451 |
A meta-analysis of functional neuroimaging studies of ketamine administration in healthy volunteersAit Bentaleb, Karim 01 1900 (has links)
Cette méta-analyse étudie l'impact de la kétamine sur l'activité cérébrale fonctionnelle chez les participants sains, la présentant comme un modèle de psychose étant donné sa capacité à induire des états psychomimétiques à des doses élevées. Les précédentes études de neuroimagerie fonctionnelle ont montré des résultats hétérogènes et des tailles d'échantillon faibles, donc une méta-analyse pour une meilleure compréhension était une lacune importante à combler dans la littérature. Une synthèse complète a été réalisée en utilisant la Cartographie Différentielle Signée, de coordonnées maximales issues d'études de neuroimagerie—10 au repos et 23 basées sur des tâches, dont 9 se concentrent sur les fonctions exécutives, offrant un regard approfondi sur la réaction du cerveau à l'administration de kétamine chez les participants sains. L'analyse basée sur les tâches n'a révélé de résultats que pour les études sur les fonctions exécutives (n=9), ce qui n'était pas surprenant, car différents types de tâches sollicitent l'activité de différentes régions du cerveau. Une analyse statistique rigoureuse a montré une activité accrue dans le cortex cingulaire antérieur dorsal au repos et une activation accrue dans le gyrus de Heschl droit pendant les tâches exécutives après administration de kétamine. De plus, des pics d'activité dans l'insula antérieure droite et le gyrus fusiforme droit au repos, et pour les fonctions exécutives au niveau du cortex cingulaire antérieur rostral ont été trouvés dans nos résultats non corrigés. Les enquêtes en état de repos ont révélé des changements dans les noeuds critiques du réseau de saillance, similaires à ce qui a été observé dans la schizophrénie, tandis que les analyses basées sur les tâches ont indiqué des effets sur les régions cérébrales non pertinentes pour la tâche qui pourraient être expliqués
5
comme des mécanismes compensatoires. L'incapacité potentielle à désactiver le réseau mode par défaut pendant les tâches exécutives, comme le suggère l'activité accrue du rACC, reflète des schémas similaires observés dans la schizophrénie, validant ainsi le modèle kétamine de la psychose. Les résultats soulignent également la nécessité d'examiner davantage les fondements neuronaux de la kétamine en ce qui concerne ses propriétés antidépresseurs. L'une de nos limites est une taille d'échantillon plus faible et les conclusions devraient être mises à jour à mesure que davantage d’analyses cérébrales sous kétamine sont réalisés. / This meta-analysis analysis the impact of ketamine on functional brain activity in healthy participants, showcasing it as a model of psychosis given its capability to induce psychotomimetic states in high doses. Previous functional neuroimaging studies had heterogeneous results and small sample sizes, so a meta-analysis for better understanding was an important gap in the literature to address. A comprehensive synthesis was performed using Signed Differential Mapping, of peak coordinates from neuroimaging studies—10 at rest and 23 task-based, with 9 focusing on executive functions, providing an in-depth look at the brain's response to ketamine administration in healthy participants. Task-based analysis only revealed results for executive function studies (n=9), which was unsurprising as different types of tasks elicit the activity of different brain regions. A stringent statistical analysis reveals heightened activity in the dorsal anterior cingulate cortex during rest and increased activation in the right Heschl's gyrus amid executive tasks post ketamine administration. Additionally, potential activity spikes in the right anterior insula and the right fusiform gyrus at rest, and for executive functions at the rostral anterior cingulate cortex were found in our uncorrected results. Resting-state investigations revealed changes in critical nodes of the salience network, similarly to what has been observed in schizophrenia, while task-based analyses indicated effects on task-irrelevant brain regions that could be explained as compensatory mechanisms. The potential inability to deactivate the default mode network during executive tasks, as suggested by heightened rostral ACC activity, mirrors similar patterns observed in schizophrenia, thereby validating the ketamine model of psychosis. The results also emphasize the need for further examination of ketamine's neural underpinnings pertaining to its antidepressant properties. One of our limitations is a lower sample size and learnings should be updated as more brain scans under ketamine are realized.
