82 resultados para Ebenezer Independent Christian Church.
Resumo:
This dissertation is an exercise in practical theology, which investigates and responds to the problem of changing holiness identity in the Church of the Nazarene. The first part of the study is an empirical investigation into the social context of contemporary Nazarene holiness identity and practices among Nazarenes in three congregations located in the Northeast United States. Previous research relied too heavily on secularization and sect-church theory to understand the dynamics of religious identity change among Nazarenes. The theological result was a pessimistic appraisal of the future possibilities of holiness identity and practice in the Church of the Nazarene. This study employs an alternative theory—Nancy T. Ammerman's theory of narrative religious identity—to understand the dynamics of lived religious life within these congregations and to identify the various holiness narratives at play. Ammerman's theory facilitates an empirical description of the multiple holiness identities emerging out of the social contexts of these Nazarene congregations and offers a way to account for identity change. At the heart of this research is the theoretical notion that a particular religious identity, in the case of the Church of the Nazarene, the "sanctified person," emerges out of a particular ecclesial context characterized by religious narratives and practices that shape this identity. Chapter one reviews the problem of holiness identity in the Church of the Nazarene and offers an analysis of recent sociological attempts to understand the changing identity among Nazarenes. Chapter two draws on sociological research to describe and depict the range of views of holiness held by some contemporary Nazarenes. Chapter three identifies the varieties of holiness identity within the three Nazarene congregations that are part of the study. Chapter four investigates the social sources that shape the various holiness identities discovered in these congregations. Chapter five is a description of the many ways religious narratives are enacted and engaged within these congregations. The second part of the study is a theological critique of contemporary Nazarene holiness identity. Chapter six draws on the theory of narrative identity proposed by Nancy Ammerman and outlines a theoretical model which describes the social conditions necessary to shape holiness identity, "the sanctified person," within the context of the local congregation. Finally, chapter seven draws on the theological resources of Mennonite scholar and historian John Howard Yoder to propose a way of construing and facilitating holiness identity formation that takes the ecclesiality of hoilness more seriously, emphasizes a clearer relationship between Jesus and the "Christlikeness" that is central to holiness, and highlights the importance of religious practices in the formation of a holiness identity.
Resumo:
Popular culture is a powerful, shaping force in the lives of teenagers between the ages of fourteen through eighteen in the United States today. This dissertation argues the importance of popular fiction for adolescent spiritual formation and it investigates that importance by exploring the significance of narrative for theology and moral formation. The dissertation employs mythic and archetypal criticism as a tool for informing the selection and critique of narratives for use in adolescent spiritual development and it also incorporates insights gained from developmental psychology to lay the groundwork for the development of a curriculum that uses young adult fiction in a program of spiritual formation for teenagers in a local church setting. The dissertation defends the power of narrative in Christian theology and concludes that narrative shapes the imagination in ways that alter perception and are important for the faith life of teenagers in particular. I go on to argue that not all narratives are created equal. In using literary myth criticism in concert with theology, I use the two disciplines’ different aims and methods to fully flesh out the potential of theologies intrinsic to works meant for a largely secular audience. The dissertation compares various works of young adult fiction (M.T. Anderson’s Feed and Terry Pratchett’s Nation in dialogue with a theology of creation; Marcus Zusak’s I am the Messenger and Jerry Spinelli’s Stargirl in dialogue with salvation and saviors; and the four novels of Stephanie Meyer’s Twilight saga in dialogue with a theology of hope (eschatology). The dissertation explores how each theme surfaces (even if only implicitly) from both literary and theological standpoints. The dissertation concludes with a sample four-week lesson plan that demonstrates one way the theological and literary critique can be formed into a practical curriculum for use in an adolescent spiritual development setting. Ultimately, this dissertation provides a framework for how practitioners of young adult formation can select, analyze, and develop materials for their teenagers using new works of popular young adult fiction. The dissertation comes to the conclusion that popular fiction contains a wealth of material that can challenge and shape young readers’ own emerging theology.
Resumo:
This paper describes an algorithm for scheduling packets in real-time multimedia data streams. Common to these classes of data streams are service constraints in terms of bandwidth and delay. However, it is typical for real-time multimedia streams to tolerate bounded delay variations and, in some cases, finite losses of packets. We have therefore developed a scheduling algorithm that assumes streams have window-constraints on groups of consecutive packet deadlines. A window-constraint defines the number of packet deadlines that can be missed in a window of deadlines for consecutive packets in a stream. Our algorithm, called Dynamic Window-Constrained Scheduling (DWCS), attempts to guarantee no more than x out of a window of y deadlines are missed for consecutive packets in real-time and multimedia streams. Using DWCS, the delay of service to real-time streams is bounded even when the scheduler is overloaded. Moreover, DWCS is capable of ensuring independent delay bounds on streams, while at the same time guaranteeing minimum bandwidth utilizations over tunable and finite windows of time. We show the conditions under which the total demand for link bandwidth by a set of real-time (i.e., window-constrained) streams can exceed 100% and still ensure all window-constraints are met. In fact, we show how it is possible to guarantee worst-case per-stream bandwidth and delay constraints while utilizing all available link capacity. Finally, we show how best-effort packets can be serviced with fast response time, in the presence of window-constrained traffic.
