429 results on '"Soto, Gloria"'
Search Results
52. Analysis of aided language samples in Spanish (Soto, 2022)
- Author
-
Soto, Gloria
- Subjects
Child language acquisition ,Speech production ,Communication technology and digital media studies - Abstract
Purpose: The purpose of this tutorial is to describe a tool and a procedure to support the collection and qualitative manual analysis of aided language samples in Spanish.Method: The Protocol for the Analysis of Aided Language Samples in Spanish (PAALSS) was developed from the present knowledge of Spanish language acquisition, and established procedures for the analysis of aided language samples. A draft version of PAALSS was distributed among 476 augmentative and alternative communication (AAC) service providers in Argentina, Chile, Costa Rica, Mexico, and the United States, who provided feedback on their usability and applicability. The clinical application of PAALSS is illustrated through the analysis of three different language samples of an 8-year-old child who uses aided AAC.Results: The use of PAALSS allowed the child���s educational team to document the child���s strengths and to set therapy goals to address her needs, such as increasing the length of her utterances and other structures essential for grammaticalization including articles, adjectives, adverbs, diminutives, morphemes for gender and number, prepositions, and personal pronouns.Conclusions: PAALSS can be used to describe the expressive language use of children who use aided AAC in Spanish and are in the early stages of language development. PAALSS can also be used as a guide to set goals for and measure outcomes of language therapy along four domains of expressive language including vocabulary, morphology, grammatical complexity, and syntax.Supplemental Material S1. Protocol for the Analysis of Aided Language Samples in Spanish (PAALSS).Supplemental Material S2. Luna���s language simples. Soto, G. (2022). The Protocol for the analysis of aided language samples in Spanish: A tutorial. Perspectives of the ASHA Special Interest Groups. Advance online publication. https://doi.org/10.1044/2021_PERSP-21-00236
- Published
- 2022
- Full Text
- View/download PDF
53. In-network validation of digital certificates for IoT secure communications
- Author
-
Zufiaurre Soto, Gloria, Astorga Burgo, Jasone, Jacob, Eduardo, Master de Ingeniería (Tel902), Ingeniariako Master (Tel902), and Jacob Taquet, Eduardo Juan
- Subjects
validation ,IoT ,segurtasuna ,programmable switch ,security ,seguridad ,SDN ,certificados ,ziurtagiriak ,validación ,switch programable ,baliozkotasuna ,switch programagarria - Abstract
[English] This project provides a design and implementation of a certificate validation system for Internet of Things (IoT) scenarios. During the establishment of a secure communication, a significant step to carry out by an endpoint is to authenticate the remote communication peer, which usually involves validating the digital certificate of that peer. Unfortunately, this leads to a significant computing cost; thus, validation becomes difficult for IoT devices to perform. Therefore, this project proposes a solution whose scope is to delegate certificate validation actions to another intermediate device in the network in a totally transparent way for the remote peers. In this case, a programmable switch is going to check the authenticity of the endpoint an IoT device is going to communicate with. In particular, it will verify the signature of the certificate and check whether it is revoked. This system will be implemented on the basis of Software Defined Networking (SDN) and In-Network Computing (INC) as they are particularly well-suited to IoT scenarios. In order to make the switch carry out validation operations, both its control and data plane will be programmed. Finally, the impact that this solution has on network performance will be evaluated. [Basque] Proiektu honek Internet of Things-en (IoT) inguruneetan ziurtagiriak balioztatzen dituen sistema baten diseinua eta inplementazioa aurkezten ditu. Komunikazio seguru bat ezarri arte ematen den prozesuan ezinbestekoa da komunikazio amaierako entitateak beste muturra balioztatzea, honek dakarren ziurtagiri digitalaren balioztapenarekin batera. Zoritxarrez, honek balio konputazional handia du, eta beraz, zaila da IoT gailuetan balioztapena egitea. Horregatik, proiektu honek hurrengo helburua duen soluzio bat proposatzen du: ziurtagiria balioztatzeko ekintzak sareko bitarteko beste gailu baten esku uztea, modu guztiz gardenean. Kasu honetan, IoT gailuarekin komunikatuko den urruneko muturreko baliozkotasuna switch programagarri baten bidez frogatuko da. Bereziki, ziurtagiriaren sinadura baieztatuko du eta baliogabetua dagoen frogatuko du. Sistema hau software bidez definitutako sareetan (SDN) eta sareko konputazioan (INC) oinarrituko da. Izan ere, IoT inguruneetara bereziki ongi egokitzen dira. Switch-ak balioztatze ekintzak aurrera eramateko, bere kontrol planoa zein datuen planoa programatuko dira. Azkenik, soluzio honek sarearen errendimenduan duen eragina ebaluatuko da. [Spanish] Este proyecto proporciona un diseño e implementación de un sistema de validación de certificados para escenarios de Internet of Things (IoT). En el transcurso del establecimiento de una conexión segura, una acción importante que debe llevar a cabo una entidad final de la comunicación es autenticar el otro extremo, lo que normalmente implica validar el certificado digital de dicho extremo. Desafortunadamente, esto conlleva un coste computacional importante, por lo que la validación resulta difícil de realizar para los dispositivos IoT. Por ello, este proyecto propone una solución cuyo objetivo es delegar las acciones de validación del certificado a otro dispositivo intermedio de la red de forma totalmente transparente para los extremos. En este caso, un switch programable va a comprobar la autenticidad del extremo remoto con el que se va a comunicar un dispositivo IoT. En particular, verificará la firma del certificado y comprobará si este está revocado. Este sistema se implementará basándose en las redes definidas por software (SDN) y la computación en red (INC), ya que se adaptan especialmente bien a escenarios IoT. Para que el switch realice las operaciones de validación, se programará tanto su plano de control como el de datos. Por último, se evaluará el impacto que esta solución tiene sobre el rendimiento de la red.
- Published
- 2021
54. Professional Skills for Serving Students Who Use AAC in General Education Classrooms: A Team Perspective.
- Author
-
Soto, Gloria, Muller, Eve, and Hunt, Pam
- Abstract
Focus group research methodology was used to identify professional skills regarded by educational team members (N=30) as necessary to support students who used augmentative and alternative communication (AAC) in general education classrooms. All valued five skills, including the ability to work together collaboratively and to maintain and operate the AAC system. (Contains references.) (Author/DB)
