430 research outputs found
Illuminating the Trauma of the Closet Among Sexual Minorities: A Cinematic-Phenomenological Study of Existential Rights
This dissertation is a phenomenological research study about the lived experience of being in the closet as a sexual minority. This study’s research findings are represented in two distinct but overlapping ways: a traditional written hermeneutic interpretation, and a short film called “Illuminate” which cinematically brings to life the closeted lifeworld. To produce this film, I developed an innovative research method called “cinematic-phenomenology.” As a researcher, I conducted phenomenological research interviews with five self-identified sexual minorities about their lived experiences of being in the closet. During interviews, I helped participants describe their felt sense of the closet through symbolic imagery, by guiding them to language their feelings using Eugene Gendlin’s body-focused psychotherapy technique Focusing. I also conducted a thematic interpretation of participants’ data using Max Van Manen’s approach to hermeneutic phenomenological interpretation. My research findings led to the following key insight: that the phenomenon of the closet entails a traumatic loss of existential rights—the right to truth, freedom, love, hope, and power. Then, as a filmmaker, I collaborated with cinematographers, actors and musicians to produce a phenomenological short film called “Illuminate” which visually illustrates these existential themes of the closet via poetic cinematography. All imagery in the film is directly inspired by research participants’ embodied and metaphoric descriptions of what being in the closet felt like for them personally. The final short film can be viewed at www.illuminatethecloset.com. It seeks to make visible the invisible trauma that the closet inflicts, illuminate how sociopolitical oppression deprives marginalized minorities of their existential rights, and instill empathy, compassion, and hope among viewers. “Illuminate” is the first film to be produced by the Phenomenological Film Collective, a community-engaged filmmaking group I have founded which utilizes my cinematic-phenomenological research method to produce social advocacy films (pfcollective.com
Energy Efficient Clustered Routing Strategy For WSN
Wireless sensor network alludes in the route of a group of spatially dedicated sensors for screening, accumulating the normal information in distant zones and sending the gathered knowledge to a central region. In past a few methodologies that cut back the vitality utilization by actualizing efficient steering conventions had been presented. Every sensor hub detects learning and transmits it to its bunch head. Bunch head mix information from its group and transmit the gathered learning to the base station. A few vitality sparing gradable directing conventions are upheld inside the past like LEACH, HEED, PEGASIS, and TBC. TBC (Tree-based for the most part Clustering) convention is another change over HEED convention that executes intra-bunch correspondence to downsize vitality utilization. each bunch head go about as the root hub of the tree and every sensor hub transmit information to close hub that lies on the on account of the root hub. This convention circulates the vitality stack over all part hubs and thusly adjusts the general vitality utilization of the system. To draw out the system life, this work executes another tree-based bunch steering technique called Tree-Based Energy Efficient Clustering Protocol (TBEEC) (TBEEC). Amid this work, the hub having the lesser separation to the base station and preferable vitality over the contrary hubs of the bunch is hoisted as the group set out toward aspherical. All hubs of group forward their insight to the bunch head by exploitation elective halfway hubs that lie on the on account of the bunch head. Further, amid this work between bunch correspondence is authorized to downsize the vitality utilization. Each group head as opposed to sending blend information on to the base station appearance for halfway bunch head that untruths nearly the base station. This form information must go at the lesser separation that finishes in vitality sparing that delays the system life. The arranged convention beats the confinement of existing TBC convention. The reproduction comes about demonstrate that the arranged convention performs higher than the predominant directing conventions like LEACH, HEED, PEGASIS, and TBC
Interrupting Heteronormativity: Lesbian, Gay, Bisexual, and Transgender Pedagogy and Responsible Teaching at Syracuse University
https://surface.syr.edu/books/1014/thumbnail.jp
Recommended from our members
Implementing pediatric inpatient asthma pathways.
ObjectivePathways are succinct, operational versions of evidence-based guidelines. Studies have demonstrated pathways improve quality of care for children hospitalized with asthma, but we have limited information on other key factors to guide hospital leaders and clinicians in pathway implementation efforts. Our objective was to evaluate the adoption, implementation, and reach of inpatient pediatric asthma pathways.MethodsThis was a mixed-methods study of hospitals participating in a national collaborative to implement pathways. Data sources included electronic surveys of implementation leaders and staff, field observations, and chart review of children ages 2-17 years admitted with a primary diagnosis of asthma. Outcomes included adoption by hospitals, pathway implementation factors, and reach of pathways to children hospitalized with asthma. Quantitative data were analyzed using descriptive statistics and multivariable regression. Qualitative data were analyzed using thematic content analysis.ResultsEighty-five hospitals enrolled; 68 (80%) adopted/completed the collaborative. These 68 hospitals implemented pathways with overall high fidelity, implementing a median of 5 of 5 core pathway components (Interquartile Range [IQR] 4-5) in a median of 5 months (IQR 3-9). Implementation teams reported a median time cost of 78 h (IQR: 40-120) for implementation. Implementation leaders reported the values of pathway implementation included improvements in care, enhanced interdisciplinary collaboration, and access to educational resources. Leaders reported barriers in modifying electronic health records (EHRs), and only 63% of children had electronic pathway orders placed.ConclusionsHospitals implemented pathways with high fidelity. Barriers in modifying EHRs may have limited the reach of pathways to children hospitalized with asthma
Automatic Number Plate Recognition Using Raspberry Pi2 in Shovel-Dumper Combination
A designing of a system which captures the image of the number plate automatically of a Shovel-Dumper combination and these details were verified using Raspberry Pi2 processor for authentication. This system captures the number plate of shovel and dumper further processing for the character recognition. Automation is the most frequently spelled term in the field of electronics. The hunger for automation brought many revolutions in the existing technologies. This paper makes use of an onboard computer, which is commonly termed as Raspberry Pi2 processor. It acts as heart of the project. This onboard computer can efficiently communicate with the output and input modules which are being used. The device which is able to perform the task is a Raspberry Pi2 processor. When any vehicle passes by the system, the image of the number plate of every vehicle is captured using camera. The image of the number plate details are fed as input to the Raspberry Pi2 processor. The Processor takes responsibility to check the authentication details of every shover and dumper. Once the details are recognized then the processor operates it detects an unauthorized image of number plate was detected. To perform this task, Raspberry Pi processor is programmed using embedded ‘Raspbian’
Automatic Number Plate Recognition Using Raspberry Pi2 in Shovel-Dumper Combination
A designing of a system which captures the image of the number plate automatically of a Shovel-Dumper combination and these details were verified using Raspberry Pi2 processor for authentication. This system captures the number plate of shovel and dumper further processing for the character recognition. Automation is the most frequently spelled term in the field of electronics. The hunger for automation brought many revolutions in the existing technologies. This paper makes use of an onboard computer, which is commonly termed as Raspberry Pi2 processor. It acts as heart of the project. This onboard computer can efficiently communicate with the output and input modules which are being used. The device which is able to perform the task is a Raspberry Pi2 processor. When any vehicle passes by the system, the image of the number plate of every vehicle is captured using camera. The image of the number plate details are fed as input to the Raspberry Pi2 processor. The Processor takes responsibility to check the authentication details of every shover and dumper. Once the details are recognized then the processor operates it detects an unauthorized image of number plate was detected. To perform this task, Raspberry Pi processor is programmed using embedded ‘Raspbian’
- …