accessible domain
Recently Published Documents


TOTAL DOCUMENTS

8
(FIVE YEARS 5)

H-INDEX

2
(FIVE YEARS 1)

2021 ◽  
Author(s):  
Macy A. Burchfield ◽  
Joshua Rosenberg ◽  
Conrad Borchers ◽  
Tayla Thomas ◽  
Ben Gibbons ◽  
...  

As the use of social media increases in daily life, it has also increased for institutions in the field of education. While there may be benefits for schools to use this media outlet, the privacy of students within those schools may be at risk when their names and photos are shared on such a publicly accessible domain. In this study, we analyzed the extent to which students’ privacy is protected by qualitatively coding a random sample of 100 Facebook posts made by U.S. school districts from a population of over 9.3 million photo posts that we collected. Using inferential techniques, we found that students are somewhat protected compared to teachers and community members, with only 2.67% of students’ detected faces able to be identified by name. These numbers at first appear small, but if applied to the entire population, this could potentially leave between 153,218 and 1,l53,844 students identifiable to anyone on the Internet; the number of photos of students posted by schools and districts is much greater still, between 15.2 and 20.3 million. The same measure for staff and community members were 4.6% and 16%, respectively. We discuss the severity and scale of these privacy threats and make recommendations for research on student privacy in social media and other informal education-related contexts. In all, these could represent the largest publicly available collection of identifiable photos of students (and children) in the United States and could seriously threaten the privacy of those identified.


2020 ◽  
Vol 26 (3-4) ◽  
pp. 298-299
Author(s):  
Patrick Walsh
Keyword(s):  

2020 ◽  
pp. 51-94
Author(s):  
Anik Waldow

The second chapter examines Locke’s account of self-formation as it is presented in Some Thoughts Concerning Education (1693). It will be argued that, for Locke, the evaluative perspective that arises when confronted with other people’s expressions of praise and blame crucially underpins the human capacity to think of themselves as persons. The second half of this chapter applies the results of this discussion to Locke’s account of personhood, as developed in the second edition of An Essay Concerning Human Understanding (1694). The aim of this is to demonstrate that even here it holds that the contents of what figures in our self-conception as persons are determined by the actions we perform in the publicly accessible domain.


Author(s):  
Gohar Aleksanyan

Abstract In this article we use a flatness improvement argument to study the regularity of the free boundary for the biharmonic obstacle problem with zero obstacle. Assuming that the solution is almost one-dimensional, and that the non-coincidence set is an non-tangentially accessible domain, we derive the $$C^{1,\alpha }$$C1,α-regularity of the free boundary in a small ball centred at the origin. From the $$C^{1,\alpha }$$C1,α-regularity of the free boundary we conclude that the solution to the biharmonic obstacle problem is locally $$ C^{3,\alpha }$$C3,α up to the free boundary, and therefore $$C^{2,1}$$C2,1. In the end we study an example, showing that in general $$ C^{2,\frac{1}{2}}$$C2,12 is the best regularity that a solution may achieve in dimension $$n \ge 2$$n≥2.


2019 ◽  
Vol 1213 ◽  
pp. 052004
Author(s):  
Tong Han ◽  
Xiaofei Wang ◽  
Yajun Liang ◽  
Shuo Ku
Keyword(s):  

2012 ◽  
Vol 591-593 ◽  
pp. 781-784
Author(s):  
Bing Chen ◽  
Kai Liu ◽  
Qiu Shi Gao

This paper puts forward a kind of method which can calculate tool accessible domain for tool axis optimization in the complex curved surface multi-axis machining. At first , the point model has been construced on the base of constrained surface.The second, based on any possible direction of tool axis vector of a given cutting contact point, the distance between a point and a line is used to decide whether occurs collision and interfence. The third, two angles related with cutter-axes vector is definied. The regulation of tool accessible domain can be implemented by getting the boundary of the discrete points in the coordinate planes. Finally, a tool has been developed to calculate tool accessible domain, and an example is given to verify the effectiveness of the method.


2005 ◽  
Vol 201 (12) ◽  
pp. 1885-1890 ◽  
Author(s):  
Irene M. Min ◽  
Lisa R. Rothlein ◽  
Carol E. Schrader ◽  
Janet Stavnezer ◽  
Erik Selsing

The mechanisms that target class switch recombination (CSR) to antibody gene switch (S) regions are unknown. Analyses of switch site locations in wild-type mice and in mice that lack the Sμ tandem repeats show shifts indicating that a 4–5-kb DNA domain (bounded upstream by the Iμ promoter) is accessible for switching independent of Sμ sequences. This CSR-accessible domain is reminiscent of the promoter-defined domains that target somatic hypermutation. Within the 4–5-kb CSR domain, the targeting of S site locations also depends on the Msh2 mismatch repair protein because Msh2-deficient mice show an increased focus of sites to the Sμ tandem repeat region. We propose that Msh2 affects S site location because sequences with few activation-induced cytidine deaminase targets generate mostly switch DNA cleavages that require Msh2-directed processing to allow CSR joining.


1987 ◽  
Vol 104 (4) ◽  
pp. 897-903 ◽  
Author(s):  
DS Kohtz ◽  
V Georgieva-Hanson ◽  
JD Kohtz ◽  
WJ Schook ◽  
S Puszkin

The two forms of clathrin light chains (LCA and LCB) or clathrin-associated proteins (CAP1 and CAP2) have presented an immunochemical paradox. Biochemically similar, both possess two known functional parameters: binding the clathrin heavy chain and mediating the action of an uncoating ATPase. All previously reported anti-CAP mAbs, however, react specifically with only CAP1 (Brodsky, F. M., 1985, J. Cell Biol., 101:2047-2054; Kirchhausen, T., S. C. Harrison, P. Parham, and F. M. Brodsky, 1983, Proc. Natl. Acad. Sci. USA, 80:2481-2485). Four new anti-CAP mAbs are reported here: two, C-7H12 and C-6C1, react with both forms; two others, C-10B2 and C-4E5, react only with the lower form. Sandwich ELISAs indicated that C-10B2, C-4E5, C-6C1, and C-7H12 react with distinct epitopes. Monoclonal antibodies C-10B2 and C-4E5 immunoprecipitate clathrin-coated vesicles (CCVs) and react with CAP2 epitopes accessible to chymotrypsin on the vesicle. These mAbs inhibit phosphorylation of CAP2 by endogenous CCV casein kinase II. In contrast, C-6C1 and C-7H12 react with epitopes that are relatively insensitive to chymotrypsin. CAP peptide fragments containing these epitopes remain bound to reassembled cages or CCVs after digestion. Immunoprecipitation and ELISAs demonstrate that C-7H12 and C-6C1 react with unbound CAPs but not with CAPs bound to triskelions or CCVs. The data indicate that the CAPs consist of at least two discernible structural domains: a nonconserved, accessible domain that is relevant to the phosphorylation of CAP2 and a conserved, inaccessible domain that mediates the binding of CAPs to CCVs.


Sign in / Sign up

Export Citation Format

Share Document