12 resultados para Welland Power and Supply Canal Company Limited

em Digital Commons at Florida International University


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Over the past few decades, we have been enjoying tremendous benefits thanks to the revolutionary advancement of computing systems, driven mainly by the remarkable semiconductor technology scaling and the increasingly complicated processor architecture. However, the exponentially increased transistor density has directly led to exponentially increased power consumption and dramatically elevated system temperature, which not only adversely impacts the system's cost, performance and reliability, but also increases the leakage and thus the overall power consumption. Today, the power and thermal issues have posed enormous challenges and threaten to slow down the continuous evolvement of computer technology. Effective power/thermal-aware design techniques are urgently demanded, at all design abstraction levels, from the circuit-level, the logic-level, to the architectural-level and the system-level. ^ In this dissertation, we present our research efforts to employ real-time scheduling techniques to solve the resource-constrained power/thermal-aware, design-optimization problems. In our research, we developed a set of simple yet accurate system-level models to capture the processor's thermal dynamic as well as the interdependency of leakage power consumption, temperature, and supply voltage. Based on these models, we investigated the fundamental principles in power/thermal-aware scheduling, and developed real-time scheduling techniques targeting at a variety of design objectives, including peak temperature minimization, overall energy reduction, and performance maximization. ^ The novelty of this work is that we integrate the cutting-edge research on power and thermal at the circuit and architectural-level into a set of accurate yet simplified system-level models, and are able to conduct system-level analysis and design based on these models. The theoretical study in this work serves as a solid foundation for the guidance of the power/thermal-aware scheduling algorithms development in practical computing systems.^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

For the Wayuu of the Guajira Peninsula of northern Colombia, water procurement has historically been challenging. The ancestral territory of this indigenous pastoral society is windy and arid, with low rainfall, high temperatures and an absence of perennial rivers or streams. In the past, the Wayuu adapted to these environmental conditions by practicing transhumance during the prolonged dry seasons, digging spring wells and artificial ponds and by following guiding principles for water usage. Since the 1930s, the government has made efforts to build additional wind-powered wells and ponds for a growing native population. Notwithstanding, these water solutions have only partly met the necessities; public water sources are limited or unreliable and few attempts are made to generate safe drinking water. Furthermore, the ubiquitous practice of animal husbandry places added pressure on existing sources; livestock consume more water than the human populations in the areas visited. Rapid assessments in four Wayuu areas on the peninsula were conducted by the author and an interdisciplinary team working for the Cerrejón Foundation for Water in La Guajira from 2010 to 2013. The assessments were part of a larger pilot project to design and implement a sustainability plan for reservoir-based water supply systems in the region. This study brings cultural practices and local knowledge to the forefront as key elements for the success of water works and other development projects carried out in Wayuu territory.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The purpose of this research was to apply the concepts of power and influence tactics to the joint venture context by examining how they relate to venture performance. In addition, culture and the expectations of future cooperation were examined for their association with influence tactic use and joint venture performance. Data were collected from 58 parent firms of U.S.-based domestic and international joint ventures about their relationships with their partners.^ Under the theories of social exchange and power dependence, a parent's level of power is based on its partner's dependence on the relationship. The statistical results indicated that: (1) the greater the total of power of both parents in an equal power relationship, the greater the joint venture's performance; and (2) the greater the inequality between each parent's level of power, the lower the joint venture's performance. It was also found that the way in which a parent firm tried to influence its partner was related to joint venture performance. Specifically, the use of references to a partner's legitimate authority was negatively related to performance, while the use of rational arguments and compromises was positively related.^ Contrary to expectations, the cultural backgrounds of the parents were not shown to have a relationship to influence tactic use or joint venture's performance. On the other hand, greater expectation of future cooperation had a positive association with performance, and a significant relationship with influence tactic use. The greater the expectation, the less partners used more confrontational tactics such as pressure or legitimate authority. ^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The purpose of this study was to examine what secondary English to Speakers of Other Languages (ESOL) teachers understand about social and academic language, what instructional strategies they use for Limited English Proficient (LEP) students, and how these concepts are operationalized in their daily practice. ^ This was a mixed method study incorporating both quantitative and qualitative data collection and interpretation. Written questionnaires and individual interviews addressed the questions on teachers' definitions of social and academic language and their strategy use. Classroom observations provided verification of their definitions and their descriptions of instruction for academic language. ^ Findings indicated that teachers' definitions of social and academic language were still developing and that there were ambiguities