112 resultados para SMO


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Conocer la realidad educativa actual de Catalu??a, sobretodo en su competencia ling????stica, estudiada a trav??s de un test. Comparar los resultados de la aplicaci??n de una prueba de comprensi??n de ideas, expresadas en palabras, en castellano y su hom??nima traducida al catal??n, a diferentes grupos de ni??os del municipio de Gerona.. Muestra 1 (prueba piloto): 126 ni??os y ni??as de 8?? de EGB de 2 escuelas de Gerona y Barcelona. Muestra 2 (prueba experimental): 220 ni??os y ni??as de 8?? de EGB de 9 colegios de Gerona.. Plantea la historia del PMA, desde su inicio en EEUU hasta su introducci??n en Espa??a y sus diferentes adptaciones y relata una serie de aspectos sobre el biling????smo en Catalu??a. Traduce el subtest 'v' del PMA del castellano al catal??n, lo aplica y analiza en la muestra piloto para estudiar su validez. Analiza los resultados extraidos al aplicar las dos pruebas, catalana y castellana, a 9 colegios de la ciudad de Gerona.. Subtest 'v': comprensi??n verbal de PMA en la versi??n castellana publicada por TEA. Cuestionario.. Validez y fiabilidad. ??ndices estad??sticos. Paquete inform??tico BMDP.. La traducci??n-adaptaci??n al catal??n de PMA ha resultado con un ??ndice de fiabilidad del 0,89.. Ser??a interesante analizar los 2 ??tems de la prueba catalana que han acumulado mayor porcentaje de error en sus respuestas para reducir ese porcentaje. Los ni??os de habla catalana consiguen mejores puntuaciones en la rpueba de esta misma lengua. Los ni??os de habla castellana no mantienen diferencias entre los resultados de una lengua a otra..

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Seg??n la Constituci??n Espa??ola de 1978, ninguna confesi??n tendr?? car??cter estatal. Conforme a esta idea, se plantea la conveniencia de la libertad religiosa y las relaciones de las distintas confesiones con el Estado. Se expone que en el marco de las intenciones constitucionales de un Estado espa??ol aconfesional, que no laico, habr??a que garantizar por un lado la no presencia de ninguna ense??anza religiosa en los centros estatales, y por otro, garantizar y apoyar la formaci??n religiosa de los miembros de las distintas religiones en centros privados y concertados.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Como innovaci??n, el Proyecto recibi?? Menci??n Honor??fica en la modalidad de Innovaci??n Educativa de los Premios Nacionales a la Investigaci??n e Innovaci??n Educativa del CIDE 1993. Obra publicada con el patrocinio del Ayuntamiento de Legan??s y el Centro de Profesores de Legan??s.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Resumen basado en el de la publicaci??n

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Resumen tomado de la publicaci??n.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Resumen basado en el de la publicaci??n

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Resumen basado en el de la publicaci??n

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Resumen basado en el de la publicaci??n

Relevância:

10.00% 10.00%

Publicador:

Resumo:

El trabajo obtuvo el Tercer Premio de la Modalidad B de los 'Premios Tom??s Garc??a Verdejo' a las buenas pr??cticas educativas en la Comunidad Aut??noma de Extremadura para el curso acad??mico 2013/2014

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Resumen basado en el de la publicaci??n

Relevância:

10.00% 10.00%

Publicador:

Resumo:

