Surprisal Analysis-Based Compaction of Entangled Molecular States of Maximal Entropy
James R. Hamilton, Francoise Remacle, Raphael D. Levine
An attosecond optical pulse can entangle coherently related states of different characters, such as electronic and vibrational, in a molecular system. Using a quantum information theoretic approach, we explicitly define and discuss the surprisal of such a system in the maximal entropy formalism and identify the constraints and their conjugate Lagrange multipliers. Surprisal analysis shows how these constraints become fewer and simpler in the sudden approximation of the dynamics, a limit often valid for an ultrafast excitation. The optically accessible lower electronic states of N<sub>2</sub> are used as a numerical example to show the compaction of the dynamics from <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi mathvariant="script">O</mi><mfenced separators="|"><mrow><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup></mrow></mfenced></mrow></semantics></math></inline-formula> down to <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi mathvariant="script">O</mi><mfenced separators="|"><mrow><mi>n</mi></mrow></mfenced></mrow></semantics></math></inline-formula> constraints, where <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>n</mi></mrow></semantics></math></inline-formula> is the number of vibronic states. The von Neumann entropy is used to confirm the fidelity of the compaction.
Theoretical Foundations of Digital Content Integrity Expertise
Bobok I.I., Kobozieva A.A.
In the context of the rapid development of information technologies, their implementation in the process of functioning of critical infrastructure, in particular energy, of any state is extreme-ly relevant. At the same time, the continuity and quality of functioning of any automated system in the digital space critically depends on ensuring the integrity of the information used. The ef-fectiveness of digital content integrity expertise methods is determined by their theoretical foun-dations. Existing theoretical approaches do not allow obtaining a final solution to this problem. The aim of this work is to develop a general approach to the analysis of the state of information systems, based on the theory of matrices, for its use in the examination of the integrity of digital content. The objective was achieved by investigating the perturbation properties of singular val-ues and singular vectors of the image (or video frame) matrix as a result of perturbation for orig-inal and non-original contents. The most important results of the work are: substantiation for non-original content of the destruction of the monotony of the trend of the function of depend-ence of the disturbance of the singular number on its number, which takes place for original content; substantiation of the fundamental possibility of estimating the magnitude of the perturb-ing effect. The significance of the obtained results lies in their subsequent use for the develop-ment of universal methods for examining the integrity of digital images, video, in particular ste-ganoanalytical methods, which make it possible not only to identify the fact of integrity viola-tion, but also to assess the magnitude of the perturbing effect, which is extremely important in steganoanalysis, where this value characterizes the throughput of a hidden communication channel.
Electrical engineering. Electronics. Nuclear engineering, Production of electric energy or power. Powerplants. Central stations
Classical Test Theory and Item Response Theory Validity and Reliability Evidence of Problem Behavior Evaluation Scale
Eylem Dayı, Çetin Toraman, Nevin Güner
et al.
Introduction: In educational environments, problem behaviors, including many related to non-cooperation with school and classroom rules, are defined as those that threaten students' safety, negatively affect their social interaction, and distract teachers and students from academic activities. Identifying problem behaviors that negatively affect the educational environment is important in controlling and reducing these behaviors.Method: This study aims to examine the validity and reliability of the Problem Behavior Evaluation Scale (PBES) evidence, which will evaluate students' problem behaviors based on teachers' observations and perceptions, according to classical test theory and item response theory. We prepared the scale items by conducting a literature review and finalizing them by assessing expert opinions. A total of 590 teachers participated in the study to examine the scale's reliability and validity. Based on the collected data, we examined exploratory factor analysis, confirmatory factor analysis, item characteristic curves, item information functions, and item discriminations according to item response theory. We determined the scale's reliability evidence with Cronbach's Alpha, McDonald's Omega, and marginal reliability coefficients.Findings: As a result of the analyses, we determined that the PBES is a valid scale with 18 items and two factors. We determined the reliability of PBES by Cronbach's Alpha and McDonald's Omega coefficients according to classical test theory and the marginal reliability coefficient according to item response theory. The results showed that the PBES had a high level of reliability. As a result of the analysis, the first factor consisted of 10 items, and the second factor consisted of eight items.Discussion: With its 18-item and two-factor structure, the PBES is a proper, simple, easy-to-respond scale. The scale can be used in primary schools in Türkiye to assess students' problem behaviors based on teachers' observations and perceptions. It can also provide support for scientific studies on problem behaviors.
