854 resultados para Homosexuality in literature
Resumo:
Facility location concerns the placement of facilities, for various objectives, by use of mathematical models and solution procedures. Almost all facility location models that can be found in literature are based on minimizing costs or maximizing cover, to cover as much demand as possible. These models are quite efficient for finding an optimal location for a new facility for a particular data set, which is considered to be constant and known in advance. In a real world situation, input data like demand and travelling costs are not fixed, nor known in advance. This uncertainty and uncontrollability can lead to unacceptable losses or even bankruptcy. A way of dealing with these factors is robustness modelling. A robust facility location model aims to locate a facility that stays within predefined limits for all expectable circumstances as good as possible. The deviation robustness concept is used as basis to develop a new competitive deviation robustness model. The competition is modelled with a Huff based model, which calculates the market share of the new facility. Robustness in this model is defined as the ability of a facility location to capture a minimum market share, despite variations in demand. A test case is developed by which algorithms can be tested on their ability to solve robust facility location models. Four stochastic optimization algorithms are considered from which Simulated Annealing turned out to be the most appropriate. The test case is slightly modified for a competitive market situation. With the Simulated Annealing algorithm, the developed competitive deviation model is solved, for three considered norms of deviation. At the end, also a grid search is performed to illustrate the landscape of the objective function of the competitive deviation model. The model appears to be multimodal and seems to be challenging for further research.
Resumo:
Introduction: Breast Phyllodes tumors are rare breast tumors present in less than 1% of new cases of breast cancer, usually occurring among middle-aged women (40-50 yrs). Objective: This study shows diagnostic experience, surgical management and follows up of patients with this disease during a period of ten years in a oncology referral center. Methods: Retrospectively, breast cancer registries at the institution were reviewed, identifying 77 patients with Phyllodes tumors between 2002 and 2012, who had been operated on at the Instituto de Cancerología – Clínica Las Américas, in Medellín (Colombia). Clinical and histopathological data belonging to these cases was captured and analyzed and descriptive statistics were used. Results: The follow up median was 22.5 months (IQR: 10.5-60.0), average age was 47.2 yrs (SD: 12.4), mean tumor size was 3.6 cm (SD: 4.6), 88.3% of the patients (68 cases) presented negative margins and none of them received adjuvant chemotherapy. Of the patients with Phyllodes tumors; 33.8% had benign, 31.2% had borderline and 35.0% had malignant tumor. Disease-free survival was 85.8% and overall survival was 94.5%. Discussion: Reported data in this article is in accordance with what has been reported in worldwide literature. In our cohort even the high mean size of the tumors, the risk of local relapse and metastatic disease is low than previously reported in literature. Trials with longer follow up and molecular trials in Phyllodes tumors are necessary to understand the behavior of these tumors in Hispanics population.
