Lesson: Skip Counting: 5S, 10S, 100S Lesson Topic: Skip Count by 5S from Multiples of 5 Question 1

Total Page:16

File Type:pdf, Size:1020Kb

Lesson: Skip Counting: 5S, 10S, 100S Lesson Topic: Skip Count by 5S from Multiples of 5 Question 1 Lesson: Skip Counting: 5s, 10s, 100s Lesson Topic: Skip count by 5s from multiples of 5 Question 1: Skip count by fives and fill in the missing numbers. , 20, 25, , 35, 40, , 50, 55 Question 2: Skip count by fives and fill in the missing numbers. , 15, 20, , 30, 35, , 45, 50 Question 3: Skip count by fives and fill in the missing numbers. 30, 35, 40, , , , 60, 65, 70 Question 4: Skip count by fives and fill in the missing numbers. 160, 165, , , , 185, 190, 195, 200 Question 5: Skip count by fives and fill in the missing numbers. 190, 195, , 205, , 215, 220, , 230 Lesson Topic: See hundreds as a bundle of tens and ones Question 1: Write the number of tens shown. tens Question 2: Write the number of tens shown. tens Question 3: Write the number of hundreds shown. hundreds Question 4: Write the number of ones shown. ones Question 5: Write the number of ones shown. ones Lesson Topic: Skip count by 5s with manipulatives Question 1: Question 2: Question 3: Question 4: Question 5: Lesson Topic: Skip count by 10s with manipulatives Question 1: Skip count by tens to find the number of bees. There are bees. Question 2: Skip count by tens to find the number of blocks. There are blocks. Question 3: Skip count by tens to find the number of stars. There are stars. Question 4: Skip count by tens to find the number of fingers. There are fingers. Question 5: Skip count by tens to find the total number of blocks. There are blocks. Lesson Topic: Skip count by 10s from multiples of 10 Question 1: Skip count by tens and fill in the missing numbers. 50, 60, 70, , 90, 100, , Question 2: Skip count by tens and fill in the missing numbers. 20, , 40, 50, , 70, 80, Question 3: Skip count by tens and fill in the missing numbers. 40, 50, 60, , , , 100, 110 Question 4: Skip count by tens and fill in the missing numbers. , 210, 220, 230, , , 260, 270 Question 5: Skip count by tens and fill in the missing numbers. 340, 350, 360, , , 390, , 410 Lesson Topic: Skip count by 100s with manipulatives Question 1: Skip count by hundreds and find the total number of blocks. There are blocks. Question 2: What number do the blocks represent? Two Hundred Three Hundred Four Hundred Five Hundred Six Hundred Question 3: What number do the blocks represent? Four Hundred Five Hundred Six Hundred Seven Hundred Eight Hundred Question 4: Skip count by hundreds and find the total number of students. There are students. Question 5: Skip count by hundreds and find the total number of blocks. There are blocks. Lesson Topic: Skip count by 100s from multiples of 100 Question 1: Skip count by hundreds and fill in the missing numbers. 400, 500, 600, , , Question 2: Skip count by hundreds and fill in the missing numbers. , 400, , 600, 700, , 900 Question 3: Skip count by hundreds and fill in the missing numbers. 100, , 300, , 500, 600, Question 4: Skip count by hundreds and fill in the missing numbers. , , 300, 400, 500, Question 5: Skip count by hundreds and fill in the missing numbers. 400, , 600, , 800, Lesson Topic: Skip count by 100s Question 1: Skip count by hundreds and fill in the missing numbers. 100, 200, 300, , , 600 Question 2: Skip count by hundreds and fill in the missing numbers. 100, 200, 300, 400, 500, 600, , Question 3: Skip count by hundreds and fill in the missing numbers. 100, 200, 300, 400, 500, 600, , , Question 4: Skip count by hundreds and fill in the missing numbers. 100, 200, , , Question 5: Skip count by hundreds and fill in the missing numbers. 100, 200, 300, 400, 500, 600, 700, , Lesson Topic: Skip count by 5s, 10s, and 100s Question 1: Skip count by fives and write the numbers. , 10, , , 25, Question 2: Skip count by fives and write the numbers. 15, , , , 35, Question 3: Skip count by tens and write the numbers. , , 30, , 50, Question 4: Skip count by tens and write the numbers. , , , , 150, 160 Question 5: Skip count by tens and write the numbers. , , 220, , 240, Lesson: Comparing Three-Digit Numbers Lesson Topic: Compare three-digit numbers Question 1: Question 2: Fill in the blank. 218 is _______ 412 < = > Question 3: Question 4: Fill in the blank. 