873 resultados para Construction of identity
Resumo:
In 2002, van der Geer and van der Vlugt gave explicit equations for an asymptotically good tower of curves over the field F8. In this paper, we will present a method for constructing Goppa codes from these curves as well as explicit constructions for the third level of the tower. The approach is to find an associated plane curve for each curve in the tower and then to use the algorithms of Haché and Le Brigand to find the corresponding Goppa codes.
Resumo:
Resource Space Model is a kind of data model which can effectively and flexibly manage the digital resources in cyber-physical system from multidimensional and hierarchical perspectives. This paper focuses on constructing resource space automatically. We propose a framework that organizes a set of digital resources according to different semantic dimensions combining human background knowledge in WordNet and Wikipedia. The construction process includes four steps: extracting candidate keywords, building semantic graphs, detecting semantic communities and generating resource space. An unsupervised statistical language topic model (i.e., Latent Dirichlet Allocation) is applied to extract candidate keywords of the facets. To better interpret meanings of the facets found by LDA, we map the keywords to Wikipedia concepts, calculate word relatedness using WordNet's noun synsets and construct corresponding semantic graphs. Moreover, semantic communities are identified by GN algorithm. After extracting candidate axes based on Wikipedia concept hierarchy, the final axes of resource space are sorted and picked out through three different ranking strategies. The experimental results demonstrate that the proposed framework can organize resources automatically and effectively.©2013 Published by Elsevier Ltd. All rights reserved.
Resumo:
The problem of a finding of ranging of the objects nearest to the cyclic relation set by the expert between objects is considered. Formalization of the problem arising at it is resulted. The algorithm based on a method of the consecutive analysis of variants and the analysis of conditions of acyclicity is offered.
Resumo:
2000 Mathematics Subject Classification: Primary 05B05; secondary 62K10.
Resumo:
2000 Mathematics Subject Classification: 62G08, 62P30.
Resumo:
This article presents an analysis of the discursive construction of evidence in an English police interview with a rape suspect. The analytic findings differ from previous research on police–suspect interview discourse, in that here the interviewers actively lead an interviewee to produce defence evidence. The article seeks to make the following contributions: (i) it demonstrates the interactional mechanisms through which the interviewers co-construct the interviewee’s own version of events, and highlights the potential legal ramifications by focusing on the construction of one key evidential aspect, namely, consent; (ii) it lends weight to the hypothesis that interviewer agendas are strongly determinative of interview outcomes in terms of the evidential account produced, while making the important new contribution of showing that this is not simply a case of police interviewers being inevitably prosecution-focused; and (iii) it aims to provoke further investigation into the significance of interviewer discursive influence in cases where consent is at issue, against a backdrop of increasing numbers of rape cases being discontinued by the police at this early stage of the criminal justice process.
Resumo:
Dedicated to the memory of S.M. Dodunekov (1945–2012)Abstract. Geometric puncturing is a method to construct new codes. ACM Computing Classification System (1998): E.4.
Resumo:
People manage a spectrum of identities in cyber domains. Profiling individuals and assigning them to distinct groups or classes have potential applications in targeted services, online fraud detection, extensive social sorting, and cyber-security. This paper presents the Uncertainty of Identity Toolset, a framework for the identification and profiling of users from their social media accounts and e-mail addresses. More specifically, in this paper we discuss the design and implementation of two tools of the framework. The Twitter Geographic Profiler tool builds a map of the ethno-cultural communities of a person's friends on Twitter social media service. The E-mail Address Profiler tool identifies the probable identities of individuals from their e-mail addresses and maps their geographical distribution across the UK. To this end, this paper presents a framework for profiling the digital traces of individuals.
Resumo:
The present paper examines the political construction of ageing and conflicts between generations. The process of construction is driven not merely by institutional actors and opinion leaders in the media, but also by citizens who talk to each other about politics. In my paper I have focused on the latter by observing online discussions that appear on the political forum Index.hu. Disagreement between old people’ and ‘young people’ evolved mainly about the pension system, thus the examination of ageing constructions is embedded in this context. In spite of its numerous limits, the method used seems to be suitable for providing hypotheses for further research. In the first part of the study I present the applied theoretical approach in which the concept of stereotype is connected with the concept of social construction. After that I focus on investigating the activity, origin and contents of the stereotypes that influence the construction of ageing. In the third part of the study the components of the constructions are demonstrated.
Resumo:
Geographic Information Systems (GIS) is an emerging information technology (IT) which promises to have large scale influences in how spatially distributed resources are managed. It has had applications in the management of issues as diverse as recovering from the disaster of Hurricane Andrew to aiding military operations in Desert Storm. Implementation of GIS systems is an important issue because there are high cost and time involvement in setting them up. An important component of the implementation problem is the "meaning" different groups of people who are influencing the implementation give to the technology. The research was based on the theory of (theoretical stance to the problem was based on the) "Social Construction of Knowledge" systems which assumes knowledge systems are subject to sociological analysis both in usage and in content. An interpretive research approach was adopted to inductively derive a model which explains how the "meanings" of a GIS are socially constructed. The research design entailed a comparative case analysis over two county sites which were using the same GIS for a variety of purposes. A total of 75 in-depth interviews were conducted to elicit interpretations of GIS. Results indicate that differences in how geographers and data-processors view the technology lead to different implementation patterns in the two sites.
