969 resultados para Turkish language--Usage
Resumo:
Design process phases of development, evaluation and implementation were used to create a garment to simultaneously collect reliable data of speech production and intensity of movement of toddlers (18-36 months). A series of prototypes were developed and evaluated that housed accelerometer-based motion sensors and a digital transmitter with microphone. The approved test garment was a top constructed from loop-faced fabric with interior pockets to house devices. Extended side panels allowed for sizing. In total, 56 toddlers (28 male; 28 female; 16-36 months of age) participated in the study providing pilot and baseline data. The test garment was effective in collecting data as evaluated for accuracy and reliability using ANOVA for accelerometer data, transcription of video for type of movement, and number and length of utterances for speech production. The data collection garment has been implemented in various studies across disciplines.
Resumo:
This paper reports on the findings of an international telecollaboration study using Facebook, in which teachers studying in M. Ed programs in Australia and Greece, discussed the use of mobile phones in language classrooms. Results suggest that invisible barriers exist in the use of mobile phones in the classroom, including bans on use in schools, lack of familiarity with educational uses for mobile phones, and negative perceptions about mobile phones specifically in terms of classroom management.
Resumo:
Bone sialoprotein (BSP), a secreted glycoprotein found in bone matrix, has been implicated in the formation of mammary microcalcifications and osteotropic metastasis of human breast cancer (HBC). BSP possesses an integrin-binding RGD (Arg-Gly-Asp) domain, which may promote interactions between HBC cells and bone extracellular matrix. Purified BSP, recombinant human BSP fragments and BSP-derived RGD peptides are shown to elicit migratory, adhesive, and proliferative responses in the MDA-MB-231 HBC cell line. Recombinant BSP fragment analysis localized a significant component of these activities to the RGD domain of the protein, and synthetic RGD peptides with BSP flanking sequences (BSPRGD) also conferred these responses. The fibronectin-derived RGD counterpart, GRGDSP (Gly-Arg-Gly-Asp-Ser-Pro), could not support these cellular responses, emphasizing specificity of the BSP configuration. Although most of the proliferative and adhesive responses could be attributed to RGD interactions, these interactions were only partly responsible for the migrational responses. Experiments with integrin-blocking antibodies demonstrated that BSP-RGD-induced migration utilizes the αvβ3 vitronectin receptor, whereas adhesion and proliferation responses were αvβ5-mediated. Using fluorescence activated cell sorting, we selected two separate subpopulations of MDA-MB-231 cells enriched for αvβ3 or αvβ5 respectively. Although some expression of the alternate αv integrin was still retained, the αvβ5-enriched MDA-MB-231 cells showed enhanced proliferative and adhesive responses, whereas the αvβ3-enriched subpopulation was suppressed for proliferation and adhesion, but showed enhanced migratory responses to BSP-RGD. In addition, similar analysis of two other HBC cell lines showed less marked, but similar RGD-dependent trends in adhesion and proliferation to the BSP fragments. Collectively, these data demonstrate BSP effects on proliferative, migratory, and adhesive functions in HBC cells and that the RGD-mediated component differentially employs αvβ3 and αvβ5 integrin receptors.
Resumo:
We present a text watermarking scheme that embeds a bitstream watermark Wi in a text document P preserving the meaning, context, and flow of the document. The document is viewed as a set of paragraphs, each paragraph being a set of sentences. The sequence of paragraphs and sentences used to embed watermark bits is permuted using a secret key. Then, English language sentence transformations are used to modify sentence lengths, thus embedding watermarking bits in the Least Significant Bits (LSB) of the sentences’ cardinalities. The embedding and extracting algorithms are public, while the secrecy and security of the watermark depends on a secret key K. The probability of False Positives is extremely small, hence avoiding incidental occurrences of our watermark in random text documents. Majority voting provides security against text addition, deletion, and swapping attacks, further reducing the probability of False Positives. The scheme is secure against the general attacks on text watermarks such as reproduction (photocopying, FAX), reformatting, synonym substitution, text addition, text deletion, text swapping, paragraph shuffling and collusion attacks.
