10 resultados para Hip-hop

em Digital Commons at Florida International University


Relevância:

100.00% 100.00%

Publicador:

Resumo:

From 2000 to 2010, America’s music industry’s annual revenue went from $4 billion to $2 billion. Much of this is attributed to the internet’s ability to provide consumers with easy access to free music, and hip hop has been especially impacted by this trend. Utilizing document analysis and personal interviews, this study found that the success of independent artists has influenced the business strategies of major record companies. In response to a dramatic decrease in record sales, major labels have made more of an effort to sign their artists to 360 deals, which allow the labels to profit from every aspect of an artist’s brand or identity. While some independent artists are the main beneficiary of the profits generated from their music and personal brand, they also reify the commodity-form capitalist system by attempting to turn their music and brand into a fetishized commodity and by turning their audience into a fetishized commodity.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This flyer promotes the event "Cuban Hip-Hop in Miami: A Conversation Moderated by Nora Gámez Torres" hosted by the Cuban Research Institute.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Discussion moderated by CRI visiting scholar Noram Gamez Torres discussing the future of Cuban hip-hop, its racial politics, and the impact that the cultural exchange policy has had on these rappers and their music. Includes performances and discussion by artists Aldo Baquero (Los Aldeanos), Raudel Collazo (Escuadr6n Patriota), David Escalona (Omni Zona Franca), and Silvio Rodriguez (Silvito "EI Libre").

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The social scripts that are deeply involved in cultural production by AfroCuban identified artists in Miami, during the late nineties to the present, participate in a climate that is informed by and feeds from the so-called Latin Explosion of this time period. More specifically, varying historical, socioeconomic, and geopolitical trajectories have placed Africa and African-based religion and cultural production (via music and theatre) at the center of Cuban national identity. The purpose of this study is to facilitate a discussion of the experiences of AfroCuban performance artists and the climate for production, given the aforementioned dynamics, in mass media. These experiences are directed by a study of transnational structures for cultural production (including the more recent memory-shadow of hip-hop culture in Cuba) and discourse that engages theories of modernity, authenticity, and resistance. Through the interventions of artists, producers, and distributors via their art and business, the text identifies and resists the pervasive oppression of stereotype, dehumanization (Othering), and essentialism.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Internet has become an integral part of our nation’s critical socio-economic infrastructure. With its heightened use and growing complexity however, organizations are at greater risk of cyber crimes. To aid in the investigation of crimes committed on or via the Internet, a network forensics analysis tool pulls together needed digital evidence. It provides a platform for performing deep network analysis by capturing, recording and analyzing network events to find out the source of a security attack or other information security incidents. Existing network forensics work has been mostly focused on the Internet and fixed networks. But the exponential growth and use of wireless technologies, coupled with their unprecedented characteristics, necessitates the development of new network forensic analysis tools. This dissertation fostered the emergence of a new research field in cellular and ad-hoc network forensics. It was one of the first works to identify this problem and offer fundamental techniques and tools that laid the groundwork for future research. In particular, it introduced novel methods to record network incidents and report logged incidents. For recording incidents, location is considered essential to documenting network incidents. However, in network topology spaces, location cannot be measured due to absence of a ‘distance metric’. Therefore, a novel solution was proposed to label locations of nodes within network topology spaces, and then to authenticate the identity of nodes in ad hoc environments. For reporting logged incidents, a novel technique based on Distributed Hash Tables (DHT) was adopted. Although the direct use of DHTs for reporting logged incidents would result in an uncontrollably recursive traffic, a new mechanism was introduced that overcome this recursive process. These logging and reporting techniques aided forensics over cellular and ad-hoc networks, which in turn increased their ability to track and trace attacks to their source. These techniques were a starting point for further research and development that would result in equipping future ad hoc networks with forensic components to complement existing security mechanisms.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Due to low cost and easy deployment, multi-hop wireless networks become a very attractive communication paradigm. However, IEEE 802.11 medium access control (MAC) protocol widely used in wireless LANs was not designed for multi-hop wireless networks. Although it can support some kinds of ad hoc network architecture, it does not function efficiently in those wireless networks with multi-hop connectivity. Therefore, our research is focused on studying the medium access control in multi-hop wireless networks. The objective is to design practical MAC layer protocols for supporting multihop wireless networks. Particularly, we try to prolong the network lifetime without degrading performances with small battery-powered devices and improve the system throughput with poor quality channels. ^ In this dissertation, we design two MAC protocols. The first one is aimed at minimizing energy-consumption without deteriorating communication activities, which provides energy efficiency, latency guarantee, adaptability and scalability in one type of multi-hop wireless networks (i.e. wireless sensor network). Methodologically, inspired by the phase transition phenomena in distributed networks, we define the wake-up probability, which maintained by each node. By using this probability, we can control the number of wireless connectivity within a local area. More specifically, we can adaptively adjust the wake-up probability based on the local network conditions to reduce energy consumption without increasing transmission latency. The second one is a cooperative MAC layer protocol for multi-hop wireless networks, which leverages multi-rate capability by cooperative transmission among multiple neighboring nodes. Moreover, for bidirectional traffic, the network throughput can be further increased by using the network coding technique. It is a very helpful complement for current rate-adaptive MAC protocols under the poor channel conditions of direct link. Finally, we give an analytical model to analyze impacts of cooperative node on the system throughput. ^