|
452 |
Händelsekonstruktion genom säkrande och analys av data från ett hemautomationssystem / Event Reconstruction by Securing and Analyzing Data from a Home Automation SystemBaghyari, Roza, Nykvist, Carolina January 2019 (has links)
I detta examensarbete har tidsstämplar extraherats ur ett forensiskt perspektiv från ett hemautomationssystem med styrenheten Homey från Athom. Först konstruerades ett fiktivt händelsescenario gällande ett inbrott i en lägenhet med ett hemautomationssystem. Hemautomationssystemet bestod av flera perifera enheter som använde olika trådlösa nätverksprotokoll. Enheterna triggades under händelsescenariot. Därefter testades olika metoder för att få ut data i form av tidsstämplar. De metoder som testades var rest-API, UART och chip-off på flashminnet medan JTAG inte hanns med på grund av tidsbrist. Den metod som gav bäst resultat var rest-API:t som möjliggjorde extrahering av alla tidsstämplar samt information om alla enheter. I flashminnet hittades alla tidsstämplar, men det var inte möjligt att koppla ihop dessa tidsstämplar med en specifik enhet utan att använda information från rest-API:t. Trots att rest-API:t gav bäst resultat så var det den metod som krävde en mängd förutsättningar i form av bland annat inloggningsuppgifter eller en rootad mobil. Med hjälp av de extraherade tidsstämplarna rekonstruerades sedan händelsescenariot för inbrottet. / The purpose of this bachelor thesis was to extract timestamps from a home automation system with a control unit named Homey in a forensic perspective. The first step was to create a course of event regarding a burglar breaking into an apartment with home automation. The home automation system consisted of some peripheral units using different types of wireless network protocols. All these units were triggered during the break in. Thereafter different types of methods were tested in an attempt to extract the timestamps for each unit. These methods included rest-API, UART and chip-off on a flash memory. The method using JTAG were not tested due to lack of time. Rest-API was the method that provided most information about the units and time stamps. The flash memory also contained every timestamp, however it did not provide any information about which timestamp belonged to which unit. Even though the rest-API was the best method to extract data, it was also the method with most requirements such as credentials or a rooted smartphone. With the extracted timestamps it was possible to reconstruct the course of events of the break-in.
|
453 |
Towards interoperability, self-management, and scalability for scalability for machine-to-machine systems / Vers l'interopérabilité, l'autogestion, et la scalabilité des systèmes Machine-to-MachineBen Alaya, Mahdi 06 July 2015 (has links)
La communication Machine-to-Machine (M2M) est l'un des principaux fondements de l'Internet des Objets (IoT). C'est un phénomène qui a évolué discrètement au cours du temps et vient d’émerger à la surface pour do! nner naissance à une explosion de nouveaux usages et services. Capteurs, actionneurs, tags, véhicules et objets intelligents ont tous la possibilité de communiquer. Le nombre de connexions M2M est en constante augmentation et il est prévu de voir des milliards d’objets connectés dans un futur proche. Les applications M2M offrent des avantages dans divers domaines à savoir les villes intelligentes, les voitures connectées, les usines du futures, l’agriculture de précision, l’environnement, la santé, etc. La croissance rapide de cet écosystème est entrain de conduire le M2M vers un avenir prometteur. Cependant, les opportunités d'expansion des marchés M2M ne sont pas évidentes. En effet, un ensemble de challenges doivent être surmontés afin de permettre un déploiement à grande échelle dans des domaines diverses et variés à savoir les défis d’interopérabilité, de complexité et de scalabilité. Actuellement, le marché du M2M souffre d'une fragmentation verticale importante touchant la majorité des domaines industriels. En effet, diverses solutions propriétaires ont été conçues pour répondre à des applications spécifiques engendrant ainsi un sérieux problème d''interopérabilité. Pour adresser ce challenge, nous avons conçu, développer et expérimenté la plateforme OM2M offrant une architecture opérationnelle, flexible et extensible pour l'interopérabilité M2M conforme à la norme SmartM2M. Pour supporter les environnements contraints, nous avons proposé une nouvelle convention de nommage basée sur une structure de ressources non-hiérarchique permettant d’optimiser la taille des messages échangés. Pour assurer l’interopérabilité sémantique entre les applications et les machines, nous avons proposé l'ontologie IoT-O. Cette dernière est composée de cinq modèles de base représentant les capteurs, les actionneurs, les observations, les actuations et les web ! services pour permettre de converger rapidement vers un vocabulaire commun pour l'IoT. Une plateforme M2M horizontale permet d'interconnecter des machines hétérogènes largement distribués et qui évoluent fréquemment en fonction des changements de l’environnement. Maintenir