115 resultados para Instruction set


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Visitors to prison are generally innocent of committing crime, but their interaction with inmates has been studied as a possible incentive to reduce recidivism. The way visitors’ centres are currently designed takes in consideration mainly security principles and the needs of guards or prison management. The human experience of the relatives or friends aiming to provide emotional support to inmates is usually not considered; facilities have been designed with an approach that often discourages people from visiting. This paper discusses possible principles to design prison visitors’ centres taking in consideration practical needs, but also human factors. A comparative case study analysis of different secure typologies, like libraries, airports or children hospitals, provides suggestions about how to approach the design of prison in order to ensure the visitor is not punished for the crimes of those they are visiting.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Faculty and reference librarians at the Queensland University of Technology have collaborated in an attempt to improve the quality of literature reviews in civil engineering final -year research projects. This article describes the instructional program devised and the level of faculty support for the librarians' contribution, and presents survey results revealing how students could most benefit from BI and how the classroom collaboration affected student project work. The authors offer some observations about the possible impact of 81 in general, and on engineers in particular, which may provide a focus for future research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Collaboration between faculty and librarians is an important topic of discussion and research among academic librarians. These partnerships between faculty and librarians are vital for enabling students to become lifelong learners through their information literacy education. This research developed an understanding of academic collaborators by analyzing a community college faculty's teaching social networks. A teaching social network, an original term generated in this study, is comprised of communications that influence faculty when they design and deliver their courses. The communication may be formal (e.g., through scholarly journals and professional development activities) and informal (e.g., through personal communication) through their network elements. Examples of the elements of a teaching social network may be department faculty, administration, librarians, professional development, and students. This research asked 'What is the nature of faculty's teaching social networks and what are the implications for librarians?' This study moves forward the existing research on collaboration, information literacy, and social network analysis. It provides both faculty and librarians with added insight into their existing and potential relationships. This research was undertaken using mixed methods. Social network analysis was the quantitative data collection methodology and the interview method was the qualitative technique. For the social network analysis data, a survey was sent to full-time faculty at Las Positas College, a community college, in California. The survey gathered the data and described the teaching social networks for faculty with respect to their teaching methods and content taught. Semi-structured interviews were conducted following the survey with a sub-set of survey respondents to understand why specific elements were included in their teaching social networks and to learn of ways for librarians to become an integral part of the teaching social networks. The majority of the faculty respondents were moderately influenced by the elements of their network except the majority of the potentials were weakly influenced by the elements in their network in their content taught. The elements with the most influence on both teaching methods and content taught were students, department faculty, professional development, and former graduate professors and coursework. The elements with the least influence on both aspects were public or academic librarians, and social media. The most popular roles for the elements were conversations about teaching, sharing ideas, tips for teaching, insights into teaching, suggestions for ways of teaching, and how to engage students. Librarians' weakly influenced faculty in their teaching methods and their content taught. The motivating factors for collaboration with librarians were that students learned how to research, students' research projects improved, faculty saved time by having librarians provide the instruction to students, and faculty built strong working relationships with librarians. The challenges of collaborating with librarians were inadequate teaching techniques used when librarians taught research orientations and lack of time. Ways librarians can be more integral in faculty's teaching social networks included: more workshops for faculty, more proactive interaction with faculty, and more one-on-one training sessions for faculty. Some of the recommendations for the librarians from this study were develop a strong rapport with faculty, librarians should build their services in information literacy from the point of view of the faculty instead of from the librarian perspective, use staff development funding to attend conferences and workshops to improve their teaching, develop more training sessions for faculty, increase marketing efforts of the librarian's instructional services, and seek grant opportunities to increase funding for the library. In addition, librarians and faculty should review the definitions of information literacy and move from a skills based interpretation to a learning process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper seeks to uncover the factors that lead to a successful entrepreneurial experience and or venture. Findings of interest in this paper include: • A venture’s initial aspirations are a double edged sword. Ambition may lead to improved performance by striving to reach harder goals. Harder goals are more difficult therefore this may lead to some dissatisfaction, and possibly abandonment of the venture. • Venture legitimacy is important to establish where possible. Firms that formalize their legal form are more successful, as are those set up a shop-front in order to makes sales. • Increased use of technology and higher levels of novelty does not guarantee success early on. Firms of this nature have longer processes, and attempting to create brand new markets is difficult to achieve. At the same time developing your own technology and securing this intellectual property is important for success. • Having goals to work towards and business planning may be useful, but only if the plan is actively revised. Just having a business plan does not matter. Business plans are more useful as a thinking tool than as a blueprint for action. It is the process of thinking through while reviewing the plan that provides the benefit, not following its instruction to the letter.