91 resultados para Nadir Shah, Sha de Persia 1688-1747

em QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast


Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It is difficult, even excruciating, to imagine the staggering descent from high optimism to despondency experienced by many African Americans who lived between emancipation and the dawn of the twentieth century. For historians living in the post–civil rights era, recapturing the scale, velocity, and brutality of that dramatic fall has been hampered by two conceptual problems. The first of these, undergirded by prominent trends in the formerly “new” social history, is a widely shared enthusiasm for illuminating those hidden corners of daily life where men and women on the receiving end of Jim Crow continued to wield a degree of control. “Agency” has been the buzzword for a generation of scholarship that emphasizes the staying power and persistence of black Southerners in the face of relentless assaults on their social and economic status, their civil rights, and even, at times, their collective existence. This is, in many ways, an understandable reaction to an earlier consensus that relegated black historical initiative to the margins of a national fable cleansed of unseemly violence and sharp social conflict, but it can also be problematic.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The second round of the NIST-run public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash Standard (SHA-3). This paper presents the full implementations of all of the second round candidates in hardware with all of their variants. In order to determine their computational efficiency, an important aspect in NIST's round two evaluation criteria, this paper gives an area/speed comparison of each design both with and without a hardware interface, thereby giving an overall impression of their performance in resource constrained and resource abundant environments. The implementation results are provided for a Virtex-5 FPGA device. The efficiency of the architectures for the hash functions are compared in terms of throughput per unit area. To the best of the authors' knowledge, this is the first work to date to present hardware designs which test for all message digest sizes (224, 256, 384, 512), and also the only work to include the padding as part of the hardware for the SHA-3 hash functions.