ces systèmes complexes en vie est coûteux en termes de temps et d'argent. Pour adresser ce challenge, nous avons conçu, développé et intégré le framework FRAMESELF afin d'ajouter des capacités d'autogestion aux systèmes M2M basées sur le paradigme de l'informatique autonome. En étendant le modèle d'architecture de référence MAPE-K, notre solution permet d'adapter dynamiquement le comportement de la plateforme OM2M par en fonctions des changements du contexte et des politiques haut niveaux. Nous avons défini un ensemble de règles sémantiques pour faire du raisonnement sur l'ontologie IoT-O en tant que modèle de connaissance. Notre objectif est de permettre la découverte automatique entre les machines et les applications à travers un appariement sémantique et une reconfiguration dynam! ique de l'architecture des ressources. L’interopérabilité et l’autogestion ouvrent la voie à un déploiement de masse des systèmes M2M. Par contre, ces derniers se basent sur l'infrastructure actuelle d'internet qui n'a jamais été conçu pour ce genre de d'utilisation ce qui pose de nouvelles exigences en termes de scalabilité. Pour adresser ce challenge, nous avons conçu, simulé et validé l'approche OSCL proposant une nouvelle topologie de réseau maillé M2M comme alternative à l'approche centralisée actuelle. OSCL s'appuie sur les techniques de routage centrées sur l'information favorisant les communications à sauts multiples et un cache distribué pour une meilleure dissémination des données. Nous avons développé le simulateur OSCLsim pour valider l'approche proposée.[...] / Machine-to-Machine (M2M) is one of the main features of Internet of Things (IoT). It is a phenomenon that has been proceeding quietly in the background, and it is coming into the surface, where explosion of usage scenarios in businesses will happen. Sensors, actuators, tags, vehicles, and intelligent things all have the ability to communicate. The number of M2M connections is continuously increasing, and it has been predicted to see billions of machines interconnected in a near future. M2M applications provide advantages in various domains from smart cities, factories of the future, connected cars, home automation, e-health to precision agriculture. This fast-growing ecosystem is leading M2M towards a promising future. However, M2M market expansion opportunities are not straightforward. A set of challenges should be overcome to enable M2M mass-scale deployment across various industries including interoperability, complexity, and scalability issues. Currently, the M2M market is suffering from a high vertical fragmentation affecting the majority of business sectors. In fact, various vendor-specific M2M solutions have been designed independently for specific applications, which led to serious interoperability issues. To address this challenge, we designed, implemented, and experimented with the OM2M platform offering a flexible and extensible operational architecture for M2M interoperability compliant with the SmartM2M standard. To support constrained environments, we proposed an efficient naming convention relying on a non-hierarchical resource structure to reduce the payload size. To reduce the semantic gap between applications and machines, we proposed the IoT-O ontology for an effective semantic interoperability. IoT-O consists of five main parts, which are sensor, actuator, observation, actuation and service models and aims to quickly converge to a common IoT vocabulary. An interoperable M2M service platform enables one to interconnect heterogeneous devices that are widely distributed and frequently evolving according to their environment changes. Keeping M2M systems alive is costly in terms of time and money. To address this challenge, we designed, implemented, and integrated the FRAMESELF framework to retrofit self-management capabilities in M2M systems based on the autonomic computing paradigm. Extending the MAPE-K reference architecture model, FRAMESELF enables one to dynamically adapt the OM2M system behavior according to high level policies how the environment changes. We defined a set of semantic rules for reasoning about the IoT-O ontology as a knowledge model. Our goal is to enable automatic discovery of machines and applications through dynamic reconfiguration of resource architectures. Interoperability and self-management pave the way to mass-scale deployment of M2M devices. However, current M2M systems rely on current internet infrastructure, which was never designed to address such requirements, thus raising new requirements in term of scalability. To address this challenge, we designed, simulated and validated the OSCL overlay approach, a new M2M meshed network topology as an alternative to the current centralized approach. OSCL relies on the Named Data Networking (NDN) technique and supports multi-hop communication and distributed caching 5 to optimize networking and enhance data dissemination. We developed the OSCLsim simulator to validate the proposed approach. Finally, a theoretical model based on random graphs is formulated to describe the evolution and robustness of the proposed system.
