72 resultados para Iyengar, Sheena


Relevância:

60.00% 60.00%

Publicador:

Resumo:

Kirjallisuusarvostelu

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article explores the Foucauldian notions of practices of the self and care of the self, read via Deleuze, in the context of Iyengar yoga (one of the most popular forms of yoga currently). Using ethnographic and interview research data the article outlines the Iyengar yoga techniques which enable a focus upon the self to be developed, and the resources offered by the practice for the creation of ways of knowing, experiencing and forming the self. In particular, the article asks whether Iyengar yoga offers possibilities for freedom and liberation, or whether it is just another practice of control and management. Assessing Iyengar yoga via a ‘critical function’, a function of ‘struggle’ and a ‘curative and therapeutic function’, the article analyses whether the practice might constitute a mode of care of the self, and what it might offer in the context of the contemporary need to live better, as well as longer.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

One of the primary accomplishments of Governor Forrest Anderson in 1969-71 was the reorganization of the Executive Branch of Montana government, something that had been attempted six different times between 1919 and 1962 as state government had grown from twenty agencies to almost 200 uncontrolled boards, bureaus and commissions. The chaotic structure of the executive branch disempowered governors of both parties and empowered the private corporations and organizations that were the power structure of Montana. With remarkable political acumen, Governor Anderson figured out how to get that near impossible job done. Central to his efforts was the creation of an Executive Reorganization Commission, including eight legislators and the Governor, the adoption of a Constitutional Amendment that limited the executive branch to no more than twenty departments under the Governor, and the timely completion of a massive research effort to delineate the actual structure of the twenty departments. That story is told in this episode by three major players in the effort, all involved directly with the Executive Reorganization Commission: Tom Harrison, Diana Dowling and Sheena Wilson. Their recollections reflect an insider’s perspective of this significant accomplishment that helped change Montana “In the Crucible of Change.” Tom Harrison is a former Republican State Representative and State Senator from Helena, who was a member of the Executive Reorganization Commission. As Majority Leader in the Montana House of Representatives in 1971, he was the primary sponsor of the House’s executive reorganization bill and helped shepherd the Senate’s version to passage. Harrison was the Republican candidate for Attorney General in 1976 after which he practiced private law for 3 more decades. He served in the Montana Army National Guard for almost 34 years, rising to the rank of Colonel in the position of Judge Advocate General. He was a founding Director of Federal Defenders of Montana (legal representation for indigents accused within the Federal Judicial System); appointed Chairman of the original Montana State Fund (workers' compensation insurance) by Gov. Stephens; served as President of the Montana Trial Lawyers Association, Helena Kiwanis Club and St. Peter's Community Hospital Foundation, as well as Chairman and Director of AAA MountainWest; and was a founder, first Chairman and Director of the Valley Bank of Helena for over 25 years. Diana Dowling was an attorney for the Executive Reorganization Commission and helped draft the legislation that was passed. She also worked for Governor Forrest Anderson and for the 1972 Constitutional Convention where she prepared and directed publication of official explanation of the new Constitution that was mailed to all Montana voters. Diana was Executive Director of the Montana Bar Association and for 20 years held various legal positions with the Montana Legislative Council. For 12 years she was a commissioner on the National Conference of Commissioners on Uniform State Laws and for 7 years was a member of Montana State Board of Bar Examiners. Diana was the first director of the Montana Lottery, an adjunct professor at both Carroll College and the UM Law School, and an administrative officer for Falcon Press Publishing Co. Diana is currently - and intends to continue being - a perpetual college student. Sheena Wilson came fresh out of the University of Montana to become a Research Assistant for the Executive Reorganization Commission. Later she worked for seven years as a field representative in Idaho and Montana for the Mountain Plains Family Education Program, for thirteen years with Congressman Pat Williams as Executive Assistant in Washington and Field Assistant here in Montana, owned and managed a Helena restaurant for seven years, worked as Executive Assistant for State Auditor John Morrison and was Deputy Chief of Staff for Governor Brian Schweitzer his full 8 years in the Governorship. Though currently “retired”, Sheena serves on the Montana Board of Investments, the Public Employees Retirement Board and the Capitol Complex Advisory Council and is a partner in a dry-land wheat farm in Teton County that was homesteaded by her great uncle.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There is increasing evidence that the microcirculation plays an important role in the pathogenesis of cardiovascular diseases. Changes in retinal vascular caliber reflect early microvascular disease and predict incident cardiovascular events. We performed a genome-wide association study to identify genetic variants associated with retinal vascular caliber. We analyzed data from four population-based discovery cohorts with 15,358 unrelated Caucasian individuals, who are members of the Cohort for Heart and Aging Research in Genomic Epidemiology (CHARGE) consortium, and replicated findings in four independent Caucasian cohorts (n  =  6,652). All participants had retinal photography and retinal arteriolar and venular caliber measured from computer software. In the discovery cohorts, 179 single nucleotide polymorphisms (SNP) spread across five loci were significantly associated (p<5.0×10(-8)) with retinal venular caliber, but none showed association with arteriolar caliber. Collectively, these five loci explain 1.0%-3.2% of the variation in retinal venular caliber. Four out of these five loci were confirmed in independent replication samples. In the combined analyses, the top SNPs at each locus were: rs2287921 (19q13; p  =  1.61×10(-25), within the RASIP1 locus), rs225717 (6q24; p = 1.25×10(-16), adjacent to the VTA1 and NMBR loci), rs10774625 (12q24; p  =  2.15×10(-13), in the region of ATXN2,SH2B3 and PTPN11 loci), and rs17421627 (5q14; p = 7.32×10(-16), adjacent to the MEF2C locus). In two independent samples, locus 12q24 was also associated with coronary heart disease and hypertension. Our population-based genome-wide association study demonstrates four novel loci associated with retinal venular caliber, an endophenotype of the microcirculation associated with clinical cardiovascular disease. These data provide further insights into the contribution and biological mechanisms of microcirculatory changes that underlie cardiovascular disease.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Peer-reviewed