Resumo:
The primary aim of this paper was to investigate heterogeneity in language abilities of children with a confirmed diagnosis of an ASD (N = 20) and children with typical development (TD; N = 15). Group comparisons revealed no differences between ASD and TD participants on standard clinical assessments of language ability, reading ability or nonverbal intelligence. However, a hierarchical cluster analysis based on spoken nonword repetition and sentence repetition identified two clusters within the combined group of ASD and TD participants. The first cluster (N = 6) presented with significantly poorer performances than the second cluster (N = 29) on both of the clustering variables in addition to single word and nonword reading. The significant differences between the two clusters occur within a context of Cluster 1 having language impairment and a tendency towards more severe autistic symptomatology. Differences between the oral language abilities of the first and second clusters are considered in light of diagnosis, attention and verbal short term memory skills and reading impairment.
Resumo:
The critical role that family plays in Chinese Heritage Language learning has gained increasing attention from psychological, political and sociological scholarship. Guided by Bourdieu’s notion of ‘habitus’, our mixed methods sociological study firstly addresses the need for quantitative evidence on the relationship between family support and Chinese Heritage Language proficiency through a survey of 230 young Chinese Australians; and then explores the dynamics of family support of Chinese Heritage Language learning through multiple interviews with five participants. The interview data demonstrate ongoing intergenerational reproduction of Chinese Heritage Language through various forms of family inculcation. Learners’ transition from resistance to commitment is a focus of the analysis. Extant research struggles to theorise the reasons behind this transition. We offer a Bourdieusian explanation that construes the transition as ‘habitus realisation’. Our study has implications for Chinese Heritage Language researchers, Chinese immigrant parents and Chinese teachers.
Resumo:
The design and development of process-aware information systems is often supported by specifying requirements as business process models. Although this approach is generally accepted as an effective strategy, it remains a fundamental challenge to adequately validate these models given the diverging skill set of domain experts and system analysts. As domain experts often do not feel confident in judging the correctness and completeness of process models that system analysts create, the validation often has to regress to a discourse using natural language. In order to support such a discourse appropriately, so-called verbalization techniques have been defined for different types of conceptual models. However, there is currently no sophisticated technique available that is capable of generating natural-looking text from process models. In this paper, we address this research gap and propose a technique for generating natural language texts from business process models. A comparison with manually created process descriptions demonstrates that the generated texts are superior in terms of completeness, structure, and linguistic complexity. An evaluation with users further demonstrates that the texts are very understandable and effectively allow the reader to infer the process model semantics. Hence, the generated texts represent a useful input for process model validation.
Resumo:
The value of information technology (IT) is often realized when continuously being used after users’ initial acceptance. However, previous research on continuing IT usage is limited for dismissing the importance of mental goals in directing users’ behaviors and for inadequately accommodating the group context of users. This in-progress paper offers a synthesis of several literature to conceptualize continuing IT usage as multilevel constructs and to view IT usage behavior as directed and energized by a set of mental goals. Drawing from the self-regulation theory in the social psychology, this paper proposes a process model, positioning continuing IT usage as multiple-goal pursuit. An agent-based modeling approach is suggested to further explore causal and analytical implications of the proposed process model.
Resumo:
Purpose – This paper outlines research that explores the information literacy experiences of EFL (English as a Foreign Language) students. The question explored in this research was: how do EFL students experience information literacy. Design/Methodology/Approach – This study used phenomenography, a relational approach to explore the information literacy experiences of EFL students. Phenomenography studies the qualitatively different ways a phenomenon is experienced in the world around us. Findings – This research revealed that EFL students experienced information literacy in four qualitatively different ways. The four categories revealed through the data were: process, quality, language and knowledge. This research found that language impacted on EFL students’ experiences of information literacy and revealed that EFL students applied various techniques and strategies when they read, understood, organised and translated information. Research limitations/implications – This research was conducted in a specific cultural and educational context, therefore the results might not reflect the experiences of EFL students in other cultural or educational contexts. Practical implications – The findings from this research offer an important contribution to information literacy practice by providing important insights about EFL students’ experiences and perceptions of information and learning that can be used to inform curriculum development in second language learning contexts. Originality/Value - There is currently a lack of research using a relational approach to investigate EFL students’ experiences of information literacy. There is also limited research that explores the impact language has on information literary and learning in English as a foreign or second language contexts.
