359 resultados para Cult
Resumo:
Modern scientific world-view has undermined traditional myths, the functional survival of which seems to depend today in the West on a positivist justification. This would place them in the field of real History, through their study and revitalization by pseudoscientific disciplines such as the Atlantis and the ancient astronaut hypotheses. These have inspired new epic poems in (regular) verse that combine classic and/or biblical myths with a (pseudo)scientific modern world-view. For example, the critical rewriting of Noah’s myth by using the ancient astronaut hypothesis as a fictional device to produce a contemporary kind of plausibility allowed Abel Montagut to renew epic poetry, updating it also by adopting science fiction chronotopes in order to structure his fictional construction and to generate a high ethical sense for our time. Thus, his Poemo de Utnoa (1993) / La gesta d’Utnoa (1996), which has become a major classic of the literature in Esperanto thanks to its original version in this language, is a landmark of both science fiction and neo-biblical epics. This poem is written from a secular and purely literary perspective.
Resumo:
The 1980s saw a wave of African films that aimed to represent, on both local and international screens, a sophisticated pre-colonial Africa, thus debunking notions of the continent as primitive. Toward this aim the films inscribed the conventions of oral performance within their visual styles, denying spectator identification with the protagonists and emphasising the presence of the narrator. However, some critics argued that these films exoticised Africa, while their use of oral performance’s distancing effect echoed the ‘scientific’ distance structured by the ethnographic film, in which African societies were represented as ‘the other’. Souleymane Cissé’s Yeelen exemplifies this tension, transposing into cinematic form oral storytelling techniques in the depiction of a power struggle within the covert cult of the komo, a Bambara initiation society unfamiliar to most non-Bambara viewers. This paper demonstrates how the film negotiates this tension via music, which interpellates the international spectator by eliciting a greater identification with the protagonists than that determined at a visual level, while encoding a verisimilitude to rituals that may otherwise be read as the superstitious practices of ‘the other’. In this way, music and image in Yeelen operate as parallel, though often overlapping, discourses, bridging the gap between the film’s culturally specific narrative and formal components, and its international spectators.
Resumo:
Quantifying nutrient and sediment loads in catchments is dif?cult owing to diffuse controls related to storm hydrology. Coarse sampling and interpolation methods are prone to very high uncertainties due to under-representation of high discharge, short duration events. Additionally, important low-?ow processes such as diurnal signals linked to point source impacts are missed. Here we demonstrate a solution based on a time-integrated approach to sampling with a standard 24 bottle autosampler con?gured to take a sample every 7 h over a week according to a Plynlimon design. This is evaluated with a number of other sampling strategies using a two-year dataset of sub-hourly discharge and phosphorus concentration data. The 24/7 solution is shown to be among the least uncertain in estimating load (inter-quartile range: 96% to 110% of actual load in year 1 and 97% to 104% in year 2) due to the increased frequency raising the probability of sampling storm events and point source signals. The 24/7 solution would appear to be most parsimonious in terms of data coverage and certainty, process signal representation, potential laboratory commitment, technology requirements and the ability to be widely deployed in complex catchments.
Resumo:
There is extensive debate concerning the cognitive and behavioral adaptation of Neanderthals, especially in the period when the earliest anatomically modern humans dispersed into Western Europe, around 35,000–40,000 B.P. The site of the Grotte du Renne (at Arcy-sur-Cure) is of great importance because it provides the most persuasive evidence for behavioral complexity among Neanderthals. A range of ornaments and tools usually associated with modern human industries, such as the Aurignacian, were excavated from three of the Châtelperronian levels at the site, along with Neanderthal fossil remains (mainly teeth). This extremely rare occurrence has been taken to suggest that Neanderthals were the creators of these items. Whether Neanderthals independently achieved this level of behavioral complexity and whether this was culturally transmitted or mimicked via incoming modern humans has been contentious. At the heart of this discussion lies an assumption regarding the integrity of the excavated remains. One means of testing this is by radiocarbon dating; however, until recently, our ability to generate both accurate and precise results for this period has been compromised. A series of 31 accelerator mass spectrometry ultra?ltered dates on bones, antlers, artifacts, and teeth from six key archaeological levels shows an unexpected degree of variation. This suggests that some mixing of material may have occurred, which implies a more complex depositional history at the site and makes it dif?cult to be con?dent about the association of artifacts with human remains in the Châtelperronian levels.
