This text presents the partial results of the first phase of the project “Design of didactic strategies to incorporate ICT on activities aimed at promoting student’s autonomous learning”, made by EAV – Education in virtual environments research group, from the Universidad Pontificia Bolivariana of Medellín. First phase of the project based its approach on the current state of thought as to Decree 2566 of 2003, by means of which the minimum conditions of quality for the operation of academic programs in Colombia, and specifically on the conception and application of the academic credit, and its relation with the independent work of the student and the incorporation of technologies of the informationand the communication in the higher education.
Con las necesidades operativas del campo profesional para hacer del proyecto un diseño eficiente, dinámico y con mayores recursos para manejar la perspectiva, medios como el uso de tres dimensiones (3D) y su experimentación objetiva generada por realidad virtual permitieron un diseño más sistémico, capaz de enlazar el manejo integrado de todo el proceso de producción arquitectónica. Es decir, contar con un medio fun- cional, con posibilidades de incorporar la programación constructiva y la gestión de recursos y costos. Todo ello fue coordinado por un proceso de comando-control de análisis-síntesis, con realización creativa y, sin perder objetividad, por su capacidad de poderse evaluar. Estas necesidades tra- jeron un modelo de información para la construcción, o building information modeling (Bim), para llevar a cabo la práctica profesional de la arquitectura. Así, la producción arquitectónica y también la urbana se han beneficiado al contar con proyectos que se diseñan y construyen más rápido, con mu- cha eficiencia en el coste y manejo de los recursos de producción, lo que deja cada vez menos tiempos perdidos, ahorros en materiales y mayor seguridad en el manejo de las estructuras funcionales y operativas.
A Service Episode is a collection of events, aggregated during an interval bounded by start and stop times. A Service Episode is the context in which the treatment or management of an arbitrary subset of a Patient’s medical conditions occurs. The definition of the start time, stop time, and included events of a Service Episode is entirely arbitrary; it may include a single outpatient visit or a hospitalization, or extend over significant period of time, e.g., the duration of a pregnancy, or an oncology treatment regimen, or a cardiac episode from infarction through rehabilitation. A Service Episode may involve one or more Healthcare Organizations (administrative entities that authorize Healthcare Providers to provide services within their legal administrative domain, e.g. hospitals, private physician’s offices, multispecialty clinics, nursing homes).
This study aims to investigate whether it is possible to assess learners’ sociopragmatic competence in learner spoken data by examining requests produced by Japanese learners of English. Various pragmalinguistic features of requests in shopping role plays in the National Institute of InformationandCommunications Technology Japanese Learner English (NICT JLE) Corpus were extracted and the appropriateness of these linguistic features was rated by twenty English language instructors (10 native speakers and 10 Japanese) in terms of their politeness in different shopping situations. A significantly high rate of agreement was only obtained in judging the requests negotiating for a refund or exchange of the purchased item. The Japanese informants showed a relatively lower agreement than the natives especially on requests asking for permission to test an item. The highly rated linguistic features were not frequently used in the corpus. Therefore, annotating the sociopragmatic information in the target corpus seems unrealistic.
process includes the strategic process ICT Management. This process has gone through several stages in its design, which has shown the complexity of its systematic updating. This situation makes it convenient to develop and apply a methodological tool that allows redefining the key elements of its operation continuously, in line with the most updated international models, I order to contribute to the proper management of the organization.
Since it was first described in 1995, the term digital divide has been approached in many ways. There are many definitions of Digital Divide in the literature and the main differences are in the concept of Informationandcommunications technologies they include. For instance, Hargittai (2003) defines it as “the gap between those who have access to digital technologies and those who do not; or the gap between those who use digital technologies and those who do not understood in binary terms distinguishing the “have” from the ‘have-nots’”. Barzilai-Nahon (2006, p 269) argues that digital divide was first approached “on insfrastructural access” and now “the focus is moving beyond technology to the users” Other international agencies like the OECD define the divide as the “gap between individuals, households, business and geographic areas at different socio- economic levels with regards to their opportunities to access informationandcommunications technologies and to their use for a wide variety of countries” (OECD, 2001, p.p.8-9). More definitions can be provided but as Hargittai (2003), Barzilai-Nahon (2006), Bertot (2002) and Vehovar, et al. (2006) argue, the digital divide should not be seen only in binary terms: i.e., someone either has access to an ICT or not, someone either uses it or not 1 . The bottom line is that the digital gap or digital inequality has almost always
The race to achieve smart cities is producing a continuous effort to adapt new developments and knowledge, for administrations and citizens. InformationandCommunications Technology are called on to be one of the key players to get these cities to use smart devices and sensors (Internet of Things) to know at every moment what is happening within the city, in order to make decisions that will improve the management of resources.
