1000 resultados para strategy session


Relevância:

30.00% 30.00%

Publicador:

Resumo:

This research investigated the effectiveness and efficiency of structured writing as compared to traditional nonstructured writing as a teaching and learning strategy in a training session for teachers.^ Structured writing is a method of identifying, interrelating, sequencing, and graphically displaying information on fields of a page or computer. It is an alternative for improving training and educational outcomes by providing an effective and efficient documentation methodology.^ The problem focuses upon the contradiction between: (a) the supportive research and theory to modify traditional methods of written documents and information presentation and (b) the existing paradigm to continue with traditional communication methods.^ A MANOVA was used to determine significant difference between a control and an experimental group in a posttest only experimental design. The experimental group received the treatment of structured writing materials during a training session. Two variables were analyzed. They were: (a) effectiveness; correct items on a posttest, and (b) efficiency; time spent on test.^ The quantitative data showed a difference for the experimental group on the two dependent variables. The experimental group completed the posttest in 2 minutes less time while scoring 1.5 more items correct. An interview with the training facilitators revealed that the structured writing materials were "user friendly." ^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The purpose of this phenomenological study was to describe how Colombian adult English language learners (ELL) select and use language learning strategies (LLS). This study used Oxford’s (1990a) taxonomy for LLS as its theoretical framework. Semi-structured interviews and a focus group interview, were conducted, transcribed, and analyzed for 12 Colombian adult ELL. A communicative activity known as strip story (Gibson, 1975) was used to elicit participants’ use of LLS. This activity preceded the focus group session. Additionally, participants’ reflective journals were collected and analyzed. Data were analyzed using inductive, deductive, and comparative analyses. Four themes emerged from the inductive analysis of the data: (a) learning conditions, (b) problem-solving resources, (c) information processing, and (d) target language practice. Oxford’s classification of LLS was used as a guide in deductively analyzing data concerning the participants’ experiences. The deductive analysis revealed that participants do not use certain strategies included in Oxford’s taxonomy at the third level. For example, semantic mapping, or physical response or sensation was not reported by participants. The findings from the inductive and deductive analyses were then compared to look for patterns and answers to the research questions. The comparative analysis revealed that participants used additional LLS that are not included in Oxford’s taxonomy. Some examples of these strategies are: using sound transcription in native language and help from children. The study was conducted at the MDC InterAmerican campus in South Florida, one of the largest Hispanic-influenced communities in the U.S. Based on the findings from this study, the researcher proposed a framework to study LLS that includes both external (i.e., learning context, community) and internal (i.e., culture, prior education) factors that influence the selection and use of LLS. The findings from this study imply that given the importance of the both external and internal factors in learners’ use of LLS, these factors should be considered for inclusion in any study of language learner strategies use by adult learners. Implications for teaching and learning as well as recommendations for further research are provided.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An unstructured mesh �nite volume discretisation method for simulating di�usion in anisotropic media in two-dimensional space is discussed. This technique is considered as an extension of the fully implicit hybrid control-volume �nite-element method and it retains the local continuity of the ux at the control volume faces. A least squares function recon- struction technique together with a new ux decomposition strategy is used to obtain an accurate ux approximation at the control volume face, ensuring that the overall accuracy of the spatial discretisation maintains second order. This paper highlights that the new technique coincides with the traditional shape function technique when the correction term is neglected and that it signi�cantly increases the accuracy of the previous linear scheme on coarse meshes when applied to media that exhibit very strong to extreme anisotropy ratios. It is concluded that the method can be used on both regular and irregular meshes, and appears independent of the mesh quality.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and network card addresses, and rely on loosely coupled state machines. Even the new WLAN security standard - IEEE 802.11i does not address these issues. In our previous work, we proposed two new techniques for improving detection of session hijacking attacks that are passive, computationally inexpensive, reliable, and have minimal impact on network performance. These techniques utilise unspoofable characteristics from the MAC protocol and the physical layer to enhance confidence in the intrusion detection process. This paper extends our earlier work and explores usability, robustness and accuracy of these intrusion detection techniques by applying them to eight distinct test scenarios. A correlation engine has also been introduced to maintain the false positives and false negatives at a manageable level. We also explore the process of selecting optimum thresholds for both detection techniques. For the purposes of our experiments, Snort-Wireless open source wireless intrusion detection system was extended to implement these new techniques and the correlation engine. Absence of any false negatives and low number of false positives in all eight test scenarios successfully demonstrated the effectiveness of the correlation engine and the accuracy of the detection techniques.