983 resultados para doctoral policy
Resumo:
Although Iran borders with many states and has direct access to the Caspian Sea as well as the Indian Ocean, the Persian Gulf region seems to be the most vital area to its security and prosperity. Yet since the 70’s Iran’s relations with the Arab states in the region have been rather strained and complex. The main reason for that had been the success of the Islamic revolution in 1979 which later resulted in a new dimension of Sunni-Shia rivalry. Moreover, post-revolutionary Iranian authorities also intended to maintain the regional hegemony from the Imperial State of Iran period. As a result, successive Iranian governments competed for hegemony in the Persian Gulf with the littoral Arab states which consolidated their regional positions due to close links and intensive cooperation with the West especially with the United States. Despite some political and economic initiatives which were undertaken by President Mahmoud Ahmadinejad, this rivalry was also evident between 2005–2013. The main aim of this article is to find out whether Iranian foreign policy towards the Arab states in the Persian Gulf region has undergone any significant changes since Hassan Rouhani became the President of the Islamic Republic of Iran in August 2013. According to Mohammad Reza Deshiri, the Iranian foreign policy after 1979 can be divided into so-called waves of idealism and realism. During dominance of idealism values and spirituality are more important than pragmatism while during the realistic waves political as well as economic interests prevail over spirituality. Iranian idealism is connected with export of revolutionary ideas, Shia dominance as well as the restoration of unity among all muslims (ummah). On this basis both presidential terms of Mahmoud Ahmadinejad can be classified as ‘waves of idealism’, albeit some of his ideas were very pragmatic. The question is if Hassan Rouhani’s foreign policy represents a continuity or a change. Is the current Iran’s foreign policy towards the Persian Gulf region idealistic or rather realistic? The main assumption is that there will be no Arab-Iranian rapprochement in the Persian Gulf without a prior normalization of political relations between Iran and the West especially the United States.
Resumo:
Wydział Historyczny
Resumo:
This report describes the history of the information commons, presents examples of online commons that provide new ways to store and deliver information, and concludes with policy recommendations. Available in PDF and HTML versions.
Resumo:
http://www.archive.org/details/catholicindianmi013196mbp
Resumo:
On January 11, 2008, the National Institutes of Health ('NIH') adopted a revised Public Access Policy for peer-reviewed journal articles reporting research supported in whole or in part by NIH funds. Under the revised policy, the grantee shall ensure that a copy of the author's final manuscript, including any revisions made during the peer review process, be electronically submitted to the National Library of Medicine's PubMed Central ('PMC') archive and that the person submitting the manuscript will designate a time not later than 12 months after publication at which NIH may make the full text of the manuscript publicly accessible in PMC. NIH adopted this policy to implement a new statutory requirement under which: The Director of the National Institutes of Health shall require that all investigators funded by the NIH submit or have submitted for them to the National Library of Medicine's PubMed Central an electronic version of their final, peer-reviewed manuscripts upon acceptance for publication to be made publicly available no later than 12 months after the official date of publication: Provided, That the NIH shall implement the public access policy in a manner consistent with copyright law. This White Paper is written primarily for policymaking staff in universities and other institutional recipients of NIH support responsible for ensuring compliance with the Public Access Policy. The January 11, 2008, Public Access Policy imposes two new compliance mandates. First, the grantee must ensure proper manuscript submission. The version of the article to be submitted is the final version over which the author has control, which must include all revisions made after peer review. The statutory command directs that the manuscript be submitted to PMC 'upon acceptance for publication.' That is, the author's final manuscript should be submitted to PMC at the same time that it is sent to the publisher for final formatting and copy editing. Proper submission is a two-stage process. The electronic manuscript must first be submitted through a process that requires input of additional information concerning the article, the author(s), and the nature of NIH support for the research reported. NIH then formats the manuscript into a uniform, XML-based format used for PMC versions of articles. In the second stage of the submission process, NIH sends a notice to the Principal Investigator requesting that the PMC-formatted version be reviewed and approved. Only after such approval has grantee's manuscript submission obligation been satisfied. Second, the grantee also has a distinct obligation to grant NIH copyright permission to make the manuscript publicly accessible through PMC not later than 12 months after the date of publication. This