Spelling suggestions: "subject:"solomon"" "subject:"holomon""
111 |
Konformitet i militär kontext : uniform klädsels påverkan på soldatenSvärd, Ola January 2009 (has links)
Soldater och officerare blir i sin dagliga tjänsteutövning utsatt för press både psykiskt och fysiskt. Det finns en hel rad av faktorer som påverkar besluts- och grupprocesser och för att kunna förstå och identifiera risker i dessa processer måste det finnas en kunskap kring dessa. En företeelse vilken påverkar grupper och individer är konformiteten. En faktor som skiljer soldater och officerare från många andra yrkesgrupper är den uniforma klädseln vilken många anser hör ihop med yrket. Studien avser därför att undersöka hur den likformiga klädseln påverkar individens förmåga att tänka själv och dessutom handla utifrån den tanken. Utifrån detta syfte har en kärnfråga och tre delfrågor utkristalliserats. Delfrågornas syfte är att svara på kärnfrågan. Kärnfråga: Hur påverkar likformig klädsel den enskilda soldatens förmåga att stå emot konformitet? Delfrågor: - Har kläder någon betydelse i sociala sammanhang? - Varför följer vissa gruppen och andra inte? - Påverkas soldaten av likformig klädsel? För att mäta hur den uniforma klädseln påverkar soldater, och därmed besvara frågorna, använder jag mig av Solomon Aschs konformitets experiment i en ny tappning. Baserat på resultatet från experimentet samt med stöd ur litteratur dras slutsatser om hur stor eller om det finns en påverkan på soldaters individualitet av den likformiga klädseln. Jag kom i mitt arbete fram till att den likformiga klädseln ökar soldatens konformitet i en grupp. Den enskilda soldaten har lättare att falla för konformiteten när denne bär uniform klädsel i sitt tjänsteutövande. / Officers and soldiers are in their daily duty an object of both physical and psychological pressure. There are many factors that influence both the decision and group processes. To be able to understand and identify risks in these processes there has to be knowledge in this area. One phenomenon which influences groups and individuals is conformity. One factor that divides the soldiers and officers from other categories of work is the uniform clothing which many think is intimately connected with that type of work. That is why this study intends to examine how the uniform clothing influences the individuals’ ability to think for themselves and also act in that thought. On the basis of this, a core question and three part questions crystallized. The three questions are a help to answer the core problem. The core question: How does the uniform clothing influence the individual soldiers’ ability to resist conformity? Part questions: - Does clothing have an importance in social contexts? - Why do some individuals follow the group and others not? - Is the soldier influenced by uniform clothing? To measure how the uniform clothing influences soldiers, and thereby answer the questions, the writer used the conformity experiment by Solomon Asch slightly modified for his purposes. Based on the result from the experiment, as well as with support from literature, conclusions where drawn about how or if the soldiers’ individuality where influenced by the uniform clothing. The conclusion was that the uniform clothing increases the soldiers’ conformity in a group. The individual soldier found it easier to adapt to the conformity when he/she wear uniform clothing during the exercise of his or her duties.
|
112 |
Cohomology Jumping Loci and the Relative Malcev CompletionNarkawicz, Anthony Joseph 12 December 2007 (has links)
Two standard invariants used to study the fundamental group of the complement X of a hyperplane arrangement are the Malcev completion of its fundamental group G and the cohomology groups of X with coefficients in rank one local systems. In this thesis, we develop a tool that unifies these two approaches. This tool is the Malcev completion S_p of G relative to a homomorphism p from G into (C^*)^N. The relative completion S_p is a prosolvable group that generalizes the classical Malcev completion; when p is the trivial representation, S_p is the Malcev completion of G. The group S_p is tightly controlled by the cohomology groups H^1(X,L_{p^k}) with coefficients in the irreducible local systems L_{p^k} associated to the representation p.The pronilpotent Lie algebra u_p of the prounipotent radical U_p of S_p has been described by Hain. If p is the trivial representation, then u_p is the holonomy Lie algebra, which is well-known to be quadratically presented. In contrast, we show that when X is the complement of the braid arrangement in complex two-space, there are infinitely many representations p from G into (C^*)^2 for which u_p is not quadratically presented.We show that if Y is a subtorus of the character torus T containing the trivial character, then S_p is combinatorially determined for general p in Y. We do not know whether S_p is always combinatorially determined. If S_p is combinatorially determined for all characters p of G, then the characteristic varieties of the arrangement X are combinatorially determined.When Y is an irreducible subvariety of T^N, we examine the behavior of S_p as p varies in Y. We define an affine group scheme S_Y over Y such that if Y = {p}, then S_Y is the relative Malcev completion S_p. For each p in Y, there is a canonical homomorphism of affine group schemes from S_p into the affine group scheme which is the restriction of S_Y to p. This is often an isomorphism. For example, if there exists p in Y whose image is Zariski dense in G_m^N, then this homomorphism is an isomorphism for general p in Y. / Dissertation