in identifying examples of social and academic language. The use of graphic organizers or visual supports, groups or peer partners, role play or drama, and modeling were the strategies teachers consistently listed for beginner, intermediate, advanced and multiple level classes. Additionally, teachers' descriptions of their instruction were congruent with what was observed in their classroom practice. ^ It appeared that this population of secondary ESOL teachers was in the process of evolving their definitions of social and academic language and were at different stages in this evolution. Teachers' definitions of language influenced their instruction. Furthermore, those who had clear constructs of language were able to operationalize them in their classroom instruction. ^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Context: While research suggests whole body vibration (WBV) positively affects measures of neuromuscular performance in athletes, researchers have yet to address appropriate and effective vibration protocols. Objective: To identify the acute effects of continuous and intermittent WBV on muscular power and agility in recreationally active females. Design: We used a randomized 3-period cross-over design to observe the effects of 3 vibration protocols on muscular power and agility. Setting: Sports Science and Medicine Research Laboratory at Florida International University. Patients or Other Participants: Eleven recreationally active female volunteers (age=24.4±5.7y; ht=166.0±10.3cm; mass=59.7±14.3kg). Interventions: Each session, subjects stood on the Galileo WBV platform (Orthometrix, White Plains, NY) and received one of three randomly assigned vibration protocols. Our independent variable was vibration length (continuous, intermittent, or no vibration). Main Outcome Measures: An investigator blinded to the vibration protocol measured muscular power and agility. We measured muscular power with heights of squat and countermovement jumps. We measured agility with the Illinois Agility Test. Results: Continuous WBV significantly increased SJ height from 97.9±7.6cm to 98.5±7.5cm (P=0.019, β=0.71, η2 =0.07) but not CMJ height [99.1±7.4cm pretest and 99.4±7.4cm posttest (P=0.167, β=0.27)] or agility [19.2±2.1s pretest and 19.0±2.1s posttest (P=0.232, β=0.21)]. Intermittent WBV significantly enhanced SJ height from 97.6±7.7cm to 98.5±7.7cm (P=0.017, β=0.71, η2 =0.11) and agility 19.4±2.2s to 19.0±2.1s (P=0.001, β=0.98, η2=0.16), but did not effect CMJ height [98.7±7.7cm pretest and 99.3±7.3cm posttest (P=0.058, β=0.49)]. Conclusion: Continuous WBV increased squat jump height, while intermittent vibration enhanced agility and squat jump height. Future research should continue investigating the effect of various vibration protocols on athletic performance.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, we examine Florida’s sixth-eighth grade geography standards to determine the potential for teaching critical geography, a field that interrogates space, place, power, and identity. While 57% of the standards demonstrated evidence of critical thinking, only six standards foster higher levels of critique consistent with critical geography.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Catering to society's demand for high performance computing, billions of transistors are now integrated on IC chips to deliver unprecedented performances. With increasing transistor density, the power consumption/density is growing exponentially. The increasing power consumption directly translates to the high chip temperature, which not only raises the packaging/cooling costs, but also degrades the performance/reliability and life span of the computing systems. Moreover, high chip temperature also greatly increases the leakage power consumption, which is becoming more and more significant with the continuous scaling of the transistor size. As the semiconductor industry continues to evolve, power and thermal challenges have become the most critical challenges in the design of new generations of computing systems. ^ In this dissertation, we addressed the power/thermal issues from the system-level perspective. Specifically, we sought to employ real-time scheduling methods to optimize the power/thermal efficiency of the real-time computing systems, with leakage/ temperature dependency taken into consideration. In our research, we first explored the fundamental principles on how to employ dynamic voltage scaling (DVS) techniques to reduce the peak operating temperature when running a real-time application on a single core platform. We further proposed a novel real-time scheduling method, “M-Oscillations” to reduce the peak temperature when scheduling a hard real-time periodic task set. We also developed three checking methods to guarantee the feasibility of a periodic real-time schedule under peak temperature constraint. We further extended our research from single core platform to multi-core platform. We investigated the energy estimation problem on the multi-core platforms and developed a light weight and accurate method to calculate the energy consumption for a given voltage schedule on a multi-core platform. Finally, we concluded the dissertation with elaborated discussions of future extensions of our research. ^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In a post-Cold War, post-9/11 world, the advent of US global supremacy resulted in the installation, perpetuation, and dissemination of an Absolutist Security Agenda (hereinafter, ASA). The US ASA explicitly and aggressively articulates and equates US national security interests with the security of all states in the international system, and replaced the bipolar, Cold War framework that defined international affairs from 1945-1992. Since the collapse of the USSR and the 11 September 2001 terrorist attacks, the US has unilaterally defined, implemented, and managed systemic security policy. The US ASA is indicative of a systemic category of knowledge (security) anchored in variegated conceptual and material components, such as morality, philosophy, and political rubrics. The US ASA is based on a logic that involves the following security components: (1) hyper militarization, (2) intimidation,(3) coercion, (4) criminalization, (5) panoptic surveillance, (6) plenary security measures, and (7) unabashed US interference in the