283 resultados para Politics, Practical


Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Starting with the incident now known as the Cow’s Head Protest, this article traces and unpacks the events, techniques, and conditions surrounding the representation of ethno-religious minorities in Malaysia. The author suggests that the Malaysian Indians’ struggle to correct the dominant reading of their community as an impoverished and humbled underclass is a disruption of the dominant cultural order in Malaysia. It is also among the key events to have has set in motion a set of dynamics—the visual turn—introduced by new media into the politics of ethno-communal representation in Malaysia. Believing that this situation requires urgent examination the author attempts to outline the problematics of the task.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Rule extraction from neural network algorithms have been investigated for two decades and there have been significant applications. Despite this level of success, rule extraction from neural network methods are generally not part of data mining tools, and a significant commercial breakthrough may still be some time away. This paper briefly reviews the state-of-the-art and points to some of the obstacles, namely a lack of evaluation techniques in experiments and larger benchmark data sets. A significant new development is the view that rule extraction from neural networks is an interactive process which actively involves the user. This leads to the application of assessment and evaluation techniques from information retrieval which may lead to a range of new methods.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Female genital mutilation (FGM) is a cultural practice common in many Islamic societies. It involves the deliberate, non-therapeutic physical modification of young girls’ genitalia. FGM can take several forms, ranging from less damaging incisions to actual removal of genitalia and narrowing or even closing of the vagina. While often thought to be required by religion, FGM both predates and has no basis in the Koran. Rather, it is a cultural tradition, motivated by a patriarchal social desire to control female bodies to ensure virginity at marriage (preserving family honour), and to prevent infidelity by limiting sexual desire. In the USA and Australia in 2010, peak medical bodies considered endorsing the medical administration of a ‘lesser’ form of FGM. The basis for this was pragmatic: it would be preferable to satisfy patients’ desire for FGM in medically-controlled conditions, rather than have these patients seek it, possibly in more severe forms, under less safe conditions. While arguments favouring medically-administered FGM were soon overcome, the prospect of endorsing FGM illuminated the issue in these two Western countries and beyond. This paper will review the nature of FGM, its physical and psychological health consequences, and Australian laws prohibiting FGM. Then, it will scan recent developments in Africa, where FGM has been made illegal by a growing number of nations and by the Protocol to the African Charter on Human and Peoples’ Rights 2003 (the Maputo Protocol), but is still proving difficult to eradicate. Finally, based on arguments derived from theories of rights, health evidence, and the historical and religious contexts, this paper will ask whether an absolute human right against FGM can be developed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The widespread development of Decision Support System (DSS) in construction indicate that the evaluation of software become more important than before. However, it is identified that most research in construction discipline did not attempt to assess its usability. Therefore, little is known about the approach on how to properly evaluate a DSS for specific problem. In this paper, we present a practical framework that can be guidance for DSS evaluation. It focuses on how to evaluate software that is dedicatedly designed for consultant selection problem. The framework features two main components i.e. Sub-system Validation and Face Validation. Two case studies of consultant selection at Malaysian Department of Irrigation and Drainage were integrated in this framework. Some inter-disciplinary area such as Software Engineering, Human Computer Interaction (HCI) and Construction Project Management underpinned the discussion of the paper. It is anticipated that this work can foster better DSS development and quality decision making that accurately meet the client’s expectation and needs

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper focuses on the satirical Australian television show The Chaser’s War on Everything, and uses it to critically explore the potential ramifications of what McNair (2006) has called ‘cultural chaos’. Through an analysis of several examples from this particular program, alongside interviews with its production team and qualitative audience research, this paper argues that this TV show’s engagement with political issues in a creative, entertaining way that departs from the conventions of traditional journalism, allows it to present a perhaps more authentic image of political agents than is often cultivated in the mainstream news media. This paper therefore provides clear evidence that the shift from homogeneity to heterogeneity in the news media presents a significant challenge to those who wish to heavily control public opinion. It also provides further support for an optimistic re-appraisal of entertainment which emphasises its central (not merely periphery) role in political discourse.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

