In anticipation of helping students mature from passive to more active learners while engaging with the issues and concepts surrounding computer security, a student generated Multiple Choice Question (MCQ) learning strategy was designed and deployed as a replacement for an assessment task that was previously based on students providing solutions to a series of short-answer questions. To determine whether there was any educational value in students generating their own MCQs students were required to design MCQs. Prior to undertaking this assessment activity each participant completed a pre-test which consisted of 45 MCQs based on the topics of the assessment. Following the assessment activity the participants completed a post-test which consisted of the same MCQs as the pre-test. The pre and post test results as well as the post test and assessment activity results were tested for statistical significance. The results indicated that having students generate their own MCQs as a method of assessment did not have a negative effect on the learning experience. By providing a framework to the students based on the literature to support their engagement with the learning material, we believe the creation of well-structured MCQs resulted in a more advanced understanding of the relationships between the concepts of the learning material as compared with plainly answering a series of short-answer questions from a textbook. Further study is required to determine to what degree this learning strategy encouraged a deeper approach to learning.

Abstract:
The problem considered is an investigation of the possible collapse of the roof between the pillar next to be mined in secondary coal mining and the first line of pillar remnants called snooks. The roof rock between the pillar, which is the working face, and the snook is modelled as an Euler-Bernoulli beam acted on at each end by a horizontal force and by its weight per unit length. The beam is clamped at the pillar and simply supported (hinged) at the snook. The dimensionless differential equation for the beam and the boundary conditions depend on one dimensionless number . We consider the range of values of before the displacement and curvature first become singular at . The model predicts that for all practical purposes, the beam will break at the clamped end at the pillar. The failure of the beam for values of greater than is investigated computationally. 1. Introduction We consider the challenge posed by coal mine pillar extraction [1, 2]. Secondary mining involves revisiting a mine and extracting coal from the pillars. The mining of these pillars commences from the area furthest away from the point of entry of the mine. This exercise involves cutting the existing pillars into smaller pillars called snooks. As each section is mined, the roof must collapse in a controlled manner in order to pose no safety risk to those miners operating underground. We analyse the behaviour of the roof of the mine between the pillar next to be mined and the first line of snooks. This is the work area and must be safe for the miners. 2. Model In Figure 1, a mining panel in shown prior to pillar extraction. The tunnels are excavated in coal which are approximately 5？m to 7？m wide. They are excavated in a fixed pattern crossing at right angles creating a checker board layout. The coal between the tunnels forms the pillars which support the overburden rock. The width of the pillars is approximately 10？m to 20？m wide and is a function of the depth of the mine. The height of the tunnels ranges from 3？m to 4？m. Secondary mining is carried out in two stages. In the initial stage, approximately 5 to 10 pillars are removed and the roof is left to collapse. This stage is modelled in [2]. Following this, adjacent pillars are mined and smaller sections are left to collapse. The purpose of this paper is to model the second stage in the extraction process. Figure 2 shows the snooks after pillar extraction. The pillars are cut to leave four snooks, approximately 2？m, one at each corner. The snooks have to be small enough to fail when the miners are a safe distance (about the width

Abstract:
Within the health policy field, a growing literature is attempting to understand the diverse responses of policy makers to research, and to explain why certain research findings make their way into policy while others are effectively ignored. In this paper we apply a policy analysis framework to the development of cotrimoxazole prophylaxis national policy in Malawi. Arguing that Malawi was one of the early adopters of cotrimoxazole prophylaxis at a national level, we show how the research to policy process was influenced by national healthcare context, the networks of individuals involved, and the nature of the public health evidence itself.

Abstract:
As Nuyorican musicians were laboring to develop the unique sounds of New York mambo and salsa, Nuyorican dancers were working just as hard to create a new form of dance. This dance, now known as on 2 mambo, or salsa, for its relationship to the clave, is the first uniquely North American form of vernacular Latino dance on the East Coast. This paper traces the New York mambo s development from its beginnings at the Palladium Ballroom through the salsa and hustle years and up to the present time. The current period is characterized by increasing growth, commercialization, codification, and a blending with other modern, urban dance genres such as hip-hop.

Abstract:
The single-mode Rayleigh-Taylor instability (smRTI) is This study reproduces three low-Atwood single mode Rayleigh-Taylor experimental runs [1] in a specialized version of the Nek5000 [2] spectral element code. The simulations use the initial amplitude, wavelength, acceleration, Atwood number, and viscosity from the three specific experiments and impose no-slip and no-flux boundaries on the velocity and scalar, respectively. The simulations are shown to reproduce the linear, saturation, stagnation, and re-acceleration phases of the smRTI seen in the experiments. Additionally, access to the full velocity and scalar fields demonstrates three different finite size effects: wall drag, wall lift, and a long wavelength mode along the diagonal. One of the simulations is extended by a factor of two in the vertical direction and the resulting late-time dynamics reach Froude numbers around 1.8, higher than previously reported. Finally, inspection of the span-wise flow reveals secondary flows of the first kind that transport the scalar from the bubble-spike interfaces into the bubble and spike centers. The agreement between simulations and experiments inspires confidence in the spectral element method for studying the Rayleigh-Taylor instability.

Abstract:
It is known that maximum distance separable and maximum distance profile convolutional codes exist over large enough finite fields of any characteristic for all parameters $(n,k,\delta)$. It has been conjectured that the same is true for convolutional codes that are strongly maximum distance separable. Using methods from linear systems theory, we resolve this conjecture by showing that, over a large enough finite field of any characteristic, codes which are simultaneously maximum distance profile and strongly maximum distance separable exist for all parameters $(n,k,\delta)$.

Abstract:
We introduce a refinement of the Bloch-Wigner complex of a field F. This is a complex of modules over the multiplicative group of the field. Instead of computing K_2 and indecomposable K_3 - as the classical Bloch-Wigner complex does - it calculates the second and third integral homology of SL_2 of the field. On passing to coinvariants for the action of the multiplicative group we recover the classical Bloch-Wigner complex. The case of finite fields is included throughout the article.

Abstract:
We use the properties of the refined Bloch group of a field to prove that H_3 of SL_2 of a global field is never finitely generated, and to calculate - up to some 2-torsion - H_3 of SL_2 of local fields with finite residue field of odd characteristic. We also give lower bounds for the 3-torsion in the H_3 of SL_2 of rings of S-integers.

Abstract:
We describe the third homology of SL_2 of local rings over Z[1/2] in terms of a refined Bloch group. We use this to derive a localization sequence for the third homology of SL_2 of certain discrete valuation rings and to calculate the H_3 of SL_2 of higher-dimensional local fields and their associated discrete valuation rings in terms of indecomposable K_3 and scissors congruence groups of intermediate residue fields.

Abstract:
We prove analogues of the fundamental theorem of algebraic K-theory for the second and third homology of SL_2 over an infinite field k. The statements involve Milnor-Witt K-theory and scissors congruence groups. We use these results to calculate the low-dimensional homology of SL_2 of Laurent polynomials over certain fields.