12 resultados para Communication in law
em Digital Commons at Florida International University
Resumo:
The contractile state of microcirculatory vessels is a major determinant of the blood pressure of the whole systemic circulation. Continuous bi-directional communication exists between the endothelial cells (ECs) and smooth muscle cells (SMCs) that regulates calcium (Ca2+) dynamics in these cells. This study presents theoretical approaches to understand some of the important and currently unresolved microcirculatory phenomena. ^ Agonist induced events at local sites have been shown to spread long distances in the microcirculation. We have developed a multicellular computational model by integrating detailed single EC and SMC models with gap junction and nitric oxide (NO) coupling to understand the mechanisms behind this effect. Simulations suggest that spreading vasodilation mainly occurs through Ca 2+ independent passive conduction of hyperpolarization in RMAs. Model predicts a superior role for intercellular diffusion of inositol (1,4,5)-trisphosphate (IP3) than Ca2+ in modulating the spreading response. ^ Endothelial derived signals are initiated even during vasoconstriction of stimulated SMCs by the movement of Ca2+ and/or IP3 into the EC which provide hyperpolarizing feedback to SMCs to counter the ongoing constriction. Myoendothelial projections (MPs) present in the ECs have been recently proposed to play a role in myoendothelial feedback. We have developed two models using compartmental and 2D finite element methods to examine the role of these MPs by adding a sub compartment in the EC to simulate MP with localization of intermediate conductance calcium activated potassium channels (IKCa) and IP3 receptors (IP 3R). Both models predicted IP3 mediated high Ca2+ gradients in the MP after SMC stimulation with limited global spread. This Ca 2+ transient generated a hyperpolarizing feedback of ∼ 2–3mV. ^ Endothelium derived hyperpolarizing factor (EDHF) is the dominant form of endothelial control of SMC constriction in the microcirculation. A number of factors have been proposed for the role of EDHF but no single pathway is agreed upon. We have examined the potential of myoendothelial gap junctions (MEGJs) and potassium (K+) accumulation as EDHF using two models (compartmental and 2D finite element). An extra compartment is added in SMC to simulate micro domains (MD) which have NaKα2 isoform sodium potassium pumps. Simulations predict that MEGJ coupling is much stronger in producing EDHF than alone K+ accumulation. On the contrary, K+ accumulation can alter other important parameters (EC V m, IKCa current) and inhibit its own release as well as EDHF conduction via MEGJs. The models developed in this study are essential building blocks for future models and provide important insights to the current understanding of myoendothelial feedback and EDHF.^
Resumo:
Desegregation of social and public spaces was the most visible result of the Civil Rights Movement. After 1960, the integration of schools in Mississippi became a source of conflict. The social change of Civil Rights attacked the social order of White Resistance that supported the state superstructure. The public schools were a place for the discovery of identity for Blacks. The integrated on of the schools caused many Whites to leave rather than be integrated with Blacks. Desegregation of schools was also a slow process because the local and state government could not enforce the decisions of the US Courts, leading Blacks to realize their place in American society could only be secured through individual action. ^ This work explains the role of schooling during the integration of the Holly Springs Separate School System. The process of forging a new identity by local Blacks is examined against the forces of social change and resistance. I addition, this work examines the perils for the Blacks as they faced the uncertainty of change in the crucial Civil Rights years between 1964 and 1974. ^ This work analyzes how the Black community dealt with the problems triggered by the desegregation of the school system in Holly Springs, of a constructed social condition, a psychological state of being, the realities of racism and segregation, and the change and resistance between the individual and the collective. It is based on six months of field work investigation. Although the schools were a crucial aspect of community life for Blacks and Whites, Blacks did form their identity in them. Other institutions, such churches were more crucial. Second, the aspect of politeness and belief in law made the experience in Holly Springs unique to that place, and thus, warrants further study to determine its place within the Civil Rights Movement. Finally, while the political and economic control of Holly Springs remained with Whites, desegregation led to the resegregation of the public schools: as Whites left to private schools. ^
Resumo:
Cetaceans are aquatic mammals that rely primarily on sound for most daily tasks. A compendium of sounds is emitted for orientation, prey detection, and predator avoidance, and to communicate. Communicative sounds are among the most studied Cetacean signals, particularly those referred to as tonal sounds. Because tonal sounds have been studied especially well in social dolphins, it has been assumed these sounds evolved as a social adaptation. However, whistles have been reported in ‘solitary’ species and have been secondarily lost three times in social lineages. Clearly, therefore, it is necessary to examine closely the association, if any, between whistles and sociality instead of merely assuming it. Several hypotheses have been proposed to explain the evolutionary history of Cetacean tonal sounds. The main goal of this dissertation is to cast light on the evolutionary history of tonal sounds by testing these hypotheses by combining comparative phylogenetic and field methods. This dissertation provides the first species-level phylogeny of Cetacea and phylogenetic tests of evolutionary hypotheses of cetacean communicative signals. Tonal sounds evolution is complex in that has likely been shaped by a combination of factors that may influence different aspects of their