22 resultados para Magic the Gathering
em Digital Commons at Florida International University
Resumo:
Mistaken eyewitness identifications of innocent lead to more false convictions in the United States than any other cause. In response to concerns about the reliability of eyewitness evidence, the National Institute of Justice (NIJ) in 1999 published a Guide for the gathering and preservation of eyewitness evidence by law enforcement personnel. Previous research has shown that eyewitness identifications are more accurate when obtained using procedures recommended in the NIJ Guide. This experiment assessed whether informing jurors about the Guide can improve their ability to discriminate between eyewitness identifications likely to be accurate and those likely to be inaccurate and, if so, how to most effectively provide jurors with such information. ^ Seven hundred sixteen U.S. citizens who reported for criminal jury duty participated. Half of the participant jurors read a summary of an armed robbery trial in which the police followed the NIJ Guide when obtaining an eyewitness identification of the defendant. The other half read about an identical case in which the police did not follow the Guide. Jurors received information about the Guide from a court-appointed expert witness, one of the attorneys in the case, the trial judge, the judge in combination with one of the attorneys, or from no one (in the control groups). Jurors then rendered a verdict in the case and answered questions about the evidence in the case. ^ When an expert witness or the judge (either alone or in combination with one of the attorneys) informed jurors about the Guide, the jurors voted to convict defendants likely to be guilty and to acquit defendants likely to be innocent more often than did uninformed jurors assigned to a control group. These data suggest that informing jurors about the NIJ Guide using expert testimony or instructions from a judge will improve the quality and accuracy of jurors' verdict decisions in cases involving eyewitness identification evidence. However, more research is needed to determine whether the judge will remain an effective source of information about the Guide in a longer, more detailed trial scenario and to learn more about the underlying psychological processes governing the effects observed in this experiment. ^
Resumo:
Menu analysis is the gathering and processing of key pieces of information to make it more manageable and understand- able. Ultimately, menu analysis allows managers to make more informed decisions about prices, costs, and items to be included on a menu. The author discusses If labor as well as food casts need to be included in menu analysis and if managers need to categorize menu items differently when doing menu analysis based on customer eating patterns.
Resumo:
Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data. They can be applied in many fields including health, environmental monitoring, home automation and the military. Like all other computing systems it is necessary to include security features, so that security sensitive data traversing the network is protected. However, traditional security techniques cannot be applied to wireless sensor networks. This is due to the constraints of battery power, memory, and the computational capacities of the miniature wireless sensor nodes. Therefore, to address this need, it becomes necessary to develop new lightweight security protocols. This dissertation focuses on designing a suite of lightweight trust-based security mechanisms and a cooperation enforcement protocol for wireless sensor networks. This dissertation presents a trust-based cluster head election mechanism used to elect new cluster heads. This solution prevents a major security breach against the routing protocol, namely, the election of malicious or compromised cluster heads. This dissertation also describes a location-aware, trust-based, compromise node detection, and isolation mechanism. Both of these mechanisms rely on the ability of a node to monitor its neighbors. Using neighbor monitoring techniques, the nodes are able to determine their neighbors’ reputation and trust level through probabilistic modeling. The mechanisms were designed to mitigate internal attacks within wireless sensor networks. The feasibility of the approach is demonstrated through extensive simulations. The dissertation also addresses non-cooperation problems in multi-user wireless sensor networks. A scalable lightweight enforcement algorithm using evolutionary game theory is also designed. The effectiveness of this cooperation enforcement algorithm is validated through mathematical analysis and simulation. This research has advanced the knowledge of wireless sensor network security and cooperation by developing new techniques based on mathematical models. By doing this, we have enabled others to build on our work towards the creation of highly trusted wireless sensor networks. This would facilitate its full utilization in many fields ranging from civilian to military applications.
Resumo:
Menu analysis is the gathering and processing of key pieces of information to make it more manageable and understandable. Ultimately, menu analysis allows managers to make more informed decisions about prices, costs, and items to be included on a menu. The author discusses If labor as well as food casts need to be included in menu analysis and if managers need to categorize menu items differently when doing menu analysis based on customer eating patterns.
