402 resultados para Order-preserving Functions
Resumo:
The aim of this thesis is to show how character analysis can be used to approach conceptions of saga authorship in medieval Iceland. The idea of possession is a metaphor that is adopted early in the thesis, and is used to describe Icelandic sagas as works in which traditional material is subtly interpreted by medieval authors. For example, we can say that if authors claim greater possession of the sagas, they interpret, and not merely record, the sagas' historical information. On the other hand, tradition holds onto its possession of the narrative whenever it is not possible for an author to develop his own creative and historical interests. The metaphor of possession also underpins the character analysis in the thesis, which is based on the idea that saga authors used characters as a vehicle by which to possess saga narratives and so develop their own historical interests. The idea of possession signals the kinds of problems of authorship study which are addressed here, in particular, the question of the authors' sense of saga writing as an act either of preservation or of creation. While, in that sense, the thesis represents an additional voice in a long-standing debate about the saga writers' relation to their source materials, I argue against a clear-cut distinction between creative and non-creative authors, and focus instead on the wide variation in authorial control over saga materials. This variation suggests that saga authorship is a multi-functional activity, or one which co-exists with tradition. Further, by emphasising characterisation as a method, I am adding to the weight of scholarship that seeks to understand the sagas in terms of their literary effects. The Introduction and chapter one lay out the theoretical scope of this thesis. My aim in these first two sections is to inform the reader of the type of critical questions that arise when authorship is approached in relation to characterisation, and to suggest an interpretive framework with which to approach these questions. In the Introduction this aim manifests as a brief discussion of the application of the term "authorship" to the medieval Icelandic corpus, a definition of the scope of this study, and an introduction to the connections, made throughout this thesis, between saga authors, the sagas' narrative style, and the style of characterisation in the sagas. Chapter one is a far more detailed discussion of our ability to make these connections. In particular, the chapter develops the definition of the analytical term "secondary authorship" that I introduce in order to delineate the type of characterisation that is of most interest in this thesis. "Secondary authorship" is a literary term that aims to sharpen our approach to saga authors' relationship to their characters by focusing on characters who make representations about the events of the saga. The term refers to any instance in which characters behave in a manner that resembles the creativity, interpretation, and understanding associated with authorship more generally. Character analysis cannot, however, be divorced from socio-historical approaches to the saga corpus. Most importantly, the sagas themselves are socio-historical representations that claim some degree of truth value. This claim that the sagas make by implication about their historicity is the starting point of a discussion of authorship in medieval Iceland. Therefore, at the beginning of chapter one I discuss some of the approaches to the social context of saga writing. This discussion serves as an introduction to both the culture of saga writing in medieval Iceland and to the nature of the sagas' historical perspective, and reflects my sense that literary interpretations of the sagas cannot be isolated from the historical discourses that frame them. The chapter also discusses possession, which, as I note above, is used alongside the concept of secondary authorship to describe the saga authors' relationship with the stories and characters of the past. At the close of chapter one, I offer a preliminary list the various functions of saga authorship, and give some examples of secondary authorship. From this point I am able to tie my argument about secondary authorship to specific examples from the sagas. Chapter two examines the effect of family obligations and domestic points of view in the depiction of characters' choices and conception of themselves. The examples that are given in that chapter - from Gisla saga Súrssonar and Íslendinga saga - are the first of a number of textual analyses that demonstrate the application of the concepts of secondary authorship and possession of saga narratives. The relationship between narratives about national and domestic matters shows how authorial