919 resultados para sonic arts and architecture
Resumo:
This study examines how the archaeology of historic Ireland has been interpreted. Two approaches to the history and archaeology of Ireland are identified. The first, the timeless past, has its roots in a neo-Lamarckian view of the past. This perspective was particularly developed in the work of geographer and ethnographer, Estyn Evans. The second view, associated in particular with a nationalist approach to Ireland’s past, looked to the west of the country where it was believed the culture had been preserved largely unchanged and in its purest form. The continuing impact of these frameworks upon the interpretation of rural settlement in the period 1200– 1700 is examined. It is argued that historians and archaeologists alike have underestimated the quality of buildings.
Resumo:
Objectives
This study examined the role of shame coping styles and state shame in predicting the therapeutic alliance and intimate relationship functioning in individuals with mental health problems.
Method
A sample of 50 treatment-receiving adults aged 21 to 67 years with a mix of common mental health difficulties was recruited from a clinical psychology service. Participants were given questionnaire measures of shame states, shame coping styles, intimate relationship functioning, and the therapeutic alliance.
Results
Regression analyses indicated that the shame coping strategy of physical and psychological withdrawal was the primary risk factor for development of a less effective therapeutic alliance. Both withdrawal and attack self coping styles were significant predictors of impaired intimate relationship functioning.
Conclusions
These findings have implications for the theoretical role of shame in mental health presentations as well as the potential for internalizing shame coping styles (i.e., withdrawal, attack self) to act as a barrier to successful therapy and interpersonal relationships. The inclusion of shame-focused assessments and interventions in the initial stages of treatment with clients exhibiting these strategies could improve prognosis.
Resumo:
A cryptotephra layer from the eruption of Hekla in 1947 has recently been discovered in Irish peatlands. This tephra layer represents the most recent deposition of volcanic ash in the UK prior to the eruption of Eyjafjallajökull in 2010. Here we examine the concentration and geochemistry of the Hekla 1947 tephra in 14 peat profiles from across Northern Ireland. Electron probe microanalysis of individual tephra shards (n?=?91) reveals that the tephra is of dacitic–andesitic geochemistry and is highly similar to the Hekla 1510 tephra, although spheroidal carbonaceous particle profiles can be used for successful discrimination of the two layers. The highest concentrations of Hekla 1947 are found in western sites, probably reflecting the pathway of the ash fall event due to the prevailing wind direction. Comparable tephra concentrations from two cores (1?km apart) from a single bog and from nearby sites may suggest that tephra shard concentrations in peat profiles reflect ash fallout densities across a specific region, rather than site-specific factors associated with peatlands. This paper firmly establishes Hekla 1947 as a useful chronostratigraphic marker for the twentieth century, although within a restricted zone.
Resumo:
A new type of advanced encryption standard (AES) implementation using a normal basis is presented. The method is based on a lookup technique that makes use of inversion and shift registers, which leads to a smaller size of lookup for the S-box than its corresponding implementations. The reduction in the lookup size is based on grouping sets of inverses into conjugate sets which in turn leads to a reduction in the number of lookup values. The above technique is implemented in a regular AES architecture using register files, which requires less interconnect and area and is suitable for security applications. The results of the implementation are competitive in throughput and area compared with the corresponding solutions in a polynomial basis.
Correlating Alpine glaciation with Adriatic sea-level changes through lake and alluvial stratigraphy
Resumo:
We compare lake and alluvial stratigraphy along a frame connecting the southern Alpine foothills and the Adriatic Sea, with the aim of matching the effects of Alpine glaciation and sea-level changes on sedimentation during the last glacial cycle. The palynostratigraphy of Lake Fimon provided proxies for regional vegetation and climate change and was coupled with sediment petrography, loss on ignition and magnetic susceptibility, disentangling alluvial phases from fluvioglacial activity related to culminations of the southeastern Alpine glaciers. The Fimon area was not reached by alluvial fans during the penultimate glacial maximum, nor by the sea transgression during the last interglacial, but a closed lake soon developed at the Eemian onset due to enhanced rainfall. Sea-level fall at glacial inception triggered the entrenchment of the drainage network in the plain reaching the outer Fimon Basin. Slow aggradation, but no sign of fluvioglacial activity, lasted to 38.2 +/- 1.45 cal. ka BP, when a major forest withdrawal took place, coeval to the spread of alluvial fans. By 27.5 perpendicular to 0.5 cal. ka BP the Fimon Basin was dammed by the Brenta outwash system. The main step of of forest recovery commenced at around (15.8) cal. ka BP, when apex trenching of the outwash fans was triggered by the glacier's decay. Copyright (C) 2011 John Wiley & Sons, Ltd.
Resumo:
Privacy has now become a major topic not only in law but in computing, psychology, economics and social studies, and the explosion in scholarship has made it difficult for the student to traverse the field and identify the significant issues across the many disciplines. This series brings together a collection of significant papers with a multi-disciplinary approach which enable the reader to navigate through the complexities of the issues and make sense of the prolific scholarship published in this field.
The three volumes in this series address different themes: an anthropological approach to what privacy means in a cultural context; the issue of state surveillance where the state must both protect the individual and protect others from that individual and also protect itself; and, finally, what privacy might mean in a world where government and commerce collect data incessantly. The regulation of privacy is continually being called for and these papers help enable understanding of the ethical rationales behind the choices made in the sphere of regulation of privacy.
The articles presented in each of these collections have been chosen for the quality of their scholarship and their utility to the researcher, and feature a variety of approaches. The articles which debate the technical context of privacy are accessible to those from the arts and humanities; overall, the breadth of approach taken in the choice of articles has created a series which is an invaluable and important resource for lecturers, researchers and student.
Resumo:
MinneSPEC proposes reduced input sets that microprocessor designers can use to model representative short-running workloads. A four-step methodology verifies the program behavior similarity of these input sets to reference sets.
Resumo:
Randomising set index functions can reduce the number of conflict misses in data caches by spreading the cache blocks uniformly over all sets. Typically, the randomisation functions compute the exclusive ors of several address bits. Not all randomising set index functions perform equally well, which calls for the evaluation of many set index functions. This paper discusses and improves a technique that tackles this problem by predicting the miss rate incurred by a randomisation function, based on profiling information. A new way of looking at randomisation functions is used, namely the null space of the randomisation function. The members of the null space describe pairs of cache blocks that are mapped to the same set. This paper presents an analytical model of the error made by the technique and uses this to propose several optimisations to the technique. The technique is then applied to generate a conflict-free randomisation function for the SPEC benchmarks. (C) 2003 Elsevier Science B.V. All rights reserved.