Knot Theory: In Imitation of Lewis Thomas is a collection of 14, 1200-word essays written in the style of Lewis Thomas, a physician who regularly contributed to The New England Journal of Medicine. His 1200-word column, "Notes of a Biology Watcher," ran from 1971 - 1980. The resulting compilations collectively...
This study compared wives defined as underemployed by educational
mismatch with not underemployed wives on four major predictor variables--
relative market work advantage; degree of competition in the
female labor market; time demands from family members; and assistance
with childcare and other housework. The data were from NE 113, An...
The purpose of this study was to discern unpredicted, non-linear patterns that may emerge in complex instructional systems design projects. A secondary purpose was to determine how existing models could be redesigned to accommodate emerging factors. The following questions focused the inquiry:
1. In what ways does the actual ISD...
It is well established that the choice of yeast used to perform wine fermentation significantly influences the sensory attributes of wines; different yeast species and strains impart different profiles of esters, volatile fatty acids, higher alcohols, and volatile sulphur compounds. Indeed, choice of yeast remains one of the simplest means...
The purpose of the study was to analyze and compare the teaching
styles of a trial group of junior secondary science teachers
trained to use and using new materials, and a control group of teachers
using traditional materials. The new materials consisted of portable
science kits, demonstration apparatus, teacher's guides,...
The research of genealogy and family history can represent a means of self-discovery, connection, and preservation of the past. The experience is individualistic, unique to the intricate intertwining of lives that helped create and influence who we are today. Through the analysis of historical biographies, family documents, and autobiographical vignettes,...
Secure Computation is a powerful tool that enables a set of parties to jointly compute any function over their private inputs, without a trusted third party. Private Set Intersection is a specific case of two-party Secure Computation, where Alice (with private set X) and Bob (with private set Y) specifically...
Teachers may be attracted to the use of a game in a learning activity under the presumption that students will find the game experience to be more “fun” than typical classroom activities. The use of a game in a learning activity should help students attain important learning outcomes and engage...
: ________________________________________________________________
Thomas P. Dick
Teachers may be attracted to the use of a game in a learning activity
Two field experiments were established during the spring of
1970 in an effort to characterize the effects of nitrogen fertilizer and
plant maturity on the yield, composition and quality of peppermint
(Mentha piperitta var. Mitcham) oil. These experiments were located
in central Oregon, near Madras, and in the Willamette Valley,...
A combination of theoretical perspectives is used to create a rich description of student reasoning when facing a highly-geometric electricity and magnetism problem in an upper-division active-engagement physics classroom at Oregon State University. Geometric reasoning as students encounter problem situations ranging from familiar to novel is described using van Zee...