991 resultados para Cellini, Benvenuto, 1500-1571.
Resumo:
We present techniques for computing upper and lower bounds on the likelihoods of partial instantiations of variables in sigmoid and noisy-OR networks. The bounds determine confidence intervals for the desired likelihoods and become useful when the size of the network (or clique size) precludes exact computations. We illustrate the tightness of the obtained bounds by numerical experiments.
Resumo:
This thesis presents methods for implementing robust hexpod locomotion on an autonomous robot with many sensors and actuators. The controller is based on the Subsumption Architecture and is fully distributed over approximately 1500 simple, concurrent processes. The robot, Hannibal, weighs approximately 6 pounds and is equipped with over 100 physical sensors, 19 degrees of freedom, and 8 on board computers. We investigate the following topics in depth: distributed control of a complex robot, insect-inspired locomotion control for gait generation and rough terrain mobility, and fault tolerance. The controller was implemented, debugged, and tested on Hannibal. Through a series of experiments, we examined Hannibal's gait generation, rough terrain locomotion, and fault tolerance performance. These results demonstrate that Hannibal exhibits robust, flexible, real-time locomotion over a variety of terrain and tolerates a multitude of hardware failures.
Resumo:
O objetivo principal deste trabalho é identificar as espécies de árvores e arbustos que ocorrem em pastagens, e obter informações acerca da composição florística e ocorrência de espécies, visando dados sobre dispersão e regeneração natural, sobrevivência, abundância, entre outros fatores, para subsidiar a tomada de decisões na pesquisa e formulação de sistemas silvipastoris sustentáveis para o Acre e Amazônia Ocidental. A hipótese é de que, com a identificação das espécies de árvores e arbustos que ocorrem em pastagens no Estado, será possível com esses dados selecionar as mais adaptadas às condições ambientais regionais, aliada ao estudo de visibilidade técnica e econômica para o estabelecimento de pesquisas e formulação de sistemas silvipastoris
Resumo:
Os seringais de cultivo no Estado do Acre, implantados desde o início da década de 70, foram quase todos abandonados e desativados por apresentarem um desenvolvimento lento e desuniforme devido, principalmente, à falta de um método efetivo de controle do "mal das 4 folhas", causado pelo fungo Microcyclus ulei. As condições climáticas do Estado do Acre são favoráveis a incidência de doenças da seringueira durante o ano todo. No período de estiagem, de junho a setembro, época de troca de folhas, ocorrem surtos epidemiológicos com severos ataques, causando sucessivas quedas de foliolos que resultam na seca dos ponteiros, debilitando a planta e tomando-a predisposta ao ataque de fungos secundários, que agravam ainda mais o problema. A enxertia de copa, utilizando clones de hevea pauciflora, vem sendo apontada como a possível solução, a curto e médio prazo, para a implantação de seringais de cultivo nas áreas amazônicas com problemas fitossanitários graves. Esta espécie possui tolerância ao fungo Microcyclus ulei, principal doença da seringueira na Amazônia, por apresentar algumas características que dificultam o ataque do fungo, destacando-se o fato de possuir elevado índice de área foliar, de caráter perenifólio. Os clones derivados desta espécie, quando enxertados sobre painéis que apresentem como características um alto rendimento e facilidade de escoamento do látex, originam plantas tricompostas que conseguem juntar, num mesmo indivíduo, características que normalmente são antagônicas, ou seja, alta produtividade e resistência ou tolerância às doenças. Este trabalho tem como objetivo principal selecionar plantas tricompostas tolerante às principais doenças e com potencial produtivo superior a 1500 kglha/ano. Para isso, foi implantada uma coleção de clones de copa e painel na Embrapa Acre, a qual está servindo de fonte de material botânico para a instalação de experimentos de avaliação de combinações copa x painel. Os clones introduzidos estão sendo avaliados, quanto a tolerância a doenças, crescimento, vigor e facilidade de pegamento da enxertia.