acoustical structure. At the inter-specific level, these results suggest that only tonal sound minimum frequency is constrained by body size. Group size also influences tonal sound minimum frequency. Species that live in large groups tend to produce higher frequency tonal sounds. The evolutionary history of tonal sounds and sociality may be intertwined, but in a complex manner rejecting simplistic views such as the hypothesis that tonal sounds evolved ‘for’ social communication in dolphins. Levels of social and tonal sound complexity nevertheless correlate indicating the importance of tonal sounds in social communication. At the intraspecific level, tonal sound variation in frequency and temporal parameters may be product of genetic isolation and local levels of underwater noise. This dissertation provides one of the first insights into the evolution of Cetacean tonal sounds in a phylogenetic context, and points out key species where future studies would be valuable to enrich our understanding of other factors also playing a role in tonal sound evolution. ^
Resumo:
The convergence of data, audio and video on IP networks is changing the way individuals, groups and organizations communicate. This diversity of communication media presents opportunities for creating synergistic collaborative communications. This form of collaborative communication is however not without its challenges. The increasing number of communication service providers coupled with a combinatorial mix of offered services, varying Quality-of-Service and oscillating pricing of services increases the complexity for the user to manage and maintain ‘always best’ priced or performance services. Consumers have to manually manage and adapt their communication in line with differences in services across devices, networks and media while ensuring that the usage remain consistent with their intended goals. This dissertation proposes a novel user-centric approach to address this problem. The proposed approach aims to reduce the aforementioned complexity to the user by (1) providing high-level abstractions and a policy based methodology for automated selection of the communication services guided by high-level user policies and (2) providing services through the seamless integration of multiple communication service providers and providing an extensible framework to support the integration of multiple communication service providers. The approach was implemented in the Communication Virtual Machine (CVM), a model-driven technology for realizing communication applications. The CVM includes the Network Communication Broker, the layer responsible for providing a network-independent API to the upper layers of CVM. The initial prototype for the NCB supported only a single communication framework which limited the number, quality and types of services available. Experimental evaluation of the approach show the additional overhead of the approach is minimal compared to the individual communication services frameworks. Additionally the automated approach proposed out performed the individual communication services frameworks for cross framework switching.
Resumo:
Valuing Polyrhythmic Realities and Critical Theories, specifically Critical Race Theory, is facilitated by Interdisciplinary inquiry. Racial Profiling will be utilized to demonstrate how acknowledging the lived experiences of individuals and viewing situations from the oppressed viewpoint will positively impact the number of Blacks in law enforcement.
Resumo:
The growth of criminal gangs and organized crime groups has created unprecedented challenges in Central America. Homicide rates are among the highest in the world, countries spend on average close to 10 percent of GDP to respond to the challenges of public insecurity, and the security forces are frequently overwhelmed and at times coopted by the criminal groups they are increasingly tasked to counter. With some 90 percent of the 700 metric tons of cocaine trafficked from South America to the United States passing through Central America, the lure of aiding illegal traffickers through provision of arms, intelligence, or simply withholding or delaying the use of force is enormous. These conditions raise the question: to what extent are militaries in Central America compromised by illicit ties to criminal groups? The study focuses on three cases: Nicaragua, El Salvador, and Honduras. It finds that: Although illicit ties between the military and criminal groups have grown in the last decade, militaries in these countries are not yet “lost’ to criminal groups. Supplying criminal groups with light arms from military stocks is typical and on the rise, but still not common. In general the less exposed services, the navies and air forces, are the most reliable and effective ones in their roles in interdiction. Of the three countries in the study, the Honduran military is the most worrying because it is embedded in a context where civilian corruption is extremely common, state institutions are notoriously weak, and the political system remains polarized and lacks the popular legitimacy and political will needed to make necessary reforms. Overall, the armed forces in the three countries remain less compromised than civilian peers, particularly the police. However, in the worsening crime and insecurity context, there is a limited window of opportunity in which to introduce measures targeted toward the military, and such efforts can only succeed if opportunities for corruption in other sectors of the state, in particular in law enforcement and the justice system, are also addressed. Measures targeted toward the military should include: Enhanced material benefits and professional education opportunities that open doors for soldiers in promising legitimate careers once they leave military service. A clear system of rewards and punishments specifically designed to deter collusion with criminal groups. More effective securing of military arsenals. Skills and external oversight leveraged through combined operations, to build cooperation among those sectors of the military that have successful and clean records in countering criminal groups, and to expose weaker forces to effective best practices.
