1,349 research outputs found

    Reifying Religion While Lost in Translation: Mirza Mazhar Jan-i-Janan (d.1781) on the Hindus

    Get PDF
    This paper examines the life and thought of one of the leading Muslim revivalist thinkers in 18th century India, Mirza Mazhar Jan-i-Janan (1699-1781) in an effort to understand the relationship, if any, between the structures of knowledge that informed colonial conceptions of India’s religious topography and 18th century projects of intra-religious and cross-religious interpretation (such as that conducted by Jan-i Janan)? In addition, the project aims at informing the inquiry as to the extent to which the process of reification that led to the development of a unified notion of ‘Hinduism’ in the modern era already was underway in the works of 18th century figures such as Jan-i Janan

    Intermediate integer programming representations using value disjunctions

    Full text link
    We introduce a general technique to create an extended formulation of a mixed-integer program. We classify the integer variables into blocks, each of which generates a finite set of vector values. The extended formulation is constructed by creating a new binary variable for each generated value. Initial experiments show that the extended formulation can have a more compact complete description than the original formulation. We prove that, using this reformulation technique, the facet description decomposes into one ``linking polyhedron'' per block and the ``aggregated polyhedron''. Each of these polyhedra can be analyzed separately. For the case of identical coefficients in a block, we provide a complete description of the linking polyhedron and a polynomial-time separation algorithm. Applied to the knapsack with a fixed number of distinct coefficients, this theorem provides a complete description in an extended space with a polynomial number of variables.Comment: 26 pages, 5 figure

    Fond bozorini rivojlantirish orqali iqtisodiy taraqqiyotga erishish yo’llari

    Get PDF
    Maqolada fond bozori faoliyat qilishining o‘ziga xos xususiyatlari, uning mamlakatning iqtisodiy o‘sish ko‘rsatkichlari bilan bog’liqligi o‘rganilgan, O‘zbekiston Respublikasida fond bozori holatining bir necha yillik ko’rsatkichlari tahlil qilingan, fond bozorining amal qilish mexanizmlarini takomillashtirishga qaratilgan tavsiyalar ishlab chiqilgan

    An Analysis of Tools for Online Anonymity

    Get PDF
    Purpose The purpose of this paper is to examine the possible explanations for the slow adoption and development of online anonymity technology. The ability to remain anonymous while engaging in different activities, online is increasingly sought after by consumers with privacy concerns. Currently, the only way to maintain online anonymity is through the use of technology. This paper reviews and analyzes the tools currently available to consumers to maintain online anonymity. There are only four tools available to consumers to ensure online anonymity: anonymous remailers, rewebbers, The Onion Router (Tor) and the Invisible Internet Project (I2P). These tools provide the protection needed for an Internet user to remain anonymous but suffer from a lack of usability and adoption. Design/methodology/approach The authors have selected a few specific online anonymity technologies based on the following criteria: the technology satisfies our full anonymity definition, the technology is currently available for public use and the technology has been academically researched. Findings Few anonymity technologies are available for public use that offer the ability for full online anonymity, and these technologies are difficult for the average computer user to operate. Further research is still needed to help determine what the average user wants to see in an anonymity technology as well as ways to help users integrate the technology into their commodity software (such as Web browsers). Future online anonymity technologies should enable the user to decide when, how and with whom their information is shared if it is shared at all with ease and simplicity. Originality/value The authors identify, explain and analyze publicly available online anonymity technologies in terms of their usability. The authors identified ways as to how online anonymity technology can be improved to increase public adoption. The authors make pertinent recommendations on how the design and development of online anonymity technology can be improved in the future

    Online Deception in Social Media

    Get PDF
    The unknown and the invisible exploit the unwary and the uninformed for illicit financial gain and reputation damage

    O’timli va o’timsiz fe’llarning yapon va o’zbek tilida qo’llanilishi

    Get PDF
    Maʼlumki Yapon tilini oʻrganishda murakkabligi feʼllarning oʻziga xosligidadir. Xususan oʻtimli va oʻtimsiz feʼllarning qoʻllanilishi oʻzbek tilidan keskin farq qilib yapon tili oʻrganuvchilari uchun maʼlum chalkashliklarni keltirib chiqaradi. Ushbu maqolada yapon tilidagi oʻtimli va oʻtimsiz feʼllarning qoʻllanilishi holatlarini tahlil qilish orqali yapon tili oʻrganuvchilari uchun yengilliklar yaratish tadqiqotning asosiy maqsadi sanaladi

    Ko’prik inshootlarning xolatini baxolash va ishonchliligi sabablari

    Get PDF
    Ko’prik inshootlarning oraliq qurulmalaridan foydalanishda ishonchlilik nazariyasini qo‘llashning asosiy yo‘nalishi - me’yorlashtirishdir. Chegaraviy holatlar uslubiyoti qo‘llangan zamonaviy loyihalashtirish me’yorlari ishonchlilik nazariyasi qoidalariga asoslangan
    • …
    corecore