Special aspects of education
The barriers to technology adoption among businesses in the informal economy in Cape Town
Abdul Q. Ebrahim, Carolien L. Van den Berg
Background: Despite being significant contributors to the economy, informal businesses operate with limited resources. In South Africa, the informal sector is substantial, accounting for approximately 30% of total employment and around 6% of gross domestic product (GDP). These businesses often struggle to adopt and leverage technology constraining their capacity for growth and innovation, ultimately limiting their contribution to economic development and the alleviation of socio-economic challenges.
Objectives: The objective of this study was to investigate the factors that influence the barriers to adopting digital technologies in South Africa’s informal economy.
Method: This study adopted a qualitative research approach, using semi-structured interviews and purposive sampling to collect data from 14 informal business owners in Cape Town. Participants provided informed consent and thematic analysis was conducted using the Unified Theory of Acceptance and Use of Technology (UTAUT) framework.
Results: Findings revealed barriers including cash preference, load-shedding, crime and digital incompetency obstructing technology adoption. Despite these hurdles, the potential benefits of digital technology for informal businesses were underscored.
Conclusion: The study suggests untapped potential in enhancing technology adoption among informal businesses through targeted interventions. By addressing identified barriers, such initiatives could significantly bolster the informal economy’s impact on South Africa’s socio-economic landscape.
Contribution: This research contributes to understanding the complexities surrounding technology adoption in South Africa’s informal economy. It offers insights for policymakers, practitioners and stakeholders seeking to promote digital inclusion and economic empowerment within marginalised sectors.
Management information systems, Information theory
Mini review: possible role of the multi-theory model of health behavior change in designing substance use prevention and treatment interventions
Manoj Sharma, Manoj Sharma, Asma Awan
et al.
Many behavior change theories have evolved over time. Originally, the first conceptions prioritized interventions based on information, such as raising awareness and transferring knowledge. Second-generation theories prioritize the development of skills and the promotion of awareness. The emergence of evidence-based techniques in the 1990s gave rise to third-generation theories such as the Theory of Planned Behavior and Social Cognitive Theory. Presently, fourth-generation trends amalgamate various components from multiple theories to implement accurate treatments, employing technology and emphasizing targeted behavior change. This paper aims to do a concise evaluation of the multi-theory model (MTM) of health behavior change interventions in the context of planning substance use prevention and treatment. The current area of intervention programs aimed at preventing and treating substance use may benefit from MTM, an innovative fourth-generation behavior change model. Tobacco, alcohol, and other drugs have all been the subjects of experimental, cross-sectional, and qualitative research. We have presented that additional research is required to compare MTM with knowledge-based therapies or interventions grounded in other theories. A gold standard would be the randomized controlled trials and behavioral change interventions particularly useful for this purpose. In addition, research evaluating the interventions’ efficacy must be carefully planned and executed.
Public aspects of medicine
On the horns of a dilemma: Experts as communicators for property‐level flood risk adaptation measures
Peter R. Davids, Sally Priest, Thomas Hartmann
Abstract This paper investigates the role of flood risk experts in supporting homeowners to implement property‐level flood risk adaption (PLFRA). Homeowners can reduce their flood risks by implementing PLFRA. However, oftentimes they need advice on what sort of and how to implement PLFRA. This means that tailored experts advice is necessary to inform homeowners on such measures. But experience shows that mere information is often insufficient to motivate homeowners to realise measures. This contribution explores the reasons for the ineffectiveness of expert advice by investigating how expert advice responds to homeowners' rationalities. Based on a case study from Flanders, Belgium, this paper reveals how the relation between experts and homeowners differs related to different rationalities of homeowners. The paper uses Cultural Theory to discuss strategies on how experts, providing advice on property‐level risk adaption, could move beyond engineering skills by also using risk communication skills in order to involve homeowners in flood risk governance.
