150 resultados para Main Memory


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research is an autoethnographic investigation of consumption experiences, public and quasi-public spaces, and their relationship to community within an inner city neighbourhood. The research specifically focuses on the gentrifying inner city, where class-based processes of change can have implications for people’s abilities to remain within, or feel connected to place. However, the thesis draws on broader theories of the throwntogetherness of the contemporary city (e.g., Amin and Thrift, 2002; Massey 2005) to argue that the city is a space where place-based meanings cannot be seen to be fixed, and are instead better understood as events of place – based on ever shifting interrelations between the trajectories of people and things. This perspective argues the experience of belonging to community is not just born of a social encounter, but also draws on the physical and symbolic elements of the context in which it is situated. The thesis particularly explores the ways people construct identifications within this shifting urban environment. As such, consumption practices and spaces offer one important lens through which to explore the interplay of the physical, social and symbolic. Consumer research tells us that consumption practices can facilitate experiences in which identity-defining meaning can be generated and shared. Consumption spaces can also support different kinds of collective identification – as anchoring realms for specific cultural groups or exposure realms that enable individuals to share in the identification practices of others with limited risk (Aubert-Gamet & Cova, 1999). Furthermore, the consumption-based lifestyles that gentrifying inner city neighbourhoods both support and encourage can also mean that consumption practices may be a key reason that people are moving through public space. That is, consumption practices and spaces may provide a purpose for which – and spatial frame against which – our everyday interactions and connections with people and objects are undertaken within such neighbourhoods. The purpose of this investigation then was to delve into the subjectivities at the heart of identifying with places, using the lens of our consumption-based experiences within them. The enquiry describes individual and collective identifications and emotional connections, and explores how these arise within and through our experiences within public and quasi-public spaces. It then theorises these ‘imaginings’ as representative of an experience of community. To do so, it draws on theories of imagination and its relation to community. Theories of imagined community remind us that both the values and identities of community are held together by projections that create relational links out of objects and shared practices (e.g., Benedict Anderson, 2006; Urry, 2000). Drawing on broader theories of the processes of the imagination, this thesis suggests that an interplay between reflexivity and fantasy – which are products of the critical and the fascinated consciousness – plays a role in this imagining of community (e.g., Brann, 1991; Ricoeur, 1994). This thesis therefore seeks to explore how these processes of imagining are implicated within the construction of an experience of belonging to neighbourhood-based community through consumption practices and the public and quasi-public spaces that frame them. The key question of this thesis is how do an individual’s consumption practices work to construct an imagined presence of neighbourhood-based community? Given the focus on public and quasi-public spaces and our experiences within them, the research also asked how do experiences in the public and quasi-public spaces that frame these practices contribute to the construction of this imagined presence? This investigation of imagining community through consumption practices is based on my own experiences of moving to, and attempting to construct community connections within, an inner city neighbourhood in Melbourne, Australia. To do so, I adopted autoethnographic methodology. This is because autoethnography provides the methodological tools through which one can explore and make visible the subjectivities inherent within the lived experiences of interest to the thesis (Ellis, 2004). I describe imagining community through consumption as an extension of a placebased self. This self is manifest through personal identification in consumption spaces that operate as anchoring realms for specific cultural groups, as well as through a broader imagining of spaces, people, and practices as connected through experiences within realms of exposure. However, this is a process that oscillates through cycles of identification; these anchor one within place personally, but also disrupt those attachments. This instability can force one to question the orientation and motives of these imaginings, and reframe them according to different spaces and reference groups in ways that can also work to construct a more anonymous and, conversely, more achievable collective identification. All the while, the ‘I’ at the heart of this identification is in an ongoing process of negotiation, and similarly, the imagined community is never complete. That is, imagining community is a negotiation, with people and spaces – but mostly with the different identifications of the self. This thesis has been undertaken by publication, and thus the process of imagining community is explored and described through four papers. Of these, the first two focus on specific types of consumption spaces – a bar and a shopping centre – and consider the ways that anchoring and exposure within these spaces support the process of imagining community. The third paper examines the ways that the public and quasi-public spaces that make up the broader neighbourhood context are themselves throwntogether as a realm of exposure, and considers