- Published
- 2001
55. Code-switching using aided AAC: toward an integrated theoretical framework
- Author
-
King, Marika R., primary and Soto, Gloria, additional
- Published
- 2022
- Full Text
- View/download PDF
56. Self-Efficacy Beliefs and the Education of Students with Severe Disabilities.
- Author
-
Soto, Gloria and Goetz, Lori
- Abstract
This article examines contributions of teacher efficacy literature to the study of teaching students with severe disabilities. The self-efficacy construct is explained, followed by a review of associated research problems. Findings on relationships between perceived self-efficacy of teachers and perceptions of student abilities, classroom practices, adoption of innovations, and collaboration with other professionals are then summarized. (Author/PB)
- Published
- 1998
57. Estudio piloto sobre una tarea para medir la creatividad musical
- Author
-
Valverde, Javier, Ferrando, Mercedes, Sáinz, Marta, Soto, Gloria, and Prieto, Lola
- Published
- 2014
- Full Text
- View/download PDF
58. Las tecnologías de la información y comunicación en la educación latinoamericana: modelos y tendencias de uso
- Author
-
Ana Angélica Casara Palivoda Wilske , Ana Belem Soberanes-Martín , Anthony Bautista-Pariona , Armando Guillermo Antúnez Sánchez , Brenda Luz Colorado Aguilar , Bruno Eliseo Ramírez Rengifo , Catalina Rondón Oyuela , Cindy Jiménez-Picado , Fernando Pari-Tito , Edgar de Jesús Ramírez Ramírez Fredery Fabían Polanias Soto , Gloria Concepción Tenorio-Sepúlveda , Irma Pianucci , José Cabrejo-Paredes , Juan Zarate-Yépez , Karla Yanitzia Artavia-Díaz , Libardo Cartagena , Lupe Esther Graus Cortez , María Guadalupe Ñeco Reyna , María Guadalupe Venteño Jaramillo , María Laura Manzi , Marta Tenutto Soldevilla , Melissa Rivera Guzmán , Nayibe Soraya Sánchez León , Osbaldo Turpo-Gebera , Raúl Alberto Irigoyen , Roció Diaz Zavala , Tanya Lizeth Báez Jiménez , Yolanda Coral Martínez Dorado , Yudi Castro Blanco Yusselfy Márquez Benítez
- Subjects
apps, videogame, agrarian, commercial, blended, classroom and education - Abstract
LAS TECNOLOGÍAS DE LA INFORMACIÓN Y COMUNICACIÓN EN LA EDUCACIÓN LATINOAMERICANA: MODELOS Y TENDENCIAS DE USO COLECCIÓN RESULTADO DE INVESTIGACIÓN Primera Edición 2021 Vol. 1 Editorial EIDEC Sello Editorial EIDEC (978-958-53018) NIT 900583173-1 ISBN: 978-958-53018-7-0 Formato: Digital PDF (Portable Document Format) DOI REPOSITORIO: https://doi.org/10.34893/1hfp-y566 Publicación: Colombia Fecha Publicación: 2021-05-31 Coordinación Editorial Escuela Internacional de Negocios y Desarrollo Empresarial de Colombia – EIDEC Instituto Tolimense de Formación Técnica Profesional - ITFIP. Colombia Centro de Investigación Científica, Empresarial y Tecnológica de Colombia – CEINCET Red de Investigación en Educación, Empresa y Sociedad – REDIEES Revisión y pares evaluadores Centro de Investigación Científica, Empresarial y Tecnológica de Colombia – CEINCET Red de Investigación en Educación, Empresa y Sociedad – REDIEES Entidad Financiadora Instituto Tolimense de Formación Técnica Profesional - ITFIP. Colombia AUTORES Ana Angélica Casara Palivoda Wilske[1], Ana Belem Soberanes-Martín[2], Anthony Bautista-Pariona [3], Armando Guillermo Antúnez Sánchez[4], Brenda Luz Colorado Aguilar[5], Bruno Eliseo Ramírez Rengifo [6], Catalina Rondón Oyuela[7], Cindy Jiménez-Picado[8], Fernando Pari-Tito[9], Edgar de Jesús Ramírez Ramírez[10] Fredery Fabían Polanias Soto[11], Gloria Concepción Tenorio-Sepúlveda[12], Irma Pianucci[13], José Cabrejo-Paredes[14], Juan Zarate-Yépez[15], Karla Yanitzia Artavia-Díaz[16], Libardo Cartagena[17], Lupe Esther Graus Cortez[18], María Guadalupe Ñeco Reyna[19], María Guadalupe Venteño Jaramillo[20], María Laura Manzi[21], Marta Tenutto Soldevilla[22], Melissa Rivera Guzmán[23], Nayibe Soraya Sánchez León[24], Osbaldo Turpo-Gebera[25], Raúl Alberto Irigoyen[26], Roció Diaz Zavala[27], Tanya Lizeth Báez Jiménez [28], Yolanda Coral Martínez Dorado[29] , Yudi Castro Blanco[30] Yusselfy Márquez Benítez[31] [1]Estudiante de maestría en Prácticas Transculturales - UNIFACVEST / Brasil / Santa Catarina. Especialista en educación especial. Licenciada en Letras. [2]Licenciada en Sistemas de Computación Administrativa, Universidad del Valle de México, Maestra en Educación, Universidad de las Américas, Doctora en Ciencias de la Educación, Colegio de Estudios de Posgrado de la Ciudad de México. Profesora de Tiempo Completo, Universidad Autónoma del Estado de México, correo electrónico: asoberanesm@uaemex.mx. [3]Pregrado, Universidad Nacional del Santa, Médico Cirujano, Universidad Nacional del Santa, correo electrónico: anthonybautistapariona@gmail.com. [4] Docente de Pregrado y Posgrado en la Universidad de Granma, Cuba, antunez@udg.co.cu [5]Doctorado en sistemas y ambientes educativos, Universidad Veracruzana, Profesor-investigador en la Benemérita Escuela Normal Veracruzana “Enrique C. Rébsamen”, brendaluzcolorado@gmail.com [6] Ingeniero agrónomo, Universidad del Tolima. Magister en Administración y Dirección de Empresas MBA, UNIR de la Rioja España. Docente, Instituto Tolimense de Formación Técnica Profesional ITFIP, Espinal Tolima, Colombia. Docente de tiempo completo, bramirez@itfip.edu.co [7] Tecnóloga en Gestión Informática. Instituto Tolimense de Formación Técnica Profesional ITFIP, Espinal Tolima, Colombia, Estudiante de Ingeniería de sistemas, crondon11@itfip.edu.co [8]Graduada en Enseñanza de Inglés y Negocios Internacionales, Maestrando en Administración con énfasis en Gerencia de Proyectos, Universidad Estatal a Distancia (UNED), Investigadora y Docente, UNED, cjimenezp@uned.ac.cr. [9] Investigador Junior, Universidad Nacional de San Agustín de Arequipa, correo electrónico: fpari@unsa.edu.pe [10] Estudiante de doctorado en Educación, de la Universidad San Buenaventura, Cali. Docente de inglés de la IE. Agustín Nieto Caballero, en Cali. edgarramirezramirez@gmail.com [11] Doctor en robótica y automatización. Ingeniero Electrónico. Actualmente docente de catedra del ITFIP, frederyps@yahoo.es [12] Licenciada en informática administrativa, Universidad Tecnológica Americana, Maestra en