There is a type of “silent censorship”, where centralization has limited the information able to penetrate through the media gatekeepers. This concentra- tion of media control has also allowed for very few criticisms of the establish- ment in the media. Criticizing the dom- inant view of globalization and rapid commercial and technological expan- sion, or suggesting alternatives, is por- trayed as reactionary or “un-business”. In fact, communications scholars have found that in the industrialized world, there is a growing dependence on media which is proving to be quite harmful. There seems to be an almost blind faith in “the new”, “the modern” and techno- logical solutions to problems, and a sub- sequent devaluing of traditional values and structures, no matter how valuable they have proved to be over centuries. People are surprisingly quick to reject their indigenous traditions and cultural values as reactionary, static and irrele- vant to their lives. Instead, they turn to global television, MTV and Coca-Cola (Mowlana: 1996, 108) and place high value on foreign innovation, commer- cial products and experts.
Fallahpour, M.; Megias, D. (2009). High capacity method for real-time audio data hiding using the FFT transform. Paper presented at the Advances in Information Security and its Application; Communications in Computer andInformation Science; 3rd International Conference on Information Security and Assurance, 25th-27th June 2009, Seoul, South Korea. 36, 91-97 (De 1 a 2 cites)
Communication attacks can be classified into three different types according to the attack behaviour: replay attack, Denial of Service (DoS) attack and Sybil attack. A replay attack  consists of the replay of captured packets, possibly in a different time or location. For example, a message is directed to a node other than the intended one. This receiver node replays the message to the intended principle node and this receives the delayed message. This delay is fundamental to calculate network characteristics (channel, topology, routing, etc.). Cognitive wireless sensor networks could be affected by this delay more than regular WSNs because nodes share information about the environment. If a node receives the wrong informationand then repeats it, network behavior could be affected drastically. If PU packets are repeated, SUs could have a wrong inference of the spectrum, too, avoiding the communications in frequencies or the protocols used by the attacker. There is no specific work about this kind of attack in a CN. However, it can be considered an important attack in this area with a special impact, as we have explained above.
Serradell-Lopez, E.; Alguero, CG. (2010). Subcultures in Large Companies: An Exploratory Analysis. 3rd World Summit on the Knowledge Society, SEP 22-24, 2010 Corfu Island, Greece. ORGANIZATIONAL, BUSINESS, AND TECHNOLOGICAL ASPECTS OF THE KNOWLEDGE SOCIETY PT II, Communications in Computer andInformation Science, 112, 8-18.
Obviously, costs increase with the increase in number of communication modes that a company enables for its employees. In addition to the costs associated with the use of different modes of communications, the costs of management, monitoring, and compliance also increase exponentially. If a company provides its employees with five modes of communications, there are five ways for someone to break in and steal the company’s most critical data. Each mode of communication is a potential security hazard. How often have you heard about a bank employee’s laptop being stolen with clients’ secure financial data, making those clients vulnerable to someone doing something detrimental with the confidential information? Additionally, in light of major government bailouts, taxpayers are demanding that financial and healthcare providers be extremely transparent. The federal, state, and local governments, as well as the FDA, SEC, HIPPA, and Sarbanes-Oxley, all require companies to be compliant and archive their communications data for three to ten years.
