933 resultados para Marquette University. Slavic Institute.
Resumo:
As most of people know that all of mass media are state-owned in China, television stations are not exceptional to belong to the enormous state-owned system. But to date, with the economic reform in the broadcasting system and China entering into WTO, the television industry has increased greatly and the television market has matured with more and more competition. The players in China’s television industry have changed from the monologue of TV stations to multi roles of TV stations, production companies and overseas television companies, although TV stations are still the majority of China’s TV market. Especially, private television production companies are becoming more and more active in this market. In this paper, I will describe the development process and challenges of this group in China and ask whether the emergence of this group means for the whole China’s TV industry?
Resumo:
As most people know, all mass media, including television stations, are state-owned in China. However, with the economic reform in the broadcasting system and China entering the World Trade Organization (WTO), the television industry has expanded greatly and the television market has evolved, with an ensuing growth of competition. The players in China’s television industry have changed from a monologue of TV stations to stations that hold multiple roles and a growth of production companies and overseas television companies although the TV stations still dominate China’s television market. Private television production companies are, however, becoming increasingly active in this market.
Resumo:
In October 2008, the Australian Learning and Teaching Council (ALTC) released the final report for the commissioned project ePortfolio use by university students in Australia: Informing excellence in policy and practice. The Australian ePortfolio Project represented the first attempt to examine the breadth and depth of ePortfolio practice in the Australian higher education sector. The research activities included surveys of stakeholder groups in learning and teaching, academic management and human resource management, with respondents representing all Australian universities; a series of focus groups and semi-structured interviews which sought to explore key issues in greater depth; and surveys designed to capture students’ pre-course expectations and their post-course experiences of ePortfolio learning. Further qualitative data was collected through interviews with ‘mature users’ of ePortfolios. Project findings revealed that, while there was a high level of interest in the use of ePortfolios in terms of the potential to help students become reflective learners who were conscious of their personal and professional strengths and weaknesses, the state of play in Australian universities was very fragmented. The project investigation identified four individual, yet interrelated, contexts where strategies may be employed to support and foster effective ePortfolio practice in higher education: government policy, technical standards, academic policy, and learning and teaching. Four scenarios for the future were also presented with the goal of stimulating discussion about opportunities for stakeholder engagement. It is argued that the effective use of ePortfolios requires open dialogue and collaboration between the different stakeholders across this range of contexts.
Resumo:
This article reframes the concept of comprehension as a social and intellectual practice. It reviews current approaches to reading instruction for linguistically and culturally diverse and low socioeconomic students, noting an emphasis on comprehension as autonomous skills. The Four Resources model (Freebody & Luke, 1990) is used to make the case for the integration of comprehension instruction with an emphasis on student cultural and community knowledge, and substantive intellectual and sociocultural content in elementary school curricula. Illustrations are drawn from research underway on the teaching of literacy in primary schools in low SES communities.
Resumo:
An interview on literacy at McGill University, 2003.
Resumo:
Identifying an individual from surveillance video is a difficult, time consuming and labour intensive process. The proposed system aims to streamline this process by filtering out unwanted scenes and enhancing an individual's face through super-resolution. An automatic face recognition system is then used to identify the subject or present the human operator with likely matches from a database. A person tracker is used to speed up the subject detection and super-resolution process by tracking moving subjects and cropping a region of interest around the subject's face to reduce the number and size of the image frames to be super-resolved respectively. In this paper, experiments have been conducted to demonstrate how the optical flow super-resolution method used improves surveillance imagery for visual inspection as well as automatic face recognition on an Eigenface and Elastic Bunch Graph Matching system. The optical flow based method has also been benchmarked against the ``hallucination'' algorithm, interpolation methods and the original low-resolution images. Results show that both super-resolution algorithms improved recognition rates significantly. Although the hallucination method resulted in slightly higher recognition rates, the optical flow method produced less artifacts and more visually correct images suitable for human consumption.