|
454 |
WEB SERVICES FÖR MOBILAPPLIKATIONER : Utveckling av säkra RESTful web services för mobilapplikationer / WEB SERVICES FOR MOBILE APPLICATIONSEriksson, Maria January 2011 (has links)
This report describes the development of a RESTful web service for mobile applications. The web service makes resources from an existing system called kompetensdatabasen ("the competence database") available. Kompetensdatabasen holds information about the capabilities of consultants and about assignments carried out at the IT consultant business Nethouse AB. The web service was developed according to the principles of REST and ROA (Resource Oriented Architecture) which puts focus on making resources available. The resources are made available through the HTTP protocol and the methods associated with it. This means it was designed to use the same technologies as the world wide web. Following these principles when designing the system has been of great importance. To make sure that the service does not leak information to competing companies or violate the Personal Data Act some kind of solution for securing the service had to be implemented. A model for authentication was produced to make the system accessible only for employees of the company. / Rapporten beskriver utvecklandet av en RESTful web service för mobilapplikationer. Web servicen tillgängliggör resurser från ett befintligt system som kallas kompetensdatabasen. Kompetensdatabasen innehåller information om konsulters kompetenser och de uppdrag som utförts vid IT-konsultföretaget Nethouse AB. Web servicen utvecklades enligt principerna för REST och ROA (Resource Oriented Architecture) vilket innebär ett fokus på att tillgängliggöra resurser. Resurserna görs nåbara genom HTTP-protokollet och dess metoder, det vill säga samma tekniker som används på webben. Stor vikt har lagts på att designa systemet enligt dessa principer. För att servicen inte skulle läcka information till konkurrenter eller bryta mot personuppgiftslagen behövde någon form av säkerhetslösning implementeras. En autentiseringsmodell togs fram för att göra systemet nåbart enbart för anställda vid företaget.
