8 resultados para Generative meaning trajectory

em Digital Commons at Florida International University


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This dissertation investigated the relationship between the September 11, 2001 terrorist attacks and the internationalization agenda of U.S. colleges and universities. The construct, post-9/11 syndrome, is used metaphorically to delineate the apparent state of panic and disequilibrium that followed the incident. Three research questions were investigated, with two universities in the Miami-area of South Florida, one private and the other public, as qualitative case studies. The questions are: (a) How are international student advisors and administrators across two types of institutions dealing with the post-9/11 syndrome? (b) What, if any, are the differences in international education after 9/11? (c) What have been the institutional priorities in relation to international education before and after 9/11? Data-gathering methods included interviews with international student/study abroad advisors and administrators with at least 8 years of experience in the function(s) at their institutions, document and institutional data analysis. The interviews were based on the three-part scheme developed by Schuman (1982): context of experience, details of experience and reflection on the meaning of experiences. Taped interviews, researcher insights, and member checks of transcripts constituted an audit trail for this study. Key findings included a progressive decline in Fall to Fall enrollment of international students at UM by 13.05% in the 5 years after 9/11, and by 6.15% at FIU in the seven post-9/11 years. In both institutions, there was an upsurge in interest in study abroad during the same period but less than 5% of enrolled students ventured abroad annually. I summarized the themes associated with the post-9/11 environment of international education as perceived by my participants at both institutions as 3Ms, 3Ts, and 1D: Menace of Anxiety and Fear, Menace of Insularity and Insecurity, Menace of Over-Regulation and Bigotry, Trajectory of Opportunity, Trajectory of Contradictions, Trajectory of Illusion, Fatalism and Futility, and Dominance of Technology. Based on these findings, I recommended an integrated Internationalization At Home Plus Collaborative Outreach (IAHPCO) approach to internationalization that is based on a post-9/11 recalibration of national security and international education as complementary rather than diametrically opposed concepts.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

What actors and processes at what levels of analysis and through what mechanisms have pushed Iran's nuclear program (INP) towards being designated as a proliferation threat (securitization)? What actors and processes at what levels of analysis and through what mechanisms have pushed Iran's nuclear program away from being designated as an existential threat (de-securitization)? What has been the overall balance of power and interaction dynamics of these opposing forces over the last half-century and what is their most likely future trajectory? ^ Iran's nuclear story can be told as the unfolding of constant interaction between state and non-state forces of "nuclear securitization" and "nuclear de-securitization." Tracking the crisscrossing interaction between these different securitizing and de-securitizing actors in a historical context constitutes the central task of this project. ^ A careful tracing of "security events" on different analytical levels reveals the broad contours of the evolutionary trajectory of INP and its possible future path(s). Out of this theoretically conscious historical narrative, one can make informed observations about the overall thrust of INP along the securitization - de-securitization continuum. ^ The main contributions of this work are three fold: First, it brings a fresh theoretical perspective on Iran's proliferation behavior by utilizing the "securitization" theory tracing the initial indications of the threat designation of INP all the way back to the mid 1970s. Second, it gives a solid and thematically grounded historical texture to INP by providing an intimate engagement with the persons, processes, and events of Tehran's nuclear pursuit over half a century. Third, it demonstrates how INP has interacted with and even at times transformed the NPT as the keystone of the non-proliferation regime, and how it has affected and injected urgency to the international discourse on nuclear proliferation specifically in the Middle East.^

