808 resultados para methods of teaching


Relevância:

100.00% 100.00%

Publicador:

Resumo:

DUE TO COPYRIGHT RESTRICTIONS ONLY AVAILABLE FOR CONSULTATION AT ASTON UNIVERSITY LIBRARY AND INFORMATION SERVICES WITH PRIOR ARRANGEMENT

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Despite growing interest in learning and teaching as emotional activities, there is still very little research on experiences of sensitive issues. Using qualitative data from students from a range of social science disciplines, this study investigates student's experiences. The paper highlights how, although they found it difficult and distressing at times, the students all valued being able to explore sensitive issues during their studies. The paper argues that it is though repeated exposure to sensitive issues within the classroom that the students became more comfortable with the issues. This process of lessening sensitivity is an important part of the emotional journey through higher education. It will argue that good student experiences need not always be positive emotions and that sensitive issues should be seen as an important part of transformational education.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

the presentation graphical information about physical processes in WEB.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper a possibility for quantitative measuring of information security of objects, exposed to information attacks and processed with methods of compression, is represented. A co-efficient of information security, which reflects the influence of the level of compression obtained after applying methods of compression to objects and the time, required by the attack to get access to the corresponding object, is proposed. Methods’ groups with the highest and respectively the lowest values of the co-efficient of information security for all methods’ groups in relation to all attacks’ groups are determined. Assessments and conclusions for future investigations are proposed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper is proposed a model for researching the capability to influence, by selected methods’ groups of compression, to the co-efficient of information security of selected objects’ groups, exposed to selected attacks’ groups. With the help of methods for multi-criteria evaluation are chosen the methods’ groups with the lowest risk with respect to the information security. Recommendations for future investigations are proposed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper a methodology for evaluation of information security of objects under attacks, processed by methods of compression, is represented. Two basic parameters for evaluation of information security of objects – TIME and SIZE – are chosen and the characteristics, which reflect on their evaluation, are analyzed and estimated. A co-efficient of information security of object is proposed as a mean of the coefficients of the parameter TIME and SIZE. From the simulation experiments which were carried out methods with the highest co-efficient of information security had been determined. Assessments and conclusions for future investigations are proposed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The methods of the application of the Combined didactic interactive programme system on electrical engineering disciplines has been worked out and the possibility of its application for providing a complex of different kinds of studies: lectures, tutorials, laboratory studies and also for organizing students’ independent work has been verified. The given methods provide the organization of the reproductive (recognition and reproduction) and productive heuristic educational-cognitive students’ activity in conditions of gradualness and completeness of education with the closed directed automatic control.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article describes the approach, which allows to develop information systems without taking into consideration details of physical storage of the relational model and type database management system. Described in terms of graph model, this approach allows to construct several algorithms, for example, for verification application domain. This theory was introduced into operation testing as a part of CASE-system METAS.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This report examines important issues pertaining to the different ways of affecting the information security of file objects under information attacks through methods of compression. Accordingly, the report analyzes the three-way relationships which may exist among a selected set of attacks, methods and objects. Thus, a methodology is proposed for evaluation of information security, and a coefficient of information security is created. With respects to this coefficient, using different criteria and methods for evaluation and selection of alternatives, the lowest-risk methods of compression are selected.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Synergetic methods of data complexation are proposed that make it possible to obtain a maximal amount of available information using a limited number of channels. Along with freedom degrees reducers, a mechanism of freedom degrees discriminators is proposed that enables all the channels to take part in the development of a cooperative decision in accordance with their informativeness in a current situation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In terms of binary relations the author analyses the task of an individual consumers’ choice on the teaching excerpts set. It is suggested to analyse the function of consumer’s value as additive reduction. For localization of the vector of weighting coefficients of additive reduction the procedures based on metrics of object distance towards the ideal point are suggested.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

An approach for knowledge extraction from the information arriving to the knowledge base input and also new knowledge distribution over knowledge subsets already present in the knowledge base is developed. It is also necessary to realize the knowledge transform into parameters (data) of the model for the following decision-making on the given subset. It is assumed to realize the decision-making with the fuzzy sets’ apparatus.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The basic construction concepts of many-valued intellectual systems, which are adequate to primal problems of person activity and using hybrid tools with many-valued of coding are considered. The many-valued intellectual systems being two-place, but simulating neuron processes of space toting which are different on a level of actions, inertial and threshold of properties of neurons diaphragms, and also modification of frequency of following of the transmitted messages are created. All enumerated properties and functions in point of fact are essential not only are discrete on time, but also many-valued.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The offered paper deals with the problems of color images preliminary procession. Among these are: interference control (local ones and noise) and extraction of the object from the background on the stage preceding the process of contours extraction. It was considered for a long time that execution of smoothing in segmentation through the boundary extraction is inadmissible, but the described methods and the obtained results evidence about expedience of using the noise control methods.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We propose a method for image recognition on the base of projections. Radon transform gives an opportunity to map image into space of its projections. Projection properties allow constructing informative features on the base of moments that can be successfully used for invariant recognition. Offered approach gives about 91-97% of correct recognition.