561 is _______ 538 > < = Question 5: Lesson Topic: Identify equivalent inequalities Question 1: Question 2: Question 3: Question 4: Question 5: Lesson Topic: Sort three-digit numbers Question 1: Order the numbers from least to greatest. 458, 621, 211, 201 201 < 211 < 458 < 621 621 < 458 < 211 < 201 621 < 458 < 201 < 211 211 < 201 < 458 < 621 none of the above Question 2: Order the numbers from least to greatest. 234, 613, 128, 342 128 < 234 < 342 < 613 613 < 342 < 234 < 128 128 < 342 < 234 < 613 234 < 128 < 342 < 613 none of the above Question 3: Order the numbers from least to greatest. 768, 145, 98, 764 98 < 145 < 764 < 768 768 < 764 < 145 < 98 764 < 768 < 145 < 98 145 < 98 < 764 < 768 none of the above Question 4: Order the numbers from least to greatest. 743, 621, 211, 620 621 < 620 < 211 < 743 211 < 621 < 620 < 743 743 < 621 < 211 < 620 211 < 620 < 621 < 743 none of the above Question 5: Order the numbers from least to greatest. 832, 983, 137, 397 983 < 832 < 397 < 137 397 < 983 < 832 < 137 137 < 397 < 983 < 832 137 < 397 < 832 < 983 none of the above Lesson Topic: Sort three-digit numbers 2 Question 1: Write the numbers in order from least to greatest. 774, 348, 634, 322 < < < Question 2: Write the numbers in order from least to greatest. 786, 768, 678, 876 < < < Question 3: Write the numbers in order from greatest to least. 458, 621, 211, 201 > > > Question 4: Write the numbers in order from greatest to least. 543, 45, 54, 534 > > > Question 5: Write the numbers in order from greatest to least. 234, 613, 128, 342 > > > Lesson Topic: Compare three-digit numbers word problems Question 1: On Halloween, the Morellis gave out 478 pieces of candy and the Clarks gave out 487 pieces of candy. Which family gave out more candy? Morelli Clark Both families gave out the same amount of candy. Question 2: The distance from Potomac, Maryland to Raleigh, North Carolina is 270 miles. The distance from Potomac to Boston, Massachusetts is 446 miles. Which city is closer to Potomac? Raleigh The cities are the same distance from Potomac. Boston Question 3: During the month of December, Salem Middle School had a record of 218 absences and Wright Middle School had a record of 281 absences. Which school had more absences in December? Wright Middle School Both schools had the same number of absences. Salem Middle School Question 4: The movie "New Moon" made 709 million dollars, and the movie "Shrek 2" made 919 million dollars. Which movie made more money? New Moon Shrek 2 The movies made the same amount of money. Question 5: A shoe store sold 402 shoes in October and 205 shoes in November. In which month did the store sell more shoes? The store sold the same number of shoes in October and November. November October Lesson Topic: Sort three-digit numbers word problems Question 1: A zoo has 458 mammals, 149 amphibians, 622 fish, and 324 reptiles. Put the animal class populations in order from greatest to least. 622 fish > 324 reptiles > 458 mammals > 149 amphibians 149 amphibians > 458 mammals > 324 reptiles > 622 fish 149 amphibians > 324 reptiles > 458 mammals > 622 fish 622 fish > 458 mammals > 324 reptiles > 149 amphibians Question 2: Adrienne is buying a new oven. The four ovens she is looking at cost $198, $583, $490, and $538. Put the prices in order from least to greatest. $538 < $490 < $198 < $583 $198 < $490 < $538 < $583 $583 < $538 < $490 < $198 $198 < $490 < $583 < $538 Question 3: Nicholas served 150 ounces of fruit punch, 169 ounces of limeade, and 129 ounces of smoothie at a party. Put the drink amounts in order from least to greatest? 150 oz < 169 oz < 129 oz 129 oz < 150 oz < 169 oz 129 oz < 169 oz < 150 oz 150 oz < 129 oz < 169 oz Question 4: Camera A costs $249, Camera B costs $220, Camera C costs $198, and Camera D costs $209. Put the cameras in order from least expensive to most expensive? $198 < $209 < $220 < $249 $209 < $249 < $198 < $220 $249 < $198 < $209 < $220 $220 < $209 < $249 < $198 Question 5: Joan flew to four different cities for vacation. Her first flight was 296 miles, the second flight was 336 miles, the third flight was 320 miles, and the fourth flight was 256 miles. Put these distances in order from least to greatest. 256 miles < 336 miles < 296 miles < 320 miles 296 miles < 256 miles < 336 miles < 320 miles 320 miles < 296 miles < 256 miles < 336 miles 256 miles < 296 miles < 320 miles < 336 miles Lesson: Adding with Unknowns Lesson Topic: Add two known numbers using a number line Question 1: Question 2: Question 3: Question 4: Question 5: What number makes the equation true? 8 + 56 = Lesson Topic: Add two known numbers using a number line word problems Question 1: The bakery held a bake sale and sold 11 peanut butter cookies and 23 vanilla cupcakes. How many items did they sell in all? items Question 2: Heather collected interesting leaves for a class project. She collected 19 red leaves and 39 yellow leaves. How many leaves did Heather collect in all? leaves Question 3: Our school's basketball team played in a tournament.
