670 research outputs found

    Large dimensional classical groups and linear spaces

    Get PDF
    Suppose that a group GG has socle LL a simple large-rank classical group. Suppose furthermore that GG acts transitively on the set of lines of a linear space S\mathcal{S}. We prove that, provided LL has dimension at least 25, then GG acts transitively on the set of flags of S\mathcal{S} and hence the action is known. For particular families of classical groups our results hold for dimension smaller than 25. The group theoretic methods used to prove the result (described in Section 3) are robust and general and are likely to have wider application in the study of almost simple groups acting on finite linear spaces.Comment: 32 pages. Version 2 has a new format that includes less repetition. It also proves a slightly stronger result; with the addition of our "Concluding Remarks" section the result holds for dimension at least 2

    ¡Experimenta, observa y piensa en science!

    Get PDF
    En el presente trabajo se argumenta la importancia de llevar a cabo un cambio en la metodología de las aulas de educación primaria, presentado una forma de trabajo más activa, en la cual el alumno juega un papel importante en su aprendizaje, partiendo de sus interés y de los conocimientos recientemente adquiridos de un tema en concreto, de tal manera que se ofrece la oportunidad de experimentar sobre ello con el fin de aplicar lo aprendido. En dicha metodología se fomenta entre otras cosas el trabajo colaborativo y la adquisición de conocimientos más perdurables en el tiempo, Por lo anteriormente expuesto se presenta una propuesta diseñada para grupos de segundo curso de educación primaria, con el objetivo de buscar un método alternativo a la educación más tradicional presente en décadas anteriores.Grado en Educación Primari

    Formas de la mirada: Paisaje interior. La experiencia como materialidad del paisaje en Santa Teresa de Ávila.

    Get PDF
    En entendimiento de la naturaleza como paisaje a través de la mirada se debe a Petrarca (1304-1374) y su ascensión al Mont Ventoux el 26 de abril de 1336. En este momento comienza el “placer de mirar”. Una vez que hubo interiorizado la vista panorámica desde la cumbre, Petrarca tomó el libro de las Confesiones y leyó el siguiente párrafo del libro X: “Los hombres, por lo común, se admiran de ver la altura de los montes, las grandes olas del mar, las anchurosas corrientes de los ríos, la altitud inmensa del océano, el curso de los astros, y se olvidan de lo mucho que tienen que admirar en sí mismos... Entonces, satisfecho, pues ya había visto bastante la montaña, dirigí mi mirada interior hacia mí”1 Si el paisaje puede entenderse como una construcción mental, elaborada a partir de la contemplación de un determinado territorio desde la propia cultura, lleva implícita una interpretación de la realidad, un observador con un punto de vista subjetivo que viene determinado en buena medida por el propio bagaje cultural, la personal visión del mundo: una forma muy concreta de la mirada. Se produce un movimiento del espectador hacia el objeto de contemplación, una salida del sujeto al encuentro de la realidad que a su vez tiene un camino de retorno, en palabras de Unamuno un camino de ida y vuelta, la propia naturaleza, transformada ya en paisaje, al retornar, configura de nuevo la interioridad del observador. Se elige la obra de Las Moradas como ejemplo de experiencia reflejada a partir de la literatura. Frecuentemente se emplean metáforas espaciales para expresar esas experiencias difíciles de hacerse visibles a través de otros medios. El espacio parece medio privilegiado de expresión a través de la palabra escrita que evoca las imágenes que componen el paisaje

    Towards better understanding Cybersecurity: Or are "Cyberspace" and "Cyber Space" the same?