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The question as to whether poser race affects the happy categorization advantage, the faster categorization of happy than of negative emotional expressions, has been answered inconsistently. Hugenberg (2005) found the happy categorization advantage only for own race faces whereas faster categorization of angry expressions was evident for other race faces. Kubota and Ito (2007) found a happy categorization advantage for both own race and other race faces. These results have vastly different implications for understanding the influence of race cues on the processing of emotional expressions. The current study replicates the results of both prior studies and indicates that face type (computer-generated vs. photographic), presentation duration, and especially stimulus set size influence the happy categorization advantage as well as the moderating effect of poser race.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In relation to enterprise technology governance (ETG), opinions differ between there being no need for board of director involvement to there being an urgent need for such involvement. This research highlights the need for boards to provide ETG oversight of technology-related strategy, investment and risk, and to be competent in doing so. We identify a large gap between board’s awareness of the importance of ETG, their taking action and the competency requirements for effective ETG. Further, while there is considerable research and literature about operational IT governance frameworks and operational IT competencies, there is no known research into the specific competencies boards of directors need to effectively govern enterprise technology. This research focuses on and develops a board-level ETG competency set using a mixed methods approach within a recognised competency development framework. Further development is tracked using a rigour scale to demonstrate a medium to high level of competency validity for the derived set. This research contributes to practice by providing the first known industry validated ETG competency set situated within new and emerging technology. It contributes to the body of knowledge in the modification and application of competency development and competency validation frameworks not previously applied to the role of board director.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Japanese language is recognised as being more difficult than European languages, needing three times more tuition time to reach comparable levels of proficiency. Encouraging Japanese as a Foreign Language (JFL) students to become aware of, and effectively use, learner strategies is one way to assist them become more controlled, effective learners leading to enhanced language learning. This thesis investigates the development and implementation of a JFL curriculum implemented in a university course for students learning JFL. The curriculum was developed specifically to assist beginner university students with the development of learner strategies appropriate for a JFL reading context. The theoretical underpinning of the study was informed by Educational Criticism (Eisner, 1998), which aims to describe, interpret and evaluate the processes of interaction between the teacher, the learner and the curriculum and the students' learning processes in a tertiary JFL classroom. The study investigated the effect on student learning processes of a JFL reading program that incorporated explicit learner strategy instruction and identified factors that enhanced or impeded the development of learner strategy knowledge. The participants in the study were 29 students enrolled in the course, 10 of whom volunteered to undertake additional tasks, and the two teachers who implemented the curriculum. Data collection involved a number of different strategies to observe the students' participation in the classroom and learning experiences. Learning processes were investigated through TOL protocols, classroom observations, course evaluations, interviews, and learner strategy use measurement instruments (SILL, SILK and SORS) to document student uptake of learner strategies. The design of the study and its applied focus recognised my expertise as a JFL teacher, curriculum writer and researcher, an approach that aligns with the purpose of a Professional Doctorate. Four general thematics, or principles, were identified in this study: „h Explicit learner strategy instruction provides the context for students to develop awareness of learner strategies and take control of their learning; „h Collaborative learning and interaction with teachers offers students the opportunity for shared knowledge construction; „h Reflection offers teachers and students the opportunity to reflect on their own learning style and strategy knowledge, and raises awareness of other available strategies; and „h Diverse cultural and linguistic backgrounds have an impact on curriculum implementation and student uptake of learner strategies. The study¡¦s methodological contribution is that it is one of the first in Australia to use Educational Criticism (Eisner, 1998) as a research methodology. The findings contribute to theoretical knowledge in the fields of Applied Linguistics, Second Language Teaching and Learning, Second Language Acquisition and JFL Teaching and Learning by offering new knowledge on the importance of learner strategies in the beginner JFL classroom, the potential of explicit strategy instruction, the value of reflection for both teachers and students, and the important role of the teacher in the process of curriculum implementation. The general principles identified and the findings of this in-depth study of a JFL classroom can be drawn upon to inform other teaching practice situations, and invite practitioners from not just Japanese, but from other language areas and other disciplines, to examine and improve their own practices, and suggest further research questions to pursue this line of enquiry.