820 resultados para Diplomatic and consular service, French
Resumo:
The presented study examined the opinion of in-service and prospective chemistry teachers about the importance of usage of molecular and crystal models in secondary-level school practice, and investigated some of the reasons for their (non-) usage. The majority of participants stated that the use of models plays an important role in chemistry education and that they would use them more often if the circumstances were more favourable. Many teachers claimed that three-dimensional (3d) models are still not available in sufficient number at their schools; they also pointed to the lack of available computer facilities during chemistry lessons. The research revealed that, besides the inadequate material circumstances, less than one third of participants are able to use simple (freeware) computer programs for drawing molecular structures and their presentation in virtual space; however both groups of teachers expressed the willingness to improve their knowledge in the subject area. The investigation points to several actions which could be undertaken to improve the current situation.
Resumo:
This chapter compares lexical diversity of French words used by Dutch-French bilinguals, English-French bilinguals and Flemish L2 learners of French.
Resumo:
The evidence for vernacular-to-vernacular translation is hard to demonstrate in medieval Romance languages. This article analyses a hypothesis published a century ago that there is an identifiable Anglo-Norman source for an Occitan prose text. Both texts spring from a Latin exemplum in which the seven capital vices are personified as the Devil's daughters, married off to seven social categories (the clergy, knights, peasants, etc.). Although the hypothesis is disproved, it remains that the dialogue between Anglo-Norman French and Occitan has been overlooked, and deserves further exploration.
Resumo:
This article suggests a theoretical and methodological framework for a systematic contrastive discourse analysis across languages and discourse communities through keywords, constituting a lexical approach to discourse analysis which is considered to be particularly fruitful for comparative analysis. We use a corpus assisted methodology, presuming meaning to be constituted, revealed and constrained by collocation environment. We compare the use of the keyword intégration and Integration in French and German public discourses about migration on the basis of newspaper corpora built from two French and German newspapers from 1998 to 2011. We look at the frequency of these keywords over the given time span, group collocates into thematic categories and discuss indicators of discursive salience by comparing the development of collocation profiles over time in both corpora as well as the occurrence of neologisms and compounds based on intégration/Integration.
Resumo:
One of the most pervasive classes of services needed to support e-Science applications are those responsible for the discovery of resources. We have developed a solution to the problem of service discovery in a Semantic Web/Grid setting. We do this in the context of bioinformatics, which is the use of computational and mathematical techniques to store, manage, and analyse the data from molecular biology in order to answer questions about biological phenomena. Our specific application is myGrid (www.mygrid.org.uk) that is developing open source, service-based middleware upon which bioinformatics applications can be built. myGrid is specifically targeted at developing open source high-level service Grid middleware for bioinformatics.
Resumo:
One of the most pervasive classes of services needed to support e-Science applications are those responsible for the discovery of resources. We have developed a solution to the problem of service discovery in a Semantic Web/Grid setting. We do this in the context of bioinformatics, which is the use of computational and mathematical techniques to store, manage, and analyse the data from molecular biology in order to answer questions about biological phenomena. Our specific application is myGrid (http: //www.mygrid.org.uk) that is developing open source, service-based middleware upon which bioin- formatics applications can be built. myGrid is specif- ically targeted at developing open source high-level service Grid middleware for bioinformatics.
Resumo:
This paper uses dynamic programming to study the time consistency of optimal macroeconomic policy in economies with recurring public deficits. To this end, a general equilibrium recursive model introduced in Chang (1998) is extended to include govemment bonds and production. The original mode! presents a Sidrauski economy with money and transfers only, implying that the need for govemment fmancing through the inflation tax is minimal. The extended model introduces govemment expenditures and a deficit-financing scheme, analyzing the SargentWallace (1981) problem: recurring deficits may lead the govemment to default on part of its public debt through inflation. The methodology allows for the computation of the set of alI sustainable stabilization plans even when the govemment cannot pre-commit to an optimal inflation path. This is done through value function iterations, which can be done on a computeI. The parameters of the extended model are calibrated with Brazilian data, using as case study three Brazilian stabilization attempts: the Cruzado (1986), Collor (1990) and the Real (1994) plans. The calibration of the parameters of the extended model is straightforward, but its numerical solution proves unfeasible due to a dimensionality problem in the algorithm arising from limitations of available computer technology. However, a numerical solution using the original algorithm and some calibrated parameters is obtained. Results indicate that in the absence of govemment bonds or production only the Real Plan is sustainable in the long run. The numerical solution of the extended algorithm is left for future research.
Resumo:
What a treat it is to be here today to celebrate the outstanding work of members of our IANR community. It seems so much of our administrative time these days is spent dealing with difficult and joyless issues surrounding slashed budgets, lost programs, and the very real pain those engender. Perhaps it is that pain that doubles our joy when we have opportunities such as today to celebrate excellence. This afternoon we celebrate accomplishment in two ways with the IANR Team Award, and with the Exemplary Service Award. We'll begin today with the IANR Team Award, which recognizes the importance of interdisciplinary team efforts in achieving the Institute's goals. Criteria include: 1) problem identification, team strategy, grant success; 2) productivity and impact and the output of the team in relation to inputs; 3) the team effort, and 4) the quality of the nomination.
Resumo:
The cybernetics revolution of the last years improved a lot our lives, having an immediate access to services and a huge amount of information over the Internet. Nowadays the user is increasingly asked to insert his sensitive information on the Internet, leaving its traces everywhere. But there are some categories of people that cannot risk to reveal their identities on the Internet. Even if born to protect U.S. intelligence communications online, nowadays Tor is the most famous low-latency network, that guarantees both anonymity and privacy of its users. The aim of this thesis project is to well understand how the Tor protocol works, not only studying its theory, but also implementing those concepts in practice, having a particular attention for security topics. In order to run a Tor private network, that emulates the real one, a virtual testing environment has been configured. This behavior allows to conduct experiments without putting at risk anonymity and privacy of real users. We used a Tor patch, that stores TLS and circuit keys, to be given as inputs to a Tor dissector for Wireshark, in order to obtain decrypted and decoded traffic. Observing clear traffic allowed us to well check the protocol outline and to have a proof of the format of each cell. Besides, these tools allowed to identify a traffic pattern, used to conduct a traffic correlation attack to passively deanonymize hidden service clients. The attacker, controlling two nodes of the Tor network, is able to link a request for a given hidden server to the client who did it, deanonymizing him. The robustness of the traffic pattern and the statistics, such as the true positive rate, and the false positive rate, of the attack are object of a potential future work.
Resumo:
The purpose of the study was to examine the effect of teacher experience on student progress and performance quality in an introductory applied lesson. Nine experienced teachers and 15 pre-service teachers taught an adult beginner to play ‘Mary Had a Little Lamb’ on a wind instrument. The lessons were videotaped for subsequent analysis of teaching behaviors and performance achievement. Following instruction, a random sample of teachers was interviewed about their perceptions of the lesson. A panel of adjudicators rated final pupil performances. No significant difference was found between pupils taught by experienced and pre-service teachers in the quality of their final performance. Systematic observation of the videotaped lessons showed that participant teachers provided relatively frequent and highly positive reinforcement during the lessons. Pupils of experienced teachers talked significantly more during the lessons than did pupils of pre-service teachers. Pre-service teachers modeled significantly more on their instruments than did experienced teachers.