853 resultados para Effective teaching -- Computer network resources
Resumo:
This paper focuses on QoS routing with protection in an MPLS network over an optical layer. In this multi-layer scenario each layer deploys its own fault management methods. A partially protected optical layer is proposed and the rest of the network is protected at the MPLS layer. New protection schemes that avoid protection duplications are proposed. Moreover, this paper also introduces a new traffic classification based on the level of reliability. The failure impact is evaluated in terms of recovery time depending on the traffic class. The proposed schemes also include a novel variation of minimum interference routing and shared segment backup computation. A complete set of experiments proves that the proposed schemes are more efficient as compared to the previous ones, in terms of resources used to protect the network, failure impact and the request rejection ratio
Resumo:
A recent study defines a new network plane: the knowledge plane. The incorporation of the knowledge plane over the network allows having more accurate information of the current and future network states. In this paper, the introduction and management of the network reliability information in the knowledge plane is proposed in order to improve the quality of service with protection routing algorithms in GMPLS over WDM networks. Different experiments prove the efficiency and scalability of the proposed scheme in terms of the percentage of resources used to protect the network
Resumo:
Virtual learning environments (VLEs) would appear to be particular effective in computer-supported collaborative work (CSCW) for active learning. Most research studies looking at computer-supported collaborative design have focused on either synchronous or asynchronous modes of communication, but near-synchronous working has received relatively little attention. Yet it could be argued that near-synchronous communication encourages creative, rhetorical and critical exchanges of ideas, building on each other’s contributions. Furthermore, although many researchers have carried out studies on collaborative design protocol, argumentation and constructive interaction, little is known about the interaction between drawing and dialogue in near-synchronous collaborative design. The paper reports the first stage of an investigation into the requirements for the design and development of interactive systems to support the learning of collaborative design activities. The aim of the study is to understand the collaborative design processes while sketching in a shared white board and audio conferencing media. Empirical data on design processes have been obtained from observation of seven sessions with groups of design students solving an interior space-planning problem of a lounge-diner in a virtual learning environment, Lyceum, an in-house software developed by the Open University to support its students in collaborative learning.
Resumo:
Background Cortical cultures grown long-term on multi-electrode arrays (MEAs) are frequently and extensively used as models of cortical networks in studies of neuronal firing activity, neuropharmacology, toxicology and mechanisms underlying synaptic plasticity. However, in contrast to the predominantly asynchronous neuronal firing activity exhibited by intact cortex, electrophysiological activity of mature cortical cultures is dominated by spontaneous epileptiform-like global burst events which hinders their effective use in network-level studies, particularly for neurally-controlled animat (‘artificial animal’) applications. Thus, the identification of culture features that can be exploited to produce neuronal activity more representative of that seen in vivo could increase the utility and relevance of studies that employ these preparations. Acetylcholine has a recognised neuromodulatory role affecting excitability, rhythmicity, plasticity and information flow in vivo although its endogenous production by cortical cultures and subsequent functional influence upon neuronal excitability remains unknown. Results Consequently, using MEA electrophysiological recording supported by immunohistochemical and RT-qPCR methods, we demonstrate for the first time, the presence of intrinsic cholinergic neurons and significant, endogenous cholinergic tone in cortical cultures with a characterisation of the muscarinic and nicotinic components that underlie modulation of spontaneous neuronal activity. We found that tonic muscarinic ACh receptor (mAChR) activation affects global excitability and burst event regularity in a culture age-dependent manner whilst, in contrast, tonic nicotinic ACh receptor (nAChR) activation can modulate burst duration and the proportion of spikes occurring within bursts in a spatio-temporal fashion. Conclusions We suggest that the presence of significant endogenous cholinergic tone in cortical cultures and the comparability of its modulatory effects to those seen in intact brain tissues support emerging, exploitable commonalities between in vivo and in vitro preparations. We conclude that experimental manipulation of endogenous cholinergic tone could offer a novel opportunity to improve the use of cortical cultures for studies of network-level mechanisms in a manner that remains largely consistent with its functional role.
Resumo:
A set of standards is proposed for university teaching. Embedding these within the Higher Education Academy UK Professional Standards Framework (UKPSF) would allow a more robust assessment of whether a university teacher has met a minimum acceptable threshold.
Resumo:
Teaching in universities has increased in importance in recent years which, in part, is a consequence of the change in funding of universities from block grants to student tuition fees. Various initiatives have been made which serve to raise the profile of teaching and give it greater recognition. It is also important that teaching is recognised even more fully and widely, and crucially that it is rewarded accordingly. We propose a mechanism for recognising and rewarding university teaching that is based on a review process that is supported by documented evidence whose outcomes can be fed into performance and development reviews, and used to inform decisions about reward and promotion, as well as the review of probationary status where appropriate.