Resumo:
In - Managing Quality In the Hospitality Industry – an observation by W. Gerald Glover, Associate Professor, Hospitality Management Program, Appalachian State University, initially Glover establishes: “Quality is a primary concern in the hospitality industry. The author sees problems in the nature of the way businesses are managed and discusses approaches to ensuring quality in corporate cultures.” As the title suggests, the author wants to point out certain discrepancies in hospitality quality control, as well as enlighten you as to how to address some of these concerns. “A discussion of quality presents some interesting dilemmas. Quality is something that almost everyone wants,” Assistant Professor Glover notes. “Service businesses will never admit that they don't provide it to their customers, and few people actually understand what it takes to make it happen,” he further maintains. Glover wants you to know that in a dynamic industry such as hospitality, quality is the common denominator. Whether it be hotel, restaurant, airline, et al., quality is the raison d’être of the industry. “Quality involves the consistent delivery of a product or service according to the expected standards,” Glover provides. Many, if not all quality deficiencies can be traced back to management, Glover declares. He bullet points some of the operational and guest service problems managers’ face on a daily basis. One important point of note is the measuring and managing of quality. “Standards management is another critical area in people and product management that is seldom effective in corporations,” says Glover. “Typically, this area involves performance documentation, performance evaluation and appraisal, coaching, discipline, and team-building.” “To be effective at managing standards, an organization must establish communication in realms where it is currently non-existent or ineffective,” Glover goes on to say. “Coaching, training, and performance appraisal are methods to manage individuals who are expected to do what's expected.” He alludes to the benefit quality circles supply as well. In addressing American organizational behavior, Glover postures, “…a realization must develop that people and product management are the primary influences on generating revenues and eventually influencing the bottom line in all American organizations.” Glover introduces the concept of pro-activity. “Most recently, quality assurance and quality management have become the means used to develop and maintain proactive corporate cultures. When prevention is the focus, quality is most consistent and expectations are usually met,” he offers. Much of the article is dedicated to, “Appendix A-Table 1-Characteristics of Corporate Cultures (Reactive and Proactive. In it, Glover measures the impact of proactive management as opposed to the reactive management intrinsic to many elements of corporate culture mentality.
