scholarly journals Revising the Use of Differentiation in Text-Based Tasks in the Context of Ukrainian–Polish Bilingualism

Author(s):  
Larysa Shevchuk

Revising the Use of Differentiation in Text-Based Tasks in the Context of Ukrainian–Polish BilingualismThis article describes the specifics of Ukrainian–Polish bilingualism which can be observed in the territory of Ukraine and the present opportunities for studying Polish and Ukrainian. Various ways of using differentiation text-based tasks are proposed in the context of Ukrainian–Polish bilingualism. The article contains a description of differentiation in line with different types of activity. The completion of tasks aimed at familiarization with the text, text analysis, reconstruction, production, and complementation is possible due to different variants of content correlation in Polish and Ukrainian. The differentiation of activities during text analysis, supplemented by students’ own reflections and the results of their creative activity, is realized by finding answers to questions in the text posed in Polish, formulating answers to the questions, and completing the questions. This is made possible in different ways depending on the language used, be it Polish or Ukrainian. Task completion on the reconstruction, construction and complementation of texts is conducted in a similar manner. In case of difficulties, it is possible to use one’s native language in determining the main idea of the text, drawing up a plan, comparing two texts, etc. The use of different types of translation is an important method of differentiation when working with texts. The author also considers native language materials in a textbook’s methodological guidelines to be useful. O kwestii zastosowania zróżnicowanego podejścia podczas opracowywania tekstów przez studentów w warunkach dwujęzyczności ukraińsko-polskiejAutorka omawia cechy dwujęzyczności ukraińsko-polskiej na Ukrainie oraz dostępne możliwości nauki języka polskiego i ukraińskiego. Przedstawia sposoby zastosowania zróżnicowania w pracy uczniów z tekstami w warunkach dwujęzyczności ukraińsko-polskiej. Zamieszcza opis tego zróżnicowania w zależności od rodzaju pracy z tekstem. Podaje, że wykonanie zadań związanych z zapoznaniem się z tekstem, jego analizą, odtworzeniem, konstrukcją i uzupełnieniem tekstu jest możliwe dzięki różnym korelacyjnym opcjom materiału w języku polskim i ukraińskim. Rozróżnienie podejścia podczas analizy tekstu zostało uzupełnione wyrażaniem własnych opinii przez uczniów i wynikami ich działań twórczych. Są one realizowane również poprzez wykonywanie zadań mających na celu odnalezienie w tekście polskim odpowiedzi na pytania, ułożenie takiej odpowiedzi i uzupełnienie pytań. Jest to możliwe do zrobienia w różny sposób, w zależności od użycia języka polskiego lub ukraińskiego. Podobnie uczniowie wykonują zadania polegające na streszczaniu, konstruowaniu i uzupełnianiu tekstów. W przypadku powstania trudności możliwe jest użycie języka ojczystego przy ustalaniu głównej myśli w tekście, sporządzaniu planu, porównywaniu dwóch fragmentów itp. Ważny sposób stosowania zróżnicowania w pracy z tekstem – to użycie różnych rodzajów tłumaczeń. Za przydatne autorka uważa również materiały w języku ojczystym zawarte we wskazówkach metodycznych podręcznika.

Author(s):  
Alla Meyerovich ◽  

Main idea, concept, message are practically terms denoting the same phenomenon. To give a definition to a text message is no less hard than to formulate the message. Still, stylistic text analysis presupposes detection of text elements that contribute to message formation and are marked from this point of view; the understanding of the message depends on many factors, including extra-linguistic variables: historical and cultural background as well as readers' personality characteristics such as the habit and ability to read, their educational and social status, age and gender. The more pronounced then is the necessity of adequate message formulation. The procedure of literary text translation into other verbal as well as in non-verbal languages helps clearly reveal the message. Several stages of the procedure were worked out in the study to train future teachers in reading and analyzing the text.


