Spelling suggestions: "subject:"want"" "subject:"wang""
191 |
How to Look Good Naked 'on the couch' : psychoanalytic approaches to British makeover television and genderThomadaki, Theodora January 2017 (has links)
This project formulates an original psycho-cultural approach by studying the cultural and therapeutic value of Gok Wan’s makeover series How To Look Good Naked. Through an in-depth application of Donald Woods Winnicott’s object relations psychoanalysis to the textual narratives of the makeover show, and by developing a viewing method that derives from psychoanalytic training on observation, this thesis offers an account of the affective impact of Gok Wan’s popular makeover phenomenon. This thesis addresses key themes and elements that signal the evolution of British makeover television and identifies how Gok Wan’s format and strategies chime with what has widely been hailed as a particularly ‘therapeutic’ moment in popular culture. The emblematic features of Gok Wan’s rendition of the makeover format highlights its potential positive outcomes by examining the articulation of current embodied feminine subjective experiences, in order to interrogate the complex relationship between postfeminism and therapeutic discourse. This thesis recognises that the therapeutic opportunity of Gok Wan’s method lies in the transformational process by creating emotionally constructive spaces where the articulation of experiences leads to inner self-discovery. Playful mechanisms of creativity are central to Gok Wan’s empathetic approach to working with participants to enable transformation, reflecting a number of key themes in object relations psychoanalysis and its understanding of self-experience. The opportunities afforded to participants for self-interpretation create a useful platform to reflect on Gok Wan’s role, who has been candid about the parallels between his own emotional experience and that of his participants. Psychoanalytic models of transference and countertransference indicate how this dynamic challenges dominant notions of the makeover expert as omnipotent. This project demonstrates the value of object relations psychoanalysis for critical interventions in the field of media, cultural and feminist studies in order to provide a deeper understanding of the affective impact of makeover television in shaping notions of subjective experience.
|
192 |
Projeto de um serviço configurável de detecção de defeitos / Design of a configurable failure detection serviceBalbinot, Jeysonn Isaac January 2007 (has links)
A detecção de defeitos pode ser usada como base no projeto de algoritmos e aplicações distribuídas que dependem, de alguma forma, de informações de estado sobre processos distribuídos. O problema de acordo entre processos (consenso), que é um dos problemas fundamentais da computação distribuída, bem como difusão atômica (atomic broadcast), eleição de líder (leader election) e gerenciamento de grupos (membership) necessitam de informações de estado dos processos envolvidos, portanto, do resultado da atividade dos detectores. Esses protocolos, geralmente, são usados como blocos básicos para a construção de outros algoritmos, serviços ou aplicações distribuídas tolerantes a falhas. Os detectores de defeitos, de forma prática, têm sido desenvolvidos com base em parâmetros funcionais de redes locais e não operam bem no contexto de sistemas distribuídos de larga escala e de redes de longa distância (WANs). Sistemas conectados por WANs, geralmente, oferecem um ambiente mais hostil do que as LANs e clusters, devido aos atrasos longos e variáveis e à maior probabilidade de ocorrência de defeitos de temporização (flutuações na latência de comunicação) e omissão (perdas de mensagens), impondo um desafio na concepção de mecanismos que detectem defeitos de forma completa, precisa e que atendam a requisitos de dependabilidade exigidos pelas aplicações. A detecção de defeitos, também, pode ser oferecida na forma de um serviço, podendo ser este serviço utilizado por diferentes aplicações, sem que estas necessitem agregar a implementação do detector em seus projetos. Neste trabalho, foram pesquisadas estratégias aplicáveis à organização e à comunicação entre módulos de detecção de defeitos, focando sistemas de larga escala que operem sobre WANs. Está sendo proposto um modelo de serviço configurável que opera sob demanda das aplicações, e utiliza uma organização hierárquica dos módulos detectores de defeitos. Com base nesse modelo, foi implementado e testado um protótipo, utilizando o framework de simulação Neko. Os testes avaliaram a utilização da estratégia hierárquica com base no tipo e número de mensagens trocadas pelo serviço durante sua operação. Os resultados mostraram que adotar a hierarquia em dois níveis (LAN e WAN) resulta em poucas mensagens adicionais de controle e significativa redução do número de mensagens trafegando entre redes locais. O serviço tirou proveito do conhecimento da topologia da rede e escalou bem, quando um número maior de máquinas foi utilizado. Adicionalmente, para ajustar dinamicamente a detecção aos atrasos impostos pelas WANs, foi