17 resultados para contention

em Digital Commons at Florida International University


Relevância:

20.00% 20.00%

Publicador:

Resumo:

On the night of April 20, 2010, a group of students from the University of Puerto Rico (UPR), Río Piedras campus, met to organize an indefinite strike that quickly broadened into a defense of accessible public higher education of excellence as a fundamental right and not a privilege. Although the history of student activism in the UPR can be traced back to the early 1900s, the 2010-2011 strike will be remembered for the student activistsâ use of new media technologies as resources that rapidly prompted and aided the numerous protests. This activist research entailed a critical ethnography and a critical discourse analysis (CDA) of traditional and alternative media coverage and treatment during the 2010 -2011 UPR student strike. I examined the use of the 2010-2011 UPR student activistsâ resistance performances in constructing local, corporeal, and virtual spaces of resistance and contention during their movement. In particular, I analyzed the different tactics and strategies of resistance or repertoire of collective actions that student activists used (e.g. new media technologies) to frame their collective identities via alternative news mediaâs (re)presentation of the strike, while juxtaposing the university administrationâs counter-resistance performances in counter-framing the student activistsâ collective identity via traditional news media representations of the strike. I illustrated how both traditional and alternative media (re)presentations of student activism developed, maintained, and/or modified students activistsâ collective identities. As such, the UPR student activismâs success should not be measured by the sum of demands granted, but by the sense of community achieved and the establishment of networks that continue to create resistance and change. These networks add to the debate surrounding Internet activism and its impact on student activism. Ultimately, the results of this study highlight the important role student movements have had in challenging different types of government policies and raising awareness of the importance of an accessible public higher education of excellence.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

On the night of April 20, 2010, a group of students from the University of Puerto Rico (UPR), Río Piedras campus, met to organize an indefinite strike that quickly broadened into a defense of accessible public higher education of excellence as a fundamental right and not a privilege. Although the history of student activism in the UPR can be traced back to the early 1900s, the 2010-2011 strike will be remembered for the student activistsâ use of new media technologies as resources that rapidly prompted and aided the numerous protests. ^ This activist research entailed a critical ethnography and a critical discourse analysis (CDA) of traditional and alternative media coverage and treatment during the 2010 -2011 UPR student strike. I examined the use of the 2010-2011 UPR student activistsâ resistance performances in constructing local, corporeal, and virtual spaces of resistance and contention during their movement. In particular, I analyzed the different tactics and strategies of resistance or repertoire of collective actions that student activists used (e.g. new media technologies) to frame their collective identities via alternative news mediaâs (re)presentation of the strike, while juxtaposing the university administrationâs counter-resistance performances in counter-framing the student activistsâ collective identity via traditional news media representations of the strike. I illustrated how both traditional and alternative media (re)presentations of student activism developed, maintained, and/or modified students activistsâ collective identities. ^ As such, the UPR student activismâs success should not be measured by the sum of demands granted, but by the sense of community achieved and the establishment of networks that continue to create resistance and change. These networks add to the debate surrounding Internet activism and its impact on student activism. Ultimately, the results of this study highlight the important role student movements have had in challenging different types of government policies and raising awareness of the importance of an accessible public higher education of excellence.^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The effect of teaching method in physical education is an important issue and has been a concern of the expert teacher. Teachers are expected to create a model of teaching in their field; therefore, it is reasonable to question what is the effect of an alternative teaching method on student performance in physical education. This study explores whether teaching methods with advanced planning, behavior and belief in high enthusiasm, use of instructional strategies and evaluation, together termed a systematic teaching approach, used in a physical education activity would provide an effective environment for learning which supports student achievement in the psychomotor, cognitive, and affective domains. This study also investigated whether there was a difference in performance between students who were taught with a systematic teaching approach and students who were taught with the traditional teaching model. Information was collected using two performance skills, a written test, and one questionnaire. The 68 participants were randomly assigned into either an experimental group or a control group. Two teachers were assigned to either the experimental group or the control group. The teaching experiment took place at Tamsui Oxford University College in Taiwan and lasted eight weeks. ^ Research questions were analyzed using the t-test. Results indicated that a significant difference in students' performance was found between the experimental group and the control group on both the skill tests and the paper test. Analysis of student attitude toward their teacher and their course on the questionnaire indicated a significant difference between the experimental group and the control group. ^ The findings of this study imply that students who were taught with a systematic teaching style were significantly superior to students who were taught with the