Search results for "AMS"
showing 10 items of 1497 documents
The use of cryptograms with arithmetic operations in school teaching
2013
The text presents a method of solving cryptograms with arithmetic operations. This method is based on systems of equations. In the case of cryptograms with adding and subtracting operations we have to solve systems of linear equations while in the case of cryptograms with multiplying and dividing operations we have to solve systems of non-linear equations. The method of deciphering cryptograms will be illustrated by examples.
Adaptive framework for network traffic classification using dimensionality reduction and clustering
2012
Information security has become a very important topic especially during the last years. Web services are becoming more complex and dynamic. This offers new possibilities for attackers to exploit vulnerabilities by inputting malicious queries or code. However, these attack attempts are often recorded in server logs. Analyzing these logs could be a way to detect intrusions either periodically or in real time. We propose a framework that preprocesses and analyzes these log files. HTTP queries are transformed to numerical matrices using n-gram analysis. The dimensionality of these matrices is reduced using principal component analysis and diffusion map methodology. Abnormal log lines can then …
Modelling Recurrent Events for Improving Online Change Detection
2016
The task of online change point detection in sensor data streams is often complicated due to presence of noise that can be mistaken for real changes and therefore affecting performance of change detectors. Most of the existing change detection methods assume that changes are independent from each other and occur at random in time. In this paper we study how performance of detectors can be improved in case of recurrent changes. We analytically demonstrate under which conditions and for how long recurrence information is useful for improving the detection accuracy. We propose a simple computationally efficient message passing procedure for calculating a predictive probability distribution of …
The Rocky Road of Growing into Contemporary Citizenship: Dewey, Gramsci, and the Method of Democracy
2015
Characterized by globalization, increasing pluralism, and new complexities of citizenship, the contemporary world poses challenges to the ways in which we conceptualize of the processes of searching for shared solutions to ever-complicated social problems. While the political rhetoric emphasizes the value of citizens’ participation, engagement, and “voices,” there are increasing feelings of frustration, incapacity, and disinterest on behalf of the citizens regarding the supposed eff ects of their political engagement. In order to conceptually grasp the problem of searching for shared solutions and the related challenges to education, we draw on John Dewey’s idea of the method of democracy a…
Jaunākā pirmsskolas vecuma bērnu intereses sekmēšana rokdarbos
2017
Pētījuma ‘’Jaunākā pirmsskolas vecuma bērnu intereses sekmēšana rokdarbos’’ mērķis ir teorētiski un praktiski izzināt jaunākā pirmsskolas vecuma bērnu intereses sekmēšanas iespējas rokdarbos. Pētījuma pirmajā nodaļā - dažādu pedagogu, psihologu ( J. A. Students, J. Arājs, A. Kovaļovs, L. Žukovs, A. Špona, A. Sorokina, R. Baltušīte, A. Šteinberga u.c.) autoru atziņas par interesēm un to attīstību pirmsskolas vecumā, aprakstīti rokdarbi, pedagogu (A.Ozoliņa,K. Cīrulis, L. Priede, V.Dirnēna, V. Zelmenis u.c.) autoru atziņas par rokdarbiem, to nozīmi bērna vispusīgai attīstībai. Aprakstīts ir autoru viedoklis par skolotāja, kā intereses par rokdarbiem sekmētāja, nozīmi bērna attīstības veicināš…
Guía Práctica de la Educación Digital
2015
En esta guía se ofrece recomendaciones pedagógicas sobre el uso educativo de las tabletas en el aula apoyadas en la investigación del proyecto Samsung Smart School. Por un lado, se busca conocer cómo es la práctica educativa con tabletas en las aulas en el que la aplica el proyecto (cómo es) y, desde esta evidencia, proponer cómo se podría mejorar y potenciar esa práctica a través de una serie de recomendaciones pedagógicas (cómo puede ser). La estructura es: Prólogo de Francesc Pedró (UNESCO) Cap. 1: A modo de introducción Cap. 2: Ecosistema educativo con tecnología: “Samsung Smart School” Cap. 3: “Samsung Smart School” desde la práctica docente Cap. 4: Construcción del aula con tecnología…
Reducing Relationship Conflict in Virtual Teams With Diversity Faultlines: The Effect of an Online Affect Management Intervention on the Rate of Grow…
2020
The aim of this study was to analyze the effect of an online affect management intervention on relationship conflict through the rate of growth of team resilience in virtual teams with diversity faultlines. Fifty-two 4-person teams participated in a randomized controlled trial design with repeated measures (i.e., three measurement occasions). Teams were randomly assigned to either an intervention designed to help them manage emotions in virtual teams or a control condition. Our findings showed that affect management can reduce the level of relationship conflict in virtual teams with diversity faultlines and that this effect can be explained by the pattern of change in team resilience in re…
Politolożka czyta Gramsciego: od hegemonii do polityczności
2015
In this paper I want to show, the Antonio Gramsci’s arrangements, Italian Marxist, are very actual analysis of political process and phenomenon, which can be very significant tip and inspiration for the political researchers. The argument of this paper is about a kind of continuity between process of establishing hegemony and notice what the political (beyond the strictly policy). Analyzing this continuity, I want to do some kind of “political science transcription” of Gramsci, which I hope will result in more detailed research. Also I want to show the Gramsci’s profile as a political theoretist.
Terroryzm na Bałkanach. Geneza – nurty – prognozy
2018
Autorka artykułu prezentuje zjawisko terroryzmu na Bałkanach na przestrzeni wieków XIX i XXI, zwracając uwagę, że ekspansja terroryzmu w tym regionie wymaga podjęcia odrębnych badań, przede wszystkim o charakterze heurystycznym. Wśród nurtów terroryzmu bałkańskiego został wymieniony terroryzm związany z ruchami narodowowyzwoleńczymi i terroryzm polityczny. Ponadto autorka wskazała na akcje terrorystyczne prowadzone w Rumunii i Bułgarii, terroryzm ustaszy i emigracji antyjugosłowiańskiej oraz inne jego formy. Szczególną uwagę poświęciła terroryzmowi związanemu z ekstremalnymi nurtami islamu, który pojawił się na Bałkanach jako dziedzictwo wojny domowej (1992–1995). W epoce postzimnowojennej …