Recommended publications
  • A Combinatorial Game Theoretic Analysis of Chess Endgames
    A COMBINATORIAL GAME THEORETIC ANALYSIS OF CHESS ENDGAMES QINGYUN WU, FRANK YU,¨ MICHAEL LANDRY 1. Abstract In this paper, we attempt to analyze Chess endgames using combinatorial game theory. This is a challenge, because much of combinatorial game theory applies only to games under normal play, in which players move according to a set of rules that define the game, and the last player to move wins. A game of Chess ends either in a draw (as in the game above) or when one of the players achieves checkmate. As such, the game of chess does not immediately lend itself to this type of analysis. However, we found that when we redefined certain aspects of chess, there were useful applications of the theory. (Note: We assume the reader has a knowledge of the rules of Chess prior to reading. Also, we will associate Left with white and Right with black). We first look at positions of chess involving only pawns and no kings. We treat these as combinatorial games under normal play, but with the modification that creating a passed pawn is also a win; the assumption is that promoting a pawn will ultimately lead to checkmate. Just using pawns, we have found chess positions that are equal to the games 0, 1, 2, ?, ", #, and Tiny 1. Next, we bring kings onto the chessboard and construct positions that act as game sums of the numbers and infinitesimals we found. The point is that these carefully constructed positions are games of chess played according to the rules of chess that act like sums of combinatorial games under normal play.
    [Show full text]
  • Literariness.Org-Mareike-Jenner-Auth
    Crime Files Series General Editor: Clive Bloom Since its invention in the nineteenth century, detective fiction has never been more pop- ular. In novels, short stories, films, radio, television and now in computer games, private detectives and psychopaths, prim poisoners and overworked cops, tommy gun gangsters and cocaine criminals are the very stuff of modern imagination, and their creators one mainstay of popular consciousness. Crime Files is a ground-breaking series offering scholars, students and discerning readers a comprehensive set of guides to the world of crime and detective fiction. Every aspect of crime writing, detective fiction, gangster movie, true-crime exposé, police procedural and post-colonial investigation is explored through clear and informative texts offering comprehensive coverage and theoretical sophistication. Titles include: Maurizio Ascari A COUNTER-HISTORY OF CRIME FICTION Supernatural, Gothic, Sensational Pamela Bedore DIME NOVELS AND THE ROOTS OF AMERICAN DETECTIVE FICTION Hans Bertens and Theo D’haen CONTEMPORARY AMERICAN CRIME FICTION Anita Biressi CRIME, FEAR AND THE LAW IN TRUE CRIME STORIES Clare Clarke LATE VICTORIAN CRIME FICTION IN THE SHADOWS OF SHERLOCK Paul Cobley THE AMERICAN THRILLER Generic Innovation and Social Change in the 1970s Michael Cook NARRATIVES OF ENCLOSURE IN DETECTIVE FICTION The Locked Room Mystery Michael Cook DETECTIVE FICTION AND THE GHOST STORY The Haunted Text Barry Forshaw DEATH IN A COLD CLIMATE A Guide to Scandinavian Crime Fiction Barry Forshaw BRITISH CRIME FILM Subverting
    [Show full text]
  • Appendix B. Random Number Tables
