983 resultados para Chinese identity
Resumo:
Chinese Australians consistently outperform their peers in mathematics and according to QUT researcher Michael Mu this is not only because of pushy parents or motivated students.
Resumo:
Objectives: To develop and test preliminary reliability and validity of a Self-Efficacy Questionnaire for Chinese Family Caregivers (SEQCFC). Methods: A cross-sectional survey of 196 family caregivers (CGs) of people with dementia (CGs) was conducted to determine the factor structure of a SEQCFC of people with dementia. Following factor analyses, preliminary testing was performed, including internal consistency, 4-week test retest reliability, and construct and convergent validity. Results: Factor analyses with direct oblimin rotation were performed. Eight items were removed and five subscales(selfefficacy for gathering information about treatment, symptoms and health care; obtaining support; responding to behaviour disturbances; managing household, personal and medical care; and managing distress associated with caregiving) were identified. The Cronbach’s alpha coefficients for the whole scale and for each subscale were all over 0.80. The 4-week testretest reliabilities for the whole scale and for each subscale ranged from 0.64 to 0.85. The convergent validity was acceptable. Conclusions: Evidence for the preliminary testing of the SEQCFC was encouraging. A future follow-up study using confirmatory factor analysis with a new sample from different recruitment centres in Shanghai will be conducted. Future psychometric property testings of the questionnaire will be required for CGs from other regions of mainland China.
Resumo:
A review of the 6th APT focusing on the work and performance of Rohan Wealleans
Resumo:
In this paper we examine automated Chinese to English link discovery in Wikipedia and the effects of Chinese segmentation and Chinese to English translation on the hyperlink recommendation. Our experimental results show that the implemented link discovery framework can effectively recommend Chinese-to-English cross-lingual links. The techniques described here can assist bi-lingual users where a particular topic is not covered in Chinese, is not equally covered in both languages, or is biased in one language; as well as for language learning.
Resumo:
Abstract: The paper investigates the geographical mobility of creative workers in China,focusing on the authors’ survey of workers in the animation industry. More specifically,the authors use the Reilly-Converse model and GIS tools to probe the locational choices of Chinese animation workers in Beijing and Shanghai by analyzing such factors of spatial attractiveness as home town, place of residence, and university from which the worker graduated. The paper compares the creative milieus in Beijing and Shanghai, and demonstrates that the “personal trajectory” of human capital is a key determinant of occupational location. The results of the authors’ survey highlight the limitations of Richard Florida’s 3T theory in the Chinese context.
Resumo:
The increase of online services, such as eBanks, WebMails, in which users are verified by a username and password, is increasingly exploited by Identity Theft procedures. Identity Theft is a fraud, in which someone pretends to be someone else is order to steal money or get other benefits. To overcome the problem of Identity Theft an additional security layer is required. Within the last decades the option of verifying users based on their keystroke dynamics was proposed during login verification. Thus, the imposter has to be able to type in a similar way to the real user in addition to having the username and password. However, verifying users upon login is not enough, since a logged station/mobile is vulnerable for imposters when the user leaves her machine. Thus, verifying users continuously based on their activities is required. Within the last decade there is a growing interest and use of biometrics tools, however, these are often costly and require additional hardware. Behavioral biometrics, in which users are verified, based on their keyboard and mouse activities, present potentially a good solution. In this paper we discuss the problem of Identity Theft and propose behavioral biometrics as a solution. We survey existing studies and list the challenges and propose solutions.
Resumo:
This thesis examines online spoof videos in China. It shows the relationship between user-created content and change and how such videos are impacting on social memory. In the West, we are witnessing two outstanding trends in media. On the one hand, media are turning more "demotic" (Turner, 2006) and "participatory" (Jenkins, 2006), whereby lay audiences use popular media for identity formation, representation and association, reconfiguring the media and cultural landscape, and rendering invalid the old paradigm based on the dichotomy of audience and author, creator and consumer, expert and amateur. On the other hand, in both mainstream media and user-creation online there is a trend towards "silly citizenship", with comedy, send-ups and spoofs that used to reside in the margin propelled to the central stage in both pleasure and politics (Hartley, 2010), as is shown in the rising popularity of the Daily Show, Colbert Report, and spoof videos in elections ,e.g. the 2008 presidential election in US (Gray, Jones, & Thompson, 2009; Tryon, 2008). User generated content—and spoof subcultures—is now much a debated phenomenon in China. However, with different political (one party rule and censorship) and cultural (media regarded mainly as instrument for education and social stabilization instead of a critical fourth estate) configurations, will the social and cultural impacts of the two trends in the West be as the same in China? If not, what will be the specificities in the China context? The project starts with a historical review of popular culture and user-created content in China, before turning to spoof videos and looking at how they are produced and shared, travel and diffused on the Internet, and how the communities and sub-cultures forming and emerging around spoof videos are changing the overall cultural landscape in China. By acting as a participant observer in online video sharing sites and conducting face-to face as well as online interviews, I identify lead users and creators of spoof videos and the social networks emerging around them. I call these lead users "skill hubs" and their networks "liquid communities", foregrounding the fact that their appeal doesn’t come from their amicable personality, but rather from their creative skills; and that the networks surrounding them are in a permanent flux, with members coming and going as they see fit. I argue that the "liquidness" (Bauman, 2000) of these communities is what makes them constantly creative and appealing. Textual analysis of online videos, their comments and derivatives are conducted to tease out the uses that that can be made of spoof videos, namely as phatic communication, as alternative memory and as political engagement. Through these analyses I show that spoof videos constitute not only a space where young generations can engage with each other, communicate their anger and dissatisfaction, fun and hope, and where they participate in socio-cultural and political debates, but also create a space where they can experiment with their new skills, new ideas, and new citizenship. The rise of spoof videos heralds the beginning of a trend in popular culture in contemporary China towards the "canonization of the jester" and the dethroning of the establishment. I also argue that a historical perspective is needed to understand the current surge of use creativity and user activism in China, and that many forms of popular media we experience today have their antecedents in various stages of Chinese history. The entrenched "control-resistance" binary is inadequate in interpreting the rich, flux and multilayered Internet space in China.