River protective works. Regulation. Flood control, Disasters and engineering
Avalanche-size distribution of Cayley tree
Amikam Patron
Abstract Attacks on networks is a very important issue in developing strategies of eradicating spreads of malicious phenomena in networks, such as epidemics and fake information. This field of research is referred to as networks immunization. The traditional approach to evaluating the effectiveness of attacks on networks focuses on measuring macro parameters related to the entire attack, such as the critical probability of a percolation occurrence in the network $$p_c$$ p c and the relative size of the largest component in the network, known as the giant component, but not considering the attack on a micro perspective, which is the analysis of node removals, during an attack, themselves, their characteristics and results. In this paper we present and apply the last method of focusing on the micro scale of an attack. Based on the theory of percolation in networks, we analyze the phenomenon of an avalanche which results due to a single node removal from a network. An avalanche is a state in which a removal of a single node from the giant component of a network leads to the disconnection of additional nodes. This process significantly contributes to the fragmentation (immunization) of the network, comparing to the impact of the initial node removal alone. Specifically, we focus on the size parameter of an avalanche, which is the number of nodes that are disconnected from the giant component due to a single node removal. Relating to a random attack on a network of the type of Cayley tree, we derive analytically the distribution of the sizes of avalanches that occur during the entire attack on it, until the network is dismantled (immunized) and the attack is terminated.
Connectivity Analysis in EEG Data: A Tutorial Review of the State of the Art and Emerging Trends
Giovanni Chiarion, Laura Sparacino, Yuri Antonacci
et al.
Understanding how different areas of the human brain communicate with each other is a crucial issue in neuroscience. The concepts of structural, functional and effective connectivity have been widely exploited to describe the human connectome, consisting of brain networks, their structural connections and functional interactions. Despite high-spatial-resolution imaging techniques such as functional magnetic resonance imaging (fMRI) being widely used to map this complex network of multiple interactions, electroencephalographic (EEG) recordings claim high temporal resolution and are thus perfectly suitable to describe either spatially distributed and temporally dynamic patterns of neural activation and connectivity. In this work, we provide a technical account and a categorization of the most-used data-driven approaches to assess brain-functional connectivity, intended as the study of the statistical dependencies between the recorded EEG signals. Different pairwise and multivariate, as well as directed and non-directed connectivity metrics are discussed with a pros–cons approach, in the time, frequency, and information-theoretic domains. The establishment of conceptual and mathematical relationships between metrics from these three frameworks, and the discussion of novel methodological approaches, will allow the reader to go deep into the problem of inferring functional connectivity in complex networks. Furthermore, emerging trends for the description of extended forms of connectivity (e.g., high-order interactions) are also discussed, along with graph-theory tools exploring the topological properties of the network of connections provided by the proposed metrics. Applications to EEG data are reviewed. In addition, the importance of source localization, and the impacts of signal acquisition and pre-processing techniques (e.g., filtering, source localization, and artifact rejection) on the connectivity estimates are recognized and discussed. By going through this review, the reader could delve deeply into the entire process of EEG pre-processing and analysis for the study of brain functional connectivity and learning, thereby exploiting novel methodologies and approaches to the problem of inferring connectivity within complex networks.
Technology, Biology (General)
Mind as Machine: The Influence of Mechanism on the Conceptual Foundations of the Computer Metaphor
Pavel N. Baryshnikov
This article will focus on the mechanistic origins of the computer metaphor, which forms the conceptual framework for the methodology of the cognitive sciences, some areas of artificial intelligence and the philosophy of mind. The connection between the history of computing technology, epistemology and the philosophy of mind is expressed through the metaphorical dictionaries of the philosophical discourse of a particular era. The conceptual clarification of this connection and the substantiation of the mechanistic components of the computer metaphor is the main goal of this article. The statement is substantiated that the invention of mechanical computing devices, having a long history in the European engineering tradition, formed the prerequisites for the emergence of machine functionalism in the modern philosophy of mind. The idea of multiple implementation stems from the principle that a formal symbol system prescribes rules for the use of rational abstractions through the physical architecture of a computational engine. The article considers the reasons for the conceptual shift and reveals the semantic foundations for the metaphorical transfer of the properties of abstract objects from the theory of automata to the field of modern philosophy of mind. The criticism and ways of protecting the philosophical program of machine functionalism are analyzed by changing the content of the metaphor “Mind as machine”. The reasons for the stability of the information-computer approach in cognitive sciences are also disclosed and explained.
