992 resultados para Philo, of Alexandria


Relevância:

40.00% 40.00%

Publicador:

Resumo:

Mode of access: Internet.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

An informed citizenry is essential to the effective functioning of democracy. In most modern liberal democracies, citizens have traditionally looked to the media as the primary source of information about socio-political matters. In our increasingly mediated world, it is critical that audiences be able to effectively and accurately use the media to meet their information needs. Media literacy, the ability to access, understand, evaluate and create media content is therefore a vital skill for a healthy democracy. The past three decades have seen the rapid expansion of the information environment, particularly through Internet technologies. It is obvious that media usage patterns have changed dramatically as a result. Blogs and websites are now popular sources of news and information, and are for some sections of the population likely to be the first, and possibly only, information source accessed when information is required. What are the implications for media literacy in such a diverse and changing information environment? The Alexandria Manifesto stresses the link between libraries, a well informed citizenry and effective governance, so how do these changes impact on libraries? This paper considers the role libraries can play in developing media literate communities, and explores the ways in which traditional media literacy training may be expanded to better equip citizens for new media technologies. Drawing on original empirical research, this paper highlights a key shortcoming of existing media literacy approaches: that of overlooking the importance of needs identification as an initial step in media selection. Self-awareness of one’s actual information need is not automatic, as can be witnessed daily at reference desks in libraries the world over. Citizens very often do not know what it is that they need when it comes to information. Without this knowledge, selecting the most appropriate information source from the vast range available becomes an uncertain, possibly even random, enterprise. Incorporating reference interview-type training into media literacy education, whereby the individual will develop the skills to interrogate themselves regarding their underlying information needs, will enhance media literacy approaches. This increased focus on the needs of the individual will also push media literacy education into a more constructivist methodology. The paper also stresses the importance of media literacy training for adults. Media literacy education received in school or even university cannot be expected to retain its relevance over time in our rapidly evolving information environment. Further, constructivist teaching approaches highlight the importance of context to the learning process, thus it may be more effective to offer media literacy education relating to news media use to adults, whilst school-based approaches focus on types of media more relevant to young people, such as entertainment media. Librarians are ideally placed to offer such community-based media literacy education for adults. They already understand, through their training and practice of the reference interview, how to identify underlying information needs. Further, libraries are placed within community contexts, where the everyday practice of media literacy occurs. The Alexandria Manifesto stresses the link between libraries, a well informed citizenry and effective governance. It is clear that libraries have a role to play in fostering media literacy within their communities.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Machine learning has become a valuable tool for detecting and preventing malicious activity. However, as more applications employ machine learning techniques in adversarial decision-making situations, increasingly powerful attacks become possible against machine learning systems. In this paper, we present three broad research directions towards the end of developing truly secure learning. First, we suggest that finding bounds on adversarial influence is important to understand the limits of what an attacker can and cannot do to a learning system. Second, we investigate the value of adversarial capabilities-the success of an attack depends largely on what types of information and influence the attacker has. Finally, we propose directions in technologies for secure learning and suggest lines of investigation into secure techniques for learning in adversarial environments. We intend this paper to foster discussion about the security of machine learning, and we believe that the research directions we propose represent the most important directions to pursue in the quest for secure learning.