The first symptoms of the mobile networking technology impacts on a daily life are seen almost everywhere, especially in the countries where the mobile solutions have been integrated into economy, business, governance, and last but not least in a lifestyle. Every day we can see how the online world is being transformed into a universal digital marketplace and social communications agora, full of shopping malls, commercial content, chat forums, learning plat- forms, subject oriented empowerment facilities, communities of practices, etc. For that reason not only the role of telecommunications providers but above all the role played by content creators such as artists, journalists and researchers as well as the involvement of content providers like publishers and editors will get stronger and stronger. It’s only a matter of time when the contribution of the content community to the digital business, culture, education and other areas will reach a critical mass in terms of quantity and quality, and as a result, will in one way or another take over the control of the digital world development. However, the content creators and providers have to understand that a shift form a linear and textual paradigm of acquiring informationand knowledge towards pictographic languages, and convergence of media on a digital platform and a possibility of accessing multimedia information on the move will dramatically affect not only the form of content they produce and provide, but also the con- tent itself. Marshall McLuhan has undoubtedly been right: the medium is the message.
A year later, in 1949 , Shannon’s "Communication theory of secrecy systems" [ 108 ] came to light. In words of Robert Gallager "Shannon’s cryptography work can be viewed as changing cryptography from an art to a science" [ 40 ]. Shannon successfully applied the tools that he had developed in [ 107 ] to the problem of transmitting confidential messages through public channels. His main conclusion is that a message from a set of messages sent through a public channel can be obfuscated into a cypher-text with the help of a secret key in such a way that the number of possible originating messages is the whole set of messages, that is, the cypher-text leaks no information to a possible eavesdropper. The condition for this to happen is that the number of secret keys is equal or greater than the number of messages. This condition only applies to eavesdroppers with unbounded resources, if we limit the storage or computing capability of the eavesdropper secret communications are possible without fulfilling the condition. It is evident that computing power resources that today might be considered as out of reach might become available in the near future. There is an implicit risk in assuming that an eavesdropper is limited in any way beyond the fundamental limits that physics impose her, therefore the interest in establishing the scenarios in which some kind of security can be achieved without any assumption is self-evident.
the Contracting Parties (COP7, COP8, COP9 and COP10) held, respectively, in San José, Costa Rica, in May 1999, Valencia, Spain, in November 2002, Kampala, Uganda, in November 2005, and Changwon, Republic of Korea, October-November 2008. The guidelines on various matters adopted by the Parties at those and earlier COPs have been prepared as a series of handbooks to assist those with an interest in, or directly involved with, implementation of the Convention at the international, regional, national, subnational or local levels. Each handbook brings together, subject by subject, the various relevant guidances adopted by Parties, supplemented by additional material from COP information papers, case studies and other relevant publications so as to illustrate key aspects of the guidelines. The handbooks are available in the three working languages of the Convention (English, French, and Spanish). The table on the inside back cover lists the full scope of the subjects covered by this handbook series at present. Additional handbooks will be prepared to include any further guidance adopted by future meetings of the Conference of the Contracting Parties. The Ramsar Convention promotes an integrated package of actions to ensure the conservation and wise use of wetlands. In recognition of these integrated approaches, the reader will find that within each handbook there are numerous cross-references to others in the series.
14 groups to explore, investigate and analyze authentic problems (Area, 2005). Accordingly with the Buck Institute for Education (BIE) 2 , Project-Based Learning (PBL) leads students to carry out a search process which main aim is to answer a question, problem or challenge. From this approach the students not only learn from the content, but they bring into play a range of skills related to information (as searching, processing or dissemination), collaboration, communication , critical thinking and organization amongst others.
In the University of Miami a research was conducted to states the role of the parents in the process of learning English as a second language, these students are called by their initials ELL’s (English Language Learners), in these case, the parents come from another countries where English is not an official language hence they are not fluent in English. This is similar to case of the parents in these context of Prado Veraniego School, these parents do not know much English almost nothing. According to the research in the University of Miami conducted by the researches Ed. D. Waterman and Ph.D. Harry (2008) cited that parents of ELLs represent a vital source of support for improved student engagement and accomplishment; they bring skills, values and knowledge that would profit both students and teachers. Most importantly, they bring profound assurance and motivation. Research and practice have both established that parent participation is central to academic achievement: Schools that support meaningful parent involvement have higher levels of student success, improved school attendance, higher graduation rates, larger registration in post-secondary education and students with positive outlooks about school (Harry & Waterman, 2008).