The common element: general

Author(s):  
J. M. Hinton
Keyword(s):  
Filomat ◽  
2017 ◽  
Vol 31 (5) ◽  
pp. 1423-1434 ◽  
Author(s):  
Sheng Wang ◽  
Min Chen

In this paper, we propose an iterative algorithm for finding the common element of solution set of a split equilibrium problem and common fixed point set of a finite family of asymptotically nonexpansive mappings in Hilbert space. The strong convergence of this algorithm is proved.


2012 ◽  
Vol 2012 ◽  
pp. 1-13
Author(s):  
Zi-Ming Wang

Equilibrium problem and fixed point problem are considered. A general iterative algorithm is introduced for finding a common element of the set of solutions to the equilibrium problem and the common set of fixed points of two weak relatively uniformly nonexpansive multivalued mappings. Furthermore, strong and weak convergence results for the common element in the two sets mentioned above are established in some Banach space.


2017 ◽  
Vol 37 (4) ◽  
pp. 719-733 ◽  
Author(s):  
ALEJANDRO HORTAL

ABSTRACT This paper contextualizes Simon’s book, Administrative Behavior, within the evolution of his ideas arguing, contrary to what some have posited, that the common element that unites this book with the rest of Simon’s work is not the criticism of the classical approach, but an epistemological frame, based on an empirical methodology. This empiricism is the element that remained constant during his career and led him to introduce psychological factors when explaining the behavior of economic agents under his models of bounded and procedural rationality.


Author(s):  
Joseph T. Gilbert

What does ethics have to do with computer security in the new millennium? What, for that matter, did it have to do with computer security in the old millennium? To answer these two questions, we will start with a more fundamental question: what is ethics? In the first part of this chapter, we will briefly review ethics as a part of philosophy. We will examine three approaches that have been taken for hundreds of years as humans have tried to decide what is the right way to behave. We will then examine business ethics, which is an applied subset of the more general topic. Finally, we will explore specific issues which currently present themselves as matters of ethical concern in the world of computer security, and provide a framework for analyzing issues which have not yet presented themselves, but will do so at some future date. Is it ethical to lend a friend a set of discs which contain a three hundred dollar program that you have purchased, knowing that he intends to load the program onto his computer before returning the discs? Is it ethical to hack into computer systems, as long as you don’t disrupt or corrupt the systems? Is it ethical to monitor the e-mail of your employees? In order to answer these and a host of other questions, it is useful to think about the common element in all these questions: is it ethical?


1909 ◽  
Vol 2 (3) ◽  
pp. 277-309
Author(s):  
Benjamin Wisner Bacon

No passage of the Synoptic Gospels throws so much light upon Jesus’ sense of his own mission as that which deals with Knowing the Father and Being Known of Him in Mt. 11 25-27, Lk. 10 21-22. It belongs to the common element of Matthew and Luke unknown in Mark, and in the judgment of the great majority of critics must therefore be referred to a common source of high antiquity. In short, as respects attestation, its claims to authenticity are unexcelled. As respects content, it deals with the all-important matter of Jesus’ doctrine of divine sonship, and yet it seems to stand alone among Synoptic sayings, and to be paralleled only by utterances ascribed to Jesus by the fourth evangelist. But the Johannine discourses give every indication of having been composed by the evangelist himself in order to expound in dialogue form his own deutero-pauline Christology. The only instance in all Synoptic tradition of anything comparable to this apposition of “the Son…the Father,” is Mk. 13 32, Mt. 24 36.Of that day or that hour knoweth no one, not even the angels in heaven, neither the Son, but the Father.