Tecnología Educativa, Tecnológico de Monterrey, Profesora investigadora, Tecnológico Nacional de México / Tes de Chalco, correo electrónico: gloria_cts@tesch.edu.mx [13] Lic. en Cs. de la Computación, Universidad Nacional de San Luis, Especialista en Entornos Virtuales de Aprendizaje, OEI, Prof. Adjunto, Universidad Nacional de San Luis, correo electrónico: pianucci@unsl.edu.ar [14] Pregrado, Universidad Nacional de Trujillo, Posgrado, Universidad Nacional de Trujillo, Docente Universitario, Universidad Nacional de Trujillo, correo electrónico: Jcabrejo@unitru.edu.pe. [15] Tesista de posgrado, Universidad Nacional de San Agustín de Arequipa, correo electrónico: jzaratey@unsa.edu.pe [16]Graduada en Docencia, Universidad San Marcos (USAM), Máster en Administración de negocios con énfasis en Gerencia de Proyectos, Universidad Estatal a Distancia (UNED), Investigadora y Gestora de proyectos, UNED, kartavia@uned.ac.cr [17]Ingeniero Electrónico, Universidad Antonio Nariño, Magister en Ingeniería Universidad Libre Bogotá, Magister en Gestión de Proyectos Tecnológicos Universidad Internacional de la Rioja “UNIR”. Ocupación: docente, Instituto Tolimense de Formación Técnica Profesional “ITFIP”, correo electrónico: lcartagena@itfip.edu.co. [18] Magister en Educación de la Universidad del Tolima. Licenciada en Ciencias Sociales Universidad de Cundinamarca UEDC. Actualmente Vicerrectora Académica del Instituto Tolimense de Formación Técnica Profesional ITFIP del Espinal Tol. iortiz@itfip.edu.co. [19] PhD. En Educación. Mención en Estudios Interculturales. Universidad Nacional de Educación a Distancia-UNED-Madrid- España. - Universidad Veracruzana- Docente. Red Iberoamericana de Estudios Interculturales e Interdisciplinarios. ORCID: org/0000-1915-386X GOOGLE ACADEMICO: http://mariagpe.edu/%C3%B1eco Correo electrónico Institucional: mneco@uv.mx Correo electrónico Personal: mariaguadalupeneco@gmail.com [20] Dra. En Economía, Especialidad en Ciencias, Tecnología e Innovación – Posgrado. UNAM Docente – UNAM. Facultad de Filosofía en Letras. Red Iberoamericana de Estudios interculturales e Interdisciplinarios. ORCID: 0000-0003-4832-6221 GOOGLE ACADEMICO: https://scholar.google.com.mx/citations?user=wd9SXaMAAAAJ&hl=en [21] Lic. en Psicología, Universidad de Palermo, Profesora universitaria, Universidad de Palermo, Diploma superior en Gestión educativa (FLACSO), docente de Universidad Favaloro y Universidad de Palermo, correo electrónico: lau_manzi@hotmail.com [22] Dra. de educación (UNL, UNSam, UnSam, Mgter. y Espec. en educación (UdeSA), Lic. en Psicología (UBA), Lic. y profesora (UM), docente de UNLaM, UNM, Dir. de Esp. en Docencia Universitaria con Orientación. Cs Agr. (UNR), coordinadora del doctorado intensivo (UP) correo electrónico: marta.tenutto@gmail.com [23] Ingeniera de Sistemas, Instituto Tolimense de Formación Técnica Profesional ITFIP, Espinal Tolima, Colombia. Docente Catedrática, mrivera71@itfip.edu.co [24] Ingeniera de sistemas, Universidad Antonio Nariño. Magister en E-learning y Redes Sociales, UNIR de la Rioja España. Docente, Instituto Tolimense de Formación Técnica Profesional ITFIP, Espinal Tolima, Colombia. Docente de tiempo completo, nsanchez@itfip.edu.co [25] Docente - Investigador, Universidad Nacional de San Agustín de Arequipa, correo electrónico: oturpo@unsa.edu.pe [26] Maestrando en Educación, Universidad Nacional de la Matanza (UNLaM), Lic. en Gestión Educativa (UNLaM), docente de (UNLaM), Universidad Favaloro y de AMIT, correo electrónico: irigoyenraul@gmail.com [27] Docente, Universidad Nacional de San Agustín de Arequipa, correo electrónico: rdiazz@unsa.edu.pe [28] Licenciatura en Educación Preescolar, Benemérita Escuela Normal Veracruzana “Enrique C. Rébsamen”, Egresada de la Licenciatura en Educación Preescolar, baezjimenezt.bpree16@gmail.com [29] Doctora en Pedagogía. Profesora Titular y Líder del Grupo de Investigación “Gestión del Conocimiento para la Innovación Educativa” en la Escuela Normal Superior Oficial de Guanajuato, México. coral_36@hotmail.com [30] Docente de Pregrado y Posgrado en la Universidad de Granma, Cuba, ycastrob@udg.co.cu [31] Bacterióloga y Laboratorista Clínico, Universidad Colegio Mayor de Cundinamarca, Magister en Educación, Universidad de Pamplona N.S. Docente Investigador Universitario, Universidad de Boyacá. correo electrónico: yusselfy_1@hotmail.com Coordinadores editoriales Mg. Nayibe Soraya Sánchez León - Colombia Instituto Tolimense de Formación Técnica Profesional - ITFIP. Colombia Mg. Yohanna Milena Rueda Mahecha Editorial EIDEC Dr. Cesar Augusto Silva Giraldo Centro de Investigación Científica, Empresarial y Tecnológica de Colombia – CEINCET – Colombia. Red de Investigación en Educación, Empresa y Sociedad – REDIEES – Colombia. Editores literarios PhD. José Hugo Cornejo Martin del Campo - México PhD. Eva Margarita Godínez López - México PhD. Hugo Heriberto Morales del Valle - México Lic. Bertha Amelia Soria Zendejas - México Maestro Tiburcio López Macías - México Mg. Nayibe Soraya Sánchez León - Colombia El libro LAS TECNOLOGÍAS DE LA INFORMACIÓN Y COMUNICACIÓN EN LA EDUCACIÓN LATINOAMERICANA: MODELOS Y TENDENCIAS DE USO, esta publicado bajo la licencia de Creative Commons Atribución-NoComercial 4.0 Internacional (CC BY-NC 4.0) Internacional (https://creativecommons.org/licenses/by-nc/4.0/deed.es). Esta licencia permite copiar, adaptar, redistribuir y reproducir el material en cualquier medio o formato, con fines no comerciales, dando crédito al autor y fuente original, proporcionando un enlace de la licencia de Creative Commons e indicando si se han realizado cambios. Licencia: CC BY-NC 4.0. NOTA EDITORIAL: Las opiniones y los contenidos de los resúmenes publicados en el libro LAS TECNOLOGÍAS DE LA INFORMACIÓN Y COMUNICACIÓN EN LA EDUCACIÓN LATINOAMERICANA: MODELOS Y TENDENCIAS DE USO. Son de responsabilidad exclusiva de los autores; así mismo, éstos se responsabilizarán de obtener el permiso correspondiente para incluir material publicado por parte de la Editorial EIDEC y la entidad financiadora de la publicación Instituto Tolimense de Formación Técnica Profesional - ITFIP.  