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this thesis, we proposed the use of device-to-device (D2D) communications for extending the coverage area of active base stations, for public safety communications with partial coverage. A 3GPP standard compliant D2D system level simulator is developed for HetNets and public safety scenarios and used to evaluate the performance of D2D discovery and communications underlying cellular networks. For D2D discovery, the benefits of time-domain inter-cell interference coordi- nation (ICIC) approaches by using almost blank subframes were evaluated. Also, the use of multi-hop is proposed to improve, even further, the performance of the D2D discovery process. Finally, the possibility of using multi-hop D2D communications for extending the coverage area of active base stations was evaluated. Improvements in energy and spectral efficiency, when compared with the case of direct UE-eNB communi- cations, were demonstrated. Moreover, UE power control techniques were applied to reduce the effects of interference from neighboring D2D links.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Nursing Case Management has motivated nurses to examine the effects of care provided to patients, and to devise means of improving this care. The success of this nursing care delivery model is well documented among a variety of acute and chronically ill patients. Utilizing nonparametric ANOVA for comparison of two means, this study investigates the outcome of the implementation of a nursingcase management model on an orthopedic unit of a local hospital. A convenience sample (N=149) of hip-fracture patients for two separate eight months charting periods were used. The first period was pre-case management and the second period was after the implementation of nursing managed care on the unit. Results suggested that nursing case management was effective in reducing the total length of hospital stay and post-operative days significantly.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this study was to evaluate the incidence of corrosion and fretting in 48 retrieved titanium-6aluminum-4vanadium and/or cobalt-chromium-molybdenum modular total hip prosthesis with respect to alloy material microstructure and design parameters. The results revealed vastly different performance results for the wide array of microstructures examined. Severe corrosion/fretting was seen in 100% of as-cast, 24% of low carbon wrought, 9% of high carbon wrought and 5% of solution heat treated cobalt-chrome. Severe corrosion/fretting was observed in 60% of Ti-6Al-4V components. Design features which allow for fluid entry and stagnation, amplification of contact pressure and/or increased micromotion were also shown to play a role. 75% of prosthesis with high femoral head-trunnion offset exhibited poor performance compared to 15% with a low offset. Large femoral heads (>32mm) did not exhibit poor corrosion or fretting. Implantation time was not sufficient to cause poor performance; 54% of prosthesis with greater than 10 years in-vivo demonstrated none or mild corrosion/fretting.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Internet has become an integral part of our nation's critical socio-economic infrastructure. With its heightened use and growing complexity however, organizations are at greater risk of cyber crimes. To aid in the investigation of crimes committed on or via the Internet, a network forensics analysis tool pulls together needed digital evidence. It provides a platform for performing deep network analysis by capturing, recording and analyzing network events to find out the source of a security attack or other information security incidents. Existing network forensics work has been mostly focused on the Internet and fixed networks. But the exponential growth and use of wireless technologies, coupled with their unprecedented characteristics, necessitates the development of new network forensic analysis tools. This dissertation fostered the emergence of a new research field in cellular and ad-hoc network forensics. It was one of the first works to identify this problem and offer fundamental techniques and tools that laid the groundwork for future research. In particular, it introduced novel methods to record network incidents and report logged incidents. For recording incidents, location is considered essential to documenting network incidents. However, in network topology spaces, location cannot be measured due to absence of a 'distance metric'. Therefore, a novel solution was proposed to label locations of nodes within network topology spaces, and then to authenticate the identity of nodes in ad hoc environments. For reporting logged incidents, a novel technique based on Distributed Hash Tables (DHT) was adopted. Although the direct use of DHTs for reporting logged incidents would result in an uncontrollably recursive traffic, a new mechanism was introduced that overcome this recursive process. These logging and reporting techniques aided forensics over cellular and ad-hoc networks, which in turn increased their ability to track and trace attacks to their source. These techniques were a starting point for further research and development that would result in equipping future ad hoc networks with forensic components to complement existing security mechanisms.