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Gifted students who have a reading disability have learning characteristics that set them apart from their peers. The ability to read impacts upon all areas of the formal curriculum in which print-based texts are common. Therefore, the full intellectual development of gifted students with a reading disability can be repressed because their access to learning opportunities is reduced. When the different learning needs caused by concomitant giftedness and reading disability are not met, it can have serious implications for both academic achievement and the social-emotional wellbeing of these students. In order to develop a deeper understanding of this vulnerable group of students, this study investigated the learning characteristics of gifted students with a reading disability. Furthermore, it investigated how the learning characteristics of these students impact upon their lived experiences. Since achievement and motivation have been shown to be closely linked to self-efficacy, self-efficacy theory underpinned the conceptual framework of the study. The study used a descriptive case study approach to document the lived experiences of gifted students with a reading disability. Nine participants aged between 11 and 18, who were formally identified as gifted with a reading disability, took part in the study. Data sources in the case study database included: cognitive assessments, such as WISC assessments, Stanford Binet 5, or the Raven's Standard Progressive Matrices; the WIAT II reading assessment; the Reader Self-Perception Scale; document reviews; parent and teacher checklists designed to gain information about the students' learning characteristics; and semi-structured interviews with students. The study showed that gifted students with a reading disability display a complex profile of learning strengths and weaknesses. As a result, they face a daily struggle of trying to reconcile the confusion of being able to complete some tasks to a high level, while struggling to read. The study sheds light on the myriad of issues faced by the students at school. It revealed that when the particular learning characteristics and needs of gifted students with a reading disability are recognised and met, these students can experience academic success, and avoid the serious social-emotional complications cited in previous studies. Indeed, rather than suffering from depression, disengagement from learning, and demotivation, these students were described as resilient, independent, determined, goal oriented and motivated to learn and persevere. Notably, the students in the study had developed effective coping strategies for dealing with the daily challenges they faced. These strategies are outlined in the thesis together with the advice students offered for helping other gifted students with a reading disability to succeed. Their advice is significant for all teachers who wish to nurture the potential of those students who face the challenge of being gifted with a reading disability, and for the parents of these students. This research advances knowledge pertaining to the theory of self-efficacy, and self-efficacy in reading specifically, by showing that although gifted students with a reading disability have low self-efficacy, the level is not the same for all aspects of reading. Furthermore, despite low self-efficacy in reading these students remained motivated. The study also enhances existing knowledge in the areas of gifted education and special education because it documents the lived experience of gifted students with a specific learning disability in reading from the students' perspectives. Based on a synthesis of the literature and research findings, an Inclusive Pathway Model is proposed that describes a framework to support gifted students with a reading disability so that they might achieve, and remain socially and emotionally well-adjusted. The study highlights the importance of clear identification protocols (such as the use of a range of assessment sources, discussions with students and parents, and an awareness of the characteristics of gifted students with a reading disability) and support mechanisms for assisting students (for example, differentiated reading instruction and the use of assistive technology).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Textual document set has become an important and rapidly growing information source in the web. Text classification is one of the crucial technologies for information organisation and management. Text classification has become more and more important and attracted wide attention of researchers from different research fields. In this paper, many feature selection methods, the implement algorithms and applications of text classification are introduced firstly. However, because there are much noise in the knowledge extracted by current data-mining techniques for text classification, it leads to much uncertainty in the process of text classification which is produced from both the knowledge extraction and knowledge usage, therefore, more innovative techniques and methods are needed to improve the performance of text classification. It has been a critical step with great challenge to further improve the process of knowledge extraction and effectively utilization of the extracted knowledge. Rough Set decision making approach is proposed to use Rough Set decision techniques to more precisely classify the textual documents which are difficult to separate by the classic text classification methods. The purpose of this paper is to give an overview of existing text classification technologies, to demonstrate the Rough Set concepts and the decision making approach based on Rough Set theory for building more reliable and effective text classification framework with higher precision, to set up an innovative evaluation metric named CEI which is very effective for the performance assessment of the similar research, and to propose a promising research direction for addressing the challenging problems in text classification, text mining and other relative fields.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Thomas Mann’s tetralogy of the 1930s and 1940s, Joseph and His Brothers, the narrator declares history is not only “that which has happened and that which goes on happening in time,” but it is also “the stratified record upon which we set our feet, the ground beneath us.” By opening up history to its spatial, geographical, and geological dimensions Mann both predicts and encapsulates the twentieth-century’s “spatial turn,” a critical shift that divested geography of its largely passive role as history’s “stage” and brought to the fore intersections between the humanities and the earth sciences. In this paper, I draw out the relationships between history, narrative, geography, and geology revealed by this spatial turn and the questions these pose for thinking about the disciplinary relationship between geography and the humanities. As Mann’s statement exemplifies, the spatial turn itself has often been captured most strikingly in fiction, and I would argue nowhere more so than in Graham Swift’s Waterland (1983) and Anne Michaels’s Fugitive Pieces (1996), both of which present space, place, and landscape as having a palpable influence on history and memory. The geographical/geological line that runs through both Waterland and Fugitive Pieces continues through Tim Robinson’s non-fictional, two-volume “topographical” history Stones of Aran. Robinson’s Stones of Aran—which is not history, not geography, and not literature, and yet is all three—constructs an imaginative geography that renders inseparable geography, geology, history, memory, and the act of writing.