creativity in the area of kinship obligation provides the basis for the saga's development of historical themes. Thus, the two major case studies given in chapter two tie authorial engagement with characters to the most influential social institution in early and medieval Iceland, the family. The remaining chapters represent similar attempts to relate authorial possession of saga characters to central socio-historical themes in the sagas, such as the settlement process in early Iceland and its influence on the development of regional political life (chapter three). Likewise, the strong authorial interest in an Icelander's journey to Norway in Heimskringla is presented as evidence of the author's use of a saga character to express an Icelandic interpretation of Norwegian history and to promote a sense that Iceland shared the ownership of regal history with Norway (chapter four). In that authorial engagement with the Icelander abroad, we witness saga characterisation being used as a basis for historical interpretation and the means by which foreign traditions and influence, not least the narratives of royal lives and of the Christianisation, are claimed as part of medieval Icelanders' self-conception. While saga authors observe the conventions of saga narration, characters are often subtly positioned as the authors' interpretive mirrors, especially clear than when they act as secondary authors. Nowhere is this more apparent than in Brennu- Njáls saga, which contains many characters who voice the author's claim to interpret the past. Even Hrútr Herjólfsson, through his remarkable perception of events and his conspicuous comments about them, acts as a secondary author by enabling the author to emphasise the importance of the disposition of characters. In Laxdœla saga and Þorgils saga ok Hafliða, authorial interest in characters' perception is matched by the thematising of learning, from the inception of knowledge as prophecy or advice to complete understanding by saga characters (chapter six). In Þorgils saga skarða, a character's inner development from an excessively ambitious and politically ruthless youth to a Christian leader killed by his kinsman allows the author to shape a political life into a lesson about leadership and the community's ability to moderate and contain the behaviour of extraordinary individuals. The portrayal draws on methods of characterisation that we can identify in Grettis saga Ásmundarson, Fóstbrœðra saga, and Orkneyinga saga. A comparison of the characterisation of figures with intense political or military ambitions suggests that saga authors were interested in the community's ability to balance their strength and ability with a degree of social moderation. The discussion of these sagas shows that character study can be used to analyse how the saga authors added their own voice to the voices passed down to medieval Icelanders in traditional narratives. Authorial engagement with characters allowed inherited traditions about early Norway and Iceland and records of thirteenth century events to be transformed into sophisticated historical works with highly creative elements. Through secondary authorship, saga authors took joint-possession of narratives and contested the power of tradition in setting the interpretive framework of a saga.
Resumo:
Security protocols are designed in order to provide security properties (goals). They achieve their goals using cryptographic primitives such as key agreement or hash functions. Security analysis tools are used in order to verify whether a security protocol achieves its goals or not. The analysed property by specific purpose tools are predefined properties such as secrecy (confidentiality), authentication or non-repudiation. There are security goals that are defined by the user in systems with security requirements. Analysis of these properties is possible with general purpose analysis tools such as coloured petri nets (CPN). This research analyses two security properties that are defined in a protocol that is based on trusted platform module (TPM). The analysed protocol is proposed by Delaune to use TPM capabilities and secrets in order to open only one secret from two submitted secrets to a recipient
Resumo:
In Australian Associated Motor Insurers Ltd v McPaul; Council of the City of Gold Coast v McPaul [2005] QSC 278 the applicant insurer sought an order requiring a claimant who had been injured in a motor vehicle accident some years earlier when he was five years old to commence a proceeding to determine the question of the applicant's liability to him. The applicant's interest in seeking the order was to avoid the prejudice which could follow from further delay, particularly delay until the respondent became obliged to commence proceedings to avoid a limitations bar.