Resumo:
The purpose of this dissertation is to study literary representations of Eastern Europe in the works of celebrated and less-known American authors, who visited and narrated the region between the mid-1960s and early 2000s. The main critical body focuses on Eastern Europe before 1989 and encompasses three major voices of American literature: John Updike, Joyce Carol Oates, and Philip Roth. However, in the last chapter I also explore American literary perceptions of the area following the collapse of communism. Importantly, the term “Eastern Europe” as used in this dissertation is charged with significance. I approach it not only as a space on the map or the geopolitical construct which emerged in the aftermath of the Second World War, but rather as a conceptual category and a repository of meanings built out of fact and fantasy: specific historical, political and cultural realities interlaced with subjective worldviews, preconceptions, and mental images. The critical framework of this dissertation is twofold. I reach for the concept of liminality to elucidate the indeterminacy and malleability which lies at the heart of the object of study—the idea, image, and experience of Eastern Europe. Bearing in mind the nature of the works under analysis, all of which were inspired by actual visits behind the Iron Curtain, I propose to interpret these transatlantic literary journeys in terms of generative experience, where Eastern Europe is mapped as a liminal space of possibility; a contact zone between cultures and, potentially, the locus of self-discovery and individual transformation. If liminality is the metaphor or a lens that I employ in order to account for the nature of the analyzed works and the complex terrain they map, imagology, whose purpose is to study the processes of constructing selfhood and otherness in literature, provides me with the method and the critical vocabulary for analyzing selected literary representations. The dissertation is divided into six chapters, the last of which serves as coda to the previous discussion. The first two chapters constitute the critical foundation of this work. Then, in chapters 3, 4, and 5 I study American images of Eastern Europe in the works written by John Updike, Joyce Carol Oates, and Philip Roth, respectively. The last, sixth chapter of this dissertation is divided into two parts. In the first one, I discuss new critical perspectives and avenues of research in the study of Eastern Europe following the collapse of communism. Then, I carry out a joint analysis of four works written after 1989 by Eva Hoffman, Arthur Phillips, John Beckman, and Gary Shteyngart. The dissertation ends with conclusions in which I summarize my findings and reflections, and suggest implications for future research. As this dissertation seeks to demonstrate, Eastern Europe portrayed in the analyzed works oscillates between contradictory representations which are contingent upon a number of factors, most importantly who maps it and in what context. Even though each experience of Eastern Europe is distinct and fueled by the profiles, identities, and interests of the characters and their creators, I have found out that certain patterns of othering are present in all the works. Thus, my research seems to suggest that there is something of a recurrent literary image of Eastern Europe, which goes beyond the context of the Cold War. Accordingly, while this dissertation hopes to be a valid contribution to the study of literary and cultural mappings of Eastern Europe, it also generates new questions regarding the current, post-communist representation of the area and its relationship to the national tropes explored in my work.
Resumo:
With wireless vehicular communications, Vehicular Ad Hoc Networks (VANETs) enable numerous applications to enhance traffic safety, traffic efficiency, and driving experience. However, VANETs also impose severe security and privacy challenges which need to be thoroughly investigated. In this dissertation, we enhance the security, privacy, and applications of VANETs, by 1) designing application-driven security and privacy solutions for VANETs, and 2) designing appealing VANET applications with proper security and privacy assurance. First, the security and privacy challenges of VANETs with most application significance are identified and thoroughly investigated. With both theoretical novelty and realistic considerations, these security and privacy schemes are especially appealing to VANETs. Specifically, multi-hop communications in VANETs suffer from packet dropping, packet tampering, and communication failures which have not been satisfyingly tackled in literature. Thus, a lightweight reliable and faithful data packet relaying framework (LEAPER) is proposed to ensure reliable and trustworthy multi-hop communications by enhancing the cooperation of neighboring nodes. Message verification, including both content and signature verification, generally is computation-extensive and incurs severe scalability issues to each node. The resource-aware message verification (RAMV) scheme is proposed to ensure resource-aware, secure, and application-friendly message verification in VANETs. On the other hand, to make VANETs acceptable to the privacy-sensitive users, the identity and location privacy of each node should be properly protected. To this end, a joint privacy and reputation assurance (JPRA) scheme is proposed to synergistically support privacy protection and reputation management by reconciling their inherent conflicting requirements. Besides, the privacy implications of short-time certificates are thoroughly investigated in a short-time certificates-based privacy protection (STCP2) scheme, to make privacy protection in VANETs feasible with short-time certificates. Secondly, three novel solutions, namely VANET-based ambient ad dissemination (VAAD), general-purpose automatic survey (GPAS), and VehicleView, are proposed to support the appealing value-added applications based on VANETs. These solutions all follow practical application models, and an incentive-centered architecture is proposed for each solution to balance the conflicting requirements of the involved entities. Besides, the critical security and privacy challenges of these applications are investigated and addressed with novel solutions. Thus, with proper security and privacy assurance, these solutions show great application significance and economic potentials to VANETs. Thus, by enhancing the security, privacy, and applications of VANETs, this dissertation fills the gap between the existing theoretic research and the realistic implementation of VANETs, facilitating the realistic deployment of VANETs.