traditional model on these measures. This finding supports the contention that effective teaching in physical education is related to advanced planning, high enthusiasm, instructional strategy and evaluation and that all physical education teachers should implement these planning elements in the development of the teaching strategies. ^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of this study was to determine which factors predicted maladaptive outcomes in sexually abused children. Key factors were aggregated into four categories: abuse characteristics risk factors, individual-level risk factors, family disruption risk factors, and social disruption risk factors. It was hypothesized that (a) individual-level risk factors (e.g., school performance, child alcohol/substance abuse) and (b) abuse characteristics risk factors (e.g., longer duration/frequency of abuse, use of force/threats of force, intrafamilial abuse) would predict higher levels of trauma symptoms. Furthermore, it was hypothesized that (a) family disruption risk factors (e.g., family alcohol/substance use, family psychopathology) and (b) social disruption risk factors (e.g., parental divorce, homelessness, witnessing homicide or violence) would moderate the impact of prior sexual abuse and predict higher levels of trauma symptoms. ^ The participants were 110 female children (5 to 18 years old) presenting for treatment for sexual abuse at a community agency (The Journey Institute) in Miami, Florida. This study conducted a retrospective analysis of an archival data set collected over a three-year period (1998â2001). The measures completed upon intake included The Journey Psychosocial Assessment and The Trauma Symptom Checklist for Children (TSCC; Briere, 1996). Using Pearson correlations and hierarchical multiple regression analysis, this study found that abuse characteristics risk factors and individual-level risk factors were predictive of maladaptive outcomes in this sample of sexually abused girls. However, no moderating effects were found for family disruption risk factors or social disruption risk factors. Therefore, the results of these analyses provided support for the contention that abuse characteristics and individual-level risk factors were appropriate targets for treatment for sexually abused girls. Moreover, limitations of this study, implications for treatment, and directions for future research were discussed. ^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The tragic events of September 11th ushered a new era of unprecedented challenges. Our nation has to be protected from the alarming threats of adversaries. These threats exploit the nation's critical infrastructures affecting all sectors of the economy. There is the need for pervasive monitoring and decentralized control of the nation's critical infrastructures. The communications needs of monitoring and control of critical infrastructures was traditionally catered for by wired communication systems. These technologies ensured high reliability and bandwidth but are however very expensive, inflexible and do not support mobility and pervasive monitoring. The communication protocols are Ethernet-based that used contention access protocols which results in high unsuccessful transmission and delay. An emerging class of wireless networks, named embedded wireless sensor and actuator networks has potential benefits for real-time monitoring and control of critical infrastructures. The use of embedded wireless networks for monitoring and control of critical infrastructures requires secure, reliable and timely exchange of information among controllers, distributed sensors and actuators. The exchange of information is over shared wireless media. However, wireless media is highly unpredictable due to path loss, shadow fading and ambient noise. Monitoring and control applications have stringent requirements on reliability, delay and security. The primary issue addressed in this dissertation is the impact of wireless media in harsh industrial environment on the reliable and timely delivery of critical data. In the first part of the dissertation, a combined networking and information theoretic approach was adopted to determine the transmit power required to maintain a minimum wireless channel capacity for reliable data transmission. The second part described a channel-aware scheduling scheme that ensured efficient utilization of the wireless link and guaranteed delay. Various analytical evaluations and simulations are used to evaluate and validate the feasibility of the methodologies and demonstrate that the protocols achieved reliable and real-time data delivery in wireless industrial networks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Exchange rate economics has achieved substantial development in the past few decades. Despite extensive research, a large number of unresolved problems remain in the exchange rate debate. This dissertation studied three puzzling issues aiming to improve our understanding of exchange rate behavior. Chapter Two used advanced econometric techniques to model and forecast exchange rate dynamics. Chapter Three and Chapter Four studied issues related to exchange rates using the theory of New Open Economy Macroeconomics. ^ Chapter Two empirically examined the short-run forecastability of nominal exchange rates. It analyzed important empirical regularities in daily exchange rates. Through a series of hypothesis tests, a best-fitting fractionally integrated GARCH model with skewed student-t error distribution was identified. The forecasting performance of the model was compared with that of a random walk model. Results supported the contention that nominal exchange rates seem to be unpredictable over the short run in the sense that the best-fitting model cannot beat the random walk model in forecasting exchange rate movements. ^ Chapter Three assessed the ability of dynamic general-equilibrium sticky-price monetary models to generate volatile foreign exchange risk premia. It developed a tractable two-country model where agents face a cash-in-advance constraint and set prices to the local market; the exogenous money supply process exhibits time-varying volatility. The model yielded approximate closed form solutions for risk premia and real exchange rates. Numerical results provided quantitative evidence that volatile