313 research outputs found

    Mining Classroom Observation Data for Understanding Teachers’ Technological Pedagogical Content Knowledge Structure

    Get PDF
    On the basis of teachers’ pedagogical content knowledge proposed by Shulman, Koehler and Mishra explicitly put forward technological pedagogical content knowledge (TPACK) framework. The study shows that TPACK is a necessary knowledge for teachers to use technology for carrying effective teaching (Koehler & Mishra, 2005). It has been found that technological pedagogical knowledge (TPK) has a significant influence on TPACK structure of pre-service teachers (Zhang, 2015). This paper mainly explores the teaching structure of classroom and the TPK structure presented by teachers. Based on the existing video analysis and coding system, this study adapted and revised a curriculum teaching code table. Methods of quantitative and qualitative combination and comparative analysis are used to explore four aspects: teaching links, students’ expected cognitive level, teaching media and TPK. This study uses the classroom video analysis method to make a comparative analysis of short teaching video of award-winninged teachers and non award-winninged teachers in a competition and explores the influence of teaching activities and TPK structure of teachers on teaching effect. The statistical analysis of the results showed that the teaching link, the teaching media, and the student’s expected cognitive level have no significant effect on the teaching effect, and TPK has a significant impact on the teaching effect

    The Weight Distributions of Cyclic Codes and Elliptic Curves

    Full text link
    Cyclic codes with two zeros and their dual codes as a practically and theoretically interesting class of linear codes, have been studied for many years. However, the weight distributions of cyclic codes are difficult to determine. From elliptic curves, this paper determines the weight distributions of dual codes of cyclic codes with two zeros for a few more cases

    The stock index forecast based on dynamic recurrent neural network trained with GA

    Get PDF
    PACLIC 20 / Wuhan, China / 1-3 November, 200

    Securing Named Data Networking: Attribute-Based Encryption and Beyond

    Get PDF
    As one of the promising information-centric networking (ICN) architectures, NDN has attracted tremendous research attention and effort in the past decade. In particular, security and privacy remain significant concerns and challenges due to the fact that most of the traditional cryptographic primitives are no longer suitable for NDN architecture. For example, the traditional cryptographic primitives aim to secure point-to-point communications, always requiring explicit descriptions of to where or whom the data packets are intended, while network addressing or locating in NDN becomes implicit. To deal with such issues, the recently developed cryptographic primitives such as ABE have been applied to NDN. Also, to efficiently solve the trust-roots problem and seamlessly deploy cryptographic infrastructures, the concept of SDN has been introduced to NDN as well. This tutorial is devoted to exploring the interesting integration between NDN, ABE, and SDN
    • …
    corecore