822 research outputs found

    Resilient and Trustworthy Dynamic Data-driven Application Systems (DDDAS) Services for Crisis Management Environments

    Get PDF
    Future crisis management systems needresilient and trustworthy infrastructures to quickly develop reliable applications and processes, andensure end-to-end security, trust, and privacy. Due to the multiplicity and diversity of involved actors, volumes of data, and heterogeneity of shared information;crisis management systems tend to be highly vulnerable and subjectto unforeseen incidents. As a result, the dependability of crisis management systems can be at risk. This paper presents a cloud-based resilient and trustworthy infrastructure (known as rDaaS) to quickly develop secure crisis management systems. The rDaaS integrates the Dynamic Data-Driven Application Systems (DDDAS) paradigm into a service-oriented architecture over cloud technology and provides a set of resilient DDDAS-As-A Service (rDaaS) components to build secure and trusted adaptable crisis processes. The rDaaS also ensures resilience and security by obfuscating the execution environment and applying Behavior Software Encryption and Moving Technique Defense. A simulation environment for a nuclear plant crisis management case study is illustrated to build resilient and trusted crisis response processes

    Intelligent business processes composition based on mas, semantic and cloud integration (IPCASCI)

    Get PDF
    [EN]Component reuse is one of the techniques that most clearly contributes to the evolution of the software industry by providing efficient mechanisms to create quality software. Reuse increases both software reliability, due to the fact that it uses previously tested software components, and development productivity, and leads to a clear reduction in cost. Web services have become are an standard for application development on cloud computing environments and are essential in business process development. These services facilitate a software construction that is relatively fast and efficient, two aspects which can be improved by defining suitable models of reuse. This research work is intended to define a model which contains the construction requirements of new services from service composition. To this end, the composition is based on tested Web services and artificial intelligent tools at our disposal. It is believed that a multi-agent architecture based on virtual organizations is a suitable tool to facilitate the construction of cloud computing environments for business processes from other existing environments, and with help from ontological models as well as tools providing the standard BPEL (Business Process Execution Language). In the context of this proposal, we must generate a new business process from the available services in the platform, starting with the requirement specifications that the process should meet. These specifications will be composed of a semi-free description of requirements to describe the new service. The virtual organizations based on a multi-agent system will manage the tasks requiring intelligent behaviour. This system will analyse the input (textual description of the proposal) in order to deconstruct it into computable functionalities, which will be subsequently treated. Web services (or business processes) stored to be reused have been created from the perspective of SOA architectures and associated with an ontological component, which allows the multi-agent system (based on virtual organizations) to identify the services to complete the reuse process. The proposed model develops a service composition by applying a standard BPEL once the services that will compose the solution business process have been identified. This standard allows us to compose Web services in an easy way and provides the advantage of a direct mapping from Business Process Management Notation diagrams

    You don't have to be a bad girl to love crime: feminity and women's labor in U.S. broadcast crime programming, 1945-1975

    Get PDF
    You Don’t Have to Be a Bad Girl to Love Crime uses archival research, textual analysis, and industrial and cultural studies frameworks to re-evaluate women’s representation in post-World War II American radio and television crime dramas. It complicates popular and scholarly understandings that postwar broadcasters simply responded to audience desires by marginalizing women across their schedules and removing recurring female characters from crime dramas altogether. Rather, the three major networks (NBC, CBS, and ABC) that dominated the broadcast industry’s transition from radio to television joined conservative religious and anti-communist groups to silence public debate over women’s roles. While late-1940s network radio programming incorporated varied opinions about postwar women’s desire and potential to expand their influence in the workplace and politics, postwar television naturalized a vision of passive housewives embracing husbands’ patriarchal authority. Women who chose to fight crime challenged this authority by claiming the right to enforce the law and judge their fellow citizens. This dissertation is organized into two parts: The first explores the industrial and cultural discourses that set the stage for postwar restrictions on women in crime. Network executives and anti-communist conservatives did not see each other as natural allies, but they mobilized complementary gender discourses emphasizing women as passive consumers rather than public actors. Archival industry research shows network executives ignored evidence female audiences liked crime programming, especially series featuring active, sympathetic women. Instead, executives and vocal conservatives framed such women as a sexualized threat to men, children, and themselves. Networks tolerated crime-curious women on radio and early television, when they struggled to retain and build a female audience. However, by the mid-1950s, executives feared such women would undermine their commercial emphasis on domestic consumption and attract regulation or censorship. Part two explores three major types of crime-curious women who appeared on postwar radio and television programming. Investigative wives and detectives’ secretaries investigated crimes with male husbands or employers. Female detectives, however, directly challenged men’s control over criminal justice, the most overt sign of patriarchal social power. All three types gave female audiences a powerful model of feminine agency within patriarchal society. They also established representational norms that endure in modern crime dramas

    Generalized techniques for using system execution traces to support software performance analysis

    Get PDF
    This dissertation proposes generalized techniques to support software performance analysis using system execution traces in the absence of software development artifacts such as source code. The proposed techniques do not require modifications to the source code, or to the software binaries, for the purpose of software analysis (non-intrusive). The proposed techniques are also not tightly coupled to the architecture specific details of the system being analyzed. This dissertation extends the current techniques of using system execution traces to evaluate software performance properties, such as response times, service times. The dissertation also proposes a novel technique to auto-construct a dataflow model from the system execution trace, which will be useful in evaluating software performance properties. Finally, it showcases how we can use execution traces in a novel technique to detect Excessive Dynamic Memory Allocations software performance anti-pattern. This is the first attempt, according to the author\u27s best knowledge, of a technique to detect automatically the excessive dynamic memory allocations anti-pattern. The contributions from this dissertation will ease the laborious process of software performance analysis and provide a foundation for helping software developers quickly locate the causes for negative performance results via execution traces