Philosophy. Psychology. Religion
On the Comparative Suitability of Strain Relaxation and Stress Relaxation Compression for Ultrasound Poroelastic Tissue Characterization
Maria Theodorou, Maria Theodorou, Jeremie Fromageau
et al.
Poroelastic tissue strain imaging measures the time-varying and spatially varying deformation of a soft-tissue matrix during compression as the tissue fluid flows out of the compartmental boundaries. With the help of ultrasound, it has been carried out by observing the evolution of the images of the ultrasound echo strain over time, which shows that, in a stress-relaxation experiment (constantly applied global axial strain), a front of negative dilatation (volumetric strain) propagates slowly from the boundaries of a sample toward the center of the compressed region. The fitting of equations that predict this behavior to experimental data has earlier allowed quantitative imaging of the product of aggregate modulus and permeability of a tissue phantom, HAk, and its Poisson's ratio, ν. An ability to image and measure such novel tissue characteristics is likely to benefit biomedical research and have a wide range of clinical applications, including the assessment of lymphoedema, the diagnosis of cancer, the prediction of anticancer drug effectiveness, and monitoring of the tissue response to various treatments. This method is problematic, however, for application in vivo because the calculation of the volumetric strain requires the lateral and elevational strains, which are not easily measured accurately with conventional ultrasound strain imaging. This paper investigates for the first time whether the ultrasound observation in a strain-relaxation experiment (constantly applied uniaxial stress) could be used to observe the same mechanical behavior and provide the same information about the properties of a poroelastic sample as in a stress-relaxation experiment. The analytical theory was used to demonstrate that the propagation of dilatation shown in stress relaxation should also be observable in strain relaxation and that it should be detectable using axial strain, which is relatively easily measured in vivo. Finite element modeling (FEM) was employed to simulate all strain components within a homogeneous poroelastic material first during strain relaxation and then during stress relaxation, again demonstrating their equivalence for the observation of the propagation of a dilatation. The validity of using the strain relaxation conditions as an alternative to stress relaxation for measuring a poroelastic material's response was further confirmed by a fitting of the analytical models to the results of FEM. This allowed for an inversion of the time-varying volumetric strain, to recover the images of HAk and ν, for either loading configuration. The strain-relaxation configuration offers not only an opportunity to derive the same important quantitative poroelastic properties of the tissue as stress relaxation but also the potential to avoid the difficulties and errors associated with the estimation of strain along the axes perpendicular to the imaging axis, thus offering opportunities for easier clinical translation.