Acta Numerica ◽  
2020 ◽  
Vol 29 ◽  
pp. 701-762
Author(s):  
Chi-Wang Shu

Essentially non-oscillatory (ENO) and weighted ENO (WENO) schemes were designed for solving hyperbolic and convection–diffusion equations with possibly discontinuous solutions or solutions with sharp gradient regions. The main idea of ENO and WENO schemes is actually an approximation procedure, aimed at achieving arbitrarily high-order accuracy in smooth regions and resolving shocks or other discontinuities sharply and in an essentially non-oscillatory fashion. Both finite volume and finite difference schemes have been designed using the ENO or WENO procedure, and these schemes are very popular in applications, most noticeably in computational fluid dynamics but also in other areas of computational physics and engineering. Since the main idea of the ENO and WENO schemes is an approximation procedure not directly related to partial differential equations (PDEs), ENO and WENO schemes also have non-PDE applications. In this paper we will survey the basic ideas behind ENO and WENO schemes, discuss their properties, and present examples of their applications to different types of PDEs as well as to non-PDE problems.


2021 ◽  
Author(s):  
César E. Montiel Olea ◽  
Leonardo R. Corral

Project Completion Reports (PCRs) are the main instrument through which different multilateral organizations measure the success of a project once it closes. PCRs are important for development effectiveness as they serve to understand achievements, failures, and challenges within the project cycle they can feed back into the design and execution of new projects. The aim of this paper is to introduce text analysis tools for the exploration of PCR documents. We describe and apply different text analysis tools to explore the content of a sample of PCRs. We seek to illustrate a way in which PCRs can be summarized and analyzed using innovative tools applied to a unique dataset. We believe that the methods presented in this investigation have numerous potential applications to different types of text documents routinely prepared within the Inter-American Development Bank (IDB).


2003 ◽  
Vol 11 (2) ◽  
pp. 134-149 ◽  
Author(s):  
R. E. Bell

Stresses that the criminal economy is much more cash‐intensive than the legitimate economy, and explains why. Indicates the scope of the problem for crime control: that carrying illegal proceeds as cash across national border remains an important method of money laundering. Outlines the provisions of the Proceeds of Crime Act 2002 concerning powers to allow searches for cash, and the standard of proof required. Discusses the different types of evidence allowed: avoidance of the usual banking channels, previous convictions and acquittals, lack of business records, lack of an audit trail, credibility, presence of items indicating crime, criminal associates, lying and inconsistent statements, contamination of the cash by drugs, suspicious denomination of banknotes, attempts at concealment, travel destinations and arrangements, financial background, failure to cooperate, and confidential informants. Goes on to cash seizures under terrorist legislation, possible challenges to seizures as contrary to the European Convention on Human Rights, the choice between civil and criminal forfeiture, and how the investigation proceeds.


2010 ◽  
Vol 660-661 ◽  
pp. 17-22 ◽  
Author(s):  
Oscar Olimpio de Araújo Filho ◽  
Maurício David Martins das Neves ◽  
Cezar Henrique Gonzalez ◽  
U.S.L. Filho ◽  
Francisco Ambrozio Filho

The processing of a molybdenum AISI M2 high speed steel with the addition of NbC (6% in mass) by a Powder Metallurgy technique of Mechanical Alloying is the aim of this work. Mechanical Alloying (MA) has been used primarily for particle size reduction, to its present status as an important method for the preparation of either materials with enhanced physical and mechanical properties or, indeed, new phases, or new engineering materials. In this work, niobium carbide (NbC) was added to the AISI M2 HSS powders by Mechanical Alloying technique in two different types of attritor mills and the materials which resulted were characterized by means of SEM plus EDS. The powders were processed in a horizontal attritor Zoz mill and in a vertical attritor mill developed in our laboratory. The parameters of milling were distinct and the results of the processing were compared.