Resumo:
Consider a network of processors (sites) in which each site x has a finite set N(x) of neighbors. There is a transition function f that for each site x computes the next state ξ(x) from the states in N(x). But these transitions (updates) are applied in arbitrary order, one or many at a time. If the state of site x at time t is η(x; t) then let us define the sequence ζ(x; 0); ζ(x; 1), ... by taking the sequence η(x; 0),η(x; 1), ... , and deleting each repetition, i.e. each element equal to the preceding one. The function f is said to have invariant histories if the sequence ζ(x; i), (while it lasts, in case it is finite) depends only on the initial configuration, not on the order of updates. This paper shows that though the invariant history property is typically undecidable, there is a useful simple sufficient condition, called commutativity: For any configuration, for any pair x; y of neighbors, if the updating would change both ξ(x) and ξ(y) then the result of updating first x and then y is the same as the result of doing this in the reverse order. This fact is derivable from known results on the confluence of term-rewriting systems but the self-contained proof given here may be justifiable.
Resumo:
A common assumption made in traffic matrix (TM) modeling and estimation is independence of a packet's network ingress and egress. We argue that in real IP networks, this assumption should not and does not hold. The fact that most traffic consists of two-way exchanges of packets means that traffic streams flowing in opposite directions at any point in the network are not independent. In this paper we propose a model for traffic matrices based on independence of connections rather than packets. We argue that the independent connection (IC) model is more intuitive, and has a more direct connection to underlying network phenomena than the gravity model. To validate the IC model, we show that it fits real data better than the gravity model and that it works well as a prior in the TM estimation problem. We study the model's parameters empirically and identify useful stability properties. This justifies the use of the simpler versions of the model for TM applications. To illustrate the utility of the model we focus on two such applications: synthetic TM generation and TM estimation. To the best of our knowledge this is the first traffic matrix model that incorporates properties of bidirectional traffic.
Resumo:
This article describes the VITEWRITE model for generating handwriting movements. The model consists of a sequential controller, or motor program, that interacts with a trajectory generator to move a hand with redundant degrees of freedom. The neural trajectory generator is the Vector Integration to Endpoint (VITE) model for synchronous variable-speed control of multijoint movements. VITE properties enable a simple control strategy to generate complex handwritten script if the hand model contains redundant degrees of freedom. The controller launches transient directional commands to independent hand synergies at times when the hand begins to move, or when a velocity peak in the outflow command to a given synergy occurs. The VITE model translates these temporally disjoint synergy commands into smooth curvilinear trajectories among temporally overlapping synergetic movements. Each synergy exhibits a unimodal velocity profile during any stroke, generates letters that are invariant under speed and size rescaling, and enables effortless connection of letter shapes into words. Speed and size rescaling are achieved by scalar GO and GRO signals that express computationally simple volitional commands. Psychophysical data such as the isochrony principle, asymmetric velocity profiles, and the two-thirds power law relating movement curvature and velocity arise as emergent properties of model interactions.
Resumo:
This article describes a neural network model, called the VITEWRITE model, for generating handwriting movements. The model consists of a sequential controller, or motor program, that interacts with a trajectory generator to move a. hand with redundant degrees of freedom. The neural trajectory generator is the Vector Integration to Endpoint (VITE) model for synchronous variable-speed control of multijoint movements. VITE properties enable a simple control strategy to generate complex handwritten script if the hand model contains redundant degrees of freedom. The proposed controller launches transient directional commands to independent hand synergies at times when the hand begins to move, or when a velocity peak in a given synergy is achieved. The VITE model translates these temporally disjoint synergy commands into smooth curvilinear trajectories among temporally overlapping synergetic movements. The separate "score" of onset times used in most prior models is hereby replaced by a self-scaling activity-released "motor program" that uses few memory resources, enables each synergy to exhibit a unimodal velocity profile during any stroke, generates letters that are invariant under speed and size rescaling, and enables effortless. connection of letter shapes into words. Speed and size rescaling are achieved by scalar GO and GRO signals that express computationally simple volitional commands. Psychophysical data concerning band movements, such as the isochrony principle, asymmetric velocity profiles, and the two-thirds power law relating movement curvature and velocity arise as emergent properties of model interactions.