8 resultados para every day life
em Aston University Research Archive
Resumo:
This book challenges the accepted notion that the transition from the command economy to market based systems is complete across the post-Soviet space. While it is noted that different political economies have developed in such states, such as Russia’s ‘managed democracy’, events such as Ukraine gaining ‘market economy status’ by the European Union and acceding to the World Trade Organisation in 2008 are taken as evidence that the reform period is over. Such thinking is based on numerous assumptions; specifically that economic transition has defined start and end points, that the formal economy now has primacy over other forms of economic practices and that national economic growth leads to the ‘trickle down’ of wealth to those marginalised by the transition process. Based on extensive ethnographic and quantitative research, conducted in Ukraine and Russia between 2004 - 2007, this book questions these assumptions by stating that the economies that operate across post-Soviet spaces are far from the textbook idea of a market economy. Through this the whole notion of ‘transition’ is problematised and the importance of informal economies to everyday life is demonstrated. Using case studies of various sectors, such as entrepreneurial behaviour and the higher education system, it is also shown how corruption has invaded almost all sectors of the post-Soviet every day.
Resumo:
In this poster we presented our preliminary work on the study of spammer detection and analysis with 50 active honeypot profiles implemented on Weibo.com and QQ.com microblogging networks. We picked out spammers from legitimate users by manually checking every captured user's microblogs content. We built a spammer dataset for each social network community using these spammer accounts and a legitimate user dataset as well. We analyzed several features of the two user classes and made a comparison on these features, which were found to be useful to distinguish spammers from legitimate users. The followings are several initial observations from our analysis on the features of spammers captured on Weibo.com and QQ.com. ¦The following/follower ratio of spammers is usually higher than legitimate users. They tend to follow a large amount of users in order to gain popularity but always have relatively few followers. ¦There exists a big gap between the average numbers of microblogs posted per day from these two classes. On Weibo.com, spammers post quite a lot microblogs every day, which is much more than legitimate users do; while on QQ.com spammers post far less microblogs than legitimate users. This is mainly due to the different strategies taken by spammers on these two platforms. ¦More spammers choose a cautious spam posting pattern. They mix spam microblogs with ordinary ones so that they can avoid the anti-spam mechanisms taken by the service providers. ¦Aggressive spammers are more likely to be detected so they tend to have a shorter life while cautious spammers can live much longer and have a deeper influence on the network. The latter kind of spammers may become the trend of social network spammer. © 2012 IEEE.
Resumo:
Western Yiddish, the spoken language of the traditional Jewish society in the German- and Dutch-speaking countries, was abandoned by its speakers at the end of the 18th in favour of the emerging standard varieties: Dutch and German, respectively. Remnants of Western Yiddish varieties, however, remained a medium of discourse in remote provinces and could be found well into the 19th and sometimes the 20th century in some South-western areas of Germany and Switzerland, the Alsace, some areas of the Netherlands and in parts of the German province of Westphalia. It appears that rural Jewish communities sometimes preserved in-group vernaculars, which were based on Western Yiddish. Sources discovered in 2004 in the town of Aurich prove that Jews living in East Frisia, a Low-German speaking peninsula in the North-west of Germany, used a variety based on Western Yiddish until the Second World War. It appears that until the Holocaust a number of small, close-knit Jewish communities East Frisia, which depended economically mainly on cattle-trading and butchery, kept certain specific cultural features, among them the vernacular which they spoke alongside Low German and Standard German. The sources consist of two amateur theatre plays, a memoir and two word lists written in 1902, 1928 and the 1980s, respectively. In the monograph these sources are documented and annotated as well as analyzed linguistically against the background of rural Jewish life in Northern Germany. The study focuses on traces of language contact with Low German, processes of language change and on the question of the function of the variety in day-to-day life in a rural Jewish community.
Resumo:
Models of visual motion processing that introduce priors for low speed through Bayesian computations are sometimes treated with scepticism by empirical researchers because of the convenient way in which parameters of the Bayesian priors have been chosen. Using the effects of motion adaptation on motion perception to illustrate, we show that the Bayesian prior, far from being convenient, may be estimated on-line and therefore represents a useful tool by which visual motion processes may be optimized in order to extract the motion signals commonly encountered in every day experience. The prescription for optimization, when combined with system constraints on the transmission of visual information, may lead to an exaggeration of perceptual bias through the process of adaptation. Our approach extends the Bayesian model of visual motion proposed byWeiss et al. [Weiss Y., Simoncelli, E., & Adelson, E. (2002). Motion illusions as optimal perception Nature Neuroscience, 5:598-604.], in suggesting that perceptual bias reflects a compromise taken by a rational system in the face of uncertain signals and system constraints. © 2007.