David Almond and Dave McKean's The Savage is a hybrid prose and graphic novel which tells the story of one young man’s maturation through literacy. The protagonist learns to deal with the death of his father and his own 'savage' self by writing a graphic novel. This article reads The Savage in the context of earlier, 'Northern' literacy narrative - particularly Tony Harrison's poem "Them & [uz]" and Barry Hines' Kes — through the discourse of neoliberalism and the notion of the reluctant boy reader. It is suggested that Almond and McKean are influenced by currently dominant ideologies of gender and literacy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The literature supporting the notion that active, student-centered learning is superior to passive, teacher-centered instruction is encyclopedic (Bonwell & Eison, 1991; Bruning, Schraw, & Ronning, 1999; Haile, 1997a, 1997b, 1998; Johnson, Johnson, & Smith, 1999). Previous action research demonstrated that introducing a learning activity in class improved the learning outcomes of students (Mejias, 2010). People acquire knowledge and skills through practice and reflection, not by watching and listening to others telling them how to do something. In this context, this project aims to find more insights about the level of interactivity in the curriculum a class should have and its alignment with assessment so the intended learning outcomes (ILOs) are achieved. In this project, interactivity is implemented in the form of problem- based learning (PBL). I present the argument that a more continuous formative feedback when implemented with the correct amount of PBL stimulates student engagement bringing enormous benefits to student learning. Different levels of practical work (PBL) were implemented together with two different assessment approaches in two subjects. The outcomes were measured using qualitative and quantitative data to evaluate the levels of student engagement and satisfaction in the terms of ILOs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The “political” dynamics and the details of conducting criminological research on a day-to-day basis are examined. The role of government and commercial contracts in contemporary criminological scholarship are explored, as well as the various obstacles that criminologists must negotiate during the completion of a research project. The criminological implications of the ways in which academic environments are changing under new managerialist philosophies are examined. The ways in which notions of “critique” have become subordinate to the politics of existing governing rationalities are also examined. Chapter 1 details the questions, contours, and methods of “deviant knowledge.” Chapter 2 discusses the contours of criminological knowledge, including early criminological developments, international reconstruction and developments in criminological research following World War II, the United Nations, and the rise of critical genres. Chapter 3 explores criminology, government, and public policy, including the policies of the Home Office of England and Wales; the National Institute of Justice in Washington, DC; and the Australian Institute of Criminology in Canberra. The politics and control of criminological knowledge are discussed in chapter 4, along with ethical and legal issues, gathering and accessing data, and publishing results of research. Chapter 5 describes the “War on Terror” and government intolerance and suppression of free speech. Chapter 6 examines the new modes of governance and the commercialization of criminological knowledge. Chapter 7 discusses intellectual independence and collective concern, and the value of critique. 3 appendices, 546 references, index

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article focuses on government acts of intimidation or the "policing of knowledge". It is more concerned with the suppression of academic freedom, the contractual ambiguities of contemporary criminological research and the ways in which independent scholarship is controlled or influenced by funding bodies than with the specifics of the original crime prevention research which forms the basis of the case study.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A practical approach for identifying solution robustness is proposed for situations where parameters are uncertain. The approach is based upon the interpretation of a probability density function (pdf) and the definition of three parameters that describe how significant changes in the performance of a solution are deemed to be. The pdf is constructed by interpreting the results of simulations. A minimum number of simulations are achieved by updating the mean, variance, skewness and kurtosis of the sample using computationally efficient recursive equations. When these criterions have converged then no further simulations are needed. A case study involving several no-intermediate storage flow shop scheduling problems demonstrates the effectiveness of the approach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: The accurate evaluation of physical activity levels amongst youth is critical for quantifying physical activity behaviors and evaluating the effect of physical activity interventions. The purpose of this review is to evaluate contemporary approaches to physical activity evaluation amongst youth. Data sources: The literature from a range of sources was reviewed and synthesized to provide an overview of contemporary approaches for measuring youth physical activity. Results: Five broad categories are described: self-report, instrumental movement detection, biological approaches, direct observation, and combined methods. Emerging technologies and priorities for future research are also identified. Conclusions: There will always be a trade-off between accuracy and available resources when choosing the best approach for measuring physical activity amongst youth. Unfortunately, cost and logistical challenges may prohibit the use of "gold standard" physical activity measurement approaches such as doubly labelled water. Other objective methods such as heart rate monitoring, accelerometry, pedometry, indirect calorimetry, or a combination of measures have the potential to better capture the duration and intensity of physical activity, while self-reported measures are useful for capturing the type and context of activity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Client puzzles are cryptographic problems that are neither easy nor hard to solve. Most puzzles are based on either number theoretic or hash inversions problems. Hash-based puzzles are very efficient but so far have been shown secure only in the random oracle model; number theoretic puzzles, while secure in the standard model, tend to be inefficient. In this paper, we solve the problem of constucting cryptographic puzzles that are secure int he standard model and are very efficient. We present an efficient number theoretic puzzle that satisfies the puzzle security definition of Chen et al. (ASIACRYPT 2009). To prove the security of our puzzle, we introduce a new variant of the interval discrete logarithm assumption which may be of independent interest, and show this new problem to be hard under reasonable assumptions. Our experimental results show that, for 512-bit modulus, the solution verification time of our proposed puzzle can be up to 50x and 89x faster than the Karame-Capkum puzzle and the Rivest et al.'s time-lock puzzle respectively. In particular, the solution verification tiem of our puzzle is only 1.4x slower than that of Chen et al.'s efficient hash based puzzle.