Dataset on Islamic ethical work behavior among Bruneian Malay Muslim teachers with measures concerning religiosity and theory of planned behavior
Nur Amali Aminnuddin
The data presents an examination of Islamic ethical work behavior of Malay Muslim teachers in Brunei through religiosity and theory of planned behavior. The total number of participants was 370 Bruneian Malay Muslim teachers. The participants were sampled from two different types of school systems being non-religious schools and religious schools, with five schools each. By documenting information of the data, this data article presented the demographic characteristics of participants, and reliability and correlation of measures involved. Analyses of the data can provide insights into determinants and in predicting Islamic ethical work behavior. Furthermore, the data will be useful for researchers and policymakers that are interested in knowing the current situation of religiosity and behavior in the country. It can also be used as references in developing interventions, promoting and facilitating Islamic ethical work behavior in the workplace. Keywords: Islam, Muslim, Work ethic, Ethical behavior, Islamic work ethic, Religiosity, Theory of planned behavior, Brunei
Computer applications to medicine. Medical informatics, Science (General)
CONSTRUCTION OF INFORMATION TECHNOLOGY FOR DEVELOPMENT OF KNOWLEDGE BASE ON IDENTIFICATION OF URBAN STRUCTURES ON DIGITAL SPACE AND AERIAL PHOTOGRAPHS IN THE URBAN ENVIRONMENT MONITORING
Volodymyr Pustovarov
The efficiency and quality of modern city management are directly linked to the relevant monitoring. Improving the efficiency and validity of the obtained data on the urban environment is possible due to the automation of the system of urban objects identification on digital space and aerial photographs, which involves determining their changes. Therefore, a knowledge base (data), which consists of a set of rules, facts, an inference mechanism that can be implemented through the use of deep neural network or hybrid (fuzzy neural network) models, is therefore needed. This academic paper proposes the technology of formal presentation of the information technology construction for the development of a knowledge base on the identification of urban structures on digital space and aerial photographs in automated monitoring of the urban environment. The developed technology identifies an interdependent set of phases, with the possibility of further parallelization of sub-stages, taking into account the peculiarities of knowledge representation (formalization) on the identification of urban structures on digital space and aerial photographs in automated monitoring of the urban environment.
Computer software, Information theory
Development of a conceptual framework for a group-based format of the Lifestyle-integrated Functional Exercise (gLiFE) programme and its initial feasibility testing
Franziska Kramer, Sarah Labudek, Carl-Philipp Jansen
et al.
Abstract Background The Lifestyle-integrated Functional Exercise (LiFE) programme is a fall prevention programme originally taught in a resource-intensive one-to-one format with limited feasibility for large-scale implementation. The aim of this paper is to present the conceptual framework and initial feasibility evaluation of a group-based LiFE (gLiFE) format developed for large-scale implementation. Methods The conceptual gLiFE framework (part I) is based on three pillars, LiFE Activities and Principles, Theory of Behaviour Change and Behaviour Change Techniques, and Instruction. The feasibility of gLiFE was tested (part II) within a multimodal approach including quantitative questionnaires measuring safety, acceptability (1 = best to 7 = insufficient), and adherence to the LiFE activities (range = 0–14) as well as a focus group interview. Exploratory self-reported measures on behaviour change including self-determined motivation (range = 1–5), intention, planning, action control, and habit strength (range = 1–6) were assessed pre and post intervention. Data analyses were performed using descriptive statistics and qualitative content analysis. Results The development process resulted in a manualised gLiFE concept containing standardised information on gLiFE’s content and structure. Feasibility testing: Six older adults (median = 72.8 years, 5 female) completed the feasibility study and rated safety (median = 7.0, IQR = 0.3) and acceptability as high (median = 1, IQR = 1). Participants implemented 9.5 LiFE activities (IQR = 4.0) into their daily routines. No adverse events occurred during the study. In the focus group, the group format and LiFE activities were perceived as positive and important for maintaining strength and balance capacity. Self-determined motivation intention, planning, and habit strength were rated higher post intervention. Conclusion The developed conceptual gLiFE framework represents the basis for a gLiFE format with potential for standardised large-scale implementation. Proof-of-concept could be demonstrated in a group of community-dwelling older adults at risk of falling. The public health potential of gLiFE in terms of (cost-)effectiveness is currently being evaluated in a large trial. Trial registration ClinicalTrials.gov NCT03412123. Registered on January 26, 2018
A Study of the Cross-Scale Causation and Information Flow in a Stormy Model Mid-Latitude Atmosphere
X. San Liang
A fundamental problem regarding the storm⁻jet stream interaction in the extratropical atmosphere is how energy and information are exchanged between scales. While energy transfer has been extensively investigated, the latter has been mostly overlooked, mainly due to a lack of appropriate theory and methodology. Using a recently established rigorous formalism of information flow, this study attempts to examine the problem in the setting of a three-dimensional quasi-geostrophic zonal jet, with storms excited by a set of optimal perturbation modes. We choose for this study a period when the self-sustained oscillation is in quasi-equilibrium, and when the energetics mimick the mid-latitude atmospheric circulation where available potential energy is cascaded downward to smaller scales, and kinetic energy is inversely transferred upward toward larger scales. By inverting a three-dimensional elliptic differential operator, the model is first converted into a low-dimensional dynamical system, where the components correspond to different time scales. The information exchange between the scales is then computed through ensemble prediction. For this particular problem, the resulting cross-scale information flow is mostly from smaller scales to larger scales. That is to say, during this period, this model extratropical atmosphere is dominated by a bottom-up causation, as collective patterns emerge out of independent entities and macroscopic thermodynamic properties evolve from random molecular motions. This study makes a first step toward an important field in understanding the eddy⁻mean flow interaction in weather and climate phenomena such as atmospheric blocking, storm track, North Atlantic Oscillation, to name a few.