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Over the course of the last two decades, IFIs (most prominently the World Bank) have begun acknowledging the centrality of human development as an essential element of the economic development process if the growth aimed at is to be holistic and sustainable. Strikingly, there is no agreement on the manner in which this approach is to be achieved, especially in the field of gender and development. This paper focuses on the issue of whether the Multilateral Development Banks’ policies have truly attempted at implementing their stated model of gender mainstreaming through their programmes and projects in India, with a specific focus on the legal sector, since that sector has both instrumental and intrinsic value for gender rights advocates. This article will aim at reviewing their approach towards rule of law projects and the manner in which gender equality norms have or have not been addressed within that framework; it will end with recommendations as to the necessary issues which gender programmes must address within the rule of law framework in order to achieve the Millennium Development Goal of gender equity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Le yoga est une pratique ancestrale qui a connu une effervescence phénoménale ces quarante dernières années. S’insérant dans un monde en changement où l’individu et son rapport à son environnement ne sont plus perçus de la même manière, le yoga est une pratique qui véhicule un concept flexible et malléable, ajustable à une société occidentale en changement. Le Québec, et plus spécifiquement Montréal où s'est effectuée notre ethnographie, porte une histoire religieuse encore fortement présente où l’on découvre une effervescence de nouvelles pratiques depuis la Révolution tranquille des années soixante. C’est dans ce cadre que nous avons découvert le yoga cachemirien qui se base sur la tradition du sivaïsme tantrique non-duel du Cachemire. Cette pratique est encore peu connue dans le monde du yoga, bien qu’elle soit déjà bien installée comme objet d’étude dans les milieux académiques (Inde, France, Angleterre, Italie, États-Unis et Canada). Ce yoga se dit « traditionnel » à cause de son orientation non-duelle qui fait écho à l’enseignement délivré dans les tantras de cette tradition. Par ailleurs, cette pratique, majoritairement basée sur le senti et l’exploration tactile, ne porte pas les caractéristiques des yogas type ashtanga, Iyengar ou hatha, disponibles sur le marché. Notre exploration ethnographique s’est donc portée sur le vécu des membres de ce groupe et sur la pratique et le discours de l’enseignant. Les membres, majoritairement d’origine québécoise, appréhendent cette approche et cette sotériologie avec un vécu religieux culturel spécifiquement identifiable, que ce soit au niveau du corps, des idées ou de la formulation qu’ils en font. L’enseignant, quant à lui, présente la pratique comme l’application directe et vécue de la doctrine délivrée dans les tantras de la tradition du sivaïsme cachemirien. La pratique du yoga cachemirien se veut donc traditionnelle tout en s’acculturant au contexte contemporain dans lequel l’enseignement se délivre. Il est alors pertinent de comprendre la dynamique qui se génère dans ce processus de transposition traditionnelle au sein d’un contexte contemporain. C’est donc ce processus de construction/ transformation que nous allons tenter d’expliquer; celui-ci semble s’établir entre continuité traditionnelle et rupture d’éléments redéfinis et réinventés. Nous verrons que dans cette dynamique, observée tant dans le discours que la pratique, les limites ne sont pas aussi hermétiques qu'il n'y paraît : les concepts d’identité culturelle et de temporalité s’entrechoquent, se construisent les unes sur les autres dans un mouvement incessant et vivant.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Department of Hindi, Cochin University of Science and Technology

