7,916 research outputs found

    Biopower, governmentality, and capitalism through the lenses of freedom: a conceptual enquiry

    Get PDF
    In this paper I propose a framework to understand the transition in Foucault’s work from the disciplinary model to the governmentality model. Foucault’s work on power emerges within the general context of an expression of capitalist rationality and the nature of freedom and power within it. I argue that, thus understood, Foucault’s transition to the governmentality model can be seen simultaneously as a deepening recognition of what capitalism is and how it works, but also the recognition of the changing historical nature of the actually existing capitalisms and their specifically situated historical needs. I then argue that the disciplinary model should be understood as a contingent response to the demands of early capitalism, and argue that with the maturation of the capitalist enterprise many of those responses no longer are necessary. New realities require new responses; although this does not necessarily result in the abandonment of the earlier disciplinary model, it does require their reconfiguration according to the changed situation and the new imperatives following from it

    Ranking Problems in Multivariate Normal (Statistical) Populations Semiannual Progress Report No. 1, 1 Jul. - 31 Dec. 1966

    Get PDF
    Differential difference equations involving noncentral chi-square density and distribution functions for solving minimization problem in selection from multivariate normal population

    Nonparametric ranking and selection procedures Final report, 1 Oct. 1968 - 30 Sep. 1969

    Get PDF
    Research and development of nonparametric methodology in statistical ranking and selection procedure

    Ranking problems in multivariate normal /statistical/ populations Final report, 1 Jul. 1966 - 30 Jun. 1967

    Get PDF
    Theory and solutions for ranking problems in multivariate normal statistical population

    Ranking problems in multivariate normal (statistical) populations (first year work). Nonparametric ranging and selection procedures (second year work)

    Get PDF
    Optimal selection of automation systems under multivariate normal model in terms of reliability, feasibility, and econom

    Been there, done it, badge it! Information literacy and the use of digital badges at Middlesex University

    Get PDF
    This article demonstrates the use of digital badges available from the Mozilla Foundation and embedded in the Middlesex University Virtual Learning Environment to motivate and engage Pre-sessional students in the learning of information literacy skills

    A New Scheme for Minimizing Malicious Behavior of Mobile Nodes in Mobile Ad Hoc Networks

    Get PDF
    The performance of Mobile Ad hoc networks (MANET) depends on the cooperation of all active nodes. However, supporting a MANET is a cost-intensive activity for a mobile node. From a single mobile node perspective, the detection of routes as well as forwarding packets consume local CPU time, memory, network-bandwidth, and last but not least energy. We believe that this is one of the main factors that strongly motivate a mobile node to deny packet forwarding for others, while at the same time use their services to deliver its own data. This behavior of an independent mobile node is commonly known as misbehaving or selfishness. A vast amount of research has already been done for minimizing malicious behavior of mobile nodes. However, most of them focused on the methods/techniques/algorithms to remove such nodes from the MANET. We believe that the frequent elimination of such miss-behaving nodes never allowed a free and faster growth of MANET. This paper provides a critical analysis of the recent research wok and its impact on the overall performance of a MANET. In this paper, we clarify some of the misconceptions in the understating of selfishness and miss-behavior of nodes. Moreover, we propose a mathematical model that based on the time division technique to minimize the malicious behavior of mobile nodes by avoiding unnecessary elimination of bad nodes. Our proposed approach not only improves the resource sharing but also creates a consistent trust and cooperation (CTC) environment among the mobile nodes. The simulation results demonstrate the success of the proposed approach that significantly minimizes the malicious nodes and consequently maximizes the overall throughput of MANET than other well known schemes.Comment: 10 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS July 2009, ISSN 1947 5500, Impact Factor 0.42

    Selection from Multivariate Normal Populations

    Get PDF
    Selection from multivariate normal population

    On selection procedures based on ranks - Counterexamples concerning least favorable configurations

    Get PDF
    Multiple decision procedures based on ranking methods proprosed for analyzing data in one-way layou

    Reflections on using iSpring quizzes for Information Literacy training at Middlesex University

    Get PDF
    Reflections on choosing, designing and delivering Undergraduate Library Inductions and Information Literacy sessions using iSpring online quiz software
    • …
    corecore