9 research outputs found
French literary images of the Algerian war : an ideological analysis
The Algerian war of 1954 to 1962 is generally acknowledged to have been the apogee of France's uniquely traumatic retreat from overseas empire. Yet, despite the war's rapid establishment as the focus for a vast body of literature in the broadest sense, the experience of those years is only now beginning to be acknowledged by the French nation in anything like a balanced way. The present study seeks to contribute to the continuing elucidation of this historical failure of assimilation by considering the specific
role played by prose fiction in contemporary and subsequent perceptions of the relevant
events. Previous research into this aspect of the Franco-Algerian relationship has tended either to approach it as a minor element in a larger conceptual whole or to attach insufficient importance to its fundamentally political nature.
This thesis is conceived as an analysis of the images of the Algerian war communicated in a representative sample of French literature produced both during and after the conflict itself. The method adopted is an ideological one, with particular
attention being given in each of the seven constituent chapters to the selected texts'
depiction of one of the principal parties to the conflict, together with their attendant
political mythologies. This reading is primarily informed by the Barthesian model of
semiosis, which is drawn upon to explain the linguistic foundations of the systematic
literary obfuscation of this period of colonial history. By analysing points of ideological tension in the fictional imaging of the war, we are able to identify and to evaluate examples of both artistic mystification and demystifying art. It is argued in conclusion that the former category of narrative has never ceased to predominate, thus enabling French public opinion to continue to avoid its ultimate responsibility for the war and its conduct
Time- and value-continuous explainable affect estimation in-the-wild
Today, the relevance of Affective Computing, i.e., of making computers recognise and simulate human emotions, cannot be overstated. All technology giants (from manufacturers of laptops to mobile phones to smart speakers) are in a fierce competition to make their devices understand not only what is being said, but also how it is being said to recognise user’s emotions. The goals have evolved from predicting the basic emotions (e.g., happy, sad) to now the more nuanced affective states (e.g., relaxed, bored) real-time. The databases used in such research too have evolved, from earlier featuring the acted behaviours to now spontaneous behaviours. There is a more powerful shift lately, called in-the-wild affect recognition, i.e., taking the research out of the laboratory, into the uncontrolled real-world.
This thesis discusses, for the very first time, affect recognition for two unique in-the-wild audiovisual databases, GRAS2 and SEWA. The GRAS2 is the only database till date with time- and value-continuous affect annotations for Labov effect-free affective behaviours, i.e., without the participant’s awareness of being recorded (which otherwise is known to affect the naturalness of one’s affective behaviour). The SEWA features participants from six different cultural backgrounds, conversing using a video-calling platform. Thus, SEWA features in-the-wild recordings further corrupted by unpredictable artifacts, such as the network-induced delays, frame-freezing and echoes. The two databases present a unique opportunity to study time- and value-continuous affect estimation that is truly in-the-wild.
A novel ‘Evaluator Weighted Estimation’ formulation is proposed to generate a gold standard sequence from several annotations. An illustration is presented demonstrating that the moving bag-of-words (BoW) representation better preserves the temporal context of the features, yet remaining more robust against the outliers compared to other statistical summaries, e.g., moving average. A novel, data-independent randomised codebook is proposed for the BoW representation; especially useful for cross-corpus model generalisation testing when the feature-spaces of the databases differ drastically. Various deep learning models and support vector regressors are used to predict affect dimensions time- and value-continuously. Better generalisability of the models trained on GRAS2 , despite the smaller training size, makes a strong case for the collection and use of Labov effect-free data.
A further foundational contribution is the discovery of the missing many-to-many mapping between the mean square error (MSE) and the concordance correlation coefficient (CCC), i.e., between two of the most popular utility functions till date. The newly invented cost function |MSE_{XY}/σ_{XY}| has been evaluated in the experiments aimed at demystifying the inner workings of a well-performing, simple, low-cost neural network effectively utilising the BoW text features. Also proposed herein is the shallowest-possible convolutional neural network (CNN) that uses the facial action unit (FAU) features. The CNN exploits sequential context, but unlike RNNs, also inherently allows data- and process-parallelism. Interestingly, for the most part, these white-box AI models have shown to utilise the provided features consistent with the human perception of emotion expression
Demystifying Internet of Things Security
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms
Irreversible Noise: The Rationalisation of Randomness and the Fetishisation of Indeterminacy
This thesis aims to elaborate the theoretical and practical significance of the concept of noise with regard to current debates concerning realism, materialism, and rationality. The scientific conception of noise follows from the developments of thermodynamics, information theory, cybernetics, and dynamic systems theory; hence its qualification as irreversible. It is argued that this conceptualization of noise is entangled in several polemics that cross the arts and sciences, and that it is crucial to an understanding of their contemporary condition.
