766 resultados para second language
Resumo:
With the advent of Service Oriented Architecture, Web Services have gained tremendous popularity. Due to the availability of a large number of Web services, finding an appropriate Web service according to the requirement of the user is a challenge. This warrants the need to establish an effective and reliable process of Web service discovery. A considerable body of research has emerged to develop methods to improve the accuracy of Web service discovery to match the best service. The process of Web service discovery results in suggesting many individual services that partially fulfil the user’s interest. By considering the semantic relationships of words used in describing the services as well as the use of input and output parameters can lead to accurate Web service discovery. Appropriate linking of individual matched services should fully satisfy the requirements which the user is looking for. This research proposes to integrate a semantic model and a data mining technique to enhance the accuracy of Web service discovery. A novel three-phase Web service discovery methodology has been proposed. The first phase performs match-making to find semantically similar Web services for a user query. In order to perform semantic analysis on the content present in the Web service description language document, the support-based latent semantic kernel is constructed using an innovative concept of binning and merging on the large quantity of text documents covering diverse areas of domain of knowledge. The use of a generic latent semantic kernel constructed with a large number of terms helps to find the hidden meaning of the query terms which otherwise could not be found. Sometimes a single Web service is unable to fully satisfy the requirement of the user. In such cases, a composition of multiple inter-related Web services is presented to the user. The task of checking the possibility of linking multiple Web services is done in the second phase. Once the feasibility of linking Web services is checked, the objective is to provide the user with the best composition of Web services. In the link analysis phase, the Web services are modelled as nodes of a graph and an allpair shortest-path algorithm is applied to find the optimum path at the minimum cost for traversal. The third phase which is the system integration, integrates the results from the preceding two phases by using an original fusion algorithm in the fusion engine. Finally, the recommendation engine which is an integral part of the system integration phase makes the final recommendations including individual and composite Web services to the user. In order to evaluate the performance of the proposed method, extensive experimentation has been performed. Results of the proposed support-based semantic kernel method of Web service discovery are compared with the results of the standard keyword-based information-retrieval method and a clustering-based machine-learning method of Web service discovery. The proposed method outperforms both information-retrieval and machine-learning based methods. Experimental results and statistical analysis also show that the best Web services compositions are obtained by considering 10 to 15 Web services that are found in phase-I for linking. Empirical results also ascertain that the fusion engine boosts the accuracy of Web service discovery by combining the inputs from both the semantic analysis (phase-I) and the link analysis (phase-II) in a systematic fashion. Overall, the accuracy of Web service discovery with the proposed method shows a significant improvement over traditional discovery methods.
Resumo:
Using examples from contemporary policy and business discourses, and exemplary historical texts dealing with the notion of value, I put forward an argument as to why a critical scholarship that draws on media history, language analysis, philosophy and political economy is necessary to understand the dynamics of what is being called 'the global knowledge economy'. I argue that the social changes associated with new modes of value determination are closely associated with new media forms.
Resumo:
Peer to peer systems have been widely used in the internet. However, most of the peer to peer information systems are still missing some of the important features, for example cross-language IR (Information Retrieval) and collection selection / fusion features. Cross-language IR is the state-of-art research area in IR research community. It has not been used in any real world IR systems yet. Cross-language IR has the ability to issue a query in one language and receive documents in other languages. In typical peer to peer environment, users are from multiple countries. Their collections are definitely in multiple languages. Cross-language IR can help users to find documents more easily. E.g. many Chinese researchers will search research papers in both Chinese and English. With Cross-language IR, they can do one query in Chinese and get documents in two languages. The Out Of Vocabulary (OOV) problem is one of the key research areas in crosslanguage information retrieval. In recent years, web mining was shown to be one of the effective approaches to solving this problem. However, how to extract Multiword Lexical Units (MLUs) from the web content and how to select the correct translations from the extracted candidate MLUs are still two difficult problems in web mining based automated translation approaches. Discovering resource descriptions and merging results obtained from remote search engines are two key issues in distributed information retrieval studies. In uncooperative environments, query-based sampling and normalized-score based merging strategies are well-known approaches to solve such problems. However, such approaches only consider the content of the remote database but do not consider the retrieval performance of the remote search engine. This thesis presents research on building a peer to peer IR system with crosslanguage IR and advance collection profiling technique for fusion features. Particularly, this thesis first presents a new Chinese term measurement and new Chinese MLU extraction process that works well on small corpora. An approach to selection of MLUs in a more accurate manner is also presented. After that, this thesis proposes a collection profiling strategy which can discover not only collection content but also retrieval performance of the remote search engine. Based on collection profiling, a web-based query classification method and two collection fusion approaches are developed and presented in this thesis. Our experiments show that the proposed strategies are effective in merging results in uncooperative peer to peer environments. Here, an uncooperative environment is defined as each peer in the system is autonomous. Peer like to share documents but they do not share collection statistics. This environment is a typical peer to peer IR environment. Finally, all those approaches are grouped together to build up a secure peer to peer multilingual IR system that cooperates through X.509 and email system.