domestic affairs of select states. Such interference has produced destabilizing tensions and conflicts that have, in turn, produced resistance, revolutions, proliferation, cults of personality, and militarization. This is the case because the US ASA rests on the notion that the international system of states is an extension, instrument of US power, rather than a system and/or society of states comprised of functionally sovereign entities. To analyze the US ASA, this study utilizes: (1) official government statements, legal doctrines, treaties, and policies pertaining to US foreign policy; (2) militarization rationales, budgets, and expenditures; and (3) case studies of rogue states. The data used in this study are drawn from information that is publicly available (academic journals, think-tank publications, government publications, and information provided by international organizations). The data supports the contention that global security is effectuated via a discrete set of hegemonic/imperialistic US values and interests, finding empirical expression in legal acts (USA Patriot ACT 2001) and the concept of rogue states. Rogue states, therefore, provide test cases to clarify the breadth, depth, and consequentialness of the US ASA in world affairs vis-à-vis the relationship between US security and global security.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This deconstruction of employee engagement, power, and privilege was focused toward exploring four principal questions: (a) who controls the context of work, (b) who determines the experience of engagement, (c) who defines the value of engagement, and (d) who benefits from high levels of engagement? Because of the potential for privilege to influence the experience of engagement, the purpose of our work was to critically examine the construct of employee engagement as a privileged state

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In a post-Cold War, post-9/11 world, the advent of US global supremacy resulted in the installation, perpetuation, and dissemination of an Absolutist Security Agenda (hereinafter, ASA). The US ASA explicitly and aggressively articulates and equates US national security interests with the security of all states in the international system, and replaced the bipolar, Cold War framework that defined international affairs from 1945-1992. Since the collapse of the USSR and the 11 September 2001 terrorist attacks, the US has unilaterally defined, implemented, and managed systemic security policy. The US ASA is indicative of a systemic category of knowledge (security) anchored in variegated conceptual and material components, such as morality, philosophy, and political rubrics. The US ASA is based on a logic that involves the following security components: 1., hyper militarization, 2., intimidation, 3., coercion, 4., criminalization, 5., panoptic surveillance, 6., plenary security measures, and 7., unabashed US interference in the domestic affairs of select states. Such interference has produced destabilizing tensions and conflicts that have, in turn, produced resistance, revolutions, proliferation, cults of personality, and militarization. This is the case because the US ASA rests on the notion that the international system of states is an extension, instrument of US power, rather than a system and/or society of states comprised of functionally sovereign entities. To analyze the US ASA, this study utilizes: 1., official government statements, legal doctrines, treaties, and policies pertaining to US foreign policy; 2., militarization rationales, budgets, and expenditures; and 3., case studies of rogue states. The data used in this study are drawn from information that is publicly available (academic journals, think-tank publications, government publications, and information provided by international organizations). The data supports the contention that global security is effectuated via a discrete set of hegemonic/imperialistic US values and interests, finding empirical expression in legal acts (USA Patriot ACT 2001) and the concept of rogue states. Rogue states, therefore, provide test cases to clarify the breadth, depth, and consequentialness of the US ASA in world affairs vis-a-vis the relationship between US security and global security.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Catering to society’s demand for high performance computing, billions of transistors are now integrated on IC chips to deliver unprecedented performances. With increasing transistor density, the power consumption/density is growing exponentially. The increasing power consumption directly translates to the high chip temperature, which not only raises the packaging/cooling costs, but also degrades the performance/reliability and life span of the computing systems. Moreover, high chip temperature also greatly increases the leakage power consumption, which is becoming more and more significant with the continuous scaling of the transistor size. As the semiconductor industry continues to evolve, power and thermal challenges have become the most critical challenges in the design of new generations of computing systems. In this dissertation, we addressed the power/thermal issues from the system-level perspective. Specifically, we sought to employ real-time scheduling methods to optimize the power/thermal efficiency of the real-time computing systems, with leakage/ temperature dependency taken into consideration. In our research, we first explored the fundamental principles on how to employ dynamic voltage scaling (DVS) techniques to reduce the peak operating temperature when running a real-time application on a single core platform. We further proposed a novel real-time scheduling method, “M-Oscillations” to reduce the peak temperature when scheduling a hard real-time periodic task set. We also developed three checking methods to guarantee the feasibility of a periodic real-time schedule under peak temperature constraint. We further extended our research from single core platform to multi-core platform. We investigated the energy estimation problem on the multi-core platforms and developed a light weight and accurate method to calculate the energy consumption for a given voltage schedule on a multi-core platform. Finally, we concluded the dissertation with elaborated discussions of future extensions of our research.