Search results for "work"
showing 10 items of 14511 documents
Complex Networks in Air Transport
2016
The application of CNT to air traffic management has seen significant growth in recent years. This is partly because air traffic can be seen as the superposition of different networks, including the networks of airports, sectors and navigation points. Moreover each of these networks can be seen as a multiplex – for example, by associating each layer with a different airline. The study of the topology of these networks is important for several reasons related to understanding, monitoring, controlling, and optimising the air traffic system. The topological properties of air traffic networks are useful: (i) for studying how the air traffic has changed in recent years; (ii) for identifying the …
Vil økt fysisk aktivitet kunne redusere andelen trygdemottakere? : En case-studie basert på deltakere ved Aktiv på dagtid, Aust-Agder
2018
Masteroppgave offentlig politikk og ledelse ME502 - Universitetet i Agder 2018 This study is based on Aktiv pådagtid as an case study. The purpose of this study is to investigate the relationship between increased participation in physical activities directed by Aktiv på dagtid and the participants status in relation to working life. To better understand the relationship between these two variables, the study include three possible predictors:health, social support and self-efficacy.Thisstudy use a paper-based survey with 144 respondents, which represent the participants atAktiv på dagtid, who are at theage between 16-70, receive social security benefits and resides in the municipalities of…
THE CAUSAL ROOTS OF INTEGRATION AND THE UNITY OF CONSCIOUSNESS
2016
A fundamental feature of consciousness is unity. The problem is whether unity is compatible both with the physical underpinnings of conscious experience and with the fabric of the physical world in general.
Symmetric and asymmetric cryptographic key exchange protocols in the octonion algebra
2019
AbstractWe propose three cryptographic key exchange protocols in the octonion algebra. Using the totient function, defined for integral octonions, we generalize the RSA public-key cryptosystem to the octonion arithmetics. The two proposed symmetric cryptographic key exchange protocols are based on the automorphism and the derivation of the octonion algebra.
A note on the rational canonical form of an endomorphism of a vector space of finite dimension
2018
[EN] In this note, we give an easy algorithm to construct the rational canonical form of a square matrix or an endomorphism h of a finite dimensional vector space which does not depend on either the structure theorem for finitely generated modules over principal ideal domains or matrices over the polynomial ring. The algorithm is based on the construction of an element whose minimum polynomial coincides with the minimum polynomial of the endomorphism and on the fact that the h-invariant subspace generated by such an element admits an h-invariant complement. It is also shown that this element can be easily obtained without the factorisation of a polynomial as a product of irreducible polynom…
Applied Linear Algebra: Electrical Networks
2016
This chapter shows how mathematical theory is not an abstract subject which has no connection with the real world. On the contrary, this entire book is written by stating that mathematics in general, and algebra in this case, is an integrating part of every day real life and that the professional life of computational scientists and engineers requires a solid mathematical background. In order to show how the contents of the previous chapters have an immediate technical application, the last chapter of this book describes a core engineering subject, i.e. electrical networks, as an algebraic exercise. Furthermore, this chapter shows how the combination of the algebraic topics give a natural r…
The role of virtual work in Levi-Civita's parallel transport
2015
The current literature on history of science reports that Levi-Civita’s parallel transport was motivated by his attempt to provide the covariant derivative of the absolute differential calculus with a geometrical interpretation (For instance, see Scholz in The intersection of history and mathematics, Birkhauser, Basel, pp 203–230, 1994, Sect. 4). Levi-Civita’s memoir on the subject was explicitly aimed at simplifying the geometrical computation of the curvature of a Riemannian manifold. In the present paper, we wish to point out the possible role implicitly played by the principle of virtual work in Levi-Civita’s conceptual reasoning to formulate parallel transport.
A Non-antisymmetric Tensor Contraction Engine for the Automated Implementation of Spin-Adapted Coupled Cluster Approaches
2015
We present a symbolic manipulation algorithm for the efficient automated implementation of rigorously spin-free coupled cluster (CC) theories based on a unitary group parametrization. Due to the lack of antisymmetry of the unitary group generators under index permutations, all quantities involved in the equations are expressed in terms of non-antisymmetric tensors. Given two tensors, all possible contractions are first generated by applying Wick's theorem. Each term is then put down in the form of a non-antisymmetric Goldstone diagram by assigning its contraction topology. The subsequent simplification of the equations by summing up equivalent terms and their factorization by identifying co…
Arithmetic Problems Formulation and Working Memory Load
1987
First, third, and fifth graders (French children in American-numbered grades) were asked to solve arithmetic problems in which an initial state was modified by two successive transformations. Three independent variables were manipulated systematically. First, the unknown state was either the final state (Sl) or the initial state (S2). Second, either the known state (01) or the transformations (02) appeared in the first place in the problem wording. Third, the question was either located at the end (Ql) or at the beginning (42) of the problem text. As anticipated, these modifications strongly affected the performances at every age: S1 appears clearly easier than S2; 0 1 leads to a better per…
CY-Operators and L-Functions
2019
This a write up of a talk given at the MATRIX conference at Creswick in 2017 (to be precise, on Friday, January 20, 2017). It reports on work in progress with P. Candelas and X. de la Ossa. The aim of that work is to determine, under certain conditions, the local Euler factors of the L-functions of the fibres of a family of varieties without recourse to the equations of the varieties in question, but solely from the associated Picard–Fuchs equation.