984 resultados para Glinka, Mikhail Ivanovich, 1804-1857.


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study investigates the development of teacher identity in a transnational context through an analysis of the voices of sixteen preservice teachers from Hong Kong who engage in interaction with primary students in an Australian classroom. The context for this research is the school-based experience undertaken by these preservice English as a second language teachers as part of their short language immersion (SLIM) program in Brisbane, Australia. Such SLIM programs are a genre of study abroad programs which have been gaining in popularity within teacher education in Australia, attended by preservice and inservice teachers from China, Hong Kong, Korea, and other Asian countries. This research is conducted at a time when the imperative to globalise higher education provision is a strategic factor in the educational policies of both Australia and Hong Kong. In Australia, international educational services now constitute the country’s third largest export with more than 400,000 students coming to Australia to study annually. In order to maintain Australia’s current global position as the third most popular Englishspeaking study destination, the government is now focusing on sustainability and the quality of the study experience being offered to international students (Bradley Review, 2008). In Hong Kong, the government sponsors both preservice and inservice English as a second language (ESL) teachers to undertake SLIM programs in Australia and other English-speaking countries, as part of their policy of promoting high levels of English proficiency in Hong Kong classrooms. Transnational teacher education is an important issue to which this study contributes insights into the affordances and constraints of a school-based experience in the transnational context. Second language teacher education has been defined as interventions designed to develop participants’ professional knowledge. In this study, it is argued that participation in a different community of practice helps to foreground tacit theories of second language pedagogy, making them visible and open to review. Questions of pedagogy are also seen as questions of teacher identity, constituting the way that one is in the classroom. I take up a sociocultural and poststructural framework, drawing on the work of James Gee and Mikhail Bakhtin, to theorise the construction of teacher identity as emerging through dialogic relations and socially situated discursive practices. From this perspective, this study investigates whether these teachers engage with different ways of representing themselves through appropriating, adapting or rejecting Discourses prevailing in the Australian classroom. Research suggests that reflecting on dilemmas encountered as lived experiences can extend professional understandings. In this study, the participants engage in a process of dialogic reflection on their intercultural classroom interactions, examining with their peers and their lecturer/researcher selected moments of dissonance that they have faced in the unfamiliar context of an Australian primary classroom. It is argued that the recursive and multivoiced nature of this process of reflection on practice allows participants opportunities to negotiate new understandings of second language teacher identity. Dialogic learning, based on the theories of Bakhtin and Vygotsky, provides the theoretic framing not only for the process of reflection instantiated in this study, but also features in the analysis of the participants’ second language classroom practices. The research design uses a combined discourse analytic and ethnographic approach as a logic-of-inquiry to explore the dialogic relationships which these second language teachers negotiate with their students and their peers in the transnational context. In this way, through discourse analysis of their classroom talk and reflective dialogues, assisted by the analytic tools of speech genres and discourse formats, I explore the participants’ ways of doing and being second language teachers. Thus, this analysis traces the process of ideological becoming of these beginner teachers as shifts in their understandings of teacher and student identities. This study also demonstrates the potential for a nontraditional stimulated recall interview to provide dialogic scaffolding for beginner teachers to reflect productively on their practice.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We performed an integrated genomic, transcriptomic and proteomic characterization of 373 endometrial carcinomas using array- and sequencing-based technologies. Uterine serous tumours and ∼25% of high-grade endometrioid tumours had extensive copy number alterations, few DNA methylation changes, low oestrogen receptor/progesterone receptor levels, and frequent TP53 mutations. Most endometrioid tumours had few copy number alterations or TP53 mutations, but frequent mutations in PTEN, CTNNB1, PIK3CA, ARID1A and KRAS and novel mutations in the SWI/SNF chromatin remodelling complex gene ARID5B. A subset of endometrioid tumours that we identified had a markedly increased transversion mutation frequency and newly identified hotspot mutations in POLE. Our results classified endometrial cancers into four categories: POLE ultramutated, microsatellite instability hypermutated, copy-number low, and copy-number high. Uterine serous carcinomas share genomic features with ovarian serous and basal-like breast carcinomas. We demonstrated that the genomic features of endometrial carcinomas permit a reclassification that may affect post-surgical adjuvant treatment for women with aggressive tumours.