995 resultados para Estuarine depositional architecture
Resumo:
This paper examines the relation between technical possibilities, liberal logics, and the concrete reconfiguration of markets. It focuses on the enrolling of innovations in communication and information technologies into the markets traditionally dominated by stock exchanges. With the development of capacities to trade on-screen, the power of incumbent market makers has been challenged as a less stable array of competing quasi-public and private marketplaces emerges. Developing a case study of the Toronto Stock Exchange, I argue that narrative emphasis on the performative power of sociotechnical innovations, the deterritorialisation of financial relations, and the erosion of state capacities needs qualification. A case is made for the importance of developing an understanding of: the spaces of encounter between emerging social technologies and property rights, rules of exchange, and structures of governance; and the interplay of orderings of different institutional composition and spatial reach in the reconfiguration of market architectures. Only then can a better grasp be gained of the evolving dynamics between making markets, the regulatory powers of the state, and their delimitations.
Resumo:
With the advent of new video standards such as MPEG-4 part-10 and H.264/H.26L, demands for advanced video coding, particularly in the area of variable block size video motion estimation (VBSME), are increasing. In this paper, we propose a new one-dimensional (1-D) very large-scale integration architecture for full-search VBSME (FSVBSME). The VBS sum of absolute differences (SAD) computation is performed by re-using the results of smaller sub-block computations. These are distributed and combined by incorporating a shuffling mechanism within each processing element. Whereas a conventional 1-D architecture can process only one motion vector (MV), this new architecture can process up to 41 MV sub-blocks (within a macroblock) in the same number of clock cycles.
Resumo:
Extensive contour scaling of a 200 year old granite church is associated with the breaching of an apparently iron-rich crust and the widespread deposition of atmospheric dust within the canyon-like streetscape of Rio de Janeiro. Contemporary dust, accumulated dust from within the a depression on the building surface, the surface crust and the underlying granite are examined by a combination of total element analysis and sequential extraction, X-ray diffraction and energy dispersive X-ray fluorescence. Results indicate an increase in total organic carbon and a marked decrease in pH within the accumulated dust, and a rapid mobilization of anions and cations from the water-soluble and carbonate phases. It is considered that the latter is linked to salt accumulation within and eventual salt weathering of the granite. Post-depositional alteration of the dust is also linked with the de-silicification of clay minerals (Illite to kaolinite) and the loss of silica from the amorphous Fe/Mn phase of the accumulated dust under the initially saline and progressively more acidic conditions experienced at the stone - atmosphere interface. This mobilization of silica is associated with the formation of what is, in effect, a thin silica-rich surface crust or glaze. Within the glaze, assessory amounts of extractable iron are concentrated within the amorphous and crystalline Fe/Mn phases at levels that are significantly elevated with respect to the underlying granite, but much lower than the equivalent phases of the accumulated dust from which it is principally assumed to derive. The protection afforded to the stone work by the crust is not, however, permanent and within the last 15 years it has been possible to observe a rapid increase in the surface delamination of the church close to street level.
Resumo:
A generic architecture for implementing the advanced encryption standard (AES) encryption algorithm in silicon is proposed. This allows the instantiation of a wide range of chip specifications, with these taking the form of semiconductor intellectual property (IP) cores. Cores implemented from this architecture can perform both encryption and decryption and support four modes of operation: (i) electronic codebook mode; (ii) output feedback mode; (iii) cipher block chaining mode; and (iv) ciphertext feedback mode. Chip designs can also be generated to cover all three AES key lengths, namely 128 bits, 192 bits and 256 bits. On-the-fly generation of the round keys required during decryption is also possible. The general, flexible and multi-functional nature of the approach described contrasts with previous designs which, to date, have been focused on specific implementations. The presented ideas are demonstrated by implementation in FPGA technology. However, the architecture and IP cores derived from this are easily migratable to other silicon technologies including ASIC and PLD and are capable of covering a wide range of modem communication systems cryptographic requirements. Moreover, the designs produced have a gate count and throughput comparable with or better than the previous one-off solutions.
Resumo:
Model Driven Architecture supports the transformation from reusable models to executable software. Business representations, however, cannot be fully and explicitly represented in such models for direct transformation into running systems. Thus, once business needs change, the language abstractions used by MDA (e.g. Object Constraint Language / Action Semantics), being low level, have to be edited directly. We therefore describe an Agent-oriented Model Driven Architecture (AMDA) that uses a set of business models under continuous maintenance by business people, reflecting the current business needs and being associated with adaptive agents that interpret the captured knowledge to behave dynamically. Three contributions of the AMDA approach are identified: 1) to Agent-oriented Software Engineering, a method of building adaptive Multi-Agent Systems; 2) to MDA, a means of abstracting high level business-oriented models to align executable systems with their requirements at runtime; 3) to distributed systems, the interoperability of disparate components and services via the agent abstraction.