352 resultados para contention


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Government agencies use information technology extensively to collect business data for regulatory purposes. Data communication standards form part of the infrastructure with which businesses must conform to survive. We examine the development of, and emerging competition between, two open business reporting data standards adopted by government bodies in France; EDIFACT (incumbent) and XBRL (challenger). The research explores whether an incumbent may be displaced in a setting in which the contention is unresolved. We apply Latours (1992) translation map to trace the enrolments and detours in the battle. We find that regulators play an important role as allies in the development of the standards. The antecedent networks in which the standards are located embed strong beliefs that become barriers to collaboration and fuel the battle. One of the key differentiating attitudes is whether speed is more important than legitimacy. The failure of collaboration encourages competition. The newness of XBRLs technology just as regulators need to respond to an economic crisis and its adoption by French regulators not using EDIFACT create an opportunity for the challenger to make significant network gains over the longer term. ANT also highlights the importance of the preservation of key components of EDIFACT in ebXML.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper considers the agency of children moving to the streets of Accra, Ghana's capital city. A much used but largely unexamined concept, agency is nevertheless commonly deployed in childhood studies as a means to stress the capacity of children to choose to do things. In the literature on street and working children, and a cognate area of study concerned with children's independent migration, this has involved accounts of children's agency made meaningful by reference to theories of rational choice or to the normative force of childhood. It is our argument that both approaches leave unanswered important questions and to counter these omissions we draw upon the arguments of social realists and, in particular, the stress they place on vulnerability as the basis for human agency. We develop this argument further by reference to our research with street children. By drawing upon the children's accounts of leaving their households and heading for Accra's streets, it is our contention that these children do frame their departures as matters of individual choice and self-determination, and that in doing so they speak of a considerable capacity for action. Nevertheless, a deeper reading of their testimonies also points to the children's understandings of their own vulnerability. By examining what we see as their inability to be dependent upon family and kin, we stress the importance of the children's perceptions of their vulnerability, frailty and need as the basis for a fuller understanding of their agency in leaving their households. 2013 The Author. The Sociological Review 2013 The Editorial Board of The Sociological Review.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Los discursos tericos de la actualidad conciben la traduccin como un acto ideolgico de mediacin intercultural. De este modo, rechazan la supuesta neutralidad y fidelidad al texto original o a la intencin autorial de antao, subvirtiendo al mismo tiempo la tradicional jerarqua entre original y traduccin. Sin embargo, en el presente artculo sostengo que estos discursos tericos por lo general desatienden otras relaciones de poder jerrquicas que afectan a la traduccin situndola en una posicin de inferioridad respecto a la paratraduccin (Garrido Vilario 2005), definida sta como un acto de mediacin por el cual se decide la presentacin final del libro traducido en la sociedad meta. Para ilustrar las implicaciones de esta nueva jerarqua recurro al conflicto ideolgico originado a partir de la traduccin y paratraduccin del gnero en dos reescrituras en gallego de la novela de Mark Haddon The Curious Incident of the Dog in the Night-Time. Current theoretical debates on Translation Studies define translation as an ideological act of intercultural mediation. In this way, notions such as neutrality or fidelity to the original text or to the authors intent prove untenable, challenging the traditional hierarchy between the original text and its translation. However, it is my contention that these theoretical discourses tend to disregard other hierarchical power relationships that also affect translation, placing it in a position of inferiority against paratranslation (Garrido Vilario 2005), the latter being an activity that determines crucially the final presentation of the translated book in the target society. I will illustrate the implications of this new hierarchy through an analysis of the ideological struggle that emerged from the translation and paratranslation of gender in two rewritings into Galician of the book The Curious Incident of the Dog in the Night-Time, by Mark Haddon.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Within the newly established field of Galician Studies, Feminist Theory has played a major role in revealing how women have contributed to the development of the Galician cultural polysystem. However, it is my contention that the translative facet of many women translators has not yet received enough critical attention. Therefore, within the framework of a growing interest in the roles played both by women and by translation in the development of societies, this article seeks to explore the history of translation in the context of Galicia, with a view to underscoring the contributions of women translators throughout the 20th century. The aim of the article is twofold: firstly, to offer an overview of translators such as Mercedes Vzquez Fernndez Pimentel, Mari Luz Morales, Teruca Bouza Vila, Mara Barbeito, Amparo Alvajar, Xohana Torres, and Teresa Barro, in order to open up new areas for research so that subsequent studies can further examine their contributions in more depth. Secondly, it seeks to analyse the power relations which inform the activity of translation both from a gender and national approach.