- Published
- 2021
59. Comparison of Two Instructional Strategies on Social Skills Acquisition and Generalization among Individuals with Moderate and Severe Mental Retardation Working in a Vocational Setting: A Meta-Analytical Review.
- Author
-
Soto, Gloria
- Abstract
This meta-analytical review of seven studies examined the effectiveness of two intervention approaches--(1) behavior training strategies and (2) cognitive process strategies--to teaching social skills to learners with moderate to severe mental retardation. Although both approaches were effective, the cognitive process appeared more effective in response maintenance and generalization. (Author/DB)
- Published
- 1994
60. Prompting for repair as a language teaching strategy for augmentative and alternative communication
- Author
-
Cooper, Brittney, primary, Soto, Gloria, additional, and Clarke, Michael T., additional
- Published
- 2021
- Full Text
- View/download PDF
61. Teaching Specific Requests: A Comparative Analysis on Skill Acquisition and Preference Using Two Augmentative and Alternative Communication Aids.
- Author
-
Soto, Gloria
- Abstract
A young man with severe to profound retardation was taught to use two different augmentative/alternative communication (AAC) aids. Although the participant learned to correctly request with both AAC devices, he later showed a strong preference for one device over the other. The value of multimodality and consideration of client preferences is stressed. (DB)
- Published
- 1993
62. Special Education/Integration in Spain: Highlighting Similarities and Differences with Mainstreaming in the USA.
- Author
-
Soto, Gloria and Hetzroni, Orit
- Abstract
This paper highlights the historical, social, and legal aspects of Spain's movement to integrate special education students. Differences in constitutional and legislative foundations as well as in practical mainstreaming efforts and professional roles between the U.S. and Spain are noted. Educators are warned to not uncritically replicate other mainstreaming models. (Author/JDD)
- Published
- 1993
63. Enhancing the personal narrative skills of elementary school-aged students who use AAC: The effectiveness of personal narrative intervention
- Author
-
Soto, Gloria, Solomon-Rice, Patti, and Caputo, Michele
- Published
- 2009
- Full Text
- View/download PDF
64. A cognitive-creative profile of emotional talent/Perfil cognitivo-creativo del talento emocional
- Author
-
Bermejo, Rosario, Prieto, Maria Dolores, Fernandez, Mari Carmen, Soto, Gloria, and Sainz, Marta
- Published
- 2013
- Full Text
- View/download PDF
65. Restorative Justice Education from Intrajudicial Criminal Mediation Associated Factors
- Author
-
Matás Castillo, Mercedes, primary, Méndez, Inmaculada, additional, Esteban, Cecilia Ruiz, additional, and Soto, Gloria, additional
- Published
- 2021
- Full Text
- View/download PDF
66. Profiles of Maladjustment and Interpersonal Risk Factors in Adolescents
- Author
-
Méndez, Inmaculada, primary, Ruiz-Esteban, Cecilia, additional, Soto, Gloria, additional, Granados Alos, Lucía, additional, and Matás-Castillo, Mercedes, additional
- Published
- 2021
- Full Text
- View/download PDF
67. Monetary Transmission in the Term Structure of Interest Rates in Spain (1995-2003)
- Author
-
Prats, María A., primary and Soto, Gloria M., additional
- Published
- 2021
- Full Text
- View/download PDF
68. Las tecnologías de la información y comunicación en la educación latinoamericana: modelos y tendencias de uso
- Author
-
Instituto Tolimense de Formación Técnica Profesional - ITFIP. Colombia, Centro de Investigación Científica, Empresarial y Tecnológica de Colombia – CEINCET – Colombia, Red de Investigación en Educación, Empresa y Sociedad – REDIEES – Colombia, Escuela Internacional de Negocios y Desarrollo Empresarial de Colombia – EIDEC, Ana Angélica Casara Palivoda Wilske , Ana Belem Soberanes-Martín , Anthony Bautista-Pariona , Armando Guillermo Antúnez Sánchez , Brenda Luz Colorado Aguilar , Bruno Eliseo Ramírez Rengifo , Catalina Rondón Oyuela , Cindy Jiménez-Picado , Fernando Pari-Tito , Edgar de Jesús Ramírez Ramírez Fredery Fabían Polanias Soto , Gloria Concepción Tenorio-Sepúlveda , Irma Pianucci , José Cabrejo-Paredes , Juan Zarate-Yépez , Karla Yanitzia Artavia-Díaz , Libardo Cartagena , Lupe Esther Graus Cortez , María Guadalupe Ñeco Reyna , María Guadalupe Venteño Jaramillo , María Laura Manzi , Marta Tenutto Soldevilla , Melissa Rivera Guzmán , Nayibe Soraya Sánchez León , Osbaldo Turpo-Gebera , Raúl Alberto Irigoyen , Roció Diaz Zavala , Tanya Lizeth Báez Jiménez , Yolanda Coral Martínez Dorado , Yudi Castro Blanco Yusselfy Márquez Benítez, Silva Giraldo, Cesar Augusto, and Rueda Mahecha, Yohanna Milena
- Published
- 2021
- Full Text
- View/download PDF
69. Informe de Pol��tica #1. Efecto protector del capital social: recomendaciones para reducir el impacto del COVID-19 en el bienestar subjetivo
- Author
-
Sarmiento, Juan Pablo, Liberona, F��lix, Castro, Carmen Paz, Arrieta, Alejandro, Arensburg, Svenska, Soto, Gloria, and Stock, Marion
- Published
- 2021
- Full Text
- View/download PDF
70. In-network validation of digital certificates for IoT secure communications
- Author
-
Astorga Burgo, Jasone, Jacob Taquet, Eduardo Juan, Master de Ingeniería (Tel902), Ingeniariako Master (Tel902), Zufiaurre Soto, Gloria, Astorga Burgo, Jasone, Jacob Taquet, Eduardo Juan, Master de Ingeniería (Tel902), Ingeniariako Master (Tel902), and Zufiaurre Soto, Gloria
- Abstract
[English] This project provides a design and implementation of a certificate validation system for Internet of Things (IoT) scenarios. During the establishment of a secure communication, a significant step to carry out by an endpoint is to authenticate the remote communication peer, which usually involves validating the digital certificate of that peer. Unfortunately, this leads to a significant computing cost; thus, validation becomes difficult for IoT devices to perform. Therefore, this project proposes a solution whose scope is to delegate certificate validation actions to another intermediate device in the network in a totally transparent way for the remote peers. In this case, a programmable switch is going to check the authenticity of the endpoint an IoT device is going to communicate with. In particular, it will verify the signature of the certificate and check whether it is revoked. This system will be implemented on the basis of Software Defined Networking (SDN) and In-Network Computing (INC) as they are particularly well-suited to IoT scenarios. In order to make the switch carry out validation operations, both its control and data plane will be programmed. Finally, the impact that this solution has on network performance will be evaluated., [Basque] Proiektu honek Internet of Things-en (IoT) inguruneetan ziurtagiriak balioztatzen dituen sistema baten diseinua eta inplementazioa aurkezten ditu. Komunikazio seguru bat ezarri arte ematen den prozesuan ezinbestekoa da komunikazio amaierako entitateak beste muturra balioztatzea, honek dakarren ziurtagiri digitalaren balioztapenarekin batera. Zoritxarrez, honek balio konputazional handia du, eta beraz, zaila da IoT gailuetan balioztapena egitea. Horregatik, proiektu honek hurrengo helburua duen soluzio bat proposatzen du: ziurtagiria balioztatzeko ekintzak sareko bitarteko beste gailu baten esku uztea, modu guztiz gardenean. Kasu honetan, IoT gailuarekin komunikatuko den urruneko muturreko baliozkotasuna switch programagarri baten bidez frogatuko da. Bereziki, ziurtagiriaren sinadura baieztatuko du eta baliogabetua dagoen frogatuko du. Sistema hau software bidez definitutako sareetan (SDN) eta sareko konputazioan (INC) oinarrituko da. Izan ere, IoT inguruneetara bereziki ongi egokitzen dira. Switch-ak balioztatze ekintzak aurrera eramateko, bere kontrol planoa zein datuen planoa programatuko dira. Azkenik, soluzio honek sarearen errendimenduan duen eragina ebaluatuko da., [Spanish] Este proyecto proporciona un diseño e implementación de un sistema de validación de certificados para escenarios de Internet of Things (IoT). En el transcurso del establecimiento de una conexión segura, una acción importante que debe llevar a cabo una entidad final de la comunicación es autenticar el otro extremo, lo que normalmente implica validar el certificado digital de dicho extremo. Desafortunadamente, esto conlleva un coste computacional importante, por lo que la validación resulta difícil de realizar para los dispositivos IoT. Por ello, este proyecto propone una solución cuyo objetivo es delegar las acciones de validación del certificado a otro dispositivo intermedio de la red de forma totalmente transparente para los extremos. En este caso, un switch programable va a comprobar la autenticidad del extremo remoto con el que se va a comunicar un dispositivo IoT. En particular, verificará la firma del certificado y comprobará si este está revocado. Este sistema se implementará basándose en las redes definidas por software (SDN) y la computación en red (INC), ya que se adaptan especialmente bien a escenarios IoT. Para que el switch realice las operaciones de validación, se programará tanto su plano de control como el de datos. Por último, se evaluará el impacto que esta solución tiene sobre el rendimiento de la red.
- Published
- 2021
71. Environmental impact of agricultural trade liberalization under NAFTA
- Author
-
Soto, Gloria
- Subjects
Deforestation -- United States -- Mexico ,Biological diversity ,Land use -- United States -- Mexico ,Free trade ,Environmental policy -- Analysis ,Political science ,Free Trade Agreement, 1992, United States-Canada-Mexico - Abstract
Fifteen years after its implementation, the North American Free Trade Agreement has been subject to evaluations from different perspectives, including environmental assessments. According to the Commission for Environmental Cooperation (CEC), results of these evaluations show that at the aggregate level, the environmental impacts of free trade are marginal. This article presents relationships between corn trade and environment through an ex post evaluation. I show a quantification of the land-use change and connections with deforestation and biodiversity loss in Mexico, as poor farmers expanded their agricultural activity into marginal forest and jungle areas to compensate for lost income. I also analyze the impact on land-use change in the United States resulting from increased corn exports to Mexico. Keywords: Environmental Regulation, Trade, Agricultural Liberalization, NAFTA, Mexico, United States, North America, Corn Trade, Public Policy, Poverty, Land-Use Change, Deforestation, Biodiversity. Quince anos despues de su implementation, el TLCAN ha sido sujeto a muchos estudios desde diferentes perspectivas, incluyendo evaluaciones ambientales. De acuerdo con la Comision para la Cooperation Ambiental (CCA), los resultados de estas evaluaciones muestran que a un nivel agregado los impactos ambientales del libre comercio son marginales. Este articulo presenta la relation entre el comercio de maiz y el medio ambiente a traves de una evaluation ex post. Se muestra una cuantificacion del cambio de uso de suelo y su conexion con la deforestation y la perdida de biodiversidad en Mexico; a medida que agricultores de escasos recursos expandieron sus actividades agricolas hacia los mdrgenes de areas con bosques y selvas para compensar perdidas en su ingreso. Tambien se analiza el impacto de un cambio en el uso de suelo en los Estados Unidos como resultado de un aumento en las exportaciones de maiz a Mexico., After 15 years, the North American Free Trade Agreement (NAFTA) has been subject to many evaluations from different perspectives, including environmental assessments. According to the Commission for Environmental Cooperation (CEC [...]
- Published
- 2012
- Full Text
- View/download PDF
72. Single cell RNA sequencing of a biopsy specimen v1
- Author
-
Karakasheva, Tatiana, primary, not provided Thadi, Anusha, additional, not provided Li, Ning, additional, not provided Uzun, Yasin, additional, not provided Chen, Chia-Hui, additional, not provided Aleynick, Daniel, additional, not provided Shraim, Rawan, additional, not provided Weinbrom, Sarah, additional, not provided Soto, Gloria, additional, not provided Kelsen, Judith, additional, not provided Lengner, Chris, additional, Tan, Kai, additional, and E Hamilton, Kathryn, additional
- Published
- 2021
- Full Text
- View/download PDF
73. Pricing American interest rate options under the jump-extended Vasicek model
- Author
-
Beliaeva, Natalia A., Nawalkha, Sanjay K., and Soto, Gloria M.
- Subjects
Bonds -- Analysis ,Interest rates -- Analysis ,Pricing -- Analysis ,Product price ,Banking, finance and accounting industries ,Business - Abstract
This article shows how to price American interest rate options under the exponential jumps-extended Vasicek model, or the Vasicek-EJ model. We modify the Gaussian jump-diffusion tree of Amin [1993] and [...]