2013 ◽  
Vol 26 (1) ◽  
pp. 65-79
Author(s):  
Shamsudin Othman ◽  
◽  
Muhammad Zarif Hassan@Zulkifli

The change of literary texts for the subject of Malay Literature i n schools brings with it the hope that the text chosen is one of “quality” in order to successfully reach the aims of the National Education Policy. This article is an analysis of the novel Jeriji Kasih (The Confines of Love) which supposedly is written with “an interesting story-telling technique” and is said to be able to impart “knowledge” as well as to shape students into people conscious of goodness, truth and a refined character. The analysis is based on the locally- developed framework of Genuine Literature ( Persuratan Baru ) which aims to examine the extent to which both these claims are true. The main idea in Genuine Literature is the emphasis on “knowledge” as opposed to “narrative”. This analysis shows how the text shapes a “narrative axis” and comes together in a “narrative space”. The analysis of this text also shows that the “narrative space” has been occupied with the “contents of the narrative” through the manipulation of a number of elements such as character and plot. This analysis reveals that the “knowledge” claimed to be contained in this text diverges from the idea of “knowledge” as put forth by Genuine Literature. Keywords: Genuine Literature, narrative axis, narrative space, knowledge, narrative


Author(s):  
Mohammad Saber Khaghaninejad

Qur'an as the sacred book of Muslims has been subjected to different types of interpretations from the beginning of its revelations, approximately from 1400 years ago. All the Islamic theology scholars, even unmuslims, tried to make a contribution as the best of their abilities to its understanding. By the advent of new post-structuralist approaches of textual analysis techniques in West, the possibility of interpreting this holy book has obsessed the modern textual analysts all over the world. This article tried to investigate the possibility of Barthes’ “Death of the Author” as one of the most controversial theories of modern text analysis. Considering the fact that, the author of Qur'an has not been a human to compose the text based on the dominant social, cultural and economical context of that time, the application of Barthes’ “Death of the Author” to the Qur'anic interpretation seems to be logically impossible. Furthermore, as the Qur'anic verses are classified into two categories of “Mohkamaat” and “Motashabehaat” based on Quran itself, this theory of text analysis can be utmost be applied to the latter in order to offer a better comprehension of the “Mohkamaat” as there are various interpretations of these “ayahs” in Islamic literature.


Author(s):  
Hamroev Alizhon Ruzikulovich ◽  
◽  
Jo’raeva Nargiza O’ktamovna ◽  

The article presents the idea of substantiating the practice of designing the creative activity of students in teaching their native language, determining the subject, purpose, and objectives of a pedagogical experiment in order to describe its specifics, description of the course of the experiment, analysis of its results. The main goal of designing the creative activity of students in teaching their native language is to increase the efficiency and improve the quality of education. When and under what conditions does the design of students' creative activity in teaching their native language give the desired pedagogical effect? The answer to this question makes it necessary to conduct a comparative analysis of the types of training, including creative, with explanatory and visual training.


2018 ◽  
Vol 7 (2) ◽  
pp. 663
Author(s):  
Vikashini Venkatesh ◽  
Praveen P U

Image segmentation is the most important method in the concept of image processing. It helps in analyzing the image accurately in many applications. It is generally used to assign or name, a label to individual pixels in an image, so that labels with similar name share common features. These related pixels result in same color, texture, or intensity. It also helps in identifying lines, curves and objects. These kinds of results help in different applications in the field of medical imaging, 3D constructions, etc. There are different kinds of segmentation methods already available for such applications. This paper briefs and compares three different types of segmentation methods like multithreshold method, watershed method and normalized cut method. It is compared based on computational time, complexity and number of clusters of the different methods used in the image.


Author(s):  
Mao-Lun Chiang ◽  
Yung-Fa Huang ◽  
Hui-Ching Hsieh ◽  
Wen-Chung Tsai

Due to the rapid development and popularity of the Internet, cloud computing has become an indispensable application service. However, how to assign various tasks to the appropriate service nodes is an important issue. Based on the reason above, an efficient scheduling algorithm is necessary to enhance the performance of system. Therefore, a Three-Layer Cloud Dispatching (TLCD) architecture is proposed to enhance the performance of task scheduling. In first layer, the tasks need to be distinguished to different types by their characters. Subsequently, the Cluster Selection Algorithm is proposed to dispatch the task to appropriately service cluster in the secondly layer. Besides, a new scheduling algorithm is proposed to dispatch the task to a suitable server in a server cluster to improve the dispatching efficiency in the thirdly layer. Basically, the TLCD architecture can obtain better task completion time than previous works. Besides, our algorithm and can achieve load-balancing and reliability in cloud computing network.


Sign in / Sign up

Export Citation Format

Share Document