895 resultados para Intellectual freedom and censorship
Resumo:
Sir Wilfred Grenfell Colleges Fine Arts Division offers two BFA programs: visual arts and theatre. They are the only BFA degree programs available in the province. The bachoelor of Fine arts(Visual Arts)program is a professional program designed to educate and train students in the history, theory and practice of the visual arts. The curriculum has been devised to produce well-rounded generalists with solid grounding in all aspects of visual arts. The Curriculum illustrates the philosophy that artistic freedom and creative expression require technical skill, intellectual awareness and personal vision, acquired through a disciplined application of effort and critical understanding of artistic issues, past and present. Academic electives are tended to provide a broad exposure to the liberal arts.
Resumo:
The phenomenon of terrorism is one of the most asymmetrical, amorphous and hybrid threats to international security. At the beginning of the 21st century, terrorism grew to a pandemic. Ensuring freedom and security of individuals and nations has become one of the priority postulates. Terrorism steps out of all legal and analytic-descriptive standards. An immanent feature of terrorism, e.g. is constant conversion into malicious forms of violence. One of the most alarming changes is a tendency for debasement of essence of law, a state and human rights Assurance of safety in widely accessible public places and in private life forces creation of various institutions, methods and forms of people control. However, one cannot in an arbitrary way limit civil freedom. Presented article stresses the fact that rational and informed approach to human rights should serve as a reference point for legislative and executive bodies. Selected individual applications to the European Court of Human Rights are presented, focusing on those based on which standards regarding protection of human rights in the face of pathological social phenomena, terrorism in particular, could be reconstructed and refined. Strasbourg standards may prove helpful in selecting and constructing new legal and legislative solutions, unifying and correlating prophylactic and preventive actions.
Resumo:
Chromosome microarray analysis is a powerful diagnostic tool and is being used as a first-line approach to detect chromosome imbalances associated with intellectual disability, dysmorphic features and congenital abnormalities. This test enables the identification of new copy number variants (CNVs) and their association with new microdeletion/microduplication syndromes in patients previously without diagnosis. We report the case of a 7 year-old female with moderate intellectual disability, severe speech delay and auto and hetero aggressivity with a previous 45,XX,der(13;14)mat karyotype performed at a younger age. Affymetrix CytoScan 750K chromosome microarray analysis was performed detecting a 1.77 Mb deletion at 3p26.3, encompassing 2 OMIM genes, CNTN6 and CNTN4. These genes play an important role in the formation, maintenance, and plasticity of functional neuronal networks. Deletions or mutations in CNTN4 gene have been implicated in intellectual disability and learning disabilities. Disruptions or deletions in the CNTN6 gene have been associated with development delay and other neurodevelopmental disorders. The haploinsufficiency of these genes has been suggested to participate to the typical clinical features of 3p deletion syndrome. Nevertheless inheritance from a healthy parent has been reported, suggesting incomplete penetrance and variable phenotype for this CNV. We compare our patient with other similar reported cases, adding additional value to the phenotype-genotype correlation of deletions in this region.