Resumo:
This article considers the theme of prostitution in the decadent writings of the fin-de-siecle French author, Rachilde. It proposes that an analysis of this critically-neglected trope of her work reveals new connections between the erotics and aesthetics of her fiction. As a vector for considering tensions between fantasy and truth, and illusion and reality, prostitution, in Rachilde's texts, invites us to reflect on two of the most common cultural manifestations of decadence: sexual non-conformism and the cult of artifice. The article focuses in particular on the (male) prostitute-body of Monsieur Venus, arguing that, in its transcendence of nature, reality and utilitarian purpose, it is elevated to the status of art in Rachilde's fictional world.
Resumo:
Internet Tra c, Internet Applications, Internet Attacks, Tra c Pro ling, Multi-Scale Analysis abstract Nowadays, the Internet can be seen as an ever-changing platform where new and di erent types of services and applications are constantly emerging. In fact, many of the existing dominant applications, such as social networks, have appeared recently, being rapidly adopted by the user community. All these new applications required the implementation of novel communication protocols that present di erent network requirements, according to the service they deploy. All this diversity and novelty has lead to an increasing need of accurately pro ling Internet users, by mapping their tra c to the originating application, in order to improve many network management tasks such as resources optimization, network performance, service personalization and security. However, accurately mapping tra c to its originating application is a di cult task due to the inherent complexity of existing network protocols and to several restrictions that prevent the analysis of the contents of the generated tra c. In fact, many technologies, such as tra c encryption, are widely deployed to assure and protect the con dentiality and integrity of communications over the Internet. On the other hand, many legal constraints also forbid the analysis of the clients' tra c in order to protect their con dentiality and privacy. Consequently, novel tra c discrimination methodologies are necessary for an accurate tra c classi cation and user pro ling. This thesis proposes several identi cation methodologies for an accurate Internet tra c pro ling while coping with the di erent mentioned restrictions and with the existing encryption techniques. By analyzing the several frequency components present in the captured tra c and inferring the presence of the di erent network and user related events, the proposed approaches are able to create a pro le for each one of the analyzed Internet applications. The use of several probabilistic models will allow the accurate association of the analyzed tra c to the corresponding application. Several enhancements will also be proposed in order to allow the identi cation of hidden illicit patterns and the real-time classi cation of captured tra c. In addition, a new network management paradigm for wired and wireless networks will be proposed. The analysis of the layer 2 tra c metrics and the di erent frequency components that are present in the captured tra c allows an e cient user pro ling in terms of the used web-application. Finally, some usage scenarios for these methodologies will be presented and discussed.
Resumo:
A distribui ção de um sinal relógio, com elevada precisão espacial (baixo skew) e temporal (baixo jitter ), em sistemas sí ncronos de alta velocidade tem-se revelado uma tarefa cada vez mais demorada e complexa devido ao escalonamento da tecnologia. Com a diminuição das dimensões dos dispositivos e a integração crescente de mais funcionalidades nos Circuitos Integrados (CIs), a precisão associada as transições do sinal de relógio tem sido cada vez mais afectada por varia ções de processo, tensão e temperatura. Esta tese aborda o problema da incerteza de rel ogio em CIs de alta velocidade, com o objetivo de determinar os limites do paradigma de desenho sí ncrono. Na prossecu ção deste objectivo principal, esta tese propõe quatro novos modelos de incerteza com âmbitos de aplicação diferentes. O primeiro modelo permite estimar a incerteza introduzida por um inversor est atico CMOS, com base em parâmetros simples e su cientemente gen éricos para que possa ser usado na previsão das limitações temporais de circuitos mais complexos, mesmo na fase inicial do projeto. O segundo modelo, permite estimar a incerteza em repetidores com liga ções RC e assim otimizar o dimensionamento da rede de distribui ção de relógio, com baixo esfor ço computacional. O terceiro modelo permite estimar a acumula ção de incerteza em cascatas de repetidores. Uma vez que este modelo tem em considera ção a correla ção entre fontes de ruí do, e especialmente util para promover t ecnicas de distribui ção de rel ogio e de alimentação que possam minimizar a acumulação de incerteza. O quarto modelo permite estimar a incerteza temporal em sistemas com m ultiplos dom ínios de sincronismo. Este modelo pode ser facilmente incorporado numa ferramenta autom atica para determinar a melhor topologia para uma determinada aplicação ou para avaliar a tolerância do sistema ao ru ído de alimentação. Finalmente, usando os modelos propostos, são discutidas as tendências da precisão de rel ogio. Conclui-se que os limites da precisão do rel ogio são, em ultima an alise, impostos por fontes de varia ção dinâmica que se preveem crescentes na actual l ogica de escalonamento dos dispositivos. Assim sendo, esta tese defende a procura de solu ções em outros ní veis de abstração, que não apenas o ní vel f sico, que possam contribuir para o aumento de desempenho dos CIs e que tenham um menor impacto nos pressupostos do paradigma de desenho sí ncrono.