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Numeric set watermarking is a way to provide ownership proof for numerical data. Numerical data can be considered to be primitives for multimedia types such as images and videos since they are organized forms of numeric information. Thereby, the capability to watermark numerical data directly implies the capability to watermark multimedia objects and discourage information theft on social networking sites and the Internet in general. Unfortunately, there has been very limited research done in the field of numeric set watermarking due to underlying limitations in terms of number of items in the set and LSBs in each item available for watermarking. In 2009, Gupta et al. proposed a numeric set watermarking model that embeds watermark bits in the items of the set based on a hash value of the items’ most significant bits (MSBs). If an item is chosen for watermarking, a watermark bit is embedded in the least significant bits, and the replaced bit is inserted in the fractional value to provide reversibility. The authors show their scheme to be resilient against the traditional subset addition, deletion, and modification attacks as well as secondary watermarking attacks. In this paper, we present a bucket attack on this watermarking model. The attack consists of creating buckets of items with the same MSBs and determine if the items of the bucket carry watermark bits. Experimental results show that the bucket attack is very strong and destroys the entire watermark with close to 100% success rate. We examine the inherent weaknesses in the watermarking model of Gupta et al. that leave it vulnerable to the bucket attack and propose potential safeguards that can provide resilience against this attack.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Remote Sensing Core Curriculum (RSCC) was initiated in 1993 to meet the demands for a college-level set of resources to enhance the quality of education across national and international campuses. The American Society of Photogrammetry and Remote Sensing adopted the RSCC in 1996 to sustain support of this educational initiative for its membership and collegiate community. A series of volumes, containing lectures, exercises, and data, is being created by expert contributors to address the different technical fields of remote sensing. The RSCC program is designed to operate on the Internet taking full advantage of the World Wide Web (WWW) technology for distance learning. The issues of curriculum development related to the educational setting, with demands on faculty, students, and facilities, is considered to understand the new paradigms for WWW-influenced computer-aided learning. The WWW is shown to be especially appropriate for facilitating remote sensing education with requirements for addressing image data sets and multimedia learning tools. The RSCC is located at http://www.umbc.edu/rscc. The Remote Sensing Core Curriculum (RSCC) was initiated in 1993 to meet the demands for a college-level set of resources to enhance the quality of education across national and international campuses. The American Society of Photogrammetry and Remote Sensing adopted the RSCC in 1996 to sustain support of this educational initiative for its membership and collegiate community. A series of volumes, containing lectures, exercises, and data, is being created by expert contributors to address the different technical fields of remote sensing. The RSCC program is designed to operate on the Internet taking full advantage of the World Wide Web (WWW) technology for distance learning. The issues of curriculum development related to the educational setting, with demands on faculty, students, and facilities, is considered to understand the new paradigms for WWW-influenced computer-aided learning. The WWW is shown to be especially appropriate for facilitating remote sensing education with requirements for addressing image data sets and multimedia learning tools. The RSCC is located at http://www.umbc.edu/rscc.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A key shift of thinking for effective learning and teaching of listening input has been seen and organized in education locally and globally. This study has probed whether metacognitive instruction through a pedagogical cycle shifts high-intermediate students' English language learning and English as a second language (ESL) teacher's teaching focus on listening input. Twenty male Iranian students with an age range of 18 to 24 received a guided methodology including metacognitive strategies (planning, monitoring, and evaluation) for a period of three months. This study has used the strategies and probed the importance of metacognitive instruction through interviewing both the teacher and the students. The results have shown that metacognitive instruction helped both the ESL teacher's and the students' shift of thinking about teaching and learning listening input. This key shift of thinking has implications globally and locally for classroom practices of listening input.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Motivated by the need of private set operations in a distributed environment, we extend the two-party private matching problem proposed by Freedman, Nissim and Pinkas (FNP) at Eurocrypt’04 to the distributed setting. By using a secret sharing scheme, we provide a distributed solution of the FNP private matching called the distributed private matching. In our distributed private matching scheme, we use a polynomial to represent one party’s dataset as in FNP and then distribute the polynomial to multiple servers. We extend our solution to the distributed set intersection and the cardinality of the intersection, and further we show how to apply the distributed private matching in order to compute distributed subset relation. Our work extends the primitives of private matching and set intersection by Freedman et al. Our distributed construction might be of great value when the dataset is outsourced and its privacy is the main concern. In such cases, our distributed solutions keep the utility of those set operations while the dataset privacy is not compromised. Comparing with previous works, we achieve a more efficient solution in terms of computation. All protocols constructed in this paper are provably secure against a semi-honest adversary under the Decisional Diffie-Hellman assumption.