Resumo:
Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data. They can be applied in many fields including health, environmental monitoring, home automation and the military. Like all other computing systems it is necessary to include security features, so that security sensitive data traversing the network is protected. However, traditional security techniques cannot be applied to wireless sensor networks. This is due to the constraints of battery power, memory, and the computational capacities of the miniature wireless sensor nodes. Therefore, to address this need, it becomes necessary to develop new lightweight security protocols. This dissertation focuses on designing a suite of lightweight trust-based security mechanisms and a cooperation enforcement protocol for wireless sensor networks. This dissertation presents a trust-based cluster head election mechanism used to elect new cluster heads. This solution prevents a major security breach against the routing protocol, namely, the election of malicious or compromised cluster heads. This dissertation also describes a location-aware, trust-based, compromise node detection, and isolation mechanism. Both of these mechanisms rely on the ability of a node to monitor its neighbors. Using neighbor monitoring techniques, the nodes are able to determine their neighbors’ reputation and trust level through probabilistic modeling. The mechanisms were designed to mitigate internal attacks within wireless sensor networks. The feasibility of the approach is demonstrated through extensive simulations. The dissertation also addresses non-cooperation problems in multi-user wireless sensor networks. A scalable lightweight enforcement algorithm using evolutionary game theory is also designed. The effectiveness of this cooperation enforcement algorithm is validated through mathematical analysis and simulation. This research has advanced the knowledge of wireless sensor network security and cooperation by developing new techniques based on mathematical models. By doing this, we have enabled others to build on our work towards the creation of highly trusted wireless sensor networks. This would facilitate its full utilization in many fields ranging from civilian to military applications.
Resumo:
Research on the adoption of innovations by individuals has been criticized for focusing on various factors that lead to the adoption or rejection of an innovation while ignoring important aspects of the dynamic process that takes place. Theoretical process-based models hypothesize that individuals go through consecutive stages of information gathering and decision making but do not clearly explain the mechanisms that cause an individual to leave one stage and enter the next one. Research on the dynamics of the adoption process have lacked a structurally formal and quantitative description of the process. ^ This dissertation addresses the adoption process of technological innovations from a Systems Theory perspective and assumes that individuals roam through different, not necessarily consecutive, states, determined by the levels of quantifiable state variables. It is proposed that different levels of these state variables determine the state in which potential adopters are. Various events that alter the levels of these variables can cause individuals to migrate into different states. ^ It was believed that Systems Theory could provide the required infrastructure to model the innovation adoption process, particularly applied to information technologies, in a formal, structured fashion. This dissertation assumed that an individual progressing through an adoption process could be considered a system, where the occurrence of different events affect the system's overall behavior and ultimately the adoption outcome. The research effort aimed at identifying the various states of such system and the significant events that could lead the system from one state to another. By mapping these attributes onto an “innovation adoption state space” the adoption process could be fully modeled and used to assess the status, history, and possible outcomes of a specific adoption process. ^ A group of Executive MBA students were observed as they adopted Internet-based technological innovations. The data collected were used to identify clusters in the values of the state variables and consequently define significant system states. Additionally, events were identified across the student sample that systematically moved the system from one state to another. The compilation of identified states and change-related events enabled the definition of an innovation adoption state-space model. ^
Resumo:
