658 resultados para regular identity


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Derek Parfit est célèbre pour avoir soutenu que l'identité personnelle ne comptait pas pour déterminer la survie d'une personne. Sa phrase « personal identity is not what matters » est inspirée d'une approche réductionniste de l'identité personnelle qui consiste à dire que la personne humaine se réduit à un corps, un cerveau et une série d'événements mentaux causalement liés. Dans cette optique, ce qui compte, c'est la continuité psychologique. Cet article vise à montrer que dans des dynamiques de reconnaissances (et de non-reconnaissances), l'identité personnelle peut compter dans la définition de l'identité personnelle à travers le temps ; en deux mots, que l'identité personnelle compte. Partant des conceptions narrativistes défendues par Paul Ricoeur et Charles Taylor, j'en viens à défendre une théorie constructiviste-institutionnaliste de l'identité personnelle qui prend en considération le caractère institué et construit de l'identité personnelle. Le but de cet article est donc de défendre la thèse selon laquelle l'identité personnelle compte pour dans les réflexions éthiques et politiques.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The energy of a graph G is the sum of the absolute values of its eigenvalues. In this paper, we study the energies of some classes of non-regular graphs. Also the spectrum of some non-regular graphs and their complements are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this computerized, globalised and internet world our computer collects various types of information’s about every human being and stores them in files secreted deep on its hard drive. Files like cache, browser history and other temporary Internet files can be used to store sensitive information like logins and passwords, names addresses, and even credit card numbers. Now, a hacker can get at this information by wrong means and share with someone else or can install some nasty software on your computer that will extract your sensitive and secret information. Identity Theft posses a very serious problem to everyone today. If you have a driver’s license, a bank account, a computer, ration card number, PAN card number, ATM card or simply a social security number you are more than at risk, you are a target. Whether you are new to the idea of ID Theft, or you have some unanswered questions, we’ve compiled a quick refresher list below that should bring you up to speed. Identity theft is a term used to refer to fraud that involves pretending to be someone else in order to steal money or get other benefits. Identity theft is a serious crime, which is increasing at tremendous rate all over the world after the Internet evolution. There is widespread agreement that identity theft causes financial damage to consumers, lending institutions, retail establishments, and the economy as a whole. Surprisingly, there is little good public information available about the scope of the crime and the actual damages it inflicts. Accounts of identity theft in recent mass media and in film or literature have centered on the exploits of 'hackers' - variously lauded or reviled - who are depicted as cleverly subverting corporate firewalls or other data protection defenses to gain unauthorized access to credit card details, personnel records and other information. Reality is more complicated, with electronic identity fraud taking a range of forms. The impact of those forms is not necessarily quantifiable as a financial loss; it can involve intangible damage to reputation, time spent dealing with disinformation and exclusion from particular services because a stolen name has been used improperly. Overall we can consider electronic networks as an enabler for identity theft, with the thief for example gaining information online for action offline and the basis for theft or other injury online. As Fisher pointed out "These new forms of hightech identity and securities fraud pose serious risks to investors and brokerage firms across the globe," I am a victim of identity theft. Being a victim of identity theft I felt the need for creating an awareness among the computer and internet users particularly youngsters in India. Nearly 70 per cent of Indian‘s population are living in villages. Government of India already started providing computer and internet facilities even to the remote villages through various rural development and rural upliftment programmes. Highly educated people, established companies, world famous financial institutions are becoming victim of identity theft. The question here is how vulnerable the illiterate and innocent rural people are if they suddenly exposed to a new device through which some one can extract and exploit their personal data without their knowledge? In this research work an attempt has been made to bring out the real problems associated with Identity theft in developed countries from an economist point of view.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Now a days, email has become the most widely communication way in daily life. The main reason for using email is probably because of the convenience and speed in which it can be transmitted irrespective of geographical distances. To improve security and efficiency of email system, most of the email system adopt PKI and IBE encryption schemes. However, both PKI and IBE encryption schemes have their own shortcomings and consequently bring security issues to email systems. This paper proposes a new secure email system based on IBE which combines finger print authentication and proxy service for encryption and decryption

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mesh generation is an important step inmany numerical methods.We present the “HierarchicalGraphMeshing” (HGM)method as a novel approach to mesh generation, based on algebraic graph theory.The HGM method can be used to systematically construct configurations exhibiting multiple hierarchies and complex symmetry characteristics. The hierarchical description of structures provided by the HGM method can be exploited to increase the efficiency of multiscale and multigrid methods. In this paper, the HGMmethod is employed for the systematic construction of super carbon nanotubes of arbitrary order, which present a pertinent example of structurally and geometrically complex, yet highly regular, structures. The HGMalgorithm is computationally efficient and exhibits good scaling characteristics. In particular, it scales linearly for super carbon nanotube structures and is working much faster than geometry-based methods employing neighborhood search algorithms. Its modular character makes it conducive to automatization. For the generation of a mesh, the information about the geometry of the structure in a given configuration is added in a way that relates geometric symmetries to structural symmetries. The intrinsically hierarchic description of the resulting mesh greatly reduces the effort of determining mesh hierarchies for multigrid and multiscale applications and helps to exploit symmetry-related methods in the mechanical analysis of complex structures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Resumen tomado de la publicaci??n

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Resumen tomado de la publicaci??n

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Resumen tomado de la publicaci??n

Relevância:

20.00% 20.00%

Publicador:

Resumo:

WAIS Seminar, presented 29 Mar 2012

Relevância:

20.00% 20.00%

Publicador:

Resumo:

For Ethics in a Complex World module. General topics with links to resources about identity and privacy. Mainly looking at online identity and how you manage it effectively.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Three things to think about and Three possible futures to discuss

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Week 4

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article presents a reflection about the Disability like a human phenomenon, which needs not only new definitions if not a criticism point of view as a Concept, with the end of indicate representations forms not only for people with disabilities if not for the citizens in general. Considers discourses that identify arguments from social sciences, appearing the Disability like a differentiate condition between human beings, mainly for an exclusion process that announce social behaviors in relations with the persons with disabilities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

El presente trabajo describe la identidad organizacional de una antigua Universidad Colombiana – Universidad del Rosario – desde 1890 hasta 1991. Esta descripción detallada se realizó con el propósito de hacer preguntas y señalar algunos de los desafíos que esta universidad se encontrará al educar las nuevas generaciones de la nación para la sociedad del conocimiento. Este documento también describe brevemente las características más importantes de la sociedad del conocimiento, así como las características de las universidades que desarrollan sus actividades en ella. También, se hace una síntesis sobre el estado de desarrollo de la sociedad del conocimiento en Colombia. Finalmente, se extraen algunas conclusiones a acerca de las oportunidades de cambio que tendrá la identidad Rosarista para continuar siendo relevante en el siglo XXI.