Resumo:
Tese de mestrado, Estudos Românicos (Cultura Portuguesa), Universidade de Lisboa, Faculdade de Letras, 2011
Resumo:
Tese de doutoramento, História (Arqueologia), Universidade de Lisboa, Faculdade de Letras, 2014
Resumo:
Nitrat e (NO3 - ) i s per vasi ve i n t he bi ospher e[ 1, 2]. Cont emporar y agri cult ural pr acti ces are a mong t he maj or ant hr opogeni c sources of r eacti ve nitrogen speci es, wher e nitrat ei s t he most abundant of t hese [ 2]. Excessi ve a mount s of r eacti ve nitrogen i n soil s and gr oundwat er ar e creati ng si gnifi cant t hr eat s t o hu man healt h and saf et y [ 3] as well as a host of undesirabl e environment al i mpact s [ 2]; it i s curr ently consi der ed t he second most r el evant environment al i ssue, aft er car bon di oxide e mi ssi ons. Nowadays, a mong t he most r el evant and pr omi si ng appr oaches t o r educe nitrat e concentrati on i n wat er, na mel y gr oundwat er, ar e denitrifi cati on- based pr ocesses [ 4]. Per meabl e r eacti ve barri ers ( PRB) have been pr oven eff ecti ve i n r educi ng vari ous cont ami nant s i n copi ous a mount s, parti cul arl y i n shall ow gr oundwat er [ 5]. However t he possi bl e added eff ecti veness of usi ng nanoparti cl es i n t hese structur es t o obt ai n nitrogen gas from nitrat es requires f urt her i nvesti gati on.
Resumo:
Stratigraphic Columns (SC) are the most useful and common ways to represent the eld descriptions (e.g., grain size, thickness of rock packages, and fossil and lithological components) of rock sequences and well logs. In these representations the width of SC vary according to the grain size (i.e., the wider the strata, the coarser the rocks (Miall 1990; Tucker 2011)), and the thickness of each layer is represented at the vertical axis of the diagram. Typically these representations are drawn 'manually' using vector graphic editors (e.g., Adobe Illustrator®, CorelDRAW®, Inskape). Nowadays there are various software which automatically plot SCs, but there are not versatile open-source tools and it is very di cult to both store and analyse stratigraphic information. This document presents Stratigraphic Data Analysis in R (SDAR), an analytical package1 designed for both plotting and facilitate the analysis of Stratigraphic Data in R (R Core Team 2014). SDAR, uses simple stratigraphic data and takes advantage of the exible plotting tools available in R to produce detailed SCs. The main bene ts of SDAR are: (i) used to generate accurate and complete SC plot including multiple features (e.g., sedimentary structures, samples, fossil content, color, structural data, contacts between beds), (ii) developed in a free software environment for statistical computing and graphics, (iii) run on a wide variety of platforms (i.e., UNIX, Windows, and MacOS), (iv) both plotting and analysing functions can be executed directly on R's command-line interface (CLI), consequently this feature enables users to integrate SDAR's functions with several others add-on packages available for R from The Comprehensive R Archive Network (CRAN).