This qualitative case study was limited to an eighteen-hour workshop on “Constructing a Reflective Teacher Portfolio.” The study was conducted at the Nova Center, a research and development school, in the Broward County Public School System. Six participants took part in the study. The study examined the process used by the participants as they constructed their portfolios, explored the reflective aspect of their construction, and investigated the impact that constructing a portfolio had on them and their work. ^ Data was gathered using interviews, observations, and artifacts. Content analysis and the combined frameworks of Van Manen (1977), Smyth (1989), and Pugach and Johnson (1990) were used to examine the data. The data indicates that the portfolios and workshop were not as effective as anticipated in encouraging the participants to examine their work. The following themes emerged as a result of this study: (a) teachers begin constructing their portfolios by gathering material that represents past successes; (b) examining philosophies of education, writing a personal narrative and sharing with colleagues stimulates reflective practice; (c) teachers have difficulty expressing their personal beliefs about education; (d) creating a reflective portfolio is a constructivist process that encourages divergent products; (e) teachers initially do not recognize a strong connection between constructing a portfolio and improving their work; and (f) constructing a portfolio may be an inside-out approach to educational reform. ^ Recommendations were presented to improve the workshop, specifically focusing on teachers examining their practices and learning from students' work. Additional study is needed to evaluate the influence of these changes in the workshop. ^
Resumo:
This dissertation investigated the relationship between the September 11, 2001 terrorist attacks and the internationalization agenda of U.S. colleges and universities. The construct, post-9/11 syndrome, is used metaphorically to delineate the apparent state of panic and disequilibrium that followed the incident. Three research questions were investigated, with two universities in the Miami-area of South Florida, one private and the other public, as qualitative case studies. The questions are: (a) How are international student advisors and administrators across two types of institutions dealing with the post-9/11 syndrome? (b) What, if any, are the differences in international education after 9/11? (c) What have been the institutional priorities in relation to international education before and after 9/11? Data-gathering methods included interviews with international student/study abroad advisors and administrators with at least 8 years of experience in the function(s) at their institutions, document and institutional data analysis. The interviews were based on the three-part scheme developed by Schuman (1982): context of experience, details of experience and reflection on the meaning of experiences. Taped interviews, researcher insights, and member checks of transcripts constituted an audit trail for this study. Key findings included a progressive decline in Fall to Fall enrollment of international students at UM by 13.05% in the 5 years after 9/11, and by 6.15% at FIU in the seven post-9/11 years. In both institutions, there was an upsurge in interest in study abroad during the same period but less than 5% of enrolled students ventured abroad annually. I summarized the themes associated with the post-9/11 environment of international education as perceived by my participants at both institutions as 3Ms, 3Ts, and 1D: Menace of Anxiety and Fear, Menace of Insularity and Insecurity, Menace of Over-Regulation and Bigotry, Trajectory of Opportunity, Trajectory of Contradictions, Trajectory of Illusion, Fatalism and Futility, and Dominance of Technology. Based on these findings, I recommended an integrated Internationalization At Home Plus Collaborative Outreach (IAHPCO) approach to internationalization that is based on a post-9/11 recalibration of national security and international education as complementary rather than diametrically opposed concepts.
Resumo:
Students gathering and the burial site of the time capsule. Time capsule table at the Student Leadership Summit 10th Anniversary. The Annual FIU Student Leadership Summit is held each February on the Biscayne Bay Campus. The Summit is a one-day conference for current student leaders. The Summit offers our students the opportunity to learn from the vast expertise of our faculty and administrators, to share their leadership experiences with each other and to establish a network of support and cooperation within the university. On Feb. 2, 2013, we celebrated the 10th anniversary of holding the Student Leadership Summit. In honor of this occasion, we buried a time capsule containing materials from the day as well as messages from participants to the participants of 2023 when the time capsule is to be opened.