|
455 |
Server-vs klientgenererade webbapplikationer : Enjämförelse ur ett usabilityperspektivÖberg, Tomas January 2017 (has links)
This paper takes a closer look and conducts a comparison of two different approaches to generate interactivity of web applications today, namely server or client side generation. The overall purpose of the comparison is to help determine which approach is best suited to generate maximum business advantage to least possible time cost. The perspective used to measure this is usability seen from a developer's point of view. The time it takes to acquaint oneself with a framework may vary on several aspects and therefore a demarcated scenario has been set up and individual parts have been evaluated side by side in the frameworks JSF and Angular.io. Together with interviews of developer’s gathered experiences a result has been possible to assemble. This result speaks neither for or against either of the two approaches as both techniques have their own advantages and disadvantages. What has been most prominent in the comparison however is the introduction of the design pattern Model View Controller in a framework for client side generation as Angular.io. This results in a similar experience in usability as in a corresponding framework for server side generation as JSF, which is good in an efficiency point of view. Still, the lack of relevant error messages is experienced as a big problem in client side frameworks and is an issue which stands out negatively in the comparison. / Detta arbete avser titta närmare på och jämföra två vanliga tillvägagångssätt för att skapa interaktivitet via webbsidor idag, nämligen server- och klientsidegenerering. Det övergripande syftet med undersökningen är att hjälpa till att utröna vilket tillvägagångssätt som är bäst anpassat för att generera maximal affärsnytta till minsta möjliga tidskostnad. Perspektivet som används för att mäta detta är usability ur utvecklarsynpunkt. Tiden att sätta sig in i ett ramverk kan bero på ett flertal aspekter och därför har en avgränsat scenario satts upp och individuella delar har utvärderats sida vid sida i ramverken JSF och Angular.io. Tillsammans med intervjuer av utvecklares samlade upplevelse har ett resultat kunnat sammanställas. Detta resultat talar vare sig för eller emot endera tillvägagångssätt då båda tekniker har sina för- och nackdelar. Det som dock har varit mest framträdande i jämförelsen är att införandet av designmönstret Model View Controller i ett ramverk för klientsidegenerering så som Angular.io. Detta ger en likartad upplevelse i usability som ett motsvarande för serversidegenererande så som JSF, vilket är bra ur effektivitetssynpunkt. Dock upplevs bristen på relevanta felmeddelanden som ett stort problem på klientsidegenererande ramverk och något som sticker ut negativt i jämförelsen.
|
456 |
Le jour de repos, depuis les origines jusqu'au Concile de Nicée / Rest day: from the origins until the Council of NiceaCohen, Daniel 25 February 2010 (has links)
Est-ce-que le sabbat est d'origine hébraïque ?Quand est né le dimanche ?Est-ce que Paul est l'inventeur du christianisme ?Comment expliquer la position des chrétiens sabbataires aujourd'hui ?Is the sabbath from hebrew origin ?When the Sunday is "born" ?Was Paul the inventor of christianism ?How to explain the position of the sabbatarien christians ? / Doctorat en Philosophie / info:eu-repo/semantics/nonPublished
|
457 |
Mobilní systém pro rozpoznání textu na iOS / Mobile System for Text Recognition on iOSBobák, Petr January 2017 (has links)
This thesis describes a development of a modern client-server application for text recognition on iOS platform. The reader is acquainted with common principles of a client-server model, including its known architecture styles, and with a distribution of logical layers between both sides of the model. After that the thesis depicts current trends and examples of suitable technologies for creating an application programming interface of a web server. Possible ways of text recognition on the server side are discussed as well. In context of a client side, the thesis provides an insight into iOS platform and a few important concepts in iOS application development. Following implementation of the server side is stressed to be reusable as much as possible for different kinds of use cases. Last but not least, the thesis provides a simple iOS framework for a direct communication with the recognition server. Finally, an application for evaluation of food ingredients from a packaging material is implemented as an example of usage.