    Get PDF
    Although there are many technology challenges and approaches to attaining cybersecurity, human actions (or inactions) also often pose large risks. There are many reasons, but one problem is whether we all “see the world” the same way. That is, what does “cybersecurity” actually mean – as well as the many related concepts, such as “cyberthreat,” “cybercrime,” etc. Although dictionaries, glossaries, and other sources tell you what words/phrases are supposed to mean (somewhat complicated by the fact that they often contradict each other), they do not tell you how people are actually using them. If we are to have an effective solution, it is important that all the parties understand each other – or, at least, understand that there are different perspectives. For the purpose of this paper and to demonstrate our methodology, we consider the case of the words, “cyberspace” and “cyber space.” When we started, we assumed that “cyberspace” and “cyber space” were essentially the same word with just a minor variation in punctuation (i.e., the space, or lack thereof, between “cyber” and “space”) and that the choice of the punctuation was a rather random occurrence. With that assumption in mind, we would expect that the usage of these words (as determined by the taxonomies that would be constructed by our algorithms) would be basically the same. As it turned out, they were quite different, both in overall shape and groupings within the taxonomy. Since the overall field of cybersecurity is so new, understanding the field and how people think about it (as evidenced by their actual usage of terminology, and how usage changes over time) is an important goal. Our approach helps to illuminate these understandings

    Exploring Terms and Taxonomies Relating to the Cyber International Relations Research Field: or are "Cyberspace" and "Cyber Space" the same?

    Get PDF
    This project has at least two facets to it: (1) advancing the algorithms in the sub-field of bibliometrics often referred to as "text mining" whereby hundreds of thousands of documents (such as journal articles) are scanned and relationships amongst words and phrases are established and (2) applying these tools in support of the Explorations in Cyber International Relations (ECIR) research effort. In international relations, it is important that all the parties understand each other. Although dictionaries, glossaries, and other sources tell you what words/phrases are supposed to mean (somewhat complicated by the fact that they often contradict each other), they do not tell you how people are actually using them. As an example, when we started, we assumed that "cyberspace" and "cyber space" were essentially the same word with just a minor variation in punctuation (i.e., the space, or lack thereof, between "cyber" and "space") and that the choice of the punctuation was a rather random occurrence. With that assumption in mind, we would expect that the taxonomies that would be constructed by our algorithms using "cyberspace" and "cyber space" as seed terms would be basically the same. As it turned out, they were quite different, both in overall shape and groupings within the taxonomy. Since the overall field of cyber international relations is so new, understanding the field and how people think about (as evidenced by their actual usage of terminology, and how usage changes over time) is an important goal as part of the overall ECIR project

    One-prime power hypothesis for conjugacy class sizes

    Get PDF
    A finite group G satisfies the one-prime power hypothesis for conjugacy class sizes if any two conjugacy class sizes m and n are either equal or have common divisor a prime power. Taeri conjectured that an insoluble group satisfying this condition is isomorphic to S × A where A is abelian and S(Formula Present.) P SL2(q) for q ∈ {4, 8}. We confirm this conjecture

    Approach and Preliminary Results for Early Growth Technology Analysis

    Get PDF
    Even experts cannot be fully aware of all the promising developments in broad and complex fields of technology, such as renewable energy. Fortunately, there exist many diverse sources of information that report new technological developments, such as journal publications, news stories, and blogs. However, the volume of data contained in these sources is enormous; it would be difficult for a human to read and digest all of this information - especially in a timely manner. This paper describes a novel application of technology mining techniques to these diverse information sources to study, visualize, and identify the evolution of promising new technologies - a challenge we call 'early growth technology analysis.' For the work reported herein, we use as inputs information about millions of published documents contained in sources such as SCIRCUS, Inspec, and Compendex. We accomplish this analysis through the use of bibliometric analysis, consisting of three key steps: 1. Extract related keywords (from keywords in articles) 2. Determine the annual occurrence frequencies of these keywords 3. Identify those exhibiting rapid growth, particularly if starting from a low base. To provide a focus for the experiments and subsequent discussions, a pilot study was conducted in the area of 'renewable energy,' though the techniques and methods developed are neutral to the domain of study. Preliminary results and conclusions from the case study are presented and are discussed in the context of the effectiveness of the proposed methodology
    corecore