Resumo:
Infrared spectroscopy has been used to characterize and compare four palygorskite mineral samples from China. The position of the main bands identified by infrared spectra is similar, but there are some differences in intensity, which are significant. In addition, several additional bands are observed in the spectra of palygorskite and their impurities. This variability is attributed to differences in the geological environment, such as the degree of weathering and the extent of transportation of the minerals during formation or deposition, and the impurity content in these palygorskites. The bands of water and hydroxyl groups in these spectra of palygorskite samples have been studied. The characteristic band of palygorskite is observed at 1195 cm�1. Another four bands observed at 3480, 3380, 3266 and 3190 cm�1 are attributed to the water molecules in the palygorskite structure. These results suggest that the infrared spectra of palygorskites mineral from different regions are decided not only by the main physicochemical properties of palygorskite, but also by the amount and kind of impurities.
Resumo:
In the 21st century mathematics proficiency is synonymous with a numerate citizenry. In the past few decades young children’s ability to reason mathematically and develop mathematical proficiencies has been recognised. This paper explores the history of early childhood mathematics (ECME) that may explicate differences in Chinese and Australian contexts. Results of this review established that China and Australia are diametrically positioned in ECME. Influencing each countries philosophies and practices are their cultural beliefs. ECME in China and Australia must be culturally sustainable to achieve excellent outcomes for young children. Ongoing critique and review is necessary to ensure that ECME is meeting the needs of all teachers and children in their particular context. China and Australia with their rich contrasting philosophies can assist each other in their journeys to create exemplary ECME for the 21st century.
Resumo:
Internet services are important part of daily activities for most of us. These services come with sophisticated authentication requirements which may not be handled by average Internet users. The management of secure passwords for example creates an extra overhead which is often neglected due to usability reasons. Furthermore, password-based approaches are applicable only for initial logins and do not protect against unlocked workstation attacks. In this paper, we provide a non-intrusive identity verification scheme based on behavior biometrics where keystroke dynamics based-on free-text is used continuously for verifying the identity of a user in real-time. We improved existing keystroke dynamics based verification schemes in four aspects. First, we improve the scalability where we use a constant number of users instead of whole user space to verify the identity of target user. Second, we provide an adaptive user model which enables our solution to take the change of user behavior into consideration in verification decision. Next, we identify a new distance measure which enables us to verify identity of a user with shorter text. Fourth, we decrease the number of false results. Our solution is evaluated on a data set which we have collected from users while they were interacting with their mail-boxes during their daily activities.
Resumo:
Nowadays people heavily rely on the Internet for information and knowledge. Wikipedia is an online multilingual encyclopaedia that contains a very large number of detailed articles covering most written languages. It is often considered to be a treasury of human knowledge. It includes extensive hypertext links between documents of the same language for easy navigation. However, the pages in different languages are rarely cross-linked except for direct equivalent pages on the same subject in different languages. This could pose serious difficulties to users seeking information or knowledge from different lingual sources, or where there is no equivalent page in one language or another. In this thesis, a new information retrieval task—cross-lingual link discovery (CLLD) is proposed to tackle the problem of the lack of cross-lingual anchored links in a knowledge base such as Wikipedia. In contrast to traditional information retrieval tasks, cross language link discovery algorithms actively recommend a set of meaningful anchors in a source document and establish links to documents in an alternative language. In other words, cross-lingual link discovery is a way of automatically finding hypertext links between documents in different languages, which is particularly helpful for knowledge discovery in different language domains. This study is specifically focused on Chinese / English link discovery (C/ELD). Chinese / English link discovery is a special case of cross-lingual link discovery task. It involves tasks including natural language processing (NLP), cross-lingual information retrieval (CLIR) and cross-lingual link discovery. To justify the effectiveness of CLLD, a standard evaluation framework is also proposed. The evaluation framework includes topics, document collections, a gold standard dataset, evaluation metrics, and toolkits for run pooling, link assessment and system evaluation. With the evaluation framework, performance of CLLD approaches and systems can be quantified. This thesis contributes to the research on natural language processing and cross-lingual information retrieval in CLLD: 1) a new simple, but effective Chinese segmentation method, n-gram mutual information, is presented for determining the boundaries of Chinese text; 2) a voting mechanism of name entity translation is demonstrated for achieving a high precision of English / Chinese machine translation; 3) a link mining approach that mines the existing link structure for anchor probabilities achieves encouraging results in suggesting cross-lingual Chinese / English links in Wikipedia. This approach was examined in the experiments for better, automatic generation of cross-lingual links that were carried out as part of the study. The overall major contribution of this thesis is the provision of a standard evaluation framework for cross-lingual link discovery research. It is important in CLLD evaluation to have this framework which helps in benchmarking the performance of various CLLD systems and in identifying good CLLD realisation approaches. The evaluation methods and the evaluation framework described in this thesis have been utilised to quantify the system performance in the NTCIR-9 Crosslink task which is the first information retrieval track of this kind.