2012 ◽  
Vol 134 (6) ◽  
Author(s):  
Bahram Khalighi ◽  
Kuo-Huey Chen ◽  
G. Iaccarino

The unsteady flow around a simplified road vehicle model with and without drag reduction devices is investigated. The simulations are carried out using the unsteady RANS in conjunction with the v2-f turbulence model. The corresponding experiments are performed in a small wind tunnel which includes pressure and velocity fields measurements. The devices are add-on geometry parts (a box with a cavity and, boat-tail without a cavity) which are attached to the back of the square-back model to improve the pressure recovery and reduce the flow unsteadiness. The results show that the recirculation regions at the base are shortened and weakened and the base pressure is significantly increased by the devices which lead to lower drag coefficients (up to 30% reduction in drag). Also, the results indicate a reduction of the turbulence intensities in the wake as well as a rapid upward deflection of the underbody flow with the devices in place. A reduction of the unsteadiness is the common element of the devices studied. The baseline configuration (square-back) exhibits strong three-dimensional flapping of the wake. The main shedding frequency captured agrees well with the available experimental data. Comparisons with the measurements show that the simulations agree reasonably well with the experiments in terms of drag and the flow structures. Finally, a blowing system (Coanda jet) is investigated numerically. In this case a drag reduction of up to 50% is realized.


2021 ◽  
Vol 0 (0) ◽  
pp. 0
Author(s):  
Mohammad Eslamian ◽  
Ahmad Kamandi

<p style='text-indent:20px;'>In this paper, we study the problem of finding a common element of the set of solutions of a system of monotone inclusion problems and the set of common fixed points of a finite family of generalized demimetric mappings in Hilbert spaces. We propose a new and efficient algorithm for solving this problem. Our method relies on the inertial algorithm, Tseng's splitting algorithm and the viscosity algorithm. Strong convergence analysis of the proposed method is established under standard and mild conditions. As applications we use our algorithm for finding the common solutions to variational inequality problems, the constrained multiple-set split convex feasibility problem, the convex minimization problem and the common minimizer problem. Finally, we give some numerical results to show that our proposed algorithm is efficient and implementable from the numerical point of view.</p>


Open Theology ◽  
2018 ◽  
Vol 4 (1) ◽  
pp. 677-684
Author(s):  
Jorge Martínez-Barrera

Abstract The purpose of this paper is to show a surprising coincidence between Lutheran Protestantism and physicalist neurosciences regarding the negation of free will and how this issue can begin to be studied in Latin American academia. The current advance of Protestantism in Latin America, accompanied by a decline in Catholicism, is simultaneous with a growing presence of the physicalist neurosciences. It can be seen that the development of Protestantism and neurosciences coincide historically in Latin America, unlike what happened in other parts of the world, where Protestantism has a much more extensive history. This allows us to suppose that the discussion on free will will be installed as a matter of research and discussion in the Latin American academia, which had not happened until now. In this work we also seek to identify what could be the common element that unites the Lutheran conception and the arguments of the physicalist neurosciences about the negation of free will. We will show that this common element is the aversion to metaphysics as an explanatory dimension of free will. The strong opposition to metaphysics is probably the most important common element between Lutheran Protestantism and the physicalistic neurosciences. This will allow us to show that the proximity between the two is not such an extravagant idea.


2021 ◽  
Vol 883 ◽  
pp. 119-126
Author(s):  
Luis M. Alves ◽  
Rafael M. Afonso ◽  
Paulo A.F. Martins

This paper is focused on innovative self-pierce riveting concepts to produce invisible joints in sheet-sheet and tube-sheet connections. The common element to these two different types of joints is the use of tubular rivets with chamfered ends, which are accessories in the case of sheet-sheet joints and constitutive (structural) elements in the case of tube-sheet joints. The presentation draws from the deformation mechanics of double-sided self-pierce riveting for producing lap joints in overlapped sheets to the development of self-pierce riveting of tubes to sheets, which is a new joining by forming process capable of attaching a sheet to the end of a tube, at room temperature. Aluminum sheets, carbon and stainless-steel tubes are utilized to demonstrate the effectiveness of the new self-pierce riveting concepts and finite element modelling using an in-house computer program gives support to the overall presentation. Destructive tests are carried out to evaluate the destructive strength that the joints are capable to withstand without failure.


2021 ◽  
pp. 147892992110620
Author(s):  
Kieron O’Hara

In reply to Dean Blackburn’s ‘In the Shadows’, it is argued that the situated nature of the conservative ideology entails that its adherents cannot have a substantive set of shared values, but that their values will typically be a cultural inheritance. The epistemological element of conservatism may not be the most electorally salient in any concrete context, but has strategic value as the common element of conservatism most likely to support a public reason defence.


Sign in / Sign up

Export Citation Format

Share Document