- Published
- 2008
74. Expression of kallikrein, bradykinin B2 receptor, and endothelial nitric oxide synthase in placenta in normal gestation, preeclampsia, and placenta accreta
- Author
-
Corthorn, Jenny, Germain, Alfredo A., Chacón, Cecilia, Rey, Sergio, Soto, Gloria X., Figueroa, Carlos D., Müller-Esterl, Werner, Duarte, Ignacio, and Valdés, Gloria
- Published
- 2006
- Full Text
- View/download PDF
75. At the end of the journey Lyle Lewis Lloyd (August 10 1934-February 12 2020)
- Author
-
Alant, Erna, Basil, Carmen, Jennische, Margareta, Loncke, Filip, McNaughton, Shirley, Murray, Janice, Renner, Gregor, Smith, Martine, Soto, Gloria, van Balkom, Hans, von Tetzchner, Stephen, Alant, Erna, Basil, Carmen, Jennische, Margareta, Loncke, Filip, McNaughton, Shirley, Murray, Janice, Renner, Gregor, Smith, Martine, Soto, Gloria, van Balkom, Hans, and von Tetzchner, Stephen
- Published
- 2020
- Full Text
- View/download PDF
76. Detección de Malware mediante Aprendizaje Profundo
- Author
-
Zufiaurre Soto, Gloria, Del Ser Lorente, Javier, E.T.S. INGENIERIA -BILBAO, BILBOKO INGENIARITZA G.E.T., Grado en Ingeniería Técnica de Telecomunicación, and Telekomunikazioaren Ingeniaritza Teknikoko Gradua
- Subjects
learning ,training ,sailkatzailea ,accuracy ,entrenamiento ,recall ,deep learning ,aprendizaje ,doitasuna ,zehaztasuna ,sensibilidad ,exactitud ,ikasketa ,machine learning ,sentikortasuna ,clasificador ,entrenamendua ,precision ,precisión ,classifier - Abstract
[ES] Resumen Las aplicaciones móviles son una fuente de vulnerabilidad para los hackers. Cada vez son más los ataques realizados a través de ellas. Por ello, es muy importante identificar qué aplicaciones son empleadas para realizar ataques. Esta identificación hace que el usuario evite la instalación de dichas aplicaciones en su dispositivo. Para poder clasificar una aplicación en malware o benignware, se crearán varios sistemas clasificadores mediante diferentes técnicas de Machine Learning. Para la creación de los sistemas, se emplearán técnicas tradicionales de aprendizaje basadas en algoritmos clasificadores y Deep Learning. De todos los sistemas creados con las técnicas tradicionales se elegirán tres de ellos: el que tenga mayor exactitud, el que presente la precisión más elevada y, por último, aquel que más sensibilidad tenga. Finalmente, para cada una de las tres métricas, se decidirá si elegir el sistema entrenado mediante aprendizaje profundo o el entrenado con el aprendizaje tradicional seleccionado anteriormente. Así, se podrá hacer uso de tres herramientas con distintos enfoques capaces de detectar aplicaciones malignas. [EU] Laburpena Aplikazio mugikorrak ahultasun jatorri bat dira hackerrentzat. Haien zehar egiten diren erasoak gero eta gehiago dira. Horregatik, oso garrantzitsua da erasoak egiteko erabiltzen diren aplikazioak ezagutzea. Hori jakitearekin, erabiltzaileak aplikazio horiek bere mugikorr gailuan ez instalatzea lortzen da. Aplikazio mugikor bat malware edo benignware sailkatu ahal izateko, hiru sistema sailkatzaile sortuko dira Machine Learning-eko teknika ezberdinak erabiliz. Sistemak sortzeko algoritmo sailkatzaileetan oinarritutako ohiko teknikak eta Deep Learning erabiliko dira. Ohiko teknikekin sortutako sistema guztietatik, hiru aukeratuko dira: doitasun garaiena duen sistema, sistema zehatzena eta sentikortasun handiena daukana. Azkenik, hiru metrika bakoitzerako, erabakiko da zein sistema aukeratu, sakon entrenamenduarekin sortutako sistema edo lehen aukeratu den ohikoz entrenatutakoa. Honela, aplikazio kaltegarriak sailkatzeko gai diren hiru tresna erabili ahal izango dira hiru ikuspegi ezberdinekin. [EN] Abstract Mobile applications are a source of vulnerability for hackers. Number of attacks performed through them are increasing. That is why It is really important to identify the applications which are mainly used to perform cyber-attacks. This app identification made the user avoid installing those apps on your mobile device. In order to be able to sort an app on malware or benignware, a classifier system will be set up using Machine Learning different methods. Shallow learning Techniques based on classifier algorithms and Deep Learning methods are going to be used so as to create the systems. Three of all of the systems created using shallow learning technics will be chosen: the one which holds the highest accuracy, other which holds the best precision and finally, that which holds the highest recall. In the end, depending on each metric, it will be decided whether to choose between the system trained by Deep Learning and the previously chosen one trained by Shallow Learning. Thereby, three tools capable of detecting malicious apps with different approaches will be available to users.
- Published
- 2019
77. Classic Chest Radiology Findings, Pearls and Pitfalls
- Author
-
Soto, Gloria, primary and Moënne, Karla, additional
- Published
- 2013
- Full Text
- View/download PDF
78. An early Spanish vocabulary for children who use AAC: developmental and linguistic considerations
- Author
-
Soto, Gloria, primary and Cooper, Brittney, additional
- Published
- 2021
- Full Text
- View/download PDF
79. Acute Nephronia and Renal Abscesses in Children from Quito, Ecuador
- Author
-
Arnao, Adriana, primary, Guerrero, Maria Augusta, additional, Arias, Nathaly, additional, Villacís, Piedad, additional, Rivas, Katia, additional, Flores, Mariana, additional, Rivera, Jhoana, additional, Saltos, Jack, additional, Soto, Gloria, additional, García, Jorge, additional, Aymacaña, Edison, additional, Bonilla, Diego, additional, Merizalde, Marcelo, additional, and Garzón, Cristina, additional
- Published
- 2021
- Full Text
- View/download PDF
80. Collaborative teaming to support preschoolers with severe disabilities who are placed in general education early childhood programs
- Author
-
Hunt, Pam, Soto, Gloria, Maier, Julie, Liboiron, Nicole, and Bae, Soung
- Subjects
Disabled children -- Education ,Special education ,Early childhood education - Published
- 2004
81. Collaborative teaming to support students at risk and students with severe disabilities in general education classrooms
- Author
-
Hunt, Pam, Soto, Gloria, Maier, Julie, and Doering, Kathy
- Subjects
Gifted children -- Physiological aspects ,Disabled children ,Physically disabled children ,Crippled children - Abstract
This study investigated the effectiveness of a general education/special education collaborative teaming process on the academic and social participation of six students in general education classrooms. Three of the students experienced severe disabilities. The other three were considered academically at risk. Each student was supported by an educational team that included general and special education personnel and the students' parents. Each team developed and collaboratively implemented individualized Unified Plans of Support for one student at risk and a classmate with disabilities, consisting of academic adaptations and communication and social supports. The effectiveness of the support plans was evaluated through behavioral observations and team interviews. Intervention outcomes suggested that for each of the six students consistent implementation of the plans of support by team members was associated with increases in academic skills, engagement in classroom activities, interactions with peers, and student-initiated interactions., A growing body of research documents that students with significant disabilities can be educated in their neighborhood school along with their typical peers. Inclusive education is postulated upon the following [...]