Resumo:
FROM KCWS 2011 CHAIRS AND SUMMIT PROCEEDING EDITORS In recent years, with the impact of global knowledge economy, a more comprehensive development approach has gained significant popularity. This new development approach, so called ‘knowledgebased development’, is different from its traditional predecessor. With a much more balanced focus on all of the four key development domains – economic, enviro-urban, institutional, and sociocultural – this contemporary approach, aims to bring economic prosperity, environmental sustainability and local institutional competence with a just socio-spatial order to our cities and regions. The ultimate goal of knowledge-based development is to produce a city purposefully designed to encourage the continuous production, circulation and commercialisation of social and scientific knowledge – this will in turn establish a ‘knowledge city’. A city following the ‘knowledge city’ concept embarks on a strategic mission to firmly encourage and nurture locally focussed innovation, science and creativity within the context of an expanding knowledge economy and society. In this regard a ‘knowledge city’ can be seen as an integrated city, which physically and institutionally combines the functions of a science and technology park with civic and residential functions and urban amenities. It also offers one of the effective paradigms for the sustainable cities of our time. This fourth edition of KCWS – The 4th Knowledge Cities World Summit 2011 – makes an important reminder that the 'knowledge city' concept is a key notion in the 21st Century development. Considering this notion, the Summit sheds light on the multi-faceted dimensions and various scales of building a ‘knowledge city’ via 'knowledge-based development' paradigm by particularly focusing on the overall Summit theme of ‘Knowledge Cities for Future Generations’. At this summit, the theoretical and practical maturing of knowledge-based development paradigms are advanced through the interplay between the world’s leading academics’ theories and the practical models and strategies of practitioners’ and policy makers’ drawn from around the world. This summit proceeding is compiled in order to disseminate the knowledge generated and shared in KCWS 2011 with the wider research, governance, and practice communities the knowledge cocreated in this summit. All papers of this proceeding have gone through a double-blind peer review process and been reviewed by our summit editorial review and advisory board members. We, organisers of the summit, cordially thank the members of the Summit Proceeding Editorial Review and Advisory Board for their diligent work in the review of the papers. We hope the papers in this proceeding will inspire and make a significant contribution to the research, governance, and practice circles.
Resumo:
In Kimtran Pty Ltd v Downie [2003] QDC 043 the court allowed in part an appeal from the refusal by the Queensland Building Tribunal to order the respondent liquidators pay the appellants' costs of proceedings in the Tribunal. The decision involved an examination of authorities which have considered the circumstances in which it is in the interests of justice to make an order for costs against a non-party.
Resumo:
In Kimtran v Downie [2003] QCA 424, the Queensland Court of Appeal allowed an appeal from the decision of a District Court judge who had ordered costs against a non-party liquidator. It held that the court's decision in relation to the awarding of costs against a liquidator was not constrained by the decision of the of the Court of Appeal in Mahaffey v Belar Pty Ltd [1999] QCA 2 in the manner stated in the District Court.
Resumo:
The article examines the decision in Erskine v McDowall [2001] QDC 192, where the Court considered an application for an order that the defendant disclose documents to which she had a right of access under the Freedom of Information Act 1982 (Cth).
Resumo:
Many students of calculus are not aware that the calculus they have learned is a special case (integer order) of fractional calculus. Fractional calculus is the study of arbitrary order derivatives and integrals and their applications. The article begins by stating a naive question from a student in a paper by Larson (1974) and establishes, for polynomials and exponential functions, that they can be deformed into their derivative using the μ-th order fractional derivatives for 0<μ<1. Through the power of Excel we illustrate the continuous deformations dynamically through conditional formatting. Some applications are discussed and a connection made to mathematics education.
Resumo:
The SOS screen, as originally described by Perkins et al. (1999), was setup with the aim of identifying Arabidopsis functions that might potentially be involved in the DNA metabolism. Such functions, when expressed in bacteria, are prone to disturb replication and thus trigger the SOS response. Consistently, expression of AtRAD51 and AtDMC1 induced the SOS response in bacteria, even affecting E. coli viability. 100 SOS-inducing cDNAs were isolated from a cDNA library constructed from an Arabidopsis cell suspension that was found to highly express meiotic genes. A large proportion of these SOS+ candidates are clearly related to the DNA metabolism, others could be involved in the RNA metabolism, while the remaining cDNAs encode either totally unknown proteins or proteins that were considered as irrelevant. Seven SOS+ candidate genes are induced following gamma irradiation. The in planta function of several of the SOS-inducing clones was investigated using T-DNA insertional mutants or RNA interference. Only one SOS+ candidate, among those examined, exhibited a defined phenotype: silenced plants for DUT1 were sensitive to 5-fluoro-uracil (5FU), as is the case of the leaky dut-1 mutant in E. coli that are affected in dUTPase activity. dUTPase is essential to prevent uracil incorporation in the course of DNA replication.