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Department of Marine Geology and Geophysics,Cochin University of Science and Technology

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Internet today has become a vital part of day to day life, owing to the revolutionary changes it has brought about in various fields. Dependence on the Internet as an information highway and knowledge bank is exponentially increasing so that a going back is beyond imagination. Transfer of critical information is also being carried out through the Internet. This widespread use of the Internet coupled with the tremendous growth in e-commerce and m-commerce has created a vital need for infonnation security.Internet has also become an active field of crackers and intruders. The whole development in this area can become null and void if fool-proof security of the data is not ensured without a chance of being adulterated. It is, hence a challenge before the professional community to develop systems to ensure security of the data sent through the Internet.Stream ciphers, hash functions and message authentication codes play vital roles in providing security services like confidentiality, integrity and authentication of the data sent through the Internet. There are several ·such popular and dependable techniques, which have been in use widely, for quite a long time. This long term exposure makes them vulnerable to successful or near successful attempts for attacks. Hence it is the need of the hour to develop new algorithms with better security.Hence studies were conducted on various types of algorithms being used in this area. Focus was given to identify the properties imparting security at this stage. By making use of a perception derived from these studies, new algorithms were designed. Performances of these algorithms were then studied followed by necessary modifications to yield an improved system consisting of a new stream cipher algorithm MAJE4, a new hash code JERIM- 320 and a new message authentication code MACJER-320. Detailed analysis and comparison with the existing popular schemes were also carried out to establish the security levels.The Secure Socket Layer (SSL) I Transport Layer Security (TLS) protocol is one of the most widely used security protocols in Internet. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL I TLS. But recent attacks on RC4 and HMAC have raised questions about the reliability of these algorithms. Hence MAJE4 and MACJER-320 have been proposed as substitutes for them. Detailed studies on the performance of these new algorithms were carried out; it has been observed that they are dependable alternatives.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A new fast stream cipher, MAJE4 is designed and developed with a variable key size of 128-bit or 256-bit. The randomness property of the stream cipher is analysed by using the statistical tests. The performance evaluation of the stream cipher is done in comparison with another fast stream cipher called JEROBOAM. The focus is to generate a long unpredictable key stream with better performance, which can be used for cryptographic applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The focus of this work is to provide authentication and confidentiality of messages in a swift and cost effective manner to suit the fast growing Internet applications. A nested hash function with lower computational and storage demands is designed with a view to providing authentication as also to encrypt the message as well as the hash code using a fast stream cipher MAJE4 with a variable key size of 128-bit or 256-bit for achieving confidentiality. Both nested Hash function and MAJE4 stream cipher algorithm use primitive computational operators commonly found in microprocessors; this makes the method simple and fast to implement both in hardware and software. Since the memory requirement is less, it can be used for handheld devices for security purposes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A novel and fast technique for cryptographic applications is designed and developed using the symmetric key algorithm “MAJE4” and the popular asymmetric key algorithm “RSA”. The MAJE4 algorithm is used for encryption / decryption of files since it is much faster and occupies less memory than RSA. The RSA algorithm is used to solve the problem of key exchange as well as to accomplish scalability and message authentication. The focus is to develop a new hybrid system called MARS4 by combining the two cryptographic methods with an aim to get the advantages of both. The performance evaluation of MARS4 is done in comparison with MAJE4 and RSA.