854 resultados para Philosophical Foundations
Resumo:
Background: The prevalence of hearing loss is considerably higher in individuals in residential care than in people within the community-dwelling population, and yet hearing aids and hearing services are relatively underused. Care staff have a key role in supporting access to services. Objectives: This study identifies staff perspectives on hearing loss and their views about potential hearing service improvements. Study design: A four-stage mixed methods study was used, made up of qualitative interviews, observation, a survey and a stakeholder involvement meeting. Results: The qualitative stages indicated that staff were concerned about their levels of interaction with residents. Staff considered maximizing communication as part of their professional role. The quantitative survey indicated that these views were widely held by staff, and the stakeholder stage identified the need for social support and dedicated staff training opportunities. Conclusion: Care home staff regard communication as a shared issue. Future interventions could enhance access to hearing services and provide care home staff with training in hearing loss and hearing aid management. © 2013 Informa Healthcare.
Resumo:
The conceptual foundations of the models and procedures for prediction of the avalanche-dangerous situations initiation are considered. The interpretation model for analysis of the avalanche-dangerous situations initiation based on the definition of probabilities of correspondence of studied parameters to the probabilistic distributions of avalanche-dangerous or avalanche non-dangerous situations is offered. The possibility to apply such a model to the real data is considered. The main approaches to the use of multiple representations for the avalanche dangerous situations initiation analysis are generalized.
Resumo:
In the paper, methodological aspects of nowadays high engineering education are considered. Thoughts generalizing author’s long-term experience are set forth. Recommendations on the improvement of pedagogical process and training system for young teachers are given.
Resumo:
Traditionally, research on model-driven engineering (MDE) has mainly focused on the use of models at the design, implementation, and verification stages of development. This work has produced relatively mature techniques and tools that are currently being used in industry and academia. However, software models also have the potential to be used at runtime, to monitor and verify particular aspects of runtime behavior, and to implement self-* capabilities (e.g., adaptation technologies used in self-healing, self-managing, self-optimizing systems). A key benefit of using models at runtime is that they can provide a richer semantic base for runtime decision-making related to runtime system concerns associated with autonomic and adaptive systems. This book is one of the outcomes of the Dagstuhl Seminar 11481 on models@run.time held in November/December 2011, discussing foundations, techniques, mechanisms, state of the art, research challenges, and applications for the use of runtime models. The book comprises four research roadmaps, written by the original participants of the Dagstuhl Seminar over the course of two years following the seminar, and seven research papers from experts in the area. The roadmap papers provide insights to key features of the use of runtime models and identify the following research challenges: the need for a reference architecture, uncertainty tackled by runtime models, mechanisms for leveraging runtime models for self-adaptive software, and the use of models at runtime to address assurance for self-adaptive systems.
Resumo:
Computing and information technology have made significant advances. The use of computing and technology is a major aspect of our lives, and this use will only continue to increase in our lifetime. Electronic digital computers and high performance communication networks are central to contemporary information technology. The computing applications in a wide range of areas including business, communications, medical research, transportation, entertainments, and education are transforming local and global societies around the globe. The rapid changes in the fields of computing and information technology also make the study of ethics exciting and challenging, as nearly every day, the media report on a new invention, controversy, or court ruling. This tutorial will explore a broad overview on the scientific foundations, technological advances, social implications, and ethical and legal issues related to computing. It will provide the milestones in computing and in networking, social context of computing, professional and ethical responsibilities, philosophical frameworks, and social, ethical, historical, and political implications of computer and information technology. It will outline the impact of the tremendous growth of computer and information technology on people, ethics and law. Political and legal implications will become clear when we analyze how technology has outpaced the legal and political arenas.
Resumo:
This dissertation explores the nature of Jose Marti's ethical ideas in relation to the rise of late Nineteenth Century Modernity and in tandem with the deconstruction and subversion of the principal constituencies of colonial and aesthetic discourses. Marti proposes a new paradigm that question the insatiable pursuit of novelty, the hostility towards tradition, the historical perspectivism and a critical stance with regard to social aesthetic Modernity. He also questions the cult of reason, the linear historicism, and the teleological progress framed in philosophical utilitarian pragmatism of bourgeois Modernity. His radical criticism of the structures and institutions of the hegemonic power of the modern state override the ontological and epistemological foundations of Modernity. Marti's deconstruction of the fundamental discourses of euro-centristic Occidental culture leads him, through his ethical writings, to an arqueology of Native American civilizations, thus reinserting, within the false premises of European universalism, his counter-discourse of tradition and the voice of the Other.
Resumo:
Overview and statistics on the medical curriculum at Arizona, Emory, FIU, Rochester, and Vermont.
Resumo:
Adolescents are at the greatest risk for victimization and perpetration of sexual assault. This paper examines the current trends in literacy education which marginalize aesthetic reading experiences and using reader response theory, and argues that young adult literature may provide an opportunity to reduce rape myth acceptance in adolescents.
Resumo:
This article discusses the results of pioneer research done by Michigan State University's School of Hotel, Restaurant and Institutional Management researchers, in cooperation with the Japanese Management Association, on the foundations of Japanese lodging industry leadership. While the results presented here simply represent the opinions of CEOs and presidents in Japan's lodging industry, the research offers an insight into leadership foundations and the results provide a guide for developing leadership skills in those who aspire to be future leaders in Japan’s lodging industry
Resumo:
This study used content analysis to interpret and evaluate outcome evaluation matrices of undergraduate Global Learning foundations courses. The findings revealed a lack of uniformity in the faculty members’ interpretation and implementation of global learning components in the coursework. Successful teaching practices and challenges were identified and classified.
