997 resultados para Islamic architecture


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Qinghai-Tibet Plateau is characterized by extremely high radiation, which may induce down-regulation of photosynthesis in plants living in this alpine ecosystem. To clarify whether photoinhibition occurs in the alpine environment and to discern its underlying mechanisms, we examined photosynthetic gas exchange and fluorescence emission in response to the changes in photosynthetic photon flux density (PPFD) and leaf temperature under natural regimes for two herbaceous species: prostrate Saussurea superba and erect-leaved Saussurea katochaete from altitude 3250 m on the Qinghai-Tibet Plateau. S. superba intercepted a higher maximum PPFD and experienced much higher leaf temperature than the erect-leaved S. katochaete. S. superba exhibited a much higher light saturation point for photosynthesis than S. katochaete. Under controlled conditions, the former species had higher CO2 uptake rates and neither species showed obvious photosynthetic down-regulation at high PPFD. Under natural environmental conditions, however, apparent photoinhibition, indicated by reduced electron transport rate (ETR), was evident at high PPFD for both species. After a night frost, the photochemistry of S. katochaete was depressed markedly in the early morning and recovered by mid-day. After a frost-free night, it was high in the morning and low at noon due to high radiation. S. superba did not respond to the night frost in terms of daytime photochemical pattern. In both species, photochemical depression was aggravated by high leaf temperature and the erect species was more sensitive to high temperature. This study suggests that the high radiation on the Qinghai-Tibet Plateau is likely to induce rapidly reversible photoinhibition, which is related closely to plant architecture. Photochemistry in the prostrate species seems able to tolerate higher PPFD, without obvious suppression, than the erect species. (C) 2003 Elsevier Science B.V. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Message-Driven Processor is a node of a large-scale multiprocessor being developed by the Concurrent VLSI Architecture Group. It is intended to support fine-grained, message passing, parallel computation. It contains several novel architectural features, such as a low-latency network interface, extensive type-checking hardware, and on-chip memory that can be used as an associative lookup table. This document is a programmer's guide to the MDP. It describes the processor's register architecture, instruction set, and the data types supported by the processor. It also details the MDP's message sending and exception handling facilities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper consists of two major parts. First, we present the outline of a simple approach to very-low bandwidth video-conferencing system relying on an example-based hierarchical image compression scheme. In particular, we discuss the use of example images as a model, the number of required examples, faces as a class of semi-rigid objects, a hierarchical model based on decomposition into different time-scales, and the decomposition of face images into patches of interest. In the second part, we present several algorithms for image processing and animation as well as experimental evaluations. Among the original contributions of this paper is an automatic algorithm for pose estimation and normalization. We also review and compare different algorithms for finding the nearest neighbors in a database for a new input as well as a generalized algorithm for blending patches of interest in order to synthesize new images. Finally, we outline the possible integration of several algorithms to illustrate a simple model-based video-conference system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

New Timber Architecture in Scotland illustrates 90 exemplar projects and demonstrates clearly that there is no single building type unsuited to the use of this adaptable, variable and infinitely renewable material. Too long out of fashion, timber is now widely specified and has become an important design element in some of the most innovative projects being built today. The projects selected for inclusion are not the work of a few superstar architects: they represent the output of a significant percentage of architectural practices in Scotland and illustrate a burgeoning confidence in timber as an exciting, contemporary construction material. New Timber Architecture in Scotland aims to stimulate others to follow their lead.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Islamic financing instruments can be categorised into profit and loss/risk sharing and non-participatory instruments. Although profit and loss sharing instruments such as musharakah are widely accepted as the ideal form of Islamic financing, prior studies suggest that alternative instruments such as murabahah are preferred by Islamic banks. Nevertheless, prior studies did not explore factors that influence the use of Islamic financing among non-financial firms. Our study fills this gap and contributes new knowledge in several ways. First, we find no evidence of widespread use of Islamic financing instruments across non-financial firms. This is because the instruments are mostly used by less profitable firms with higher leverage (i.e., risky firms). Second, we find that profit and loss sharing instruments are hardly used, whilst the use of murabahah is dominant. Consistent with the prediction of moral-hazard-risk avoidance theory, further analysis suggests that users with a lower asset base (to serve as collateral) are associated with murabahah financing. Third, we present a critical discourse on the contentious nature of murabahah as practised. The economic significance and ethical issues associated with murabahah as practised should trigger serious efforts to steer Islamic corporate financing towards risk-sharing more than the controversial rent-seeking practice.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sherlock, A. and Williams, K. (2005). Islamic Dress, Institutions of Education and Freedom of Religion under the ECHR: A UK Perspective. Wales Journal of Law and Policy. 4, pp. 214-230. RAE2008

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Jackson, Richard, (2007) 'Constructing Enemies: 'Islamic Terrorism' in Political and Academic Discourse', Government and Opposition, 42(3) pp.394-426 RAE2008