    What Makes Trans Lives More Livable?: An Intersectional Content Analysis of #WeHappyTrans* and #TheGenderTag

    Get PDF
    Building on previous trans YouTube scholarship, this dissertation is based on a content analysis of two digital activism projects: 1) #WeHappyTrans*, a compilation of 59 YouTube video responses posted between 2012 and 2018, and 2) #TheGenderTag, a compilation of 704 YouTube video responses posted between 2016 and 2019. By analyzing the audio and visuals of a subsample (N=80) of these two archives using theoretical and emerging codes, I identified key themes as relevant to digital activism effectiveness and well-being. I discuss implications for policy, public health, healthcare, and community organizing in the conclusion. Contrasting prior medical sociology literature that is not presented from the perspective of trans people and primarily focuses on negative aspects of trans lived experience, I have employed a transfeminist methodology that centers self-definition and self-determination. My methods are heavily informed by transnormativity and intersectionality scholarship. In addition to providing an example of how transfeminist methodology can be applied in the context of digital media, this dissertation fills a crucial gap in literature focusing on qualities of trans lived experience that contribute to increased QoL. My hope is that the findings of this study will be considered collaboratively between scholars and activists in many contexts, including within the growing fields of health informatics technologies and trans public health. The findings of this study are also relevant to several ongoing discussions within the fields of sociology, public health, cultural and media studies, and queer and trans theory

    Listeners and readers generalise their experience with word meanings across modalities

    Get PDF
    Research has shown that adults’ lexical-semantic representations are surprisingly malleable. For instance, the interpretation of ambiguous words (e.g. bark) is influenced by experience such that recently encountered meanings become more readily available (Rodd et al., 2016, 2013). However the mechanism underlying this word-meaning priming effect remains unclear, and competing accounts make different predictions about the extent to which information about word meanings that is gained within one modality (e.g. speech) is transferred to the other modality (e.g. reading) to aid comprehension. In two web-based experiments, ambiguous target words were primed with either written or spoken sentences that biased their interpretation toward a subordinate meaning, or were unprimed. About 20 minutes after the prime exposure, interpretation of these target words was tested by presenting them in either written or spoken form, using word association (Experiment 1, N=78) and speeded semantic relatedness decisions (Experiment 2, N=181). Both experiments replicated the auditory unimodal priming effect shown previously (Rodd et al., 2016, 2013) and revealed significant cross-modal priming: primed meanings were retrieved more frequently and swiftly across all primed conditions compared to the unprimed baseline. Furthermore, there were no reliable differences in priming levels between unimodal and cross-modal prime-test conditions. These results indicate that recent experience with ambiguous word meanings can bias the reader’s or listener’s later interpretation of these words in a modality-general way. We identify possible loci of this effect within the context of models of long-term priming and ambiguity resolution

    Listeners and Readers Generalize Their Experience With Word Meanings Across Modalities

    Get PDF
    Research has shown that adults' lexical-semantic representations are surprisingly malleable. For instance, the interpretation of ambiguous words (e.g., bark) is influenced by experience such that recently encountered meanings become more readily available (Rodd et al., 2016, 2013). However, the mechanism underlying this word-meaning priming effect remains unclear, and competing accounts make different predictions about the extent to which information about word meanings that is gained within one modality (e.g., speech) is transferred to the other modality (e.g., reading) to aid comprehension. In two Web-based experiments, ambiguous target words were primed with either written or spoken sentences that biased their interpretation toward a subordinate meaning, or were unprimed. About 20 min after the prime exposure, interpretation of these target words was tested by presenting them in either written or spoken form, using word association (Experiment 1, N = 78) and speeded semantic relatedness decisions (Experiment 2, N = 181). Both experiments replicated the auditory unimodal priming effect shown previously (Rodd et al., 2016, 2013) and revealed significant cross-modal priming: primed meanings were retrieved more frequently and swiftly across all primed conditions compared with the unprimed baseline. Furthermore, there were no reliable differences in priming levels between unimodal and cross-modal prime-test conditions. These results indicate that recent experience with ambiguous word meanings can bias the reader's or listener's later interpretation of these words in a modality-general way. We identify possible loci of this effect within the context of models of long-term priming and ambiguity resolution

    Dreaming of Abolitionist Futures, Reconceptualizing Child Welfare: Keeping Kids Safe in the Age of Abolition

    Get PDF
    Drawing on the wisdom of prison abolitionists past and present, as well as evidence from interviews and analysis of Illinois’ Department of Children and Family Services (DCFS) procedural documents, this work argues that Illinois’ DCFS and the child protection system more broadly are an extension of the carceral state. Both the criminal punishment system and the child protection system (henceforth referred to as the family regulation system) use a diffuse network of actors to surveil, regulate, and punish the behavior of queer subjects: impoverished people and people of color. The present-day family regulation system builds on a long history of family regulation that predates the founding of the U.S., as is seen in chattel slavery, the cultural genocide of Native Americans, neoliberal and anti-welfare policy regimes, and continues today at the U.S.-Mexico border and in the formalized family regulation system (child protective services). This work explores how to keep children safe in the age of abolition, focusing on non-carceral responses that center strong, accountable communities and divest from dependence on the state
    • …
    corecore