Musc. pierna ARACELI LOPEZ GARCIAEl documento lista varios músculos de la pantorrilla y el pie, incluyendo el músculo poplíteo, el flexor largo del dedo gordo, el flexor largo de los dedos, el tibial posterior, los gastrocnemios y el plantar delgado. Proporciona vistas anterior y posterior de estos músculos.
GALERIA DE IMAGENES UNEFAMary LegguizzaEste documento propone realizar jornadas ambientalistas en la Universidad Pedagógica Experimental Libertador para promover el uso de materiales de provecho, como una forma de reducir los desechos y fomentar prácticas sustentables. La propuesta fue elaborada por la estudiante Leguiza Mary para su maestría en Enseñanza de la Biología y cuenta con evidencias fotográficas de las áreas verdes y estudiantes de la universidad.
Myriam-Guato-pe..MyrianchisThis document provides biographical information about Myriam Guato. It lists that she studied in primary school in Patate and went to secondary school in Esmeraldas. She then graduated from high school at Benjamin Araujo and went on to study food engineering at university, where she learned languages and visited food companies in Guayaquil like SUPAN and Cerveceria Nacional.
Myriam-Guato-peMyrianchisMyriam Guato attended Benjamin Araujo school in Patate city where she met friends and learned from teachers. She later graduated high school there at age 18. Now she is studying food engineering at the Technical University of Ambato, where she is learning to prepare foods and traveled to companies in other cities like Guayaquil.
The fashionManoli Moya BorregoThe document compares and contrasts 1980s fashion with current fashion trends. 1980s fashion was striking, exaggerated, and bright with big hairstyles as women felt more liberated. Work suits had large shoulders. Current fashion is more minimalist with wide skirts and zippers used stylishly. It also discusses the author's preference for current, more discreet fashion over the bold 1980s styles. Fashion allows people to define their style, express themselves, and communicate their interests.
The passive voiceManoli Moya BorregoThe document discusses the passive voice, including its form, examples of its use in different tenses, and how it differs from the active voice. Specifically, the passive voice is used to emphasize the subject of the sentence rather than the actor. It is formed by using a form of the verb "to be" along with the past participle of the main verb. The active voice stresses who performs the action, while the passive voice focuses on what is acted upon. Five examples are given to demonstrate transforming sentences from the active to the passive voice.
Planning guidelines-for-teachers 091712GladisRomeroVThis document provides guidance for English teachers on designing annual teaching plans, unit plans, and lesson plans aligned with the new English National Curriculum Guidelines in Ecuador. It discusses key considerations for each type of plan, including using curriculum documents to determine objectives and content, selecting methodologies and resources, and incorporating assessment. Sample templates are also provided for the main components of an annual plan, unit plan, and lesson plan, such as objectives, methodologies, resources, and assessment. The document aims to help teachers design plans that meet national standards and address student needs and interests.
Corse discours de Bernard Cazeneuve 30 decembre 2015Marianne BlimanBernard Cazeneuve, le ministre de l'Intérieur, était en déplacement en Corse mercredi 30 décembre, à la suite des violences racistes à Ajaccio du week-end précédent.
Applying soft computing techniques to corporate mobile security systemsPaloma De Las CuevasCorporate workers increasingly use their own devices for work purposes, in a trend that has come to be called the "Bring Your Own Device" (BYOD) philosophy and companies are starting to include it in their policies. For this reason, corporate security systems need to be redefined and adapted, by the corporate Information Technology (IT) department, to these emerging behaviours. This work proposes applying soft-computing techniques, in order to help the Chief Security Officer (CSO) of a company (in charge of the IT department) to improve the
security policies.
The actions performed be company workers under a BYOD situation will be treated as events: an action or set of actions yielding to a response. Some of those events might cause a non compliance with some corporate policies, and then it would be necessary to define a set of security rules (action, consequence). Furthermore, the processing of the extracted knowledge will allow the rules to be adapted.
