841 resultados para power and authority
Resumo:
Limited literature exists on Ghana's child domestic servants, and researchers have found it difficult to locate and study these children. The research for this dissertation used qualitative research methodologies and non-probabilistic sampling techniques to make it possible to interview child domestic servants, their parents, employers and recruiters in Ghana. The findings from the qualitative analyses informed the second part of this study, which was quantitative and tested hypotheses using crosstabulations and logistic regression analyses that were based on survey data from the Ghana Statistical Service. Explanatory variables in the quantitative analyses included lineage, level of education and relationships to the household head. ^ This study located findings about the processes of children's recruitment into domestic servitude, their working conditions and methods of remuneration in theories of slavery to answer the question of whether or not child domestic servants are slaves. According to the findings, elite households in Ghana exploit children from rural regions because they have taken advantage of a historical practice that allowed children to live with older members of their extended families to provide domestic services and in return, be given the chance to receive formal education or to learn a trade. The participants in the qualitative part of this research described the treatments that they receive from their employers as slavery. Nevertheless, the processes of their recruitment and the age at which most of them accepted such job offers made it difficult to categorize a majority of them as contemporary slaves. ^
Resumo:
Higher education is a distribution center of knowledge and economic, social, and cultural power (Cervero & Wilson, 2001). A critical approach to understanding a higher education classroom begins with recognizing the instructor's position of power and authority (Tisdell, Hanley, & Taylor, 2000). The power instructors wield exists mostly unquestioned, allowing for teaching practices that reproduce the existing societal patterns of inequity in the classroom (Brookfield, 2000). ^ The purpose of this hermeneutic phenomenological study was to explore students' experiences with the power of their instructors in a higher education classroom. A hermeneutic phenomenological study intertwines the interpretations of both the participants and the researcher about a lived experience to uncover layers of meaning because the meanings of lived experiences are usually not readily apparent (van Manen, 1990). Fifteen participants were selected using criterion, convenience, and snowball sampling. The primary data gathering method were semi-structured interviews guided by an interview protocol (Creswell, 2003). Data were interpreted using thematic reflection (van Manen, 1990). ^ Three themes emerged from data interpretation: (a) structuring of instructor-student relationships, (b) connecting power to instructor personality, and (c) learning to navigate the terrains of higher education. How interpersonal relationships were structured in a higher education classroom shaped how students perceived power in that higher education classroom. Positive relationships were described using the metaphor of family and a perceived ethic of caring and nurturing by the instructor. As participants were consistently exposed to exercises of instructor power in a higher education classroom, they attributed those exercises of power to particular instructor traits rather than systemic exercises of power. As participants progressed from undergraduate to graduate studies, they perceived the benefits of expertise in content or knowledge development as secondary to expertise in successfully navigating the social, cultural, political, and interpersonal terrains of higher education. Ultimately, participants expressed that higher education is not about what you know; it is about learning how to play the game. Implications for teaching in higher education and considerations for future research conclude the study.^
Resumo:
Over the past few decades, we have been enjoying tremendous benefits thanks to the revolutionary advancement of computing systems, driven mainly by the remarkable semiconductor technology scaling and the increasingly complicated processor architecture. However, the exponentially increased transistor density has directly led to exponentially increased power consumption and dramatically elevated system temperature, which not only adversely impacts the system's cost, performance and reliability, but also increases the leakage and thus the overall power consumption. Today, the power and thermal issues have posed enormous challenges and threaten to slow down the continuous evolvement of computer technology. Effective power/thermal-aware design techniques are urgently demanded, at all design abstraction levels, from the circuit-level, the logic-level, to the architectural-level and the system-level. ^ In this dissertation, we present our research efforts to employ real-time scheduling techniques to solve the resource-constrained power/thermal-aware, design-optimization problems. In our research, we developed a set of simple yet accurate system-level models to capture the processor's thermal dynamic as well as the interdependency of leakage power consumption, temperature, and supply voltage. Based on these models, we investigated the fundamental principles in power/thermal-aware scheduling, and developed real-time scheduling techniques targeting at a variety of design objectives, including peak temperature minimization, overall energy reduction, and performance maximization. ^ The novelty of this work is that we integrate the cutting-edge research on power and thermal at the circuit and architectural-level into a set of accurate yet simplified system-level models, and are able to conduct system-level analysis and design based on these models. The theoretical study in this work serves as a solid foundation for the guidance of the power/thermal-aware scheduling algorithms development in practical computing systems.^
Resumo:
