great ease
Recently Published Documents


TOTAL DOCUMENTS

38
(FIVE YEARS 17)

H-INDEX

4
(FIVE YEARS 1)

2022 ◽  
pp. 477-490
Author(s):  
Darrell Norman Burrell ◽  
Ashley Dattola ◽  
Maurice E. Dawson ◽  
Calvin Nobles

The growth and development of cybersecurity jobs and careers have created a need for new skilled faculty that can effectively teach the appropriate content to students at all levels. Often instructors are hired based on their academic credentials and professional experience without the use of assessment and faculty development methods to discover if these instructors can teach effectively or even improve the way they teach. Effective instructors have the ability constructively adjust teaching approaches when students are excelling or struggling based on skillful observation and constant assessment. If a student learns something with great ease, perhaps that approach would be of benefit to others. Part of what helps novices develop expertise here is their explicit attempt to understand how and why something works for students. The implementation and use of microteaching can provide a quality improvement approach to help cybersecurity instructors on all levels improve their ability to teach effectively.


2021 ◽  
Author(s):  
Jeremiah Corrado ◽  
Jake Harmon ◽  
Branislav Notaros

We present an application of fully anisotropic hp-adaptivity over quadrilateral meshes for H(curl)-conforming discretizations in Computational Electromagnetics (CEM). Traditionally, anisotropic h-adaptivity has been difficult to implement under the constraints of the Continuous Galerkin Formulation; however, Refinement-by-Superposition (RBS) facilitates anisotropic mesh adaptivity with great ease. We present a general discussion of the theoretical considerations involved with implementing fully anisotropic hp-refinement, as well as an in-depth discussion of the practical considerations for 2-D FEM. Moreover, to demonstrate the benefits of both anisotropic h- and p-refinement, we study the 2-D Maxwell eigenvalue problem as a test case. The numerical results indicate that fully anisotropic refinement can provide significant gains in efficiency, even in the presence of singular behavior, substantially reducing the number of degrees of freedom required for the same accuracy with isotropic hp-refinement. This serves to bolster the relevance of RBS and full hp-adaptivity to a wide array of academic and industrial applications in CEM<br>


2021 ◽  
Author(s):  
Jeremiah Corrado ◽  
Jake Harmon ◽  
Branislav Notaros

We present an application of fully anisotropic hp-adaptivity over quadrilateral meshes for H(curl)-conforming discretizations in Computational Electromagnetics (CEM). Traditionally, anisotropic h-adaptivity has been difficult to implement under the constraints of the Continuous Galerkin Formulation; however, Refinement-by-Superposition (RBS) facilitates anisotropic mesh adaptivity with great ease. We present a general discussion of the theoretical considerations involved with implementing fully anisotropic hp-refinement, as well as an in-depth discussion of the practical considerations for 2-D FEM. Moreover, to demonstrate the benefits of both anisotropic h- and p-refinement, we study the 2-D Maxwell eigenvalue problem as a test case. The numerical results indicate that fully anisotropic refinement can provide significant gains in efficiency, even in the presence of singular behavior, substantially reducing the number of degrees of freedom required for the same accuracy with isotropic hp-refinement. This serves to bolster the relevance of RBS and full hp-adaptivity to a wide array of academic and industrial applications in CEM<br>


2021 ◽  
Author(s):  
RICHA SINHA

Abstract Monosodium Glutamate is a food additive well-known as a flavor enhancer being used extensively in food industries. Also, it has long been used as a cheap source of fertilizer owing to the presence of high nitrogen contents in it. Furthermore, it also shows genotoxic effects on plants. Hence, in the present study the genotoxic properties of Monosodium Glutamate had been explored to assess its potential as a mutagen. The objective was specifically to find out its potential in inducing polyploidy in plants. For this, a medicinal plant, Urginea indica Kunth with immensely high therapeutic value was selected. The effectiveness and efficiency of Monosodium Glutamate on Urginea indica Kunth was assessed based on the records obtained after treatments in two generations, viz. M1 and M2 Generations. Its effectiveness and efficiency on Urginea indica Kunth pave a way for its use as a potential mutagen which can induce genetic variability among the selected wild species of the plants with great ease. Moreover, the higher degree of polyploidy obtained in the M2 generation established the objective of the experiment, that Monosodium Glutamate could be used with controlled, adequate dose and maintained experiment setup in inducing polyploidy in plants.


2020 ◽  
Vol 4 (2) ◽  
pp. 9
Author(s):  
Gabriel Pérez ◽  
Xavier F. Rodríguez ◽  
Josep María Burgués ◽  
Marc Solé ◽  
Julià Coma

Beyond of BIM technology consolidation, the incorporation of virtual reality in the field of architecture and construction implies a new breakthrough which implies several advantages both at professional and academic levels. With the aim to measure the potential of this technology, a set of immersive activities were performed at the University of Lleida in the degree of Technical Architecture and Buildings. From the results, it could be observed the great ease of students in learning the use of virtual reality tools and the great potential of these solutions not only in learning architecture and construction but also as a professional working tool, especially for the design phases.ResumenMás allá de la consolidación de la tecnología BIM, la incorporación de la realidad virtual en el campo de la arquitectura y la construcción implica un nuevo avance que conlleva varias ventajas tanto a nivel profesional como académico. Con el objetivo de medir el potencial de esta tecnología, se realizaron un conjunto de actividades inmersivas en el grado de Arquitectura Técnica y Edificación de la Universidad de Lleida. A partir de los resultados, se pudo observar la gran facilidad de los estudiantes para aprender el uso de herramientas de realidad virtual y el gran potencial de estas soluciones no solo en el aprendizaje de arquitectura y construcción, sino también como una herramienta de trabajo profesional, especialmente para las fases de diseño.


