Filters








6,834 Hits in 6.1 sec

Developing views of nature of science in an authentic context: An explicit approach to bridging the gap between nature of science and scientific inquiry

Rene� S. Schwartz, Norman G. Lederman, Barbara A. Crawford
2004 Science Education  
methods and activities through which science progresses, and, in turn, to developing desired views of NOS.  ...  We studied developments in NOS conceptions during a  ...  An instructor's PCK for NOS determines what and how NOS is taught . This was a new course and a new teaching approach for the instructor. As such, her level of PCK for NOS developed with the course.  ... 
doi:10.1002/sce.10128 fatcat:fzibiz5cnvhbbadehefcybbfxi

Major outcomes of an authentic astronomy research experience professional development program: An analysis of 8 years of data from a teacher research program

L. M. Rebull, D. A. French, W. Laurence, T. Roberts, M. T. Fitzgerald, V. Gorjian, G. K. Squires
2018 Physical Review Physics Education Research  
This program aligns well with the characteristics of high-quality professional development (PD) programs and has worked with a total of 103 educators since 2005.  ...  This work provides a new way of parameterizing why educators participate in PD programs that require a considerable investment of time.  ...  Thanks to Martha Kirouac and Tim Spuck for useful suggestions on early drafts.  ... 
doi:10.1103/physrevphyseducres.14.020102 fatcat:qldgalq4dzeidhpdxcsh7p2dkm

Computer networks and their protocols

G.R. Redinbo
1981 Proceedings of the IEEE  
Some of the following comments are a composite of reactions of the four of us, although the blame for any misconceptions or inaccuracies in this review must lie with me.  ...  The main theme of the book is a discussion of some new algorithms for achieving the discrete Fourier transform of a finite data sequence or the convolution of two ffite data sequences.  ... 
doi:10.1109/proc.1981.12096 fatcat:zpegrfsyrbd25pn6zyjai7eyim

Reflections on Security Options for the Real-Time Transport Protocol Framework

Colin Perkins
2014 2014 IEEE 22nd International Conference on Network Protocols  
We outline why this makes RTP a difficult protocol to secure, and describe the approach we have recently proposed in the IETF to provide security for RTP applications.  ...  This approach treats RTP as a framework with a set of extensible security building blocks, and prescribes mandatory-to-implement security at the level of different application classes, rather than at the  ...  ACKNOWLEDGEMENTS This work has benefited from many discussions with Magnus Westerlund, the other members of the IETF Audio/Video Transport working group, and the IETF security area directors over many  ... 
doi:10.1109/icnp.2014.102 dblp:conf/icnp/Perkins14 fatcat:uskw4ebs6fdd5kxtfbblmiiv7q

Cloud Based Secure and Privacy Enhanced Authentication & Authorization Protocol

Umer Khalid, Abdul Ghafoor, Misbah Irum, Muhammad Awais Shibli
2013 Procedia Computer Science  
In the past few years, a lot of research and development efforts have been made to define centralized and federated security mechanisms for the protection of identity information in a cloud environment  ...  This paper describes an authentication and authorization protocol which outlines the main features of anonymous communication in the cloud.  ...  Besides, we would also like to thank KTH-Applied Information Security lab for providing us with a good environment and facilities to complete this paper.  ... 
doi:10.1016/j.procs.2013.09.149 fatcat:ncrirhui65aflpvkavboo4tjmu

SoK: An Analysis of Protocol Design: Avoiding Traps for Implementation and Deployment [article]

Tobias Fiebig, Franziska Lichtblau, Florian Streibelt, Thorben Krueger, Pieter Lexis, Randy Bush, Anja Feldmann
2016 arXiv   pre-print
Today's Internet utilizes a multitude of different protocols. While some of these protocols were first implemented and used and later documented, other were first specified and then implemented.  ...  A classical example is insufficiently strict authentication requirements in a protocol specification.  ...  Some claim that such incentives might change this [77] . (b) The misconception of operators that there is a low risk of being attacked.  ... 
arXiv:1610.05531v1 fatcat:vaybjuis7rcnrnhlaetdhql6au

Automated Security Protocol Analysis With the AVISPA Tool

Luca Viganò
2006 Electronical Notes in Theoretical Computer Science  
It provides a modular and expressive formal language for specifying protocols and their security properties, and integrates different back-ends that implement a variety of automatic protocol analysis techniques  ...  The AVISPA Tool is a push-button tool for the Automated Validation of Internet Security Protocols and Applications.  ...  Introduction With the spread of the Internet and network-based services, and the development of new technological possibilities, the number and scale of new security protocols under development is out-pacing  ... 
doi:10.1016/j.entcs.2005.11.052 fatcat:es3r56p4wrdndckiybqwf7dez4

Towards a mechanization of cryptographic protocol verification [chapter]

Dominique Bolignano
1997 Lecture Notes in Computer Science  
We revisit the approach defined in [2] for the formal verification of cryptographic protocols so as to allow for some mechanization in the verification process.  ...  Here we show that for a wide range of practical situations and properties it is possible to perform the verification on a finite and safe abstract model.  ...  A misconception in h results in the identification of non existent flaws, and can easily be fixed by reducing some of the collapses formalized by h.  ... 
doi:10.1007/3-540-63166-6_15 fatcat:2fq57t5nfjd4nhhsscyglcg7om

