243 resultados para Interior architecture
Resumo:
The notion of privacy represents a central criterion for both indoor and outdoor social spaces in most traditional Arab settlements. This paper investigates privacy and everyday life as determinants of the physical properties of the built and urban fabric and will study their impact on traditional settlements and architecture of the home in the contemporary Iraqi city. It illustrates the relationship between socio-cultural aspects of public/private realms using the notion of the social sphere as an investigative tool of the concept of social space in Iraqi houses and local communities (Mahalla). This paper reports that in spite of the impact of other factors in articulating built forms, privacy embodies the primary role under the effects of Islamic rules, principles and culture. The crucial problem is the underestimation of traditional inherited values through opening social spaces to the outside that giving unlimited accesses to the indoor social environment creating many problems with regard to privacy and communal social integration.
Resumo:
This is a second edition of the very successful book originally published in 2010. This second edition is published by new publisher Laurence King Publishers which will include an increased international distribution.
Resumo:
This article will introduce a specially-commissioned edition of the JSS centering on articles developed from the International Symposium May 2014 by the Recomposing the City project.
Resumo:
The BDI architecture, where agents are modelled based on their beliefs, desires and intentions, provides a practical approach to develop large scale systems. However, it is not well suited to model complex Supervisory Control And Data Acquisition (SCADA) systems pervaded by uncertainty. In this paper we address this issue by extending the operational semantics of Can(Plan) into Can(Plan)+. We start by modelling the beliefs of an agent as a set of epistemic states where each state, possibly using a different representation, models part of the agent's beliefs. These epistemic states are stratified to make them commensurable and to reason about the uncertain beliefs of the agent. The syntax and semantics of a BDI agent are extended accordingly and we identify fragments with computationally efficient semantics. Finally, we examine how primitive actions are affected by uncertainty and we define an appropriate form of lookahead planning.
Resumo:
Very high speed and low area hardware architectures of the SHACAL-1 encryption algorithm are presented in this paper. The SHACAL algorithm was a submission to the New European Schemes for Signatures, Integrity and Encryption (NESSIE) project and it is based on the SHA-1 hash algorithm. To date, there have been no performance metrics published on hardware implementations of this algorithm. A fully pipelined SHACAL-1 encryption architecture is described in this paper and when implemented on a Virtex-II X2V4000 FPGA device, it runs at a throughput of 17 Gbps. A fully pipelined decryption architecture achieves a speed of 13 Gbps when implemented on the same device. In addition, iterative architectures of the algorithm are presented. The SHACAL-1 decryption algorithm is derived and also presented in this paper, since it was not provided in the submission to NESSIE. © Springer-Verlag Berlin Heidelberg 2003.
Resumo:
The proposed multi-table lookup architecture provides SDN-based, high-performance packet classification in an OpenFlow v1.1+ SDN switch. The objective of the demonstration is to show the functionality of the architecture deployed on the NetFPGA SUME Platform.
Resumo:
Several studies in the last decade have pointed out that many devices, such as computers, are often left powered on even when idle, just to make them available and reachable on the network, leading to large energy waste. The concept of network connectivity proxy (NCP) has been proposed as an effective means to improve energy efficiency. It impersonates the presence of networked devices that are temporally unavailable, by carrying out background networking routines on their behalf. Hence, idle devices could be put into low-power states and save energy. Several architectural alternatives and the applicability of this concept to different protocols and applications have been investigated. However, there is no clear understanding of the limitations and issues of this approach in current networking scenarios. This paper extends the knowledge about the NCP by defining an extended set of tasks that the NCP can carry out, by introducing a suitable communication interface to control NCP operation, and by designing, implementing, and evaluating a functional prototype.
Resumo:
This chapter examines the current ‘architecture’ of the British state, in particular the way in which governmental power is distributed among the nations of the United Kingdom. The theme of this chapter will be to show how the continuing (and, as James Bryce argued, inevitable) tension between centripetal and centrifugal forces can be usefully applied to power relations between the various nations of the United Kingdom, and between these nations and Europe, providing a basis for analyzing how these nations are drawn or impelled by some forces towards a centralized unitary polity, whilst at the same time other forces tend towards dispersion of power. The resulting pattern might be analyzed along a spectrum from centralization to independence, with subsidiarity, devolution and federalism being seen as weigh stations along the way, but given how complex the variations in the distribution of power between these nations and the centre have become over time, the construction of any static architectural blueprint of the British state is bound to be misleading. Indeed, the architectural metaphor, with its implications of stability might usefully be rethought.