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We demonstrate that in zebrafish, the microRNA miR-451 plays a crucial role in promoting erythroid maturation, in part via its target transcript gata2. Zebrafish miR-144 and miR-451 are processed from a single precursor transcript selectively expressed in erythrocytes. In contrast to other hematopoietic mutants, the ze-brafish mutant meunier (mnr) showed intact erythroid specification but diminished miR-144/451 expression. Although erythropoiesis initiated normally in mnr, erythrocyte maturation was morphologically retarded. Morpholino knockdown of miR-451 increased erythrocyte immaturity in wild-type embryos, and miR-451 RNA duplexes partially rescued erythroid maturation in mnr, demonstrating a requirement and role for miR-451 in erythro-cyte maturation. mnr provided a selectively miR-144/451-deficient background, facilitating studies to discern miRNA function and validate candidate targets. Among computer-predicted miR-451 targets potentially mediating these biologic effects, the pro-stem cell transcription factor gata2 was an attractive candidate. In vivo reporter assays validated the predicted miR-451/gata2-3'UTR interaction, gata2 down-regulation was delayed in miR-451-knockdown and mnr embryos, and gata2 knockdown partially restored erythroid maturation in mnr, collectively confirming gata2down-regulation as pivotal for miR-451-driven erythroid maturation. These studies define a new genetic pathway promoting erythroid maturation (mnr/miR-451/gata2) and provide a rare example of partial rescue of a mutant phenotype solely by miRNA overexpression. © 2009 by The American Society of Hematology.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this chapter, we discuss four related areas of cryptology, namely, authentication, hashing, message authentication codes (MACs), and digital signatures. These topics represent active and growing research topics in cryptology. Space limitations allow us to concentrate only on the essential aspects of each topic. The bibliography is intended to supplement our survey. We have selected those items which providean overview of the current state of knowledge in the above areas. Authentication deals with the problem of providing assurance to a receiver that a communicated message originates from a particular transmitter, and that the received message has the same content as the transmitted message. A typical authentication scenario occurs in computer networks, where the identity of two communicating entities is established by means of authentication. Hashing is concerned with the problem of providing a relatively short digest–fingerprint of a much longer message or electronic document. A hashing function must satisfy (at least) the critical requirement that the fingerprints of two distinct messages are distinct. Hashing functions have numerous applications in cryptology. They are often used as primitives to construct other cryptographic functions. MACs are symmetric key primitives that provide message integrity against active spoofing by appending a cryptographic checksum to a message that is verifiable only by the intended recipient of the message. Message authentication is one of the most important ways of ensuring the integrity of information that is transferred by electronic means. Digital signatures provide electronic equivalents of handwritten signatures. They preserve the essential features of handwritten signatures and can be used to sign electronic documents. Digital signatures can potentially be used in legal contexts.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The development of global navigation satellite systems (GNSS) provides a solution of many applied problems with increasingly higher quality and accuracy nowadays. Researches that are carried out by the Bavarian Academy of Sciences and Humanities in Munich (BAW) in the field of airborne gravimetry are based on sophisticated data processing from high frequency GNSS receiver for kinematic aircraft positioning. Applied algorithms for inertial acceleration determination are based on the high sampling rate (50Hz) and on reducing of such factors as ionosphere scintillation and multipath at aircraft /antenna near field effects. The quality of the GNSS derived kinematic height are studied also by intercomparison with lift height variations collected by a precise high sampling rate vertical scale [1]. This work is aimed at the ways of more accurate determination of mini-aircraft altitude by means of high frequency GNSS receivers, in particular by considering their dynamic behaviour.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A global electromagnetic model of an inductively coupled plasma sustained by an internal oscillating current sheet in a cylindrical metal vessel is developed. The electromagnetic field structure, profiles of the rf power transferred to the plasma electrons, electron/ion number density, and working points of the discharge are studied, by invoking particle and power balance. It is revealed that the internal rf current with spatially invariable phase significantly improves the radial uniformity of the electromagnetic fields and the power density in the chamber as compared with conventional plasma sources with external flat spiral inductive coils. This configuration offers the possibility of controlling the rf power deposition in the azimuthal direction.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Wi-Fi is a commonly available source of localization information in urban environments but is challenging to integrate into conventional mapping architectures. Current state of the art probabilistic Wi-Fi SLAM algorithms are limited by spatial resolution and an inability to remove the accumulation of rotational error, inherent limitations of the Wi-Fi architecture. In this paper we leverage the low quality sensory requirements and coarse metric properties of RatSLAM to localize using Wi-Fi fingerprints. To further improve performance, we present a novel sensor fusion technique that integrates camera and Wi-Fi to improve localization specificity, and use compass sensor data to remove orientation drift. We evaluate the algorithms in diverse real world indoor and outdoor environments, including an office floor, university campus and a visually aliased circular building loop. The algorithms produce topologically correct maps that are superior to those produced using only a single sensor modality.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We propose a system incorporating a tight integration between computer vision and robot control modules on a complex, high-DOF humanoid robot. Its functionality is showcased by having our iCub humanoid robot pick-up objects from a table in front of it. An important feature is that the system can avoid obstacles - other objects detected in the visual stream - while reaching for the intended target object. Our integration also allows for non-static environments, i.e. the reaching is adapted on-the-fly from the visual feedback received, e.g. when an obstacle is moved into the trajectory. Furthermore we show that this system can be used both in autonomous and tele-operation scenarios.