Resumo:
The text analyses the intelligence activity against Poland in the period 1944-1989. The paper also contains a case study, i.e. an analysis of the American intelligence service activity held against Poland. While examining the research thesis, the author used the documents and analyses prepared by the Ministry of Internal Affairs. In order to best illustrate the point, the author presented a number of cases of persons who spied for the USA, which was possible thanks to the analysis of the training materials of the Ministry of Internal Affairs directed to the officers of the Security Service and the Citizens’ Militia. The text tackles the following issues: (1) to what extent did the character of the socio-political system influence the number of persons convicted for espionage against Poland in the period under examination?, (2) what was the level of interest of the foreign intelligence services in Poland before the year 1990?, (3) is it possible to indicate the specificity of the U.S. intelligence activity against Poland? 1) The analysis of data indicates that the period 1946-1956 witnessed a great number of convictions for espionage, which is often associated with the peculiar political situation in Poland of that time. Up to 1953, the countries of the Eastern bloc had reproduced the Stalin’s system, which only ceased due to the death of Stalin himself. Since then, the communist systems gradually transformed into the system of nomenklatura. Irrespective of these changes, Poland still witnessed a wave of repressions, which resulted from the threats continuously looming over the communist authorities – combating the anti-communist underground movement, fighting with the Ukrainian Insurgent Army, the Polish government-in-exile, possible revisionism of borders, social discontent related to the socio-political reforms. Hence, a great number of convictions for espionage at that time could be ascribed to purely political sentences. Moreover, equally significant was the fact that the then judicial practice was preoccupied assessing negatively any contacts and relations with foreigners. This excessive number of convictions could ensue from other criminal-law provisions, which applied with respect to the crimes against the State, including espionage. What is also important is the fact that in the Stalin’s period the judiciary personnel acquired their skills and qualifications through intensive courses in law with the predominant spirit of the theory of evidence and law by Andrey Vyshinsky. Additionally, by the decree of 1944 the Penal Code of the Polish Armed Forces was introduced; the code envisaged the increase in the number of offences classified as penalised with death penalty, whereas the high treason was subject to the military jurisdiction (the civilians were prosecuted in military courts till 1955; the espionage, however, still stood under the military jurisdiction). In 1946, there was introduced the Decree on particularly dangerous crimes in the period of the State’s recovery, which was later called a Small Penal Code. 2) The interest that foreign intelligence services expressed in relation to Poland was similar to the one they had in all countries of Eastern and Central Europe. In the case of Poland, it should be noted that foreign intelligence services recruited Polish citizens who had previously stayed abroad and after WWII returned to their home country. The services also gathered information from Poles staying in immigrant camps (e.g. in FRG). The activity of the American intelligence service on the territory of FRG and West Berlin played a key role. The documents of the Ministry of Internal Affairs pointed to the global range of this activity, e.g. through the recruitment of Polish sailors in the ports of the Netherlands, Japan, etc. In line with the development in the 1970s, espionage, which had so far concentrated on the defence and strategic sectors, became focused on science and technology of the People’s Republic of Poland. The acquisition of collaborators in academic circles was much easier, as PRL opened to academic exchange. Due to the system of visas, the process of candidate selection for intelligence services (e.g. the American) began in embassies. In the 1980s, the activity of the foreign intelligence services concentrated on the specific political situation in Poland, i.e. the growing significance of the “Solidarity” social movement. 3) The specificity of the American intelligence activity against Poland was related to the composition of the residency staff, which was the largest in comparison to other Western countries. The wide range of these activities can be proved by the quantitative data of convictions for espionage in the years 1944-1984 (however, one has to bear in mind the factors mentioned earlier in the text, which led to the misinterpretation of these data). Analysing the data and the documents prepared by the Ministry of Internal Affairs, one should treat them with caution, as, frequently, the Polish counter-intelligence service used to classify the ordinary diplomatic practice and any contacts with foreigners as espionage threats. It is clearly visible in the language of the training materials concerned with “secret service methods of the intelligence activity” as well as in the documents on operational activities of the Security Service in relation to foreigners. The level of interest the USA had in Poland was mirrored in the classification of diplomatic posts, according to which Warsaw occupied the second place (the so-called Group “B”) on the three-point scale. The CIA experienced spectacular defeats during their activity in Poland: supporting the Polish underground anti-communist organisation Freedom and Independence and the so-called Munich-Berg episode (both cases took place in the 1950s). The text focuses only on selected issues related to the espionage activities against Poland. Similarly, the analysis of the problem has been based on selected sources, which has limited the research scope - however, it was not the aim of the author to present the espionage activity against Poland in a comprehensive way. In order to assess the real threat posed by the espionage activity, one should analyse the case of persons convicted for espionage in the period 1944-1989, as the available quantitative data, mentioned in the text, cannot constitute an explicit benchmark for the scale of espionage activity. The inaccuracies in the interpretation of data and variables, which can affect the evaluation of this phenomenon, have been pointed out in the text.
