362 resultados para Security Studies - Military


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This is the first volume to capture the essence of the burgeoning field of cultural studies in a concise and accessible manner. Other books have explored the British and North American traditions, but this is the first guide to the ideas, purposes and controversies that have shaped the subject. The author sheds new light on neglected pioneers and a clear route map through the terrain. He provides lively critical narratives on a dazzling array of key figures including, Arnold, Barrell, Bennett, Carey, Fiske, Foucault, Grossberg, Hall, Hawkes, hooks, Hoggart, Leadbeater, Lissistzky, Malevich, Marx, McLuhan, McRobbie, D Miller, T Miller, Morris, Quiller-Couch, Ross, Shaw, Urry, Williams, Wilson, Wolfe and Woolf. Hartley also examines a host of central themes in the subject including literary and political writing, publishing, civic humanism, political economy and Marxism, sociology, feminism, anthropology and the pedagogy of cultural studies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

When cultural life is re-defined as a perpetual round of entertainments, when serious public conversation becomes a form of baby talk, when, in short, a people become an audience and their public business a vaudeville act, then a nation finds itself at risk. (Postman) The dire tones of Postman quoted in Janet Cramers Media, History, Society: A Cultural History of US Media introduce one view that she canvasses, in the debate of the moment, as to where popular culture is heading in the digital age. This is canvassed, less systematically, in Thinking Popular Culture: War Terrorism and Writing by Tara Brabazon, who for example refers to concerns about a crisis of critical language that is bothering professionalsjournalists and academics or elsewhereand deplores the advent of the Internet, as a flattening of expertise in digital environments.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There is clearly contention over the shape and formation of science curriculum and over, ultimately, what will count as scientific knowledge, skill, capacity and world view. The Cold War set the policy context for an ongoing focus on science education across Western nations. Sputnik-era US and UK educational policy offered a broad premise for the purpose of school science: in a risky geopolitical environment, high levels of advanced scientific expertise were central to the national interest and necessary for the maintenance of military/industrial and technological power. Half a century on, in the context of global economic and environmental crisis, as a justification for digital, industrial and biomedical innovation, the rationale for the production of scientific capital is central to curriculum settlements and educational policy in Europe, Asia and the Americas.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Peer to peer systems have been widely used in the internet. However, most of the peer to peer information systems are still missing some of the important features, for example cross-language IR (Information Retrieval) and collection selection / fusion features. Cross-language IR is the state-of-art research area in IR research community. It has not been used in any real world IR systems yet. Cross-language IR has the ability to issue a query in one language and receive documents in other languages. In typical peer to peer environment, users are from multiple countries. Their collections are definitely in multiple languages. Cross-language IR can help users to find documents more easily. E.g. many Chinese researchers will search research papers in both Chinese and English. With Cross-language IR, they can do one query in Chinese and get documents in two languages. The Out Of Vocabulary (OOV) problem is one of the key research areas in crosslanguage information retrieval. In recent years, web mining was shown to be one of the effective approaches to solving this problem. However, how to extract Multiword Lexical Units (MLUs) from the web content and how to select the correct translations from the extracted candidate MLUs are still two difficult problems in web mining based automated translation approaches. Discovering resource descriptions and merging results obtained from remote search engines are two key issues in distributed information retrieval studies. In uncooperative environments, query-based sampling and normalized-score based merging strategies are well-known approaches to solve such problems. However, such approaches only consider the content of the remote database but do not consider the retrieval performance of the remote search engine. This thesis presents research on building a peer to peer IR system with crosslanguage IR and advance collection profiling technique for fusion features. Particularly, this thesis first presents a new Chinese term measurement and new Chinese MLU extraction process that works well on small corpora. An approach to selection of MLUs in a more accurate manner is also presented. After that, this thesis proposes a collection profiling strategy which can discover not only collection content but also retrieval performance of the remote search engine. Based on collection profiling, a web-based query classification method and two collection fusion approaches are developed and presented in this thesis. Our experiments show that the proposed strategies are effective in merging results in uncooperative peer to peer environments. Here, an uncooperative environment is defined as each peer in the system is autonomous. Peer like to share documents but they do not share collection statistics. This environment is a typical peer to peer IR environment. Finally, all those approaches are grouped together to build up a secure peer to peer multilingual IR system that cooperates through X.509 and email system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a detailed description of the influence of critical parameters that govern the vulnerability of columns under lateral