Information and knowledge sharing within virtual communities of practice
Hermon B. Ogbamichael, Stuart Warden
Background: The concept of a virtual community of practice (VCoP) emanates from the need to create a new mode of learning and knowledge development platform. It has also been found that highly structured forums are not always the best way to assist people to learn and improve their knowledge. The first author (main researcher) has limited background knowledge and professional practice in the area of VCoPs. Within this context, the investigation of the use of VCoPs to optimise knowledge sharing within stakeholders is the central theme of this research. The authors adapted the life cycle knowledge flow model and present an extended model that resulted after an empirical research was conducted with various VCoPs.
Objectives: The objective of this paper is to report on the research that, firstly, attempted to find a suitable model among all previous research conducted on knowledge sharing (management) and to create a new model that could be used to optimise knowledge sharing within VCoPs.
Method: In this research, a review of literature was used to define the main concepts of this research. A qualitative methodology was used. The responses received using two questionnaires were analysed to establish some premise, derived from the findings. The Miles and Huberman framework for qualitative analysis was also used to analyse the data set received from participants in the two questionnaires administered. This framework for analysis includes data reduction, data display, drawing and verifying conclusions.
Results: An extended life cycle knowledge flow model is proposed to optimise knowledge sharing within VCoPs.
Conclusion: A comprehensive knowledge flow model, namely the extended life cycle knowledge flow model, was found to be most suited from the literature. The analysis of two questionnaires, one administered in 2011–2012 and the other in 2016, led to the adaptation of the model to enhance knowledge sharing within VCoPs and, in turn, to develop and optimise knowledge sharing in enterprises.
Management information systems, Information theory
Intuition and wisdom in decision making
Ivan Rocha Neto, Itiro Iida
Abstract Paper aims This article discusses the importance of intuition and wisdom for timely andsuccessful decision making and highlights the features of intuitive leaders. Originality As engineers reach higher hierarchical levels, technical knowledge must be balanced with intuition, a matter that is not addressed in their education. Research method It is a theoretical essay illustrated by an example. Main findings Information is always incomplete and imperfect, and thus intuition plays a key role on effective decision making Implications for theory and practice It sheds light on the importance of intuition in decision making, which is not discussed in Engineering courses curricula. It also presents the example of Lynaldo Cavalcanti de Albuquerque, former President of the Federal University of Paraiba (UFPb) and the National Council of Scientific and Technological Development (CNPq), who can be a role model of a effective decision maker, and a visionary and intuitive leader.
Industrial productivity, Industrial engineering. Management engineering
The causal inference of cortical neural networks during music improvisations.
Xiaogeng Wan, Björn Crüts, Henrik Jeldtoft Jensen
We present an EEG study of two music improvisation experiments. Professional musicians with high level of improvisation skills were asked to perform music either according to notes (composed music) or in improvisation. Each piece of music was performed in two different modes: strict mode and "let-go" mode. Synchronized EEG data was measured from both musicians and listeners. We used one of the most reliable causality measures: conditional Mutual Information from Mixed Embedding (MIME), to analyze directed correlations between different EEG channels, which was combined with network theory to construct both intra-brain and cross-brain networks. Differences were identified in intra-brain neural networks between composed music and improvisation and between strict mode and "let-go" mode. Particular brain regions such as frontal, parietal and temporal regions were found to play a key role in differentiating the brain activities between different playing conditions. By comparing the level of degree centralities in intra-brain neural networks, we found a difference between the response of musicians and the listeners when comparing the different playing conditions.