Resumo:
Grattan, J.P., Al-Saad, Z., Gilbertson, D.D., Karaki, L.O., Pyatt, F.B 2005 Analyses of patterns of copper and lead mineralisation in human skeletons excavated from an ancient mining and smelting centre in the Jordanian desert Mineralogical Magazine. 69(5) 653-666.
Resumo:
Li, Longzhuang, Liu, Yonghuai, Obregon, A., Weatherston, M. Visual Segmentation-Based Data Record Extraction From Web Documents. Proceedings of IEEE International Conference on Information Reuse and Integration, 2007, pp. 502-507. Sponsorship: IEEE
Resumo:
Watt, P., Medieval Women's Writing (Cambridge: Polity Press, 2007) RAE2008
Resumo:
Binding, David; Couch, M.A., (2003) 'An experimental study of the peeling of dough from solid surfaces', Journal of Food Engineering 58(2) pp.299-309 RAE2008
Resumo:
Maria Roca, Caron James, Adriana Pruzinsk?, Stefan H?rtensteiner, Howard Thomas and Helen Ougham. Analysis of the chlorophyll catabolism pathway in leaves of an introgression senescence mutant of Lolium temulentum. Phytochemistry, 65 (9), 1231-1238. Sponsorship: BBSRC RAE2008
Resumo:
Neste trabalho apresentam-se os sistemas amazónicos de crenças segundo a taxonomia para o estudioso das classificações religiosas. O chamanismo, como praxis religiosa amazónica, apresenta-se como um elemento definido pela religião. Elemento central das culturas amazónicas passadas e presentes, o chamanismo apresenta-se aqui nos seus aspectos essenciais. The Amazonian systems of beliefs are here presented following the traditional classification of religious systems studies. Shamanism, as an Amazonian religious praxis, is presented as an element defined by religion. A central element in both past and present Amazonian cultures, the main aspects of Shamanism are here presented.
Resumo:
We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div can determine whether one of them was generated by the forger. Surprisingly, this is possible even after the adversary has inconspicuously learned (exposed) some-or even all-the secrets in the system. In this case, it might be impossible to tell which signature is generated by the legitimate signer and which by the forger. But at least the fact of the tampering will be made evident. We define several variants of tamper-evidence, differing in their power to detect tampering. In all of these, we assume an equally powerful adversary: she adaptively controls all the inputs to the legitimate signer (i.e., all messages to be signed and their timing), and observes all his outputs; she can also adaptively expose all the secrets at arbitrary times. We provide tamper-evident schemes for all the variants and prove their optimality. Achieving the strongest tamper evidence turns out to be provably expensive. However, we define a somewhat weaker, but still practical, variant: α-synchronous tamper-evidence (α-te) and provide α-te schemes with logarithmic cost. Our α-te schemes use a combinatorial construction of α-separating sets, which might be of independent interest. We stress that our mechanisms are purely cryptographic: the tamper-detection algorithm Div is stateless and takes no inputs except the two signatures (in particular, it keeps no logs), we use no infrastructure (or other ways to conceal additional secrets), and we use no hardware properties (except those implied by the standard cryptographic assumptions, such as random number generators). Our constructions are based on arbitrary ordinary signature schemes and do not require random oracles.
Resumo:
The explosion of WWW traffic necessitates an accurate picture of WWW use, and in particular requires a good understanding of client requests for WWW documents. To address this need, we have collected traces of actual executions of NCSA Mosaic, reflecting over half a million user requests for WWW documents. In this paper we describe the methods we used to collect our traces, and the formats of the collected data. Next, we present a descriptive statistical summary of the traces we collected, which identifies a number of trends and reference patterns in WWW use. In particular, we show that many characteristics of WWW use can be modelled using power-law distributions, including the distribution of document sizes, the popularity of documents as a function of size, the distribution of user requests for documents, and the number of references to documents as a function of their overall rank in popularity (Zipf's law). Finally, we show how the power-law distributions derived from our traces can be used to guide system designers interested in caching WWW documents.