Resumo:
This study was a qualitative investigation to ascertain and describe two of the current issues at the International Community School of Abidjan, examine their historical bases, and analyze their impact on the school environment.^ Two issues emerged during the inquiry phase of this study: (1) the relationship between local-hired and overseas-hired teachers in light of the January 1994 devaluation which polarized the staff by negating a four-year salary scale that established equity, (2) the school community's wide variance in the perceived power that the U.S. Embassy has on school operations based on its role as ICSA's founding sponsor.^ A multiple studies approach was used in gathering data. An extensive examination of the school's archives was used to reconstruct an historical overview of ICSA. An initial questionnaire was distributed to teachers and administrators at an educational conference to determine the scope of the 1994 devaluation of the West and Central African CFA and its impact on school personnel in West African American-sponsored overseas schools (ASOS). Personal interviews were conducted with the school staff, administration, school board members, and relevant historical participants to determine the principal issues at ICSA at that time. The researcher, an overseas-hired teacher, also used participant observations to collect data. Findings based on these sources were used to analyze the two issues from an historical perspective and to form conclusions.^ Findings in this study pertaining to the events induced by the French and African governments' decision to implement a currency devaluation in January 1994 were presented in ex post-facto chronological narrative form to describe the events which transpired, describe the perception of school personnel involved in these events, examine the final resolution and interpret these events within a historical framework for analysis.^ The topic of the U.S. Embassy and its role at ICSA emerged inductively from open-ended personal interviews conducted over the course of a year. Contradictory perspectives were examined and researched for accuracy and cause. The results of this inquiry presented the U.S. Embassy role at ICSA from a two-sided perspective, examined the historical role of the Embassy, and presented means by which the role and responsibility of the U.S. Embassy could best be communicated to the school community.^ The final chapter provides specific actions for mediation of problems stemming from these issues, implications for administrators and teachers currently involved in overseas schools or considering the possibility, and suggestions for future inquiries.^ Examination of a two-tier salary scale for local-hired and overseas-hired teachers generated the following recommendations: movement towards a single salary scale when feasible, clearly stated personnel policies and full disclosure of benefits, a uniform certification standard, professional development programs and awareness of the impact of this issue on staff morale.^ Divergent perceptions and attitudes toward the role of the U.S. Embassy produced these recommendations: a view towards limiting the number of Americans on ASOS school boards, open school board meetings, selection of Embassy Administrative Officers who can educate school communities on the exact role of the Embassy, educating parents through the outreach activities that communicate American educational philosophy and involve all segments of the international community, and a firm effort on the part of the ASOS to establish the school's autonomy from special interests. ^
Resumo:
Public opinion polls in the United States reveal that a great majority of Americans are aware and show concern about ecological issues and the need to preserve natural areas. In South Florida, natural resources have been subjected to enormous strain as the pressure to accommodate a growing population has led to rapid development. Suburbs have been built on areas that were once natural wetlands and farmlands, and the impact today shows a landscape where natural places have all but disappeared. This dissertation examines the intersection between the perceptions that individuals living in the South Florida region have with respect to the natural environment and local ecological problems with where their relationship to nature takes place. ^ The research is based upon both quantitative and qualitative data. The principal methodology used in this research is the ethnographic method, which employed the data gathering techniques of in-depth interviewing and participant observation. The objective of the qualitative portion of the study was to determine how people perceive and relate to their immediate environment. The quantitative portion of the study employed telephone survey data from the FIU/Florida Poll 2000. Data collected through this survey provided the basis to statistically test responses to the research questions. ^ The findings show that people in South Florida have a general idea of the relationship between the human population and the environment but very little knowledge of how they individually affect each other. The experience of private places and public spaces in everyday life permits people to compartmentalize cultural values and understandings of the natural world in separate cognitive schemas. The appreciation of the natural world has almost no connection to their personal sense of obligation to preserve the environment. That obligation is only felt in their home space even though the South Florida environment overall struggles desperately with water shortages, land encroachment, and a rapidly expanding human population whose activities continuously aggravate an already delicate natural balance. ^
Resumo:
