics Economics modules integrated with Islamic shariah and then implemented in learning. The results of the study illustrate that the RPS (teaching plan) was successfully designed by incorporating it into the integration model of Economics with Shari'ah, which includes three alternatives namely Al-Nushush al-Syar'iyah (Syariah Texts), Al-Tahlil al-Syar`i (Islamic law Analysis), and Al-Naqd al-Syar`i (Islamic law Critics). Likewise, the learning module for Economics is integrated with Islamic sharia, it has also been successfully formulated. In addition to the RPS and modules, the results of the study also showed that the lecturer supporting the course was able to convey Islamic sharia in relation to the material being taught. Likewise, students, they are very enthusiastic about taking Economics lectures that are integrated with Islamic sharia. It can be seen in their very high interest in taking this course, as well as their excellent learning outcomes.


2009 ◽  
Vol 62 (1) ◽  
pp. 63
Author(s):  
Ralph L Scott

This column is the third installment of a fourpart series on computer security. The recent “Mydoom” virus attack was an example of afast-spreading Internet virus that clogs incoming mail boxes. Many of you have already received a ton of emails from people you have never heard of, or messages from “PAYROLL,” “Message returned,” or “TRAFFIC OFFICE.” These were distributed to you because someone did not keep his/her computer anti-virus software up-to-date and/or opened an e-mail attachment that contained the virus. Outside of the admonition not to open e-mail attachments from people you don’t know, what can you do to prevent the spread of viruses to other computers?


EduKimia ◽  
2021 ◽  
Vol 3 (3) ◽  
pp. 178-184
Author(s):  
Made Sukaryawan ◽  
K Anom W ◽  
Jejem Mujamil

Students need modules in 21st century learning, especially in entrepreneurship courses. The study aims to describe the characteristics of students towards the Integrated Chemistry Learning Module STEM Entrepreneurship Course in Chemistry Education Sriwijaya University, the topic of Feed for Increasing Non-Racial Chicken Eggs. This research was conducted on the third semester student in Chemistry Education Sriwijaya University with a descriptive method. The research data were collected using a valid questionnaire with a reliability coefficient of 0.925, interviews and documentation. The results of the study show that the characteristics of student are very suitable or enable or feasible to compose a learning module on the topic of Increasing Non-Racial Chicken Eggs, in the 21st century. Student responded agree and strongly agree to use this module respectively by 57.8 percent and 42.2 percent. Respondents agree and strongly agree that they are accustomed to using Android or Internet or Laptop, respectively, by 62,2 percent and 34,4 percent.


2021 ◽  
Vol 27 (2) ◽  
pp. 216-216
Author(s):  
Bruno Costa Coscarelli

AbstractThe purpose of this thesis is to develop a paraconsistent Model Theory. The basis for such a theory was launched by Walter Carnielli, Marcelo Esteban Coniglio, Rodrigo Podiack, and Tarcísio Rodrigues in the article ‘On the Way to a Wider Model Theory: Completeness Theorems for First-Order Logics of Formal Inconsistency’ [The Review of Symbolic Logic, vol. 7 (2014)].Naturally, a complete theory cannot be fully developed in a single work. Indeed, the goal of this work is to show that a paraconsistent Model Theory is a sound and worthy possibility. The pursuit of this goal is divided in three tasks: The first one is to give the theory a philosophical meaning. The second one is to transpose as many results from the classical theory to the new one as possible. The third one is to show an application of the theory to practical science.The response to the first task is a Paraconsistent Reasoning System. The start point is that paraconsistency is an epistemological concept. The pursuit of a deeper understanding of the phenomenon of paraconsistency from this point of view leads to a reasoning system based on the Logics of Formal Inconsistency. Models are regarded as states of knowledge and the concept of isomorphism is reformulated so as to give raise to a new concept that preserves a portion of the whole knowledge of each state. Based on this, a notion of refinement is created which may occur from inside or from outside the state.In order to respond to the second task, two important classical results, namely the Omitting Types Theorem and Craig’s Interpolation Theorem are shown to hold in the new system and it is also shown that, if classical results in general are to hold in a paraconsistent system, then such a system should be in essence how it was developed here.Finally, the response to the third task is a proposal of what a Paraconsistent Logic Programming may be. For that, the basis for a paraconsistent PROLOG is settled in the light of the ideas developed so far.Abstract prepared by Bruno Costa Coscarelli.E-mail: [email protected]: http://repositorio.unicamp.br/jspui/handle/REPOSIP/331697


Sign in / Sign up

Export Citation Format

Share Document