Book Reviews : Katie Curtin, Women in China. New York and Toronto, Pathfinder Press, 1975. 89 pp., n.p
In: Journal of Asian and African studies: JAAS, Band 14, Heft 1-2, S. 156-157
ISSN: 1745-2538
23 Ergebnisse
Sortierung:
In: Journal of Asian and African studies: JAAS, Band 14, Heft 1-2, S. 156-157
ISSN: 1745-2538
In: International Journal of Social Science and Humanity: IJSSH
ISSN: 2010-3646
As the present-day lingua franca, English is increasingly becoming more critical. Schools worldwide have adopted measures to teach non-native students English as part of their national curriculum to provide students with a broader range of opportunities in the global market. This paper investigates the current emergent problems in the Chinese teaching methodology and analyzes the UK teaching methods to seek possible Western solutions. This paper mainly focuses on the English classes taught at primary schools in the UK and China to explore this cross-cultural communication difference. The study will first raise awareness of these problems affecting students, which include a lack of motivation, poor language knowledge, and a poor language environment. Having established the main concerns and better understanding of the broader teaching spectrum, the study will make possible modifications to the traditional Chinese teaching of second language learners.
With the social networking and network socialisation have brought more text information and social relationships into our daily lives, the question of whether big data can be fully used to study the phenomenon and discipline of natural sciences has prompted many specialists and scholars to innovate their research. Though politics were integrally involved in the hyperlinked word issues since 1990s, automatic assembly of different geospatial web and distributed geospatial information systems utilizing service chaining have explored and built recently, the information collection and data visualisation of geo-events have always faced the bottleneck of traditional manual analysis because of the sensibility, complexity, relativity, timeliness and unexpected characteristics of political events. Based on the framework of Heritrix and the analysis of web-based text, word frequency, sentiment tendency and dissemination path of the Huangyan Island incident is studied here by combining web crawler technology and the text analysis method. The results indicate that tag cloud, frequency map, attitudes pie, individual mention ratios and dissemination flow graph based on the data collection and processing not only highlight the subject and theme vocabularies of related topics but also certain issues and problems behind it. Being able to express the time-space relationship of text information and to disseminate the information regarding geo-events, the text analysis of network information based on focused web crawler technology can be a tool for understanding the formation and diffusion of web-based public opinions in political events.
BASE
With the social networking and network socialisation have brought more text information and social relationships into our daily lives, the question of whether big data can be fully used to study the phenomenon and discipline of natural sciences has prompted many specialists and scholars to innovate their research. Though politics were integrally involved in the hyperlinked word issues since 1990s, automatic assembly of different geospatial web and distributed geospatial information systems utilizing service chaining have explored and built recently, the information collection and data visualisation of geo-events have always faced the bottleneck of traditional manual analysis because of the sensibility, complexity, relativity, timeliness and unexpected characteristics of political events. Based on the framework of Heritrix and the analysis of web-based text, word frequency, sentiment tendency and dissemination path of the Huangyan Island incident is studied here by combining web crawler technology and the text analysis method. The results indicate that tag cloud, frequency map, attitudes pie, individual mention ratios and dissemination flow graph based on the data collection and processing not only highlight the subject and theme vocabularies of related topics but also certain issues and problems behind it. Being able to express the time-space relationship of text information and to disseminate the information regarding geo-events, the text analysis of network information based on focused web crawler technology can be a tool for understanding the formation and diffusion of web-based public opinions in political events.
BASE
In: Natural hazards and earth system sciences: NHESS, Band 14, Heft 8, S. 1985-1997
ISSN: 1684-9981
Abstract. In this study, the cloud-to-ground (CG) lightning flash/stroke density was derived from the lightning location finder (LLF) data recorded between 2007 and 2011. The vulnerability of land surfaces was then assessed from the classification of the study areas into buildings, outdoor areas under the building canopy and open-field areas, which makes it convenient to deduce the location factor and confirm the protective capability. Subsequently, the potential number of dangerous lightning events at a location could be estimated from the product of the CG stroke density and the location's vulnerability. Although the human beings and all their material properties are identically exposed to lightning, the lightning casualty risk and property loss risk was assessed respectively due to their vulnerability discrepancy. Our analysis of the CG flash density in Beijing revealed that the valley of JuMaHe to the southwest, the ChangPing–ShunYi zone downwind of the Beijing metropolis, and the mountainous PingGu–MiYun zone near the coast are the most active lightning areas, with densities greater than 1.5 flashes km−2 year−1. Moreover, the mountainous northeastern, northern, and northwestern rural areas are relatively more vulnerable to lightning because the high-elevation terrain attracts lightning and there is little protection. In contrast, lightning incidents by induced lightning are most likely to occur in densely populated urban areas, and the property damage caused by lightning here is more extensive than that in suburban and rural areas. However, casualty incidents caused by direct lightning strokes seldom occur in urban areas. On the other hand, the simulation based on the lightning risk assessment model (LRAM) demonstrates that the casualty risk is higher in rural areas, whereas the property loss risk is higher in urban areas, and this conclusion is also supported by the historical casualty and damage reports.