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this qualitative case study was to gain an understanding of the phenomenon of academic orientation by seeking the insights into an inner-city Haitian-American middle school student's attitudes and world view toward education and life. A phenomenological approach was used in order to explore the way in which Cindy, a minority student, gives meaning to her lived-experiences in terms of her desire to meet academic expectations and her ability to overcome social adversity and/or other risk factors.^ The study attempted to answer the following two research questions: (1) What provides the focus for Cindy's (the subject's) approach to her school work and/or life? (2) What are the processes that give meaning and direction to academic orientation and life for Cindy? In-depth interviewing was the primary method of data collection. In addition, journal and sketchbook entries and school district records were used and classroom observations made.^ The nature of the study to understand lived-experience facilitated the use of the case study method and a phenomenological method of description. Data analysis was conducted by means of an adapted form of the constant comparative approach. Patterns in the data which emerged were coded and categorized according to underlying generative themes. Phenomenological reflection and analysis were used to grasp the experiential structures of Cindy's experience. The following textural themes were identified and confirmed to be essential themes to Cindy's experience: personal challenge to do her best, personal challenge to want to learn, having a sense of determination, being able to think for self, having a disposition to like self, achieving self-respect through performance, seeing a need to help others, being intrinsically motivated, being an independent learner, attending more to academic pressure and less to peer pressure, having motivational catalysts in her life, learning and support opportunities, and having a self-culture. Using Mahrer's humanistic theory of experiencing, Cindy's development was interpreted in terms of her progression through a sequence of developmental plateaus: externalized self, internalized self, and integrating and actualizing self.^ The findings of this study were that Cindy's desire to meet academic expectations is guided by a meaning construction internal frame of reference. High expectations of self in conjunction with other protective factors found in Cindy's home and school environments were also found to be linked to her educational resilience and success. Cindy's lived-experiences were also found to be related to Mahrer's theory of human development. In addition, it was concluded that "minority" students do not all fit into social categories and labels. ^

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this research was to gain an understanding of the study experience of non-American graduate students living outside of the United States and formally engaged in graduate studies in an American Distance Education (DE) Program. These students have been labeled “culturally sensitive.” The nature of this study dictated a qualitative case study methodology using in-depth interviews to collect the data and the hermeneutic approach to understanding and description. This study aims at generating questions and hypotheses that will lead to further investigations that explore the need for cultural and contextual sensitivity in order to provide more equitable and accessible higher education for all. ^ The study attempted to answer the question: What is the study experience of “culturally sensitive” graduate students in American DE Programs? The underlying issue in this study is whether education designed and provided by educators of different socio-cultural backgrounds from that of the students could be content relevant and instructionally appropriate, resulting in educational enhancement and/or prepare students to function adequately in their own communities. ^ Participants in this study (n = 12) were engaged in Master's level (n = 2) and Doctoral level (n = 10) DE programs at American Universities, and were interviewed by E-mail, face-to-face, or using a combination of the two. Data analysis compared interviews and highlighted repetitive patterns. Interview data was triangulated with recent related literature and data from document reviews of archived E-mail conversations between students and their professors. The patterns that emerged were coded and categorized according to generative themes. The following themes were identified in order to analyze the data and confirmed through participant check-back: program benefits, communication, technology, culture and methodology, and reflectivity. ^ Major findings in this study indicate that culture plays an important role in cross-cultural encounters for students in American DE programs vis-à-vis student perceptions as to whether their study needs were being met. Most notably, it was found that the coupling of cultural perceptual differences with transactional distance created a potential barrier to communication that could affect short-term success in American DE programs. To overcome this barrier, students cited good communication as essential in meeting student's needs, especially those communications that were supportive and full of detail and context and from a primary source (ex. directly from the professor). Evaluation was a particularly sensitive issue, especially when students were unaware of their professor's cultural and contextual intricacies and therefore were uncertain about expectations and intended meaning. CSGS were aware of their position and the American rather than global context in which they were participating. Students appear to have developed “extended identities”, meaning that they acculturated in varying degrees in order to be successful in their program but that their local cultural identity was not compromised in any way. For participants from Venezuela access to higher DE has been a limiting factor to participation, due to the high cost of technology and telephone lines for communication. ^

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". If adversaries can intercept this information, they can monitor the trajectory path and capture the location of the source node. ^ This research stems from the recognition that the wide applicability of mWSNs will remain elusive unless a trajectory privacy preservation mechanism is developed. The outcome seeks to lay a firm foundation in the field of trajectory privacy preservation in mWSNs against external and internal trajectory privacy attacks. First, to prevent external attacks, we particularly investigated a context-based trajectory privacy-aware routing protocol to prevent the eavesdropping attack. Traditional shortest-path oriented routing algorithms give adversaries the possibility to locate the target node in a certain area. We designed the novel privacy-aware routing phase and utilized the trajectory dissimilarity between mobile nodes to mislead adversaries about the location where the message started its journey. Second, to detect internal attacks, we developed a software-based attestation solution to detect compromised nodes. We created the dynamic attestation node chain among neighboring nodes to examine the memory checksum of suspicious nodes. The computation time for memory traversal had been improved compared to the previous work. Finally, we revisited the trust issue in trajectory privacy preservation mechanism designs. We used Bayesian game theory to model and analyze cooperative, selfish and malicious nodes' behaviors in trajectory privacy preservation activities.^