This thesis draws on contemporary scientific theories to argue that randomness is an intrinsic functional aspect at all levels of complex dynamic systems, including higher cognition and reason. However, taking randomness or noise as given, or failing to distinguish between different descriptive levels, has led to misunderstanding and ideology. After surveying the scientific and philosophical context, the practical understanding of randomness in terms of probability theory is elaborated through a history of its development in the field of economics, where its idealization has had its most pernicious effects.
Moving from the suppression of noise in economics to its glorification in aesthetics, the experience of noise in the sonic sense is first given a naturalistic neuro-phenomenological explanation. Finally, the theoretical tools developed over the course of the inquiry are applied to the use of noise in music. The rational explanation of randomness in various specified contexts, and the active manipulation of probability that this enables, is opposed to the political and aesthetic tendencies to fetishize indeterminacy. This multi-level account of constrained randomness contributes to the debate by demystifying noise, showing it to be an intrinsic and functionally necessary condition of reason and consequently of freedom
Preserving Layered Narratives, Reconstructing the Future: Demystifying Egypt’s Tangible and Intangible Heritage
This book presents the proceedings of the second Luxor Living Lab International Workshop, a collaborative effort between the University of Lincoln (UK) and Ain Shams University (Egypt). The workshop, operating under the umbrella of the University of Lincoln's 'Heritage Living Lab,' focuses on the participatory revitalisation of cultural heritage in Luxor through innovative digital processes. The book provides a comprehensive exploration of the workshop's discussions, insights, and recommendations aimed at safeguarding Luxor's tangible and intangible heritage for future generations.
Contents:
1.0 Introduction: The opening chapter sets the stage for the exploration of Egypt's cultural heritage and the workshop's purpose in demystifying the layers of history within Luxor's rich heritage.
2.0 Day One – Fatimid Cairo Tour: A detailed account of the exploration of Fatimid Cairo, providing a historical backdrop for the subsequent workshop discussions.
3.0 Day Two – Workshop Presentations: A Symphony of Insights Unveiled: Highlights of presentations by various experts and professionals, covering topics such as recent works in Luxor Temple, the cemeteries of Cairo, heritage revitalisation, introducing heritage to children and youth, and case studies from Cairo that enriched participants' experiences by showcasing live regeneration projects.
4.0 Parallel Sessions: A Kaleidoscope of Heritage Sustainability: Dives into thematic sessions discussing preservation management, sustainable development, innovation techniques, policy development, decision-making, and digital documentation in cultural heritage preservation.
5.0 Recommendations: Nurturing Heritage Sustainability: Key recommendations emerging from the workshop, including community engagement, the role of digital technologies, enhancing heritage access, interdisciplinary collaboration, and utilising heritage as a catalyst for sustainable development.
6.0 Impact and Lessons Learned: Navigating Beyond Academia: Examines the workshop's impact on participants, lessons learned, and its influence on architects, policymakers, and the community, offering valuable insights beyond academic realms.
7.0 Conclusion and Final Remarks: Nurturing Collaboration and Sustainable Heritage Practices: Summarises the findings and encourages continued collaboration in the pursuit of preserving global cultural heritage.
8.0 References: A comprehensive list of references supporting the workshop's discussions and findings.
9.0 Appendices:
8.1 Speaker Biographies: Detailed biographies of the speakers, providing insights into their expertise and contributions to the workshop.
8.2 Organisers Biographies: Background information on the organizers, detailing their roles and involvement in the Luxor Living Lab International Workshop.
8.3 Schedule: A comprehensive schedule of the workshop, outlining each session, presentation, and activity over the two days.
8.4 Participant Feedback Highlights: An overview of participant feedback, highlighting key insights and reflections gathered during the symposium's two days.