Resumo:
Over 20,000 Swedish lower high school students are currently learning mathematics in English but little research has been conducted in this area. This study looks into the question of how much second language learner training teachers teaching mathematics in English to Swedish speaking students have acquired and how many of those teachers are using effective teaching practices for second language learners. The study confirms earlier findings that report few teachers receive training in second language learning but indicates that some of the teaching practices shown to be effective with second language learners are being used in some Swedish schools
Resumo:
No julgamento do recurso especial referente à ação ajuizada pela apresentadora Xuxa Meneghel para compelir o Google Search a desvincular dos seus índices de busca os resultados relativos à pesquisa sobre a expressão “Xuxa pedófila” ou qualquer outra que associasse o nome da autora a esta prática criminosa, a relatora da decisão, a Ministra Nancy Andrighi, definiu de maneira clara a controvérsia de que cuida este trabalho: o cotidiano de milhares de pessoas depende atualmente de informações que estão na web, e que dificilmente seriam encontradas sem a utilização das ferramentas de pesquisas oferecidas pelos sites de busca. Por outro lado, esses mesmos buscadores horizontais podem ser usados para a localização de páginas com informações, URLs prejudiciais resultantes da busca com o nome das pessoas. Diante disso, o que fazer? Existiria realmente um direito de ser esquecido, isto é, de ter uma URL resultante de uma pesquisa sobre o nome de uma pessoa desvinculado do índice de pesquisa do buscador horizontal? Há quem afirme que a medida mais apropriada para lidar com esse problema seria ir atrás do terceiro que publicou essa informação originariamente na web. Há também quem defenda que a proteção de um direito de ser esquecido representaria uma ameaça grande demais para a liberdade de expressão e de informação. Diante deste quadro, esta dissertação visa a estabelecer quais podem ser as características e os limites do direito ao esquecimento na era digital, de acordo com o estado atual da legislação brasileira a respeito, confrontando-se tal direito com outros direitos e interesses públicos e privados (especialmente o direito à liberdade de expressão e à informação) e levando em conta as características de funcionamento da própria rede mundial de computadores, em especial das ferramentas de buscas. Tendo em vista a importância dos buscadores horizontais no exercício do acesso à informação e, além disso, as dificuldades relacionadas à retirada de URLs de todos os sítios em que tenham sido publicadas, nossa pesquisa focará no potencial – e nas dificuldades – de se empregar a regulação de tais ferramentas de busca para a proteção eficaz do direito ao esquecimento na era digital.
Resumo:
The traditional perimeter-based approach for computer network security (the castle and the moat model) hinders the progress of enterprise systems and promotes, both in administrators and users, the delusion that systems are protected. To deal with the new range of threats, a new data-safety oriented paradigm, called de-perimeterisation , began to be studied in the last decade. One of the requirements for the implementation of the de-perimeterised model of security is the definition of a safe and effective mechanism for federated identity. This work seeks to fill this gap by presenting the specification, modelling and implementation of a mechanism for federated identity, based on the combination of SAML and X.509 digital certificates stored in smart-cards, following the A3 standard of ICP-Brasil (Brazilian official certificate authority and PKI)
Resumo:
The author suggests a long-distance teaching on toxinology using the following media: conventional printed book, scientific electronic journal, video library and the Internet. These new media are discussed as new alternatives for long-distance learning without the teacher.
Resumo:
Internal and external computer network attacks or security threats occur according to standards and follow a set of subsequent steps, allowing to establish profiles or patterns. This well-known behavior is the basis of signature analysis intrusion detection systems. This work presents a new attack signature model to be applied on network-based intrusion detection systems engines. The AISF (ACME! Intrusion Signature Format) model is built upon XML technology and works on intrusion signatures handling and analysis, from storage to manipulation. Using this new model, the process of storing and analyzing information about intrusion signatures for further use by an IDS become a less difficult and standardized process.
Resumo:
Recently, considerable research work have been conducted towards finding fast and accurate pattern classifiers for training Intrusion Detection Systems (IDSs). This paper proposes using the so called Fuzzy ARTMAT classifier to detect intrusions in computer network. Our investigation shows, through simulations, how efficient such a classifier can be when used as the learning mechanism of a typical IDS. The promising evaluation results in terms of both detection accuracy and training duration indicate that the Fuzzy ARTMAP is indeed viable for this sort of application.
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
Pós-graduação em Psicologia do Desenvolvimento e Aprendizagem - FC