Context: While research suggests whole body vibration (WBV) positively affects measures of neuromuscular performance in athletes, researchers have yet to address appropriate and effective vibration protocols. Objective: To identify the acute effects of continuous and intermittent WBV on muscular power and agility in recreationally active females. Design: We used a randomized 3-period cross-over design to observe the effects of 3 vibration protocols on muscular power and agility. Setting: Sports Science and Medicine Research Laboratory at Florida International University. Patients or Other Participants: Eleven recreationally active female volunteers (age=24.4±5.7y; ht=166.0±10.3cm; mass=59.7±14.3kg). Interventions: Each session, subjects stood on the Galileo WBV platform (Orthometrix, White Plains, NY) and received one of three randomly assigned vibration protocols. Our independent variable was vibration length (continuous, intermittent, or no vibration). Main Outcome Measures: An investigator blinded to the vibration protocol measured muscular power and agility. We measured muscular power with heights of squat and countermovement jumps. We measured agility with the Illinois Agility Test. Results: Continuous WBV significantly increased SJ height from 97.9±7.6cm to 98.5±7.5cm (P=0.019, β=0.71, η2 =0.07) but not CMJ height [99.1±7.4cm pretest and 99.4±7.4cm posttest (P=0.167, β=0.27)] or agility [19.2±2.1s pretest and 19.0±2.1s posttest (P=0.232, β=0.21)]. Intermittent WBV significantly enhanced SJ height from 97.6±7.7cm to 98.5±7.7cm (P=0.017, β=0.71, η2 =0.11) and agility 19.4±2.2s to 19.0±2.1s (P=0.001, β=0.98, η2=0.16), but did not effect CMJ height [98.7±7.7cm pretest and 99.3±7.3cm posttest (P=0.058, β=0.49)]. Conclusion: Continuous WBV increased squat jump height, while intermittent vibration enhanced agility and squat jump height. Future research should continue investigating the effect of various vibration protocols on athletic performance.
Resumo:
In this paper, we examine Florida’s sixth-eighth grade geography standards to determine the potential for teaching critical geography, a field that interrogates space, place, power, and identity. While 57% of the standards demonstrated evidence of critical thinking, only six standards foster higher levels of critique consistent with critical geography.
Resumo:
Catering to society's demand for high performance computing, billions of transistors are now integrated on IC chips to deliver unprecedented performances. With increasing transistor density, the power consumption/density is growing exponentially. The increasing power consumption directly translates to the high chip temperature, which not only raises the packaging/cooling costs, but also degrades the performance/reliability and life span of the computing systems. Moreover, high chip temperature also greatly increases the leakage power consumption, which is becoming more and more significant with the continuous scaling of the transistor size. As the semiconductor industry continues to evolve, power and thermal challenges have become the most critical challenges in the design of new generations of computing systems. ^ In this dissertation, we addressed the power/thermal issues from the system-level perspective. Specifically, we sought to employ real-time scheduling methods to optimize the power/thermal efficiency of the real-time computing systems, with leakage/ temperature dependency taken into consideration. In our research, we first explored the fundamental principles on how to employ dynamic voltage scaling (DVS) techniques to reduce the peak operating temperature when running a real-time application on a single core platform. We further proposed a novel real-time scheduling method, “M-Oscillations” to reduce the peak temperature when scheduling a hard real-time periodic task set. We also developed three checking methods to guarantee the feasibility of a periodic real-time schedule under peak temperature constraint. We further extended our research from single core platform to multi-core platform. We investigated the energy estimation problem on the multi-core platforms and developed a light weight and accurate method to calculate the energy consumption for a given voltage schedule on a multi-core platform. Finally, we concluded the dissertation with elaborated discussions of future extensions of our research. ^
Resumo:
In a post-Cold War, post-9/11 world, the advent of US global supremacy resulted in the installation, perpetuation, and dissemination of an Absolutist Security Agenda (hereinafter, ASA). The US ASA explicitly and aggressively articulates and equates US national security interests with the security of all states in the international system, and replaced the bipolar, Cold War framework that defined international affairs from 1945-1992. Since the collapse of the USSR and the 11 September 2001 terrorist attacks, the US has unilaterally defined, implemented, and managed systemic security policy. The US ASA is indicative of a systemic category of knowledge (security) anchored in variegated conceptual and material components, such as morality, philosophy, and political rubrics. The US ASA is based on a logic that involves the following security components: (1) hyper militarization, (2) intimidation,(3) coercion, (4) criminalization, (5) panoptic surveillance, (6) plenary security measures, and (7) unabashed US interference in the domestic affairs of select states. Such interference has produced destabilizing tensions and conflicts that have, in turn, produced resistance, revolutions, proliferation, cults of personality, and militarization. This is the case because the US ASA rests on the notion that the international system of states is an extension, instrument of US power, rather than a system and/or society of states comprised of functionally sovereign entities. To analyze the US ASA, this study utilizes: (1) official government statements, legal doctrines, treaties, and policies pertaining to US foreign policy; (2) militarization rationales, budgets, and expenditures; and (3) case studies of rogue states. The data used in this study are drawn from information that is publicly available (academic journals, think-tank publications, government publications, and information provided by international organizations). The data supports the contention that global security is effectuated via a discrete set of hegemonic/imperialistic US values and interests, finding empirical expression in legal acts (USA Patriot ACT 2001) and the concept of rogue states. Rogue states, therefore, provide test cases to clarify the breadth, depth, and consequentialness of the US ASA in world affairs vis-à-vis the relationship between US security and global security.