impact loads. Numerical simulations are conducted by using the Finite Element program LS-DYNA, incorporating steel reinforcement, material models and strain rate effects. A simplified method based on impact pulse generated from full scale impact tests is used for impact reconstruction and effects of the various pulse loading parameters are investigated under low to medium velocity impacts. A constitutive material model which can simulate failures under tri-axial state of stresses is used for concrete. Confinement effects are also introduced to the numerical simulation and columns of Grade 30 to 50 concrete under pure axial loading are analysed in detail. This research confirmed that the vulnerability of the axially loaded columns can be mitigated by reducing the slenderness ratio and concrete grade, and by choosing the design option with a minimal amount of longitudinal steel. Additionally, it is evident that approximately a 50% increase in impact capacity can be gained for columns in medium rise buildings by enhancing the confinement effects alone. Results also indicated that the ductility as well as the mode of failure under impact can be changed with the volumetric ratio of lateral steel. Moreover, to increase the impact capacity of the vulnerable columns, a higher confining stress is required. The general provisions of current design codes do not sufficiently cover this aspect and hence this research will provide additional guidelines to overcome the inadequacies of code provisions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the context of a multi-paper special issue of TVNM on the future of media studies, this paper traces the tradition of active audience theory in TV scholarship, arguing that it has much to offer in the study of new digital media, especially an approach to user-created content and dynamics of change. The paper argues for a cultural science approach to active audiences in order to analyse and understand how non-professionals and consumers contribute to the growth of knowledge in complex open media systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Vibration based damage identification methods examine the changes in primary modal parameters or quantities derived from modal parameters. As one method may have advantages over the other under some circumstances, a multi-criteria approach is proposed. Case studies are conducted separately on beam, plate and plate-on-beam structures. Using the numerically simulated modal data obtained through finite element analysis software, algorithms based on flexibility and strain energy changes before and after damage are obtained and used as the indices for the assessment of the state of structural health. Results show that the proposed multi-criteria method is effective in damage identification in these structures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This chapter reports on Australian and Swedish experiences in the iterative design, development, and ongoing use of interactive educational systems we call Media Maps. Like maps in general, Media Maps are usefully understood as complex cultural technologies; that is, they are not only physical objects, tools and artefacts, but also information creation and distribution technologies, the use and development of which are embedded in systems of knowledge and social meaning. Drawing upon Australian and Swedish experiences with one Media Map technology, this paper illustrates this three-layered approach to the development of media mapping. It shows how media mapping is being used to create authentic learning experiences for students preparing for work in the rapidly evolving media and communication industries. We also contextualise media mapping as a response to various challenges for curriculum and learning design in Media and Communication Studies that arise from shifts in tertiary education policy in a global knowledge economy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper represents my attempt to turn the gaze and demonstrate how Indigenous Studies is controlled in some Australian universities in ways that witness Indigenous peoples being further marginalised, denigrated and exploited. I have endeavoured to do this through sharing an experience as a case study. I have opted to write about it as a way of exposing the problematic nature of racism, systemic marginalisation, white race privilege and radicalised subjectivity played out within an Australian higher education institution and because I am dissatisfied with the on-going status quo. In bringing forth analysis to this case study, I reveal the relationships between oppression, white race privilege and institutional privilege and the epistemology that maintains them. In moving from the position of being silent on this experience to speaking about it, I am able to move from the position of object to subject and to gain a form of liberated voice (hooks 1989:9). Furthermore, I am hopeful that it will encourage others to examine their own practices within universities and to challenge the domination that continues to subjugate Indigenous peoples.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A complete change of career forces a seismic shift in every aspect of your life. From day one, you have to face the loss of long held beliefs, behaviours, the known world of self, and security. We came from professions that themselves are poles apart, and many of the challenges we faced entering the profession were the same: juggling full-time work, part time study, and family commitmemts, taking a pay cut, and loss of social life. But over a short period of time we both transitioned to our new profession successfully. so what make our successful transition possible?