999 resultados para opening knowledge
Resumo:
Availability, Data Privacy and Copyrights – Opening Knowledge via Contracts and Pilots, discusses how in Aviisi-project of National Library of Finland, the digital contents, and their availability topics dealt together with pilot organizations
Resumo:
Open Education, and specifically the OER movement, seeks to provide universal access to knowledge, undermining the historical enclosure and the increasing privatisation of the public education system. In this paper we examine this aspiration by submitting the implicit theoretical assumptions of Open Education to the test of critical political economy. We acknowledge the Open Education movement's revolutionary potential but outline the inherent limitations of its current focus on the commons (property relations) rather than the social relations of capitalist production (wage work, the company) and because of this, argue that it will only achieve limited, rather than revolutionary, impact.
Resumo:
The Universitat Oberta de Catalunya (Open University of Catalonia, UOC) is an online university that makes extensive use of information and communication technologies to provide education. Ever since its establishment in 1995, the UOC has developed and tested methodologies and technological support services to meet the educational challenges posed by its student community and its teaching and management staff. The know-how it has acquired in doing so is the basis on which it has created the Open Apps platform, which is designed to provide access to open source technical applications, information on successful learning and teaching experiences, resources and other solutions, all in a single environment. Open Apps is an open, online catalogue, the content of which is available to all students for learning purposes, all IT professionals for downloading and all teachers for reusing.To contribute to the transfer of knowledge, experience and technology, each of the platform¿s apps comes with full documentation, plus information on cases in which it has been used and related tools. It is hoped that such transfer will lead to the growth of an external partner network, and that this, in turn, will result in improvements to the applications and teaching/learning practices, and in greater scope for collaboration.Open Apps is a strategic project that has arisen from the UOC's commitment to the open access movement and to giving knowledge and technology back to society, as well as its firm belief that sustainability depends on communities of interest.
Resumo:
Aesthetic knowledge comes from practitioners understanding the look, feel, smell, taste and sound of things. It is vital to work in many organizational contexts. In this paper, we explore aesthetic knowledge and knowing in organizations through detailed observation of design work in the architectural practice Edward Cullinan Architects. Through our research, we explore aesthetic knowledge in the context of architectural work, we unpack what it is, how it is generated, and how it is applied in design projects, shared between practitioners and developed at the level of the organization. Our analysis suggests that aesthetic knowledge plays an important part in organizational practice, not only as the symbolic context for work, but as an integral part of the work that people do. It suggests that aesthetic reflexivity, which involves an opening up and questioning of what is known, is experienced as part of practice as well as a `time out' from practice.
Resumo:
Traditionally, the formal scientific output in most fields of natural science has been limited to peer- reviewed academic journal publications, with less attention paid to the chain of intermediate data results and their associated metadata, including provenance. In effect, this has constrained the representation and verification of the data provenance to the confines of the related publications. Detailed knowledge of a dataset’s provenance is essential to establish the pedigree of the data for its effective re-use, and to avoid redundant re-enactment of the experiment or computation involved. It is increasingly important for open-access data to determine their authenticity and quality, especially considering the growing volumes of datasets appearing in the public domain. To address these issues, we present an approach that combines the Digital Object Identifier (DOI) – a widely adopted citation technique – with existing, widely adopted climate science data standards to formally publish detailed provenance of a climate research dataset as an associated scientific workflow. This is integrated with linked-data compliant data re-use standards (e.g. OAI-ORE) to enable a seamless link between a publication and the complete trail of lineage of the corresponding dataset, including the dataset itself.
