scholarly journals Paul W. Bennett, The State of the System: A Reality Check on Canada's Schools

Author(s):  
Charles Ungerleider
Keyword(s):  
System A ◽  
Author(s):  
Lesley Ellis Miller

This article explores the surface and substance of elite dress in the baroque period by unpacking printed texts and images that reveal their political and economic significance in the courts of Europe. It does so by considering the nature and sources of garments and fabrics, continuity and change in their production and consumption in Spain and France, and the shaping of the modern fashion system—a system in which changes in textiles and trimmings were promoted seasonally by the state, textile manufacturers, and the nascent fashion press (Le Mercure galant) from the late seventeenth century onward. It thus underlines the local and global networks involved in the production and consumption of dress.


Author(s):  
Sumit Ganguly ◽  
William R. Thompson

This chapter examines violence monopoly. Violence monopoly refers to whether the state is capable of establishing an order in which its claim to be the ultimate and principal employer of coercion goes largely unchallenged. The more often states are challenged, and the more intense the nature of the challengers, the less likely the state is to survive as the central institution of a political system. A poor showing in the violence monopoly category is one of the Indian state's greatest vulnerabilities in terms of state capacity. It will need to be improved upon simply to maintain order. Yet it is doubtful that the Indian state will improve in this area rapidly.


2019 ◽  
Vol 16 (4) ◽  
pp. 169
Author(s):  
I M Yannikov ◽  
M V Telegina

The paper assesses the existing approaches to the problem of assessing the security of hazardous facilities. It is proposed to carry out an assessment using the system of modeling and calculating the state of protection of hazardous objects developed on the basis of the Clements-Hoffman method, in which a set of threats, protection mechanisms and objects of protection are used to describe the system of protection with full overlap. This system can be used to calculate any type of protection of hazardous objects when entering data on any threats and appropriate means of protection. The paper provides a block diagram of the security system, a functional diagram, the main parameters and stages of development and testing.


2021 ◽  
Vol 72 (1) ◽  
pp. 3-12
Author(s):  
V. V. NECHAEV ◽  

A method based on the sequential implementation of a formalized description of the process of consuming spare parts, a formalized description of the process of determining the state of the el-ements of a market system, a formalized description of the process of determining a rational route for transporting the necessary material and technical means is presented.


2020 ◽  
Vol 30 (10) ◽  
pp. 2050008 ◽  
Author(s):  
Hong Peng ◽  
Zeqiong Lv ◽  
Bo Li ◽  
Xiaohui Luo ◽  
Jun Wang ◽  
...  

This paper proposes a new variant of spiking neural P systems (in short, SNP systems), nonlinear spiking neural P systems (in short, NSNP systems). In NSNP systems, the state of each neuron is denoted by a real number, and a real configuration vector is used to characterize the state of the whole system. A new type of spiking rules, nonlinear spiking rules, is introduced to handle the neuron’s firing, where the consumed and generated amounts of spikes are often expressed by the nonlinear functions of the state of the neuron. NSNP systems are a class of distributed parallel and nondeterministic computing systems. The computational power of NSNP systems is discussed. Specifically, it is proved that NSNP systems as number-generating/accepting devices are Turing-universal. Moreover, we establish two small universal NSNP systems for function computing and number generator, containing 117 neurons and 164 neurons, respectively.


2007 ◽  
Vol 20 (4) ◽  
pp. 619-637 ◽  
Author(s):  
Kees van der Pijl
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document