Resumo:
We propose to design a Custom Learning System that responds to the unique needs and potentials of individual students, regardless of their location, abilities, attitudes, and circumstances. This project is intentionally provocative and future-looking but it is not unrealistic or unfeasible. We propose that by combining complex learning databases with a learner’s personal data, we could provide all students with a personal, customizable, and flexible education. This paper presents the initial research undertaken for this project of which the main challenges were to broadly map the complex web of data available, to identify what logic models are required to make the data meaningful for learning, and to translate this knowledge into simple and easy-to-use interfaces. The ultimate outcome of this research will be a series of candidate user interfaces and a broad system logic model for a new smart system for personalized learning. This project is student-centered, not techno-centric, aiming to deliver innovative solutions for learners and schools. It is deliberately future-looking, allowing us to ask questions that take us beyond the limitations of today to motivate new demands on technology.
Resumo:
An Alternate Reality Game (ARG) is a unique experience that blurs the edges between our everyday lives and imagined game worlds. Players are invited to interact with each other and fictional characters using familiar tools such as emails, websites, telephones, and sometimes newspapers, radio and television. ARGs come in all shapes and sizes, tell a variety of different stories and inspire all kinds of interactions between people, their networks and the very streets in which they live. Some ARGs simply immerse you in fictional scenarios and indulge you in quirky challenges. While others reveal hidden histories of a city and teach us about important political causes. But the most exciting thing about ARGs is that they have the potential to inspire participants to imagine their everyday tools and places as resources for their own creative endeavors. Deb Polson will be presenting some of the most inspiring ARGs of recent years and revealing some of the design techniques that were used to create them. Most significantly Deb will discuss ways in which educators can imagine using ARGs as rich teaching tools that inspire collaborative learning and motivate students to engage in all kinds of subject matter.
Resumo:
Young people are increasingly using social networking sites (SNSs), like Myspace and Facebook, to engage with others. The use of SNSs can have both positive and negative effects on the individual; however, few research studies identify the types of people who frequent these Internet sites. This study sought to predict young adults’ use of SNSs and addictive tendency towards the use of SNSs from their personality characteristics and levels of self-esteem. University students (N = 201), aged 17 to 24 years, reported their use of SNSs and addictive tendencies for SNSs use, and completed the NEO Five-Factor Personality Inventory 1 and the Coopersmith Self-Esteem Inventory.2 Multiple regression analyses revealed that, as a group, the personality and self-esteem factors significantly predicted both level of SNS use and addictive tendency but did not explain a large amount of variance in either outcome measure. The findings indicated that extraverted and unconscientious individuals reported higher levels of both SNS use and addictive tendencies. Future research should attempt to identify which other psychosocial characteristics explain young people’s level of use and propensity for addictive tendencies for these popular Internet sites.
Resumo:
The current study examined the influence of psychosocial constructs, from a theory of planned behavior (TPB) perspective, to predict university students’ (N = 159) use of a newly offered on-line learning tool, enhanced podcasts. Pre-semester, students completed questionnaires assessing the TPB predictors (attitude, subjective norm, perceived behavioral control) related to intended enhanced podcast use until the middle of semester. Mid-semester, students completed similar items relating to podcast use until the end of semester. Self-report measures of podcast use were obtained at the middle and end of semester. At both time points, students’ attitudes predicted their intentions and, at the initial time point, subjective norm also predicted intended podcast use. An examination of the beliefs underlying attitudes, the only construct to predict intentions at both time points, revealed differences between those students higher, rather than lower on intentions to use the podcasts, especially for the perceived educational benefits of podcast use later in the semester. Intentions to use enhanced podcasting only predicted self-reported use in the second half of the semester. Overall, this study identified some of the determinants which should be considered by those aiming to encourage student use of novel on-line educational tools.
