6 resultados para Gender, Race, Sexuality, and Ethnicity in Communication
em DRUM (Digital Repository at the University of Maryland)
Resumo:
This study, "Civil Rights on the Cell Block: Race, Reform, and Violence in Texas Prisons and the Nation, 1945-1990," offers a new perspective on the historical origins of the modern prison industrial complex, sexual violence in working-class culture, and the ways in which race shaped the prison experience. This study joins new scholarship that reperiodizes the Civil Rights era while also considering how violence and radicalism shaped the civil rights struggle. It places the criminal justice system at the heart of both an older racial order and within a prison-made civil rights movement that confronted the prison's power to deny citizenship and enforce racial hierarchies. By charting the trajectory of the civil rights movement in Texas prisons, my dissertation demonstrates how the internal struggle over rehabilitation and punishment shaped civil rights, racial formation, and the political contest between liberalism and conservatism. This dissertation offers a close case study of Texas, where the state prison system emerged as a national model for penal management. The dissertation begins with a hopeful story of reform marked by an apparently successful effort by the State of Texas to replace its notorious 1940s plantation/prison farm system with an efficient, business-oriented agricultural enterprise system. When this new system was fully operational in the 1960s, Texas garnered plaudits as a pioneering, modern, efficient, and business oriented Sun Belt state. But this reputation of competence and efficiency obfuscated the reality of a brutal system of internal prison management in which inmates acted as guards, employing coercive means to maintain control over the prisoner population. The inmates whom the prison system placed in charge also ran an internal prison economy in which money, food, human beings, reputations, favors, and sex all became commodities to be bought and sold. I analyze both how the Texas prison system managed to maintain its high external reputation for so long in the face of the internal reality and how that reputation collapsed when inmates, inspired by the Civil Rights Movement, revolted. My dissertation shows that this inmate Civil Rights rebellion was a success in forcing an end to the existing system but a failure in its attempts to make conditions in Texas prisons more humane. The new Texas prison regime, I conclude, utilized paramilitary practices, privatized prisons, and gang-related warfare to establish a new system that focused much more on law and order in the prisons than on the legal and human rights of prisoners. Placing the inmates and their struggle at the heart of the national debate over rights and "law and order" politics reveals an inter-racial social justice movement that asked the courts to reconsider how the state punished those who committed a crime while also reminding the public of the inmates' humanity and their constitutional rights.
Resumo:
Musicians living in the Arab Diaspora around the Washington, D.C. metro area are a small group of multi-faceted individuals with significant contributions and intentions to propagate and disseminate their music. Various levels of identity are discussed and analyzed, including self-identity, group/ collective identity, and Arab ethnic identity. The performance and negotiation of Arab ethnic identity is apparent in selected repertoire, instrumentation, musical style, technique and expression, shared conversations about music, worldview on Arabic music and its future. For some musicians, further evidence of self-construction of one's ethnic identity entails choice of name, costume, and venue. Research completed is based on fieldwork, observations, participant-observations, interviews, and communications by phone and email. This thesis introduces concepts of Arabic music, discusses recent literature, reveals findings from case studies on individual Arab musicians and venues, and analyzes Arab identity and ethnicity in relation to particular definitions of identity found in anthropological and ethnomusicological writings. Musical lyrics, translations, transcriptions, quotes, discussions, analyses, as well as charts and diagrams of self-identity analyses are provided as evidence of the performance and negotiation of Arab identity.
Resumo:
“Multiraciality Enters the University: Mixed Race Identity and Knowledge Production in Higher Education,” explores how the category of “mixed race” has underpinned university politics in California, through student organizing, admissions debates, and the development of a new field of study. By treating the concept of privatization as central to both multiraciality and the neoliberal university, this project asks how and in what capacity has the discourses of multiracialism and the growing recognition of mixed race student populations shaped administrative, social, and academic debates at the state’s flagship universities—the University of California at Berkeley and Los Angeles. This project argues that the mixed race population symbolizing so-called “post-racial societies” is fundamentally attached to the concept of self-authorship, which can work to challenge the rights and resources for college students of color. Through a close reading of texts, including archival materials, policy and media debates, and interviews, I assert that the contemporary deployment of mixed race within the US academy represents a particularly post-civil rights development, undergirded by a genealogy of U.S. liberal individualism. This project ultimately reveals the pressing need to rethink ways to disrupt institutionalized racism in the new millennium.
Resumo:
This study examined the conversational behaviors of eleven dyads consisting of a person with aphasia (PWA) and their familiar communication partner (CP), and investigated changes in behaviors as a result of attending a communication partner-training program CPT). Attitudes about communication were examined and related to conversational behaviors observed pre- and post- training. Results indicated that CPs and PWA used significantly more facilitating behaviors than barrier behaviors, although most dyads experienced some barriers. A comparison of pre-and post-CPT conversations revealed a significant interaction between time and type of behavior, with the increase in the number of facilitators approaching significance. Overall, persons with aphasia and their conversational partners expressed positive attitudes about communication. There were no significant correlations between scores on attitude surveys and behaviors pre or post-training. This study demonstrated that these dyads employed facilitative conversational behaviors even before CPT, and that facilitative behaviors can increase after a one-day training workshop.