Resumo:
In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". If adversaries can intercept this information, they can monitor the trajectory path and capture the location of the source node. ^ This research stems from the recognition that the wide applicability of mWSNs will remain elusive unless a trajectory privacy preservation mechanism is developed. The outcome seeks to lay a firm foundation in the field of trajectory privacy preservation in mWSNs against external and internal trajectory privacy attacks. First, to prevent external attacks, we particularly investigated a context-based trajectory privacy-aware routing protocol to prevent the eavesdropping attack. Traditional shortest-path oriented routing algorithms give adversaries the possibility to locate the target node in a certain area. We designed the novel privacy-aware routing phase and utilized the trajectory dissimilarity between mobile nodes to mislead adversaries about the location where the message started its journey. Second, to detect internal attacks, we developed a software-based attestation solution to detect compromised nodes. We created the dynamic attestation node chain among neighboring nodes to examine the memory checksum of suspicious nodes. The computation time for memory traversal had been improved compared to the previous work. Finally, we revisited the trust issue in trajectory privacy preservation mechanism designs. We used Bayesian game theory to model and analyze cooperative, selfish and malicious nodes' behaviors in trajectory privacy preservation activities.^
Resumo:
Cetaceans are aquatic mammals that rely primarily on sound for most daily tasks. A compendium of sounds is emitted for orientation, prey detection, and predator avoidance, and to communicate. Communicative sounds are among the most studied Cetacean signals, particularly those referred to as tonal sounds. Because tonal sounds have been studied especially well in social dolphins, it has been assumed these sounds evolved as a social adaptation. However, whistles have been reported in ‘solitary’ species and have been secondarily lost three times in social lineages. Clearly, therefore, it is necessary to examine closely the association, if any, between whistles and sociality instead of merely assuming it. Several hypotheses have been proposed to explain the evolutionary history of Cetacean tonal sounds. The main goal of this dissertation is to cast light on the evolutionary history of tonal sounds by testing these hypotheses by combining comparative phylogenetic and field methods. This dissertation provides the first species-level phylogeny of Cetacea and phylogenetic tests of evolutionary hypotheses of cetacean communicative signals. Tonal sounds evolution is complex in that has likely been shaped by a combination of factors that may influence different aspects of their acoustical structure. At the inter-specific level, these results suggest that only tonal sound minimum frequency is constrained by body size. Group size also influences tonal sound minimum frequency. Species that live in large groups tend to produce higher frequency tonal sounds. The evolutionary history of tonal sounds and sociality may be intertwined, but in a complex manner rejecting simplistic views such as the hypothesis that tonal sounds evolved ‘for’ social communication in dolphins. Levels of social and tonal sound complexity nevertheless correlate indicating the importance of tonal sounds in social communication. At the intraspecific level, tonal sound variation in frequency and temporal parameters may be product of genetic isolation and local levels of underwater noise. This dissertation provides one of the first insights into the evolution of Cetacean tonal sounds in a phylogenetic context, and points out key species where future studies would be valuable to enrich our understanding of other factors also playing a role in tonal sound evolution.
Resumo:
The primary purpose of this thesis was to design a logical simulation of a communication sub block to be used in the effective communication of digital data between the host and the peripheral devices. The module designed is a Serial interface engine in the Universal Serial Bus that effectively controls the flow of data for communication between the host and the peripheral devices with the emphasis on the study of timing and control signals, considering the practical aspects of them. In this study an attempt was made to realize data communication in the hardware using the Verilog Hardware Description language, which is supported by most popular logic synthesis tools. Various techniques like Cyclic Redundancy Checks, bit-stuffing and Non Return to Zero are implemented in the design to provide enhanced performance of the module.
Resumo:
Standards of proof in law serve the purpose of instructing juries as to the expected levels of confidence in determinations of fact. In criminal trials, to reach a guilty verdict a jury must be satisfied beyond a reasonable doubt, and in civil trials by a preponderance of the evidence. The purposes of this study are to determine the quantitative thresholds used to make these determinations; to ascertain the levels of juror agreement with basic principles of justice; and to try to predict thresholds and beliefs by juror personality characteristics. Participants read brief case descriptions and indicated thresholds in percentages, their beliefs in various principles, and completed three personality measures. A 92-94% threshold in criminal and an 80% threshold in civil matters was found; but prediction by personality was not supported. Significant percentages of jurors disavowed the presumptions of innocence and right to counsel.
Resumo:
In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". If adversaries can intercept this information, they can monitor the trajectory path and capture the location of the source node. This research stems from the recognition that the wide applicability of mWSNs will remain elusive unless a trajectory privacy preservation mechanism is developed. The outcome seeks to lay a firm foundation in the field of trajectory privacy preservation in mWSNs against external and internal trajectory privacy attacks. First, to prevent external attacks, we particularly investigated a context-based trajectory privacy-aware routing protocol to prevent the eavesdropping attack. Traditional shortest-path oriented routing algorithms give adversaries the possibility to locate the target node in a certain area. We designed the novel privacy-aware routing phase and utilized the trajectory dissimilarity between mobile nodes to mislead adversaries about the location where the message started its journey. Second, to detect internal attacks, we developed a software-based attestation solution to detect compromised nodes. We created the dynamic attestation node chain among neighboring nodes to examine the memory checksum of suspicious nodes. The computation time for memory traversal had been improved compared to the previous work. Finally, we revisited the trust issue in trajectory privacy preservation mechanism designs. We used Bayesian game theory to model and analyze cooperative, selfish and malicious nodes' behaviors in trajectory privacy preservation activities.