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper considers the lives of children living in a large informal settlement in central Accra, Ghana. Its contention is that children remain largely absent from the renewal of interest in slums and that where they do feature it is largely as objects of risk and vulnerability. Such an exclusive focus, it is argued, risks effacing the ways in which children are capable of actively confronting the terrible constraints posed by slum environments and the 'talent for living' that this involves. Drawing upon the findings of a small qualitative exploratory research project, the paper examines sources of support and cooperation between children and how their decisions to work are perceived as a strategy to actively support mothers and families struggling for a subsistence. 2011 The Author(s). Children and Society 2011 National Children's Bureau and Blackwell Publishing Limited.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Unhealthy core beliefs are theorized to be stable constructs throughout the life-span, but no research to date, outside of the context of clinical intervention, has addressed this claim over a period of greater than 6 weeks. This study explores the stability and continuity of core beliefs and psychopathological symptoms in a group of women over a major life event and for 1 year subsequently. Eighty-seven women completed measures assessing their core beliefs and psychopathological symptoms during pregnancy and at 6 and 12 months after giving birth. General maternal psychopathological symptoms significantly decreased across the group between pregnancy and 6 months postpartum, and between pregnancy and 1 year, but showed evidence of stability in the ranks of individuals across time. The majority of core beliefs remained both stable and continuous throughout this period of major transition. These findings generally support the theoretical contention that core beliefs are relatively stable and continuous self-constructs. Science+Business Media, LLC.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper considers the contemporary use of focus groups as a method of data collection within qualitative research settings. The authors draw upon their own experiences of using focus groups in educational and 'community' user-group environments in order to provide an overview of recent issues and debates surrounding the deployment of focus group methods and to pick out specific areas of contention in relation to both their epistemological and practical implications. Accordingly, the paper reflects on some of the realities of 'doing' focus groups whilst, at the same time, highlighting common problems and dilemmas which beginning researchers might encounter in their application. In turn, the paper raises a number of related issues around which there appears to have been a lack of academic discussion to date.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article examines the ways in which invalidated electoral ballots may be articulated as acts of protest. We argue that some instances of ballot invalidation can be understood as protest and as a reaction to the broader crises of democracy which have also spurred on movements such as Occupy. We focus on Serbias 2012 elections as a case study, given the high increases in invalid ballots and calls for collective action calling for ballot invalidation. We discuss protest movements which coalesced around this election, calling for electoral ballot invalidation and using social media to frame this activity as protest. Through our case study, we explore the ways in which the ballot can become a tool of contention, and how protest can be expressed through an engagement with extant structures and institutions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper introduces a joint load balancing and hotspot mitigation protocol for mobile ad-hoc network (MANET) termed by us as 'load_energy balance + hotspot mitigation protocol (LEB+HM)'. We argue that although ad-hoc wireless networks have limited network resources - bandwidth and power, prone to frequent link/node failures and have high security risk; existing ad hoc routing protocols do not put emphasis on maintaining robust link/node, efficient use of network resources and on maintaining the security of the network. Typical route selection metrics used by existing ad hoc routing protocols are shortest hop, shortest delay, and loop avoidance. These routing philosophy have the tendency to cause traffic concentration on certain regions or nodes, leading to heavy contention, congestion and resource exhaustion which in turn may result in increased end-to-end delay, packet loss and faster battery power depletion, degrading the overall performance of the network. Also in most existing on-demand ad hoc routing protocols intermediate nodes are allowed to send route reply RREP to source in response to a route request RREQ. In such situation a malicious node can send a false optimal route to the source so that data packets sent will be directed to or through it, and tamper with them as wish. It is therefore desirable to adopt routing schemes which can dynamically disperse traffic load, able to detect and remove any possible bottlenecks and provide some form of security to the network. In this paper we propose a combine adaptive load_energy balancing and hotspot mitigation scheme that aims at evenly distributing network traffic load and energy, mitigate against any possible occurrence of hotspot and provide some form of security to the network. This combine approach is expected to yield high reliability, availability and robustness, that best suits any dynamic and scalable ad hoc network environment. Dynamic source routing (DSR) was use as our underlying protocol for the implementation of our algorithm. Simulation comparison of our protocol to that of original DSR shows that our protocol has reduced node/link failure, even distribution of battery energy, and better network service efficiency.