|
458 |
Service Provisioning in SDN using a Legacy Network Management Systemvan 't Hof, David M. January 2016 (has links)
Software Defined Networking (SDN) has become increasingly popular in combination with Network Function Virtualization (NFV). SDN is a way to make a network more programmable and dynamic. However, in order to create a homogeneous network using this concept, legacy equipment will have to be substituted by SDN equipment, which is costly. To close the gap between the legacy world and SDN, we introduce the concept of a legacy Network Management System (NMS) that is connected to an SDN controller to perform service provisioning. This way, the NMS is capable of configuring both legacy as well as SDN networks to provide customers with the services that they have ordered, while still allowing for new SDN features in the SDN domain of the network. The main service we wish to provide using SDN is Service Function Chaining (SFC). Service provisioning consists of dynamically constructing a path through the ordered network services, in this case Virtual Network Functions (VNFs). This thesis focuses on the SDN controller and its interaction with the NMS. This project aims at configuring OpenFlow rules in the network using an SDN controller to perform SFC. Moreover, the focus will be on how to represent an SDN element and a service function chain in the legacy network NMS. The thesis also contains a discussion on what information should be exchanged between the management software and the controller. The management software used is called BECS, a system developed by Packetfront Software. Integrating SDN in BECS is done by creating a proof of concept, containing a full environment from the low level network elements to the NMS. By using a bottom-up approach for creating this proof of concept, the information that BECS is required to send to the SDN controller can be identified before designing and implementing the connection between these two entities. When sending the information, the NMS should be able to receive acknowledgement of successful information exchange or an error. However, when the proof of concept was created a problem arose on how to test and troubleshoot it. For this reason, a web Graphical User Interface (GUI) was created. This GUI shows the number of packets that have gone through a VNF. Because it is possible to see how many packets go through a VNF, one can see where a network issue occurs. The subsequent analysis investigates the impact of making such a GUI available for a network administrator and finds that the part of the network where the configuration error occurs can be narrowed down significantly. / Software Defined Networking (SDN) har blivit mer och mer populärt i kombination med Network Function Virtualization (NFV). SDN är en sätt för att göra ett nätverk mer programmerbart och dynamiskt. För att skapa ett homogent nätverk med detta koncept, behöver man dock ersätta traditionell utrustning med SDN utrustning som är dyr. För att stänga gapet mellan traditionella nätverk och SDN-världen, introducerar vi ett koncept med ett traditionell Network Management System (NMS) som är anslutet till en SDN-styrenhet för att utföra tjänsteprovisionering. På detta sätt kan NMS:et konfigurera både traditionella och SDN-nätverk, samt provisionera tjänster för kunderna medan nya SDN-funktioner möjliggörs i SDN-delen av nätverket. Den huvudsakliga tjänsten som vi vill lansera genom SDN är Service Function Chaining (SFC). Tjänsteprovisionering består av att konstruera en väg genom beställda tjänster, i detta fall Virtual Network Functions (VNFs). Detta examensarbete fokuserar huvusakligen på SDN-styrenheten och dess interaktion med NMS:et. Projektet syftar till att konfigurera OpenFlow regler i SDN-styrenheten för att utföra SFC. Dessutom fokuserar arbetet på hur man kan representera SDN-element och SFCs i ett traditionellt NMS. Vidare diskuteras vilken information som ska utbytas mellan NMS:et och SDNstyrenheten. NMS:et som ska vara användas är BECS, ett system utvecklat av Packetfront Software. Uppgiften löses genom att skapa ett proof of concept, som innehåller ett komplett system med alla komponenter från nätverkselement till NMS:et. Genom att använda en bottom-up-strategi för detta proof of concept kan informationen som BECS måste skicka till SDN styrenheten indentifieras, innan design och implementation av förbindelsen mellan enheterna kan utföras. När informationen är skickad ska NMS:et kunna hämta information om huruvida styrenheten fick informationen utan fel. Dock uppstår ett problem gällande hur man testar och felsöker detta proof of concept. Av denna anledning skapades ett web Graphical User Interface (GUI). Användargränssnittet visar antalet paket som går genom varje VNF, samt var i nätverket fel uppstår. Analysen undersöker hur stor effekten är för en nätverkadministrator och visar att området där fel kan uppstå begränsas avsevärt.
