65 resultados para talk-aloud protocols
Resumo:
There is evidence that alienation from science is linked to the dominant discourse practices of science classrooms (cf. Lemke, J. L. (1990). Talking Science: Language, Learning, and Values. Norwood, NJ: Ablex). Yet, in secondary science education it is particularly hard to find evidence of curriculum reform that includes explicit changes in pedagogic discourses to accommodate the needs of students from a wide range of backgrounds. However, such evidence does exist and needs to be highlighted wherever it is found to help address social justice concerns in science education. In this article, I show how critical discourse analysis can be used to explore a way of challenging the dominant discourse in teacher-student interactions in science classrooms. My findings suggest a new way of moving toward more socially just science curricula in middle years and secondary classrooms by using hybrid discourses that can serve emancipatory purposes. © 2005 Wiley Periodicals. Inc.
Resumo:
Rhodobacter capsulatus NtrB/NtrC two-component regulatory system controls expression of genes involved in nitrogen metabolism including urease and nitrogen fixation genes. The ntrY-ntrX genes, which are located immediately downstream of the nifR3-ntrB-ntrC operon, code for a two-component system of unknown function. Transcription of ntrY starts within the ntrC-ntrY intergenic region as shown by primer extension analysis, but maximal transcription requires, in addition, the promoter of the nifR3-ntrB-ntrC operon. While ntrB and ntrY single mutant strains were able to grow with either urea or N-2 as sole nitrogen source, a ntrB/ntrY double mutant (like a ntrC-deficient strain) was no longer able to use urea or N-2. These findings suggest that the histidine kinases NtrB and NtrY can substitute for each other as phosphodonors towards the response regulator NtrC.
Resumo:
The aim of this study was to compare the outcomes associated with two differing right unilateral (RUL) electroconvulsive therapy (ECT) dosing protocols: 2-3X seizure threshold (2-3X ST) and fixed high dose (FHD) at 353 mC. A retrospective chart review was performed to compare patient outcomes during the implementation of two different dosing protocols: 2-3X ST from October 2000 to May 2001 and FHD from June 2001 to February 2002. A total of 56 patients received ECT under the 2-3X ST protocol, and 46 received ECT under the FHD protocol. In total, 13.6% of patients receiving ECT according to the 2-3X ST protocol received more than 12 ECT, whereas none of the FHD group received more than 12 ECT. The mean number of ECT per treatment course reduced significantly from 7.6 to 5.7 following the switch from the 2-3X ST protocol to the FHD protocol. There were no significant differences between the two groups in the incidence of adverse cognitive effects. ECT practitioners adhered to the 2-3X ST protocol for only 51.8% of ECT courses, with protocol adherence improving to 87% following introduction of the FHD protocol. Although this naturalistic retrospective chart survey had significant methodological limitations, it found that practitioners are more likely to correctly adhere to a fixed dose protocol, therefore, increasing its 'real world' effectiveness in comparison to titrated suprathreshold dosing techniques. The FHD protocol was associated with shorter courses of ECT than the 2-3X ST protocol, with no significant difference between the two protocols in clinically discernable adverse cognitive effects.
Resumo:
While others have attempted to determine, by way of mathematical formulae, optimal resource duplication strategies for random walk protocols, this paper is concerned with studying the emergent effects of dynamic resource propagation and replication. In particular, we show, via modelling and experimentation, that under any given decay (purge) rate the number of nodes that have knowledge of particular resource converges to a fixed point or a limit cycle. We also show that even for high rates of decay - that is, when few nodes have knowledge of a particular resource - the number of hops required to find that resource is small.
Resumo:
Security protocols preserve essential properties, such as confidentiality and authentication, of electronically transmitted data. However, such properties cannot be directly expressed or verified in contemporary formal methods. Via a detailed example, we describe the phases needed to formalise and verify the correctness of a security protocol in the state-oriented Z formalism.
Resumo:
Security protocols are often modelled at a high level of abstraction, potentially overlooking implementation-dependent vulnerabilities. Here we use the Z specification language's rich set of data structures to formally model potentially ambiguous messages that may be exploited in a 'type flaw' attack. We then show how to formally verify whether or not such an attack is actually possible in a particular protocol using Z's schema calculus.