risk premia can endogenously arise in a new open economy macroeconomic model. Thus, the model had potential to rationalize the Uncovered Interest Parity Puzzle. ^ Chapter Four sought to resolve the consumption-real exchange rate anomaly, which refers to the inability of most international macro models to generate negative cross-correlations between real exchange rates and relative consumption across two countries as observed in the data. While maintaining the assumption of complete asset markets, this chapter introduced endogenously segmented asset markets into a dynamic sticky-price monetary model. Simulation results showed that such a model could replicate the stylized fact that real exchange rates tend to move in an opposite direction with respect to relative consumption. ^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this dissertation, I investigate three related topics on asset pricing: the consumption-based asset pricing under long-run risks and fat tails, the pricing of VIX (CBOE Volatility Index) options and the market price of risk embedded in stock returns and stock options. These three topics are fully explored in Chapter II through IV. Chapter V summarizes the main conclusions. In Chapter II, I explore the effects of fat tails on the equilibrium implications of the long run risks model of asset pricing by introducing innovations with dampened power law to consumption and dividends growth processes. I estimate the structural parameters of the proposed model by maximum likelihood. I find that the stochastic volatility model with fat tails can, without resorting to high risk aversion, generate implied risk premium, expected risk free rate and their volatilities comparable to the magnitudes observed in data. In Chapter III, I examine the pricing performance of VIX option models. The contention that simpler-is-better is supported by the empirical evidence using actual VIX option market data. I find that no model has small pricing errors over the entire range of strike prices and times to expiration. In general, Whaleyâs Black-like option model produces the best overall results, supporting the simpler-is-better contention. However, the Whaley model does under/overprice out-of-the-money call/put VIX options, which is contrary to the behavior of stock index option pricing models. In Chapter IV, I explore risk pricing through a model of time-changed Lvy processes based on the joint evidence from individual stock options and underlying stocks. I specify a pricing kernel that prices idiosyncratic and systematic risks. This approach to examining risk premia on stocks deviates from existing studies. The empirical results show that the market pays positive premia for idiosyncratic and market jump-diffusion risk, and idiosyncratic volatility risk. However, there is no consensus on the premium for market volatility risk. It can be positive or negative. The positive premium on idiosyncratic risk runs contrary to the implications of traditional capital asset pricing theory.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Memory (cache, DRAM, and disk) is in charge of providing data and instructions to a computer's processor. In order to maximize performance, the speeds of the memory and the processor should be equal. However, using memory that always match the speed of the processor is prohibitively expensive. Computer hardware designers have managed to drastically lower the cost of the system with the use of memory caches by sacrificing some performance. A cache is a small piece of fast memory that stores popular data so it can be accessed faster. Modern computers have evolved into a hierarchy of caches, where a memory level is the cache for a larger and slower memory level immediately below it. Thus, by using caches, manufacturers are able to store terabytes of data at the cost of cheapest memory while achieving speeds close to the speed of the fastest one.^ The most important decision about managing a cache is what data to store in it. Failing to make good decisions can lead to performance overheads and over-provisioning. Surprisingly, caches choose data to store based on policies that have not changed in principle for decades. However, computing paradigms have changed radically leading to two noticeably different trends. First, caches are now consolidated across hundreds to even thousands of processes. And second, caching is being employed at new levels of the storage hierarchy due to the availability of high-performance flash-based persistent media. This brings four problems. First, as the workloads sharing a cache increase, it is more likely that they contain duplicated data. Second, consolidation creates contention for caches, and if not managed carefully, it translates to wasted space and sub-optimal performance. Third, as contented caches are shared by more workloads, administrators need to carefully estimate specific per-workload requirements across the entire memory hierarchy in order to meet per-workload performance goals. And finally, current cache write policies are unable to simultaneously provide performance and consistency guarantees for the new levels of the storage hierarchy.^ We addressed these problems by modeling their impact and by proposing solutions for each of them. First, we measured and modeled the amount of duplication at the buffer cache level and contention in real production systems. Second, we created a unified model of workload cache usage under contention to be used by administrators for provisioning, or by process schedulers to decide what processes to run together. Third, we proposed methods for removing cache duplication and to eliminate wasted space because of contention for space. And finally, we proposed a technique to improve the consistency guarantees of write-back caches while preserving their performance benefits.^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The rapid growth of virtualized data centers and cloud hosting services is making the management of physical resources such as CPU, memory, and I/O bandwidth in data center servers increasingly important. Server management now involves dealing with multiple dissimilar applications with varying Service-Level-Agreements (SLAs) and multiple resource dimensions. The multiplicity and diversity of resources and applications are rendering administrative tasks more complex and challenging. This thesis aimed to develop a framework and techniques that would help substantially reduce data center management complexity.