scholarly journals Pedagogical Interaction between Teachers and Students: Mythologized vs Real World

Pedagogika ◽  
2018 ◽  
Vol 130 (2) ◽  
pp. 105-115
Author(s):  
Audronė Juzė Juodaitytė ◽  
Daiva Malinauskienė

The article reveals the complexity of the pedagogical interaction between a teacher and a student and its multi-sensibility. The explanation of pedagogical interaction requires deep scientific-philosophical and practical-constructivist perception of reality. It has been indicated that pedagogical interaction can be based on two cultures: one of them explains reality on the basis of the understanding that occurred in the past, another one explains it with the principles characteristic to the culture of a contemporary teacher. The interaction between pedagogical myths and mythologemes has been revealed. It has been described how these constructs function in pedagogical reality. Mythologized thinking has been analysed in parallel with scientific thinking. It has been explained how a scientific idea in pedagogical practice turns into a myth because not always the diversity of the contexts of culture is taken into account and there is a lack of understanding to which educational culture a scientific idea is appealing. The essence of scientific and empirical reasoning has been defined, their similarities, differences, features of expression in the diversity of the paradigms of modern education have been revealed. It has been indicated that when a scientific statement in pedagogical reality is accepted without a certain paradigmatic context that actualizes it, in this case a scientific idea loses its efficiency and does not influence the context of pedagogical interaction.

2016 ◽  
Vol 5 (4) ◽  
pp. 174-178
Author(s):  
Anna Vladimirovna Guschina

This article explains the importance of educating the younger generation, which is the source of the content stored in the memory of the moral value of the last moral experience; it is shown that a person with moral memory is able to decrypt the text, which contains the previous moral experience, revive the cultural content stored in the culture and morality of moral experience; the content of the concept of moral experience. The author identifies the characteristics of such experiences; shows that the ideas in the mind of the person are born in the process of identifying discrepancies between the concepts of good, justice, tolerance, freedom, etc. and reality; shows how the image of moral teachers, perceived by students, distributes a moral light that, dispelling the darkness of immorality, highlights the values of goodness, mercy, justice, etc., throws moral shadow on the relationship between teacher and student. The author explains that the moral gravity field of teachers and students occurs in the mutual penetration of their moral shadow; explains the essence of the fullness of virtue, the essence of golden rule fullness; concludes that modern education should be based on the values that the student draws from the past and present moral experience.


2020 ◽  
Vol 16 (4) ◽  
pp. 291-300
Author(s):  
Zhenyu Gao ◽  
Yixing Li ◽  
Zhengxin Wang

AbstractThe recently concluded 2019 World Swimming Championships was another major swimming competition that witnessed some great progresses achieved by human athletes in many events. However, some world records created 10 years ago back in the era of high-tech swimsuits remained untouched. With the advancements in technical skills and training methods in the past decade, the inability to break those world records is a strong indication that records with the swimsuit bonus cannot reflect the real progressions achieved by human athletes in history. Many swimming professionals and enthusiasts are eager to know a measure of the real world records had the high-tech swimsuits never been allowed. This paper attempts to restore the real world records in Men’s swimming without high-tech swimsuits by integrating various advanced methods in probabilistic modeling and optimization. Through the modeling and separation of swimsuit bias, natural improvement, and athletes’ intrinsic performance, the result of this paper provides the optimal estimates and the 95% confidence intervals for the real world records. The proposed methodology can also be applied to a variety of similar studies with multi-factor considerations.


2002 ◽  
Vol 2 (4-5) ◽  
pp. 423-424 ◽  
Author(s):  
MAURICE BRUYNOOGHE ◽  
KUNG-KIU LAU

This special issue marks the tenth anniversary of the LOPSTR workshop. LOPSTR started in 1991 as a workshop on Logic Program Synthesis and Transformation, but later it broadened its scope to logic-based Program Development in general.The motivating force behind LOPSTR has been a belief that declarative paradigms such as logic programming are better suited to program development tasks than traditional non-declarative ones such as the imperative paradigm. Specification, synthesis, transformation or specialisation, analysis, verification and debugging can all be given logical foundations, thus providing a unifying framework for the whole development process.In the past ten years or so, such a theoretical framework has indeed begun to emerge. Even tools have been implemented for analysis, verification and specialisation. However, it is fair to say that so far the focus has largely been on programming-in-the-small. So the future challenge is to apply or extend these techniques to programming-in-the-large, in order to tackle software engineering in the real world.


1976 ◽  
Vol 50 (4) ◽  
pp. 503-513 ◽  
Author(s):  
Robert Craig West

Students of the origins and accomplishments of government regulation of economic activity have open suspected that the laws on which regulation is based were addressed to problems and conditions of the past that no longer prevailed, or — what is worse — assumptions about the “real world” that are highly unrealistic. This is Professor West's main conclusion about the Federal Reserve Act of 1913, especially as regards its discount rate and international exchange policies.