Resumo:
This article examines the importance of accurate classification and identification of risk with particular reference to the problem of adverse selection. It is argued that, historically, this concern was the paramount consideration influencing standard form contract formation and disclosure laws. The scope of its relevance today however is less apparent in that contemporary insurance contracting is conducted in a vastly different environment from that which prevailed at the time Lloyd's was better known as a coffee house. Accordingly, the second part of this article looks at the contemporary framework of information disclosure and those dynamics within it designed to elicit information weighing on risk forecasting : specifically, (a) direct inquiry and testing requirements; (b) signaling - or incentive based structuring of insurance contractual and (c) bargaining in the shadow of the utmost good faith doctrine. Finally, certain conclusions arising out of contemporary and historical economic considerations underpinning disclosure in insurance law are outlined.
Resumo:
Monitoring Internet traffic is critical in order to acquire a good understanding of threats to computer and network security and in designing efficient computer security systems. Researchers and network administrators have applied several approaches to monitoring traffic for malicious content. These techniques include monitoring network components, aggregating IDS alerts, and monitoring unused IP address spaces. Another method for monitoring and analyzing malicious traffic, which has been widely tried and accepted, is the use of honeypots. Honeypots are very valuable security resources for gathering artefacts associated with a variety of Internet attack activities. As honeypots run no production services, any contact with them is considered potentially malicious or suspicious by definition. This unique characteristic of the honeypot reduces the amount of collected traffic and makes it a more valuable source of information than other existing techniques. Currently, there is insufficient research in the honeypot data analysis field. To date, most of the work on honeypots has been devoted to the design of new honeypots or optimizing the current ones. Approaches for analyzing data collected from honeypots, especially low-interaction honeypots, are presently immature, while analysis techniques are manual and focus mainly on identifying existing attacks. This research addresses the need for developing more advanced techniques for analyzing Internet traffic data collected from low-interaction honeypots. We believe that characterizing honeypot traffic will improve the security of networks and, if the honeypot data is handled in time, give early signs of new vulnerabilities or breakouts of new automated malicious codes, such as worms. The outcomes of this research include: • Identification of repeated use of attack tools and attack processes through grouping activities that exhibit similar packet inter-arrival time distributions using the cliquing algorithm; • Application of principal component analysis to detect the structure of attackers’ activities present in low-interaction honeypots and to visualize attackers’ behaviors; • Detection of new attacks in low-interaction honeypot traffic through the use of the principal component’s residual space and the square prediction error statistic; • Real-time detection of new attacks using recursive principal component analysis; • A proof of concept implementation for honeypot traffic analysis and real time monitoring.
The experience of China-educated nurses working in Australia : a symbolic interactionist perspective
Resumo:
Transnational nurse migration is a growing phenomenon. However, relatively little is known about the experiences of immigrant nurses and particularly about non-English speaking background nurses who work in more economically developed countries. Informed by a symbolic interactionist framework, this research explored the experience of China-educated nurses working in the Australian health care system. Using a modified constructivist grounded theory method, the main source of data were 46 face to face in-depth interviews with 28 China-educated nurses in two major cities in Australia. The key findings of this research are fourfold. First, the core category developed in this study is reconciling different realities, which inserts a theoretical understanding beyond the concepts of acculturation, assimilation, and integration. Second, in contrast to the dominant discourse which reduces the experience of immigrant nurses to language and culture, this research concludes that it was not just about language and nor was it simply about culture. Third, rather than focus on the negative aspects of difference as in the immigration literature and in the practice of nursing, this research points to the importance of recognising the social value of difference. Finally, the prevailing view that the experience of immigrant nurses is largely negative belies its complexities. This research concludes that it is naïve to define the experience as either good or bad. Rather, ambivalence was the essential feature of the experience and a more appropriate theoretical concept. This research produced a theoretical understanding of the experience of China-educated nurses working in Australia. The findings may not only inform Chinese nurses who wish to immigrate but also contribute to the implementation of more effective support services for immigrant nurses in Australian health care organisations.