|
459 |
De nya EU-bestämmelsernas påverkan på medarbetarna inom LSS : En kvalitativ studie om hur de nya bestämmelserna kring dygns- och veckovila har påverkat medarbetarnas arbetssituation inom LSS / The impact of the new EU regulations on the employees within LSS : A qualitative study on how the new regulations regarding 24-hour and weekly rest have affected the work situation of employees within LSSKruuse, Ida, Dreveros, Meriam January 2024 (has links)
Syftet med denna studie var att analysera förändringsprocesserna i samband med de nya bestämmelserna för dygns- och veckovila samt att se hur detta har påverkat medarbetarnas arbetssituation och deras syn på sitt arbete i de aktuella LLS-organisationerna. Inledningsvis presenterar vi en inledning till ämnet och studiens bakgrund. Därefter presenteras studiens syfte, frågeställningar, avgränsning och disposition. Vidare presenteras de teorier som använts som verktyg för att analysera det empiriska materialet. Dessa är motstånd, vårt offentliga etos, förändringsprocesser och förändringsagenter. Studiens metodologi beskrivs sedan tillsammans med insamlingen av empirin genom semistrukturerade intervjuer med de tolv intervjupersonerna. Därefter presenteras analysen och resultatet av empirin, som visar att genomförandet skett på ett sätt som inte fullt ut har skapat en känsla av delaktighet och förståelse hos medarbetarna. Detta har lett till konflikter kopplat till deras offentliga etos och ansvar som tjänstemän gentemot organisationen, kollegorna och brukarna som yttrar sig iform av olika typer av motstånd. Avslutningsvis presenteras studiens slutsats tillsammans med en reflektion samt förslag på fortsatt forskning. / The purpose of this study was to analyze the change processes in connection with the new regulations for 24-hour and weekly rest and how this has affected the employees' work situation and their view of their work in the LSS-organizations in question. Initially, we present an introduction to the subject and the background of the study. Then the study's purpose, questions, delimitation and outline are presented. Furthermore, the theories used as tools to analyze the empirical material are presented. These are resistance, our public ethos, change processes and change agents. The study's methodology is then described together with the collection of empirical evidence through semi-structured interviews with the twelve interviewees. Then the analysis and the results of the empirical work are presented, which show that the implementation took place in a way that has not fully created a feeling of participation and understanding among the employees. This has led to conflicts linked to their public ethos and responsibilities as officials towards the organization, colleagues and users who express themselves in the form of various types of resistance. Finally, the study's conclusion is presented together with a reflection and suggestions for further research.
|
460 |
The dialectics of global imperatives and local identities in Ethiopian teacher educationTeferi Bizuayehu Dorsis 11 1900 (has links)
The dialectics of globalization and multiculturalism is encountered everywhere and is an inescapable world reality. It has also become a major factor affecting teacher education. As a meeting ground and intercept for educational programs, teacher education provides an interface for both global imperatives and local identities. Ethiopia has pronounced achievements in most education programs at all levels, although official documents indicate variance in the quality of attainment across the levels (ESDP IV, 2011). Local studies (Ambisa, 2008; Amaliraj, 2008) also found that teacher education suffers from a lack of relevance and poor quality. Moreover, the demand for qualified teachers who are competent to shape the young generation through balancing the glocal context is increasing. This study investigated how local identities and global imperatives are integrated in contemporary Ethiopian teacher education at all levels. Critical theory was employed as the paradigm for the study. This epistemological view underpinned a discussion of the effect of globalization and multiculturalism on the world’s functioning. The research approach in the empirical study was qualitative and an interpretive case study method was employed. The units of analysis were literatures, such as The Lexus vs. the Olive Tree; McWorld vs. Jihad; The Clash of Civilization: The West vs. the Rest; and Demonstrating Common World Culture of Education (CWCE) or Locating A Globally Structured Agenda for Education (GSAE); and the contemporary Ethiopian teacher education programs (the PGDT and TESO programs). Data collection tools were basic dialectical questions under Eemeren’s (1986) established ‘system of norms’, observation, interviews and focus group discussions. Confidentiality, anonymity, informed consent, resolution of conflict of interest and intellectual ownership were considered in the study. The dialectical analysis investigated the four quadrant glocal relationships model and described the role players in each quadrant where nations may locate themselves. Moreover, the comparative analysis indicated that globalization has not yet become an issue in contemporary Ethiopian teacher education, while multicultural practices are fragmented and are addressed only in response to ethnic demands for accommodation. To this end, Ethiopian teacher education should redefine its programs in order to adjust to global understanding in an endeavor to produce competent teachers for the global market. / Curriculum and Instructional Studies / D. Ed. (Curriculum Studies)
|
Page generated in 0.4361 seconds