Resumo:
This deconstruction of employee engagement, power, and privilege was focused toward exploring four principal questions: (a) who controls the context of work, (b) who determines the experience of engagement, (c) who defines the value of engagement, and (d) who benefits from high levels of engagement? Because of the potential for privilege to influence the experience of engagement, the purpose of our work was to critically examine the construct of employee engagement as a privileged state
Resumo:
In a post-Cold War, post-9/11 world, the advent of US global supremacy resulted in the installation, perpetuation, and dissemination of an Absolutist Security Agenda (hereinafter, ASA). The US ASA explicitly and aggressively articulates and equates US national security interests with the security of all states in the international system, and replaced the bipolar, Cold War framework that defined international affairs from 1945-1992. Since the collapse of the USSR and the 11 September 2001 terrorist attacks, the US has unilaterally defined, implemented, and managed systemic security policy. The US ASA is indicative of a systemic category of knowledge (security) anchored in variegated conceptual and material components, such as morality, philosophy, and political rubrics. The US ASA is based on a logic that involves the following security components: 1., hyper militarization, 2., intimidation, 3., coercion, 4., criminalization, 5., panoptic surveillance, 6., plenary security measures, and 7., unabashed US interference in the domestic affairs of select states. Such interference has produced destabilizing tensions and conflicts that have, in turn, produced resistance, revolutions, proliferation, cults of personality, and militarization. This is the case because the US ASA rests on the notion that the international system of states is an extension, instrument of US power, rather than a system and/or society of states comprised of functionally sovereign entities. To analyze the US ASA, this study utilizes: 1., official government statements, legal doctrines, treaties, and policies pertaining to US foreign policy; 2., militarization rationales, budgets, and expenditures; and 3., case studies of rogue states. The data used in this study are drawn from information that is publicly available (academic journals, think-tank publications, government publications, and information provided by international organizations). The data supports the contention that global security is effectuated via a discrete set of hegemonic/imperialistic US values and interests, finding empirical expression in legal acts (USA Patriot ACT 2001) and the concept of rogue states. Rogue states, therefore, provide test cases to clarify the breadth, depth, and consequentialness of the US ASA in world affairs vis-a-vis the relationship between US security and global security.
Resumo:
Winner of best paper award.
Resumo:
We present a theoretical description of the generation of ultra-short, high-energy pulses in two laser cavities driven by periodic spectral filtering or dispersion management. Critical in driving the intra-cavity dynamics is the nontrivial phase profiles generated and their periodic modification from either spectral filtering or dispersion management. For laser cavities with a spectral filter, the theory gives a simple geometrical description of the intra-cavity dynamics and provides a simple and efficient method for optimizing the laser cavity performance. In the dispersion managed cavity, analysis shows the generated self-similar behavior to be governed by the porous media equation with a rapidly-varying, mean-zero diffusion coefficient whose solution is the well-known Barenblatt similarity solution with parabolic profile.
Resumo:
My dissertation investigates twin financial interventions—urban development and emergency management—in a single small town. Once a thriving city drawing blacks as blue-collar workers during the Great Migration, Benton Harbor, Michigan has suffered from waves of out-migration, debt, and alleged poor management. Benton Harbor’s emphasis on high-end economic development to attract white-collar workers and tourism, amidst the poverty, unemployment, and disenfranchisement of black residents, highlights an extreme case of American urban inequality. At the same time, many bystanders and representative observers argue that this urban redevelopment scheme and the city’s takeover by the state represent Benton Harbor residents’ only hope for a better life. I interviewed 44 key players and observers in local politics and development, attended 20 public meetings, conducted three months of observations, and collected extensive archival data. Examining Benton Harbor’s time under emergency management and its luxury golf course development as two exemplars of a larger relationship, I find that the top-down processes allegedly intended to alleviate Benton Harbor’s inequality actually reproduce and deepen the city’s problems. I propose that the beneficiaries of both plans constitute a white urban regime active in Benton Harbor. I show how the white urban regime serves its interests by operating an extraction machine in the city, which serves to reproduce local poverty and wealth by directing resources toward the white urban regime and away from the city.