    Appendix B. Random Number Tables Reproduced from Million Random Digits, used with permission of the Rand Corporation, Copyright, 1955, The Free Press. The publication is available for free on the Internet at http://www.rand.org/publications/classics/randomdigits. All of the sampling plans presented in this handbook are based on the assumption that the packages constituting the sample are chosen at random from the inspection lot. Randomness in this instance means that every package in the lot has an equal chance of being selected as part of the sample. It does not matter what other packages have already been chosen, what the package net contents are, or where the package is located in the lot. To obtain a random sample, two steps are necessary. First it is necessary to identify each package in the lot of packages with a specific number whether on the shelf, in the warehouse, or coming off the packaging line. Then it is necessary to obtain a series of random numbers. These random numbers indicate exactly which packages in the lot shall be taken for the sample. The Random Number Table The random number tables in Appendix B are composed of the digits from 0 through 9, with approximately equal frequency of occurrence. This appendix consists of 8 pages. On each page digits are printed in blocks of five columns and blocks of five rows. The printing of the table in blocks is intended only to make it easier to locate specific columns and rows. Random Starting Place Starting Page. The Random Digit pages numbered B-2 through B-8.
    [Show full text]
  • Effects of a Prescribed Fire on Oak Woodland Stand Structure1
    Effects of a Prescribed Fire on Oak Woodland Stand Structure1 Danny L. Fry2 Abstract Fire damage and tree characteristics of mixed deciduous oak woodlands were recorded after a prescription burn in the summer of 1999 on Mt. Hamilton Range, Santa Clara County, California. Trees were tagged and monitored to determine the effects of fire intensity on damage, recovery and survivorship. Fire-caused mortality was low; 2-year post-burn survey indicates that only three oaks have died from the low intensity ground fire. Using ANOVA, there was an overall significant difference for percent tree crown scorched and bole char height between plots, but not between tree-size classes. Using logistic regression, tree diameter and aspect predicted crown resprouting. Crown damage was also a significant predictor of resprouting with the likelihood increasing with percent scorched. Both valley and blue oaks produced crown resprouts on trees with 100 percent of their crown scorched. Although overall tree damage was low, crown resprouts developed on 80 percent of the trees and were found as shortly as two weeks after the fire. Stand structural characteristics have not been altered substantially by the event. Long term monitoring of fire effects will provide information on what changes fire causes to stand structure, its possible usefulness as a management tool, and how it should be applied to the landscape to achieve management objectives. Introduction Numerous studies have focused on the effects of human land use practices on oak woodland stand structure and regeneration. Studies examining stand structure in oak woodlands have shown either persistence or strong recruitment following fire (McClaran and Bartolome 1989, Mensing 1992).
    [Show full text]
  • Call Numbers
    Call numbers: It is our recommendation that libraries NOT put J, +, E, Ref, etc. in the call number field in front of the Dewey or other call number. Use the Home Location field to indicate the collection for the item. It is difficult if not impossible to sort lists if the call number fields aren’t entered systematically. Dewey Call Numbers for Non-Fiction Each library follows its own practice for how long a Dewey number they use and what letters are used for the author’s name. Some libraries use a number (Cutter number from a table) after the letters for the author’s name. Other just use letters for the author’s name. Call Numbers for Fiction For fiction, the call number is usually the author’s Last Name, First Name. (Use a comma between last and first name.) It is usually already in the call number field when you barcode. Call Numbers for Paperbacks Each library follows its own practice. Just be consistent for easier handling of the weeding lists. WCTS libraries should follow the format used by WCTS for the items processed by them for your library. Most call numbers are either the author’s name or just the first letters of the author’s last name. Please DO catalog your paperbacks so they can be shared with other libraries. Call Numbers for Magazines To get the call numbers to display in the correct order by date, the call number needs to begin with the date of the issue in a number format, followed by the issue in alphanumeric format.