Resumo:
The object of this dissertation is to record and analyze the foreign policy of the Sultanate of Oman from the early twentieth century until 2004. It challenges the central assumption of the contemporary scholarship on the subject that Muscat's modern foreign policy begins in 1970. It is often presumed that the pre-1970 era does not merit a thorough investigation to understand Muscat's modus operandi today. This study argues that for a comprehensive understanding of Muscat's foreign policy since 1970, the frontier of the historical analysis of Oman's regional and international involvement should be pushed back to the 1930's, when the young Sultan Said assumed power over the country divided by the "Treaty" or the "Agreement" of Sib. Indeed, the thrust of this research lies at once in repudiating the conventional wisdom regarding both the persona of Sultan Said and the customary political/historical narrative of Said's reign. The critical analysis of this period is utilized to rebut the pervasive and largely inaccurate historical narrative of the events prior to 1970, to recount an original interpretation of the period, and to use the narrative as a preamble for subsequent foreign policy directions and initiatives. Furthermore, this dissertation covers the gaps in the literature resulting from the absence of any materials that either record or analyze Muscat's foreign policy from 1996 until 2004. In addition, his study provides new information and a fresh analysis of the international relations of the region, including great power rivalry, especially the competition between the United States and Great Britain, and the attitudes of major regional actors, such as Iran, Saudi Arabia, and Iraq. ^ The use of a thorough historical inquiry is vital to support the central claim of this dissertation; therefore, a large section of this dissertation is based almost exclusively on archival materials collected from the British Public Records Office, the University of Oxford and the Library of Congress. This project represents the most comprehensive use of archival materials on the subject matter to date. ^
Resumo:
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret information. For this reason, the past decade has seen growing interest in quantitative theories of information flow that allow us to quantify the information being leaked. Within these theories, the system is modeled as an information-theoretic channel that specifies the probability of each output, given each input. Given a prior distribution on those inputs, entropy-like measures quantify the amount of information leakage caused by the channel. ^ This thesis presents new results in the theory of min-entropy leakage. First, we study the perspective of secrecy as a resource that is gradually consumed by a system. We explore this intuition through various models of min-entropy consumption. Next, we consider several composition operators that allow smaller systems to be combined into larger systems, and explore the extent to which the leakage of a combined system is constrained by the leakage of its constituents. Most significantly, we prove upper bounds on the leakage of a cascade of two channels, where the output of the first channel is used as input to the second. In addition, we show how to decompose a channel into a cascade of channels. ^ We also establish fundamental new results about the recently-proposed g-leakage family of measures. These results further highlight the significance of channel cascading. We prove that whenever channel A is composition refined by channel B, that is, whenever A is the cascade of B and R for some channel R, the leakage of A never exceeds that of B, regardless of the prior distribution or leakage measure (Shannon leakage, guessing entropy leakage, min-entropy leakage, or g-leakage). Moreover, we show that composition refinement is a partial order if we quotient away channel structure that is redundant with respect to leakage alone. These results are strengthened by the proof that composition refinement is the only way for one channel to never leak more than another with respect to g-leakage. Therefore, composition refinement robustly answers the question of when a channel is always at least as secure as another from a leakage point of view.^
Resumo:
The object of this dissertation is to record and analyze the foreign policy of the Sultanate of Oman from the early twentieth century until 2004. It challenges the central assumption of the contemporary scholarship on the subject that Muscat's modern foreign policy begins in 1970. It is often presumed that the pre-1970 era does not merit a thorough investigation to understand Muscat's modus operandi today. This study argues that for a comprehensive understanding of Muscat's foreign policy since 1970, the frontier of the historical analysis of Oman's regional and international involvement should be pushed back to the 1930's, when the young Sultan Said assumed power over the country divided by the "Treaty" or the "Agreement" of Sib. Indeed, the thrust of this research lies at once in repudiating the conventional wisdom regarding both the persona of Sultan Said and the customary political/historical narrative of Said's reign. The critical analysis of this period is utilized to rebut the pervasive and largely inaccurate historical narrative of the events prior to 1970, to recount an original interpretation of the period, and to use the narrative as a preamble for subsequent foreign policy directions and initiatives. Furthermore, this dissertation covers the gaps in the literature resulting from the absence of any materials that either record or analyze Muscat's foreign policy from 1996 until 2004. In addition, his study provides new information and a fresh analysis of the international relations of the region, including great power rivalry, especially the competition between the United States and Great Britain, and the attitudes of major regional actors, such as Iran, Saudi Arabia, and Iraq. The use of a thorough historical inquiry is vital to support the central claim of this dissertation; therefore, a large section of this dissertation is based almost exclusively on archival materials collected from the British Public Records Office, the University of Oxford and the Library of Congress. This project represents the most comprehensive use of archival materials on the subject matter to date.
Resumo:
Information processing in the human brain has always been considered as a source of inspiration in Artificial Intelligence; in particular, it has led researchers to develop different tools such as artificial neural networks. Recent findings in Neurophysiology provide evidence that not only neurons but also isolated and networks of astrocytes are responsible for processing information in the human brain. Artificial neural net- works (ANNs) model neuron-neuron communications. Artificial neuron-glia networks (ANGN), in addition to neuron-neuron communications, model neuron-astrocyte con- nections. In continuation of the research on ANGNs, first we propose, and evaluate a model of adaptive neuro fuzzy inference systems augmented with artificial astrocytes. Then, we propose a model of ANGNs that captures the communications of astrocytes in the brain; in this model, a network of artificial astrocytes are implemented on top of a typical neural network. The results of the implementation of both networks show that on certain combinations of parameter values specifying astrocytes and their con- nections, the new networks outperform typical neural networks. This research opens a range of possibilities for future work on designing more powerful architectures of artificial neural networks that are based on more realistic models of the human brain.
Resumo:
Date of Acceptance: 13/07/2015