the ways this shapes my imaginings of this neighbourhood as community. The final paper develops a theory of imagined community, as a process of comparison and contrast with imagined others, to provide a summative conceptualisation of the first three papers. The first paper, chapter five, explores this process of comparison and contrast in relation to authenticity, which in itself is a subjective assessment of identity. This chapter was written as a direct response to the recent work of Zukin (2010), and draws on theories of authenticity as applied to personal and collective identification practices by consumer researchers Arnould and Price (2000). In this chapter, I describe how my assessments of the authenticity of my anchoring experiences within one specific consumption space, a neighbourhood bar, are evaluated in comparison to my observations of and affective reactions to the social practices of another group of residents in a different consumption space, the local shopping centre. Chapter five also provides an overview of the key sites and experiences that are considered in more detail in the following two chapters. In chapter six, I again draw on my experiences within the bar introduced in chapter five, this time to explore the process of developing a regular identity within a specific consumption space. Addressing the popular theory of the cafe or bar as third place (Oldenburg, 1999), this paper considers the purpose of developing anchored relationships with people within specific consumption spaces, and explores the different ways this may be achieved in an urban context where the mobilities and lifestyle practices of residents complicate the idea of a consumption space as an anchoring or third place. In doing so, this chapter also considers the manner in which this type of regular identification may be seen to be the beginning of the process of imagining community. In chapter seven, I consider the ways the broader public spaces of the neighbourhood work cumulatively to expose different aspects of its identity by following my everyday movements through the neighbourhood’s shopping centre and main street. Drawing on the theories of Urry (2000), Massey (2005), and Amin (2007, 2008), this chapter describes how these spaces operate as exposure realms, enabling the expression of different senses of the neighbourhood’s spaces, times, cultures, and identities through their physical, social, and symbolic elements. Yet they also enable them to be united: through habitual pathways, group practices of appropriation of space, and memory traces that construct connections between objects and experiences. This chapter describes this as a process of exposure to these different elements. Our imagination begins to expand the scope of the frames onto which it projects an imagined presence; it searches for patterns within the physical, social, and symbolic environment and draws connections between people and practices across spaces. As the final paper, chapter eight, deduces, it is in making these connections that one constructs the objects and shared practices of imagined community. This chapter describes this as an imagining of neighbourhood as a place-based extension of the self, and then explores the ways in which I drew on physical, social, and symbolic elements in an attempt to construct a fit between the neighbourhood’s offerings and my desires for place-based identity definition. This was as a cumulative but fragmented process, in which positive and negative experiences of interaction and identification with people and things were searched for their potential to operate as the objects and shared practices of imagined community. This chapter describes these connections as constructed through interplay between reflexivity and fantasy, as the imagination seeks balance between desires for experiences of belonging, and the complexities of constructing them within the throwntogether context of the contemporary city. The conclusion of the thesis describes the process of imagining community as a reflexive fantasy, that is, as a product of both the critical and fascinated consciousness (Ricoeur, 1994). It suggests that the fascinated consciousness imbues experiences with hope and desire, which the reflexive imagining can turn to disappointment and shame as it critically reflects on the reality of those fascinated projections. At the same time, the reflexive imagination also searches the practices of others for affirmation of those projections, effectively seeking to prove the reality of the fantasy of the imagined community.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, the deposition of C-20 fullerenes on a diamond (001)-(2x1) surface and the fabrication of C-20 thin film at 100 K were investigated by a molecular dynamics (MD) simulation using the many-body Brenner bond order potential. First, we found that the collision dynamic of a single C-20 fullerene on a diamond surface was strongly dependent on its impact energy. Within the energy range 10-45 eV, the C-20 fullerene chemisorbed on the surface retained its free cage structure. This is consistent with the experimental observation, where it was called the memory effect in "C-20-type" films [P. Melion , Int. J. Mod. B 9, 339 (1995); P. Milani , Cluster Beam Synthesis of Nanostructured Materials (Springer, Berlin, 1999)]. Next, more than one hundred C-20 (10-25 eV) were deposited one after the other onto the surface. The initial growth stage of C-20 thin film was observed to be in the three-dimensional island mode. The randomly deposited C-20 fullerenes stacked on diamond surface and acted as building blocks forming a polymerlike structure. The assembled film was also highly porous due to cluster-cluster interaction. The bond angle distribution and the neighbor-atom-number distribution of the film presented a well-defined local order, which is of sp(3) hybridization character, the same as that of a free C-20 cage. These simulation results are again in good agreement with the experimental observation. Finally, the deposited C-20 film showed high stability even when the temperature was raised up to 1500 K.