    [Show full text]
  • Girls' Elite 2 0 2 0 - 2 1 S E a S O N by the Numbers
    GIRLS' ELITE 2 0 2 0 - 2 1 S E A S O N BY THE NUMBERS COMPARING NORMAL SEASON TO 2020-21 NORMAL 2020-21 SEASON SEASON SEASON LENGTH SEASON LENGTH 6.5 Months; Dec - Jun 6.5 Months, Split Season The 2020-21 Season will be split into two segments running from mid-September through mid-February, taking a break for the IHSA season, and then returning May through mid- June. The season length is virtually the exact same amount of time as previous years. TRAINING PROGRAM TRAINING PROGRAM 25 Weeks; 157 Hours 25 Weeks; 156 Hours The training hours for the 2020-21 season are nearly exact to last season's plan. The training hours do not include 16 additional in-house scrimmage hours on the weekends Sep-Dec. Courtney DeBolt-Slinko returns as our Technical Director. 4 new courts this season. STRENGTH PROGRAM STRENGTH PROGRAM 3 Days/Week; 72 Hours 3 Days/Week; 76 Hours Similar to the Training Time, the 2020-21 schedule will actually allow for a 4 additional hours at Oak Strength in our Sparta Science Strength & Conditioning program. These hours are in addition to the volleyball-specific Training Time. Oak Strength is expanding by 8,800 sq. ft. RECRUITING SUPPORT RECRUITING SUPPORT Full Season Enhanced Full Season In response to the recruiting challenges created by the pandemic, we are ADDING livestreaming/recording of scrimmages and scheduled in-person visits from Lauren, Mikaela or Peter. This is in addition to our normal support services throughout the season. TOURNAMENT DATES TOURNAMENT DATES 24-28 Dates; 10-12 Events TBD Dates; TBD Events We are preparing for 15 Dates/6 Events Dec-Feb.
    [Show full text]
  • Season 6, Episode 4: Airstream Caravan Tukufu Zuberi
    Season 6, Episode 4: Airstream Caravan Tukufu Zuberi: Our next story investigates the exotic travels of this vintage piece of Americana. In the years following World War II, Americans took to the open road in unprecedented numbers. A pioneering entrepreneur named Wally Byam seized on this wanderlust. He believed his aluminium-skinned Airstream trailers could be vehicles for change, transporting Americans to far away destinations, and to a new understanding of their place in the world. In 1959, he dreamt up an outlandish scheme: to ship 41 Airstreams half way around the globe for a 14,000-mile caravan from Cape Town to the pyramids of Egypt. Nearly 50 years later, Doug and Suzy Carr of Long Beach, California, think these fading numbers and decal may mean their vintage Airstream was part of this modern day wagon train. Suzy: We're hoping that it's one of forty-one Airstreams that went on a safari in 1959 and was photographed in front of the pyramids. Tukufu: I’m Tukufu Zuberi, and I’ve come to Long Beach to find out just how mobile this home once was. Doug: Hi, how ya doing? Tukufu: I'm fine. How are you? I’m Tukufu Zuberi. Doug: All right. I'm Doug Carr. This is my wife Suzy. Suzy: Hey, great to meet you. Welcome to Grover Beach. Tukufu: How you doing? You know, this is a real funky cool pad. Suzy: It's about as funky as it can be. Tukufu: What do you have for me? Suzy: Well, it all started with a neighbor, and he called over and said, “I believe you have a really famous trailer.” He believed that ours was one of a very few that in 1959 had gone on a safari with Wally Byam.