The book serves as a valuable resource for scholars, practitioners, policy makers and enthusiasts engaged in the preservation and revitalisation of cultural heritage, offering a multifaceted view of Luxor's heritage and its global implications, enriched by case studies from Cairo
Recommended from our members
Developing professional school counselor self-efficacy and competence to broach career conversations in K-12 through an online professional development training
Professional school counselors are tasked with providing effective and relevant career counseling and career-focused activities with all K–12 students; however, the career domain remains the area where school counselors feel least efficacious and competent to broach as part of their role. Addressing the career domain in schools is vital as it ensures all students have an opportunity to develop the mindsets and behaviors necessary to acquire work-related skills, resilience, perseverance, a desire for lifelong learning, and a positive attitude towards academics, which contribute to a strong work ethic. Additionally, the world of work has changed significantly and is continuing to change because of technology, artificial intelligence, and changing social needs. Approaching the career domain with theories, assessments, and techniques focused on occupational exploration and decision-making no longer creates career-ready students. Further training for school counselors in broaching the career domain, both in counselor education programs and professional development offerings, is patchy and difficult to access due to financial and time constraints. The purpose of the two quasi-experimental studies in this dissertation is to investigate the effectiveness of an online asynchronous training program designed to help increase school counselor self-efficacy and competency in broaching career conversations in K–12 schools, as well as connecting the conversations to ASCA, NCDA, and CASEL standards and identifying diversity, equity, and inclusive (DEI) considerations within the approach. The 9-hour online asynchronous training titled Career Conversations in K–12: Demystifying the School Counselor Role, focuses on the intrapersonal domain of career problem conceptualization developed by Dr. Louis A. Busacca (2002) and covers appropriate career theories and interventions.
For both studies, a national sample of school counselor participants (N = 38) serving students at all educational levels completed the 9-hour online training. Study 1 data were collected using pretest and posttest self-efficacy scales utilizing modified sub-scales from the School Counselor Self-Efficacy Scale (SCSES; Bodenhorn & Skaggs, 2005), the Career Counselor Self-Efficacy Scale (CCSES; O’ Brien et al., 1997). Study 2 data were collected from the same sample using a case study response to assess competency. Case study responses were rated by two doctoral-level school counselor educators utilizing a rubric for the three categories. For the first study that examined self-efficacy, a paired sample t-test was performed to compare participant pre- and posttest scores for each of the modified self-efficacy scales and for overall self-efficacy. The second study examined competency in broaching career conversations, connecting ASCA, NCDA, and CASEL standards to the career conversations, and DEI considerations. Rating data in the first competency category was analyzed using a paired sample t-test. Competency in the second and third categories was analyzed using a McNemar x2 test.
Overall, results from both studies showed that school counselors in the study benefited from the online asynchronous professional development training in the career domain. The first study indicated there was a statistically significant increase in participant self-efficacy as a result of the training, with an overall self-efficacy mean difference of 0.91. The Multicultural Competency Skills sub-scale displayed the highest mean difference increase of 1.17. Based on these results, asynchronous online training in the career domain may serve as an alternative to in-person instruction to increase school counselor self-efficacy. The second study's results indicated significant effects in two categories: (a) broaching career conversations and (b) connecting the conversations to standards. No effect occurred in the DEI category.
