7,916 research outputs found
Biopower, governmentality, and capitalism through the lenses of freedom: a conceptual enquiry
In this paper I propose a framework to understand the transition in Foucault’s work from the disciplinary model to the governmentality model. Foucault’s work on power emerges within the general context of an expression of capitalist rationality and the nature of freedom and power within it. I argue that, thus understood, Foucault’s transition to the governmentality model can be seen simultaneously as a deepening recognition of what capitalism is and how it works, but also the recognition of the changing historical nature of the actually existing capitalisms and their specifically situated historical needs. I then argue that the disciplinary model should be understood as a contingent response to the demands of early capitalism, and argue that with the maturation of the capitalist enterprise many of those responses no longer are necessary. New realities require new responses; although this does not necessarily result in the abandonment of the earlier disciplinary model, it does require their reconfiguration according to the changed situation and the new imperatives following from it
Ranking Problems in Multivariate Normal (Statistical) Populations Semiannual Progress Report No. 1, 1 Jul. - 31 Dec. 1966
Differential difference equations involving noncentral chi-square density and distribution functions for solving minimization problem in selection from multivariate normal population
Nonparametric ranking and selection procedures Final report, 1 Oct. 1968 - 30 Sep. 1969
Research and development of nonparametric methodology in statistical ranking and selection procedure
Ranking problems in multivariate normal /statistical/ populations Final report, 1 Jul. 1966 - 30 Jun. 1967
Theory and solutions for ranking problems in multivariate normal statistical population
Ranking problems in multivariate normal (statistical) populations (first year work). Nonparametric ranging and selection procedures (second year work)
Optimal selection of automation systems under multivariate normal model in terms of reliability, feasibility, and econom
Been there, done it, badge it! Information literacy and the use of digital badges at Middlesex University
This article demonstrates the use of digital badges available from the Mozilla Foundation and embedded in the Middlesex University Virtual Learning Environment to motivate and engage Pre-sessional students in the learning of information literacy skills
A New Scheme for Minimizing Malicious Behavior of Mobile Nodes in Mobile Ad Hoc Networks
The performance of Mobile Ad hoc networks (MANET) depends on the cooperation
of all active nodes. However, supporting a MANET is a cost-intensive activity
for a mobile node. From a single mobile node perspective, the detection of
routes as well as forwarding packets consume local CPU time, memory,
network-bandwidth, and last but not least energy. We believe that this is one
of the main factors that strongly motivate a mobile node to deny packet
forwarding for others, while at the same time use their services to deliver its
own data. This behavior of an independent mobile node is commonly known as
misbehaving or selfishness. A vast amount of research has already been done for
minimizing malicious behavior of mobile nodes. However, most of them focused on
the methods/techniques/algorithms to remove such nodes from the MANET. We
believe that the frequent elimination of such miss-behaving nodes never allowed
a free and faster growth of MANET. This paper provides a critical analysis of
the recent research wok and its impact on the overall performance of a MANET.
In this paper, we clarify some of the misconceptions in the understating of
selfishness and miss-behavior of nodes. Moreover, we propose a mathematical
model that based on the time division technique to minimize the malicious
behavior of mobile nodes by avoiding unnecessary elimination of bad nodes. Our
proposed approach not only improves the resource sharing but also creates a
consistent trust and cooperation (CTC) environment among the mobile nodes. The
simulation results demonstrate the success of the proposed approach that
significantly minimizes the malicious nodes and consequently maximizes the
overall throughput of MANET than other well known schemes.Comment: 10 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS July 2009, ISSN 1947 5500, Impact Factor 0.42
Selection from Multivariate Normal Populations
Selection from multivariate normal population
On selection procedures based on ranks - Counterexamples concerning least favorable configurations
Multiple decision procedures based on ranking methods proprosed for analyzing data in one-way layou
Reflections on using iSpring quizzes for Information Literacy training at Middlesex University
Reflections on choosing, designing and delivering Undergraduate Library Inductions and Information Literacy sessions using iSpring online quiz software
- …