    [Show full text]
  • Fluid-Structure Interaction in Coronary Stents: a Discrete Multiphysics Approach
    chemengineering Article Fluid-Structure Interaction in Coronary Stents: A Discrete Multiphysics Approach Adamu Musa Mohammed 1,2,* , Mostapha Ariane 3 and Alessio Alexiadis 1,* 1 School of Chemical Engineering, University of Birmingham, Birmingham B15 2TT, UK 2 Department of Chemical Engineering, Faculty of Engineering and Engineering Technology, Abubakar Tafawa Balewa University, Bauchi 740272, Nigeria 3 Department of Materials and Engineering, Sayens—University of Burgundy, 21000 Dijon, France; [email protected] * Correspondence: [email protected] or [email protected] (A.M.M.); [email protected] (A.A.); Tel.: +44-(0)-776-717-3356 (A.M.M.); +44-(0)-121-414-5305 (A.A.) Abstract: Stenting is a common method for treating atherosclerosis. A metal or polymer stent is deployed to open the stenosed artery or vein. After the stent is deployed, the blood flow dynamics influence the mechanics by compressing and expanding the structure. If the stent does not respond properly to the resulting stress, vascular wall injury or re-stenosis can occur. In this work, a Discrete Multiphysics modelling approach is used to study the mechanical deformation of the coronary stent and its relationship with the blood flow dynamics. The major parameters responsible for deforming the stent are sorted in terms of dimensionless numbers and a relationship between the elastic forces in the stent and pressure forces in the fluid is established. The blood flow and the stiffness of the stent material contribute significantly to the stent deformation and affect its rate of deformation. The stress distribution in the stent is not uniform with the higher stresses occurring at the nodes of the structure.
    [Show full text]
  • MAGAZINE ® ISSUE 6 Where Everyone Goes for Scripts and Writers™
    DECEMBER VOLUME 17 2017 MAGAZINE ® ISSUE 6 Where everyone goes for scripts and writers™ Inside the Mind of a Thriller Writer PAGE 8 Q&A with Producer Lauren de Normandie of Status Media & Entertainment PAGE 14 FIND YOUR NEXT SCRIPT HERE! CONTENTS Contest/Festival Winners 4 Feature Scripts – FIND YOUR Grouped by Genre SCRIPTS FAST 5 ON INKTIP! Inside the Mind of a Thriller Writer 8 INKTIP OFFERS: Q&A with Producer Lauren • Listings of Scripts and Writers Updated Daily de Normandie of Status Media • Mandates Catered to Your Needs & Entertainment • Newsletters of the Latest Scripts and Writers 14 • Personalized Customer Service • Comprehensive Film Commissions Directory Scripts Represented by Agents/Managers 40 Teleplays 43 You will find what you need on InkTip Sign up at InkTip.com! Or call 818-951-8811. Note: For your protection, writers are required to sign a comprehensive release form before they place their scripts on our site. 3 WHAT PEOPLE SAY ABOUT INKTIP WRITERS “[InkTip] was the resource that connected “Without InkTip, I wouldn’t be a produced a director/producer with my screenplay screenwriter. I’d like to think I’d have – and quite quickly. I HAVE BEEN gotten there eventually, but INKTIP ABSOLUTELY DELIGHTED CERTAINLY MADE IT HAPPEN WITH THE SUPPORT AND FASTER … InkTip puts screenwriters into OPPORTUNITIES I’ve gotten through contact with working producers.” being associated with InkTip.” – ANN KIMBROUGH, GOOD KID/BAD KID – DENNIS BUSH, LOVE OR WHATEVER “InkTip gave me the access that I needed “There is nobody out there doing more to directors that I BELIEVE ARE for writers than InkTip – nobody.
    [Show full text]
  • Metric Entropy and Minimax Rates
    Journal of Machine Learning Research 22 (2021) 1-45 Submitted 6/20; Revised 12/20; Published 1/21 Optimal Structured Principal Subspace Estimation: Metric Entropy and Minimax Rates Tony Cai [email protected] Department of Statistics University of Pennsylvania Philadelphia, PA 19104, USA Hongzhe Li [email protected] Department of Biostatistics, Epidemiology and Informatics University of Pennsylvania Philadelphia, PA 19104, USA Rong Ma [email protected] Department of Biostatistics, Epidemiology and Informatics University of Pennsylvania Philadelphia, PA 19104, USA Editor: Ambuj Tewari Abstract Driven by a wide range of applications, several principal subspace estimation problems have been studied individually under different structural constraints. This paper presents a uni- fied framework for the statistical analysis of a general structured principal subspace estima- tion problem which includes as special cases sparse PCA/SVD, non-negative PCA/SVD, subspace constrained PCA/SVD, and spectral clustering. General minimax lower and up- per bounds are established to characterize the interplay between the information-geometric complexity of the constraint set for the principal subspaces, the signal-to-noise ratio (SNR), and the dimensionality. The results yield interesting phase transition phenomena concern- ing the rates of convergence as a function of the SNRs and the fundamental limit for consistent estimation. Applying the general results to the specific settings yields the mini- max rates of convergence for those problems, including the previous unknown optimal rates for sparse SVD, non-negative PCA/SVD and subspace constrained PCA/SVD. Keywords: Low-rank matrix; Metric entropy; Minimax risk; Principal component anal- ysis; Singular value decomposition 1. Introduction Spectral methods such as the principal component analysis (PCA) and the singular value decomposition (SVD) are a ubiquitous technique in modern data analysis with a wide range of applications in many fields including statistics, machine learning, applied mathematics, and engineering.
