rapid transformation
Recently Published Documents


TOTAL DOCUMENTS

319
(FIVE YEARS 128)

H-INDEX

27
(FIVE YEARS 6)

2022 ◽  
pp. 466-488
Author(s):  
Ayse Nur Ciftçi ◽  
Murat Çiftçi

Digitalization is a phenomenon that is spreading day by day on a global scale. Both physiological decline and dissonances in education and professional experience strengthen the possibility of excluding the elder in the new economic and social order where digitalization has accelerated. In a period of 10 years if Industry 4.0 is taken as a milestone, and 5-6 years if Society 5.0 is taken as a milestone, it is natural to experience insufficiencies in the awareness of elder employees although there is a rapid transformation process. Therefore, problems may arise in the possibility of the surveys to be conducted for the addressee to constitute a healthy indicator. It can be argued that, in studies that are based on the analysis of secondary data, the differential feature of basic parameters such as internet usage, which is very common like literacy, will remain limited.


2022 ◽  
pp. 127-147
Author(s):  
Christine A. Osae

One of the principal challenges the education system faces presently is the discrepancy between what is learnt in class and the reality outside class. Due to the constant changes and rapid transformation in the world today, most students are undoubtedly training for jobs that may not exist when they finally graduate. How can educators prepare students for such a diverse and dynamic world? What does it take to produce highly innovative graduates that creatively apply outside-the-box solutions (locally rooted and globally scalable) to the world's most pressing issues? This chapter recommends an approach to education that focuses on learning as a process that creates both lifelong and life-wide learners as opposed to rote learners whose success is dependent on their ability to regurgitate content. The chapter demonstrates how Davis College and Akilah promotes sustainable learning through integration and responsive teaching and how the faculty development process plays a key role in this.


2021 ◽  
Author(s):  
Lisa Reid ◽  
Anthony Maeder ◽  
Didy Button ◽  
Katrina Breaden ◽  
Mark Brommeyer

Healthcare has experienced rapid transformation with the development of digital technologies which aim to make healthcare safer and more efficient. In response, health informatics has evolved, including nursing informatics, which integrates nursing, information and communication technologies (ICT) and professional knowledge to improve patient outcomes. New language has developed to describe informatics and its processes; however, this has generally been poorly understood. This paper will describe current definitions of nursing informatics from three different healthcare contexts: Australia, the United States of America and Canada, to identify the similarities and differences between these definitions and to summarise the distinct bodies of knowledge described by each country. These countries have amongst the oldest definition attempts in the literature. A pragmatic approach was taken in this narrative review, working forward from historic references and backwards from recent references extracted from published health and nursing informatics literature.


Author(s):  
Pinjari Vali Basha

<p>By rapid transformation of technology, huge amount of data (structured data and Un Structured data) is generated every day.  With the aid of 5G technology and IoT the data generated and processed every day is very large. If we dig deeper the data generated approximately 2.5 quintillion bytes.<br> This data (Big Data) is stored and processed with the help of Hadoop framework. Hadoop framework has two phases for storing and retrieve the data in the network.</p> <ul> <li>Hadoop Distributed file System (HDFS)</li> <li>Map Reduce algorithm</li> </ul> <p>In the native Hadoop framework, there are some limitations for Map Reduce algorithm. If the same job is repeated again then we have to wait for the results to carry out all the steps in the native Hadoop. This led to wastage of time, resources.  If we improve the capabilities of Name node i.e., maintain Common Job Block Table (CJBT) at Name node will improve the performance. By employing Common Job Block Table will improve the performance by compromising the cost to maintain Common Job Block Table.<br> Common Job Block Table contains the meta data of files which are repeated again. This will avoid re computations, a smaller number of computations, resource saving and faster processing. The size of Common Job Block Table will keep on increasing, there should be some limit on the size of the table by employing algorithm to keep track of the jobs. The optimal Common Job Block table is derived by employing optimal algorithm at Name node.</p>


2021 ◽  
Author(s):  
Monica N. Alves ◽  
Yi Heng Nai ◽  
Shane M. Powell ◽  
Mirek Macka ◽  
Michael C. Breadmore