|
113 |
Table Based Design for Function Evaluation and Error Correcting CodesWen, Chia-Sheng 23 July 2012 (has links)
Lookup-table (LUT)-based method is a common approach used in all kinds of research topics. In this dissertation, we present several new designs for table-based function evaluation and table-based error correcting coding. In Chapter 3, a new function evaluation method, called two-level approximation, is presented where piecewise degree-one polynomials are used for initial approximation in the first level, followed by the refined approximation for the shared normalized difference functions in the second level. In Chapter 4, we present a new non-uniform segmentation method that searches for the optimal segmentation scheme with the different design goals of minimizing either ROM, total area, or delay. In Chapter 5, a new design methodology for table-based function evaluation is presented. Unlike previous approaches that usually determine the bit widths by assigning allowable errors for individual hardware components, the total error budget of our new design is considered jointly in order to optimized the bit widths of all the hardware components, leading to significant improvements in both area and delay. Finally, in Chapter 6, the similar table-based concept is used in the design of error correcting encoder using the modified polynomial of the Lagrange interpolation formula, resulting in smaller critical path delay and lower power consumption.
|
114 |
Design and implementation of a multi-digital broadcasting standard channel decoderChou, Hsiao-fang 18 August 2004 (has links)
With the approach of the era of digital TV system around the world, how to grasp the design techniques of the receiver of the DVB-T has become a very important topic. The goal of this thesis is to pursue a highly optimized VLSI architecture compatible to the channel decoding standard of the DVB-T protocol. The channel decoding scheme adopted in DVB-T is based on the concatenated code; which is comprised of an inner Viterbi decoder, outer Reed-Solomon decoder and inner and outer de-interleaver modules. These modules all require a significant amount of data storage space, therefore the main feature of the proposed channel decoder architectures is to realize the data storage based on RAM instead of registers. This approach can lead to the reduction of silicon area and the dynamic power dissipation compared with the shift register based architecture. In order to achieve this, in the design of Viterbi module, the popular register-exchange and trace-back techniques used for the detection of the survivor path has been combined for the survivor memory management unit. As for the design of Reed-Solomon decoder, it is designed based on the modified inverse-free Berlekamp-Massey algorithm. A novel finite field constant multiplier architecture has been proposed which can reduce the required gate count of the multipliers by 20%. For outer convolutional deinterleaver, a specific address generator has been designed such that the data deinterleaver path can be merged and implemented as two memory blocks. For inner symbol deinterleaver, a lookahead technique has been applied to the design of address generator and deinterleaver memory has been reduced by a half compared with those in the literature. These four modules have been verified and integrated as robust channel decoder silicon IP. The related models used for IP integration and verification have also been provided. The prototyping on the FPGA has been tested to satisfy the requirement of the spec.
|
115 |
The liturgical poetry of Nehemiah ben Shelomoh ben Haiman ha-Nasi : a critical edition /Nehemiah ben Solomon ben Heiman, Katsumata, Naoya. January 2002 (has links)
Texte remanié d'une partie de: MA Diss.--Hebrew literature--Jerusalem--Hebrew university, 1998. / Introd. en anglais ; textes et commentaires en hébreu. Index.
|
116 |
Guiding the Naha Seventh-Day Adventist Church in a process of self assessment and in implementing training programs designed to produce positive changes in selected areas of perceived needWatts, N. W. January 2001 (has links)
Thesis (D. Min.)--Trinity Evangelical Divinity School, 2001. / Abstract. Includes bibliographical references (leaves 260-265).