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Market mechanisms are a means by which resources in contention can be allocated between contending parties, both in human economies and those populated by software agents. Designing such mechanisms has traditionally been carried out by hand, and more recently by automation. Assessing these mechanisms typically involves them being evaluated with respect to multiple conflicting objectives, which can often be nonlinear, noisy, and expensive to compute. For typical performance objectives, it is known that designed mechanisms often fall short on being optimal across all objectives simultaneously. However, in all previous automated approaches, either only a single objective is considered, or else the multiple performance objectives are combined into a single objective. In this paper we do not aggregate objectives, instead considering a direct, novel application of multi-objective evolutionary algorithms (MOEAs) to the problem of automated mechanism design. This allows the automatic discovery of trade-offs that such objectives impose on mechanisms. We pose the problem of mechanism design, specifically for the class of linear redistribution mechanisms, as a naturally existing multi-objective optimisation problem. We apply a modified version of NSGA-II in order to design mechanisms within this class, given economically relevant objectives such as welfare and fairness. This application of NSGA-II exposes tradeoffs between objectives, revealing relationships between them that were otherwise unknown for this mechanism class. The understanding of the trade-off gained from the application of MOEAs can thus help practitioners with an insightful application of discovered mechanisms in their respective real/artificial markets.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

IEEE 802.11 standard is the dominant technology for wireless local area networks (WLANs). In the last two decades, the Distributed coordination function (DCF) of IEEE 802.11 standard has become the one of the most important media access control (MAC) protocols for mobile ad hoc networks (MANETs). The DCF protocol can also be combined with cognitive radio, thus the IEEE 802.11 cognitive radio ad hoc networks (CRAHNs) come into being. There were several literatures which focus on the modeling of IEEE 802.11 CRAHNs, however, there is still no thorough and scalable analytical models for IEEE 802.11 CRAHNs whose cognitive node (i.e., secondary user, SU) has spectrum sensing and possible channel silence process before the MAC contention process. This paper develops a unified analytical model for IEEE 802.11 CRAHNs for comprehensive MAC layer queuing analysis. In the proposed model, the SUs are modeled by a hyper generalized 2D Markov chain model with an M/G/1/K model while the primary users (PUs) are modeled by a generalized 2D Markov chain and an M/G/1/K model. The performance evaluation results show that the quality-of-service (QoS) of both the PUs and SUs can be statistically guaranteed with the suitable settings of duration of channel sensing and silence phase in the case of under loading.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The effect of teaching method in physical education is an important issue and has been a concern of the expert teacher. Teachers are expected to create a model of teaching in their field; therefore, it is reasonable to question what is the effect of an alternative teaching method on student performance in physical education. This study explores whether teaching methods with advanced planning, behavior and belief in high enthusiasm, use of instructional strategies and evaluation, together termed a systematic teaching approach, used in a physical education activity would provide an effective environment for learning which supports student achievement in the psychomotor, cognitive, and affective domains. This study also investigated whether there was a difference in performance between students who were taught with a systematic teaching approach and students who were taught with the traditional teaching model. Information was collected using two performance skills, a written test, and one questionnaire. The 68 participants were randomly assigned into either an experimental group or a control group. Two teachers were assigned to either the experimental group or the control group. The teaching experiment took place at Tamsui Oxford University College in Taiwan and lasted eight weeks. ^ Research questions were analyzed using the t-test. Results indicated that a significant difference in students' performance was found between the experimental group and the control group on both the skill tests and the paper test. Analysis of student attitude toward their teacher and their course on the questionnaire indicated a significant difference between the experimental group and the control group. ^ The findings of this study imply that students who were taught with a systematic teaching style were significantly superior to students who were taught with the traditional model on these measures. This finding supports the contention that effective teaching in physical education is related to advanced planning, high enthusiasm, instructional strategy and evaluation and that all physical education teachers should implement these planning elements in the development of the teaching strategies. ^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of this study was to determine which factors predicted maladaptive outcomes in sexually abused children. Key factors were aggregated into four categories: abuse characteristics risk factors, individual-level risk factors, family disruption risk factors, and social disruption risk factors. It was hypothesized that (a) individual-level risk factors (e.g., school performance, child alcohol/substance abuse) and (b) abuse characteristics risk factors (e.g., longer duration/frequency of abuse, use of force/threats of force, intrafamilial abuse) would predict higher levels of trauma symptoms. Furthermore, it was hypothesized that (a) family disruption