- Published
- 2003
82. Water Follies: Groundwater Pumping and the Fate of America's Fresh Waters.
- Author
-
Soto, Gloria Maria
- Subjects
Water Follies: Groundwater Pumping and the Fate of America's Fresh Waters (Book) -- Book reviews ,Books -- Book reviews - Published
- 2003
83. Analysis of narratives produced by four children who use augmentative and alternative communication
- Author
-
Soto, Gloria and Hartmann, Elizabeth
- Published
- 2006
- Full Text
- View/download PDF
84. Multilingualism and augmentative and alternative communication: examining language ideology and resulting practices
- Author
-
Tönsing, Kerstin Monika, primary and Soto, Gloria, additional
- Published
- 2020
- Full Text
- View/download PDF
85. At the end of the journey Lyle Lewis Lloyd (August 10 1934–February 12 2020)
- Author
-
Alant, Erna, primary, Basil, Carmen, additional, Jennische, Margareta, additional, Loncke, Filip, additional, McNaughton, Shirley, additional, Murray, Janice, additional, Renner, Gregor, additional, Smith, Martine, additional, Soto, Gloria, additional, van Balkom, Hans, additional, and von Tetzchner, Stephen, additional
- Published
- 2020
- Full Text
- View/download PDF
86. Training Needs in Augmentative and Alternative Communication: A Virtual Roundtable Discussion.
- Author
-
Goldman, Amy, Jackson, Douglene, Kannan, Kanakavalli, Kanter, Catherine, Klein, Chris, Marshall, Sarah, McNaughton, David, Paul, Diane, Rackensperger, Tracy, Soto, Gloria, and Zangari, Carole
- Subjects
MEANS of communication for people with disabilities ,VIRTUAL communities ,VIRTUAL communications ,CLINICS ,TRAINING needs ,OCCUPATIONAL therapy education ,PSYCHOLOGISTS - Published
- 2021
87. The Effect of Shared Book Reading on the Acquisition of Expressive Vocabulary of a 7 Year Old Who Uses AAC
- Author
-
Soto, Gloria and Dukhovny, Elena
- Published
- 2008
88. Duration models and IRR management: A question of dimensions?
- Author
-
Soto, Gloria M
- Published
- 2004
- Full Text
- View/download PDF
89. Detección de Malware mediante Aprendizaje Profundo
- Author
-
Del Ser Lorente, Javier, E.T.S. INGENIERIA -BILBAO, BILBOKO INGENIARITZA G.E.T., Grado en Ingeniería Técnica de Telecomunicación, Telekomunikazioaren Ingeniaritza Teknikoko Gradua, Zufiaurre Soto, Gloria, Del Ser Lorente, Javier, E.T.S. INGENIERIA -BILBAO, BILBOKO INGENIARITZA G.E.T., Grado en Ingeniería Técnica de Telecomunicación, Telekomunikazioaren Ingeniaritza Teknikoko Gradua, and Zufiaurre Soto, Gloria
- Abstract
[ES] Resumen Las aplicaciones móviles son una fuente de vulnerabilidad para los hackers. Cada vez son más los ataques realizados a través de ellas. Por ello, es muy importante identificar qué aplicaciones son empleadas para realizar ataques. Esta identificación hace que el usuario evite la instalación de dichas aplicaciones en su dispositivo. Para poder clasificar una aplicación en malware o benignware, se crearán varios sistemas clasificadores mediante diferentes técnicas de Machine Learning. Para la creación de los sistemas, se emplearán técnicas tradicionales de aprendizaje basadas en algoritmos clasificadores y Deep Learning. De todos los sistemas creados con las técnicas tradicionales se elegirán tres de ellos: el que tenga mayor exactitud, el que presente la precisión más elevada y, por último, aquel que más sensibilidad tenga. Finalmente, para cada una de las tres métricas, se decidirá si elegir el sistema entrenado mediante aprendizaje profundo o el entrenado con el aprendizaje tradicional seleccionado anteriormente. Así, se podrá hacer uso de tres herramientas con distintos enfoques capaces de detectar aplicaciones malignas., [EU] Laburpena Aplikazio mugikorrak ahultasun jatorri bat dira hackerrentzat. Haien zehar egiten diren erasoak gero eta gehiago dira. Horregatik, oso garrantzitsua da erasoak egiteko erabiltzen diren aplikazioak ezagutzea. Hori jakitearekin, erabiltzaileak aplikazio horiek bere mugikorr gailuan ez instalatzea lortzen da. Aplikazio mugikor bat malware edo benignware sailkatu ahal izateko, hiru sistema sailkatzaile sortuko dira Machine Learning-eko teknika ezberdinak erabiliz. Sistemak sortzeko algoritmo sailkatzaileetan oinarritutako ohiko teknikak eta Deep Learning erabiliko dira. Ohiko teknikekin sortutako sistema guztietatik, hiru aukeratuko dira: doitasun garaiena duen sistema, sistema zehatzena eta sentikortasun handiena daukana. Azkenik, hiru metrika bakoitzerako, erabakiko da zein sistema aukeratu, sakon entrenamenduarekin sortutako sistema edo lehen aukeratu den ohikoz entrenatutakoa. Honela, aplikazio kaltegarriak sailkatzeko gai diren hiru tresna erabili ahal izango dira hiru ikuspegi ezberdinekin., [EN] Abstract Mobile applications are a source of vulnerability for hackers. Number of attacks performed through them are increasing. That is why It is really important to identify the applications which are mainly used to perform cyber-attacks. This app identification made the user avoid installing those apps on your mobile device. In order to be able to sort an app on malware or benignware, a classifier system will be set up using Machine Learning different methods. Shallow learning Techniques based on classifier algorithms and Deep Learning methods are going to be used so as to create the systems. Three of all of the systems created using shallow learning technics will be chosen: the one which holds the highest accuracy, other which holds the best precision and finally, that which holds the highest recall. In the end, depending on each metric, it will be decided whether to choose between the system trained by Deep Learning and the previously chosen one trained by Shallow Learning. Thereby, three tools capable of detecting malicious apps with different approaches will be available to users.
- Published
- 2019
90. Las mujeres: calumnias y juzgamiento Cuenca 1780-1800
- Author
-
León Galarza, Natalia Catalina, Guiracocha Rionaula, Lorena Alexandra, Robles Soto, Gloria Estefania, León Galarza, Natalia Catalina, Guiracocha Rionaula, Lorena Alexandra, and Robles Soto, Gloria Estefania
- Abstract
This investigation addresses the trial process of women belonging to different social spheres for the crime of slander in the colonial Cuenca of 1780-1900. In the judicial process through the analysis of five trials it was possible to demonstrate elements of symbolic value such as honor, blood status, social and economic positioning, which were of relevance for the judgment and authority’s dictum. At the same time, strategies of social whitening, attributions of roles, mechanisms or order and social control were also perceived.
