887 resultados para Representations of algebras
Resumo:
Dissertação para obtenção do Grau de Mestre em Engenharia Electrotécnica e de Computadores
Resumo:
Tese apresentada para cumprimento dos requisitos necessários à obtenção do grau de Doutor em Geografia e Planeamento Territorial - Especialidade: Geografia Humana
Resumo:
In a world that has moved away from narratives based on the idea of progress, the past has established itself as a place of reference: confirming to ourselves that what we were is indispensible for sustaining what we think we are. The recovery of the past is thus one of the most common symbolic instruments used in negotiating identities. The cultural practices that have recourse to representation mechanisms that call on the past in order to consider the present always end up translating themselves, insofar as they fragment, reorganize and interpret it in their transformation, or, to use a formula that has become unavoidable, in their “invention”. Patrimonialization is one such practice. It associates the notion of heritage – which is not a given fact, but rather a socially constructed classification, and therefore one that is constantly being negotiated – with specific objects that come to serve as cultural representations of the groups who consider themselves to be their rightful owners. In the Lisbon Metropolitan Area, as in other ethnographic contexts, patrimonialization encompasses things as diverse as landscapes, monuments, popular architecture, handicrafts, local feast days/processions/pilgrimages and people; all things that can, once transformed into material representations of the past, serve as arguments for the identity fictions of the people who inhabit them.
Resumo:
Nowadays, the consumption of goods and services on the Internet are increasing in a constant motion. Small and Medium Enterprises (SMEs) mostly from the traditional industry sectors are usually make business in weak and fragile market sectors, where customized products and services prevail. To survive and compete in the actual markets they have to readjust their business strategies by creating new manufacturing processes and establishing new business networks through new technological approaches. In order to compete with big enterprises, these partnerships aim the sharing of resources, knowledge and strategies to boost the sector’s business consolidation through the creation of dynamic manufacturing networks. To facilitate such demand, it is proposed the development of a centralized information system, which allows enterprises to select and create dynamic manufacturing networks that would have the capability to monitor all the manufacturing process, including the assembly, packaging and distribution phases. Even the networking partners that come from the same area have multi and heterogeneous representations of the same knowledge, denoting their own view of the domain. Thus, different conceptual, semantic, and consequently, diverse lexically knowledge representations may occur in the network, causing non-transparent sharing of information and interoperability inconsistencies. The creation of a framework supported by a tool that in a flexible way would enable the identification, classification and resolution of such semantic heterogeneities is required. This tool will support the network in the semantic mapping establishments, to facilitate the various enterprises information systems integration.
Resumo:
In seeking to advance the possibility of justice, gender and postcolonial studies have argued for the importance of the study of masculinities, through the acknowledgment that a richer understanding of such gendered formations may provide the basis for recognition of the Other and that, left uncriticised, such formations may be continuously delineated by the reproduction of systems of domination. The current study finds as its object the representations of masculinities in J. M. Coetzee’s Boyhood (1997), Youth (2002) and Summertime (2009). As works of transition in terms of Coetzee’s oeuvre - post-apartheid and post-Disgrace - the trilogy provides an account of the development of a man through several stages of life. While portraying the tensions of different geographical and cultural locations, such as apartheid South Africa and the London of the Sixties, the trilogy articulates the various norms that impact in the formation of gender, particularly of masculinities, through a complex system of power relations. The adherence to such norms is never linear, as the trilogy provides imaginative accounts of the contradictions that assist in the formulation of gender, depicting both the allure and the terror that constitute hegemonic masculinity. Located in the intersection of gender and postcolonial studies, the present study is based on the works by Raewyn Connell on masculinities. Animated by such a critical framework, the main research question of the present study is whether the trilogy advances a notion of masculinity that differs from the traditional rigid model, that is, whether there is resistance to hegemonic masculinity and what the spaces inhabited by the subaltern are. It is suggested that the trilogy presents the reader with instances of resistance to normative formulations of masculinity, by contrasting domination with the possibility of justice, and advancing an understanding of the often fatal consequences of gender norms to one’s sense of being in the world.
Resumo:
The chapter presents a theoretical proposal of three analytical models of Adult Learning and Education (ALE) policies. Some analytical categories and the corresponding dimensions are organised according to the ALE rationale which is typical of each social policy model. Historical, cultural and educational features are mentioned in connexion with the different policy models and its interpretative capacity to making sense of policies and practices implemented in Germany, Portugal and Sweden. !e analysis includes the states of the art and the official representations of ALE produced by the respective national authorities through national reports which were presented to CONFINTEA VI (2009).