El presente artículo tiene como objetivo analizar los movimientos de jóvenes en Chile, en particular de Objetores de Conciencia al Servicio Militar Obligatorio (SMO). A partir de este análisis, se desentrañan, primero; nuevas conceptualizaciones, tales como: nuevos movimientos sociales juveniles, su relación con la política y el poder, segundo; como se insertan en el actual contexto chileno, el servicio militar, la exigencia y respeto a los derechos fundamentales, la relación del servicio militar con el Estado, y tercero; desentrañar de fondo las dinámicas especificas del colectivo de Objetores de Conciencia “Ni Casco, Ni Uniforme”, sus objetivos en relación a la reivindicación de sus derechos, sus propuestas, sus conflictos y su relación con otros movimientos sociales y como Tal propuesta intenta responder a la necesidad de comprender las nuevas dinámicas sociales para contribuir al desarrollo permanente de las sociedades latinoamericanas contemporáneas, vislumbrando no solo sus particularidades sino también sus similitudes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objective: To determine the prevalence of occult hearing loss in elderly inpatients, to evaluate feasibility of opportunistic hearing screening and to determine subsequent provision of hearing aids. Materials and methods: Subjects (>65 years) were recruited from five elderly care wards. Hearing loss was detected by a ward-based hearing screen comprising patient-reported assessment of hearing disability and a whisper test. Subjects failing the whisper test or reporting hearing difficulties were offered formal audiological assessment. Results: Screening was performed on 51 patients aged between 70 and 95 years. Of the patients, 21 (41%) reported hearing loss and 16 (31%) failed the whisper test. A total of 37 patients (73%) were referred for audiological assessment with 17 (33%) found to have aidable hearing loss and 11 were fitted with hearing aids (22%). Discussion: This study highlights the high prevalence of occult hearing loss in elderly inpatients. Easy two-step screening can accurately identify patients with undiagnosed deafness resulting in significant proportions receiving hearing aids.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Zero-day or unknown malware are created using code obfuscation techniques that can modify the parent code to produce offspring copies which have the same functionality but with different signatures. Current techniques reported in literature lack the capability of detecting zero-day malware with the required accuracy and efficiency. In this paper, we have proposed and evaluated a novel method of employing several data mining techniques to detect and classify zero-day malware with high levels of accuracy and efficiency based on the frequency of Windows API calls. This paper describes the methodology employed for the collection of large data sets to train the classifiers, and analyses the performance results of the various data mining algorithms adopted for the study using a fully automated tool developed in this research to conduct the various experimental investigations and evaluation. Through the performance results of these algorithms from our experimental analysis, we are able to evaluate and discuss the advantages of one data mining algorithm over the other for accurately detecting zero-day malware successfully. The data mining framework employed in this research learns through analysing the behavior of existing malicious and benign codes in large datasets. We have employed robust classifiers, namely Naïve Bayes (NB) Algorithm, k−Nearest Neighbor (kNN) Algorithm, Sequential Minimal Optimization (SMO) Algorithm with 4 differents kernels (SMO - Normalized PolyKernel, SMO – PolyKernel, SMO – Puk, and SMO- Radial Basis Function (RBF)), Backpropagation Neural Networks Algorithm, and J48 decision tree and have evaluated their performance. Overall, the automated data mining system implemented for this study has achieved high true positive (TP) rate of more than 98.5%, and low false positive (FP) rate of less than 0.025, which has not been achieved in literature so far. This is much higher than the required commercial acceptance level indicating that our novel technique is a major leap forward in detecting zero-day malware. This paper also offers future directions for researchers in exploring different aspects of obfuscations that are affecting the IT world today.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article presents experimental results devoted to a new application of the novel clustering technique introduced by the authors recently. Our aim is to facilitate the application of robust and stable consensus functions in information security, where it is often necessary to process large data sets and monitor outcomes in real time, as it is required, for example, for intrusion detection. Here we concentrate on the particular case of application to profiling of phishing websites. First, we apply several independent clustering algorithms to a randomized sample of data to obtain independent initial clusterings. Silhouette index is used to determine the number of clusters. Second, we use a consensus function to combine these independent clusterings into one consensus clustering . Feature ranking is used to select a subset of features for the consensus function. Third, we train fast supervised classification algorithms on the resulting consensus clustering in order to enable them to process the whole large data set as well as new data. The precision and recall of classifiers at the final stage of this scheme are critical for effectiveness of the whole procedure. We investigated various combinations of three consensus functions, Cluster-Based Graph Formulation (CBGF), Hybrid Bipartite Graph Formulation (HBGF), and Instance-Based Graph Formulation (IBGF) and a variety of supervised classification algorithms. The best precision and recall have been obtained by the combination of the HBGF consensus function and the SMO classifier with the polynomial kernel.