- Published
- 2019
91. Restorative Justice Education from Intrajudicial Criminal Mediation Associated Factors.
- Author
-
Castillo, Mercedes Matás, Méndez, Inmaculada, Esteban, Cecilia Ruiz, and Soto, Gloria
- Subjects
RESTORATIVE justice ,VIOLENCE ,VICTIMS of violent crimes ,SOCIAL change ,ADMINISTRATIVE procedure - Abstract
The restorative justice (RJ) paradigm requires coherence among legal, justice, and educational systems to promote a culture of restorative dialogue with victims of violence and to reintegrate aggressors into the community. The objective of this study, from an evolutionary social perspective, was to examine criminal mediation files in the archives of the Murcia Intrajudicial Criminal Mediation Service (UMIM), Spain, to see which variables are associated with which types of violence and understand the contents and adoption of agreements. In this study the sociodemographic, procedural, and interpersonal variables of 216 people who used criminal mediation were analysed. The results showed statistically significant differences concerning age, the procedural moment of referral, and the participants' relationship. The main conclusions are that the youngest group had a more significant number of encounters with physical violence; most agreements occurred in the initial phase of a judicial procedure; and the majority of agreements had moral content regardless of the age of the parties involved. These factors are of interest to the establishment of judicial and educational restorative models. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
92. Immunization derived from polynomial duration vector in the Spanish bond market
- Author
-
Soto, Gloria M.
- Subjects
Credit market -- Models ,Public finance -- Models ,Banking, finance and accounting industries ,Business - Abstract
The credit market in Spain is discussed in reference to the polynomial duration vector and immunization.
- Published
- 2001
93. Recast type, repair, and acquisition in AAC mediated interaction
- Author
-
SOTO, Gloria, primary, CLARKE, Michael T., additional, NELSON, Keith, additional, STAROWICZ, Renee, additional, and SAVALDI-HARUSSI, Gat, additional
- Published
- 2019
- Full Text
- View/download PDF
94. The emergence of clause construction in children who use speech generating devices
- Author
-
Savaldi-Harussi, Gat, primary, Lustigman, Lyle, additional, and Soto, Gloria, additional
- Published
- 2019
- Full Text
- View/download PDF
95. Sucesión de la empresas familiares
- Author
-
Granados Uribe, Lina María, Ramírez Soto, Gloria Inés, Gil Giraldo, Alejandra, Granados Uribe, Lina María, Ramírez Soto, Gloria Inés, and Gil Giraldo, Alejandra
- Abstract
Colombia es un país en el cual su economía se basa principalmente en un modelo de empresa familiar sin embargo solo alrededor del 30% logra pasar a una segunda generación familiar lo cual demuestra una fragilidad en la continuidad del negocio, la permanencia y sostenibilidad del mismo en el tiempo. Con este artículo se quieren tomar los principales valores de las empresas familiares entender la dinámica de su funcionamiento, productividad y los principales factores de éxito que pueden mitigar las amenazas que traen los cambios del relevo generacional., In Colombia the economy is based on the family bussines, however only the 30% of them have a second generation of managment, it demostrate that the continue of the bussnies is very whick. With this article we want to take the principal values of family bussiness, productivity and describe the dynamic of their managment and principal facts of success.
- Published
- 2018
96. Immunization derived from a polynomial duration vector in the Spanish bond market
- Author
-
Soto, Gloria M
- Published
- 2001
- Full Text
- View/download PDF
97. Pensamiento divergente y sus dimensiones: ¿De qué hablamos y qué evaluamos?
- Author
-
Ferrandiz, Carmen, Ferrando, Mercedes, Soto, Gloria, Sainz, Marta, and Prieto, María Dolores
- Subjects
Evaluación de la creatividad ,test of creativity ,Tests de creatividad ,Creatividad ,creativity ,divergent thinking ,159.9 ,assessment of creativity ,Pensamiento divergente - Abstract
Este artículo analiza el papel de los procesos cognitivos subya- centes en el pensamiento divergente y los contenidos sobre los que se apli- can dichos procesos (verbal y figurativo). La muestra utilizada es de 260 alumnos con edades comprendidas entre los 8 y los 15 años. Para la eva- luación del pensamiento divergente, se utilizó el Test Figurativo de Pensa- miento Creativo de Torrance (TTCT), y la Prueba de Imaginación Creativa (PIC) de contenido verbal. Los resultados obtenidos sugieren que, aunque ambas pruebas evalúen el pensamiento divergente y tengan el referencial psicométrico de Guilford, sus puntuaciones no están significativamente co- rrelacionadas. Los resultados de los análisis factoriales confirmatorios muestran que el modelo que mejor explica las puntuaciones en estas prue- bas refleja la existencia de dos factores autónomos que se corresponden con cada una de las pruebas, por tanto, identificándose más con los conte- nidos, dominios y demandas de la tarea que con los procesos cognitivos que tradicionalmente se consideran en la definición y medida de la creati- vidad. This paper examines the role of latent cognitive process and the contents of task (verbal and figural) in divergent thinking. The sample was composed of 260 students, attending different public and semi-public schools in the Murcia Region (Spain), with ages ranging from 8 to 15 years old. Creativity was assessed with the Torrance Test of Creativity Thinking (TTCT) and the Test of Creative Imagination (PIC). Results suggest that, even though both tests are based on the psychometric approach and Guil- ford ́s theory of creativity, their scores are not significantly correlated. Re- sults from confirmatory factor analysis suggest two independent factors (one for each test), more related to tasks‟ demands and contents than with the cognitive processes traditionally considered in the definition and measurement of creativity
- Published
- 2017
98. Recast type, repair, and acquisition in AAC mediated interaction.
- Author
-
SOTO, Gloria, CLARKE, Michael T., NELSON, Keith, STAROWICZ, Renee, and SAVALDI-HARUSSI, Gat
- Abstract
The present study investigated the effects of different types of recasts and prompts on the rate of repair and spontaneous use of novel vocabulary by eight children with severe motor speech disabilities who used speech-generating technologies to communicate. Data came from 60 transcripts of clinical sessions that were part of a conversation-based intervention designed to teach them pronouns, verbs, and verb inflections. The results showed that, when presented alone, interrogative choice and declarative recasts led to the highest rates of child repair. The results also showed that when children were presented with recasts and prompts to repair, the rate of repair increased. Spontaneous use of linguistic targets was significantly and positively related to conversational sequences where the adult recast was followed by child repair. These findings suggest that using different recast types and prompts to repair may be beneficial for spontaneous use of linguistic targets in this population. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
99. Early verbal categories and inflections in children who use speech-generating devices
- Author
-
Savaldi-Harussi, Gat, primary and Soto, Gloria, additional
- Published
- 2018
- Full Text
- View/download PDF
100. Conversation-based intervention for adolescents using augmentative and alternative communication
- Author
-
Soto, Gloria, primary and Clarke, Michael T., additional
- Published
- 2018
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.