utilizado o pacote de predição de timeout do AFDService. / The failure detection may be used as basis for the design of algorithms and distributed applications that need information about the state of distributed processes. The agreement problem among processes (consensus) is one of the fundamental problems in distributed computing as well as other protocols such as atomic broadcast, leader election and membership that also need information about involved processes and consequently need also the results from the failure detector activity. These protocols are generally used as basic blocks to design other algorithms, services or fault-tolerant distributed applications. The failure detectors, in practice, have been developed based on local network parameters; consequently they are not tuned for the context of large-scale distributed systems nor wide area networks (WANs). Systems interconnected by WANs generally are environments more adverse than LAN and traditional clusters, due to variable and long delays and more prone to timing and omission failures. A natural consequence is that it is challenging to develop mechanisms that can accurately detect failures and give the needed support for dependability requirements of the applications. The failure detection may also be offered as a service for the different applications, which do not need to include their own detectors in their design. In this work are investigated strategies previously defined and applied on the communication of failure detector modules, focusing the analysis on large scale systems on WANs. From this, we propose a configurable failure detection service model that works on demand of applications and adopts the hierarchical organization of failure detection modules. Based on this model, a prototype implementation has been developed and tested using Neko simulation framework. The tests evaluate the utilization of hierarchical strategy based on the type and number of messages exchanged by the service during its operation. The experiments show that the two-level (LAN and WAN) hierarchical structure adopted results in a few additional control messages and a significant reduction on the message traffic between local networks. The service uses the knowledge of the topology and scales well when many machines are used. Additionally, to dynamically adjust the delay imposed by WANs on time detection, the timeout prediction package of AFDService has been used.
|
193 |
Projeto de um serviço configurável de detecção de defeitos / Design of a configurable failure detection serviceBalbinot, Jeysonn Isaac January 2007 (has links)
A detecção de defeitos pode ser usada como base no projeto de algoritmos e aplicações distribuídas que dependem, de alguma forma, de informações de estado sobre processos distribuídos. O problema de acordo entre processos (consenso), que é um dos problemas fundamentais da computação distribuída, bem como difusão atômica (atomic broadcast), eleição de líder (leader election) e gerenciamento de grupos (membership) necessitam de informações de estado dos processos envolvidos, portanto, do resultado da atividade dos detectores. Esses protocolos, geralmente, são usados como blocos básicos para a construção de outros algoritmos, serviços ou aplicações distribuídas tolerantes a falhas. Os detectores de defeitos, de forma prática, têm sido desenvolvidos com base em parâmetros funcionais de redes locais e não operam bem no contexto de sistemas distribuídos de larga escala e de redes de longa distância (WANs). Sistemas conectados por WANs, geralmente, oferecem um ambiente mais hostil do que as LANs e clusters, devido aos atrasos longos e variáveis e à maior probabilidade de ocorrência de defeitos de temporização (flutuações na latência de comunicação) e omissão (perdas de mensagens), impondo um desafio na concepção de mecanismos que detectem defeitos de forma completa, precisa e que atendam a requisitos de dependabilidade exigidos pelas aplicações. A detecção de defeitos, também, pode ser oferecida na forma de um serviço, podendo ser este serviço utilizado por diferentes aplicações, sem que estas necessitem agregar a implementação do detector em seus projetos. Neste trabalho, foram pesquisadas estratégias aplicáveis à organização e à comunicação entre módulos de detecção de defeitos, focando sistemas de larga escala que operem sobre WANs. Está sendo proposto um modelo de serviço configurável que opera sob demanda das aplicações, e utiliza uma organização hierárquica dos módulos detectores de defeitos. Com base nesse modelo, foi implementado e testado um protótipo, utilizando o framework de simulação Neko. Os testes avaliaram a utilização da estratégia hierárquica com base no tipo e número de mensagens trocadas pelo serviço durante sua operação. Os resultados mostraram que adotar a hierarquia em dois níveis (LAN e WAN) resulta em poucas mensagens adicionais de controle e significativa redução do número de mensagens trafegando entre redes locais. O serviço tirou proveito do conhecimento da topologia da rede e escalou bem, quando um número maior de máquinas foi utilizado. Adicionalmente, para