    [Show full text]
  • Fracking by the Numbers
    Fracking by the Numbers The Damage to Our Water, Land and Climate from a Decade of Dirty Drilling Fracking by the Numbers The Damage to Our Water, Land and Climate from a Decade of Dirty Drilling Written by: Elizabeth Ridlington and Kim Norman Frontier Group Rachel Richardson Environment America Research & Policy Center April 2016 Acknowledgments Environment America Research & Policy Center sincerely thanks Amy Mall, Senior Policy Analyst, Land & Wildlife Program, Natural Resources Defense Council; Courtney Bernhardt, Senior Research Analyst, Environmental Integrity Project; and Professor Anthony Ingraffea of Cornell University for their review of drafts of this document, as well as their insights and suggestions. Frontier Group interns Dana Bradley and Danielle Elefritz provided valuable research assistance. Our appreciation goes to Jeff Inglis for data assistance. Thanks also to Tony Dutzik and Gideon Weissman of Frontier Group for editorial help. We also are grateful to the many state agency staff who answered our numerous questions and requests for data. Many of them are listed by name in the methodology. The authors bear responsibility for any factual errors. The recommendations are those of Environment America Research & Policy Center. The views expressed in this report are those of the authors and do not necessarily reflect the views of our funders or those who provided review. 2016 Environment America Research & Policy Center. Some Rights Reserved. This work is licensed under a Creative Commons Attribution Non-Commercial No Derivatives 3.0 Unported License. To view the terms of this license, visit creativecommons.org/licenses/by-nc-nd/3.0. Environment America Research & Policy Center is a 501(c)(3) organization.
    [Show full text]
  • Trustworthy Whole-System Provenance for the Linux Kernel
    Trustworthy Whole-System Provenance for the Linux Kernel Adam Bates, Dave (Jing) Tian, Thomas Moyer Kevin R.B. Butler University of Florida MIT Lincoln Laboratory {adammbates,daveti,butler}@ufl.edu [email protected] Abstract is presently of enormous interest in a variety of dis- In a provenance-aware system, mechanisms gather parate communities including scientific data processing, and report metadata that describes the history of each ob- databases, software development, and storage [43, 53]. ject being processed on the system, allowing users to un- Provenance has also been demonstrated to be of great derstand how data objects came to exist in their present value to security by identifying malicious activity in data state. However, while past work has demonstrated the centers [5, 27, 56, 65, 66], improving Mandatory Access usefulness of provenance, less attention has been given Control (MAC) labels [45, 46, 47], and assuring regula- to securing provenance-aware systems. Provenance it- tory compliance [3]. self is a ripe attack vector, and its authenticity and in- Unfortunately, most provenance collection mecha- tegrity must be guaranteed before it can be put to use. nisms in the literature exist as fully-trusted user space We present Linux Provenance Modules (LPM), applications [28, 27, 41, 56]. Even kernel-based prove- the first general framework for the development of nance mechanisms [43, 48] and sketches for trusted provenance-aware systems. We demonstrate that LPM provenance architectures [40, 42] fall short of providing creates a trusted provenance-aware execution environ- a provenance-aware system for malicious environments. ment, collecting complete whole-system provenance The problem of whether or not to trust provenance is fur- while imposing as little as 2.7% performance overhead ther exacerbated in distributed environments, or in lay- on normal system operation.
    [Show full text]