Resumo:
Whilst common sense knowledge has been well researched in terms of intelligence and (in particular) artificial intelligence, specific, factual knowledge also plays a critical part in practice. When it comes to testing for intelligence, testing for factual knowledge is, in every-day life, frequently used as a front line tool. This paper presents new results which were the outcome of a series of practical Turing tests held on 23rd June 2012 at Bletchley Park, England. The focus of this paper is on the employment of specific knowledge testing by interrogators. Of interest are prejudiced assumptions made by interrogators as to what they believe should be widely known and subsequently the conclusions drawn if an entity does or does not appear to know a particular fact known to the interrogator. The paper is not at all about the performance of machines or hidden humans but rather the strategies based on assumptions of Turing test interrogators. Full, unedited transcripts from the tests are shown for the reader as working examples. As a result, it might be possible to draw critical conclusions with regard to the nature of human concepts of intelligence, in terms of the role played by specific, factual knowledge in our understanding of intelligence, whether this is exhibited by a human or a machine. This is specifically intended as a position paper, firstly by claiming that practicalising Turing's test is a useful exercise throwing light on how we humans think, and secondly, by taking a potentially controversial stance, because some interrogators adopt a solipsist questioning style of hidden entities with a view that it is a thinking intelligent human if it thinks like them and knows what they know. The paper is aimed at opening discussion with regard to the different aspects considered.
Resumo:
To open this Third Vertebrate Pest Conference is a real privilege. It is a pleasure to welcome all of you in attendance, and I know there are others who would like to be meeting with us, but, for one reason or another cannot be. However, we can serve them by taking back the results of discussion and by making available the printed transactions of what is said here. It has been the interest and demand for the proceedings of the two previous conferen- ces which, along with personal contacts many of you have with the sponsoring committee, have gauged the need for continuing these meetings. The National Pest Control Association officers who printed the 1962 proceedings still are supplying copies of that conference. Two reprintings of the 1964 conference have been necessary and repeat orders from several universities indicate that those proceedings have become textbooks for special classes. When Dr. Howard mentioned in opening the first Conference in 1962 that publication of those papers would make a valuable handbook of animal control, he was prophetic, indeed. We are pleased that this has happened, but not surprised, since to many of us in this specialized field, the conferences have provided a unique opportunity to meet colleagues with similar interests, to exchange information on control techniques and to be informed by research workers of problem solving investigations as well as to hear of promising basic research. The development of research is a two-way street and we think these conferences also identify areas of inadequate knowledge, thereby stimulating needed research. We have represented here a number of types of specialists—animal ecologists, public health and transmissible disease experts, control methods specialists, public agency administration and enforcement staffs, agricultural extension people, manufacturing and sale industry representatives, commercial pest control operators, and others—and in addition to improving communications among these professional groups an equally important purpose of these conferences is to improve understanding between them and the general public. Within the term general public are many individuals and also organizations dedicated to appreciation and protection of certain animal forms or animal life in general. Proper concepts of vertebrate pest control do not conflict with such views. It is worth repeating for the record the definition of "vertebrate pest" which has been stated at our previous conferences. "A vertebrate pest is any native or introduced, wild or feral, non-human spe- cies of vertebrate animal that is currently troublesome locally or over a wide area to one or more persons either by being a general nuisance, a health hazard or by destroying food or natural resources. In other words, vertebrate pest status is not an inherent quality or fixed classification but is a circumstantial relationship to man's interests." I believe progress has been made in reducing the misunderstanding and emotion with which vertebrate pest control was formerly treated whenever a necessity for control was stated. If this is true, I likewise believe it is deserved, because control methods and programs have progressed. Control no longer refers only to population reductions by lethal means. We have learned something of alternate control approaches and the necessity for studying the total environment; where reduction of pest animal numbers is the required solution to a problem situation we have a wider choice of more selective, safe and efficient materials. Although increased attention has been given to control methods, research when we take a close look at the severity of animal damage to so many facets of our economy, particularly to agricultural production and public health, we realize it still is pitifully small and slow. The tremendous acceleration of the world's food and health requirements seems to demand expediting vertebrate pest control to effectively neutralize the enormous impact of animal damage to vital resources. The efforts we are making here at problem delineation, idea communication and exchange of methodology could well serve as both nucleus and rough model for a broader application elsewhere. I know we all hope this Third Conference will advance these general objectives, and I think there is no doubt of its value in increasing our own scope of information.