ajustar dinamicamente a detecção aos atrasos impostos pelas WANs, foi utilizado o pacote de predição de timeout do AFDService. / The failure detection may be used as basis for the design of algorithms and distributed applications that need information about the state of distributed processes. The agreement problem among processes (consensus) is one of the fundamental problems in distributed computing as well as other protocols such as atomic broadcast, leader election and membership that also need information about involved processes and consequently need also the results from the failure detector activity. These protocols are generally used as basic blocks to design other algorithms, services or fault-tolerant distributed applications. The failure detectors, in practice, have been developed based on local network parameters; consequently they are not tuned for the context of large-scale distributed systems nor wide area networks (WANs). Systems interconnected by WANs generally are environments more adverse than LAN and traditional clusters, due to variable and long delays and more prone to timing and omission failures. A natural consequence is that it is challenging to develop mechanisms that can accurately detect failures and give the needed support for dependability requirements of the applications. The failure detection may also be offered as a service for the different applications, which do not need to include their own detectors in their design. In this work are investigated strategies previously defined and applied on the communication of failure detector modules, focusing the analysis on large scale systems on WANs. From this, we propose a configurable failure detection service model that works on demand of applications and adopts the hierarchical organization of failure detection modules. Based on this model, a prototype implementation has been developed and tested using Neko simulation framework. The tests evaluate the utilization of hierarchical strategy based on the type and number of messages exchanged by the service during its operation. The experiments show that the two-level (LAN and WAN) hierarchical structure adopted results in a few additional control messages and a significant reduction on the message traffic between local networks. The service uses the knowledge of the topology and scales well when many machines are used. Additionally, to dynamically adjust the delay imposed by WANs on time detection, the timeout prediction package of AFDService has been used.
|
194 |
A Performance Study of VM Live Migration over the WANMohammad, Taha, Eati, Chandra Sekhar January 2015 (has links)
Virtualization is the key technology that has provided the Cloud computing platforms a new way for small and large enterprises to host their applications by renting the available resources. Live VM migration allows a Virtual Machine to be transferred form one host to another while the Virtual Machine is active and running. The main challenge in Live migration over WAN is maintaining the network connectivity during and after the migration. We have carried out live VM migration over the WAN migrating different sizes of VM memory states and presented our solutions based on Open vSwitch/VXLAN and Cisco GRE approaches. VXLAN provides the mobility support needed to maintain the network connectivity between the client and the Virtual machine. We have setup an experimental testbed to calculate the concerned performance metrics and analyzed the performance of live migration in VXLAN and GRE network. Our experimental results present that the network connectivity was maintained throughout the migration process with negligible signaling overhead and minimal downtime. The downtime variation experience with change in the applied network delay was relatively higher when compared to variation experienced when migrating different VM memory states. The total migration time experienced showed a strong relationship with size of the migrating VM memory state. / 0763472814
|
195 |
A PMIPv6 Approach to Maintain Network Connectivity during VM Live Migration over the Internet / A PMIPv6 Approach to Maintain Network Connectivity during VM Live Migration over the InternetKassahun, Solomon, Demissie, Atinkut January 2013 (has links)
Live migration is a mechanism that allows a VM to be moved from one host to another while the guest operating system is running. Current live migration implementations are able to maintain network connectivity in a LAN. However, the same techniques cannot be applied for live migration over the Internet. We present a solution based on PMIPv6, a light-weight mobility protocol standardized by IETF. PMIPv6 handles node mobility without requiring any support from the moving nodes. In addition, PMIPv6 works with IPv4, IPv6 and dual-stack nodes. We have setup a testbed to measure the performance of live migration in a PMIPv6 network. Our results show that network connectivity is successfully maintained with little signaling overhead and short VM downtime. As far as we know, this is the first time PMIPv6 is used to enable live migration beyond the scope of a LAN.
