6,915 research outputs found

    The Role of Linguistics Studies on the Political Debate

    Full text link
    The paper is to find out the linguistics role contribution towards the political debate event at the election party. The presidential debate\u27s primary purpose is to sponsor and produce debates for the United States presidential and vice-presidential candidates and to undertake research and educational activities relating to the debates. A leaders\u27 debate or presidential debate is a public debate held during a general election campaign, where the candidates expose their political opinions and public policy proposals, and criticism of them, to potential voters. They are normally broadcast live on radio, television and the internet. Increasing learners\u27 confidence, poise, and self-esteem. Providing an engaging, active, learner-centered activity. Improving rigorous higher-order and critical thinking skills. Enhancing the ability to structure and organize thoughts

    Smart techniques and tools to detect Steganography - a viable practice to Security Office Department

    Get PDF
    Dissertation presented as the partial requirement for obtaining a Master's degree in Information Management, specialization in Information Systems and Technologies ManagementInternet is today a commodity and a way for being connect to the world. It is through Internet is where most of the information is shared and where people run their businesses. However, there are some people that make a malicious use of it. Cyberattacks have been increasing all over the recent years, targeting people and organizations, looking to perform illegal actions. Cyber criminals are always looking for new ways to deliver malware to victims to launch an attack. Millions of users share images and photos on their social networks and generally users find them safe to use. Contrary to what most people think, images can contain a malicious payload and perform harmful actions. Steganography is the technique of hiding data, which, combined with media files, can be used to place malicious code. This problem, leveraged by the continuous media file sharing through massive use of digital platforms, may become a worldwide threat in malicious content sharing. Like phishing, people and organizations must be trained to suspect about inappropriate content and implement the proper set of actions to reduce probability of infections when accessing files supposed to be inoffensive. The aim of this study will try to help people and organizations by trying to set a toolbox where it can be possible to get some tools and techniques to assist in dealing with this kind of situations. A theoretical overview will be performed over other concepts such as Steganalysis, touching also Deep Learning and in Machine Learning to assess which is the range of its applicability in find solutions in detection and facing these situations. In addition, understanding the current main technologies, architectures and users’ hurdles will play an important role in designing and developing the proposed toolbox artifact

    Intellectual Property Management in Health and Agricultural Innovation: Executive Guide

    Get PDF
    Prepared by and for policy-makers, leaders of public sector research establishments, technology transfer professionals, licensing executives, and scientists, this online resource offers up-to-date information and strategies for utilizing the power of both intellectual property and the public domain. Emphasis is placed on advancing innovation in health and agriculture, though many of the principles outlined here are broadly applicable across technology fields. Eschewing ideological debates and general proclamations, the authors always keep their eye on the practical side of IP management. The site is based on a comprehensive Handbook and Executive Guide that provide substantive discussions and analysis of the opportunities awaiting anyone in the field who wants to put intellectual property to work. This multi-volume work contains 153 chapters on a full range of IP topics and over 50 case studies, composed by over 200 authors from North, South, East, and West. If you are a policymaker, a senior administrator, a technology transfer manager, or a scientist, we invite you to use the companion site guide available at http://www.iphandbook.org/index.html The site guide distills the key points of each IP topic covered by the Handbook into simple language and places it in the context of evolving best practices specific to your professional role within the overall picture of IP management

    Aha? Is Creativity Possible in Legal Problem Solving and Teachable in Legal Education?

    Get PDF
    This article continues and expands on my earlier project of seeking to describe how legal negotiation should be understood conceptually and undertaken behaviorally to produce better solutions to legal problems. As structured problem solving requires interests, needs and objectives identification, so too must creative solution seeking have its structure and elements in order to be effectively taught. Because research and teaching about creativity and how we think has expanded greatly since modern legal negotiation theory has been developed, it is now especially appropriate to examine how we might harness this new learning to how we might examine and teach legal creativity in the context of legal negotiation and problem solving. This article explores both the cognitive and behavioral dimensions of legal creativity and offers suggestions for how it can be taught more effectively in legal education, both within the more narrow curricula of negotiation courses and more generally throughout legal education

    The Rise of iWar: Identity, Information, and the Individualization of Modern Warfare

    Get PDF
    During a decade of global counterterrorism operations and two extended counterinsurgency campaigns, the United States was confronted with a new kind of adversary. Without uniforms, flags, and formations, the task of identifying and targeting these combatants represented an unprecedented operational challenge for which Cold War era doctrinal methods were largely unsuited. This monograph examines the doctrinal, technical, and bureaucratic innovations that evolved in response to these new operational challenges. It discusses the transition from a conventionally focused, Cold War-era targeting process to one optimized for combating networks and conducting identity-based targeting. It analyzes the policy decisions and strategic choices that were the catalysts of this change and concludes with an in depth examination of emerging technologies that are likely to shape how this mode of warfare will be waged in the future.https://press.armywarcollege.edu/monographs/1436/thumbnail.jp