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The effects of increased training (IT) load on plasma concentrations of lipopolysaccharides (LPS), proinflammatory cytokines, and anti-LPS antibodies during exercise in the heat were investigated in 18 male runners, who performed 14 days of normal training (NT) or 14 days of 20% IT load in 2 equal groups. Before (trial 1) and after (trial 2) the training intervention, all subjects ran at 70% maximum oxygen uptake on a treadmill under hot (35 degrees C) and humid (similar to 40%) conditions, until core temperature reached 39.5 degrees C or volitional exhaustion. Venous blood samples were drawn before, after, and 1.5 h after exercise. Plasma LPS concentration after exercise increased by 71% (trial 1, p < 0.05) and 21% (trial 2) in the NT group and by 92% (trial 1, p < 0.01) and 199% (trial 2, p < 0.01) in the IT group. Postintervention plasma LPS concentration was 35% lower before exercise (p < 0.05) and 47% lower during recovery (p < 0.01) in the IT than in the NT group. Anti-LPS IgM concentration during recovery was 35% lower in the IT than in the NT group (p < 0.05). Plasma interleukin (IL)-6 and tumor necrosis factor (TNF)-alpha concentrations after exercise (IL-6, 3-7 times, p < 0.01, and TNF-alpha, 33%, p < 0.01) and during recovery (IL-6, 2-4 times, p < 0.05, and TNF-alpha, 30%, p < 0.01) were higher than at rest within each group. These data suggest that a short-term tolerable increase in training load may protect against developing endotoxemia during exercise in the heat.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background: Hot air ballooning incidents are relatively rare, however, when they do occur they are likely to result in a fatality or serious injury. Human error is commonly attributed as the cause of hot air ballooning incidents; however, error in itself is not an explanation for safety failures. This research aims to identify, and establish the relative importance of factors contributing towards hot air ballooning incidents. Methods: Twenty-two Australian Ballooning Federation (ABF) incident reports were thematically coded using a bottom up approach to identify causal factors. Subsequently, 69 balloonists (mean 19.51 years’ experience) participated in a survey to identify additional causal factors and rate (out of seven) the perceived frequency and potential impact to ballooning operations of each of the previously identified causal factors. Perceived associated risk was calculated by multiplying mean perceived frequency and impact ratings. Results: Incident report coding identified 54 causal factors within nine higher level areas: Attributes, Crew resource management, Equipment, Errors, Instructors, Organisational, Physical Environment, Regulatory body and Violations. Overall, ‘weather’, ‘inexperience’ and ‘poor/inappropriate decisions’ were rated as having greatest perceived associated risk. Discussion: Although errors were nominated as a prominent cause of hot air ballooning incidents, physical environment and personal attributes are also particularly important for safe hot air ballooning operations. In identifying a range of causal factors the areas of weakness surrounding ballooning operations have been defined; it is hoped that targeted safety and training strategies can now be put into place removing these contributing factors and reducing the chance of pilot error.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Inventory lists of captured German documents; 1933-1945.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Calcium sulphate (CaSO4) pseudomicrorods have been synthesized by alow-temperature hydrothermal method using CaSO4 powder as a precursor and hexadecylamine as a surfactant at 180 degrees C for at different intervals of time. The powder X-ray diffraction pattern indicates that the as-formed pseudomicrorods are of orthorhombic phase with lattice parameters a = 7.0023(4) angstrom, b = 6.9939(5) angstrom and c = 6.2434(4) angstrom. Scanning electron microscopy images show that the pseudomicrorods have diameters of about 0.2-2.5 mm and lengths of about 2-10 mm. Fourier transform infrared spectroscopy shows a strong doublet near 609 and 681 cm(-1) arising from nu(4) (SO42) bending vibrations. The strongest band observed at 1132 cm(-1) is associated with nu(3) (SO42-) stretching vibrations. The band near 420-450 cm(-1) is attributed to nu(2) (SO42-) bending vibrations. The Raman spectrum exhibits an intense peak at 1008 cm(-1) associated with the SO42- mode. The photoluminescence spectrum exhibits UV bands (330, 350 nm), strong green bands (402, 436 nm) and weak blue bands (503 nm). A widening of the optical band gap was observed as the particle size decreased.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper describes three novel techniques to automatically evaluate sentence extract summaries. Two of these techniques called FuSE and DeFuSE evaluate the quality of the generated extract summary based on the degree of similarity to the model summary. They use a fuzzy set theoretic basis to generate a match score. DeFuSE is an enhancement to FuSE and uses WordNet based hypernymy structures to detect similarity between sentences at abstracted levels. The third technique focuses on quantifying the quality of an extract summary based on the difficulty in generating such a summary. Advantages of these techniques are described with examples.