risk factors (e.g., family alcohol/substance use, family psychopathology) and (b) social disruption risk factors (e.g., parental divorce, homelessness, witnessing homicide or violence) would moderate the impact of prior sexual abuse and predict higher levels of trauma symptoms. ^ The participants were 110 female children (5 to 18 years old) presenting for treatment for sexual abuse at a community agency (The Journey Institute) in Miami, Florida. This study conducted a retrospective analysis of an archival data set collected over a three-year period (19982001). The measures completed upon intake included The Journey Psychosocial Assessment and The Trauma Symptom Checklist for Children (TSCC; Briere, 1996). Using Pearson correlations and hierarchical multiple regression analysis, this study found that abuse characteristics risk factors and individual-level risk factors were predictive of maladaptive outcomes in this sample of sexually abused girls. However, no moderating effects were found for family disruption risk factors or social disruption risk factors. Therefore, the results of these analyses provided support for the contention that abuse characteristics and individual-level risk factors were appropriate targets for treatment for sexually abused girls. Moreover, limitations of this study, implications for treatment, and directions for future research were discussed. ^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The tragic events of September 11th ushered a new era of unprecedented challenges. Our nation has to be protected from the alarming threats of adversaries. These threats exploit the nation's critical infrastructures affecting all sectors of the economy. There is the need for pervasive monitoring and decentralized control of the nation's critical infrastructures. The communications needs of monitoring and control of critical infrastructures was traditionally catered for by wired communication systems. These technologies ensured high reliability and bandwidth but are however very expensive, inflexible and do not support mobility and pervasive monitoring. The communication protocols are Ethernet-based that used contention access protocols which results in high unsuccessful transmission and delay. An emerging class of wireless networks, named embedded wireless sensor and actuator networks has potential benefits for real-time monitoring and control of critical infrastructures. The use of embedded wireless networks for monitoring and control of critical infrastructures requires secure, reliable and timely exchange of information among controllers, distributed sensors and actuators. The exchange of information is over shared wireless media. However, wireless media is highly unpredictable due to path loss, shadow fading and ambient noise. Monitoring and control applications have stringent requirements on reliability, delay and security. The primary issue addressed in this dissertation is the impact of wireless media in harsh industrial environment on the reliable and timely delivery of critical data. In the first part of the dissertation, a combined networking and information theoretic approach was adopted to determine the transmit power required to maintain a minimum wireless channel capacity for reliable data transmission. The second part described a channel-aware scheduling scheme that ensured efficient utilization of the wireless link and guaranteed delay. Various analytical evaluations and simulations are used to evaluate and validate the feasibility of the methodologies and demonstrate that the protocols achieved reliable and real-time data delivery in wireless industrial networks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Exchange rate economics has achieved substantial development in the past few decades. Despite extensive research, a large number of unresolved problems remain in the exchange rate debate. This dissertation studied three puzzling issues aiming to improve our understanding of exchange rate behavior. Chapter Two used advanced econometric techniques to model and forecast exchange rate dynamics. Chapter Three and Chapter Four studied issues related to exchange rates using the theory of New Open Economy Macroeconomics. ^ Chapter Two empirically examined the short-run forecastability of nominal exchange rates. It analyzed important empirical regularities in daily exchange rates. Through a series of hypothesis tests, a best-fitting fractionally integrated GARCH model with skewed student-t error distribution was identified. The forecasting performance of the model was compared with that of a random walk model. Results supported the contention that nominal exchange rates seem to be unpredictable over the short run in the sense that the best-fitting model cannot beat the random walk model in forecasting exchange rate movements. ^ Chapter Three assessed the ability of dynamic general-equilibrium sticky-price monetary models to generate volatile foreign exchange risk premia. It developed a tractable two-country model where agents face a cash-in-advance constraint and set prices to the local market; the exogenous money supply process exhibits time-varying volatility. The model yielded approximate closed form solutions for risk premia and real exchange rates. Numerical results provided quantitative evidence that volatile risk premia can endogenously arise in a new open economy macroeconomic model. Thus, the model had potential to rationalize the Uncovered Interest Parity Puzzle. ^ Chapter Four sought to resolve the consumption-real exchange rate anomaly, which refers to the inability of most international macro models to generate negative cross-correlations between real exchange rates and relative consumption across two countries as observed in the data. While maintaining the assumption of complete asset markets, this chapter introduced endogenously segmented asset markets into a dynamic sticky-price monetary model. Simulation results showed that such a model could replicate the stylized fact that real exchange rates tend to move in an opposite direction with respect to relative consumption. ^