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose This study aims to present an in-depth theoretical and practical analysis of HRM practice in the light of Islamic values and principles. It looks at the four main HRM functions of recruitment and selection, training and development, performance appraisal, and rewards, from the Islamic perspective. Besides establishing a theoretical base for the influence of Islam on HRM, it analyses the key characteristics of HRM practice as applied in Jordanian universities and analyses the extent to which Islamic values are embedded in that practice. Design/methodology/approach The paper draws on a structured questionnaire distributed to 500 respondents working in four Jordanian universities which sought to elicit the respondents views on the influence of Islamic values within specific HR functions. Findings The findings indicate that there is a diffusion of Islamic values into HRM practice in the participating organisations. The extent of the diffusion varies between the organisations; there is a clear indication that explicitly Islamic values are being practiced, albeit to a limited extent. Originality/value The role of spirituality and/or religion in shaping the working of contemporary organisations is not sufficiently recognised in the literature. This paper is a response to the limited number of research studies assessing the extent of the absorption of religious values into the management of human resources. The study undertaken examines the current status of HRM practice in Jordanian universities and contributes to deepening the contemporary understanding of interactions between Islamic values and the core HR functions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The objective of this paper is to reassess the central factors which have shaped the Indian architecture. The author puts forward the concept of plurality introduced by Western art historians and argues that the diversity of the Indian architecture should not be explained in terms of religious differences, but in terms of the socio-economical situation in South Asia. He also elaborates on the Hindu caste system and its impact on the Indian architecture.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

http://www.archive.org/details/fivepillarsofisl00kamauoft

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A probabilistic, nonlinear supervised learning model is proposed: the Specialized Mappings Architecture (SMA). The SMA employs a set of several forward mapping functions that are estimated automatically from training data. Each specialized function maps certain domains of the input space (e.g., image features) onto the output space (e.g., articulated body parameters). The SMA can model ambiguous, one-to-many mappings that may yield multiple valid output hypotheses. Once learned, the mapping functions generate a set of output hypotheses for a given input via a statistical inference procedure. The SMA inference procedure incorporates an inverse mapping or feedback function in evaluating the likelihood of each of the hypothesis. Possible feedback functions include computer graphics rendering routines that can generate images for given hypotheses. The SMA employs a variant of the Expectation-Maximization algorithm for simultaneous learning of the specialized domains along with the mapping functions, and approximate strategies for inference. The framework is demonstrated in a computer vision system that can estimate the articulated pose parameters of a human’s body or hands, given silhouettes from a single image. The accuracy and stability of the SMA are also tested using synthetic images of human bodies and hands, where ground truth is known.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Current low-level networking abstractions on modern operating systems are commonly implemented in the kernel to provide sufficient performance for general purpose applications. However, it is desirable for high performance applications to have more control over the networking subsystem to support optimizations for their specific needs. One approach is to allow networking services to be implemented at user-level. Unfortunately, this typically incurs costs due to scheduling overheads and unnecessary data copying via the kernel. In this paper, we describe a method to implement efficient application-specific network service extensions at user-level, that removes the cost of scheduling and provides protected access to lower-level system abstractions. We present a networking implementation that, with minor modifications to the Linux kernel, passes data between "sandboxed" extensions and the Ethernet device without copying or processing in the kernel. Using this mechanism, we put a customizable networking stack into a user-level sandbox and show how it can be used to efficiently process and forward data via proxies, or intermediate hosts, in the communication path of high performance data streams. Unlike other user-level networking implementations, our method makes no special hardware requirements to avoid unnecessary data copies. Results show that we achieve a substantial increase in throughput over comparable user-space methods using our networking stack implementation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A fundamental task of vision systems is to infer the state of the world given some form of visual observations. From a computational perspective, this often involves facing an ill-posed problem; e.g., information is lost via projection of the 3D world into a 2D image. Solution of an ill-posed problem requires additional information, usually provided as a model of the underlying process. It is important that the model be both computationally feasible as well as theoretically well-founded. In this thesis, a probabilistic, nonlinear supervised computational learning model is proposed: the Specialized Mappings Architecture (SMA). The SMA framework is demonstrated in a computer vision system that can estimate the articulated pose parameters of a human body or human hands, given images obtained via one or more uncalibrated cameras. The SMA consists of several specialized forward mapping functions that are estimated automatically from training data, and a possibly known feedback function. Each specialized function maps certain domains of the input space (e.g., image features) onto the output space (e.g., articulated body parameters). A probabilistic model for the architecture is first formalized. Solutions to key algorithmic problems are then derived: simultaneous learning of the specialized domains along with the mapping functions, as well as performing inference given inputs and a feedback function. The SMA employs a variant of the Expectation-Maximization algorithm and approximate inference. The approach allows the use of alternative conditional independence assumptions for learning and inference, which are derived from a forward model and a feedback model. Experimental validation of the proposed approach is conducted in the task of estimating articulated body pose from image silhouettes. Accuracy and stability of the SMA framework is tested using artificial data sets, as well as synthetic and real video sequences of human bodies and hands.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The TCP/IP architecture was originally designed without taking security measures into consideration. Over the years, it has been subjected to many attacks, which has led to many patches to counter them. Our investigations into the fundamental principles of networking have shown that carefully following an abstract model of Interprocess Communication (IPC) addresses many problems [1]. Guided by this IPC principle, we designed a clean-slate Recursive INternet Architecture (RINA) [2]. In this paper, we show how, without the aid of cryptographic techniques, the bare-bones architecture of RINA can resist most of the security attacks faced by TCP/IP. We also show how hard it is for an intruder to compromise RINA. Then, we show how RINA inherently supports security policies in a more manageable, on-demand basis, in contrast to the rigid, piecemeal approach of TCP/IP.