Resumo:
Economics is a social science which, therefore, focuses on people and on the decisions they make, be it in an individual context, or in group situations. It studies human choices, in face of needs to be fulfilled, and a limited amount of resources to fulfill them. For a long time, there was a convergence between the normative and positive views of human behavior, in that the ideal and predicted decisions of agents in economic models were entangled in one single concept. That is, it was assumed that the best that could be done in each situation was exactly the choice that would prevail. Or, at least, that the facts that economics needed to explain could be understood in the light of models in which individual agents act as if they are able to make ideal decisions. However, in the last decades, the complexity of the environment in which economic decisions are made and the limits on the ability of agents to deal with it have been recognized, and incorporated into models of decision making in what came to be known as the bounded rationality paradigm. This was triggered by the incapacity of the unboundedly rationality paradigm to explain observed phenomena and behavior. This thesis contributes to the literature in three different ways. Chapter 1 is a survey on bounded rationality, which gathers and organizes the contributions to the field since Simon (1955) first recognized the necessity to account for the limits on human rationality. The focus of the survey is on theoretical work rather than the experimental literature which presents evidence of actual behavior that differs from what classic rationality predicts. The general framework is as follows. Given a set of exogenous variables, the economic agent needs to choose an element from the choice set that is avail- able to him, in order to optimize the expected value of an objective function (assuming his preferences are representable by such a function). If this problem is too complex for the agent to deal with, one or more of its elements is simplified. Each bounded rationality theory is categorized according to the most relevant element it simplifes. Chapter 2 proposes a novel theory of bounded rationality. Much in the same fashion as Conlisk (1980) and Gabaix (2014), we assume that thinking is costly in the sense that agents have to pay a cost for performing mental operations. In our model, if they choose not to think, such cost is avoided, but they are left with a single alternative, labeled the default choice. We exemplify the idea with a very simple model of consumer choice and identify the concept of isofin curves, i.e., sets of default choices which generate the same utility net of thinking cost. Then, we apply the idea to a linear symmetric Cournot duopoly, in which the default choice can be interpreted as the most natural quantity to be produced in the market. We find that, as the thinking cost increases, the number of firms thinking in equilibrium decreases. More interestingly, for intermediate levels of thinking cost, an equilibrium in which one of the firms chooses the default quantity and the other best responds to it exists, generating asymmetric choices in a symmetric model. Our model is able to explain well-known regularities identified in the Cournot experimental literature, such as the adoption of different strategies by players (Huck et al. , 1999), the inter temporal rigidity of choices (Bosch-Dom enech & Vriend, 2003) and the dispersion of quantities in the context of di cult decision making (Bosch-Dom enech & Vriend, 2003). Chapter 3 applies a model of bounded rationality in a game-theoretic set- ting to the well-known turnout paradox in large elections, pivotal probabilities vanish very quickly and no one should vote, in sharp contrast with the ob- served high levels of turnout. Inspired by the concept of rhizomatic thinking, introduced by Bravo-Furtado & Côrte-Real (2009a), we assume that each per- son is self-delusional in the sense that, when making a decision, she believes that a fraction of the people who support the same party decides alike, even if no communication is established between them. This kind of belief simplifies the decision of the agent, as it reduces the number of players he believes to be playing against { it is thus a bounded rationality approach. Studying a two-party first-past-the-post election with a continuum of self-delusional agents, we show that the turnout rate is positive in all the possible equilibria, and that it can be as high as 100%. The game displays multiple equilibria, at least one of which entails a victory of the bigger party. The smaller one may also win, provided its relative size is not too small; more self-delusional voters in the minority party decreases this threshold size. Our model is able to explain some empirical facts, such as the possibility that a close election leads to low turnout (Geys, 2006), a lower margin of victory when turnout is higher (Geys, 2006) and high turnout rates favoring the minority (Bernhagen & Marsh, 1997).
Resumo:
Dynamic logic is an extension of modal logic originally intended for reasoning about computer programs. The method of proving correctness of properties of a computer program using the well-known Hoare Logic can be implemented by utilizing the robustness of dynamic logic. For a very broad range of languages and applications in program veri cation, a theorem prover named KIV (Karlsruhe Interactive Veri er) Theorem Prover has already been developed. But a high degree of automation and its complexity make it di cult to use it for educational purposes. My research work is motivated towards the design and implementation of a similar interactive theorem prover with educational use as its main design criteria. As the key purpose of this system is to serve as an educational tool, it is a self-explanatory system that explains every step of creating a derivation, i.e., proving a theorem. This deductive system is implemented in the platform-independent programming language Java. In addition, a very popular combination of a lexical analyzer generator, JFlex, and the parser generator BYacc/J for parsing formulas and programs has been used.