In combination, results from both studies add to a space where research is scant. Both studies appear to be the first to investigate the effectiveness of an asynchronous training module that is designed to help increase school counselors’ efficacy and competence in completing tasks in a major domain of their work. There are implications for both counselor education practices in this domain as well as the development of professional development training for school counselors. Limitations and recommendations for future studies are discussed in the study manuscripts
Being And Becoming Entrepreneurial: A Narrative Study On The Development Of Entrepreneurial Adults In China And The United States
Today’s youth have lives dramatically different from the past and face an unpredictable future and challenging job market, thus being entrepreneurial is increasingly more important to cultivate (Ford, 2015). I aim to understand the state and development of being entrepreneurial and its implications for broadly educating young people, as one approach to better preparing our students for the future (Auerswald, 2012; de Villiers Scheepers et al., 2018).Although the general research interest in entrepreneurship is burgeoning, the developmental perspective has been limited. Additionally, the development of Entrepreneurial individuals across diverse age groups and countries has not been studied extensively and their narratives of being and becoming entrepreneurial have not been heard and studied. Thus, I have used the self-narratives of 24 entrepreneurial individuals in China and the US to explore how they are developing to be entrepreneurial. Specifically, I explored their current state of being entrepreneurial and developmental processes that have contributed to these states. My sample was divided evenly across the Chinese and United States contexts, and also stratified by age groups (from 18 to 39; and 40 and above) and gender (male and female). I sought to understand what factors might have affected the entrepreneurial development in different individuals, according to their own understanding, and explored whether differences exist across countries, gender, and age groups. I placed a particular emphasis on developmental patterns that were revealed in the analytic process. Interviews were analyzed through a coding and interpretive process informed by grounded theory (Glaser & Strauss, 1967). First, five key themes emerged related to being of entrepreneurial: (1) Learning as a Way of Being; (2) Action!; (3) Staying in the Arena; (4) Connecting Elements, People, Information and Resources; and (5) Disrupting. Secondly, in terms of factors affecting entrepreneurial development, both internal (self-characteristics) and external (environmental) factors were identified from the narrative accounts, and the developmental process was presented as dynamic and complex. Key developmental sources of influence include: (1)Emerging Self Identities and Experiences from Childhood and Teen Years; (2) Early Entrepreneurial Experiences; (3) Family influence; (4) Work-Related Experience; (5) School Impact; and (6) Virtual and Physical entrepreneurial environments. Finally, differences and commonalities across the countries, age groups, and gender emerged and are discussed. Overall, entrepreneurial development can and should be broadly encouraged given the narratives and lessons shared by the participants. Recommendations and implications for supporting students’ “entrepreneurial development” are presented: (1) It is the mindset, not the occupation; (2) Demystifying the entrepreneurial mindset as a way of thinking and being; (3) It takes a village to raise an entrepreneurial child; (4) Developing an entrepreneurial mindset as a way to achieve personal growth and fulfillment. Lastly, the limits and future direction are discussed
Volitional Cybersecurity
This dissertation introduces the “Volitional Cybersecurity” (VCS) theory as a systematic way to think about adoption and manage long-term adherence to cybersecurity approaches. The validation of VCS has been performed in small- and medium-sized enterprises or businesses (SMEs/SMBs) context. The focus on volitional activities promotes theoretical viewpoints. Also, it aids in demystifying the aspects of cybersecurity behaviour in heterogeneous contexts that have neither been systematically elaborated in prior studies nor embedded in cybersecurity solutions. Abundant literature demonstrates a lack of adoption of manifold cybersecurity remediations. It is still not adequately clear how to select and compose cybersecurity approaches into solutions for meeting the needs of many diverse cybersecurity-adopting organisations. Moreover, the studied theories in this context mainly originated from disciplines other than information systems and cybersecurity. The constructs were developed based on data, for instance, in psychology or criminology, that seem not to fit properly for the cybersecurity context. Consequently, discovering new methods and theories that can be of help in active and volitional forms of cybersecurity behaviour in diverse contexts may be conducive to a better quality of cybersecurity engagement. This leads to the main research question of this dissertation: How can we support volitional forms of behaviour with a self-paced tool to increase the quality of cybersecurity engagement? The main contribution of this dissertation is the VCS theory. VCS is a cybersecurity-focused theory structured around the core concept of volitional cybersecurity behaviour. It suggests that a context can be classified based on the cybersecurity competence of target groups and their distinct requirements. This classification diminishes the complexity of the context and is predictive of improvement needs for each class. Further, the theory explicates that supporting three factors: A) personalisation, B) cybersecurity competence, and C) connectedness to cybersecurity expertise affect the adoption of cybersecurity measures and better quality of cybersecurity engagement across all classes of the context. Therefore, approaches that ignore the personalisation of cybersecurity solutions, the cybersecurity competence of target groups, and the connectedness of recipients to cybersecurity expertise may lead to poorer acceptance of the value or utility of solutions. Subsequently, it can cause a lack of motivation for adopting cybersecurity solutions and adherence to best practices. VCS generates various implications. It has implications for cybersecurity research in heterogeneous contexts to transcend the common cybersecurity compliance approaches. Building on VCS, researchers could develop interventions looking for volitional cybersecurity behaviour change. Also, it provides knowledge that can be useful in the design of self-paced cybersecurity tools. VCS explains why the new self-paced cybersecurity tool needs specific features. The findings of this dissertation have been subsequently applied to the follow-up project design. Further, it has implications for practitioners and service providers to reach out to the potential end-users of their solutions