The focus of the present study is the extent to which an internship or study abroad contributes to students’ development of international competencies, such as interpersonal and intercultural competencies, foreign language skills, and international academic and professional competencies.
In Nederlandse scholen zijn jaarlijks vele tienduizenden praktijkbegeleiders (mentoren) van leraren in opleiding actief. De meeste mentoren doen dit begeleidingswerk naast hun hoofdtaak als leraar van leerlingen. Een ervaren leraar is niet per definitie ook een goede mentor. Om mentoren te ondersteunen in hun belangrijke werk verzorgen veel scholen, vaak in samenwerking met lerarenopleidingen, trainingen in begeleidingsvaardigheden. Voor Frank Crasborn en Paul Hennissen vormde hun ervaring als lerarenopleider en trainer van honderden mentoren de inspiratiebron voor het opzetten van onderzoek. Dit leidde tot een onderzoeksproject van acht deelstudies, waarin zowel naar gedragsaspecten als naar gerelateerde cognitieve aspecten van begeleidingsgedrag van mentoren werd gekeken. De resultaten van het onderzoek leidden tot een bijdrage aan de ordening van begrippen en concepten die gebruikt worden om begeleidingsgedrag van begeleiders in gesprekken met leraren in opleiding in kaart te brengen en te analyseren; een gedetailleerd beeld van begeleidingsgedrag in authentieke begeleidingsgesprekken en de manier waarop leraren in opleiding dit gedrag percipiëren; het blootleggen van cognities van mentoren, gekoppeld aan begeleidingsgedrag in gesprekken met leraren in opleiding; meer inzicht in de reikwijdte van training op de ontwikkeling van het doen en denken van begeleiders in begeleidingsgesprekken; een instrument voor reflectie op begeleidingsgedrag van mentoren; aanwijzingen voor verbetering van trainingen voor mentoren.
MULTIFILE
ion of verb agreement by hearing learners of a sign language. During a 2-year period, 14 novel learners of Sign Language of the Netherlands (NGT) with a spoken language background performed an elicitation task 15 times. Seven deaf native signers and NGT teachers performed the same task to serve as a benchmark group. The results obtained show that for some learners, the verb agreement system of NGT was difficult to master, despite numerous examples in the input. As compared to the benchmark group, learners tended to omit agreement markers on verbs that could be modified, did not always correctly use established locations associated with discourse referents, and made characteristic errors with respect to properties that are important in the expression of agreement (movement and orientation). The outcomes of the study are of value to practitioners in the field, as they are informative with regard to the nature of the learning process during the first stages of learning a sign language.
The integration of renewable energy resources, controllable devices and energy storage into electricity distribution grids requires Decentralized Energy Management to ensure a stable distribution process. This demands the full integration of information and communication technology into the control of distribution grids. Supervisory Control and Data Acquisition (SCADA) is used to communicate measurements and commands between individual components and the control server. In the future this control is especially needed at medium voltage and probably also at the low voltage. This leads to an increased connectivity and thereby makes the system more vulnerable to cyber-attacks. According to the research agenda NCSRA III, the energy domain is becoming a prime target for cyber-attacks, e.g., abusing control protocol vulnerabilities. Detection of such attacks in SCADA networks is challenging when only relying on existing network Intrusion Detection Systems (IDSs). Although these systems were designed specifically for SCADA, they do not necessarily detect malicious control commands sent in legitimate format. However, analyzing each command in the context of the physical system has the potential to reveal certain inconsistencies. We propose to use dedicated intrusion detection mechanisms, which are fundamentally different from existing techniques used in the Internet. Up to now distribution grids are monitored and controlled centrally, whereby measurements are taken at field stations and send to the control room, which then issues commands back to actuators. In future smart grids, communication with and remote control of field stations is required. Attackers, who gain access to the corresponding communication links to substations can intercept and even exchange commands, which would not be detected by central security mechanisms. We argue that centralized SCADA systems should be enhanced by a distributed intrusion-detection approach to meet the new security challenges. Recently, as a first step a process-aware monitoring approach has been proposed as an additional layer that can be applied directly at Remote Terminal Units (RTUs). However, this allows purely local consistency checks. Instead, we propose a distributed and integrated approach for process-aware monitoring, which includes knowledge about the grid topology and measurements from neighboring RTUs to detect malicious incoming commands. The proposed approach requires a near real-time model of the relevant physical process, direct and secure communication between adjacent RTUs, and synchronized sensor measurements in trustable real-time, labeled with accurate global time-stamps. We investigate, to which extend the grid topology can be integrated into the IDS, while maintaining near real-time performance. Based on topology information and efficient solving of power flow equation we aim to detect e.g. non-consistent voltage drops or the occurrence of over/under-voltage and -current. By this, centrally requested switching commands and transformer tap change commands can be checked on consistency and safety based on the current state of the physical system. The developed concepts are not only relevant to increase the security of the distribution grids but are also crucial to deal with future developments like e.g. the safe integration of microgrids in the distribution networks or the operation of decentralized heat or biogas networks.
The value of data in general has become eminent in recent times. Autonomous vehicles and Connected Intelligent Transport Systems (C-ITS), in particular, are rapidly emerging fields that rely a lot on “big data”. Data acquisition has been an important part of automotive research and development for years even before the advent of Internet of Things (IoT). Most datalogging is done using specialized hardware that stores data in proprietary formats on traditional hard drives in PCs or dedicated managed servers. The use of Artificial Intelligence (AI) throughout the world and specifically in the automotive sector is largely reliant on the data for the development of new and reliable technologies. With the advent of IoT technologies, the reliability of data capture could be enhanced and can improve ease of real-time analytics for analysis/development of C-ITS services and Autonomous systems using vehicle data. Data acquisition for C-ITS applications requires putting together several different domains ranging from hardware, software, communication systems, cloud storage/processing, data analytics, legal and privacy aspects. This requires expertise from different domains that small and medium scale businesses usually lack. This project aims at investigating requirements that have to be met in order to collect data from vehicles. Furthermore, this project also aims at laying foundations required for the development of a unified guidelines required to collect data from vehicles. With these guidelines, businesses that intend to use vehicle data for their applications are not only guided on the technical aspects of data collection but also equally understand how data from vehicles could be harvested in a secure, efficient and responsible manner.