Skip to main content

Home/ Diigo In Education/ Group items tagged detection

Rss Feed Group items tagged

Kelly Boushell

Thanksgiving Interactive: You are the Historian | Plymoth Plantation - 85 views

  •  
    "What really happened at the First Thanksgiving? Become a history detective and find out! In this fun, award-winning activity, kids take on the role of "history detectives" to investigate what really happened at the famous 1621 celebration. (Hint: It was a lot more than just a feast!) Along the way, they'll read a letter written by an eyewitness to the event, learn about Wampanoag traditions of giving thanks, and visit Pilgrim Mary Allerton's home. As a final activity, kids can design and print their own Thanksgiving exhibit panel."
Brad Belbas

update on Warner Music (UPDATED) (AGAIN) (Lessig Blog) - 0 views

  •  
    This is a video of a talk that Lawrence Lessig (Professor, Stanford Law School) gave for an organization. In his talk, Lessig provides a powerful and piercing analysis and critique on the impact that legal restrictions on the re/use of media resources has on creativity and cultural production. During his talk, Lessig shows some remarkably creative mash-ups videos on YouTube to exemplify the kind of creativity/cultural production that is possible through ubiquitous digital media. Ironically, the organization that hosted the talk received a notice from Warner Bros Music after posting a video of the Lessig's talk on YouTube, which, according to Lessig's blog, "objected to its being posted on copyright grounds." Warner Brother Music Group has implemented content-id algorithms (i.e., technology that detects the digital "fingerprint" of corporate-"owned" copyrighted works) through media hosting services, including YouTube, FaceBook, and others. When the video of Lessig's talk was posted, it was 'dusted' for fingerprints of WBMG copyrighted works. The detection system identified the soundtracks in the YouTube videos Lessig showed, as materials to which they held copyright. Both the video of Lessig's talk and the blog conversation regarding WBMG's objection are must-see resources.
thatcher bohrman

Lies, damned lies and the Internet | Learning with 'e's - 2 views

  • I regularly ask my own students to challenge what is being said in the classroom. I advise them to question everything they hear, read or see, to help develop their critical thinking abilities, to practice defending or attacking a theory, to exercise their evaluative skills. I read recently of one professor who deliberately lied once each lesson, and challenged his students to detect the lie. As the lies became more subtle, the students began to struggle to detect the falsehood, until eventually they were at the point where they were deeply scrutinising everything that was presented in the lesson, and going beyond the content to make sure they had discovered the lie. They had to discuss extensively to put themselves in a position where they knew what was correct and what was incorrect. The web is a very fertile place to learn, but we all need to develop our critical awareness of what content is good and what is to be avoided.
  • What is today's student to make of all this? Deliberately misleading websites are only the tip of the iceberg when it comes to bad content on the web. Let's take this a little further. How do students discern the difference between a website that hosts good, empirical, well established content, and one that doesn't? And how do they detect when a website is not based on established fact, but is merely a collection of
Beth Panitz

Autism Awareness Project - 19 views

  • provides individuals and agencies who work with infants, toddlers, and preschool children with Early Detection Kits, at no charge.
  •  
    AAP provides individuals and agencies who work with infants, toddlers, and preschool children with Early Detection Kits, at no charge. 
GP withMdmLin

Abortion laws cannot hinge on when life 'begins' - 15 views

  •  
    In his letter, "Arguments that should be aborted" (April 3), Mr Devathas Satianathan states that it is unclear how Associate Professor Tan Seow Hon's religious view is relevant. From Edwin Dai Weiyun - 03 April In his letter, "Arguments that should be aborted" (April 3), Mr Devathas Satianathan states that it is unclear how Associate Professor Tan Seow Hon's religious view is relevant. However, I would ask if her premise is that life begins at six weeks from conception, or possibly earlier, an interpretation that would be informed by her religious views. To say that her view on this has no bearing on her commentary is intellectual dishonesty. She also cited recent legislative developments in North Dakota, a Bible Belt state. Mr Jason Cheng responded, in "Let pregnant women make their own moral choices" (April 2), that six weeks is insufficient time for women to detect their pregnancy, which basically results in a de facto ban on abortion. Mr Devathas argues that, in the balance between preserving a baby's life and a mother's choice, Mr Cheng fails to acknowledge the former. Ironically, Mr Devathas fails to acknowledge the latter. Where he discusses a valid point is in the question: When does life begin? Answers to such a question, though, are varied across society and influenced by the religious views, or a lack thereof, of the individual. It is unwise and unconstitutional for the State to legislate or endorse the moral views of any religious group over other members of society. People who hold strong pro-life views are free to bring their babies to full term. The same liberty should be accorded to people who hold pro-choice views."
  •  
    This does not seems to be educational but maybe I misunderstood what would be fed to me through diigo. In any event since it come through, I pose this philosophical non-religious question: If you were 2 weeks pregnant and I punched you in the stomach which in turn killed the fetus, it would definitely be assault on you, but should I be criminally responsible for the fetus? If so, why?
tom campbell