Resumo:
In July 2010, China announced the “National Plan for Medium and Long-term Education Reform and Development(2010-2020)” (PRC 2010). The Plan calls for an education system that: • promotes an integrated development which harnesses everyone’s talent; • combines learning and thinking; unifies knowledge and practice; • allows teachers to teach according to individuals’ needs; and • reforms education quality evaluation and personnel evaluation systems focusing on performance including character, knowledge, ability and other factors. This paper discusses the design and implementation of a Professional Learning Program (PLP) undertaken by 432 primary, middle and high school teachers in China. The aim of this initiative was to develop adaptive expertise in using technology that facilitated innovative science and technology teaching and learning as envisaged by the Chinese Ministry of Education’s (2010-2020) education reforms. Key principles derived from literature about professional learning and scaffolding of learning informed the design of the PLP. The analysis of data revealed that the participants had made substantial progress towards the development of adaptive expertise. This was manifested not only by advances in the participants’ repertoires of Subject Matter Knowledge and Pedagogical Content Knowledge but also in changes to their levels of confidence and identities as teachers. It was found that through time the participants had coalesced into a professional learning community that readily engaged in the sharing, peer review, reuse and adaption, and collaborative design of innovative science and technology learning and assessment activities.
Resumo:
Previous studies have enabled exact prediction of probabilities of identity-by-descent (IBD) in randommating populations for a few loci (up to four or so), with extension to more using approximate regression methods. Here we present a precise predictor of multiple-locus IBD using simple formulas based on exact results for two loci. In particular, the probability of non-IBD X ABC at each of ordered loci A, B, and C can be well approximated by XABC = XABXBC/XB and generalizes to X123. . .k = X12X23. . .Xk-1,k/ Xk-2, where X is the probability of non-IBD at each locus. Predictions from this chain rule are very precise with population bottlenecks and migration, but are rather poorer in the presence of mutation. From these coefficients, the probabilities of multilocus IBD and non-IBD can also be computed for genomic regions as functions of population size, time, and map distances. An approximate but simple recurrence formula is also developed, which generally is less accurate than the chain rule but is more robust with mutation. Used together with the chain rule it leads to explicit equations for non-IBD in a region. The results can be applied to detection of quantitative trait loci (QTL) by computing the probability of IBD at candidate loci in terms of identity-by-state at neighboring markers.
Resumo:
Academically gifted students are recognised as possessing considerable achievement potential. Yet many fail to perform at a level commensurate with their ability. Often gifted students in early adolescence are faced with a forced choice between fulfilment of potential and achieving stable positive relationships with peers. This choice can affect their achievement and may have far-reaching personal and social costs. This case study explored the viability of self-presentation theory to explain students' ways of negotiating their sense of self whilst developing public identity and the concomitant affects on achievement and the fulfilment of potential. It examined how gifted students moderate their images in their learning and extra-curricular environments. Further, the study identifies those self-presentation strategies adopted that either facilitate or hinder achievement. This study may assist parents, educators and school counsellors to provide greater support for gifted adolescents.
Resumo:
This research examines the effects of expectation (perceived attractiveness) on satisfaction, place identity, and place dependence. Place identity and place dependence are viewed as relational components of choice and relate to deeper needs. This study proposes that these two relational components depend on transactional expectations, which are emergent and determined by past experiences and visitor goals. In a theoretically elaborated and tested Structural Equation Model (SEM) this study assumes that these relationships vary according to intentions to return. The study addresses the conditions under which loyalty intentions influence the deeper place attachments (place identity and place dependence) that visitors associate with attractive cultural and natural destinations. The model is tested on a sample of 504 international tourists visiting Tanzania during fall 2010, and explains 59% of variance in the predicted dependent variables. The results are linked to a discussion on loyalty programs.