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There has been a renewal of interest in memory studies in recent years, particularly in the Western world. This chapter considers aspects of personal memory followed by the concept of cultural memory. It then examines how the Australian cultural memory of the Anzac Legend is represented in a number of recent picture books.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A one-time program is a hypothetical device by which a user may evaluate a circuit on exactly one input of his choice, before the device self-destructs. One-time programs cannot be achieved by software alone, as any software can be copied and re-run. However, it is known that every circuit can be compiled into a one-time program using a very basic hypothetical hardware device called a one-time memory. At first glance it may seem that quantum information, which cannot be copied, might also allow for one-time programs. But it is not hard to see that this intuition is false: one-time programs for classical or quantum circuits based solely on quantum information do not exist, even with computational assumptions. This observation raises the question, "what assumptions are required to achieve one-time programs for quantum circuits?" Our main result is that any quantum circuit can be compiled into a one-time program assuming only the same basic one-time memory devices used for classical circuits. Moreover, these quantum one-time programs achieve statistical universal composability (UC-security) against any malicious user. Our construction employs methods for computation on authenticated quantum data, and we present a new quantum authentication scheme called the trap scheme for this purpose. As a corollary, we establish UC-security of a recent protocol for delegated quantum computation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Human memory is a complex neurocognitive process. By combining psychological and molecular genetics expertise, we examined the APOE ε4 allele, a known risk factor for Alzheimer's disease, and the COMT Val 158 polymorphism, previously implicated in schizophrenia, for association with lowered memory functioning in healthy adults. To assess memory type we used a range of memory tests of both retrospective and prospective memory. Genotypes were determined using RFLP analysis and compared with mean memory scores using univariate ANOVAs. Despite a modest sample size (n=197), our study found a significant effect of the APOE ε4 polymorphism in prospective memory. Supporting our hypothesis, a significant difference was demonstrated between genotype groups for means of the Comprehensive Assessment of Prospective Memory total score (p=0.036; ε4 alleles=1.99; all other alleles=1.86). In addition, we demonstrate a significant interactive effect between the APOE ε4 and COMT polymorphisms in semantic memory. This is the first study to investigate both APOE and COMT genotypes in relation to memory in non-pathological adults and provides important information regarding the effect of genetic determinants on human memory.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

PURPOSE Current research on errors in health care focuses almost exclusively on system and clinician error. It tends to exclude how patients may create errors that influence their health. We aimed to identify the types of errors that patients can contribute and help manage, especially in primary care. METHODS Eleven nominal group interviews of patients and primary health care professionals were held in Auckland, New Zealand, during late 2007. Group members reported and helped to classify types of potential error by patients. We synthesized the ideas that emerged from the nominal groups into a taxonomy of patient error. RESULTS Our taxonomy is a 3-level system encompassing 70 potential types of patient error. The first level classifies 8 categories of error into 2 main groups: action errors and mental errors. The action errors, which result in part or whole from patient behavior, are attendance errors, assertion errors, and adherence errors. The mental errors, which are errors in patient thought processes, comprise memory errors, mindfulness errors, misjudgments, and—more distally—knowledge deficits and attitudes not conducive to health. CONCLUSION The taxonomy is an early attempt to understand and recognize how patients may err and what clinicians should aim to influence so they can help patients act safely. This approach begins to balance perspectives on error but requires further research. There is a need to move beyond seeing patient, clinician, and system errors as separate categories of error. An important next step may be research that attempts to understand how patients, clinicians, and systems interact to cocreate and reduce errors.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Streamciphers are common cryptographic algorithms used to protect the confidentiality of frame-based communications like mobile phone conversations and Internet traffic. Streamciphers are ideal cryptographic algorithms to encrypt these types of traffic as they have the potential to encrypt them quickly and securely, and have low error propagation. The main objective of this thesis is to determine whether structural features of keystream generators affect the security provided by stream ciphers.These structural features pertain to the state-update and output functions used in keystream generators. Using linear sequences as keystream to encrypt messages is known to be insecure. Modern keystream generators use nonlinear sequences as keystream.The nonlinearity can be introduced through a keystream generator's state-update function, output function, or both. The first contribution of this thesis relates