RELC Journal ◽  
2021 ◽  
pp. 003368822110546
Author(s):  
Yusop Boonsuk

The rapid transformation of English linguistic landscapes has introduced the world to newly emerging English varieties or World Englishes, which are not typically employed in the Inner Circle. To address the defying phenomenon, this qualitative study explored the perceptions of Thai university lecturers on World Englishes, Thai English and the feasibility of implementing World Englishes and Thai English in the classrooms. Data were collected from semi-structured interviews with 15 English lecturers in 5 universities across the Thai regions. Analyzed by content analysis, findings revealed that the participants demonstrated mixed perceptions. While most of the participants viewed British and American Englishes as representations of standard English varieties and questioned the legitimacy of World Englishes and Thai English, others reportedly recognized and accepted the existence of World Englishes and considered Thai English as a tool to convey Thai identities and cultures. The findings also indicated that most participants outright disapproved of World Englishes and Thai English in teaching practices, and these varieties were substantially marginalized and devalued. However, to prepare learners for realistic use of English and increase their awareness of World Englishes and Thai English, the remaining participants suggested that English language teaching should embrace flexible linguistic conventions that allow spaces for Inner Circle, Outer Circle and Expanding Circle Englishes.


Author(s):  
Neelima Yadav ◽  
Navanil Chattopadhyay

Munsiyari is a region located at an altitude of 2,200 meters in the hilly state of Uttarakhand, India. The eponymous town is surrounded by twenty-two villages mostly inhabited by Bhotiya tribes, who once formed a community that traded with those crossing from India to Tibet, though this trade came to an abrupt end with the 1962 Sino-Indian war. Owing to the region’s prosperity, the villages exhibit a very interesting typology of hill architecture. This architectural identity is also a manifestation of a geographical and cultural response to a difficult terrain. Our study was carried out as part of the preparation of a dossier for inventorying the Kailash sacred landscape with the aim of documenting the present state of the traditional vernacular heritage of the selected indigenous community for the UNESCO nomination of the wider region. That thorough documentation process was used as a means of analyzing local vernacular heritage and its current situation, and with a view to offsetting the rapid transformation of the past two decades.


2021 ◽  
Vol 4 (6) ◽  
pp. 2141
Author(s):  
Aldo Rahmandana

AbstractDue to the rapid transformation of technology causing a subliminal changes on how states spy upon each other. With the help of technology and cyber infrastructure, states tend to use cyber technology as its main facility to conduct an espionage towards other states. Cyber espionage has come to represent national security and economic threat, due to all the classified information that already been massively stolen by another country. The aim of this research paper is to analyze and clarify pertaining the role of International law specifically towards this kind of act of espionage, and perceive the state responsibility of perpetrator which is states. It can be concluded that cyber espionage does not per se regulated under international law, but its lawfulness depends on the way in which it operation carried out may violate specific international conventions or any other international law principles.Keywords: Cyberlaw; Cyber Espionage; International Law.AbstrakPesatnya perkembangan teknologi dan digitalisasi mengakibatkan terjadinya perubahan metode dan cara dalam pelaksanaan tindakan spionase oleh negara terhadap negara lain guna mengumpulkan fakta dan informasi yang berkaitan dengan perkembangan politik, ekonomi, teknologi, dll melalui kapabilitas teknologi siber atau kerap disebut sebagai cyber espionage. Tujuan dari penelitian ini adalah untuk menganalisis terkait peranan hukum internasional dalam mengatur tindakan tersebut dalam tataran internasional dan bagaimana pertanggungjawaban dari negara pelaku tindakan cyber espionage. Hasil dari penelitian ini menyimpulkan bahwa belum ada konvensi international khusus yang mengatur mengenai cyber espionage sehingga tindakan cyber espionage itu sendiri merupakan tindakan yang masih belum diatur secara international.Kata Kunci: Hukum Siber; Cyber Espionage; Hukum Internasional.


Sign in / Sign up

Export Citation Format

Share Document