Resumo:
We prove that homogeneous bent functions f:GF(2)^2n --> GF(2) of degree n do not exist for n>3. Consequently homogeneous bent functions must have degree
Resumo:
We determine the affine equivalence classes of the eight variable degree three homogeneous bent functions using a new algorithm. Our algorithm applies to general bent functions and can systematically determine the automorphism groups. We provide a partial verification of the enumeration of eight variable degree three homogeneous bent functions obtained by Meng et al. We determine the affine equivalence classes of these functions.
Resumo:
Through a combinatorial approach involving experimental measurement and plasma modelling, it is shown that a high degree of control over diamond-like nanocarbon film sp3/sp2 ratio (and hence film properties) may be exercised, starting at the level of electrons (through modification of the plasma electron energy distribution function). Hydrogenated amorphous carbon nanoparticle films with high percentages of diamond-like bonds are grown using a middle-frequency (2 MHz) inductively coupled Ar + CH4 plasma. The sp3 fractions measured by X-ray photoelectron spectroscopy (XPS) and Raman spectroscopy in the thin films are explained qualitatively using sp3/sp2 ratios 1) derived from calculated sp3 and sp2 hybridized precursor species densities in a global plasma discharge model and 2) measured experimentally. It is shown that at high discharge power and lower CH4 concentrations, the sp3/sp2 fraction is higher. Our results suggest that a combination of predictive modeling and experimental studies is instrumental to achieve deterministically grown made-to-order diamond-like nanocarbons suitable for a variety of applications spanning from nano-magnetic resonance imaging to spin-flip quantum information devices. This deterministic approach can be extended to graphene, carbon nanotips, nanodiamond and other nanocarbon materials for a variety of applications
Resumo:
Recent research in the rapidly emerging field of plasmonics has shown the potential to significantly enhance light trapping inside thin-film solar cells by using metallic nanoparticles. In this article it is demonstrated the plasmon enhancement of optical absorption in amorphous silicon solar cells by using silver nanoparticles. Based on the analysis of the higher-order surface plasmon modes, it is shown how spectral positions of the surface plasmons affect the plasmonic enhancement of thin-film solar cells. By using the predictive 3D modeling, we investigate the effect of the higher-order modes on that enhancement. Finally, we suggest how to maximize the light trapping and optical absorption in the thin-film cell by optimizing the nanoparticle array parameters, which in turn can be used to fine tune the corresponding surface plasmon modes.
Resumo:
This paper addresses of the advanced computational technique of steel structures for both simulation capacities simultaneously; specifically, they are the higher-order element formulation with element load effect (geometric nonlinearities) as well as the refined plastic hinge method (material nonlinearities). This advanced computational technique can capture the real behaviour of a whole second-order inelastic structure, which in turn ensures the structural safety and adequacy of the structure. Therefore, the emphasis of this paper is to advocate that the advanced computational technique can replace the traditional empirical design approach. In the meantime, the practitioner should be educated how to make use of the advanced computational technique on the second-order inelastic design of a structure, as this approach is the future structural engineering design. It means the future engineer should understand the computational technique clearly; realize the behaviour of a structure with respect to the numerical analysis thoroughly; justify the numerical result correctly; especially the fool-proof ultimate finite element is yet to come, of which is competent in modelling behaviour, user-friendly in numerical modelling and versatile for all structural forms and various materials. Hence the high-quality engineer is required, who can confidently manipulate the advanced computational technique for the design of a complex structure but not vice versa.
Resumo:
Texture information in the iris image is not uniform in discriminatory information content for biometric identity verification. The bits in an iris code obtained from the image differ in their consistency from one sample to another for the same identity. In this work, errors in bit strings are systematically analysed in order to investigate the effect of light-induced and drug-induced pupil dilation and constriction on the consistency of iris texture information. The statistics of bit errors are computed for client and impostor distributions as functions of radius and angle. Under normal conditions, a V-shaped radial trend of decreasing bit errors towards the central region of the iris is obtained for client matching, and it is observed that the distribution of errors as a function of angle is uniform. When iris images are affected by pupil dilation or constriction the radial distribution of bit errors is altered. A decreasing trend from the pupil outwards is observed for constriction, whereas a more uniform trend is observed for dilation. The main increase in bit errors occurs closer to the pupil in both cases.