Nevyriausybinių organizacijų elektroninio dalyvavimo raška
Kristina Jakutytė-Ancienė
Lietuvoje informacijos sklaidą visuomenėje kuruojančias institucijas siejantis viešosios erdvės laukas dažnai pajungiamas privatiems, komerciniams interesams, todėl stiprėjant pilietinės visuomenės poreikiui dalyvauti priimant ir įgyvendinant sprendimus siekiama nustatyti socialinį įsitraukimą (dalyvavimą) ir e. dalyvavimą lemiančius veiksnius. Vienas aktyviausių pilietinę veiklą įgyvendinančių organų – nevyriausybinės organizacijos.
Lietuvoje e. dalyvavimas dažniausiai suprantamas kaip viešųjų paslaugų teikimas ar e. komercija. Siekiant aptarti e. dalyvavimą kaip komunikacinę sąrangą, stiprinančią dalyvaujamąją demokratiją ir pilietiškumą, neatsiejama viešosios erdvės, kaip informacijos sklaidos lauko, dimensija. Moksliniam tyrimui pasirinktas objektas – nevyriausybinių organizacijų e. dalyvavimo raiškos – Lietuvoje dar nenagrinėtas. Kyla mokslinė problema: ar trečiojo sektoriaus veikloms įgyvendinti pasitelktas e. dalyvavimas ir visuomenei aktualiems klausimams svarstyti ir viešinti išnaudojama viešoji erdvė gali paskatinti pilietiškumą, dalyvaujamosios demokratijos įsitvirtinimą ir užtikrinti visuomenės e. dalyvavimą?
Expression of Non-governmental Organizations’ E-participation
Kristina Jakutytė-Ancienė
Summary
The public sphere uniting the Lithuanian institutions that supervise information dissemination in the public usually attracts private and commercial interest; therefore, with an increasing demand of civil society to participate in decision-making and implementation processes, it is necessary to define the factors that determine social involvement (participation) and e-participation. Non-governmental organizations are most active institutions implementing civil activities. In Lithuania, e-participation is usually considered as the provision of public services and e-commerce. In this article, e-participation is discussed as a communication framework enhancing participatory democracy and citizenship. According to this communicative aspect, e-participation is also analyzed as an integral part of the public sphere and as a dimension of information dissemination. The research analyses the expressions of non-governmental organizations’ e-participation, which have never been studied in Lithuania. The research is focused on the following scientific problem: may the e-participation used for the implementation of third sector activities and the public sphere used for the consideration and announcement of urgent issues encourage active citizenship, establishment of participatory democracy and ensure public e-participation?
Key words: e-participation, public sphere, non-governmental organizations, postmodernism, critical theory, modern public sphere
Communication. Mass media
Method for Generating Pseudorandom Sequences with the Assured Period Based on R-blocks
M. A. Ivanov, V. E. Ryabkov, I. V. Chugunkov
et al.
The article describes the characteristics of a new class of fast-acting pseudorandom number generators, based on the use of stochastic adders or R-blocks. A new method for generating pseudorandom sequences with the assured length of period is offered.
Information technology, Information theory
Indigenous Research: Three Researchers Reflect on their Experiences at the Interface
Deanne Minniecon, Naomi Franks, Maree Heffernan
Abstract
Utilising Nakata’s (2007) description of the “cultural
interface”, two Indigenous researchers and one
non-Indigenous researcher examine their development of
Indigenous research in and with Aboriginal and Torres
Strait Islander communities conducted from within an
institution of higher education. The authors reflect on
their experiences in developing an Indigenous research
project and use Indigenous standpoint theory as a device to
explore these experiences. The framing of priorities and
research questions, ethics processes, the treatment of
project information or data, the managing of competing
accountabilities, and the role of non-Indigenous
researchers in Indigenous research are all explored in
these reflections.
Special aspects of education