Resumo:
In this work we introduce a new mathematical tool for optimization of routes, topology design, and energy efficiency in wireless sensor networks. We introduce a vector field formulation that models communication in the network, and routing is performed in the direction of this vector field at every location of the network. The magnitude of the vector field at every location represents the density of amount of data that is being transited through that location. We define the total communication cost in the network as the integral of a quadratic form of the vector field over the network area. With the above formulation, we introduce a mathematical machinery based on partial differential equations very similar to the Maxwell's equations in electrostatic theory. We show that in order to minimize the cost, the routes should be found based on the solution of these partial differential equations. In our formulation, the sensors are sources of information, and they are similar to the positive charges in electrostatics, the destinations are sinks of information and they are similar to negative charges, and the network is similar to a non-homogeneous dielectric media with variable dielectric constant (or permittivity coefficient). In one of the applications of our mathematical model based on the vector fields, we offer a scheme for energy efficient routing. Our routing scheme is based on changing the permittivity coefficient to a higher value in the places of the network where nodes have high residual energy, and setting it to a low value in the places of the network where the nodes do not have much energy left. Our simulations show that our method gives a significant increase in the network life compared to the shortest path and weighted shortest path schemes. Our initial focus is on the case where there is only one destination in the network, and later we extend our approach to the case where there are multiple destinations in the network. In the case of having multiple destinations, we need to partition the network into several areas known as regions of attraction of the destinations. Each destination is responsible for collecting all messages being generated in its region of attraction. The complexity of the optimization problem in this case is how to define regions of attraction for the destinations and how much communication load to assign to each destination to optimize the performance of the network. We use our vector field model to solve the optimization problem for this case. We define a vector field, which is conservative, and hence it can be written as the gradient of a scalar field (also known as a potential field). Then we show that in the optimal assignment of the communication load of the network to the destinations, the value of that potential field should be equal at the locations of all the destinations. Another application of our vector field model is to find the optimal locations of the destinations in the network. We show that the vector field gives the gradient of the cost function with respect to the locations of the destinations. Based on this fact, we suggest an algorithm to be applied during the design phase of a network to relocate the destinations for reducing the communication cost function. The performance of our proposed schemes is confirmed by several examples and simulation experiments. In another part of this work we focus on the notions of responsiveness and conformance of TCP traffic in communication networks. We introduce the notion of responsiveness for TCP aggregates and define it as the degree to which a TCP aggregate reduces its sending rate to the network as a response to packet drops. We define metrics that describe the responsiveness of TCP aggregates, and suggest two methods for determining the values of these quantities. The first method is based on a test in which we drop a few packets from the aggregate intentionally and measure the resulting rate decrease of that aggregate. This kind of test is not robust to multiple simultaneous tests performed at different routers. We make the test robust to multiple simultaneous tests by using ideas from the CDMA approach to multiple access channels in communication theory. Based on this approach, we introduce tests of responsiveness for aggregates, and call it CDMA based Aggregate Perturbation Method (CAPM). We use CAPM to perform congestion control. A distinguishing feature of our congestion control scheme is that it maintains a degree of fairness among different aggregates. In the next step we modify CAPM to offer methods for estimating the proportion of an aggregate of TCP traffic that does not conform to protocol specifications, and hence may belong to a DDoS attack. Our methods work by intentionally perturbing the aggregate by dropping a very small number of packets from it and observing the response of the aggregate. We offer two methods for conformance testing. In the first method, we apply the perturbation tests to SYN packets being sent at the start of the TCP 3-way handshake, and we use the fact that the rate of ACK packets being exchanged in the handshake should follow the rate of perturbations. In the second method, we apply the perturbation tests to the TCP data packets and use the fact that the rate of retransmitted data packets should follow the rate of perturbations. In both methods, we use signature based perturbations, which means packet drops are performed with a rate given by a function of time. We use analogy of our problem with multiple access communication to find signatures. Specifically, we assign orthogonal CDMA based signatures to different routers in a distributed implementation of our methods. As a result of orthogonality, the performance does not degrade because of cross interference made by simultaneously testing routers. We have shown efficacy of our methods through mathematical analysis and extensive simulation experiments.
Resumo:
Music is a unique form of communication. It sings from soul to soul, touching each of us in uniquely different ways. While researching the life of Clara Schumann, I became intrigued with the idea that feminine qualities, as expressed by her music, could be found in other composers work for the soprano voice. I explored this possibility in a lecture recital and followed up this work by performing two operatic roles and a recital.