2,014 research outputs found

    Metaphorical Interpretations of the Neurotic Paradox

    Get PDF
    This is a theoretical/philosophical paper which is intended to bring to the reader\u27s attention an emerging literature and discussion which holds potentially productive consequences for the understanding of man. This thesis does not offer completed formulations or empirical groundings. The purpose is to create a basis for dialogue. This paper will initially specify a current conflict in psychology around the different metaphors used to define the image of man. A theoretical/philosophical basis for viewing the process of generating models of man and his behavior as essentially metaphorical is then presented. A specific category of human behavior known as the neurotic paradox (henceforth abbreviated NP) is defined and a review of literature on the root metaphorical interpretations of the NP is discussed. The prominent extant models of human behavior reviewed in this discussion are those based on the metaphors Spirit, Disease, Machine, and Seed. The limitations of each model will be discussed with regard to that model\u27s adequacy to provide understanding of the four basic defining characteristics of the NP. This section constitutes the main body of the thesis. This evaluative discussion of the theoretical/philosophical inadequacies of each model is intended to bring to light the process and strategies (both explicit and implicit) which have evolved in the interpretation of the image of man

    Appendix: The Sleeves From our Vest: Naming a Perpetuities Non-event

    Get PDF
    Professors Mark Reutlinger and John Weaver examine the conceptual dilemma that Professor Reutlinger encountered in the course of developing the series of diagrams to illustrate the Rule Against Perpetuities described in the accompanying article. To describe it briefly (if not simply), the perpetuities period for a special or testamentary power of appointment begins when the power is created (not exercised), and it ends when the appointed interest vests. Applying the relation back doctrine, the appointment is treated, for perpetuities purposes, as if it were a gift by the donor, rather than the donee. Under the second look doctrine, however, one may take into consideration events and circumstances existing at the time of exercise in determining whether, when viewed as of the time of creation, the appointed interest violates the Rule

    Appendix: The Sleeves From our Vest: Naming a Perpetuities Non-event

    Get PDF
    Professors Mark Reutlinger and John Weaver examine the conceptual dilemma that Professor Reutlinger encountered in the course of developing the series of diagrams to illustrate the Rule Against Perpetuities described in the accompanying article. To describe it briefly (if not simply), the perpetuities period for a special or testamentary power of appointment begins when the power is created (not exercised), and it ends when the appointed interest vests. Applying the relation back doctrine, the appointment is treated, for perpetuities purposes, as if it were a gift by the donor, rather than the donee. Under the second look doctrine, however, one may take into consideration events and circumstances existing at the time of exercise in determining whether, when viewed as of the time of creation, the appointed interest violates the Rule

    Investigation of Strain Aging in the Ordered Intermetallic Compound beta-NiAl

    Get PDF
    The phenomenon of strain aging has been investigated in polycrystalline and single crystal NiAl alloys at temperatures between 300 and 1200 K. Static strain aging studies revealed that after annealing at 1100 K for 7200 s (i.e., 2h) followed by furnace cooling, high purity, nitrogen-doped and titanium-doped polycrystalline alloys exhibited continuous yielding, while conventional-purity and carbon-doped alloys exhibited distinct yield points and Luders strains. Prestraining by hydrostatic pressurization removed the yield points, but they could be reintroduced by further annealing treatments. Yield points could be reintroduced more rapidly if the specimens were prestrained uniaxially rather than hydrostatically, owing to the arrangement of dislocations into cell structures during uniaxial deformation. The time dependence of the strain aging events followed at t(exp 2/3) relationship suggesting that the yield points observed in polycrystalline NiAl were the result of the pinning of mobile dislocations by interstitials, specifically carbon. Between 700 and 800 K, yield stress plateaus, yield stress transients upon a ten-fold increase in strain rate, work hardening peaks, and dips in the strain rate sensitivity (SRS) have been observed in conventional-purity and carbon-doped polycrystals. In single crystals, similar behavior was observed; in conventional-purity single crystals, however, the strain rate sensitivity became negative resulting in serrated yielding, whereas, the strain rate sensitivity stayed positive in high purity and in molybdenum-doped NiAl. These observations are indicative of dynamic strain aging (DSA) and are discussed in terms of conventional strain aging theories. The impact of these phenomena on the composition-structure-property relations are discerned. Finally, a good correlation has been demonstrated between the properties of NiAl alloys and a recently developed model for strain aging in metals and alloys developed by Reed-Hill et al

    Hebb's Accomplishments Misunderstood

    Get PDF
    Amit's efforts to provide stronger theoretical and empirical support for Hebb's cell-assembly concept is admirable, but we have serious reservations about the perspective presented in the target article. For Hebb, the cell assembly was a building block; by contrast, the framework proposed here eschews the need to fit the assembly into a broader picture of its function

    Association Between Fire-Related Particulate Matter Exposure and Childhood Asthma in Peru: A Burden of Disease Assessment

    Get PDF
    We explore the connection between exposure to particulate matter from forest fire emissions in the Peruvian Amazon and pediatric asthma incidence. The bulk of research and media coverage surrounding the Amazon Rainforest fires has focused on important environmental issues, yet the direct impact that these fires have on the health of children living nearby remains underexplored. We conducted a burden of disease assessment using publicly available data to estimate the number of incident pediatric asthma cases attributable to long term exposure to ambient particulate matter smaller than 2.5 microns (PM2.5) resulting from increased forest fires in the Peruvian Amazon. Our model compares pediatric asthma burden that would have resulted from a more “typical'' fire year, such as 2009, with that from 2016, a severe fire year, by applying PM2.5 concentrations from each of those years to the same 2016 population. We estimate that 75,160 (95 % CI 28,638, 121,682) pediatric asthma cases in 2016 were attributable to PM2.5, whereas counterfactually applying the 2009 PM2.5 concentrations would have resulted in 9,636 (95 % CI 5,657, 13,615) fewer attributable cases. Thus, our results suggest that increased forest fire emissions have led to a notable increase in pediatric asthma burden in Peru

    A Churn for the Better: Localizing Censorship using Network-level Path Churn and Network Tomography

    Get PDF
    Recent years have seen the Internet become a key vehicle for citizens around the globe to express political opinions and organize protests. This fact has not gone unnoticed, with countries around the world repurposing network management tools (e.g., URL filtering products) and protocols (e.g., BGP, DNS) for censorship. However, repurposing these products can have unintended international impact, which we refer to as "censorship leakage". While there have been anecdotal reports of censorship leakage, there has yet to be a systematic study of censorship leakage at a global scale. In this paper, we combine a global censorship measurement platform (ICLab) with a general-purpose technique -- boolean network tomography -- to identify which AS on a network path is performing censorship. At a high-level, our approach exploits BGP churn to narrow down the set of potential censoring ASes by over 95%. We exactly identify 65 censoring ASes and find that the anomalies introduced by 24 of the 65 censoring ASes have an impact on users located in regions outside the jurisdiction of the censoring AS, resulting in the leaking of regional censorship policies
    corecore