Resumo:
Object. The aim of this study was to describe the surgical anatomy of the mediobasal aspect of the temporal lobe and the supracerebellar transtentorial (SCTT) approach performed not with an opening, but with the resection of the tentorium, as an alternative route for the neurosurgical management of vascular and tumoral lesions arising from this region. Methods. Cadaveric specimens were used to illustrate the surgical anatomy of the mediobasal region of the temporal lobe. Demographic aspects, characteristics of lesions, clinical presentation, surgical results, follow-up findings, and outcomes were retrospectively reviewed for patients referred to receive the SCTT approach with tentorial resection. Results. Ten patients (83%) were female and 2 (17%) were male. Their ages ranged from 6 to 59 years (mean 34.5 +/- 15.8 years). All lesions (3 posterior cerebral artery aneurysms, 3 arteriovenous malformations, 3 cavernous malformations, and 3 tumors) were completely excluded or resected. After a mean follow-up period of 143 months (range 10-240 months), the mean postoperative Glasgow Outcome Scale score was 4.9. Conclusions. Knowledge of the surgical anatomy provides improvement for microsurgical approaches. The evolution from a small opening to a resection of the tentorium absolutely changed the exposure of the mediobasal aspect of the temporal lobe. The SCTT approach with tentorial resection is an excellent alternative route to the posterior part of mediobasal aspect of the temporal lobe, and it was enough to achieve the best neurosurgical management of tumoral and vascular lesions located in this area. (http://thejns.org/doi/abs/10.3171/2011.12.JNS111256)
Resumo:
Advances in food transformation have dramatically increased the diversity of products on the market and, consequently, exposed consumers to a complex spectrum of bioactive nutrients whose potential risks and benefits have mostly not been confidently demonstrated. Therefore, tools are needed to efficiently screen products for selected physiological properties before they enter the market. NutriChip is an interdisciplinary modular project funded by the Swiss programme Nano-Tera, which groups scientists from several areas of research with the aim of developing analytical strategies that will enable functional screening of foods. The project focuses on postprandial inflammatory stress, which potentially contributes to the development of chronic inflammatory diseases. The first module of the NutriChip project is composed of three in vitro biochemical steps that mimic the digestion process, intestinal absorption, and subsequent modulation of immune cells by the bioavailable nutrients. The second module is a miniaturised form of the first module (gut-on-a-chip) that integrates a microfluidic-based cell co-culture system and super-resolution imaging technologies to provide a physiologically relevant fluid flow environment and allows sensitive real-time analysis of the products screened in vitro. The third module aims at validating the in vitro screening model by assessing the nutritional properties of selected food products in humans. Because of the immunomodulatory properties of milk as well as its amenability to technological transformation, dairy products have been selected as model foods. The NutriChip project reflects the opening of food and nutrition sciences to state-of-the-art technologies, a key step in the translation of transdisciplinary knowledge into nutritional advice.
Resumo:
Humankind today is challenged by numerous threats brought about by global change. Climate has been and is being modified by human activities, which calls for mitigation and adaptation measures at an unprecedented scale. Natural resources have been degraded by human development by means of land cover and land use changes, for which protective and restoration measures have to be taken by land users and governments in most countries of the North and South. Low levels of economic development and insufficient policies in most developing countries have led to widespread poverty, which affects nearly half of the world’s population and directly threatens almost one billion people. Finally, uncontrolled economic growth has increased disparities between and within populations and has led to widespread environmental problems in many nations. Generating and sharing knowledge is a key to addressing such global challenges. Knowledge can be used to develop the best solutions and to avoid or repair threats. Research partnerships have proven to be suitable means to bridge the divides and disparities between knowledge societies and developing countries, thereby reducing gaps. Research partnerships are tools for further capacity development and thereby lead to societal empowerment. Institutional settings allowing for research partnerships are needed both in the North and the South, so that the different networks can work together in a long-term enabling environment.