to nonlinear sequences produced by the well-known Trivium stream cipher. Trivium is one of the stream ciphers selected in a final portfolio resulting from a multi-year project in Europe called the ecrypt project. Trivium's structural simplicity makes it a popular cipher to cryptanalyse, but to date, there are no attacks in the public literature which are faster than exhaustive keysearch. Algebraic analyses are performed on the Trivium stream cipher, which uses a nonlinear state-update and linear output function to produce keystream. Two algebraic investigations are performed: an examination of the sliding property in the initialisation process and algebraic analyses of Trivium-like streamciphers using a combination of the algebraic techniques previously applied separately by Berbain et al. and Raddum. For certain iterations of Trivium's state-update function, we examine the sets of slid pairs, looking particularly to form chains of slid pairs. No chains exist for a small number of iterations.This has implications for the period of keystreams produced by Trivium. Secondly, using our combination of the methods of Berbain et al. and Raddum, we analysed Trivium-like ciphers and improved on previous on previous analysis with regards to forming systems of equations on these ciphers. Using these new systems of equations, we were able to successfully recover the initial state of Bivium-A.The attack complexity for Bivium-B and Trivium were, however, worse than exhaustive keysearch. We also show that the selection of stages which are used as input to the output function and the size of registers which are used in the construction of the system of equations affect the success of the attack. The second contribution of this thesis is the examination of state convergence. State convergence is an undesirable characteristic in keystream generators for stream ciphers, as it implies that the effective session key size of the stream cipher is smaller than the designers intended. We identify methods which can be used to detect state convergence. As a case study, theMixer streamcipher, which uses nonlinear state-update and output functions to produce keystream, is analysed. Mixer is found to suffer from state convergence as the state-update function used in its initialisation process is not one-to-one. A discussion of several other streamciphers which are known to suffer from state convergence is given. From our analysis of these stream ciphers, three mechanisms which can cause state convergence are identified.The effect state convergence can have on stream cipher cryptanalysis is examined. We show that state convergence can have a positive effect if the goal of the attacker is to recover the initial state of the keystream generator. The third contribution of this thesis is the examination of the distributions of bit patterns in the sequences produced by nonlinear filter generators (NLFGs) and linearly filtered nonlinear feedback shift registers. We show that the selection of stages used as input to a keystream generator's output function can affect the distribution of bit patterns in sequences produced by these keystreamgenerators, and that the effect differs for nonlinear filter generators and linearly filtered nonlinear feedback shift registers. In the case of NLFGs, the keystream sequences produced when the output functions take inputs from consecutive register stages are less uniform than sequences produced by NLFGs whose output functions take inputs from unevenly spaced register stages. The opposite is true for keystream sequences produced by linearly filtered nonlinear feedback shift registers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Shaft fracture at an early stage of operation is a common problem for a certain type of wind turbine. To determine the cause of shaft failure a series of experimental tests were conducted to evaluate the chemical composition and mechanical properties. A detail analysis involving macroscopic feature and microstructure analysis of the material of the shaft was also performed to have an in depth knowledge of the cause of fracture. The experimental tests and analysis results show that there are no significant differences in the material property of the main shaft when comparing it with the Standard, EN10083-3:2006. The results show that stress concentration on the shaft surface close to the critical section of the shaft due to rubbing of the annular ring and coupled with high stress concentration caused by the change of inner diameter of the main shaft are the main reasons that result in fracture of the main shaft. In addition, inhomogeneity of the main shaft micro-structure also accelerates up the fracture process of the main shaft. In addition, the theoretical calculation of equivalent stress at the end of the shaft was performed, which demonstrate that cracks can easily occur under the action of impact loads. The contribution of this paper is to provide a reference in fracture analysis of similar main shaft of wind turbines.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A key question in neuroscience is how memory is selectively allocated to neural networks in the brain. This question remains a significant research challenge, in both rodent models and humans alike, because of the inherent difficulty in tracking and deciphering large, highly dimensional neuronal ensembles that support memory (i.e., the engram). In a previous study we showed that consolidation of a new fear memory is allocated to a common topography of amygdala neurons. When a consolidated memory is retrieved, it may enter a labile state, requiring reconsolidation for it to persist. What is not known is whether the original spatial allocation of a consolidated memory changes during reconsolidation. Knowledge about the spatial allocation of a memory, during consolidation and reconsolidation, provides fundamental insight into its core physical structure (i.e., the engram). Using design-based stereology, we operationally define reconsolidation by showing a nearly identical quantity of neurons in the dorsolateral amygdala (LAd) that expressed a plasticity-related protein, phosphorylated mitogen-activated protein kinase, following both memory acquisition and retrieval. Next, we confirm that Pavlovian fear conditioning recruits a stable, topographically organized population of activated neurons in the LAd. When the stored fear memory was briefly reactivated in the presence of the relevant conditioned stimulus, a similar topography of activated neurons was uncovered. In addition, we found evidence for activated neurons allocated to new regions of the LAd. These findings provide the first insight into the spatial allocation of a fear engram in the LAd, during its consolidation and reconsolidation phase.