Resumo:
The research presented in this thesis addresses inherent problems in signaturebased intrusion detection systems (IDSs) operating in heterogeneous environments. The research proposes a solution to address the difficulties associated with multistep attack scenario specification and detection for such environments. The research has focused on two distinct problems: the representation of events derived from heterogeneous sources and multi-step attack specification and detection. The first part of the research investigates the application of an event abstraction model to event logs collected from a heterogeneous environment. The event abstraction model comprises a hierarchy of events derived from different log sources such as system audit data, application logs, captured network traffic, and intrusion detection system alerts. Unlike existing event abstraction models where low-level information may be discarded during the abstraction process, the event abstraction model presented in this work preserves all low-level information as well as providing high-level information in the form of abstract events. The event abstraction model presented in this work was designed independently of any particular IDS and thus may be used by any IDS, intrusion forensic tools, or monitoring tools. The second part of the research investigates the use of unification for multi-step attack scenario specification and detection. Multi-step attack scenarios are hard to specify and detect as they often involve the correlation of events from multiple sources which may be affected by time uncertainty. The unification algorithm provides a simple and straightforward scenario matching mechanism by using variable instantiation where variables represent events as defined in the event abstraction model. The third part of the research looks into the solution to address time uncertainty. Clock synchronisation is crucial for detecting multi-step attack scenarios which involve logs from multiple hosts. Issues involving time uncertainty have been largely neglected by intrusion detection research. The system presented in this research introduces two techniques for addressing time uncertainty issues: clock skew compensation and clock drift modelling using linear regression. An off-line IDS prototype for detecting multi-step attacks has been implemented. The prototype comprises two modules: implementation of the abstract event system architecture (AESA) and of the scenario detection module. The scenario detection module implements our signature language developed based on the Python programming language syntax and the unification-based scenario detection engine. The prototype has been evaluated using a publicly available dataset of real attack traffic and event logs and a synthetic dataset. The distinct features of the public dataset are the fact that it contains multi-step attacks which involve multiple hosts with clock skew and clock drift. These features allow us to demonstrate the application and the advantages of the contributions of this research. All instances of multi-step attacks in the dataset have been correctly identified even though there exists a significant clock skew and drift in the dataset. Future work identified by this research would be to develop a refined unification algorithm suitable for processing streams of events to enable an on-line detection. In terms of time uncertainty, identified future work would be to develop mechanisms which allows automatic clock skew and clock drift identification and correction. The immediate application of the research presented in this thesis is the framework of an off-line IDS which processes events from heterogeneous sources using abstraction and which can detect multi-step attack scenarios which may involve time uncertainty.
Resumo:
Networks are having a profound impact on the way society is organised at the local, national and international level. Networks are not ‘business as usual’. The defining feature of networks and a key indicator for their success is the strength and quality of the interactions between members. This relational power of networks provides the mechanism to bring together previously dispersed and even competitive entities into a collective venture. Such an operating context demands the ability to work in a more horizontal, relational manner. In addition a social infrastructure must be formed that will support and encourage efforts to become more collaborative. This paper seeks to understand how network members come to know about working in networks, how they work on their relationships and create new meanings about the nature of their linked work. In doing so, it proposes that learning, language and leadership, herein defined as the ‘3Ls’ represent critical mediating aspects for networks.
