313 resultados para Hill, Geoffrey E
Resumo:
Deck on left, with opening to outdoor room on right.
Resumo:
Exterior of alcove to outdoor room.
Resumo:
Entry from deck and seating area to outdoor room.
Resumo:
As seen from hill behind.
Resumo:
Leon Battista Alberti, 'On the Art of Building in Ten Books' Translated by Joseph Rykwert, Neil Leach and Robert Tavemor L. A. Zhadova (ed.), 'Tatlin' (Budapest 1984). English translation Helen Ross, 'Just For Living, Aboriginal Perceptions of Housing in North West Australia' Tony Fry, 'Design History Australia: A Source Text in Methods and Resources' Phillip Cox and David Moore, 'The Australian Functional Tradition' Lenore Coltheart and Don Fraser (eds.), 'Lamdmarks in Public Works, Engineers and Their Works in New South Wales 1884-1914' Peter Bridges and Don MacDonald, 'James Barnet, Colonial Architect' Don Watson and Judith McKay, 'A Directory of Queensland Architects to 1940' Russell Walden, 'Voices of Silence: New Zealand's Chapel of Futuna' Jeremy Salmond, 'Old New Zealand Houses 1800-1940' Victoria Middleton, 'The Legend of Green Valley' Dyranda Prevost and Ann Rado, 'Living Places' Mark Jackson and Mark Stiles (directors), 'Universal Provider' Lars Lerup, 'Planned Assaults'
Resumo:
In the context of cancer diagnosis and treatment, we consider the problem of constructing an accurate prediction rule on the basis of a relatively small number of tumor tissue samples of known type containing the expression data on very many (possibly thousands) genes. Recently, results have been presented in the literature suggesting that it is possible to construct a prediction rule from only a few genes such that it has a negligible prediction error rate. However, in these results the test error or the leave-one-out cross-validated error is calculated without allowance for the selection bias. There is no allowance because the rule is either tested on tissue samples that were used in the first instance to select the genes being used in the rule or because the cross-validation of the rule is not external to the selection process; that is, gene selection is not performed in training the rule at each stage of the cross-validation process. We describe how in practice the selection bias can be assessed and corrected for by either performing a cross-validation or applying the bootstrap external to the selection process. We recommend using 10-fold rather than leave-one-out cross-validation, and concerning the bootstrap, we suggest using the so-called. 632+ bootstrap error estimate designed to handle overfitted prediction rules. Using two published data sets, we demonstrate that when correction is made for the selection bias, the cross-validated error is no longer zero for a subset of only a few genes.
Resumo:
In 1984, George Orwell presented the future as a dystopian vision, where everyday existence was governed and redefined by an oppressive regime. Winston Smith's daily duties at the Ministry of Truth involved the invention, rewriting and erasing of fragments of history as a means of perpetuating contentment, uniformity and control. History, as Orwell described it in the novel 'was a palimpsest, scraped clean and reinscribed exactly as often as was necessary.' More that a quarter of a century after the publication of 1984, Michel Foucault discussed the cinematic representation and misrepresentation of French history and identity in terms of what he called the manipulation of 'popular memory'. In what was tantamount to a diluted version of Orwell's palimpsestic histories, Foucault stated that 'people are not shown what they were, but what they must remember having been.' This paper will investigate notions of memory, identity and the everyday through a discussion of the community of Celebration in Florida. Conceived in the 1990s, Celebration was designed around a fictionalised representation of pre 1940s small town America, using nostalgia for a mythologised past to create a sense of comfort, community and conformity among its residents. Adapting issues raised by Orwell, Foucault and Baudrillard, this paper will discuss the way in which architecture, like film and literature, can participate in what Foucault discussed as the manipulation of popular memory, inducing and exploiting a nostalgia for an everyday past that that never really existed.
Resumo:
An emended diagnosis and generic reallocation are proposed for the trilete miospore Indotriradites dolianitii (Daemon, 1974) Loboziak et al., comb. nov. A new species, I. daemonii Loboziak et al., sp. nov., from Viséan strata of Western Gondwana, is erected. These two species, together with I. zosteriformis (Playford et Satterthwait) Playford, 1991 from the Viséan of Australia, belong to a cohesive morphological miospore category, here termed the Indotriradites dolianitii Morphon, which is evidently restricted to the Lower Carboniferous of Gondwana.
Resumo:
A new species of trilete zonate miospores, Radiizonates arcuatus, is established for Lower Carboniferous Western Gondwanan forms hitherto ascribed misguidedly to Radiizonates genuinus (Jushko) Loboziak and Alpern (1978), a Russian Lower Carboniferous species. The latter binomen is, moreover, not a valid combination and is more correctly designated as Vallatisporites genuinus (Jushko) Byvsheva, 1980. R. arcuatus is, from records to date, confined to westerly parts of Gondwana (Brazil, North Africa and Middle East), in which it is characteristic of Early Carboniferous strata, albeit with some slightly older and slightly younger occurrences.
Resumo:
Power system real time security assessment is one of the fundamental modules of the electricity markets. Typically, when a contingency occurs, it is required that security assessment and enhancement module shall be ready for action within about 20 minutes’ time to meet the real time requirement. The recent California black out again highlighted the importance of system security. This paper proposed an approach for power system security assessment and enhancement based on the information provided from the pre-defined system parameter space. The proposed scheme opens up an efficient way for real time security assessment and enhancement in a competitive electricity market for single contingency case