Resumo:
ithin the wide topic of disguise in literature, we could signal a subcurrent which can be found in a number of literary texts: the idea of madness as a disguise, i.e. the creation or invention of a ‘false self’ as a mask which is presented to the world and which conceals the real self. In The Divided Self (1960), R. D. Laing deals with the “personality, false self, mask, front or persona that (...) [schizophrenic] wear” (73). Using as a basis Laing’s theories on schizophrenia and the creation of a false-self system, we will analyze two works by Samuel Beckett: Murphy and Endgame, where we find the uses of madness as disguise in a series of ways: through the usage of ‘disguised’ language (what we could refer to as schizophrenese) which acts as a mask for real meaning; through odd ‘schizophrenic’ behaviour on the part of the characters (which screens real intentions), and, mainly, through the creation of a ‘false self’ which acts as a disguise and barrier between the inner self and the real world. These two works by Samuel Beckett, where real intentions and meanings are continuously concealed and disguised in a desperate attempt to preserve the inner self, lend themselves to an analysis of madness as disguise, precisely the one we attempt to carry out in our paper.
Resumo:
This study analyzes the manifestation of the dimensions of Entrepreneurial Orientation (EO) and Project Management Systems (PMS). We used a qualitative approach to conduct exploratory research through a study in literature and a pilot case in a software company. Data was collected from semi structured interviews, documents, and records on file, then triangulated and treated with content analysis. The model proposed for the relationship between the types of PMS (ad hoc, Classic PM, innovation, entrepreneurship/intrapreneurship) and the dimensions of EO (innovativeness, risk-taking, proactiveness, competitive aggressiveness, and autonomy), was partially corroborated by empirical studies. New studies are suggested to validate the applicability and setup of the model.
Resumo:
The present research aims to analyse the impact of corporate governance and cultural dimensions in dividend policy. The corporate governance and dividend policy have a close relationship, in that both are evidenced in literature to mitigate agency problems. Cultural factors are also related to agency problems. The existence of agency problems and their solutions differs across countries and it is related to the implementation of the mechanisms of governance. So, cultural factors may have influence on corporate governance and dividend policy. Our sample consists in 1 232 companies belonging to the main indices of 38 countries classified as emerging or developed. To measure the quality of firm level corporate governance, we use the ASSET4 Corporate Governance Performance Index, developed by Thomson Reuters, and as proxy of culture we use three cultural dimensions developed by Geert Hofstede, namely uncertainty avoidance, masculinity and indulgence. We obtained significant empirical evidence that firms with high quality of corporate governance pay higher dividends. With regard to cultural factors, we confirm that in countries with high levels of masculinity and uncertainty avoidance, the dividend payout ratio is lower. On the other hand, countries with high level of indulgence have higher dividend payout ratio. However, we verify that the impact of cultural effects is minimized when the firms have a high quality level of corporate governance. Additionally, we found that the impact of corporate governance and cultural factors in dividend policy differs when dealing with emerging or developed countries.
Resumo:
This paper proposes an algorithm to estimate two parameter values vs, transcription of frq gene, and vd, maximum rate of FRQ protein degradation for an existing 3rd order Neurospora model in literature. Details of the algorithm with simulation results are shown in this paper.
Resumo:
Although the benefits of service orientation are prevalent in literature, a review, analysis, and evaluation of the 30 existing service analysis approaches presented in this paper have shown that a comprehensive approach to the identification and analysis of both business and supporting software services is missing. Based on this evaluation of existing approaches and additional sources, we close this gap by proposing an integrated, consolidated approach to business and software service analysis that combines and extends the strengths of the examined methodologies.