Phytotaxa ◽  
2020 ◽  
Vol 464 (3) ◽  
pp. 252-256
Author(s):  
GIDEON F. SMITH ◽  
ESTRELA FIGUEIREDO

Aloe arborescens Miller (1768: no. 3 on first page headed “ALO ALO”) (Fig. 1A) is a parent of some intergeneric alooid hybrids, as well as of interspecific hybrids in Aloe Linnaeus (1753: 319), that have become popular in domestic and even industrial-scale horticulture [see for example Smith & Figueiredo 2015: 20, and Figueiredo & Smith 2019 on A. ×caesia Salm-Reifferscheidt-Dyck (1817: 29)]. Numerous forms of A. arborescens have additionally been provided with cultivar names (Van Jaarsveld 2002, Smith et al. 2021). Where A. arborescens and A. hardyi Glen (1987: plate 1942) (Figs 1B, C) are grown together, these two species hybridise with great ease and offspring of this hybrid are increasingly found in cultivation. However, to date the hybrid with the formula A. arborescens × A. hardyi does not have a name to enable easy communication about it. We here describe this increasingly common horticultural hybrid as A. ×engelbrechtii Gideon F.Sm. & Figueiredo (Figs 2A, B).


2020 ◽  
Vol 8 (8) ◽  
Author(s):  
Barry Murnane ◽  
Darragh Murnane ◽  
Mark Sanders ◽  
Noel Snell

The accuracy of economic decisions depends on the quality of financial information, mainly derived from financial statements prepared by business entities and other units. Thus, there is a need to create so-called information systems for early warning. Good information could protect many entities from the risk of bankruptcy. This is particularly true for micro, small and medium-sized business entities. For such entities there is a need to create simple indicators informing about the impending financial crisis, most often associated with the loss of the ability to settle current liabilities. The aim of the article is to present a group of financial indicators on the basis of which managers can easily and most importantly very quickly assess the possibility of financial difficulties arising, which will result in the bankruptcy of an individual. Most importantly, the indicators presented can be used by managers of small enterprises with great ease. The indicators presented are primarily addressed to a group of small and medium-sized enterprises thanks to which managers can protect an enterprise against bankruptcy.


Network is the prime demand of today’s outreaching development in every sector. Starting from a small institute to big sectors like Industry, Organization, Defense, Ministry and Medicine all are dependent on network to maintain their data transmission efficiently. It provides the great ease of operation and information sharing. As we know with greater ease, much greater threat is handy. With the network also a big threat is associated i.e. network attacks. There are some major attacks which can violate and damage the whole network system and its integrity. Wireless attacks are very common and an intruder with vast knowledge of network administration and modification can easily find the loopholes in the security systems. There are different attacks like Denial of Services (DoS), Sniffer, Password Based, Spoofing, Eavesdropping etc. but the most dangerous of all is spoofing. Spoofing is an attack type in that the intruder impersonates as original identity and use their identity to achieve the intrusion goal. The attack is so severe because the user, even after seeing the intruder cannot identify it as the external body and take immediate action. The intruder enters the network and steals all the information as a legitimate user and damages the integrity of network. We propose here to find the intruder by using the energy consumption by nodes using the dead, asleep and active nodes. We can localize the location of intruders in the network using this technique. We use Received Signal Strength (RSS) to see the energy consumption of each node as the fluctuation of intruder node will be different from genuine nodes.


2019 ◽  
Vol 3 (Supplement_1) ◽  
pp. S866-S866
Author(s):  
Amanda E Hunsaker ◽  
Minh Hao Nguyen ◽  
Jaelle Fuchs ◽  
Teodora Djukaric ◽  
Larissa Hugentobler ◽  
...  

Abstract Older adults comprise a highly heterogeneous group that engages with digital media in varying ways, therefore a large variation in technology support needs is likely. This study examines the nature of support for using digital media among older adults. We conducted in-depth qualitative interviews with older adults (age 59+) in Hungary, the Netherlands, and Switzerland (N=58) in 2019 exploring: (1) whether and how older adults receive support in using digital media; and (2) older adults’ perceptions of whether the support they receive meets their needs. We began with open coding, then conducted consensus meetings to identify themes and coding schemes, and wrote memos to share findings and ensure reliability across coders. We find that older adults voice a highly varying range of need for technical support as well as varying instances of both receiving and not receiving technical help. Participants report receiving help from different informal (e.g. spouses) and formal (e.g. computer classes) sources. However, support may not be immediate, posing challenges for older adults who depend on the availability of their support sources. Importantly, we also find that there are older adults who are quite self-sufficient in the ways they use digital technology. For older adults needing support, greater access to community-based support may help those without satisfactory options in their own social circle. Given our findings that older adults can have great ease with solving technology-related problems, peer-driven support networks where older adults can offer support to others may be an effective approach to providing digital technology guidance.


Sign in / Sign up

Export Citation Format

Share Document