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The promise of Wireless Sensor Networks (WSNs) is the autonomous collaboration of a collection of sensors to accomplish some specific goals which a single sensor cannot offer. Basically, sensor networking serves a range of applications by providing the raw data as fundamentals for further analyses and actions. The imprecision of the collected data could tremendously mislead the decision-making process of sensor-based applications, resulting in an ineffectiveness or failure of the application objectives. Due to inherent WSN characteristics normally spoiling the raw sensor readings, many research efforts attempt to improve the accuracy of the corrupted or "dirty" sensor data. The dirty data need to be cleaned or corrected. However, the developed data cleaning solutions restrict themselves to the scope of static WSNs where deployed sensors would rarely move during the operation. Nowadays, many emerging applications relying on WSNs need the sensor mobility to enhance the application efficiency and usage flexibility. The location of deployed sensors needs to be dynamic. Also, each sensor would independently function and contribute its resources. Sensors equipped with vehicles for monitoring the traffic condition could be depicted as one of the prospective examples. The sensor mobility causes a transient in network topology and correlation among sensor streams. Based on static relationships among sensors, the existing methods for cleaning sensor data in static WSNs are invalid in such mobile scenarios. Therefore, a solution of data cleaning that considers the sensor movements is actively needed. This dissertation aims to improve the quality of sensor data by considering the consequences of various trajectory relationships of autonomous mobile sensors in the system. First of all, we address the dynamic network topology due to sensor mobility. The concept of virtual sensor is presented and used for spatio-temporal selection of neighboring sensors to help in cleaning sensor data streams. This method is one of the first methods to clean data in mobile sensor environments. We also study the mobility pattern of moving sensors relative to boundaries of sub-areas of interest. We developed a belief-based analysis to determine the reliable sets of neighboring sensors to improve the cleaning performance, especially when node density is relatively low. Finally, we design a novel sketch-based technique to clean data from internal sensors where spatio-temporal relationships among sensors cannot lead to the data correlations among sensor streams.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

iGrooving is a generative music mobile application specifically designed for runners. The application’s foundation is a step-counter that is programmed using the iPhone’s built-in accelerometer. The runner’s steps generate the tempo of the performance by mapping each step to trigger a kick-drum sound file. Additionally, different sound files are triggered at specific step counts to generate the musical performance, allowing the runner a level of compositional autonomy. The sonic elements are chosen to promote a meditative aspect of running. iGrooving is conceived as a biofeedback-stimulated musical instrument and an environment for creating generative music processes with everyday technologies, inspiring us to rethink our everyday notions of musical performance as a shared experience. Isolation, dynamic changes, and music generation are detailed to show how iGrooving facilitates novel methods for music composition, performance and audience participation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". If adversaries can intercept this information, they can monitor the trajectory path and capture the location of the source node. This research stems from the recognition that the wide applicability of mWSNs will remain elusive unless a trajectory privacy preservation mechanism is developed. The outcome seeks to lay a firm foundation in the field of trajectory privacy preservation in mWSNs against external and internal trajectory privacy attacks. First, to prevent external attacks, we particularly investigated a context-based trajectory privacy-aware routing protocol to prevent the eavesdropping attack. Traditional shortest-path oriented routing algorithms give adversaries the possibility to locate the target node in a certain area. We designed the novel privacy-aware routing phase and utilized the trajectory dissimilarity between mobile nodes to mislead adversaries about the location where the message started its journey. Second, to detect internal attacks, we developed a software-based attestation solution to detect compromised nodes. We created the dynamic attestation node chain among neighboring nodes to examine the memory checksum of suspicious nodes. The computation time for memory traversal had been improved compared to the previous work. Finally, we revisited the trust issue in trajectory privacy preservation mechanism designs. We used Bayesian game theory to model and analyze cooperative, selfish and malicious nodes' behaviors in trajectory privacy preservation activities.