In: Cast Metals, Band 6, Heft 4, S. 225-230
The paper analyses geopolitical dimensions of the 1997 United Nations Convention on the Law of the Non-Navigational Uses of International Watercourses (UNWC) using quantitative data on transboundary flows and qualitative data on basin State location within a watercourse. The UNWC has had a long and difficult history. A tendency for downstream support for, and upstream ambivalence/opposition to, the UNWC is identified. It appears not widely recognised that adverse effects can be caused by any State on other States, regardless of their upstream or downstream location. Thus downstream States consider that their actions cannot harm upstream States and upstream States consider that the UNWC provides them with greater obligations than downstream States. Clarification that the principle of reciprocity underpins the UNWC, with reciprocal obligations on all States, will remove any ambiguity, correct misperceptions, have clear policy implications for all States, promote UNWC engagement of upstream States, and contribute to long-term global water security.
BASE
When a disaster occurs, timely actions in response to urgent requests conveyed by critical messages (known as alerts) constitute a vital key to effectiveness. These actions include notifying potentially affected parties so that they can take precautionary measures, gathering additional information, and requesting remedial actions and resource allocation. However, there are different types of disasters such as epidemic outbreaks, natural disasters, major accidents, and terrorist attacks. At the same time, there are also many different parties involved such as governments, healthcare institutions, businesses, and individuals. To address these problems, we introduce a Disaster Notification and Resource Allocation System (DNRAS) based on an Alert Management System (AMS) implemented through Web services. This unified platform supports timely interactions among various parties, focusing on notification and monitoring, resource enquiry and allocation, as well as the mobility of information. We detail the mechanisms of these functions in our system, illustrating the Web services interface parameters for communications and interoperability. We illustrate the applicability of our approach with an example of an epidemic outbreak and discuss the advantage of our approach with respect to various stakeholders of our system. © 2009 Springer Science+Business Media, LLC. ; postprint
BASE
In: Survey review, Band 48, Heft 350, S. 367-375
ISSN: 1752-2706
In: IEEE technology and society magazine: publication of the IEEE Society on Social Implications of Technology, Band 14, Heft 2, S. 12-21
ISSN: 0278-0097
In: Minimally invasive neurosurgery, Band 53, Heft 5/06, S. 223-228
ISSN: 1439-2291
For a decade, The Cancer Genome Atlas (TCGA) program collected clinicopathologic annotation data along with multi-platform molecular profiles of more than 11,000 human tumors across 33 different cancer types. TCGA clinical data contain key features representing the democratized nature of the data collection process. To ensure proper use of this large clinical dataset associated with genomic features, we developed a standardized dataset named the TCGA Pan-Cancer Clinical Data Resource (TCGA-CDR), which includes four major clinical outcome endpoints. In addition to detailing major challenges and statistical limitations encountered during the effort of integrating the acquired clinical data, we present a summary that includes endpoint usage recommendations for each cancer type. These TCGA-CDR findings appear to be consistent with cancer genomics studies independent of the TCGA effort and provide opportunities for investigating cancer biology using clinical correlates at an unprecedented scale.
BASE
How can we explain that some Popular education militants are also referring to the Information Society and thus seem to join this plan, carried to a great extent by merchants and the authorities ? Which are the stakes at work in this "meeting" ? Popular education, in addition to a long and plural history, is not homogeneous. However, Popular education is marked by a common philosophy aiming at developing social, cultural and political people's emancipation. In the mean time, political and economic authorities need to get the support of social actors to carry out the Information Society. Within this framework, associations would be the relay of the development of this society ; the necessary social mediator of this plan. Meanwhile, Popular education movements are seeking ways to appropriate this concept in order to make it able to serve the interests of Popular education. But they also question the specific purposes of this model. Indeed, the reference to the Information Society allows the militants of Popular education to update their traditional matters, and also to come out of the crisis they are facing. Lastly, if this meeting seems, at first sight, to generate consensus, the inherent conflicts in the confrontation of the values and identities do not therefore disappear and question the real stakes at work.
BASE
How can we explain that some Popular education militants are also referring to the Information Society and thus seem to join this plan, carried to a great extent by merchants and the authorities ? Which are the stakes at work in this "meeting" ? Popular education, in addition to a long and plural history, is not homogeneous. However, Popular education is marked by a common philosophy aiming at developing social, cultural and political people's emancipation. In the mean time, political and economic authorities need to get the support of social actors to carry out the Information Society. Within this framework, associations would be the relay of the development of this society ; the necessary social mediator of this plan. Meanwhile, Popular education movements are seeking ways to appropriate this concept in order to make it able to serve the interests of Popular education. But they also question the specific purposes of this model. Indeed, the reference to the Information Society allows the militants of Popular education to update their traditional matters, and also to come out of the crisis they are facing. Lastly, if this meeting seems, at first sight, to generate consensus, the inherent conflicts in the confrontation of the values and identities do not therefore disappear and question the real stakes at work.
BASE
How can we explain that some Popular education militants are also referring to the Information Society and thus seem to join this plan, carried to a great extent by merchants and the authorities ? Which are the stakes at work in this "meeting" ? Popular education, in addition to a long and plural history, is not homogeneous. However, Popular education is marked by a common philosophy aiming at developing social, cultural and political people's emancipation. In the mean time, political and economic authorities need to get the support of social actors to carry out the Information Society. Within this framework, associations would be the relay of the development of this society ; the necessary social mediator of this plan. Meanwhile, Popular education movements are seeking ways to appropriate this concept in order to make it able to serve the interests of Popular education. But they also question the specific purposes of this model. Indeed, the reference to the Information Society allows the militants of Popular education to update their traditional matters, and also to come out of the crisis they are facing. Lastly, if this meeting seems, at first sight, to generate consensus, the inherent conflicts in the confrontation of the values and identities do not therefore disappear and question the real stakes at work.
BASE