Resumo:
Creativity and its promotion are widespread concerns in education. However, few efforts have been made to implement intervention programs designed to promote creativity and other related aspects (e.g., academic motivation). The Future Problem Solving Program International (FPSPI), aimed for training creativity representations and creative problem solving skills in young people, has been one of the most implemented programs. This intervention’s materials and activities were adapted for Portuguese students, and a longitudinal study was conducted. The program was implemented during four months, in weekly sessions, by thirteen teachers. Teachers received previous training for the program and during the program’s implementation. Intervention participants included 77 Basic and Secondary Education students, and control participants included 78 equivalent students. Pretest-posttest measures of academic motivation and creativity representations were collected. Results suggest a significant increase, in the intervention group, in motivation and the appropriate representations of creativity. Practical implications and future research perspectives are presented.
Resumo:
We prove that the Cuntz semigroup is recovered functorially from the Elliott invariant for a large class of C¤-algebras. In particular, our results apply to the largest class of simple C¤-algebras for which K-theoretic classification can be hoped for. This work has three significant consequences. First, it provides new conceptual insight into Elliott's classification program, proving that the usual form of the Elliott conjecture is equivalent, among Z-stable algebras, to a conjecture which is in general substantially weaker and for which there are no known counterexamples. Second and third, it resolves, for the class of algebras above, two conjectures of Blackadar and Handelman concerning the basic structure of dimension functions on C¤-algebras. We also prove in passing that the Kuntz-Pedersen semigroup is recovered functorially from the Elliott invariant for all simple unital C¤-algebras of interest.
Resumo:
In this paper we obtain several model structures on DblCat, the category of small double categories. Our model structures have three sources. We first transfer across a categorification-nerve adjunction. Secondly, we view double categories as internal categories in Cat and take as our weak equivalences various internal equivalences defined via Grothendieck topologies. Thirdly, DblCat inherits a model structure as a category of algebras over a 2-monad. Some of these model structures coincide and the different points of view give us further results about cofibrant replacements and cofi brant objects. As part of this program we give explicit descriptions and discuss properties of free double categories, quotient double categories, colimits of double categories, and several nerves and categorifications.
Resumo:
The determination of characteristic cardiac parameters, such as displacement, stress and strain distribution are essential for an understanding of the mechanics of the heart. The calculation of these parameters has been limited until recently by the use of idealised mathematical representations of biventricular geometries and by applying simple material laws. On the basis of 20 short axis heart slices and in consideration of linear and nonlinear material behaviour we have developed a FE model with about 100,000 degrees of freedom. Marching Cubes and Phong's incremental shading technique were used to visualise the three dimensional geometry. In a quasistatic FE analysis continuous distribution of regional stress and strain corresponding to the endsystolic state were calculated. Substantial regional variation of the Von Mises stress and the total strain energy were observed at all levels of the heart model. The results of both the linear elastic model and the model with a nonlinear material description (Mooney-Rivlin) were compared. While the stress distribution and peak stress values were found to be comparable, the displacement vectors obtained with the nonlinear model were generally higher in comparison with the linear elastic case indicating the need to include nonlinear effects.
Resumo:
This study addresses the issue of the presence of a unit root on the growth rate estimation by the least-squares approach. We argue that when the log of a variable contains a unit root, i.e., it is not stationary then the growth rate estimate from the log-linear trend model is not a valid representation of the actual growth of the series. In fact, under such a situation, we show that the growth of the series is the cumulative impact of a stochastic process. As such the growth estimate from such a model is just a spurious representation of the actual growth of the series, which we refer to as a “pseudo growth rate”. Hence such an estimate should be interpreted with caution. On the other hand, we highlight that the statistical representation of a series as containing a unit root is not easy to separate from an alternative description which represents the series as fundamentally deterministic (no unit root) but containing a structural break. In search of a way around this, our study presents a survey of both the theoretical and empirical literature on unit root tests that takes into account possible structural breaks. We show that when a series is trendstationary with breaks, it is possible to use the log-linear trend model to obtain well defined estimates of growth rates for sub-periods which are valid representations of the actual growth of the series. Finally, to highlight the above issues, we carry out an empirical application whereby we estimate meaningful growth rates of real wages per worker for 51 industries from the organised manufacturing sector in India for the period 1973-2003, which are not only unbiased but also asymptotically efficient. We use these growth rate estimates to highlight the evolving inter-industry wage structure in India.
