842 research outputs found

    Morphisms from P2 to Gr(2,C4)

    Get PDF
    In this note we study morphisms from P2 to Gr(2,C4) from the point of view of the cohomology class they represent in the Grassmannian. This leads to some new result about projection of d-uple imbedding of P2 to P5

    Comparative activity of three inhibitors of the angiotensin converting enzyme on growth, development and ecdysteroid contents of the mediterranean flour moth, Ephestia kuehniella Zeller

    Get PDF
    Three angiotensin converting enzyme (ACE) inhibitors, enalapril, lisinopril and captopril were tested in vivo by topical application on growth, development and whole body ecdysteroids in Ephestia kuehniella Zeller (Lepidoptera:Pyralidae), an important pest in stored products worldwide. The compounds were diluted in acetone and applied topically (10 μg/2 μl) on newly molted pupae. Results show that treatments delayed the pupal development and caused a large decrease in successful adult formation. Treatments had no significant effect on the pupal body weight at 1 and 3 days. Only enalapril at day 5 increases significantly the weight. The enzyme-immunoassay measurements of ecdysteroids in whole body extracts revealed that only lisinopril reduced significantly the hormonal contents at day 3.Keywords: Ephestia kuehniella, development, growth, ecdysteroids, angiotensin converting enzyme, captopril, enalapril, lisinopri

    CSR and logistics: A bibliometric and systematic review of SCOPUS database from 1997 to 2021

    Get PDF
    This bibliometric and systematic study aims to contribute to the ongoing debate on the link between CSR and Supply Chain. The objective is to analyze a large number of documents in a simple and reliable way by examining the relationship between articles, citations, and keywords, thus providing detailed scientific information. Through a preliminary study of the literature «scoping study», we developed the search query by juxtaposing the two terms «SOCIAL RESPONSIBILITY» and «SUPPLY CHAIN». Following its deployment on the SCOPUS database chosen for its quality of coverage of the different research fields and after several manipulations of automatic and manual filters, we have kept 2950 documents. The data of the selected articles were exported in Bibtex format to be analyzed on the free software developed in the R environment bibliometrix. Thanks to its toolbox, we were able to generate visualizations of the annual evolution of scientific production, the most important journals, the most contributing authors, the most active countries, the most cited articles, and the leading themes. In addition to the visualizations, a systematic analysis of the 10 most cited articles was performed. The analysis of these documents allowed us to have an idea about the evolution of the research structure and to identify its tendencies. The results reflect a very important gain of interest and maturity in this field based on a deep theorization. The results also reflect the interest given to the economic and environmental aspects, unlike the social dimension which does not attract enough attention from the scientific community. Despite the methodological limitations that may impact our research, notably the risk of irrelevance in picking words for the query, and the risk of coverage related to the choice of the database. This study will allow the scientific community to clearly identify literature gaps that can be considered opportunities to deepen our thinking.     JEL Classification: M14 Paper type: Empirical researchCette étude bibliométrique et systématique vise à contribuer au débat en cours sur le lien entre la RSE et la chaîne d'approvisionnement. L'objectif est d'analyser un grand nombre de documents d'une manière simple et fiable en examinant la relation entre les articles, les citations et les mots-clés, fournissant ainsi des informations scientifiques détaillées. À travers une étude préliminaire de la littérature, nous avons développé la requête de recherche en juxtaposant les deux termes "SOCIAL RESPONSIBILITY" et "SUPPLY CHAIN". Suite à son déploiement sur la base de données SCOPUS choisie pour sa qualité de couverture des différents domaines de recherche et après plusieurs manipulations de filtres automatiques et manuels, nous avons conservé 2950 documents. Les données des articles sélectionnés ont été exportées au format Bibtex pour être analysées sur le logiciel libre développé dans l'environnement R bibliometrix. Grâce à sa boîte à outils, nous avons pu générer des visualisations de l'évolution annuelle de la production scientifique, des revues les plus importantes, des auteurs les plus contributeurs, des pays les plus actifs, des articles les plus cités, et des thèmes phares. En plus de ces visualisations, une analyse systématique des 10 articles les plus cités a été réalisée. L'analyse de ces documents nous a permis d’avoir une idée sur l'évolution de la structure de la recherche et d'identifier ses tendances. Les résultats reflètent un gain très important d'intérêt et de maturité dans ce domaine basé sur une théorisation profonde. Les résultats reflètent également l'intérêt accordé aux aspects économiques et environnementaux, contrairement à la dimension sociale qui n'attire pas suffisamment l'attention de la communauté scientifique. Malgré les limites méthodologiques qui peuvent impacter notre recherche, notamment le risque de non-pertinence dans le choix des mots de la requête, et le risque de couverture lié au choix de la base de données. Cette étude permettra à la communauté scientifique d'identifier clairement les lacunes de la littérature qui peuvent être considérées comme des opportunités pour approfondir la réflexion.     Classification JEL : M14 Type du papier : Recherche empiriqu

    Etude de style dans la chanson d'amour et de nostalgie d'Ait Menguellet: «tesvelmev-iyi» «tu m'as condamné»

    Get PDF
    L'homme depuis son existence à nos jour passe des messages directs ou indirects afin de transmettre des idées, des points de vues, des conversations...etc. sans qu'il oublie d'encrer tous ça par les écrits en produisant des œuvres littéraires, scientifiques...pleines d'émotion, des visions, et des inventions... pour arriver à faire des distinctions entre ses genres qui nécessitent des outils d'analyses, d'explications et une organisation linguistique particulière. Donc, comment exploiter toutes les virtualités de fonctionnement de la langue par ce qu'on appelle le style

