Recently, Yager in the article "On some new classes of implication operators and their role in approximate reasoning" \cite{Yager_2004} has introduced two new classes of fuzzy implications called the f-generated and g-generated implications. Along similar lines, one of us has proposed another class of fuzzy implications called the h-generated implications. In this article we discuss in detail some properties of the above mentioned classes of fuzzy implications and we describe their relationships amongst themselves and with the well established (S,N)-implications and R-implications. In the cases where they intersect the precise sub-families have been determined.
Let H be a finite-dimensional bialgebra. In this paper, we prove that the category LR(H) of Yetter-Drinfeld-Long bimodules, introduced by F.Panaite, F.Van Oystaeyen (2008), is isomorphic to the Yetter-Drinfeld category H⊗H H⊗H YD over the tensor product bialgebra H H∗ as monoidal categories. Moreover if H is a finite-dimensional Hopf algebra with bijective antipode, the isomorphism is braided. Finally, as an application of this category isomorphism, we give two results., Daowei Lu, Shuanhong Wang., and Seznam literatury
The study focuses on privacy in online social networks. It presents an empirical analysis of youtubers, a group that has not yet been studied in the Czech social sciences. Using interpretive phenomenological analysis and in-depth interviews, we show that there is a typical ‘career’ trajectory that youtubers proceed along, whose structure is determined by experiences of breach of privacy and by mechanisms of reparation. These mechanisms and practices must be employed in order to resolve a fundamental tension between the demand for self-disclosure, arising out of confessional culture and the ideology of authenticity, and the parallel demand for retaining privacy. Breach of privacy is conceptualised as a violation of the equilibrium of its three constitutive elements: content, border, and context. Such situations are experienced as threats to the identity of the youtubers, who seek to avoid these threats by means of reparation practices, changes in how they perform privacy, and the use of what we call tools of controlled (in)accessibility. Unlike normative critiques that lament the loss of privacy on social networks, this article concludes that youtubers are highly competent guardians of their own performed privacy.