Resumo:
This report reviews the selection, design, and installation of fiber reinforced polymer systems for strengthening of reinforced concrete or pre-stressed concrete bridges and other structures. The report is prepared based on the knowledge gained from worldwide experimental research, analytical work, and field applications of FRP systems used to strengthen concrete structures. Information on material properties, design and installation methods of FRP systems used as external reinforcement are presented. This information can be used to select an FRP system for increasing the strength and stiffness of reinforced concrete beams or the ductility of columns, and other applications. Based on the available research, the design considerations and concepts are covered in this report. In the next stage of the project, these will be further developed as design tools. It is important to note, however, that the design concepts proposed in literature have not in many cases been thoroughly developed and proven. Therefore, a considerable amount of research work will be required prior to development of the design concepts into practical design tools, which is a major goal of the current research project. The durability and long-term performance of FRP materials has been the subject of much research, which still are on going. Long-term field data are not currently available, and it is still difficult to accurately predict the life of FRP strengthening systems. The report briefly addresses environmental degradation and long-term durability issues as well. A general overview of using FRP bars as primary reinforcement of concrete structures is presented in Chapter 8. In Chapter 9, a summary of strengthening techniques identified as part of this initial stage of the research project and the issues which require careful consideration prior to practical implementation of these identified techniques are presented.
Resumo:
Key topics: Since the birth of the Open Source movement in the mid-80's, open source software has become more and more widespread. Amongst others, the Linux operating system, the Apache web server and the Firefox internet explorer have taken substantial market shares to their proprietary competitors. Open source software is governed by particular types of licenses. As proprietary licenses only allow the software's use in exchange for a fee, open source licenses grant users more rights like the free use, free copy, free modification and free distribution of the software, as well as free access to the source code. This new phenomenon has raised many managerial questions: organizational issues related to the system of governance that underlie such open source communities (Raymond, 1999a; Lerner and Tirole, 2002; Lee and Cole 2003; Mockus et al. 2000; Tuomi, 2000; Demil and Lecocq, 2006; O'Mahony and Ferraro, 2007;Fleming and Waguespack, 2007), collaborative innovation issues (Von Hippel, 2003; Von Krogh et al., 2003; Von Hippel and Von Krogh, 2003; Dahlander, 2005; Osterloh, 2007; David, 2008), issues related to the nature as well as the motivations of developers (Lerner and Tirole, 2002; Hertel, 2003; Dahlander and McKelvey, 2005; Jeppesen and Frederiksen, 2006), public policy and innovation issues (Jullien and Zimmermann, 2005; Lee, 2006), technological competitions issues related to standard battles between proprietary and open source software (Bonaccorsi and Rossi, 2003; Bonaccorsi et al. 2004, Economides and Katsamakas, 2005; Chen, 2007), intellectual property rights and licensing issues (Laat 2005; Lerner and Tirole, 2005; Gambardella, 2006; Determann et al., 2007). A major unresolved issue concerns open source business models and revenue capture, given that open source licenses imply no fee for users. On this topic, articles show that a commercial activity based on open source software is possible, as they describe different possible ways of doing business around open source (Raymond, 1999; Dahlander, 2004; Daffara, 2007; Bonaccorsi and Merito, 2007). These studies usually look at open source-based companies. Open source-based companies encompass a wide range of firms with different categories of activities: providers of packaged open source solutions, IT Services&Software Engineering firms and open source software publishers. However, business models implications are different for each of these categories: providers of packaged solutions and IT Services&Software Engineering firms' activities are based on software developed outside their boundaries, whereas commercial software publishers sponsor the development of the open source software. This paper focuses on open source software publishers' business models as this issue is even more crucial for this category of firms which take the risk of investing in the development of the software. Literature at last identifies and depicts only two generic types of business models for open source software publishers: the business models of ''bundling'' (Pal and Madanmohan, 2002; Dahlander 2004) and the dual licensing business models (Välimäki, 2003; Comino and Manenti, 2007). Nevertheless, these business models are not applicable in all circumstances. Methodology: The objectives of this paper are: (1) to explore in which contexts the two generic business models described in literature can be