    Étude de l'invocation entre objets dupliqués dans un système réparti tolérant aux fautes

    Get PDF
    This dissertation studies the problems to solve in order to use the invocation paradigm to express replicated object communication in fault-tolerant distributed systems. The ultimate goal is to define abstractions which achieve replication encapsulation, ie which give the illusion that replication is an internal property of objects. Thus, object communication could be always expressed using the invocation paradigm, whether objects are replicated or not. Background The invocation paradigm defines a "request-reply" communication model which matches exactly the client-server model. The latter is generally used to express service interactions in distributed systems. For this reason, the object-oriented approach is well suited to the design of distributed system services. A service can be implemented as a set of objects, located on remote computers (or nodes). Service fault-tolerance is achieved by replicating the objects which implement the service. Most of the previous works about replicated objects consider only server object replication. This study is more general: both client and server can be replicated. Furthermore, replication policies of objects can be different. Four replication policies had been studied: active replication, passive replication, semi-active replication, and coordinator-cohort replication. Replication encapsulation Replication encapsulation means both plurality encapsulation and replication policy encapsulation. Plurality encapsulation consists in hiding from other objects, that a replicated object is actually a set of replicas located on several nodes. Replication policy encapsulation consists in hiding from other objects, the communication protocol to use in order to interact with object replicas without breaking their consistency. The symmetric invocation model Most of the related works are based on an asymmetric invocation model. In this model, the invocation reply follows exactly the reverse of the request communication path. The asymmetric invocation model can not be used to achieve replication encapsulation of client objects. This dissertation proposes a symmetric invocation model which solves this problem. The symmetric invocation model considers the request transmission and the reply transmission as two instances of the same problem: the transmission of a message to a replicated object. Both the analysis of the replication encapsulation problem and the symmetric invocation model were used to define a specification of replicated object invocation. This specification is a set of generic formal properties based on parameters which values depend on replication policies. The properties include object failure semantics which is expressed using the group paradigm and the view-synchronous communication paradigm. Every replicated object is built using an object group which membership changes whenever object replicas fail or restart. The N2M invocation service The main result of this study is the design1 of N2M, an invocation service which supports replicated objects. Objects using N2M are called application objects whereas objects implementing N2M are called communication objects. Communication objects take care of every aspect related to application object replication. Thus, replicated application objects communicate using regular invocations, just as if they were not replicated. There are actually two kinds of communication objects: encapsulators and mailers. Each replicated application object is built using an encapsulator group. Each application object replica is associated with a private encapsulator which acts as an invocation filter for this replica. To communicate with a replicated application object O, every object must interact with O's local mailer. On every node, a replicated application object is represented by a mailer which is responsible for transmitting requests and replies to the application object replicas. The originality of this model is its symmetry: there are both mailers of the server on the client nodes, and mailers of the client on the server nodes. This symmetry is directly inherited from the symmetric invocation model. Each replication policy is implemented using an encapsulator class and a mailer class. These classes replicate objects according to a specific replication policy, while respecting the invocation paradigm. In other words, communication object classes achieve replication encapsulation. The GARF-v2 programming environment The N2M service has been implemented in the context of the GARF project2. The GARF project aimed to provide a programming environment which faciltates the design of fault-tolerant distributed applications. The environment prototype was implemented in Smalltalk. It is based on the group communication layer provided by ISIS toolkit. ---------------------------------------   1this logo refers to the n to m expression which usually names the interaction between n client replicas and m server replicas.   2GARF is the french acronym for automatic generation of fault-tolerant applications

    Méthode systémique et organisationnelle d'Analyse Préliminaire des Risques basée sur une ontologie générique

    Get PDF
    L'analyse Préliminaire des Risques (APR) a été développée au début des années 60 dans les domaines aéronautiques et militaires. C'est aujourd'hui la pierre angulaire du Système de Management de la Sécurité (SMS) dans de nombreuses industries. Quasiment cinq décennies écoulées, mais la pratique d'APR accuse toujours une mauvaise compréhension. Une enquête réalisée par l'INRS auprès de 220 experts de la sûreté de fonctionnement, révèle que 81% des experts disent utiliser l'APR, et seulement 9% d'entre eux considèrent qu'ils la maitrise. En effet, cette révélation surprenante est justifiée compte tenu les nombreuses difficultés d'ordre méthodologique, terminologique, technique ou organisationnel que nous avons pu identifier. De surcroît, L'APR ne fait toujours pas l'objet d'un projet de normalisation, ce qui ouvre la porte à toute sorte de divergence. Dans une démarche de résolution des difficultés constatées, nous proposons la méthode Management Préliminaire des Risques (MPR) basée sur un processus accidentel générique permettant de canaliser les mécanismes de capitalisation et d'exploitation des connaissances relatives aux scénarios d'accident (causalité, entités, situations, événements, etc.). La méthode MPR, se rattache au Système de Management de la Sécurité (SMS) sur un point d'ancrage essentiel qu'est la gestion des processus techniques et organisationnels. Notre objectif est triple, d'abord montrer les 10 difficultés majeures que nous avons constatées en matière de management des risques, ensuite présenter la méthode MPR que nous proposons pour résoudre ces difficultés dans le but d'exploiter efficacement l'échange de savoir-faire en matière de management des risques relatifs à différents systèmes voire issus de différents domaine, et enfin présenter de manière synthétique l'outil SIGAR (Système Informatique Générique d'Analyse de Risque) dédié à cette méthode.APR ; Management des risques; Ontologie, Systémique; Analyse des risques;
    • …
    corecore