Kids With Autism Quick To Detect Motion : Shots - Health News : NPR - 19 views

  •  
    A new study and some new knowledge!
Marcia Jeans

Bouncy Balls - Bounce balls with your mouse or microphone - 5 views

  •  
    Essentially, Bouncy Balls is a website that activates your microphone and detects noise level. The more noise in the room, the more the balls bounce. The quieter the room is, the more still the balls remain. Although this tool has a number of applications outside of classroom management, I thought it was a fun, engaging way to monitor noise levels. Ask students to try to keep the balls as still as possible during class, and maybe reward them by allowing them to sing and be noisy on their way out of class 
onepulledthread

Great Web Tools to Detect Plagiarism in Students Works ~ Educational Technology and Mob... - 215 views

  •  
    Summarizes the usefulness of major web tools available to facilitate intructor's ability to find plagiarism.
Deborah Baillesderr

Who Am I?: A History Mystery - 73 views

  •  
    Students becoming historical detectives.
MichaeL Gurr

Stages of Learning Sport Skills - 38 views

  • Stages of Learning Sport
  • cognitive stage
  • Beginners are not always aware of what they did wrong, nor do they know how to correct errors. They need basic, specific instruction and feedback during this phase.
  • ...8 more annotations...
  • understands the fundamentals of the skill and is in the process of refining the skill
  • experience fewer errors and can detect some of them on their own
  • more consistent and learners begin to know what is relevant and what is not.
  • point the skill is well learned
  • performs the skill automatically without having to focus on execution
  • few errors and athletes can detect and know how to correct them. They can concentrate more on other aspects of the game.
  • athletes transition from learning the goal of the skill to perfecting it, coaches can diversify instruction and practice conditions.
  • For closed skills, practices should be structured to match the conditions of competition. For open skills, the coach must systematically vary the conditions under which the skill is being learned and performed in preparation for competition. See Training Variation
smilex3md

Educators Study Online Dishonesty - NYTimes.com - 67 views

  •  
    New ways to trip up plagiarism detection software and online cheating.
Kenuvis Romero

Journal of Cerebral Blood Flow & Metabolism - Multiple Microvascular and Astroglial 5-H... - 0 views

  • Physiologic and anatomic evidence suggest that 5-hydroxytryptamine (5-HT) neurons regulate local cerebral blood flow and blood-brain barrier permeability.
  • capillary endothelial cells exhibited mRNA for the h5-HT1D and for the 5-HT7 receptors whereas microvascular smooth muscle cells, in addition to h5-HT1D and 5-HT7, also showed polymerase chain reaction products for h5-HT1B receptors. Expression of 5-HT1F and 5-HT2A receptor mRNAs was never detected in any of the microvascular cell cultures. In contrast, messages for all 5-HT receptors tested were detected in human brain astrocytes with a predominance of the 5-HT2A and 5-HT7 subtypes. In all cultures, sumatriptan inhibited (35–58%, P < .05) the forskolin-stimulated production of cyclic AMP, an effect blocked by the 5-HT1B/1D receptor antagonists GR127935 and GR55562. In contrast, 5-carboxamidotryptamine induced strong increases (≥ 400%, P < .005) in basal cyclic AMP levels that were abolished by mesulergine, a nonselective 5-HT7 receptor antagonist. Only astroglial cells showed a ketanserin-sensitive increase (177%, P < .05) in IP3 formation when exposed to 5-HT. These results show that specific populations of functional 5-HT receptors are differentially distributed within the various cellular compartments of the human cortical microvascular bed, and that human brain astroglial cells are endowed with multiple 5-HT receptors. These findings emphasize the complex interactions between brain serotonergic pathways and non-neuronal cells within the CNS and, further, they raise the possibility that some of these receptors may be activated by antimigraine compounds such as brain penetrant triptan derivatives.
Christian King