Resumo:
Statistical approaches to study extreme events require, by definition, long time series of data. In many scientific disciplines, these series are often subject to variations at different temporal scales that affect the frequency and intensity of their extremes. Therefore, the assumption of stationarity is violated and alternative methods to conventional stationary extreme value analysis (EVA) must be adopted. Using the example of environmental variables subject to climate change, in this study we introduce the transformed-stationary (TS) methodology for non-stationary EVA. This approach consists of (i) transforming a non-stationary time series into a stationary one, to which the stationary EVA theory can be applied, and (ii) reverse transforming the result into a non-stationary extreme value distribution. As a transformation, we propose and discuss a simple time-varying normalization of the signal and show that it enables a comprehensive formulation of non-stationary generalized extreme value (GEV) and generalized Pareto distribution (GPD) models with a constant shape parameter. A validation of the methodology is carried out on time series of significant wave height, residual water level, and river discharge, which show varying degrees of long-term and seasonal variability. The results from the proposed approach are comparable with the results from (a) a stationary EVA on quasi-stationary slices of non-stationary series and (b) the established method for non-stationary EVA. However, the proposed technique comes with advantages in both cases. For example, in contrast to (a), the proposed technique uses the whole time horizon of the series for the estimation of the extremes, allowing for a more accurate estimation of large return levels. Furthermore, with respect to (b), it decouples the detection of non-stationary patterns from the fitting of the extreme value distribution. As a result, the steps of the analysis are simplified and intermediate diagnostics are possible. In particular, the transformation can be carried out by means of simple statistical techniques such as low-pass filters based on the running mean and the standard deviation, and the fitting procedure is a stationary one with a few degrees of freedom and is easy to implement and control. An open-source MAT-LAB toolbox has been developed to cover this methodology, which is available at https://github.com/menta78/tsEva/(Mentaschi et al., 2016).
Resumo:
Druj Aeterni is a large chamber ensemble piece for flute, clarinet, French horn, two trumpets, piano, two percussionists, string quintet, and electric bass. My composition integrates three intellectual pursuits and interests, ancient mythology, cosmology, and mathematics. The title of the piece uses Latin and the language of the Avesta, the holy book of Zoroastrianism, and comments upon a philosophical perspective based in string theory. I abstract the cosmological implications of string theory, apply them to the terminology and theology of Zoroastrianism, and then structure the composition in consideration of a possible reconciliation. The analysis that follows incorporates analytical techniques similar to David Cope’s style of Vectoral Analysis.
Resumo:
From a pragmatic point of view, it is the people who make an organisation, but organisations are both people and structures, and not least organisations develop culture. One of the significant features of the European Educational Research Association (EERA) as an organisation is that many of its activities are run by people on a voluntary basis. Apart from a small office, now in Berlin, which oversees and handles the everyday management, participation on Council, reviewing and programming for ECER (European Conference on Educational Research), managing networks, etc. are all undertaken as voluntary work by academics from across Europe (and beyond). From the large group of people who are currently sustaining these activities, many have participated from the beginning, but many others, after having been once at the conference, returned and got engaged in the work, for instance within one of the networks. Among the many who participate in EERA activities, there is a diversity of reasons for doing so, but there seems to be something which is recurring in what people say about why they do it. One of these recurring ideas is that the discursive norms of the organisation are enforced in the context of welcoming people and ideas, and second, there exists an intellectual generosity and egalitarianism which encourages newcomers to participate rather than protect themselves. We believe that this tells something about what EERA and ECER are about.
Resumo:
Traditional knowledge associated with genetic resources (TKaGRs) is acknowledged as a valuable resource. Its value draws from economic, social, cultural, and innovative uses. This value places TK at the heart of competing interests as between indigenous peoples who hold it and depend on it for their survival, and profitable industries which seek to exploit it in the global market space. The latter group seek, inter alia, to advance and maintain their global competitiveness by exploiting TKaGRs leads in their research and development activities connected with modern innovation. Biopiracy remains an issue of central concern to the developing world and has emerged in this context as a label for the inequity arising from the misappropriation of TKaGRs located in the South by commercial interests usually located in the North. Significant attention and resources are being channeled at global efforts to design and implement effective protection mechanisms for TKaGRs against the incidence of biopiracy. The emergence and recent entry into force of the Nagoya Protocol offers the latest example of a concluded multilateral effort in this regard. The Nagoya Protocol, adopted on the platform of the Convention on Biological Diversity (CBD), establishes an open-ended international access and benefit sharing (ABS) regime which is comprised of the Protocol as well as several complementary instruments. By focusing on the trans-regime nature of biopiracy, this thesis argues that the intellectual property (IP) system forms a central part of the problem of biopiracy, and so too to the very efforts to implement solutions, including through the Nagoya Protocol. The ongoing related work within the World Intellectual Property Organization (WIPO), aimed at developing an international instrument (or a series of instruments) to address the effective protection of TK, constitutes an essential complementary process to the Nagoya Protocol, and, as such, forms a fundamental element within the Nagoya Protocol’s evolving ABS regime-complex. By adopting a third world approach to international law, this thesis draws central significance from its reconceptualization of biopiracy as a trans-regime concept. By construing the instrument(s) being negotiated within WIPO as forming a central component part of the Nagoya Protocol, this dissertation’s analysis highlights the importance of third world efforts to secure an IP-based reinforcement to the Protocol for the effective eradication of biopiracy.