|
117 |
The Male Coming-of-Age Theme in the Hebrew BibleWilson, Stephen Michael January 2013 (has links)
<p>This study identifies and elaborates on a theme in the Hebrew Bible (HB) that has largely gone unnoticed by scholars: the transition of a male adolescent from boyhood to manhood. Beyond identifying the coming-of-age theme in different HB texts, the project also describes how the theme is employed by biblical narrators and redactors to highlight broader messages and transitions in the historical narratives of the HB. It also considers how these stories provide insight into the varying representations of biblical masculinity.</p><p> The project begins by showing how the recent discussions on masculinity in the HB and biblical rites of passage are incomplete without an analysis of how a boy becomes a man in the biblical text. It then establishes important principles for recognizing the maturation theme in a given narrative. More foundational work is done in chapter 2, which describes the characteristic features of manhood and boyhood as depicted in the HB to facilitate the identification of narratives where a transition is made from boyhood to manhood. </p><p> The next two chapters identify five case studies of coming-of-age: David in 1 Sam 17; Solomon in 1 Kgs 1-2; an alternative tale of Solomon's maturation in 1 Kgs 3; Moses in Exod 2; and Samuel in 1 Sam 3. Chapter 5 discusses the converse of the coming-of-age theme by presenting stories of boys who fail to mature: Jether in Judg 8, and Samson in Judg 13-16. In each case study, the narrator's techniques for highlighting the maturation theme are identified. The ways that the narrator employs the theme to point to other significant plot points or narrative transitions are also identified. Most notably, the failure-to-mature theme in the Samson narratives typifies Israel's political immaturity in Judges, and the two alternative tales of Solomon's maturation highlight an important transition in the Deuteronomistic History from the uncertain and often bloody years of the monarchy's establishment to the peaceful, prosperous reign of Solomon. </p><p> The seven case studies are also examined for the image of masculinity that they present, and that presentation is compared to the general view of manhood in the HB. Five of the seven offer quite similar images of masculinity; and these also cohere to the general picture of biblical manhood. However, two narratives (Samuel's maturation in 1 Sam 3 and Solomon's in 1 Kgs 3) depart from this conception of masculinity, each in the same way: both depict a masculinity free of violence and the need for the constant, forceful defense of manhood and honor. Since these two texts have often been ascribed to the same author, the Deuteronomistic Historian, the study suggests that he may be offering a new view of masculinity more suited to his historical context. </p><p> The project ultimately proves that the theme of male coming-of-age, heretofore virtually unrecognized, is found in several biblical texts. Moreover, this theme is often used to indicate other important messages and transitions in Israel's historical narrative and can provide unique insight into biblical constructions of masculinity.</p> / Dissertation
|
118 |
The Original View of Reed-Solomon Coding and the Welch-Berlekamp Decoding AlgorithmMann, Sarah Edge January 2013 (has links)
Reed-Solomon codes are a class of maximum distance separable error correcting codes with known fast error correction algorithms. They have been widely used to assure data integrity for stored data on compact discs, DVDs, and in RAID storage systems, for digital communications channels such as DSL internet connections, and for deep space communications on the Voyager mission. The recent explosion of storage needs for "Big Data'' has generated renewed interest in large storage systems with extended error correction capacity. Reed-Solomon codes have been suggested as one potential solution. This dissertation reviews the theory of Reed-Solomon codes from the perspective taken in Reed and Solomon's original paper on them. It then derives the Welch-Berlekamp algorithm for solving certain polynomial equations, and connects this algorithm to the problem of error correction. The discussion is mathematically rigorous, and provides a complete and consistent discussion of the error correction process. Numerous algorithms for encoding, decoding, erasure recovery, error detection, and error correction are provided and their computational cost is analyzed and discussed thus allowing this dissertation to serve as a manual for engineers interested in implementing Reed-Solomon coding.
|
119 |
Motet settings of the Song of Songs ca. 1500-1520Chiu, Remi. January 2006 (has links)
This thesis investigates early sixteenth-century motet settings of texts taken from the Song of Songs. By way of contextualization, I will explore the Christian history of Song of Songs exegesis from the third century to the twelfth. I will also consider generic properties of the renaissance motet---contemporary definitions of the genre, performance context, types of texts used, and repertory dissemination---and make a case that both the Song of Songs and the motet occupy a sort of "intermediate" position between the secular and the sacred world, participating in both the earthly and the spiritual. / Several motets---Tota pulchra es by Ludwig Senfl, Tota pulchra es by Nicolaus Craen, Nigra sum sed formosa by Johannis Lheritier, and the anonymous Vulnerasti cor meum from Petrucci's Motetti de la Corona I print---will be analyzed through the lens of the historical Christian exegesis and generic considerations of the motet. I interpret diverse musical parameters---among them, texture, quotation of pre-existent material, motivic structuring, cadential manipulation, mode and modal commixture---as some of the ways in which the composers responded to their Song of Songs texts.
|
120 |
Soft-decision decoding of Reed-Solomon codes for mobile messaging systemsKosmach, James J. 12 1900 (has links)
No description available.
|
Page generated in 0.0363 seconds