Muses open access week hackathonPaloma De Las CuevasThis document discusses Paloma, a telecommunications engineer and PhD student working on the MUSES project. MUSES consists of software for automatically adapting security rules using context monitoring. It includes Android and Windows clients and a server with a GUI called the Security and Risk Management tool. The project is open source and aims to advance the state of the art in security rule adaptation. Paloma provides links to the MUSES GitHub page and examples of tasks like translating security rules and adding testing and data analysis functionality.
The History of PragmaticsAziz BiruThe document outlines the 3 stages in the development of pragmatics. The first stage occurred in the 1930s when the term was first used as a branch of semiotics. The second stage from 1950-1960 saw the establishment of speech act theory and implicature theory. The third stage began in 1977 with the first journal of pragmatics and 1983 books that established pragmatics as an independent discipline, showing it had developed through 3 distinct periods over nearly 50 years.
CV (2) (1)Sangeetha ArunSangeetha Arun is a performance-driven professional with over 4 years of experience in banking and finance. She has experience in compliance operations, retirement plans, ALCO support, and KYC processing. She holds a Bachelor's degree in Commerce, a Master's in Financial Management, and is ICWAI inter-completed. She is seeking new challenges in banking operations and provides her contact information.
Planning guidelines-for-teachers 091712GladisRomeroVThis document provides guidance for English teachers on designing annual teaching plans, unit plans, and lesson plans aligned with the new English National Curriculum Guidelines in Ecuador. It discusses key considerations for each type of plan, including using curriculum documents to determine objectives and content, selecting methodologies and resources, and incorporating assessment. Sample templates are also provided for the main components of an annual plan, unit plan, and lesson plan, such as objectives, methodologies, resources, and assessment. The document aims to help teachers design plans that meet national standards and address student needs and interests.
Corse discours de Bernard Cazeneuve 30 decembre 2015Marianne BlimanBernard Cazeneuve, le ministre de l'Intérieur, était en déplacement en Corse mercredi 30 décembre, à la suite des violences racistes à Ajaccio du week-end précédent.
Applying soft computing techniques to corporate mobile security systemsPaloma De Las CuevasCorporate workers increasingly use their own devices for work purposes, in a trend that has come to be called the "Bring Your Own Device" (BYOD) philosophy and companies are starting to include it in their policies. For this reason, corporate security systems need to be redefined and adapted, by the corporate Information Technology (IT) department, to these emerging behaviours. This work proposes applying soft-computing techniques, in order to help the Chief Security Officer (CSO) of a company (in charge of the IT department) to improve the
security policies.
The actions performed be company workers under a BYOD situation will be treated as events: an action or set of actions yielding to a response. Some of those events might cause a non compliance with some corporate policies, and then it would be necessary to define a set of security rules (action, consequence). Furthermore, the processing of the extracted knowledge will allow the rules to be adapted.
Muses open access week hackathonPaloma De Las CuevasThis document discusses Paloma, a telecommunications engineer and PhD student working on the MUSES project. MUSES consists of software for automatically adapting security rules using context monitoring. It includes Android and Windows clients and a server with a GUI called the Security and Risk Management tool. The project is open source and aims to advance the state of the art in security rule adaptation. Paloma provides links to the MUSES GitHub page and examples of tasks like translating security rules and adding testing and data analysis functionality.
The History of PragmaticsAziz BiruThe document outlines the 3 stages in the development of pragmatics. The first stage occurred in the 1930s when the term was first used as a branch of semiotics. The second stage from 1950-1960 saw the establishment of speech act theory and implicature theory. The third stage began in 1977 with the first journal of pragmatics and 1983 books that established pragmatics as an independent discipline, showing it had developed through 3 distinct periods over nearly 50 years.
CV (2) (1)Sangeetha ArunSangeetha Arun is a performance-driven professional with over 4 years of experience in banking and finance. She has experience in compliance operations, retirement plans, ALCO support, and KYC processing. She holds a Bachelor's degree in Commerce, a Master's in Financial Management, and is ICWAI inter-completed. She is seeking new challenges in banking operations and provides her contact information.