Resumo:
This thesis is devoted to studying two historical philosophical events that happened in the West and the East. A metaphysical crisis stimulated Kant’s writings during his late critical period towards the notion of the supersensible. It further motivated a methodological shift and his coining of reflective judgment, which eventually brought about a systemic unfolding of his critical philosophy via Kantian moral teleology. Zhu Xi and his Neo-Confucian contemporaries confronted a transformed intellectual landscape resulting from the Neo-Daoist and Buddhist discourses of “what is beyond the form”. The revival of Confucianism required a method in order to relocate the formless Dao back into daily life and to reconstruct a meta-ethical foundation within a social context. This led to the Neo-Confucian recasting of “investigation of things” from The Great Learning via complex hermeneutic operations. By the respective investigation on, as well as the comparative analysis of the two events, I reveal the convergence and incommensurability between the two distinct cultural traditions concerning the metaphysical quests, the mechanism of intellectual development, and moral teleology, so as to capture the intrinsic characteristics of philosophical research in general.
Resumo:
Both basic and applied research on the construction, implementation, maintenance, and evaluation of classification schemes is called classification theory. If we employ Ritzer’s metatheoretical method of analysis on the over one-hundred year-old body of literature, we can see categories of theory emerge. This paper looks at one particular part of knowledge organization work, namely classification theory, and asks 1) what are the contours of this intellectual space, and, 2) what have we produced in the theoretical reflection on con- structing, implementing, and evaluating classification schemes? The preliminary findings from this work are that classification theory can be separated into three kinds: foundational classification theory, first-order classification theory, and second-order classification theory, each with its own concerns and objects of study.
Resumo:
The relationship between career counseling and psychotherapy is not a new subject. The debate allows the affirmation of career counseling as a dimension of personal counseling and recognizes the close relationship between psychosocial and career issues (Blustein & Spengler, 1995). The connection between these two approaches paves the way for the integration of career counseling with psychotherapy. Indeed, the inseparability of mental health and career issues frequently leads psychotherapists to help their clients to deal with work satisfaction, underemployment or unemployment through psychotherapy. Moreover, when working with specific populations (e.g., people with intellectual disabilities and people with addiction or mental health problems), psychotherapy calls for occupational integration to consolidate and enhance therapeutic gains (Blustein, 1987; Jordan & Kahnweiler, 1995; Leff & Warner, 2006).
Resumo:
Bio-pedagogy is built on praxis, i.e. the interrelationship between reflection and innovative action where these two merge in the construction of senses to generate knowledge. Then, the following question arises: How is teaching understood? How can practice be renovated from the action-reflection-action in a recurring manner and in life itself? A way to search for those answers is the systematization of experiences –a modality of qualitative research. It promotes the transformation of a common practice, based on knowledge building by holistic approaches to the educational process complexity. The systematization of bio-pedagogical experiences involves self-organization, joy, uncertainty and passion; it respects freedom and autonomy, and generates relational spaces, which promote creative processes in learning.
Resumo:
Universidade Estadual de Campinas . Faculdade de Educação Física
A dimensão simbolica do recreio na escola de 1o. grau : uma analise a partir das praticas cotidianas
Resumo:
Universidade Estadual de Campinas. Faculdade de Educação Física
Resumo:
Universidade Estadual de Campinas . Faculdade de Educação Física