3 resultados para New firm formation
em Digital Commons - Michigan Tech
Resumo:
Personal photographs permeate our lives from the moment we are born as they define who we are within our familial group and local communities. Archived in family albums or framed on living room walls, they continue on after our death as mnemonic artifacts referencing our gendered, raced, and ethnic identities. This dissertation examines salient instances of what women “do” with personal photographs, not only as authors and subjects but also as collectors, archivists, and family and cultural historians. This project seeks to contribute to more productive, complex discourse about how women form relationships and engage with the conventions and practices of personal photography. In the first part of this dissertation I revisit developments in the history of personal photography, including the advertising campaigns of the Kodak and Agfa Girls and the development of albums such as the Stammbuch and its predecessor, the carte-de-visite, that demonstrate how personal photography has functioned as a gendered activity that references family unity, sentimentalism for the past, and self-representation within normative familial and dominant cultural groups, thus suggesting its importance as a cultural practice of identity formation. The second and primary section of the dissertation expands on the critical analyses of Gillian Rose, Patricia Holland, and Nancy Martha West, who propose that personal photography, marketed to and taken on by women, double-exposes their gendered identities. Drawing on work by critics such as Deborah Willis, bell hooks, and Abigail Solomon-Godeau, I examine how the reconfiguration, recontextualization, and relocation of personal photographs in the respective work of Christine Saari, Fern Logan, and Katie Knight interrogates and complicates gendered, raced, and ethnic identities and cultural attitudes about them. In the final section of the dissertation I briefly examine select examples of how emerging digital spaces on the Internet function as a site for personal photography, one that both reinscribes traditional cultural formations while offering new opportunities for women for the display and audiencing of identities outside the family.
Resumo:
Bluetooth wireless technology is a robust short-range communications system designed for low power (10 meter range) and low cost. It operates in the 2.4 GHz Industrial Scientific Medical (ISM) band and it employs two techniques for minimizing interference: a frequency hopping scheme which nominally splits the 2.400 - 2.485 GHz band in 79 frequency channels and a time division duplex (TDD) scheme which is used to switch to a new frequency channel on 625 μs boundaries. During normal operation a Bluetooth device will be active on a different frequency channel every 625 μs, thus minimizing the chances of continuous interference impacting the performance of the system. The smallest unit of a Bluetooth network is called a piconet, and can have a maximum of eight nodes. Bluetooth devices must assume one of two roles within a piconet, master or slave, where the master governs quality of service and the frequency hopping schedule within the piconet and the slave follows the master’s schedule. A piconet must have a single master and up to 7 active slaves. By allowing devices to have roles in multiple piconets through time multiplexing, i.e. slave/slave or master/slave, the Bluetooth technology allows for interconnecting multiple piconets into larger networks called scatternets. The Bluetooth technology is explored in the context of enabling ad-hoc networks. The Bluetooth specification provides flexibility in the scatternet formation protocol, outlining only the mechanisms necessary for future protocol implementations. A new protocol for scatternet formation and maintenance - mscat - is presented and its performance is evaluated using a Bluetooth simulator. The free variables manipulated in this study include device activity and the probabilities of devices performing discovery procedures. The relationship between the role a device has in the scatternet and it’s probability of performing discovery was examined and related to the scatternet topology formed. The results show that mscat creates dense network topologies for networks of 30, 50 and 70 nodes. The mscat protocol results in approximately a 33% increase in slaves/piconet and a reduction of approximately 12.5% of average roles/node. For 50 node scenarios the set of parameters which creates the best determined outcome is unconnected node inquiry probability (UP) = 10%, master node inquiry probability (MP) = 80% and slave inquiry probability (SP) = 40%. The mscat protocol extends the Bluetooth specification for formation and maintenance of scatternets in an ad-hoc network.
Resumo:
This work is conducted to study the geological and petrophysical features of the Trenton- Black River limestone formation. Log curves, crossplots and mineral identification methods using well-log data are used to determine the components and analyze changes in lithology. Thirty-five wells from the Michigan Basin are used to define the mineralogy of Trenton-Black River limestone. Using the different responses of a few log curves, especially gamma-ray, resistivity and neutron porosity, the formation tops for the Utica shale, the Trenton limestone, the Black River limestone and the Prairie du Chien sandstone are identified to confirm earlier authors’ work and provide a basis for my further work. From these, an isopach map showing the thickness of Trenton-Black River formation is created, indicating that its maximum thickness lies in the eastern basin and decreases gradually to the west. In order to obtain more detailed lithological information about the limestone formations at the thirty-five wells, (a) neutron-density and neutron-sonic crossplots, (b) mineral identification methods, including the M-N plot, MID plot, ϱmaa vs. Umaa MID plot, and the PEF plot, and (c) a modified mineral identification technique are applied to these wells. From this, compositions of the Trenton-Black River formation can be divided into three different rock types: pure limestone, partially dolomitized limestone, and shaly limestone. Maps showing the fraction of dolomite and shale indicate their geographic distribution, with dolomite present more in the western and southwestern basin, and shale more common in the north-central basin. Mineral identification is an independent check on the distribution found from other authors, who found similar distributions based on core descriptions. The Thomas Stieber method of analysis is best suited to sand-shale sequences, interpreting hree different distributions of shale within sand, including dispersed, laminated and structural. Since this method is commonly applied in clastic rocks, my work using the Thomas Stieber method is new, as an attempt to apply this technique, developed for clastics, to carbonate rocks. Based on the original assumption and equations with a corresponding change to the Trenton-Black River formation, feasibility of using the Thomas Stieber method in carbonates is tested. A graphical display of gamma-ray versus density porosity, using the properties of clean carbonate and pure shale, suggests the presence of laminated shale in fourteen wells in this study. Combined with Wilson’s study (2001), it is safe to conclude that when shale occurs in the Trenton-Black River formation, it tends to be laminated shale.