714 resultados para Educational Computing
Resumo:
Education is often understood as a process whereby children come to conform to the norms teachers believe should govern our practices. This picture problematically presumes that educators know in advance what it means for children to go on the way that is expected of them. In this essay Viktor Johansson suggests a revision of education, through the philosophy of Stanley Cavell, that can account for both the attunement in our practices and the possible dissonance that follows when the teacher and child do not go on together. There is an anxiety generated by the threat of disharmony in our educational undertakings that may drive teachers toward philosophy in educational contexts. Here Johansson offers a philosophical treatment of this intellectual anxiety that teachers may experience when they, upon meeting dissonant children, search for epistemic justifications of their practices—a treatment whereby dissonant children can support teachers in dissolving their intellectual frustrations.
Resumo:
Learning from anywhere anytime is a contemporary phenomenon in the field of education that is thought to be flexible, time and cost saving. The phenomenon is evident in the way computer technology mediates knowledge processes among learners. Computer technology is however, in some instances, faulted. There are studies that highlight drawbacks of computer technology use in learning. In this study we aimed at conducting a SWOT analysis on ubiquitous computing and computer-mediated social interaction and their affect on education. Students and teachers were interviewed on the mentioned concepts using focus group interviews. Our contribution in this study is, identifying what teachers and students perceive to be the strength, weaknesses, opportunities and threats of ubiquitous computing and computer-mediated social interaction in education. We also relate the findings with literature and present a common understanding on the SWOT of these concepts. Results show positive perceptions. Respondents revealed that ubiquitous computing and computer-mediated social interaction are important in their education due to advantages such as flexibility, efficiency in terms of cost and time, ability to acquire computer skills. Nevertheless disadvantages where also mentioned for example health effects, privacy and security issues, noise in the learning environment, to mention but a few. This paper gives suggestions on how to overcome threats mentioned.
Resumo:
In the field of Information and Communication Technologies for Development (ICT4D) ICT use in education is well studied. Education is often seen as a pre-requisite for development and ICTs are believed to aid in education, e.g. to make it more accessible and to increase its quality. In this paper we study the access and use of ICT in a study circle (SC) education program in the south coast of Kenya. The study is qualitative reporting results based on interviews and observations with SC participants, government officers and SC coordinators and teachers. The study builds on the capability approach perspective of development where individuals’ opportunities and ability to live a life that they value are focused. The aim of the study is to investigate the capability outcomes enabled through the capability inputs access and use of ICT in education as well as the factors that enabled and/or restricted the outcomes. Findings show that many opportunities have been enabled such as an increase in the ability to generate an income, learning benefits, community development and basic human development (e.g. literacy and self-confidence). However, conversion factors such as a poorly developed infrastructure and poor IT literacy prevent many of the individuals from taking full advantage of the ICT and the opportunities it enables.
Resumo:
The ever increasing spurt in digital crimes such as image manipulation, image tampering, signature forgery, image forgery, illegal transaction, etc. have hard pressed the demand to combat these forms of criminal activities. In this direction, biometrics - the computer-based validation of a persons' identity is becoming more and more essential particularly for high security systems. The essence of biometrics is the measurement of person’s physiological or behavioral characteristics, it enables authentication of a person’s identity. Biometric-based authentication is also becoming increasingly important in computer-based applications because the amount of sensitive data stored in such systems is growing. The new demands of biometric systems are robustness, high recognition rates, capability to handle imprecision, uncertainties of non-statistical kind and magnanimous flexibility. It is exactly here that, the role of soft computing techniques comes to play. The main aim of this write-up is to present a pragmatic view on applications of soft computing techniques in biometrics and to analyze its impact. It is found that soft computing has already made inroads in terms of individual methods or in combination. Applications of varieties of neural networks top the list followed by fuzzy logic and evolutionary algorithms. In a nutshell, the soft computing paradigms are used for biometric tasks such as feature extraction, dimensionality reduction, pattern identification, pattern mapping and the like.
Resumo:
Background. Nurses' research utilization (RU) as part of evidence-based practice is strongly emphasized in today's nursing education and clinical practice. The primary aim of RU is to provide high-quality nursing care to patients. Data on newly graduated nurses' RU are scarce, but a predominance of low use has been reported in recent studies. Factors associated with nurses' RU have previously been identified among individual and organizational/contextual factors, but there is a lack of knowledge about how these factors, including educational ones, interact with each other and with RU, particularly in nurses during the first years after graduation. The purpose of this study was therefore to identify factors that predict the probability for low RU among registered nurses two years after graduation. Methods. Data were collected as part of the LANE study (Longitudinal Analysis of Nursing Education), a Swedish national survey of nursing students and registered nurses. Data on nurses' instrumental, conceptual, and persuasive RU were collected two years after graduation (2007, n = 845), together with data on work contextual factors. Data on individual and educational factors were collected in the first year (2002) and last term of education (2004). Guided by an analytic schedule, bivariate analyses, followed by logistic regression modeling, were applied. Results. Of the variables associated with RU in the bivariate analyses, six were found to be significantly related to low RU in the final logistic regression model: work in the psychiatric setting, role ambiguity, sufficient staffing, low work challenge, being male, and low student activity. Conclusions. A number of factors associated with nurses' low extent of RU two years postgraduation were found, most of them potentially modifiable. These findings illustrate the multitude of factors related to low RU extent and take their interrelationships into account. This knowledge might serve as useful input in planning future studies aiming to improve nurses', specifically newly graduated nurses', RU.
Resumo:
Architectural description languages (ADLs) are used to specify high-level, compositional view of a software application. ADLs usually come equipped with a rigourous state-transition style semantics, facilitating specification and analysis of distributed and event-based systems. However, enterprise system architectures built upon newer middleware (implementations of Java’s EJB specification, or Microsoft’s COM+/ .NET) require additional expressive power from an ADL. The TrustME ADL is designed to meet this need. In this paper, we describe several aspects of TrustME that facilitate specification and anlysis of middleware-based architectures for the enterprise.