Resumo:
This first interim report on ‘best value’ reviewed the academic literature relating to ‘best value’ and illustrated the varying interpretations that the concept of ‘best value’ has attracted. It also examined current state of the literature on best value in construction project procurement. ‘Best value’ was explored from the perspective of both the business enterprise and public sector. It was concluded that ‘best value’ in the public sector is considerably more complex. This second interim report explores how ‘best value’ has been implemented in the UK. Focus is directed towards the UK, particularly Scotland’s approach to examine the complexity of implementation of ‘best value’ in the public sector context. Scotland has been recognised as a leader in the field of ‘best value’ in the public sector (Curry, 1999; Wisniewski and Stewart, 2001, 2004; Jaconelli and Sheffield, 2000)
Resumo:
The progress of a nationally representative sample of 3632 children was followed from early childhood through to primary school, using data from the Longitudinal Study of Australian Children (LSAC). The aim was to examine the predictive effects of different aspects of communicative ability, and of early vs. sustained identification of speech and language impairment, on children's achievement and adjustment at school. Four indicators identified speech and language impairment: parent-rated expressive language concern; parent-rated receptive language concern; use of speech-language pathology services; below average scores on the adapted Peabody Picture Vocabulary Test-III. School outcomes were assessed by teachers' ratings of language/literacy ability, numeracy/mathematical thinking and approaches to learning. Comparison of group differences, using ANOVA, provided clear evidence that children who were identified as having speech and language impairment in their early childhood years did not perform as well at school, two years later, as their non-impaired peers on all three outcomes: Language and Literacy, Mathematical Thinking, and Approaches to Learning. The effects of early speech and language status on literacy, numeracy, and approaches to learning outcomes were similar in magnitude to the effect of family socio-economic factors, after controlling for child characteristics. Additionally, early identification of speech and language impairment (at age 4-5) was found to be a better predictor of school outcomes than sustained identification (at aged 4-5 and 6-7 years). Parent-reports of speech and language impairment in early childhood are useful in foreshadowing later difficulties with school and providing early intervention and targeted support from speech-language pathologists and specialist teachers.
Resumo:
Understanding what the teacher says or what is written in texts used in class is a key to academic engagement. Yet, for students who are learning the medium of instruction as an additional language, understanding is often elusive. The study reported in this chapter looked at how African middle school students and parents, and educators in Australian schools, talked about problems of understanding, and responsibility for redressing these, at intensive language school and in transition to a mainstream Australian high school. In general, participants assumed students should signal confusion and teachers should resolve it. However, student talk of current and past anxiety about asking for help in class warrants attention. Challenges include: (1) the need to create receptive peer environments for asking questions; and (2) to recognise when it is inappropriate to rely on students signalling confusion.
Resumo:
Much landscape architectural form seems like hackneyed modernism, whether it be orthogonal or biomorphic, 'formal or informal' and doesn't seem to get to grips with the truly complex nature of the landscape, making any project seem potentially simplistic. This is largely because it has inherited languages from architecture that are based around objects, and that therefore can act to make designs self-referential rather than edgy instances in a dialogue much larger than the site itself, connected to systems that are unavoidable, even if one chooses to ignore them. These systems constitute a formal language even if landscape architecture looks to things like GIS to engage with them. Tropospheric Temperament was an Advanced Computing subject, for second-year landscape architecture students at UWA, taught by Julian Raxworthy and Rene Van Meeuwen, which ran in Semester 1, 2004. For this subject, the question was: how can we learn to wield such systems in design terms, even if they are developed through un-self-conscious natural and vernacular forces?
Resumo:
This is a review of "Capitalism, socialism, and democracy", by Joseph A. Schumpeter, New York, Harper Perennial, 1942 (first Harper Colophon edition published 1975). "The public mind has by now so thoroughly grown out of humor with it as to make condemnation of capitalism and all its works a foregone conclusion – almost a requirement of the etiquette of discussion. Whatever his political preference, every writer or speaker hastens to conform to this code and to emphasize his critical attitude, his freedom from ‘complacency’, his belief in the inadequacies of capitalist achievement, his aversion to capitalist and his sympathy with anti-capitalist interests. Any other attitude is voted not only foolish but anti-social and is looked upon as an indication of immoral servitude." We might easily mistake this for a voice weary of contemplating the implications for neo-liberal nostrums of our current global financial crisis were it not for the rather formal, slightly arch, style and the gender exclusive language. It was in fact penned in the depths of World War II by Harvard economist Joseph Schumpeter, who fell off the map only to re-emerge from the 1970s as oil shocks and stagflation in the west presaged the decline of the Keynesian settlement, as east Asian newly industrialising economies were modelling on his insistence that entrepreneurialism, access to credit and trade were the pillars of economic growth, and as innovation became more of a watchword for post-industrial economies in general. The second coming was perhaps affirmed when his work was dubbed by Forbes in 1983 – on the occasion of the 100th anniversary of the birth of both men – as of greater explanatory import than Keynes’. (And what of our present resurgent Keynesian moment?)...