Resumo:
The trace of a square matrix can be defined by a universal property which, appropriately generalized yields the concept of "trace of an endofunctor of a small category". We review the basic definitions of this general concept and give a new construction, the "pretrace category", which allows us to obtain the trace of an endofunctor of a small category as the set of connected components of its pretrace. We show that this pretrace construction determines a finite-product preserving endofunctor of the category of small categories, and we deduce from this that the trace inherits any finite-product algebraic structure that the original category may have. We apply our results to several examples from Representation Theory obtaining a new (indirect) proof of the fact that two finite dimensional linear representations of a finite group are isomorphic if and only if they have the same character.
Resumo:
KNOTS are usually categorized in terms of topological properties that are invariant under changes in a knot's spatial configuration(1-4). Here we approach knot identification from a different angle, by considering the properties of particular geometrical forms which we define as 'ideal'. For a knot with a given topology and assembled from a tube of uniform diameter, the ideal form is the geometrical configuration having the highest ratio of volume to surface area. Practically, this is equivalent to determining the shortest piece of tube that can be closed to form the knot. Because the notion of an ideal form is independent of absolute spatial scale, the length-to-diameter ratio of a tube providing an ideal representation is constant, irrespective of the tube's actual dimensions. We report the results of computer simulations which show that these ideal representations of knots have surprisingly simple geometrical properties. In particular, there is a simple linear relationship between the length-to-diameter ratio and the crossing number-the number of intersections in a two-dimensional projection of the knot averaged over all directions. We have also found that the average shape of knotted polymeric chains in thermal equilibrium is closely related to the ideal representation of the corresponding knot type. Our observations provide a link between ideal geometrical objects and the behaviour of seemingly disordered systems, and allow the prediction of properties of knotted polymers such as their electrophoretic mobility(5).
Resumo:
This paper addresses the issue of policy evaluation in a context in which policymakers are uncertain about the effects of oil prices on economic performance. I consider models of the economy inspired by Solow (1980), Blanchard and Gali (2007), Kim and Loungani (1992) and Hamilton (1983, 2005), which incorporate different assumptions on the channels through which oil prices have an impact on economic activity. I first study the characteristics of the model space and I analyze the likelihood of the different specifications. I show that the existence of plausible alternative representations of the economy forces the policymaker to face the problem of model uncertainty. Then, I use the Bayesian approach proposed by Brock, Durlauf and West (2003, 2007) and the minimax approach developed by Hansen and Sargent (2008) to integrate this form of uncertainty into policy evaluation. I find that, in the environment under analysis, the standard Taylor rule is outperformed under a number of criteria by alternative simple rules in which policymakers introduce persistence in the policy instrument and respond to changes in the real price of oil.
Resumo:
AbstractDigitalization gives to the Internet the power by allowing several virtual representations of reality, including that of identity. We leave an increasingly digital footprint in cyberspace and this situation puts our identity at high risks. Privacy is a right and fundamental social value that could play a key role as a medium to secure digital identities. Identity functionality is increasingly delivered as sets of services, rather than monolithic applications. So, an identity layer in which identity and privacy management services are loosely coupled, publicly hosted and available to on-demand calls could be more realistic and an acceptable situation. Identity and privacy should be interoperable and distributed through the adoption of service-orientation and implementation based on open standards (technical interoperability). Ihe objective of this project is to provide a way to implement interoperable user-centric digital identity-related privacy to respond to the need of distributed nature of federated identity systems. It is recognized that technical initiatives, emerging standards and protocols are not enough to guarantee resolution for the concerns surrounding a multi-facets and complex issue of identity and privacy. For this reason they should be apprehended within a global perspective through an integrated and a multidisciplinary approach. The approach dictates that privacy law, policies, regulations and technologies are to be crafted together from the start, rather than attaching it to digital identity after the fact. Thus, we draw Digital Identity-Related Privacy (DigldeRP) requirements from global, domestic and business-specific privacy policies. The requirements take shape of business interoperability. We suggest a layered implementation framework (DigldeRP framework) in accordance to model-driven architecture (MDA) approach that would help organizations' security team to turn business interoperability into technical interoperability in the form of a set of services that could accommodate Service-Oriented Architecture (SOA): Privacy-as-a-set-of- services (PaaSS) system. DigldeRP Framework will serve as a basis for vital understanding between business management and technical managers on digital identity related privacy initiatives. The layered DigldeRP framework presents five practical layers as an ordered sequence as a basis of DigldeRP project roadmap, however, in practice, there is an iterative process to assure that each layer supports effectively and enforces requirements of the adjacent ones. Each layer is composed by a set of blocks, which determine a roadmap that security team could follow to successfully implement PaaSS. Several blocks' descriptions are based on OMG SoaML modeling language and BPMN processes description. We identified, designed and implemented seven services that form PaaSS and described their consumption. PaaSS Java QEE project), WSDL, and XSD codes are given and explained.