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Pavlovian fear conditioning is a robust technique for examining behavioral and cellular components of fear learning and memory. In fear conditioning, the subject learns to associate a previously neutral stimulus with an inherently noxious co-stimulus. The learned association is reflected in the subjects' behavior upon subsequent re-exposure to the previously neutral stimulus or the training environment. Using fear conditioning, investigators can obtain a large amount of data that describe multiple aspects of learning and memory. In a single test, researchers can evaluate functional integrity in fear circuitry, which is both well characterized and highly conserved across species. Additionally, the availability of sensitive and reliable automated scoring software makes fear conditioning amenable to high-throughput experimentation in the rodent model; thus, this model of learning and memory is particularly useful for pharmacological and toxicological screening. Due to the conserved nature of fear circuitry across species, data from Pavlovian fear conditioning are highly translatable to human models. We describe equipment and techniques needed to perform and analyze conditioned fear data. We provide two examples of fear conditioning experiments, one in rats and one in mice, and the types of data that can be collected in a single experiment. © 2012 Springer Science+Business Media, LLC.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Pavlovian fear conditioning, also known as classical fear conditioning is an important model in the study of the neurobiology of normal and pathological fear. Progress in the neurobiology of Pavlovian fear also enhances our understanding of disorders such as posttraumatic stress disorder (PTSD) and with developing effective treatment strategies. Here we describe how Pavlovian fear conditioning is a key tool for understanding both the neurobiology of fear and the mechanisms underlying variations in fear memory strength observed across different phenotypes. First we discuss how Pavlovian fear models aspects of PTSD. Second, we describe the neural circuits of Pavlovian fear and the molecular mechanisms within these circuits that regulate fear memory. Finally, we show how fear memory strength is heritable; and describe genes which are specifically linked to both changes in Pavlovian fear behavior and to its underlying neural circuitry. These emerging data begin to define the essential genes, cells and circuits that contribute to normal and pathological fear.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis is a study of how the contents of volatile memory on the Windows operating system can be better understood and utilised for the purposes of digital forensic investigations. It proposes several techniques to improve the analysis of memory, with a focus on improving the detection of unknown code such as malware. These contributions allow the creation of a more complete reconstruction of the state of a computer at acquisition time, including whether or not the computer has been infected by malicious code.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The study of memory in most behavioral paradigms, including emotional memory paradigms, has focused on the feed forward components that underlie Hebb’s first postulate, associative synaptic plasticity. Hebb’s second postulate argues that activated ensembles of neurons reverberate in order to provide temporal coordination of different neural signals, and thereby facilitate coincidence detection. Recent evidence from our groups has suggested that the lateral amygdala (LA) contains recurrent microcircuits and that these may reverberate. Additionally this reverberant activity is precisely timed with latencies that would facilitate coincidence detection between cortical and sub cortical afferents to the LA.Thus, recent data at the microcircuit level in the amygdala provide some physiological evidence in support of the second Hebbian postulate.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Distributed generation (DG) resources are commonly used in the electric systems to obtain minimum line losses, as one of the benefits of DG, in radial distribution systems. Studies have shown the importance of appropriate selection of location and size of DGs. This paper proposes an analytical method for solving optimal distributed generation placement (ODGP) problem to minimize line losses in radial distribution systems using loss sensitivity factor (LSF) based on bus-injection to branch-current (BIBC) matrix. The proposed method is formulated and tested on 12 and 34 bus radial distribution systems. The classical grid search algorithm based on successive load flows is employed to validate the results. The main advantages of the proposed method as compared with the other conventional methods are the robustness and no need to calculate and invert large admittance or Jacobian matrices. Therefore, the simulation time and the amount of computer memory, required for processing data especially for the large systems, decreases.