Resumo:
Les tâches de vision artificielle telles que la reconnaissance d’objets demeurent irrésolues à ce jour. Les algorithmes d’apprentissage tels que les Réseaux de Neurones Artificiels (RNA), représentent une approche prometteuse permettant d’apprendre des caractéristiques utiles pour ces tâches. Ce processus d’optimisation est néanmoins difficile. Les réseaux profonds à base de Machine de Boltzmann Restreintes (RBM) ont récemment été proposés afin de guider l’extraction de représentations intermédiaires, grâce à un algorithme d’apprentissage non-supervisé. Ce mémoire présente, par l’entremise de trois articles, des contributions à ce domaine de recherche. Le premier article traite de la RBM convolutionelle. L’usage de champs réceptifs locaux ainsi que le regroupement d’unités cachées en couches partageant les même paramètres, réduit considérablement le nombre de paramètres à apprendre et engendre des détecteurs de caractéristiques locaux et équivariant aux translations. Ceci mène à des modèles ayant une meilleure vraisemblance, comparativement aux RBMs entraînées sur des segments d’images. Le deuxième article est motivé par des découvertes récentes en neurosciences. Il analyse l’impact d’unités quadratiques sur des tâches de classification visuelles, ainsi que celui d’une nouvelle fonction d’activation. Nous observons que les RNAs à base d’unités quadratiques utilisant la fonction softsign, donnent de meilleures performances de généralisation. Le dernière article quand à lui, offre une vision critique des algorithmes populaires d’entraînement de RBMs. Nous montrons que l’algorithme de Divergence Contrastive (CD) et la CD Persistente ne sont pas robustes : tous deux nécessitent une surface d’énergie relativement plate afin que leur chaîne négative puisse mixer. La PCD à "poids rapides" contourne ce problème en perturbant légèrement le modèle, cependant, ceci génère des échantillons bruités. L’usage de chaînes tempérées dans la phase négative est une façon robuste d’adresser ces problèmes et mène à de meilleurs modèles génératifs.
Resumo:
Dans la France de l’Ancien Régime, si les représentations de la condition féminine légitiment les valeurs d’une traditionnelle phallocratie, on note néanmoins que le dogme chrétien accorde aux femmes une place dans l’économie du salut. Dans un contexte de Contre-Réforme, celle-ci déterminera notamment, sur le plan socio-littéraire, les modalités de l’expérience mystique et de l’héroïsme au féminin : l’éthique chrétienne érige paradoxalement en modèle des figures féminines qui transcendent leur humanité dans le sacrifice et la mort. Mais au XVIIe siècle, l’évolution des notions d’abnégation et d’amour-propre éradique ce triomphe éphémère. En nous intéressant plus particulièrement aux remaniements de l’hypotexte euripidien dans l’Iphygenie de Rotrou (1640) et dans l’Iphigénie de Racine (1674), nous verrons comment les deux pièces traduisent ce déclin. Au premier chapitre de notre mémoire, nous nous intéresserons à l’espace de liberté que le discours chrétien confère aux femmes à travers le culte de la virginité et l’hypothétique transfiguration des corps célestes. Réintégrant ces données théologiques, la mystique marque l’essor d’un charisme féminin que la notion d’amour-propre déconstruira à l’ère classique. Dans un second chapitre, nous explorerons les développements de l’éthique héroïque qui ont servi à l’essor d’un héroïsme au féminin. Le troisième chapitre portera enfin sur l’échec d’une héroïne mythique qui, mettant à profit le dogme chrétien, menace dangereusement l’équilibre d’un ordre patriarcal. La critique littéraire convient généralement de l’irréfutable vertu de l’héroïne de Rotrou et de Racine. Au terme de notre analyse, nous entendons démontrer qu’Iphigénie est, a contrario, tragiquement reconnue coupable d’amour-propre par les deux dramaturges.