Mutual Authentication Protocol for D2D Communications in a Cloud-Based E-Health System

Ana Paula G. Lopes, Paulo R. L. Gondim
2020 Sensors  
This paper proposes a new mutual authentication protocol for m-health systems, which supports D2D communication, ensuring security and surpassing the performance and security of other authentication procedures  ...  The development of the Internet of Things (IoT) predicts several new applications, some of which are designed to be incorporated into e-health systems, and some technologies, like cloud computing and device-to-device  ...  [5] fails to avoid a denial of service (DoS) attack. Jiang et al. [8] and Li et al. [9] also developed interesting approaches.  ... 
doi:10.3390/s20072072 pmid:32272675 fatcat:vxyjulrbuvfxvnvgnyns4grluq

How to Design a Secure Anonymous Authentication and Key Agreement Protocol for Multi-Server Environments and Prove Its Security

Yun-Hsin Chuang, Chin-Laung Lei, Hung-Jr Shiu
2021 Symmetry  
We instruct readers on how to design a secure AAKA protocol and how to prove the security. This paper will therefore be helpful for the design of new AAKA protocols, and for ensuring their security.  ...  An anonymous authentication and key agreement (AAKA) protocol provides anonymous members symmetric authentication and establishes a symmetric session key for secure communication in public networks.  ...  Acknowledgments: The authors thank the anonymous referees for their valuable comments and constructive suggestions. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/sym13091629 fatcat:x6msdk2imbat7fw2nn53qa4ge4

THE DEVELOPMENT OF THE KOREAN TEACHING OBSERVATION PROTOCOL (KTOP) FOR IMPROVING SCIENCE TEACHING AND LEARNING

Jongwon Park, Young-Shin Park, Youngmin Kim, Jongseok Park, Jin-Su Jeong
2014 Journal of Baltic Science Education  
An observational instrument called the KTOP (Korean Teaching Observation Protocol) was developed to analyze science teaching and to identify the components of teaching that need improvement.  ...  As a result, the KTOP was determined to consist of 30 items of 10 sub-categories in 4 main categories.  ...  Acknowledgement This work was supported by the National Research Foundation of Korea Grant funded by the Korean Government (NRF-2011-32A-B00205).  ... 
doi:10.33225/jbse/14.13.259 fatcat:4imvnd4y4va43cz3cvxt2vyjay

How EFL Learners Fill in the Blanks of an X-test: Think-Aloud Protocol

Hamid Ashraf, Mona Tabatabaee Yazdi, Aynaz Samir
2017 International Journal of English Linguistics  
To this aim, thirty EFL respondents from Mashhad, Iran, were randomly asked to answer a reliable and valid X-test.  ...  All of them participated in introspective methods of think-aloud and retrospective interviews during and after the test administration.  ...  ijel.ccsenet.org International Journal of English Linguistics Vol. 7, No. 1; 2017  ... 
doi:10.5539/ijel.v7n1p178 fatcat:daxxclyijzg63h3j6y234cv3ci

Men's Responses to Online Smoking Cessation Resources for New Fathers: The Influence of Masculinities

Joan L Bottorff, John L Oliffe, Gayl Sarbit, Mary Theresa Kelly, Alexandra Cloherty
2015 JMIR Research Protocols  
Drawing on previous research, Web-based resources were developed to complement a program to support expectant and new fathers to quit smoking.  ...  Objective: The objectives of this research were to: (1) describe the responses of expectant and new fathers who smoke or had recently quit smoking to the website resources, and (2) explore how masculinities  ...  That's a lot of money." This new information prompted many to reflect on the benefits of quitting smoking.  ... 
doi:10.2196/resprot.4079 pmid:25971202 pmcid:PMC4446518 fatcat:qnqwt4m64rh67a6wqcdnqpgylm

Detection of Black Hole Attack in DSR Routing Protocol by modified cooperative bait detection scheme

R.Saranya,, Dr.R.S.Rajesh
2019 International Journal of Research in Advent Technology  
The arrival of abnormal nodes (harmful nodes) can cause serious security problems. To resolve this issue, this paper provides a new security network algorithm.  ...  The proposed approach consists of three steps: 1) Initial Setup Step; 2) Attack Identification Step using Reverse Tracing, and 3) reactive protection step.  ...  In the initial stage of the protocol, they developed a trustworthy bait scheme to detect and isolate dangerous nodes using layered layers of data.  ... 
doi:10.32622/ijrat.71201999 fatcat:2johuogxszfazdvcndgbe6eiju

Developing EFL Student Teachers' Professional Competence through the Sheltered Instruction Observation Protocol Model

عمرو عبدالوهاب
2021 مجلة البحث العلمى فى التربیة  
Therefore, this study aimed at investigating the effect of using the sheltered instruction observation protocol (SIOP) model on EFL student teachers' professional competence.  ...  They were divided into two equal groups: an experimental group (n=24) and a control one (n=24).  ...  Being developed over a seven-year research study, the sheltered instruction observation protocol (SIOP) was developed through collaboration with teams of teachers and researchers to determine the best  ... 
doi:10.21608/jsre.2021.107096.1403 fatcat:eyusig4surfrpdnurzstwb4a5q
« Previous Showing results 1 — 15 out of 6,834 results