|
196 |
Hospodářská diplomacie Tchaj-wanu / Commercial diplomacy of TaiwanŠilhavík, Marek January 2012 (has links)
The area of economic cooperation represents one of the most important components of the country's foreign policy due to its special international status. The diploma thesis is divided into four parts. The first chapter deals with the theoretical definition of economic diplomacy. The basic characteristics of the land are mentioned in the second chapter, the third part deals with the structure of commercial diplomacy in Taiwan and the last section compares bilateral relations with Taiwan's diplomatic ally and the country without official diplomatic relations.
|
197 |
Nezápadní přístupy ke státnosti / Non-Western Approaches to StatehoodKarmazin, Aleš January 2019 (has links)
This thesis studies the variation of sovereignty in the international order by analysing how the general model of sovereignty is localised in the political practice of two major non-Western rising powers - China and India. I argue that their sovereignty should be understood as liquid despite the fact that these two countries are very often seen as strong defenders of 'conservative', 'absolutist' or 'Westphalian' sovereignty. The empirical core of the thesis investigates China's approach to sovereignty in relation to Hong Kong and Taiwan and India's approach to sovereignty in relation to Bhutan and Kashmir. Based on theoretical eclecticism and pluralism, I develop a theoretical and analytical framework that accounts for constitution (construction) of the sovereignty of China and India but that also have potential for being applied more broadly. It is calibrated to elucidate that sovereignty is a liquid and fluid phenomenon. It is based on the debate between Hans Kelsen and Carl Schmitt and analytically enhanced by including the perspective of scaling (derived from Human Geography) and temporal positioning (inspired by International Relations debates on the role of time). I propose three key argument. First, I show that each of the analysed states simultaneously pursues two different modes of...
|
198 |
Jag har inte hittat Gud, men jag har hittat musiken : En kvalitativ textanalys om religiösa teman i svensk gangsterrapTellebo, Ellinor January 2022 (has links)
This study aims to show how religion is presented in four Swedish gangster rappers’ lyrics: Einár, Yasin, Dree Low and Ant Wan. This is done partly by looking at if the same religious themes, showed from earlier studies about american gangster rap, also appears in the Swedish lyrics, and if new theme can be found, partly by looking at Hjelm’s (2014) theory about “The new visibility of religion” and apply it on the results. The following research questions are formulated to conduct said research: (1) Can some of the themes that appears in Tinajero (2013) and Walsh (2013) studies also be found in the gangster rappers’ lyrics? If so, which ones? (2) Which other themes can be found in the lyrics? and (3) How is religion presented, based on Hjelm’s theory about the new visibility of religion? The method used in this study is a qualitative text analysis, with thematization and categorization. The study shows that four themes can be found in the gangster rappers’lyrics: the paradox between the ‘street life’ and the religious life, resurrection, God as a mainstay and a protector, and forgiveness from (a judging) God. The study also shows that the presentation of religion as a solution or problem tended to focus on an individual level, rather than a societal level, and to be more positive than negative, with religion as an important function in the rappers’ life. / Studiens syfte har varit att ta reda på hur religion framställs i de fyra svenska gangsterrapparna Einar, Yasin, Dree Low och Ant Wans låttexter. Dels genom att se om samma teman återkommer i den svenska gangsterrappen som den amerikanska, och om nya teman kan finnas, dels genom Hjelms teori om religionens nya synlighet (2014). Frågeställningarna för att uppnå detta var ”Går några av de teman som återkommer i Tinajero (2013) och Walsh (2013) studier att återfinna i gangsterrapparnas låtar? I så fall vilka?”, ”Vilka andra religiösa teman går att återfinna i låtarna?” och ”Hur framställs religion, utifrån Hjelms teori om religionens nya synlighet? (2014)”. Metoden som användes för att besvara frågorna var en kvalitativ textanalys baserad på Malteruds (2014) tillvägagångssätt med tematiseringar och kategoriseringar av texter, genom distans och närläsning. Teorin som applicerades i denna studie, och som ligger till grund för analyskapitlet var Hjelms (2014) teori om religionens nya synlighet (the new visibility of religion). De slutsatser som dragits visar bland annat att två teman från den tidigare forskningen också gick att återfinna i de svenska gangsterrapparnas låtar; ”paradoxen mellan ’the street life’ och det religiösa livet” och ”uppståndelse”, samtidigt som även två nya teman kunde utläsas; ”Gud som stöttepelare och beskyddare”, samt ”förlåtelsen av (en dömande) Gud”. En annan slutsats, baserat på teorin, var att religionens framställning visade sig vara så väl positiv som negativ, men att den största delen av religionens framställning/synlighet i låtarna var positiv, där religionen tenderar att fylla en viktig funktion i raparnas liv. Slutligen, så visar analysen av resultatet att i de sammanhang där religionen var synlig så låg fokuset av religionens roll på en individnivå och inte samhällsnivå. Det vill säga; när religionen antingen framställdes som något negativt eller som något positivt så var det i mening av hur det påverkade de enskilda rapparna och deras nära, och inte hur religionen påverkade samhället i stort.