2021 ◽  
pp. 026638212110619
Author(s):  
Sharon Richardson

During the past two decades, there have been a number of breakthroughs in the fields of data science and artificial intelligence, made possible by advanced machine learning algorithms trained through access to massive volumes of data. However, their adoption and use in real-world applications remains a challenge. This paper posits that a key limitation in making AI applicable has been a failure to modernise the theoretical frameworks needed to evaluate and adopt outcomes. Such a need was anticipated with the arrival of the digital computer in the 1950s but has remained unrealised. This paper reviews how the field of data science emerged and led to rapid breakthroughs in algorithms underpinning research into artificial intelligence. It then discusses the contextual framework now needed to advance the use of AI in real-world decisions that impact human lives and livelihoods.


Author(s):  
Darrel Moellendorf

This chapter notes that normative International Political Theory (IPT) developed over the past several decades in response to political, social, and economic events. These included the globalization of trade and finance, the increasing credibility of human-rights norms in foreign policy, and a growing awareness of a global ecological crisis. The emergence of normative IPT was not simply an effort to understand these events, but an attempt to offer accounts of what the responses to them should be. Normative IPT, then, was originally doubly responsive to the real world. Additionally, this chapter argues that there is a plausible account of global egalitarianism, which takes the justification of principles of egalitarian justice to depend crucially on features of the social and economic world. The account of global egalitarianism applies to the current circumstances in part because of features of those circumstances.


1974 ◽  
Vol 19 (3) ◽  
pp. 247-257 ◽  
Author(s):  
H. B. M. Murphy

A series of studies over the past decade has shown that Canadians of British origin differ from Canadians of French origin with respect to the symptomatology, frequency, course and probably the treatability of mental disorder. French Canadian schizophrenics exhibit more concern with real or imaginary disturbances of social relationships, whereas British Canadian schizophrenics and alcoholics alike exhibit a greater disregard for such relationships and for the support that goes with them. French Canadian depressives have a greater tendency towards psychomotor retardation and somatic concerns, whereas British Canadian depressives show a greater concern with guilt feelings, obsessiveness, and greater signs of thought disorder. First hospitalizations are proportionately more frequent among British Canadians than among French Canadians in the white-collar strata, but the reverse is true in the blue-collar. The British Canadians have the higher incidence of organic disorders, but the French Canadians of the functional ones. When patients are sent to mental hospital the British Canadians tend to achieve earlier discharge than the French Canadians, but when treatment is given in an outpatient clinic there is some evidence that the French Canadians show the better recovery rate. Connections are suggested between these findings and more general differences between the two cultures and it is suggested that clinicians may be able to put such knowledge to practical use. In particular, it is suggested that attention to maintaining social ties is more important for the French Canadian patient than for the British Canadian who conversely requires more attention to be paid to his intra-psychic ties.


2019 ◽  
Vol 2019 (3) ◽  
pp. 170-190
Author(s):  
Archita Agarwal ◽  
Maurice Herlihy ◽  
Seny Kamara ◽  
Tarik Moataz

Abstract The problem of privatizing statistical databases is a well-studied topic that has culminated with the notion of differential privacy. The complementary problem of securing these differentially private databases, however, has—as far as we know—not been considered in the past. While the security of private databases is in theory orthogonal to the problem of private statistical analysis (e.g., in the central model of differential privacy the curator is trusted) the recent real-world deployments of differentially-private systems suggest that it will become a problem of increasing importance. In this work, we consider the problem of designing encrypted databases (EDB) that support differentially-private statistical queries. More precisely, these EDBs should support a set of encrypted operations with which a curator can securely query and manage its data, and a set of private operations with which an analyst can privately analyze the data. Using such an EDB, a curator can securely outsource its database to an untrusted server (e.g., on-premise or in the cloud) while still allowing an analyst to privately query it. We show how to design an EDB that supports private histogram queries. As a building block, we introduce a differentially-private encrypted counter based on the binary mechanism of Chan et al. (ICALP, 2010). We then carefully combine multiple instances of this counter with a standard encrypted database scheme to support differentially-private histogram queries.


Author(s):  
Sean Stevens ◽  
Lee Jussim ◽  
Nathan Honeycutt

This paper explores the suppression of ideas within academic scholarship by academics, either by self-suppression or because of the efforts of other academics. Legal, moral, and social issues distinguishing freedom of speech, freedom of inquiry, and academic freedom are reviewed. How these freedoms and protections can come into tension is then explored by a sociological analysis of denunciation mobs who exercise their legal free speech rights to call for punishing scholars who express ideas they disapprove of and condemn. When successful, these efforts, which constitute legally protected speech, will suppress certain ideas. Real-world examples over the past five years of academics who have been sanctioned or terminated for scholarship targeted by a denunciation mob are then explored.


Sign in / Sign up

Export Citation Format

Share Document