Resumo:
This paper investigates the effect of topic dependent language models (TDLM) on phonetic spoken term detection (STD) using dynamic match lattice spotting (DMLS). Phonetic STD consists of two steps: indexing and search. The accuracy of indexing audio segments into phone sequences using phone recognition methods directly affects the accuracy of the final STD system. If the topic of a document in known, recognizing the spoken words and indexing them to an intermediate representation is an easier task and consequently, detecting a search word in it will be more accurate and robust. In this paper, we propose the use of TDLMs in the indexing stage to improve the accuracy of STD in situations where the topic of the audio document is known in advance. It is shown that using TDLMs instead of the traditional general language model (GLM) improves STD performance according to figure of merit (FOM) criteria.
Resumo:
In addressing literacy in high school education, it is important to foreground the particular issues faced by growing numbers of English Language Learners (ELLs). In our increasingly culturally and linguistically diverse classrooms, this is a matter for all literacy teachers, as well as ELL specialists. In Australia, teachers of ELLs are experimenting with Multiliteracies pedagogy which provides rich opportunities to explore language learning experiences and outcomes that stretch beyond exercises in reproduction in written and oral modes only. This paper documents the practice of a high school teacher who uses a claymation project, producing a movie by stop-motion filming of clay figures, with a class of low-level English literacy learners. Drawing on observations of three particular students, the paper outlines a number of possibilities of this approach for English language learners. These include increased individual agency; enhanced engagement through collaboration; and the opportunity to explore various elements of multimodal text design.
Resumo:
In this chapter we describe a critical fairytales unit taught to 4.5 to 5.5 year olds in a context of intensifying pressure to raise literacy achievement. The unit was infused with lessons on reinterpreted fairytales followed by process drama activities built around a sophisticated picture book, Beware of the Bears (MacDonald, 2004). The latter entailed a text analytic approach to critical literacy derived from systemic functional linguistics (Halliday, 1978; Halliday & Matthiessen, 2004). This approach provides a way of analysing how words and discourse are used to represent the world in a particular way and shape reader relations with the author in a particular field (Janks, 2010).
Resumo:
The potential benefits of shared eHealth records systems are promising for the future of improved healthcare. However, the uptake of such systems is hindered by concerns over the security and privacy of patient information. The use of Information Accountability and so called Accountable-eHealth (AeH) systems has been proposed to balance the privacy concerns of patients with the information needs of healthcare professionals. However, a number of challenges remain before AeH systems can become a reality. Among these is the need to protect the information stored in the usage policies and provenance logs used by AeH systems to define appropriate use of information and hold users accountable for their actions. In this paper, we discuss the privacy and security issues surrounding these accountability mechanisms, define valid access to the information they contain, discuss solutions to protect them, and verify and model an implementation of the access requirements as part of an Information Accountability Framework.
Resumo:
Enterprise social networks provide benefits especially for knowledge-intensive work as they enable communication, collaboration and knowledge exchange. These platforms should therefore lead to increased adoption and use by knowledge-intensive workers such as consultants or indeed researchers. Our interest is in ascertaining whether scientific researchers use enterprise social networks as part of their work practices. This focus is motivated by an apparent schism between a need for researchers to exchange knowledge and profile themselves, and the aversion to sharing breakthrough ideas and joining in an ever-increasing publishing and marketing game. We draw on research on academic work practices and impression management to develop a model of academics’ ESN usage for impression management tactics. We describe important constructs of our model, offer strategies for their operationalization and give an outlook to our ongoing empirical study of the use of an ESN platform by 20 schools across six faculties at an Australian university.