Resumo:
Through an investigation of the Anglo-Saxon prayer books and selected psalters, this thesis corrects standard histories of medieval devotion that circumvent the Anglo-Saxon contribution to medieval piety. In the first half of the thesis, I establish a theoretical framework for Anglo-Saxon piety in which to explore the prayers. Current theoretical frameworks dealing with the medieval devotional material are flawed as scholars use terms such as ‘affective piety’, ‘private’ and even ‘devotion’ vaguely. After an introduction which defines some of the core terminology, Chapter 2 introduces the principal witnesses to the Anglo-Saxon prayer tradition. These include the prodigal eighth- and early ninth- century Mercian Group, comprising the Book of Nunnaminster (London, British Library, Harley 2965, s. viii ex/ix1), the Harleian Prayer Book (London, British Library, Harley 7653, s. viii ex/ix1), the Royal Prayer Book (London, British Library, Royal 2 A. xx, s. viii2/ix1/4), and the Book of Cerne (Cambridge, University Library, Ll. 1. 10). These prayer books are the earliest of their kind in Europe. This chapter challenges some established views concerning the prayer books, including purported Irish influence on their composition and the probability of female ownership. Chapter 3 explores the performance of prayer. The chapter demonstrates that Anglo-Saxon prayers, for example, the Royal Abecedarian Prayer, were transmitted fluidly. The complex relationship between this abecedarian prayer and its reflex in the Book of Nunnaminster reveals the complexity of prayer composition and transmission in the early medieval world but more importantly, it helps scholars theorise how the prayers may have been used, whether recited verbatim or used for extemporalisation. Changes made by later readers to earlier texts are also vital to this study, since they help answer questions of usage and show the evolution and subsequent influence of Anglo-Saxon religiosity. The second half of the thesis makes a special study of prayers to the Cross, the wounded Christ, and the Virgin, three important themes in later medieval spirituality. These focus on the Royal Abecedarian Prayer, which explores Christ’s life (Chapter 5), especially his Passion; the ‘Domine Ihesu Christe, adoro te cruce’ which celebrates the Cross (Chapter 4); and the Oratio Alchfriðo ad sanctam Mariam, which invokes the Virgin Mary (Chapter 6). These prayers occur in multiple, temporally-diverse witnesses and have complex transmission histories, involving both oral and written dissemination. The concluding chapter (7) highlights some of the avenues for future research opened by the thesis.
Resumo:
The present work is a study of the Middle English prose text known as The Wise Book of Philosophy and Astronomy, a consideration of its transmission and reception history, and a survey of its manuscript witnesses; it also incorporates an edition of the text from two of its manuscripts. The text is a cosmological treatise of approximately five thousand words, written for the most part in English, with astronomical and astrological terms in Latin, though the English translation is frequently given. It is written anonymously, and survives in thirty-three manuscripts.
Resumo:
This thesis is the study of the use and abuse of Edmund Spenser as an authority in native English epic literature of the early seventeenth century, within fifty years of his death. It focuses on attempts to emulate or adapt his seminal text, The Faerie Queene (1596), and offers a comparative analysis of two such approaches by the liminal authors, Ralph Knevet and Samuel Sheppard. The former, a tutor to the wealthy Norfolk Paston family, produced his A Supplement of the Ferie Queene in the pre-Civil War period (c.1630-1635), while the latter wrote The Faerie King at the very end of the social upheaval of the war (c.1648-54). The thesis privileges the study of the holograph manuscripts (Cambridge University Library, MS Ee.3.53 and Bodleian Library MS Rawl. Poet. 28 respectively) over the basic editions of these neglected texts. It argues for the need to re-evaluate the significance of such texts within the Spenserian canon and, through new readings of the texts' structures and contexts, the thesis questions the legitimacy of canon formation and continuation, as well as the influence editorial policies and decision making can have on subsequent readers and receptions of the text