Resumo:
The number of new chemical entities (NCE) is increasing every day after the introduction of combinatorial chemistry and high throughput screening to the drug discovery cycle. One third of these new compounds have aqueous solubility less than 20µg/mL [1]. Therefore, a great deal of interest has been forwarded to the salt formation technique to overcome solubility limitations. This study aims to improve the drug solubility of a Biopharmaceutical Classification System class II (BCS II) model drug (Indomethacin; IND) using basic amino acids (L-arginine, L-lysine and L-histidine) as counterions. Three new salts were prepared using freeze drying method and characterised by FT-IR spectroscopy, proton nuclear magnetic resonance ((1)HNMR), Differential Scanning Calorimetry (DSC) and Thermogravimetric analysis (TGA). The effect of pH on IND solubility was also investigated using pH-solubility profile. Both arginine and lysine formed novel salts with IND, while histidine failed to dissociate the free acid and in turn no salt was formed. Arginine and lysine increased IND solubility by 10,000 and 2296 fold, respectively. An increase in dissolution rate was also observed for the novel salts. Since these new salts have improved IND solubility to that similar to BCS class I drugs, IND salts could be considered for possible waivers of bioequivalence.
Resumo:
This paper is about mothering an intellectually disabled child identified with special educational needs. It specifically looks at the parent partnership rhetoric that has dominated UK government policy and directives for nearly three decades and yet research suggests parents and more often mothers have to battle to be recognised as legitimate experts. This paper engages with sociological analysis as it highlights via qualitative narratives that mothers are weighed down by the sheer number of professionals involved in their day-to-day life. Moreover, mothers whose children are not identified in the early years are often blamed in the first instance for playing a part in their child’s difficult behaviour. This research ultimately suggests that partnership work is important and necessary for practice within health, education and social work professions, not least of all because the emotional roller-coaster that mothers experience during the assessment and statementing process is disabling.
Resumo:
In less than a decade, personal computers have become part of our daily lives. Many of us come into contact with computers every day, whether at work, school or home. As useful as the new technologies are, they also have a darker side. By making computers part of our daily lives, we run the risk of allowing thieves, swindlers, and all kinds of deviants directly into our homes. Armed with a personal computer, a modem and just a little knowledge, a thief can easily access confidential information, such as details of bank accounts and credit cards. This book helps people avoid harm at the hands of Internet criminals. It offers a tour of the more dangerous parts of the Internet, as the author explains who the predators are, their motivations, how they operate and how to protect against them. In less than a decade, personal computers have become part of our daily lives. Many of us come into contact with computers every day, whether at work, school or home. As useful as the new technologies are, they also have a darker side. By making computers part of our daily lives, we run the risk of allowing thieves, swindlers, and all kinds of deviants directly into our homes. Armed with a personal computer, a modem and just a little knowledge, a thief can easily access confidential information, such as details of bank accounts and credit cards. This book is intended to help people avoid harm at the hands of Internet criminals. It offers a tour of the more dangerous parts of the Internet, as the author explains who the predators are, their motivations, how they operate and how to protect against them. Behind the doors of our own homes, we assume we are safe from predators, con artists, and other criminals wishing us harm. But the proliferation of personal computers and the growth of the Internet have invited these unsavory types right into our family rooms. With a little psychological knowledge a con man can start to manipulate us in different ways. A terrorist can recruit new members and raise money over the Internet. Identity thieves can gather personal information and exploit it for criminal purposes. Spammers can wreak havoc on businesses and individuals. Here, an expert helps readers recognize the signs of a would-be criminal in their midst. Focusing on the perpetrators, the author provides information about how they operate, why they do it, what they hope to do, and how to protect yourself from becoming a victim.
Resumo:
This paper is based on qualitative research which found that the contraceptive pill had achieved a "hegemonic status" among some British women in their thirties. In addition, despite the risk of sexually transmitted diseases, the idea of using condoms was very unpopular, and the research suggests that this is linked to a reluctance to rely on male cooperation over contraception. This paper will further argue that the women generally chose methods that they felt would be in their own best interests, and were often exercising considerable agency within the constraints of their relationships. Moreover, by accepting the responsibility for contraception, the women not only gained sole control over their fertility, but contraception may be an area within heterosexuality where women can exercise power.