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Most previous work on artificial curiosity (AC) and intrinsic motivation focuses on basic concepts and theory. Experimental results are generally limited to toy scenarios, such as navigation in a simulated maze, or control of a simple mechanical system with one or two degrees of freedom. To study AC in a more realistic setting, we embody a curious agent in the complex iCub humanoid robot. Our novel reinforcement learning (RL) framework consists of a state-of-the-art, low-level, reactive control layer, which controls the iCub while respecting constraints, and a high-level curious agent, which explores the iCub's state-action space through information gain maximization, learning a world model from experience, controlling the actual iCub hardware in real-time. To the best of our knowledge, this is the first ever embodied, curious agent for real-time motion planning on a humanoid. We demonstrate that it can learn compact Markov models to represent large regions of the iCub's configuration space, and that the iCub explores intelligently, showing interest in its physical constraints as well as in objects it finds in its environment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study analysed whether a significant relationship exists between the torque and muscle thickness and pennation angle of the erector spinae muscle during a maximal isometric lumbar extension with the lumbar spine in neutral position. This was a cross-sectional study in which 46 healthy adults performed three repetitions for 5 s of maximal isometric lumbar extension with rests of 90 s. During the lumbar extensions, bilateral ultrasound images of the erector spinae muscle (to measure pennation angle and muscle thickness) and torque were acquired. Reliability test analysis calculating the internal consistency (Cronbach's alpha) of the measure, correlation between pennation angle, muscle thickness and torque extensions were examined. Through a linear regression the contribution of each independent variable (muscle thickness and pennation angle) to the variation of the dependent variable (torque) was calculated. The results of the reliability test were: 0.976–0.979 (pennation angle), 0.980–0.980 (muscle thickness) and 0.994 (torque). The results show that pennation angle and muscle thickness were significantly related to each other with a range between 0.295 and 0.762. In addition, multiple regression analysis showed that the two variables considered in this study explained 68% of the variance in the torque. Pennation angle and muscle thickness have a moderate impact on the variance exerted on the torque during a maximal isometric lumbar extension with the lumbar spine in neutral position.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the emergent field of creative practice higher degrees by research, first generation supervisors have developed new models of supervision for an unprecedented form of research that combines creative practice and written thesis. In a national research project, entitled 'Effective supervision of creative practice higher research degrees', we set out to capture and share early supervisors' insights, strategies and approaches to supporting their creative practice PhD students. From the insights we gained during the early interview process, we expanded our research methods in line with a distributed leadership model and developed a dialogic framework. This led us to unanticipated conclusions and unexpected recommendations. In this study, we primarily draw on philosopher and literary theorist Mikhail Bakhtin's dialogics to explain how giving precedence to the voices of supervisors not only facilitated the articulation of dispersed tacit knowledge, but also led to other 20 discoveries. These include the nature of supervisors' resistance to prescribed models, policies and central academic development programmes; the importance of polyvocality and responsive dialogue in enabling continued innovation in the field; the benefits to supervisors of reflecting, discussing and sharing practices with colleagues; and the value of distributed leadership and dialogue to academic development and supervision capacity building in research education.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Neutral capsular polysaccharides (CPSs) were isolated from Acinetobacter baumannii NIPH190, NIPH201, and NIPH615. The CPSs were found to contain common monosaccharides only and to be branched with a side-chain 1→3-linked β-d-glucopyranose residue. Structures of the oligosaccharide repeat units (K units) of the CPSs were elucidated by 1D and 2D 1H and 13C NMR spectroscopy. Novel CPS biosynthesis gene clusters, designated KL30, KL45, and KL48, were found at the K locus in the genome sequences of NIPH190, NIPH201, and NIPH615, respectively. The genetic content of each gene cluster correlated with the structure of the CPS unit established, and therefore, the capsular types of the strains studied were designated as K30, K45, and K48, respectively. The initiating sugar of each K unit was predicted, and glycosyltransferases encoded by each gene cluster were assigned to the formation of the linkages between sugars in the corresponding K unit.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The book consists of an Introduction and four articles published both in Finland and abroad, written in English or Russian. They present the studies of eight Finnish and Russian idiomatic constructions that appear in the following examples: Ikkuna rikki — Окно сломано, lit.: ‘the window broken’, Äiti täällä — Мама здесь, lit.: ‘mother here’, Kaikki myymälöihin! — Все в магазин, lit.: ‘all to the shops’, Пить так пить! ≈ ‘When I drink, I drink (a lot)!’, etc. The aim of the studies is to reconstruct the origins and to trace the development of the above-mentioned constructions up to their modern usages. To this end, the constructions are investigated both from historical and from comparative perspectives. Finally, the case studies provide a possibility to develop more general bases of development of these 'ungrammatical' items. By attempting to answer the question why such constructions develop even though they destroy the harmonious structure of а language, some principles of idiomatization are postulated in the Conclusion.