The present investigation examined the relationships among personality (as conceptualized by the Big Five Factors), leader-member exchange (LMX) quality, action control, organizational citizenship behaviors (OCB), and overall job performance (OJP). Two mediator variables were proposed and tested in this study: LMX and Action Control. Two-hundred and seven currently employed regular elementary school classroom teachers provided data during the 2000–2001 academic school year. Teachers provided personality, LMX quality (member or subordinate perspective), action control, job tenure, and demographic data. Nine school administrators (i.e., Principals, Assistant Principals) were the source for supervisor ratings of OCB, OJP, and LMX quality (leader or supervisor perspective). In eight of the nine total schools, teachers completed questionnaires during an after-school teacher gathering; in the remaining school location questionnaires were dropped off, distributed to teachers, and re-collected two weeks later. Results indicated a significant relationship between the OCB scale and overall supervisory ratings of OJP. The relationship among the big five factors of personality and OJP did not reach statistical significance, nor did the relationships among personality and OCB. The data indicated that none of the teacher tenure variables (i.e., teacher, school, or time worked with principal tenure) moderated the personality-OCB relationship nor the personality-OJP relationship. Finally, a review of the correlations among the variables of interest precluded conducting a mediation between personality-performance by OCB, mediation of personality-OCB by action control, and mediation of personality-OCB by LMX. In conclusion, the data reveal that personality was not significantly correlated with supervisory ratings of OJP or significantly related to supervisory ratings of overall OCB. Moreover, LMX quality and action control did not mediate the relationships between Personality-OJP nor the Personality-OCB relationship. Significant relationships were found between disengagement and overall LMX quality and between Initiative and overall LMX quality (both LMX-Teacher perspectives) as well as between personality variables and both Disengagement and Initiative action control variables. Despite the limitations inherent in this study, these latter findings suggest “lessons” for teachers and school administrators alike. ^
Resumo:
J.R.R. Tolkien was not only an author of fantasy but also a philologist who theorized about myth. Theorists have employed various methods of analyzing myth, and this thesis integrates several analyses, including Tolkien’s. I address the roles of doctrine, ritual, cross-cultural patterns, mythic expressions in literature, the literary effect of myth, evolution of language and consciousness, and individual invention over inheritance and diffusion. Beyond Tolkien’s English and Catholic background, I argue for eclectic influence on Tolkien, including resonance with Buddhism. Tolkien views mythopoeia, literary mythmaking, in terms of sub-creation, human invention in the image of God as creator. Key mythopoetic tools include eucatastrophe, the happy ending’s sudden turn to poignant joy, and enchantment, the realization of imagined wonder, which is epitomized by the character of Tom Bombadil and contrasted with modernist techno-magic seeking to alter and dominate the world. I conclude by interpreting Tolkien’s mythmaking as a form of mysticism.
Resumo:
Advanced Placement is a series of courses and tests designed to determine mastery over introductory college material. It has become part of the American educational system. The changing conception of AP was examined using critical theory to determine what led to a view of continual success. The study utilized David Armstrong's variation of Michel Foucault's critical theory to construct an analytical framework. Black and Ubbes' data gathering techniques and Braun and Clark's data analysis were utilized as the analytical framework. Data included 1135 documents: 641 journal articles, 421 newspaper articles and 82 government documents. ^ The study revealed three historical ruptures correlated to three themes containing subthemes. The first rupture was the Sputnik launch in 1958. Its correlated theme was AP leading to school reform with subthemes of AP as reform for able students and AP's gaining of acceptance from secondary schools and higher education. The second rupture was the Nation at Risk report published in 1983. Its correlated theme was AP's shift in emphasis from the exam to the course with the subthemes of AP as a course, a shift in AP's target population, using AP courses to promote equity, and AP courses modifying curricula. The passage of the No Child Left Behind Act of 2001 was the third rupture. Its correlated theme was AP as a means to narrow the achievement gap with the subthemes of AP as a college preparatory program and the shifting of AP to an open access program. ^ The themes revealed a perception that progressively integrated the program into American education. The AP program changed emphasis from tests to curriculum, and is seen as the nation's premier academic program to promote reform and prepare students for college. It has become a major source of income for the College Board. In effect, AP has become an agent of privatization, spurring other private entities into competition for government funding. The change and growth of the program over the past 57 years resulted in a deep integration into American education. As such the program remains an intrinsic part of the system and continues to evolve within American education. ^
Resumo:
Magic City Gospel is a collection of poems that explores themes of race and identity with a special focus on racism in the American South. Many of the poems deal directly with the author’s upbringing in Birmingham, Alabama, the Magic City, and the ways in which the history of that geographical place informs the present. Magic City Gospel confronts race and identity through pop culture, history, and the author’s personal experiences as a black, Alabama-born woman. Magic City Gospel is, in part, influenced by the biting, but softly rendered truth and historical commentary of Lucille Clifton, the laid-back and inventive poetry of Terrance Hayes, the biting and unapologetically feminist poetry of Audre Lorde, and the syncopated, exact, musical poetry of Kevin Young. These and other authors like Tim Siebles, Gwendolyn Brooks, and Major Jackson influence poems as they approach the complicated racial and national identity of the author.