期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
团队培训效果的评估方法及实例
1
作者 张以琼 《环球市场》 2003年第11期37-40,共4页
本文通过在酒店的实践过程,分别在培训的四个层次上,即反应层次、学习层次、行为层次和结果层次对团队合作培训效果进行实战性的运作,将组织团队培训效果的评估从定性分析转为定量分析,从而使得团队培训的效果变得更为直观和有意义... 本文通过在酒店的实践过程,分别在培训的四个层次上,即反应层次、学习层次、行为层次和结果层次对团队合作培训效果进行实战性的运作,将组织团队培训效果的评估从定性分析转为定量分析,从而使得团队培训的效果变得更为直观和有意义,避免将团队合作的培训变为变相的员工游乐活动。 展开更多
关键词 团队培训 培训效果 评估方法 反应层次 学习层次 行为层次 结果层次 团队合作培训 定量分析 企业 评估内容 评分标准
下载PDF
Divergences in Perceptions as for Oral Activity in Morocco
2
作者 Sana SAKALE 《Sino-US English Teaching》 2018年第1期8-13,共6页
This article tries to find out the few discrepancies between the teachers and their scholars as to oral activity, which shows that scholars' expectations and needs are not quite responded to. The versions chosen as a... This article tries to find out the few discrepancies between the teachers and their scholars as to oral activity, which shows that scholars' expectations and needs are not quite responded to. The versions chosen as a sample for this study come from different schools in the academy of Rabat Sal~ Zemmour Zaer area and belong to three different educational levels including common core, first year, and second year in addition to a total number of 40 teachers who have contributed to this research throughout the whole process. This research has relied on different instruments to collect the data including questionnaires, interviews, and class observation grids. Results showed that scholars' perceptions highly favour thematic variety. Findings also reported match findings of previous research in highlighting the importance of using tech facilities and multimedia to improve oral activity. 展开更多
关键词 different educational levels divergences in dealing with oral activity expectations PERCEPTIONS
下载PDF
Clustered trajectories anonymity in wireless sensor networks
3
作者 Seble Hailu Dady Wang Jiahao +1 位作者 Qin Zhiguang Yang Fan 《High Technology Letters》 EI CAS 2015年第2期140-146,共7页
This paper proposes a clustered trajectories anonymity scheme (CTA) that enhances the kano nymity scheme to provide the intended level of source location privacy in mobile event monitoring when a global attacker is ... This paper proposes a clustered trajectories anonymity scheme (CTA) that enhances the kano nymity scheme to provide the intended level of source location privacy in mobile event monitoring when a global attacker is assumed. CTA applies isomorphic property of rotation to create traces of the fake sources distributions which are similar to those of the real sources. Thus anonymity of each trajectory and that of the clustered is achieved. In addition, location kdiversity is achieved by dis tributing fake sources around the base station. To reduce the time delay, tree rooted at the base sta tion is constructed to overlap part of the beacon interval of the nodes in the hierarchy. Both the ana lytical analysis and the simulation results prove that proved energy overhead and time delay. our scheme provides perfect anonymity with improved energy overhead and time delay. 展开更多
关键词 clustered trajectories anonymity scheme (CTA) source location privacy K-ANONYMITY global attackers wireless sensor networks (WSNs)
下载PDF
Deep Semantic Structure of Natural Language
4
作者 Nabil Hassan 《Computer Technology and Application》 2014年第2期105-110,共6页
This paper presents the result of research of deep structure of natural language. The main result attained is the existence of a deterministic mathematical model that relates phonetics to associated mental images star... This paper presents the result of research of deep structure of natural language. The main result attained is the existence of a deterministic mathematical model that relates phonetics to associated mental images starting from the simplest linguistic units in agreement with the human response to different acoustic stimuli. Moreover, there exists two level hierarchy for natural language understanding. The first level uncovers the conceptual meaning of linguistic units, and hence forming a corresponding mental image. At the second level the operational meaning is found to suit, context, pragmatics, and world knowledge. This agrees with our knowledge about human cognition. The resulting model is parallel, hierarchical but still concise to explain the speed of natural language understanding. 展开更多
关键词 Natural language model conceptual meaning operational meaning composition.
下载PDF
Going Behind the Scenes: The Input Hypothesis Revisited
5
作者 Shen Li 《Fudan Journal of the Humanities and Social Sciences》 2010年第1期90-112,共23页
Few studies have to date gone behind the scenes to unveil the hidden metaphor-metonymy structure underpinning the input hypothesis ( Krashen 1981 ) despite overt attention paid to it over the years. In an effort to ... Few studies have to date gone behind the scenes to unveil the hidden metaphor-metonymy structure underpinning the input hypothesis ( Krashen 1981 ) despite overt attention paid to it over the years. In an effort to use a fine-grained metaphor-analysis approach( e. g. , Lakoffand Johnson 1980, 1999) to revisit the input hypothesis, this study looks into its thrust--the causal effect of comprehensible input upon comprehension--in the hope of charting out its hidden organization. By discovering a theme of CAUSATION pivoted on space-based metaphors and metonyrnies, the present study brings to relief two fallacies committed in the input hypothesis. First, the heavy dependence on the prototypicaUy physical-spatial hierarchy leads to a red-herring fallacy, whose inconsistency defies rather than supports its statement about comprehensible input as the overriding cause. Second, although there is no denying that comprehensible input is a significant source of language gains, to enthrone it as the sole causal variable to the exclusion of all the other important variables, especially the agency of the 1.2 learner who should have been positioned in the spotlight in the first place, is another fallacy of immense magnitude. 展开更多
关键词 METAPHOR METONYMY the input hypothesis
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部