On the Run : Detective Games : Investigation Discovery - 12 views

  •  
    Solve an interactive crime by gathering clues. Each virtual case gets progressively harder and it's a real challenge to solve all the cases.
Michelle Ohanian

Photo Tampering Throughout History - 1 views

  • Photo Tampering Throughout History Photography lost its innocence many years ago. In as early as the 1860s, photographs were already being manipulated, only a few decades after Niepce created the first photograph in 1814. With the advent of high-resolution digital cameras, powerful personal computers and sophisticated photo-editing software, the manipulation of digital images is becoming more common. Here, I have collected some examples of tampering throughout history. To help contend with the implications of this tampering, we have developed a series of tools for detecting traces of tampering in digital images (contact me at Ma'at Consulting for more information about our services). circa 1860: This nearly iconic portrait of U.S. President Abraham Lincoln is a composite of Lincoln's head and the Southern politician John Calhoun's body. Putting the date of this image into context, note that the first permanent photographic image was created in 1826 and the Eastman Dry Plate Company (later to become Eastman Kodak) was created in 1881. circa 1865: In this photo by famed photographer Mathew Brady, General Sherman is seen posing with his Generals. General Francis P. Blair (far right) was added to the original photograph.
  • Photo Tampering Throughout History Photography lost its innocence many years ago. In as early as the 1860s, photographs were already being manipulated, only a few decades after Niepce created the first photograph in 1814. With the advent of high-resolution digital cameras, powerful personal computers and sophisticated photo-editing software, the manipulation of digital images is becoming more common. Here, I have collected some examples of tampering throughout history. To help contend with the implications of this tampering, we have developed a series of tools for detecting traces of tampering in digital images (contact me at Ma'at Consulting for more information about our services). circa 1860: This nearly iconic portrait of U.S. President Abraham Lincoln is a composite of Lincoln's head and the Southern politician John Calhoun's body. Putting the date of this image into context, note that the first permanent photographic image was created in 1826 and the Eastman Dry Plate Company (later to become Eastman Kodak) was created in 1881. circa 1865: In this photo by famed photographer Mathew Brady, General Sherman is seen posing with his Generals. General Francis P. Blair (far right) was added to the original photograph.
  •  
    shows examples of tainting images to persuade
Paul Bogush

Five Ideas for Making a Purposeful and Professional Digital Footprint - 48 views

  •  
    Five ideas to enable educators to develop and model a purposeful and professional digital footprint.
    1-Model responsible footprinting with your own practices in blogging, commenting, social networking, and picture posting.
    2-If you have established a professional blog, share it widely and proudly such as placing it in your email signature (if your employer will let you) and as Jeff Utecht suggests include your blog url when you comment on others blogs and in other forums. This enables others to see best practices and is a great way to get the conversation started.
    3-Google yourself (aka ego surfing). If you have something posted online that you'd be uncomfortable having a current or future student, parent, colleague, or employer find, delete it (if you can) or request that it be deleted. There are ways an aggressive internet detective can still find this information, but most won't go through the trouble and the mere fact that you deleted it shows some level of responsibility.
    4-If you do have online personal information and/or interests you wouldn't want discovered, use an unidentifiable screen name/avatar. This means you may need to update your screen name/avatar in your existing online presence.
    5-Engage in the conversation and professionally comment, reply, and present online, onsite, and at conferences.
Melanie Weser

Internet Detective | Home - 86 views

  •  
    well-designed, detailed, topics include quality of information on internet, plagiarism & citation, definitions of information sources, much more, geared towards college, could be used in high school 
  •  
    Free Internet Research tutorial takes about an hour to complete
1 - 20 of 46 Next › Last »
Showing 20 items per page