obligation is connected to manuscript submission because the author, or the person submitting the manuscript on the author's behalf, must have the necessary rights under copyright at the time of submission to give NIH the copyright permission it requires. This White Paper explains and analyzes only the scope of the grantee's copyright-related obligations under the revised Public Access Policy and suggests six options for compliance with that aspect of the grantee's obligation. Time is of the essence for NIH grantees. As a practical matter, the grantee should have a compliance process in place no later than April 7, 2008. More specifically, the new Public Access Policy applies to any article accepted for publication on or after April 7, 2008 if the article arose under (1) an NIH Grant or Cooperative Agreement active in Fiscal Year 2008, (2) direct funding from an NIH Contract signed after April 7, 2008, (3) direct funding from the NIH Intramural Program, or (4) from an NIH employee. In addition, effective May 25, 2008, anyone submitting an application, proposal or progress report to the NIH must include the PMC reference number when citing articles arising from their NIH funded research. (This includes applications submitted to the NIH for the May 25, 2008 and subsequent due dates.) Conceptually, the compliance challenge that the Public Access Policy poses for grantees is easily described. The grantee must depend to some extent upon the author(s) to take the necessary actions to ensure that the grantee is in compliance with the Public Access Policy because the electronic manuscripts and the copyrights in those manuscripts are initially under the control of the author(s). As a result, any compliance option will require an explicit understanding between the author(s) and the grantee about how the manuscript and the copyright in the manuscript are managed. It is useful to conceptually keep separate the grantee's manuscript submission obligation from its copyright permission obligation because the compliance personnel concerned with manuscript management may differ from those responsible for overseeing the author's copyright management. With respect to copyright management, the grantee has the following six options: (1) rely on authors to manage copyright but also to request or to require that these authors take responsibility for amending publication agreements that call for transfer of too many rights to enable the author to grant NIH permission to make the manuscript publicly accessible ('the Public Access License'); (2) take a more active role in assisting authors in negotiating the scope of any copyright transfer to a publisher by (a) providing advice to authors concerning their negotiations or (b) by acting as the author's agent in such negotiations; (3) enter into a side agreement with NIH-funded authors that grants a non-exclusive copyright license to the grantee sufficient to grant NIH the Public Access License; (4) enter into a side agreement with NIH-funded authors that grants a non-exclusive copyright license to the grantee sufficient to grant NIH the Public Access License and also grants a license to the grantee to make certain uses of the article, including posting a copy in the grantee's publicly accessible digital archive or repository and authorizing the article to be used in connection with teaching by university faculty; (5) negotiate a more systematic and comprehensive agreement with the biomedical publishers to ensure either that the publisher has a binding obligation to submit the manuscript and to grant NIH permission to make the manuscript publicly accessible or that the author retains sufficient rights to do so; or (6) instruct NIH-funded authors to submit manuscripts only to journals with binding deposit agreements with NIH or to journals whose copyright agreements permit authors to retain sufficient rights to authorize NIH to make manuscripts publicly accessible.
Resumo:
We present an online distributed algorithm, the Causation Logging Algorithm (CLA), in which Autonomous Systems (ASes) in the Internet individually report route oscillations/flaps they experience to a central Internet Routing Registry (IRR). The IRR aggregates these reports and may observe what we call causation chains where each node on the chain caused a route flap at the next node along the chain. A chain may also have a causation cycle. The type of an observed causation chain/cycle allows the IRR to infer the underlying policy routing configuration (i.e., the system of economic relationships and constraints on route/path preferences). Our algorithm is based on a formal policy routing model that captures the propagation dynamics of route flaps under arbitrary changes in topology or path preferences. We derive invariant properties of causation chains/cycles for ASes which conform to economic relationships based on the popular Gao-Rexford model. The Gao-Rexford model is known to be safe in the sense that the system always converges to a stable set of paths under static conditions. Our CLA algorithm recovers the type/property of an observed causation chain of an underlying system and determines whether it conforms to the safe economic Gao-Rexford model. Causes for nonconformity can be diagnosed by comparing the properties of the causation chains with those predicted from different variants of the Gao-Rexford model.