Resumo:
This paper examines the interactional phenomenon of justification as it is produced in young children’s language. A justification provides a reason for one’s position and can be produced in children’s language at an early age. There are various pragmatic reasons for justifications. For example, justifications may be drawn upon by members to compensate for the disruption of the existing social order or to explain something that is possibly questionable. Justifications are also drawn upon to extend or close disputes. This study uses the analytical techniques of conversation analysis and membership categorisation to analyse video-recorded and transcribed interactions of young children (aged 4-6 years) in a preparatory classroom in a primary school in Australia. The focus is an episode that occurred within the block play area of the classroom that involved a dispute of ownership relating to a small, wooden plank. In analysing this dispute, justifications were frequent occurrences and the young participants drew upon justificatory devices in their everyday arguments. As the turns surrounding the justificatory language were examined, a pattern emerged: in each excerpt observed, a justification arose in response to a challenge. This pattern provided the basis for developing a model that helped to discern where, why and what type of justifications occurred in the interaction. To depict this interactional phenomenon, the model of ‘if x, then y’ was used, ‘x’ referring to the challenge or prompt, and ‘y’ referring to the justificatory response. Justifications related to the concepts of ownership and were used as devices by those engaged in disputes to support their positions and provide reasons for their actions. The children drew upon these child-constructed rules as resources to use in disputes with their peers, in order to construct and maintain the social order of the block area in the classroom.
Resumo:
Educational assessment was a worldwide commonplace practice in the last century. With the theoretical underpinnings of education shifting from behaviourism and social efficiency to constructivism and cognitive theories in the past two decades, the assessment theories and practices show a widespread changing movement. The emergent assessment paradigm, with a futurist perspective, indicates a deviation away from the prevailing large scale high-stakes standardised testing and an inclination towards classroom-based formative assessment. Innovations and reforms initiated in attempts to achieve better education outcomes for a sustainable future via more developed learning and assessment theories have included the 2007 College English Reform Program (CERP) in Chinese higher education context. This paper focuses on the College English Test (CET) - the national English as a Foreign Language (EFL) testing system for non-English majors at tertiary level in China. It seeks to explore the roles that the CET played in the past two College English curriculum reforms, and the new role that testing and assessment assumed in the newly launched reform. The paper holds that the CET was operationalised to uplift the standards. However, the extended use of this standardised testing system brings constraints as well as negative washback effects on the tertiary EFL education. Therefore in the newly launched reform -CERP, a new assessment model which combines summative and formative assessment approaches is proposed. The testing and assessment, assumed a new role - to engender desirable education outcomes. The question asked is: will the mixed approach to formative and summative assessment provide the intended cure to the agony that tertiary EFL education in China has long been suffering - spending much time, yet achieving little effects? The paper reports the progresses and challenges as informed by the available research literature, yet asserts a lot needs to be explored on the potential of the assessment mix in this examination tradition deep-rooted and examination-obsessed society.
Resumo:
This study focuses on trends in contemporary Australian playwrighting, discussing recent investigations into the playwrighting process. The study analyses the current state of this country’s playwrighting industry, with a particular focus on programming trends since 1998. It seeks to explore the implications of this current theatrical climate, in particular the types of work most commonly being favoured for production. It argues that Australian plays are under-represented (compared to non-Australian plays) on ‘mainstream’ stages and that audiences might benefit from more challenging modes of writing than the popular three-act realist play models. The thesis argues that ‘New Lyricism’ might fill this position of offering an innovative Australian playwrighting mode. New Lyricism is characterised by a set of common aesthetics, including a non-linear narrative structure, a poetic use of language and magic realism. Several Australian playwrights who have adopted this mode of writing are identified and their works examined. The author’s play Floodlands is presented as a case study and the author’s creative process is examined in light of the published critical discussions about experimental playwriting work.
The interaction order of Second Life : how micro sociology can contribute to online games innovation
Resumo:
This paper uses the virtual world Second Life (as Web 2.0 environment) to discuss how sociological theory is a relevant tool for innovation in the area of games design as a methodological strategy. Via the theories of Erving Goffman’s interaction order the paper illustrates how micro studies of online interaction demonstrate active accounts of membership and complex interactivity. In order to achieve this, the paper outlines a methodological tool to assist in the application of micro sociology to Web 2.0 environments that accounts for the multiple dimensions of participation within the digital field.