implemented successfully and (2) to depict an additional business model for open source software publishers which can be used in a different context. To do so, this paper draws upon an explorative case study of IdealX, a French open source security software publisher. This case study consists in a series of 3 interviews conducted between February 2005 and April 2006 with the co-founder and the business manager. It aims at depicting the process of IdealX's search for the appropriate business model between its creation in 2000 and 2006. This software publisher has tried both generic types of open source software publishers' business models before designing its own. Consequently, through IdealX's trials and errors, I investigate the conditions under which such generic business models can be effective. Moreover, this study describes the business model finally designed and adopted by IdealX: an additional open source software publisher's business model based on the principle of ''mutualisation'', which is applicable in a different context. Results and implications: Finally, this article contributes to ongoing empirical work within entrepreneurship and strategic management on open source software publishers' business models: it provides the characteristics of three generic business models (the business model of bundling, the dual licensing business model and the business model of mutualisation) as well as conditions under which they can be successfully implemented (regarding the type of product developed and the competencies of the firm). This paper also goes further into the traditional concept of business model used by scholars in the open source related literature. In this article, a business model is not only considered as a way of generating incomes (''revenue model'' (Amit and Zott, 2001)), but rather as the necessary conjunction of value creation and value capture, according to the recent literature about business models (Amit and Zott, 2001; Chresbrough and Rosenblum, 2002; Teece, 2007). Consequently, this paper analyses the business models from these two components' point of view.
Resumo:
The multi-level current reinjection concept described in literature is well-known to produce high quality AC current waveforms in high power and high voltage self-commutating current source converters. This paper proposes a novel reinjection circuitry which is capable of producing a 7-level reinjection current. It is shown that this reinjection current effectively increases the pulse number of the converter to 72. The use of PSCAD/EMTDC simulation validates the functionality of the proposed concept illustrating its effectiveness on both AC and DC sides of the converter.
Resumo:
Machine downtime, whether planned or unplanned, is intuitively costly to manufacturing organisations, but is often very difficult to quantify. The available literature showed that costing processes are rarely undertaken within manufacturing organisations. Where cost analyses have been undertaken, they generally have only valued a small proportion of the affected costs, leading to an overly conservative estimate. This thesis aimed to develop a cost of downtime model, with particular emphasis on the application of the model to Australia Post’s Flat Mail Optical Character Reader (FMOCR). The costing analysis determined a cost of downtime of $5,700,000 per annum, or an average cost of $138 per operational hour. The second section of this work focused on the use of the cost of downtime to objectively determine areas of opportunity for cost reduction on the FMOCR. This was the first time within Post that maintenance costs were considered along side of downtime for determining machine performance. Because of this, the results of the analysis revealed areas which have historically not been targeted for cost reduction. Further exploratory work was undertaken on the Flats Lift Module (FLM) and Auto Induction Station (AIS) Deceleration Belts through the comparison of the results against two additional FMOCR analysis programs. This research has demonstrated the development of a methodical and quantifiable cost of downtime for the FMOCR. This has been the first time that Post has endeavoured to examine the cost of downtime. It is also one of the very few methodologies for valuing downtime costs that has been proposed in literature. The work undertaken has also demonstrated how the cost of downtime can be incorporated into machine performance analysis with specific application to identifying high costs modules. The outcome of this report has both been the methodology for costing downtime, as well as a list of areas for cost reduction. In doing so, this thesis has outlined the two key deliverables presented at the outset of the research.
Resumo:
A deconvolution method that combines nanoindentation and finite element analysis was developed to determine elastic modulus of thin coating layer in a coating-substrate bilayer system. In this method, the nanoindentation experiments were conducted to obtain the modulus of both the bilayer system and the substrate. The finite element analysis was then applied to deconvolve the elastic modulus of the coating. The results demonstrated that the elastic modulus obtained using the developed method was in good agreement with that reported in literature.