Resumo:
In this paper we introduce a theory of policy routing dynamics based on fundamental axioms of routing update mechanisms. We develop a dynamic policy routing model (DPR) that extends the static formalism of the stable paths problem (introduced by Griffin et al.) with discrete synchronous time. DPR captures the propagation of path changes in any dynamic network irrespective of its time-varying topology. We introduce several novel structures such as causation chains, dispute fences and policy digraphs that model different aspects of routing dynamics and provide insight into how these dynamics manifest in a network. We exercise the practicality of the theoretical foundation provided by DPR with two fundamental problems: routing dynamics minimization and policy conflict detection. The dynamics minimization problem utilizes policy digraphs, that capture the dependencies in routing policies irrespective of underlying topology dynamics, to solve a graph optimization problem. This optimization problem explicitly minimizes the number of routing update messages in a dynamic network by optimally changing the path preferences of a minimal subset of nodes. The conflict detection problem, on the other hand, utilizes a theoretical result of DPR where the root cause of a causation cycle (i.e., cycle of routing update messages) can be precisely inferred as either a transient route flap or a dispute wheel (i.e., policy conflict). Using this result we develop SafetyPulse, a token-based distributed algorithm to detect policy conflicts in a dynamic network. SafetyPulse is privacy preserving, computationally efficient, and provably correct.
Resumo:
We introduce the Dynamic Policy Routing (DPR) model that captures the propagation of route updates under arbitrary changes in topology or path preferences. DPR introduces the notion of causation chains where the route flap at one node causes a flap at the next node along the chain. Using DPR, we model the Gao-Rexford (economic) guidelines that guarantee the safety (i.e., convergence) of policy routing. We establish three principles of safe policy routing dynamics. The non-interference principle provides insight into which ASes can directly induce route changes in one another. The single cycle principle and the multi-tiered cycle principle provide insight into how cycles of routing updates can manifest in any network. We develop INTERFERENCEBEAT, a distributed algorithm that propagates a small token along causation chains to check adherence to these principles. To enhance the diagnosis power of INTERFERENCEBEAT, we model four violations of the Gao-Rexford guidelines (e.g., transiting between peers) and characterize the resulting dynamics.
Resumo:
A number of recent studies have pointed out that TCP's performance over ATM networks tends to suffer, especially under congestion and switch buffer limitations. Switch-level enhancements and link-level flow control have been proposed to improve TCP's performance in ATM networks. Selective Cell Discard (SCD) and Early Packet Discard (EPD) ensure that partial packets are discarded from the network "as early as possible", thus reducing wasted bandwidth. While such techniques improve the achievable throughput, their effectiveness tends to degrade in multi-hop networks. In this paper, we introduce Lazy Packet Discard (LPD), an AAL-level enhancement that improves effective throughput, reduces response time, and minimizes wasted bandwidth for TCP/IP over ATM. In contrast to the SCD and EPD policies, LPD delays as much as possible the removal from the network of cells belonging to a partially communicated packet. We outline the implementation of LPD and show the performance advantage of TCP/LPD, compared to plain TCP and TCP/EPD through analysis and simulations.
Resumo:
The Border Gateway Protocol (BGP) is the current inter-domain routing protocol used to exchange reachability information between Autonomous Systems (ASes) in the Internet. BGP supports policy-based routing which allows each AS to independently adopt a set of local policies that specify which routes it accepts and advertises from/to other networks, as well as which route it prefers when more than one route becomes available. However, independently chosen local policies may cause global conflicts, which result in protocol divergence. In this paper, we propose a new algorithm, called Adaptive Policy Management Scheme (APMS), to resolve policy conflicts in a distributed manner. Akin to distributed feedback control systems, each AS independently classifies the state of the network as either conflict-free or potentially-conflicting by observing its local history only (namely, route flaps). Based on the degree of measured conflicts (policy conflict-avoidance vs. -control mode), each AS dynamically adjusts its own path preferences—increasing its preference for observably stable paths over flapping paths. APMS also includes a mechanism to distinguish route flaps due to topology changes, so as not to confuse them with those due to policy conflicts. A correctness and convergence analysis of APMS based on the substability property of chosen paths is presented. Implementation in the SSF network simulator is performed, and simulation results for different performance metrics are presented. The metrics capture the dynamic performance (in terms of instantaneous throughput, delay, routing load, etc.) of APMS and other competing solutions, thus exposing the often neglected aspects of performance.
Resumo:
The Border Gateway Protocol (BGP) is the current inter-domain routing protocol used to exchange reachability information between Autonomous Systems (ASes) in the Internet. BGP supports policy-based routing which allows each AS to independently define a set of local policies on which routes it accepts and advertises from/to other networks, as well as on which route it prefers when more than one route becomes available. However, independently chosen local policies may cause global conflicts, which result in protocol divergence. In this paper, we propose a new algorithm, called Adaptive Policy Management Scheme(APMS), to resolve policy conflicts in a distributed manner. Akin to distributed feedback control systems, each AS independently classifies the state of the network as either conflict-free or potentially conflicting by observing its local history only (namely, route flaps). Based on the degree of measured conflicts, each AS dynamically adjusts its own path preferences---increasing its preference for observably stable paths over flapping paths. APMS also includes a mechanism to distinguish route flaps due to topology changes, so as not to confuse them with those due to policy conflicts. A correctness and convergence analysis of APMS based on the sub-stability property of chosen paths is presented. Implementation in the SSF network simulator is performed, and simulation results for different performance metrics are presented. The metrics capture the dynamic performance (in terms of instantaneous throughput, delay, etc.) of APMS and other competing solutions, thus exposing the often neglected aspects of performance.
