890 resultados para Competent authority


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Popular medieval English romances were composed and received within the social consciousness of a distinctly patriarchal culture. This study examines the way in which the dynamic of these texts is significantly influenced by the consequences of female endeavour, in the context of an autonomous feminine presence in both the real and imagined worlds of medieval England, and the authority with which this is presented in various narratives, with a particular focus on Sir Thomas Malory’s Morte Darthur. Chapter One of this study establishes the social and economic positioning of the female in fifteenth-century England, and her capacity for literary engagement; I will then apply this model of female autonomy and authority to a wider discussion of texts contemporary with Malory in Chapters Two and Three, in anticipation of a more detailed study of Le Morte Darthur in Chapters Four and Five. My research explores the female presence and influence in these texts according to certain types: namely the lover, the victim, the ruler, and the temptress. In the case of Malory, the crux of my observations centres on the paradox of the capacity for power in perceived vulnerability, incorporating the presentation of women in this patriarchal culture as being vulnerable and in need of protection, while simultaneously acting as a significant threat to chivalric society by manipulating this apparent fragility, to the detriment of the chivalric knight. In this sense, women can be perceived as being an architect of the romance world, while simultaneously acting as its saboteur. In essence, this study offers an innovative interpretation of female autonomy and authority in medieval romance, presenting an exploration of the physical, intellectual, and emotional placement of women in both the historical and literary worlds of fifteenth-century England, while examining the implications of female conduct on Malory’s Arthurian society.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This dissertation is an account of how contemporary Pakistani ulama grapple with their political realities and the Islamic state of Pakistan. The central conceptual question that scaffolds my dissertation is: How do Pakistani ulama negotiate tradition, authority and sovereignty with the Islamic Republic of Pakistan? In engaging with this issue, this dissertation employs a methodology that weds ethnography with rigorous textual analysis. The ulama that feature in this study belong to a variety of sectarian persuasions. The Sunni ulama are Deobandi and Barelvi; the Shia ulama in this study are Ithna Ashari.

In assessing the relationship between Pakistani ulama and their nation-state, I assert that the ulama's dialectical engagements with the state are best understood as a dexterous navigation between affirmation, critique, contestation and cultivation. In proposing this manner of thinking about Pakistani ulama's engagements with their state, I provide a more detailed and nuanced view of the ulama-state relationship compared to earlier works. While emphasizing Pakistani ulama's vitality and their impact on their state, this dissertation also draws attention to the manners in which the state impacts the ulama. It theorizes the subject formation of the ulama and asserts the importance of understanding the ulama as formed not just by the ethico-legal tradition in which they are trained but also by the state apparatus.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper drawing from audit reports reflects upon the post-Iraq war administration the Coalition Provisional Authority (CPA). It argues that the CPA’s compliance with basic levels of decent public administration were akin to Guantanamo’s compliance with basic levels of natural justice. The audit reports demonstrate that the CPA was a chaotic administration which spent billions without proper controls or procedures and left precious Iraqi oil revenues open to fraudulent acts. The CPA failed to comply with its obligations under UN resolutions. It identifies the geopolitical/economic implications of the US government which was partly motivated by economic concerns but it was also motivated by political concerns—the imposition of US hegemony. It then turns to the broader economic imperatives of the falling rate of profit and the imposition of neoliberalism (market fundamentalism).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This output is an invited and refereed chapter in the second of the two book length outputs resulting from the EU HUMAINE grant and follow-on grants. The book is in the OUP Affective Science Series and is intended to provide a theoretically oriented state of the art model for those working in the area of affective computing. Each chapter provides a synthesis of a specific area and presents new data/findings/approaches developed by the author(s) which take the area further. This chapter is in the section on ‘Approaches to developing expression corpora and databases.’ The chapter provides a critical synthesis of the issues involved in databases for affective computing and introduces the SEMAINE SAL Database, developed as an integral part of the EU SEMAINE Project (The Sensitive Agent Project 2008-2011) which is an interdisciplinary project. The project aimed to develop a computer interface that would allow a human to interact with an artificial agent in an emotional manner.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The provision of security in mobile ad hoc networks is of paramount importance due to their wireless nature. However, when conducting research into security protocols for ad hoc networks it is necessary to consider these in the context of the overall system. For example, communicational delay associated with the underlying MAC layer needs to be taken into account. Nodes in mobile ad hoc networks must strictly obey the rules of the underlying MAC when transmitting security-related messages while still maintaining a certain quality of service. In this paper a novel authentication protocol, RASCAAL, is described and its performance is analysed by investigating both the communicational-related effects of the underlying IEEE 802.11 MAC and the computational-related effects of the cryptographic algorithms employed. To the best of the authors' knowledge, RASCAAL is the first authentication protocol which proposes the concept of dynamically formed short-lived random clusters with no prior knowledge of the cluster head. The performance analysis demonstrates that the communication losses outweigh the computation losses with respect to energy and delay. MAC-related communicational effects account for 99% of the total delay and total energy consumption incurred by the RASCAAL protocol. The results also show that a saving in communicational energy of up to 12.5% can be achieved by changing the status of the wireless nodes during the course of operation. Copyright (C) 2009 G. A. Safdar and M. P. O'Neill (nee McLoone).