^ We specifically addressed two crucial data center operations. First, we precisely estimated capacity requirements of client virtual machines (VMs) while renting server space in cloud environment. Second, we proposed a systematic process to efficiently allocate physical resources to hosted VMs in a data center. To realize these dual objectives, accurately capturing the effects of resource allocations on application performance is vital. The benefits of accurate application performance modeling are multifold. Cloud users can size their VMs appropriately and pay only for the resources that they need; service providers can also offer a new charging model based on the VMs performance instead of their configured sizes. As a result, clients will pay exactly for the performance they are actually experiencing; on the other hand, administrators will be able to maximize their total revenue by utilizing application performance models and SLAs. ^ This thesis made the following contributions. First, we identified resource control parameters crucial for distributing physical resources and characterizing contention for virtualized applications in a shared hosting environment. Second, we explored several modeling techniques and confirmed the suitability of two machine learning tools, Artificial Neural Network and Support Vector Machine, to accurately model the performance of virtualized applications. Moreover, we suggested and evaluated modeling optimizations necessary to improve prediction accuracy when using these modeling tools. Third, we presented an approach to optimal VM sizing by employing the performance models we created. Finally, we proposed a revenue-driven resource allocation algorithm which maximizes the SLA-generated revenue for a data center.^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In a post-Cold War, post-9/11 world, the advent of US global supremacy resulted in the installation, perpetuation, and dissemination of an Absolutist Security Agenda (hereinafter, ASA). The US ASA explicitly and aggressively articulates and equates US national security interests with the security of all states in the international system, and replaced the bipolar, Cold War framework that defined international affairs from 1945-1992. Since the collapse of the USSR and the 11 September 2001 terrorist attacks, the US has unilaterally defined, implemented, and managed systemic security policy. The US ASA is indicative of a systemic category of knowledge (security) anchored in variegated conceptual and material components, such as morality, philosophy, and political rubrics. The US ASA is based on a logic that involves the following security components: (1) hyper militarization, (2) intimidation,(3) coercion, (4) criminalization, (5) panoptic surveillance, (6) plenary security measures, and (7) unabashed US interference in the domestic affairs of select states. Such interference has produced destabilizing tensions and conflicts that have, in turn, produced resistance, revolutions, proliferation, cults of personality, and militarization. This is the case because the US ASA rests on the notion that the international system of states is an extension, instrument of US power, rather than a system and/or society of states comprised of functionally sovereign entities. To analyze the US ASA, this study utilizes: (1) official government statements, legal doctrines, treaties, and policies pertaining to US foreign policy; (2) militarization rationales, budgets, and expenditures; and (3) case studies of rogue states. The data used in this study are drawn from information that is publicly available (academic journals, think-tank publications, government publications, and information provided by international organizations). The data supports the contention that global security is effectuated via a discrete set of hegemonic/imperialistic US values and interests, finding empirical expression in legal acts (USA Patriot ACT 2001) and the concept of rogue states. Rogue states, therefore, provide test cases to clarify the breadth, depth, and consequentialness of the US ASA in world affairs vis-à-vis the relationship between US security and global security.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

New labor movements are currently emerging across the Global South. This is happening in countries as disparate as China, Egypt, and Iran. New developments are taking place within labor movements in places such as Colombia, Indonesia, Iraq, Mexico, Pakistan and Venezuela. Activists and leaders in these labor movements are seeking information from workers and unions around the world. However, many labor activists today know little or nothing about the last period of intense efforts to build international labor solidarity, the years 1978-2007. One of the key labor movements of this period, and which continues today, is the KMU Labor Center of the Philippines. It is this authorâs contention that there is a lot unknown about the KMU that would help advance global labor solidarity today. This paper focuses specifically on the KMUâs development, and shares five things that have emerged from this authorâs study of the KMU: a new type of trade unionism, new union organizations, an emphasis on rank and file education, building relations with sectoral organizations, and the need to build international labor solidarity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Exchange rate economics has achieved substantial development in the past few decades. Despite extensive research, a large number of unresolved problems remain in the exchange rate debate. This dissertation studied three puzzling issues aiming to improve our understanding of exchange rate behavior. Chapter Two used advanced econometric techniques to model and forecast exchange rate dynamics. Chapter Three and Chapter Four studied issues related to exchange rates using the theory of New Open Economy Macroeconomics. Chapter Two empirically examined the short-run forecastability of nominal exchange rates. It analyzed important empirical regularities in daily exchange rates. Through a series of hypothesis tests, a best-fitting fractionally integrated GARCH model with skewed student-t error distribution was