992 resultados para Power (Philosophy)
Resumo:
Abstract: Nietzsche's Will-to-Power Ontology: An Interpretation of Beyond Good and Evil § 36 By: Mark Minuk Will-to-power is the central component of Nietzsche's philosophy, and passage 36 of Beyond Good and Evil is essential to coming to an understanding of it. 1 argue for and defend the thesis that will-to-power constitutes Nietzsche's ontology, and offer a new understanding of what that means. Nietzsche's ontology can be talked about as though it were a traditional substance ontology (i.e., a world made up of forces; a duality of conflicting forces described as 'towards which' and 'away from which'). However, 1 argue that what defines this ontology is an understanding of valuation as ontologically fundamental—^the basis of interpretation, and from which a substance ontology emerges. In the second chapter, I explain Nietzsche's ontology, as reflected in this passage, through a discussion of Heidegger's two ontological categories in Being and Time (readiness-to-hand, and present-at-hand). In a nutshell, it means that the world of our desires and passions (the most basic of which is for power) is ontologically more fundamental than the material world, or any other interpretation, which is to say, the material world emerges out of a world of our desires and passions. In the first chapter, I address the problematic form of the passage reflected in the first sentence. The passage is in a hypothetical style makes no claim to positive knowledge or truth, and, superficially, looks like Schopenhaurian position for the metaphysics of the will, which Nietzsche rejects. 1 argue that the hypothetical form of the passage is a matter of style, namely, the style of a free-spirit for whom the question of truth is reframed as a question of values. In the third and final chapter, 1 address the charge that Nietzsche's interpretation is a conscious anthropomorphic projection. 1 suggest that the charge rests on a distinction (between nature and man) that Nietzsche rejects. I also address the problem of the causality of the will for Nietzsche, by suggesting that an alternative, perspectival form of causality is possible.
Resumo:
The goals of this project are manifold. First, I will attempt to discover evidence in the book of Joshua that will lend support to the theory of a Josianic influence enacted in the 7th century BCE. I will do this through an analysis of the rhetoric in selected stories in Joshua using the ideas of Foucault. Second, I will address the significance of this kind of analysis as having potential for the emancipation of oppressed peoples. The first section delineates scholarly discussion on the literary and historical context of the book of Joshua. These scholarly works are foundational to this study because they situate the text within a particular period in history and within certain ideologies. Chapter 2 discusses the work of Foucault and how his ideas will be applied to particular texts of the book of Joshua. The focused analysis of these texts occurs within chapters 3 to 6. Chapter 7 presents an integration of the observations made through the analyses performed in the previous chapters and expands on the ethical significance of this study.
Resumo:
In this work the problem of defects location in power systems is formulated through a binary linear programming (BLP) model based on alarms historical database of control and protection devices from the system control center, sets theory of minimal coverage (AI) and protection philosophy adopted by the electric utility. In this model, circuit breaker operations are compared to their expected states in a strictly mathematical manner. For solving this BLP problem, which presents a great number of decision variables, a dedicated Genetic Algorithm (GA), is proposed. Control parameters of the GA, such as crossing over and mutation rates, population size, iterations number and population diversification, are calibrated in order to obtain efficiency and robustness. Results for a test system found in literature, are presented and discussed. © 2004 IEEE.
Resumo:
This paper adjusts decentralized OPF optimization to the AC power flow problem in power systems with interconnected areas operated by diferent transmission system operators (TSO). The proposed methodology allows finding the operation point of a particular area without explicit knowledge of network data of the other interconnected areas, being only necessary to exchange border information related to the tie-lines between areas. The methodology is based on the decomposition of the first-order optimality conditions of the AC power flow, which is formulated as a nonlinear programming problem. To allow better visualization of the concept of independent operation of each TSO, an artificial neural network have been used for computing border information of the interconnected TSOs. A multi-area Power Flow tool can be seen as a basic building block able to address a large number of problems under a multi-TSO competitive market philosophy. The IEEE RTS-96 power system is used in order to show the operation and effectiveness of the decentralized AC Power Flow. ©2010 IEEE.
Resumo:
This paper critically examines the liberation theology of José Porfirio Miranda, as expressed in his Marx and the Bible (1971), with a focus on the central idea (and subtitle) of this work: the “Critique of the Philosophy of Oppression.” Miranda’s critique is examined via certain key tropes such as “power,” “justice,” and “freedom,” both in the context of late twentieth-century Latin American society, and in the state of the “post-Christian” and “post-Marxist” world more generally, vis-à-vis contemporary liberal justice theory. Close examination of the potentialities, paradoxes and subtle evasions in Miranda’s critique leads not to the conclusion that Miranda does not go far enough in his application of Christian principles to justice theory.
Resumo:
History and Identity in the Late Antique Near East gathers together the work of distinguished historians and early career scholars with a broad range of expertise to investigate the significance of newly emerged, or recently resurrected, ethnic identities on the borders of the eastern Mediterranean world. It focuses on the "long late antiquity" from the eve of the Arab conquest of the Roman East to the formation of the Abbasid caliphate. The first half of the book offers papers on the Christian Orient on the cusp of the Islamic invasions. These papers discuss how Christians negotiated the end of Roman power, whether in the selective use of the patristic past to create confessional divisions or the emphasis of the shared philosophical legacy of the Greco-Roman world. The second half of the book considers Muslim attempts to negotiate the pasts of the conquered lands of the Near East, where the Christian histories of Hira or Egypt were used to create distinctive regional identities for Arab settlers. Like the first half, this section investigates the redeployment of a shared history, this time the historical imagination of the Qu'ran and the era of the first caliphs. All the papers in the volume bring together studies of the invention of the past across traditional divides between disciplines, placing the re-assessment of the past as a central feature of the long late antiquity. As a whole, History and Identity in the Late Antique Near East represents a distinctive contribution to recent writing on late antiquity, due to its cultural breadth, its interdisciplinary focus, and its novel definition of late antiquity itself.