Resumo:
Thesis (Ph.D.)--University of Washington, 2016-06
Resumo:
In broad terms — including a thief's use of existing credit card, bank, or other accounts — the number of identity fraud victims in the United States ranges 9-10 million per year, or roughly 4% of the US adult population. The average annual theft per stolen identity was estimated at $6,383 in 2006, up approximately 22% from $5,248 in 2003; an increase in estimated total theft from $53.2 billion in 2003 to $56.6 billion in 2006. About three million Americans each year fall victim to the worst kind of identity fraud: new account fraud. Names, Social Security numbers, dates of birth, and other data are acquired fraudulently from the issuing organization, or from the victim then these data are used to create fraudulent identity documents. In turn, these are presented to other organizations as evidence of identity, used to open new lines of credit, secure loans, “flip” property, or otherwise turn a profit in a victim's name. This is much more time consuming — and typically more costly — to repair than fraudulent use of existing accounts. ^ This research borrows from well-established theoretical backgrounds, in an effort to answer the question – what is it that makes identity documents credible? Most importantly, identification of the components of credibility draws upon personal construct psychology, the underpinning for the repertory grid technique, a form of structured interviewing that arrives at a description of the interviewee’s constructs on a given topic, such as credibility of identity documents. This represents substantial contribution to theory, being the first research to use the repertory grid technique to elicit from experts, their mental constructs used to evaluate credibility of different types of identity documents reviewed in the course of opening new accounts. The research identified twenty-one characteristics, different ones of which are present on different types of identity documents. Expert evaluations of these documents in different scenarios suggest that visual characteristics are most important for a physical document, while authenticated personal data are most important for a digital document. ^
Resumo:
In broad terms — including a thief's use of existing credit card, bank, or other accounts — the number of identity fraud victims in the United States ranges 9-10 million per year, or roughly 4% of the US adult population. The average annual theft per stolen identity was estimated at $6,383 in 2006, up approximately 22% from $5,248 in 2003; an increase in estimated total theft from $53.2 billion in 2003 to $56.6 billion in 2006. About three million Americans each year fall victim to the worst kind of identity fraud: new account fraud. Names, Social Security numbers, dates of birth, and other data are acquired fraudulently from the issuing organization, or from the victim then these data are used to create fraudulent identity documents. In turn, these are presented to other organizations as evidence of identity, used to open new lines of credit, secure loans, “flip” property, or otherwise turn a profit in a victim's name. This is much more time consuming — and typically more costly — to repair than fraudulent use of existing accounts. This research borrows from well-established theoretical backgrounds, in an effort to answer the question – what is it that makes identity documents credible? Most importantly, identification of the components of credibility draws upon personal construct psychology, the underpinning for the repertory grid technique, a form of structured interviewing that arrives at a description of the interviewee’s constructs on a given topic, such as credibility of identity documents. This represents substantial contribution to theory, being the first research to use the repertory grid technique to elicit from experts, their mental constructs used to evaluate credibility of different types of identity documents reviewed in the course of opening new accounts. The research identified twenty-one characteristics, different ones of which are present on different types of identity documents. Expert evaluations of these documents in different scenarios suggest that visual characteristics are most important for a physical document, while authenticated personal data are most important for a digital document.
Resumo:
Dipyrone (metamizole) is an analgesic pro-drug used to control moderate pain. It is metabolized in two major bioactive metabolites: 4-methylaminoantipyrine (4-MAA) and 4-aminoantipyrine (4-AA). The aim of this study was to investigate the participation of peripheral CB1 and CB2 cannabinoid receptors activation in the anti-hyperalgesic effect of dipyrone, 4-MAA or 4-AA. PGE2 (100ng/50µL/paw) was locally administered in the hindpaw of male Wistar rats, and the mechanical nociceptive threshold was quantified by electronic von Frey test, before and 3h after its injection. Dipyrone, 4-MAA or 4-AA was administered 30min before the von Frey test. The selective CB1 receptor antagonist AM251, CB2 receptor antagonist AM630, cGMP inhibitor ODQ or KATP channel blocker glibenclamide were administered 30min before dipyrone, 4-MAA or 4-AA. The antisense-ODN against CB1 receptor expression was intrathecally administered once a day during four consecutive days. PGE2-induced mechanical hyperalgesia was inhibited by dipyrone, 4-MAA, and 4-AA in a dose-response manner. AM251 or ODN anti-sense against neuronal CB1 receptor, but not AM630, reversed the anti-hyperalgesic effect mediated by 4-AA, but not by dipyrone or 4-MAA. On the other hand, the anti-hyperalgesic effect of dipyrone or 4-MAA was reversed by glibenclamide or ODQ. These results suggest that the activation of neuronal CB1, but not CB2 receptor, in peripheral tissue is involved in the anti-hyperalgesic effect of 4-aminoantipyrine. In addition, 4-methylaminoantipyrine mediates the anti-hyperalgesic effect by cGMP activation and KATP opening.