4 resultados para Learning by Doing

em Research Open Access Repository of the University of East London.


Relevância:

90.00% 90.00%

Publicador:

Resumo:

Both ‘disaster preparedness’ and ‘public pedagogy’ have been broadly defined and diversely utilised. Preparedness has been dealt within the disciplines such as civil engineering, sociology of disasters, public health and psychology, rather than education. Recently, inquiries into the learning and teaching of preparedness is increasing in the field of education, and some of them position preparedness education within the field of public pedagogy. However, conceptual discussion as to how and why the two fields are associated has been limited. The primary aim of this paper is to fill this gap by drawing on public pedagogy literature that conceptualises ‘publics’ and ‘pedagogies’. By doing so, the paper attempts to respond to Burdick et al’s call for Problematizing Public Pedagogy.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Semi-autonomous avatars should be both realistic and believable. The goal is to learn from and reproduce the behaviours of the user-controlled input to enable semi-autonomous avatars to plausibly interact with their human-controlled counterparts. A powerful tool for embedding autonomous behaviour is learning by imitation. Hence, in this paper an ensemble of fuzzy inference systems cluster the user input data to identify natural groupings within the data to describe the users movement and actions in a more abstract way. Multiple clustering algorithms are investigated along with a neuro-fuzzy classifier; and an ensemble of fuzzy systems are evaluated.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Thomas De Quincey’s essay ‘Levana and Our Ladies of Sorrow’ provided Dario Argento with the spark of an idea, which was further ignited by tales from his then wife, Daria Nicolodi, who told him of her grandmother’s stay at a music school which was run by a coven of witches. From these sources Argento came up with the mythology of The Three Mothers, which were to feature in three of his films: Suspiria (1977), Inferno (1980) and La terza madre/The Mother of Tears (2007). This article will examine the occult and esoteric sources of The Three Mothers trilogy, and explore how these references work to create a series of films that may superficially appear to use the supernatural and occult to create scares, but actually incorporate elements of Western Esotericism rather than traditional Christian images of evil. By doing this, these films transcend their apparent flaws (in terms of shallow plot and character development, a common complaint directed toward many Italian horror films) and instead imbue the mise-enscene itself with meaning, character and narrative. Although the films are situated within the Gothic genre, and in many respects follow traditional Gothic lines with witchcraft and the occult becoming synonymous with evil, I will argue that the films actually belong to the long tradition of art forms that have attempted to investigate the allure and the danger of occult exploration.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

More and more software projects today are security-related in one way or the other. Requirements engineers often fail to recognise indicators for security problems which is a major source of security problems in practice. Identifying security-relevant requirements is labour-intensive and errorprone. In order to facilitate the security requirements elicitation process, we present an approach supporting organisational learning on security requirements by establishing company-wide experience resources, and a socio-technical network to benefit from them. The approach is based on modelling the flow of requirements and related experiences. Based on those models, we enable people to exchange experiences about security-requirements while they write and discuss project requirements. At the same time, the approach enables participating stakeholders to learn while they write requirements. This can increase security awareness and facilitate learning on both individual and organisational levels. As a basis for our approach, we introduce heuristic assistant tools which support reuse of existing security-related experiences. In particular, they include Bayesian classifiers which issue a warning automatically when new requirements seem to be security-relevant. Our results indicate that this is feasible, in particular if the classifier is trained with domain specific data and documents from previous projects. We show how the ability to identify security-relevant requirements can be improved using this approach. We illustrate our approach by providing a step-by-step example of how we improved the security requirements engineering process at the European Telecommunications Standards Institute (ETSI) and report on experiences made in this application.