822,406 research outputs found

    Timor leste collaborative project: a short report

    Get PDF
    This report discusses findings from a small-scale scoping study, which is part of a larger curriculum project—a collaborative venture between staff from the Universidade Nacional Timor Lorosa'e (UNTL) and a New Zealand university. The aim of the wider project is to develop a context-sensitive English language curriculum for students at UNTL who are undergoing pre-service training to be teachers of English as a foreign language in local secondary schools. (Details of the institutional and linguistic context are provided in the appendix.) According to Norton (2000), investment by learners is a key factor in the successful implementation of a new curriculum: "if learners invest in a second language, they do so with the understanding that they will acquire a wider range of symbolic and material resources, which will increase their value in the social world" (Norton, 2000, pp. 165-166). Thus, when designing the curriculum, it is important to ensure that the students will not only understand how to use the specific learning tasks but that it also expands their repertoire of skills and knowledge for application in their subsequent professional and social lives. The report begins by outlining the history and objectives of the project before explaining the specific research questions posed for the scoping study. The means of collecting data will be outlined and examples of the participants' attitudes will be presented based on open-ended questionnaire responses. These findings will be discussed in terms of how they might lead to the design of a curriculum which is internationally-framed and context-sensitive in terms both of its content and implementation. The report will conclude with the further steps that are being taken to move the project to its next phase

    Computed Chaos or Numerical Errors

    Get PDF
    Discrete numerical methods with finite time-steps represent a practical technique to solve initial-value problems involving nonlinear differential equations. These methods seem particularly useful to the study of chaos since no analytical chaotic solution is currently available. Using the well-known Lorenz equations as an example, it is demonstrated that numerically computed results and their associated statistical properties are time-step dependent. There are two reasons for this behavior. First, chaotic differential equations are unstable so that any small error is amplified exponentially near an unstable manifold. The more serious and lesser-known reason is that stable and unstable manifolds of singular points associated with differential equations can form virtual separatrices. The existence of a virtual separatrix presents the possibility of a computed trajectory actually jumping through it due to the finite time-steps of discrete numerical methods. Such behavior violates the uniqueness theory of differential equations and amplifies the numerical errors explosively. These reasons imply that, even if computed results are bounded, their independence on time-step should be established before accepting them as useful numerical approximations to the true solution of the differential equations. However, due to these exponential and explosive amplifications of numerical errors, no computed chaotic solutions of differential equations independent of integration-time step have been found. Thus, reports of computed non-periodic solutions of chaotic differential equations are simply consequences of unstably amplified truncation errors, and are not approximate solutions of the associated differential equations.Comment: pages 24, Figures

    Intelligent XML Tag Classification Techniques for XML Encryption Improvement

    Get PDF
    Flexibility, friendliness, and adaptability have been key components to use XML to exchange information across different networks providing the needed common syntax for various messaging systems. However excess usage of XML as a communication medium shed the light on security standards used to protect exchanged messages achieving data confidentiality and privacy. This research presents a novel approach to secure XML messages being used in various systems with efficiency providing high security measures and high performance. system model is based on two major modules, the first to classify XML messages and define which parts of the messages to be secured assigning an importance level for each tag presented in XML message and then using XML encryption standard proposed earlier by W3C [3] to perform a partial encryption on selected parts defined in classification stage. As a result, study aims to improve both the performance of XML encryption process and bulk message handling to achieve data cleansing efficiently
    corecore