Resumo:
We invoke the ideal of tolerance in response to conflict, but what does it mean to answer conflict with a call for tolerance? Is tolerance a way of resolving conflicts or a means of sustaining them? Does it transform conflicts into productive tensions, or does it perpetuate underlying power relations? To what extent does tolerance hide its involvement with power and act as a form of depoliticization? Wendy Brown and Rainer Forst debate the uses and misuses of tolerance, an exchange that highlights the fundamental differences in their critical practice despite a number of political similarities. Both scholars address the normative premises, limits, and political implications of various conceptions of tolerance. Brown offers a genealogical critique of contemporary discourses on tolerance in Western liberal societies, focusing on their inherent ties to colonialism and imperialism, and Forst reconstructs an intellectual history of tolerance that attempts to redeem its political virtue in democratic societies. Brown and Forst work from different perspectives and traditions, yet they each remain wary of the subjection and abnegation embodied in toleration discourses, among other issues. The result is a dialogue rich in critical and conceptual reflections on power, justice, discourse, rationality, and identity.
Resumo:
Voting power is commonly measured using a probability. But what kind of probability is this? Is it a degree of belief or an objective chance or some other sort of probability? The aim of this paper is to answer this question. The answer depends on the use to which a measure of voting power is put. Some objectivist interpretations of probabilities are appropriate when we employ such a measure for descriptive purposes. By contrast, when voting power is used to normatively assess voting rules, the probabilities are best understood as classical probabilities, which count possibilities. This is so because, from a normative stance, voting power is most plausibly taken to concern rights and thus possibilities. The classical interpretation also underwrites the use of the Bernoulli model upon which the Penrose/Banzhaf measure is based.
Resumo:
"The addresses ... were given at various times and upon various occasions ... between 1927 and 1936."
Resumo:
In a post-Cold War, post-9/11 world, the advent of US global supremacy resulted in the installation, perpetuation, and dissemination of an Absolutist Security Agenda (hereinafter, ASA). The US ASA explicitly and aggressively articulates and equates US national security interests with the security of all states in the international system, and replaced the bipolar, Cold War framework that defined international affairs from 1945-1992. Since the collapse of the USSR and the 11 September 2001 terrorist attacks, the US has unilaterally defined, implemented, and managed systemic security policy. The US ASA is indicative of a systemic category of knowledge (security) anchored in variegated conceptual and material components, such as morality, philosophy, and political rubrics. The US ASA is based on a logic that involves the following security components: (1) hyper militarization, (2) intimidation,(3) coercion, (4) criminalization, (5) panoptic surveillance, (6) plenary security measures, and (7) unabashed US interference in the domestic affairs of select states. Such interference has produced destabilizing tensions and conflicts that have, in turn, produced resistance, revolutions, proliferation, cults of personality, and militarization. This is the case because the US ASA rests on the notion that the international system of states is an extension, instrument of US power, rather than a system and/or society of states comprised of functionally sovereign entities. To analyze the US ASA, this study utilizes: (1) official government statements, legal doctrines, treaties, and policies pertaining to US foreign policy; (2) militarization rationales, budgets, and expenditures; and (3) case studies of rogue states. The data used in this study are drawn from information that is publicly available (academic journals, think-tank publications, government publications, and information provided by international organizations). The data supports the contention that global security is effectuated via a discrete set of hegemonic/imperialistic US values and interests, finding empirical expression in legal acts (USA Patriot ACT 2001) and the concept of rogue states. Rogue states, therefore, provide test cases to clarify the breadth, depth, and consequentialness of the US ASA in world affairs vis-à-vis the relationship between US security and global security.
Resumo:
In a post-Cold War, post-9/11 world, the advent of US global supremacy resulted in the installation, perpetuation, and dissemination of an Absolutist Security Agenda (hereinafter, ASA). The US ASA explicitly and aggressively articulates and equates US national security interests with the security of all states in the international system, and replaced the bipolar, Cold War framework that defined international affairs from 1945-1992. Since the collapse of the USSR and the 11 September 2001 terrorist attacks, the US has unilaterally defined, implemented, and managed systemic security policy. The US ASA is indicative of a systemic category of knowledge (security) anchored in variegated conceptual and material components, such as morality, philosophy, and political rubrics. The US ASA is based on a logic that involves the following security components: 1., hyper militarization, 2., intimidation, 3., coercion, 4., criminalization, 5., panoptic surveillance, 6., plenary security measures, and 7., unabashed US interference in the domestic affairs of select states. Such interference has produced destabilizing tensions and conflicts that have, in turn, produced resistance, revolutions, proliferation, cults of personality, and militarization. This is the case because the US ASA rests on the notion that the international system of states is an extension, instrument of US power, rather than a system and/or society of states comprised of functionally sovereign entities. To analyze the US ASA, this study utilizes: 1., official government statements, legal doctrines, treaties, and policies pertaining to US foreign policy; 2., militarization rationales, budgets, and expenditures; and 3., case studies of rogue states. The data used in this study are drawn from information that is publicly available (academic journals, think-tank publications, government publications, and information provided by international organizations). The data supports the contention that global security is effectuated via a discrete set of hegemonic/imperialistic US values and interests, finding empirical expression in legal acts (USA Patriot ACT 2001) and the concept of rogue states. Rogue states, therefore, provide test cases to clarify the breadth, depth, and consequentialness of the US ASA in world affairs vis-a-vis the relationship between US security and global security.