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Queensland Department of Public Works (QDPW) and the Queensland Department of Main Roads (QDMR) have identified a need for industry e-contracting guidelines in the short to medium term. Each of these organisations conducts tenders and contracts for over $600 million annually. This report considers the security and legal issues relating to the shift from a paper-based tendering system to an electronic tendering system. The research objectives derived from the industry partners include: a review of current standards and e-tendering systems; a summary of legal requirements impacting upon e-tendering; an analysis of the threats and requirements for any e-tendering system; the identification of outstanding issues; an evaluation of possible e-tendering architectures; recommendations for e-tendering systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Key topics: Since the birth of the Open Source movement in the mid-80's, open source software has become more and more widespread. Amongst others, the Linux operating system, the Apache web server and the Firefox internet explorer have taken substantial market shares to their proprietary competitors. Open source software is governed by particular types of licenses. As proprietary licenses only allow the software's use in exchange for a fee, open source licenses grant users more rights like the free use, free copy, free modification and free distribution of the software, as well as free access to the source code. This new phenomenon has raised many managerial questions: organizational issues related to the system of governance that underlie such open source communities (Raymond, 1999a; Lerner and Tirole, 2002; Lee and Cole 2003; Mockus et al. 2000; Tuomi, 2000; Demil and Lecocq, 2006; O'Mahony and Ferraro, 2007;Fleming and Waguespack, 2007), collaborative innovation issues (Von Hippel, 2003; Von Krogh et al., 2003; Von Hippel and Von Krogh, 2003; Dahlander, 2005; Osterloh, 2007; David, 2008), issues related to the nature as well as the motivations of developers (Lerner and Tirole, 2002; Hertel, 2003; Dahlander and McKelvey, 2005; Jeppesen and Frederiksen, 2006), public policy and innovation issues (Jullien and Zimmermann, 2005; Lee, 2006), technological competitions issues related to standard battles between proprietary and open source software (Bonaccorsi and Rossi, 2003; Bonaccorsi et al. 2004, Economides and Katsamakas, 2005; Chen, 2007), intellectual property rights and licensing issues (Laat 2005; Lerner and Tirole, 2005; Gambardella, 2006; Determann et al., 2007). A major unresolved issue concerns open source business models and revenue capture, given that open source licenses imply no fee for users. On this topic, articles show that a commercial activity based on open source software is possible, as they describe different possible ways of doing business around open source (Raymond, 1999; Dahlander, 2004; Daffara, 2007; Bonaccorsi and Merito, 2007). These studies usually look at open source-based companies. Open source-based companies encompass a wide range of firms with different categories of activities: providers of packaged open source solutions, IT Services&Software Engineering firms and open source software publishers. However, business models implications are different for each of these categories: providers of packaged solutions and IT Services&Software Engineering firms' activities are based on software developed outside their boundaries, whereas commercial software publishers sponsor the development of the open source software. This paper focuses on open source software publishers' business models as this issue is even more crucial for this category of firms which take the risk of investing in the development of the software. Literature at last identifies and depicts only two generic types of business models for open source software publishers: the business models of ''bundling'' (Pal and Madanmohan, 2002; Dahlander 2004) and the dual licensing business models (Vlimki, 2003; Comino and Manenti, 2007). Nevertheless, these business models are not applicable in all circumstances. Methodology: The objectives of this paper are: (1) to explore in which contexts the two generic business models described in literature can be implemented successfully and (2) to depict an additional business model for open source software publishers which can be used in a different context. To do so, this paper draws upon an explorative case study of IdealX, a French open source security software publisher. This case study consists in a series of 3 interviews conducted between February 2005 and April 2006 with the co-founder and the business manager. It aims at depicting the process of IdealX's search for the appropriate business model between its creation in 2000 and 2006. This software publisher has tried both generic types of open source software publishers' business models before designing its own. Consequently, through IdealX's trials and errors, I investigate the conditions under which such generic business models can be effective. Moreover, this study describes the business model finally designed and adopted by IdealX: an additional open source software publisher's business model based on the principle of ''mutualisation'', which is applicable in a different context. Results and implications: Finally, this article contributes to ongoing empirical work within entrepreneurship and strategic management on open source software publishers' business models: it provides the characteristics of three generic business models (the business model of bundling, the dual licensing business model and the business model of mutualisation) as well as conditions under which they can be successfully implemented (regarding the type of product developed and the competencies of the firm). This paper also goes further into the traditional concept of business model used by scholars in the open source related literature. In this article, a business model is not only considered as a way of generating incomes (''revenue model'' (Amit and Zott, 2001)), but rather as the necessary conjunction of value creation and value capture, according to the recent literature about business models (Amit and Zott, 2001; Chresbrough and Rosenblum, 2002; Teece, 2007). Consequently, this paper analyses the business models from these two components' point of view.