Resumo:
This multi-site, multi-ethnic/cultural study examined the effects of variation between ethnic/cultural groups and the effects of institutional variation within ethnic/cultural groups on identity formation. The participants were 892 late adolescent college students from six sites in 5 countries (Brazil, China, Costa Rica, US, and Sweden) representing different linguistic and ethnic/cultural traditions living in the context of varied social conditions. As hypothesized, there were significant differences in the proportion of identity statuses between sites in the Personal domain, $\chi\sp2$(20, N = 858) = 164.78, $p<.001,$ the Interpersonal domain, $\chi\sp2$(20, N = 858) = 145.69, $p<.001,$ and the World View domain, $\chi\sp2$(20, N = 858) = 120.89, $p<.001,$ but the distribution of the differences was more complex than expected. In addition, there were significant differences in Identity Satisfaction among sites, F(15, 2325) = 12.65, $p<.001.$ Further univariate analyses revealed that differences among sites were found on Identity Satisfaction in the personal, interpersonal and world view domain. The direction of the differences, however, were more complex than hypothesized.^ The second hypothesis was confirmed but only with the world view identity status and not for each of the six sites. Stepwise discriminant analyses showed that Identity status in the world view domain was predicted by Institutional Support in Nebraska, gender and Institutional Change in Brazil, and Institutional Access in China. Lastly and as hypothesized, some Institutional Attributes significantly predicted Overall Identity Satisfaction in all sites as revealed by multivariate regression analyses, except in Sweden, F (5, 79) =.660, p =.65. These findings extend the literature on identity formation not only by having investigated how culture influences the process of identity formation with samples representing different ethnic/cultural and linguistically different populations but also by empirically testing the role that social processes play in identity formation at the cross-cultural level. ^
Resumo:
This dissertation tested the effectiveness of a psychosocial intervention, the Personal Development in the Context of Relationships (PDCR) program. The aim of the PDCR seeks to foster the development (or enhancement) of a sense of identity and intimacy among adolescents who participate in the program. The PDCR is a psychosocial group intervention which utilizes interpersonal relationship issues as a context to foster personal development in identity formation and facilitate the development of an individual's capacity for intimacy. The PDCR uses intervention strategies which include skills and knowledge development, experiential group exercises, and exploration for insight. Participants consisted of 110 late adolescents. A mixed-subjects design (pre-post-follow up) was used to assess the effectiveness, efficacy and utility of the PDCR on the experimental condition relative to a content/social contact control group and a time control condition. Identity exploration and identity commitment were measured by the Ego Identity Process Questionnaire (EIPQ). Total intimacy and identity role satisfaction were measured by the Erikson Psychosocial Stage Inventory (EPSI). Relationship quality and closeness were measured by the Relationship Quality Scale (RQS) and the Relationship Closeness Inventory (RCI) in an effort to assess whether any potential impact on interpersonal relationships occurs. Mixed MANOVAs were used to analyze the data with results yielding significant values for increased total identity exploration from pre to post test and decreases in total identity commitment from pre to post to follow-up test in the experimental group relative to the control conditions on the EIPQ. Further results indicated increases in total intimacy from pre to post to follow-up test in the experimental group relative to the control conditions on the EPSI. No clear trends emerged from pre to post to follow-up test for the Relationship measures. Results are discussed in terms of both practical and theoretical implications. ^
Resumo:
The subject-matter of this dissertation is the social construction of economic exchanges, with an emphasis on market transactions. Applying a Weberian approach, the dissertation analyzes the social construction of economic exchanges at the following analytical levels: the agency-level, the institutional-structural level and the comparative-historical level. At the agency-level, the dissertation explores the role that human actors and social actions play in economic exchanges, especially market transactions. Theoretically elaborated and empirically examined is the assumption of market-economic exchanges as particular types of social action. At the institutional-structural level, the dissertation examines the relations of society and culture to market-economic exchanges. The assumption that the market economy is situated in and influenced by a broader social-cultural framework is advanced and evaluated in light of empirical findings. At the comparative-historical level, the dissertation engages in an analysis of the social construction of economic exchanges across various societies and over time. The assumption of the historical specificity of the market economy is reexamined, and the social construction of economic exchanges in traditional, capitalist and post-socialist societies is subject to comparative investigation. In the conclusion, further theoretical, methodological and empirical implications as well as directions for future analyses are discussed. ^
Resumo:
In broad terms — including a thief's use of existing credit card, bank, or other accounts — the number of identity fraud victims in the United States ranges 9-10 million per year, or roughly 4% of the US adult population. The average annual theft per stolen identity was estimated at $6,383 in 2006, up approximately 22% from $5,248 in 2003; an increase in estimated total theft from $53.2 billion in 2003 to $56.6 billion in 2006. About three million Americans each year fall victim to the worst kind of identity fraud: new account fraud. Names, Social Security numbers, dates of birth, and other data are acquired fraudulently from the issuing organization, or from the victim then these data are used to create fraudulent identity documents. In turn, these are presented to other organizations as evidence of identity, used to open new lines of credit, secure loans, “flip” property, or otherwise turn a profit in a victim's name. This is much more time consuming — and typically more costly — to repair than fraudulent use of existing accounts. ^ This research borrows from well-established theoretical backgrounds, in an effort to answer the question – what is it that makes identity documents credible? Most importantly, identification of the components of credibility draws upon personal construct psychology, the underpinning for the repertory grid technique, a form of structured interviewing that arrives at a description of the interviewee’s constructs on a given topic, such as credibility of identity documents. This represents substantial contribution to theory, being the first research to use the repertory grid technique to elicit from experts, their mental constructs used to evaluate credibility of different types of identity documents reviewed in the course of opening new accounts. The research identified twenty-one characteristics, different ones of which are present on different types of identity documents. Expert evaluations of these documents in different scenarios suggest that visual characteristics are most important for a physical document, while authenticated personal data are most important for a digital document. ^