|
199 |
Security Analysis of a Software Defined Wide Area Network SolutionRajendran, Ashok January 2016 (has links)
Enterprise wide area network (WAN) is a private network that connects the computers and other devices across an organisation's branch locations and the data centers. It forms the backbone of enterprise communication. Currently, multiprotocol label switching (MPLS) is commonly used to provide this service. As a recent alternative to MPLS, software-dened wide area networking (SD-WAN) solutions are being introduced as an IP based cloud-networking service for enterprises. SD-WAN virtualizes the networking service and eases the complexity of conguring and managing the enterprise network by moving these tasks to software and a central controller. The introduction of new technologies causes concerns about their security. Also, this new solution is introduced as a replacement for MPLS, which has been considered secure and has been in use for more than 16 years. Thus, there is a need to analyze the security of SD-WAN, which is the goal of this thesis. In this thesis, we perform a security analysis of a commercial SD-WAN solution, by finding its various attack surfaces, associated vulnerabilities and design weaknesses. We choose Nuage VNS, an SD-WAN product provided by Nuage Networks, as the analysis target. As a result, many attack surfaces and security weaknesses were found and reported, especially in the Customer Premises Equipment (CPE). In particular, we found vulnerabilities in the CPE's secure bootstrapping method and demonstrated some attacks by exploiting them. Finally, we propose mitigation steps to avoid the attacks. The results of this thesis will help both the service provider and the SD-WAN solution vendor to know about the attack surfaces and weaknesses of SD-WAN before o ering it to their customers. We also help in implementing the temporary countermeasures to mitigate the attacks. The results have been presented to the service provider and the vendor of the SD-WAN product.
|
200 |
Discurso conceptual y gráfico de la justicia cruel en la saga Saw (2004-2010)Vergel Rodríguez, Marylin Madeleine Karina 07 July 2015 (has links)
Muchas personas se preguntan por qué veo películas tan “feas” y siempre respondo lo
mismo: “Las veo porque me asustan, se me escarapela el cuerpo; por ende, me gustan. Me
gusta la sensación del miedo y de la repugnancia”.
Lo que más atrae de estas películas son las emociones diversas que provocan en el
espectador. Sin embargo, eso no es lo único que me interesa, sino también los personajes
que encarnan estas emociones y, sobre todo, el discurso sobre la justicia y la ambivalencia.
La construcción ambivalente los vuelve más complejos y genera en el espectador una
explosión de emociones. Parece ser que estas personalidades ficticias tienen un gusto por lo
abyecto y eso tiene un motivo.
Es por esto que he querido dirigir mi gusto por lo abyecto del discurso de estas
películas y por los personajes antihéroes hacia el análisis de una de las sagas que más me ha
gustado: Saw. En ella confluye el terror, el gore y lo complejo del personaje antihéroe que
tanta acogida ha tenido en los últimos años. Mi trabajo se centra en un análisis de la
temática de la justicia cruel y cómo está representada tanto en lo visual como en lo
conceptual. En otras palabras, cómo los elementos visuales ayudan a exacerbar la crueldad
que se muestra en la justicia del psicópata de Saw; además de indagar más sobre los
motivos y las consecuencias que tienen sus actos, implicados también en la explicación de
la justicia cruel del personaje.
|
Page generated in 0.0494 seconds