identified. The forecasting performance of the model was compared with that of a random walk model. Results supported the contention that nominal exchange rates seem to be unpredictable over the short run in the sense that the best-fitting model cannot beat the random walk model in forecasting exchange rate movements. Chapter Three assessed the ability of dynamic general-equilibrium sticky-price monetary models to generate volatile foreign exchange risk premia. It developed a tractable two-country model where agents face a cash-in-advance constraint and set prices to the local market; the exogenous money supply process exhibits time-varying volatility. The model yielded approximate closed form solutions for risk premia and real exchange rates. Numerical results provided quantitative evidence that volatile risk premia can endogenously arise in a new open economy macroeconomic model. Thus, the model had potential to rationalize the Uncovered Interest Parity Puzzle. Chapter Four sought to resolve the consumption-real exchange rate anomaly, which refers to the inability of most international macro models to generate negative cross-correlations between real exchange rates and relative consumption across two countries as observed in the data. While maintaining the assumption of complete asset markets, this chapter introduced endogenously segmented asset markets into a dynamic sticky-price monetary model. Simulation results showed that such a model could replicate the stylized fact that real exchange rates tend to move in an opposite direction with respect to relative consumption.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis studies the historic encounter between United States Navy airship K-74 and Nazi submarine U-134 in World War II. The Battle of the Atlantic is examined through case study of this one U-boat and its voyage. In all things except her fight with the American blimp, the patrol was perfectly typical. Looked at from start to finish, both her reports and the reports of the Allies encountered, many realities of the war can be studied. U-134 sailed to attack shipping between Florida and Cuba. She was challenged by the attack of United States Navy airship K-74 over the Florida Straits. It is the only documented instance of battle between two such combatants in history. That merits attention. Thesis finding disprove historian William Eliot Morisonâs contention that the K-74 airship bombs were not dropped and did not damage the U-boat. Study of this U-boat and its antagonist broadens our understanding of the Battle of the Atlantic. It is a contribution to our knowledge of military, naval, aviation, and local history.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this dissertation, I investigate three related topics on asset pricing: the consumption-based asset pricing under long-run risks and fat tails, the pricing of VIX (CBOE Volatility Index) options and the market price of risk embedded in stock returns and stock options. These three topics are fully explored in Chapter II through IV. Chapter V summarizes the main conclusions. In Chapter II, I explore the effects of fat tails on the equilibrium implications of the long run risks model of asset pricing by introducing innovations with dampened power law to consumption and dividends growth processes. I estimate the structural parameters of the proposed model by maximum likelihood. I find that the stochastic volatility model with fat tails can, without resorting to high risk aversion, generate implied risk premium, expected risk free rate and their volatilities comparable to the magnitudes observed in data. In Chapter III, I examine the pricing performance of VIX option models. The contention that simpler-is-better is supported by the empirical evidence using actual VIX option market data. I find that no model has small pricing errors over the entire range of strike prices and times to expiration. In general, Whaleyâs Black-like option model produces the best overall results, supporting the simpler-is-better contention. However, the Whaley model does under/overprice out-of-the-money call/put VIX options, which is contrary to the behavior of stock index option pricing models. In Chapter IV, I explore risk pricing through a model of time-changed Lévy processes based on the joint evidence from individual stock options and underlying stocks. I specify a pricing kernel that prices idiosyncratic and systematic risks. This approach to examining risk premia on stocks deviates from existing studies. The empirical results show that the market pays positive premia for idiosyncratic and market jump-diffusion risk, and idiosyncratic volatility risk. However, there is no consensus on the premium for market volatility risk. It can be positive or negative. The positive premium on idiosyncratic risk runs contrary to the implications of traditional capital asset pricing theory.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis examines the involvement of the United States in the decade-long trade dispute before the World Trade Organization (WTO) over the European Union's preferential banana regime. Washington's justification for bringing this case to the WTO comes from Section 301 of the U.S. trade act, which allows for disputes to be undertaken if U.S. "interests" are violated; however, this is the first case ever undertaken by the United States that does not directly threaten any American banana industry, nor affect any American jobs. Why, then, would the United States involve itself in this European-Caribbean-Latin American dispute? It is the contention of this thesis that the United States thrust itself headlong into this debate for two reasons: domestically, the United States Trade Representative came under pressure, via the White House and Congress, from Chiquita CEO Carl Lindner, who in the past decade donated more than $7.1 million to American politicians to take the case to the WTO. Internationally, the United States used the case as an opportunity to assert its power over Europe, with the Eastern Caribbean islands being caught in the economic crossfire. According to existing literature, in undertaking this case, the United States did as any nation would: it operated within both domestic and international levels, satisfying at each level key interests, with the overall goal of maintaining the nation's best interests.