Resumo:
The past two decades have witnessed concerted efforts by theorists and policy-makers to place civil society at the centre of social, economic and environmental development processes. To this end, policies grounded in a Third Way approach have sought to forge stronger linkages between the state and voluntary community-based organisations. Concepts such as active citizenship, social capital, partnership and sustainability have underpinned this political philosophy, which reflects a movement in development theory and political science away from notions of state-led development and unfettered neo-liberalism. In the Irish context, a series of initiatives have given expression to this new policy agenda, the foremost amongst them the publication of a White Paper in 2000. New local governance structures and development schemes have multiplied since the early 1990s, while the physical planning system has also been modified. All this has taken place against the backdrop of unprecedented economic development and social change precipitated by the ‘Celtic Tiger’.This thesis examines the interaction between community organisations, state institutions and other actors in development processes in East Cork. It focuses upon place-based community organisations, who seek to represent the interests of their particular localities. A case study approach is employed to explore the realpolitik of local development and to gauge the extent to which grassroots community organisations wield influence in determining the development of their communities. The study concludes that the transfer of decision-making power to community organisations has been more illusory than real and that, in practical terms, such groups remain marginal in the circuits of power. However, the situation of community organisations operating in different geographical locales cannot be reduced to an overarching theoretical logic. The case studies show that the modus operandi of community groups varies considerably and can be influenced by specific local geographies, events and personalities.
Resumo:
This study contexualises the relationship between the armed forces and the civil authority in Ireland using and revising the theoretical framework advanced by Huntington. It tracks the evolution of the idea of a representive body for soldiers in the late 1980s, to the setting up of statutory associations under the Defence Amendment Act 1990. The study considers Irish soldiers political agitation and their use of peaceful democratic activities to achieve their aims. It highlights the fundamental policy arguments that were made against the idea of representation for the army and positions those arguments in the study of civil-military relations. Utilising unique access to secret Department of Defence files, it reveals in-depth ideological arguments advanced by the military authories in Ireland against independent representation. This thesis provides an academic study of the establishment of PDFORRA. It answers key questions regarding the change in the position of Irish government who were categorically opposed to the idea of representation in the army. It illustrates the involvement of other agencies such as the European Organisation of Military Associations (Euromil) reveals reciprocal support by the Irish associations to other emerging groups in Spain. Accessing as yet unpublished Department of Defence files, study analyses tension between the military authorities and the government. It highlights for the first time the role of enlisted personnel in the shaping of new state structures and successfully dismmisses Huntingtons theoretical contention that enlisted personnel are of no consequence in the study of civil-military relations. It fills a gap in our understanding, identified by Finer, as to how politicisation of soldiers takes place. This thesis brings a new dimension to the discipline of civil-military relations and creates new knowledge that will enhance our understanding of an area not covered previously.
Resumo:
The central objective of this study is an examination of discourses of Irish female sexuality and of the apparatuses of control designed for its surveillance and regulation in the period nineteen-twenty to nineteen-forty. It is argued that during this period sexuality, and in particular female sexuality, became established as an icon of national identity. This thesis demonstrated that this identity was given symbolic embodiment in the discursive construction of an idealised, feminine subject, a subject who had purity and sexual morality as her defining characteristics. It is argued that female roles and in particular female sexuality, emerged as contested issues in post-colonial Ireland. This is not unusual given that women are frequently constructed in nationalist discourses as repositories of cultural heritage and symbols of national identity (Kandiyoti 1993). This thesis demonstrates that the Catholic Church played a central role in this process of establishing female sexuality as a national icon. Furthermore, it illustrates that through a process of identification and classification, women, whose behaviour contested the prescribed sexual norm, were categorized and labeled as 'wayward girls' 'unmarried mothers' or 'prostitutes'and mechanisms for their control were set in place. Finally, this thesis reveals that the development of these control apparatuses was mediated by class, with the sexuality of working class women being a primary target of surveillance, regulation and indeed reformation.