    A Fingerprint-Based Digital Images Watermarking for Identity Authentication

    Get PDF
    In this paper the combination of fingerprint verification methods with watermarkingtechnology to provide copyright protection and authentication of digital images is proposed. The goalof this study is to investigate how watermarking processing affects the quality of biometric watermarks.Performed experiments showed that extracted fingerprint images have roughly equal verification performance even if some watermarked images undergo additional degradation. Proposed methodologywill be improved using more sophisticated fingerprint verification methods and subsequently incorporated into multimodal watermarking schemes

    Field Theory Toward a Post Critical Theory of Metaphor

    Full text link
    Metaphor studies have become vogue in postcritical culture among the scientific and socio-scientific communities, in advertising and in the political arena. In fact, advertisers and marketers for years have known the power of a resonant metaphor to change minds and hearts. Once relegated to the realms of literature and linguistics, metaphor studies today represent the cutting edge of research in nearly every discipline. However, the church and the Biblical Studies academy have essentially ignored this trend, still engaging predominantly in close critical analyses of texts and refusing for the most part to engage in popular culture. This dissertation agrees with theorists Lakoff and Johnson, and others, that metaphors are the DNA of meaning, identity and therefore the necessary catalysts for visioning and change. Because metaphors are inherent in every human thought process, they are also creative, relational, multi-dimensional and interactive. When metaphors are transported from closed literary systems into cultural systems, they take on roles as change agents. I call this kind of open system metaphor theory in my dissertation, “field theory.” Metaphors exist powerfully within fields. They are prismic entities containing depth and breadth. They relate not linearly but in networks and webs. Field theory in the sciences and social sciences has educated us in the way fields behave, and I will draw on scientific and interdisciplinary definitions of “field” in order to explain the way that metaphor can function and contribute powerfully to both the theory and praxis of ministry and in contemporary postcritical culture. Metaphor field theory can help bridge divides inherent between theory and praxis, between church and culture and within and between individuals and can provide the tools for identity building, visioning and mission within postcritical culture. The artifact for this dissertation therefore will introduce a new kind of nonprofit cross-cultural society that transcends boundaries and creates new field space for communication, creativity and an integrated synergetic vision

    Spaces and places for pre-school children : little voices big ideas

    Get PDF
    Accessible Early Years learning environments are a critical component of education providers’ commitment to enhancing equity for all young children within Early Years provision. This paper explores some of the broader cultural aspects of Early Years and architecture in creating an enabling environment that shapes universal design practices in Early Years inclusive settings. It examines how the transforming effects of the Early Years can be designed in relation to what we know about learning, more specifically about Universal Design for Learning (UDL), from the little voices and great ideas of our young learners, and from experts in architecture. with the flexibility to respond also to what we do not know about the future. The article deals with accessibility in its broadest sense: physical, educational, psychological and social accessibility for a truly inclusive environment with buildings that create a language pattern of harmony, a sense of belonging and inclusivity.peer-reviewe

    Purposive variation in recordkeeping in the academic molecular biology laboratory

    Get PDF
    This thesis presents an investigation into the role played by laboratory records in the disciplinary discourse of academic molecular biology laboratories. The motivation behind this study stems from two areas of concern. Firstly, the laboratory record has received comparatively little attention as a linguistic genre in spite of its central role in the daily work of laboratory scientists. Secondly, laboratory records have become a focus for technologically driven change through the advent of computing systems that aim to support a transition away from the traditional paper-based approach towards electronic recordkeeping. Electronic recordkeeping raises the potential for increased sharing of laboratory records across laboratory communities. However, the uptake of electronic laboratory notebooks has been, and remains, markedly low in academic laboratories. The investigation employs a multi-perspective research framework combining ethnography, genre analysis, and reading protocol analysis in order to evaluate both the organizational practices and linguistic practices at work in laboratory recordkeeping, and to examine these practices from the viewpoints of both producers and consumers of laboratory records. Particular emphasis is placed on assessing variation in the practices used by different scientists when keeping laboratory records, and on assessing the types of articulation work used to achieve mutual intelligibility across laboratory members. The findings of this investigation indicate that the dominant viewpoint held by laboratory staff other than principal investigators conceptualized laboratory records as a personal resource rather than a community archive. Readers other than the original author relied almost exclusively on the recontextualization of selected information from laboratory records into ‘public genres’ such as laboratory talks, research articles, and progress reports as the preferred means of accessing the information held in the records. The consistent use of summarized forms of recording experimental data rendered most laboratory records as both unreliable and of limited usability in the records management sense that they did not form full and accurate descriptions that could support future organizational activities. These findings offer a counterpoint to other studies, notably a number of studies undertaken as part of technology developments for electronic recordkeeping, that report sharing of laboratory records or assume a ‘cyberbolic’ view of laboratory records as a shared resource
    corecore