Resumo:
Background. Schools unequivocally privilege solo-teaching. This research seeks to enhance our understanding of team-teaching by examining how two teachers, working in the same classroom at the same time, might or might not contribute to the promotion of inclusive learning. There are well-established policy statements that encourage change and moves towards the use of team-teaching to promote greater inclusion of students with special educational needs in mainstream schools and mainstream classrooms. What is not so well established is the practice of team-teaching in post-primary settings, with little research conducted to date on how it can be initiated and sustained, and a dearth of knowledge on how it impacts upon the students and teachers involved. Research questions and aims. In light of the paucity and inconclusive nature of the research on team-teaching to date (Hattie, 2009), the orientating question in this study asks ‘To what extent, can the introduction of a formal team-teaching initiative enhance the quality of inclusive student learning and teachers’ learning at post-primary level?’ The framing of this question emerges from ongoing political, legal and educational efforts to promote inclusive education. The study has three main aims. The first aim of this study is to gather and represent the voices and experiences of those most closely involved in the introduction of team-teaching; students, teachers, principals and administrators. The second aim is to generate a theory-informed understanding of such collaborative practices and how they may best be implemented in the future. The third aim is to advance our understandings regarding the day-to-day, and moment-to-moment interactions, between teachers and students which enable or inhibit inclusive learning. Sample. In total, 20 team-teaching dyads were formed across seven project schools. The study participants were from two of the seven project schools, Ash and Oak. It involved eight teachers and 53 students, whose age ranged from 12-16 years old, with 4 teachers forming two dyads per school. In Oak there was a class of first years (n=11) with one dyad and a class of transition year students (n=24) with the other dyad. In Ash one class group (n=18) had two dyads. The subjects in which the dyads engaged were English and Mathematics. Method. This research adopted an interpretive paradigm. The duration of the fieldwork was from April 2007 to June 2008. Research methodologies included semi-structured interviews (n=44), classroom observation (n=20), attendance at monthly teacher meetings (n=6), questionnaires and other data gathering practices which included school documentation, assessment findings and joint examination of student work samples (n=4). Results. Team-teaching involves changing normative practices, and involves placing both demands and opportunities before those who occupy classrooms (teachers and students) and before those who determine who should occupy these classrooms (principals and district administrators). This research shows how team-teaching has the potential to promote inclusive learning, and when implemented appropriately, can impact positively upon the learning experiences of both teachers and students. The results are outlined in two chapters. In chapter four, Social Capital Theory is used in framing the data, the change process of bonding, bridging and linking, and in capturing what the collaborative action of team-teaching means, asks and offers teachers; within classes, between classes, between schools and within the wider educational community. In chapter five, Positioning Theory deductively assists in revealing the moment-to-moment, dynamic and inclusive learning opportunities, that are made available to students through team-teaching. In this chapter a number of vignettes are chosen to illustrate such learning opportunities. These two theories help to reveal the counter-narrative that team-teaching offers, regarding how both teachers and students teach and learn. This counter-narrative can extend beyond the field of special education and include alternatives to the manner in which professional development is understood, implemented, and sustained in schools and classrooms. Team-teaching repositions teachers and students to engage with one another in an atmosphere that capitalises upon and builds relational trust and shared cognition. However, as this research study has found, it is wise that the purposes, processes and perceptions of team-teaching are clear to all so that team-teaching can be undertaken by those who are increasingly consciously competent and not merely accidentally adequate. Conclusions. The findings are discussed in the context of the promotion of effective inclusive practices in mainstream settings. I believe that such promotion requires more nuanced understandings of what is being asked of, and offered to, teachers and students. Team-teaching has, and I argue will increasingly have, its place in the repertoire of responses that support effective inclusive learning. To capture and extend such practice requires theoretical frameworks that facilitate iterative journeys between research, policy and practice. Research to date on team-teaching has been too focused on outcomes over short timeframes and not focused enough on the process that is team-teaching. As a consequence team-teaching has been under-used, under-valued, under-theorised and generally not very well understood. Moving from classroom to staff room and district board room, theoretical frameworks used in this research help to travel with, and understand, the initiation, engagement and early consequences of team-teaching within and across the educational landscape. Therefore, conclusions from this study have implications for the triad of research, practice and policy development where efforts to change normative practices can be matched by understandings associated with what it means to try something new/anew, and what it means to say it made a positive difference.