990 resultados para Architecture, Ancient.
Resumo:
This article will introduce a specially-commissioned edition of the JSS centering on articles developed from the International Symposium May 2014 by the Recomposing the City project.
Resumo:
The BDI architecture, where agents are modelled based on their beliefs, desires and intentions, provides a practical approach to develop large scale systems. However, it is not well suited to model complex Supervisory Control And Data Acquisition (SCADA) systems pervaded by uncertainty. In this paper we address this issue by extending the operational semantics of Can(Plan) into Can(Plan)+. We start by modelling the beliefs of an agent as a set of epistemic states where each state, possibly using a different representation, models part of the agent's beliefs. These epistemic states are stratified to make them commensurable and to reason about the uncertain beliefs of the agent. The syntax and semantics of a BDI agent are extended accordingly and we identify fragments with computationally efficient semantics. Finally, we examine how primitive actions are affected by uncertainty and we define an appropriate form of lookahead planning.
Resumo:
Human settlement of Oceania marked the culmination of a global colonization process that began when humans first left Africa at least 90,000 years ago. The precise origins and dispersal routes of the Austronesian peoples and the associated Lapita culture remain contentious, and numerous disparate models of dispersal (based primarily on linguistic, genetic, and archeological data) have been proposed. Here, through the use of mtDNA from 781 modern and ancient Sus specimens, we provide evidence for an early human-mediated translocation of the Sulawesi warty pig (Sus celebensis) to Flores and Timor and two later separate human-mediated dispersals of domestic pig (Sus scrofa) through Island Southeast Asia into Oceania. Of the later dispersal routes, one is unequivocally associated with the Neolithic (Lapita) and later Polynesian migrations and links modern and archeological Javan, Sumatran, Wallacean, and Oceanic pigs with mainland Southeast Asian S. scrofa. Archeological and genetic evidence shows these pigs were certainly introduced to islands east of the Wallace Line, including New Guinea, and that so-called "wild" pigs within this region are most likely feral descendants of domestic pigs introduced by early agriculturalists. The other later pig dispersal links mainland East Asian pigs to western Micronesia, Taiwan, and the Philippines. These results provide important data with which to test current models for human dispersal in the region. © 2007 by The National Academy of Sciences of the USA.
Resumo:
Very high speed and low area hardware architectures of the SHACAL-1 encryption algorithm are presented in this paper. The SHACAL algorithm was a submission to the New European Schemes for Signatures, Integrity and Encryption (NESSIE) project and it is based on the SHA-1 hash algorithm. To date, there have been no performance metrics published on hardware implementations of this algorithm. A fully pipelined SHACAL-1 encryption architecture is described in this paper and when implemented on a Virtex-II X2V4000 FPGA device, it runs at a throughput of 17 Gbps. A fully pipelined decryption architecture achieves a speed of 13 Gbps when implemented on the same device. In addition, iterative architectures of the algorithm are presented. The SHACAL-1 decryption algorithm is derived and also presented in this paper, since it was not provided in the submission to NESSIE. © Springer-Verlag Berlin Heidelberg 2003.
Resumo:
BACKGROUND: Evolution equipped Bdellovibrio bacteriovorus predatory bacteria to invade other bacteria, digesting and replicating, sealed within them thus preventing nutrient-sharing with organisms in the surrounding environment. Bdellovibrio were previously described as "obligate predators" because only by mutations, often in gene bd0108, are 1 in ~1x10(7) of predatory lab strains of Bdellovibrio converted to prey-independent growth. A previous genomic analysis of B. bacteriovorus strain HD100 suggested that predatory consumption of prey DNA by lytic enzymes made Bdellovibrio less likely than other bacteria to acquire DNA by lateral gene transfer (LGT). However the Doolittle and Pan groups predicted, in silico, both ancient and recent lateral gene transfer into the B. bacteriovorus HD100 genome.
RESULTS: To test these predictions, we isolated a predatory bacterium from the River Tiber- a good potential source of LGT as it is rich in diverse bacteria and organic pollutants- by enrichment culturing with E. coli prey cells. The isolate was identified as B. bacteriovorus and named as strain Tiberius. Unusually, this Tiberius strain showed simultaneous prey-independent growth on organic nutrients and predatory growth on live prey. Despite the prey-independent growth, the homolog of bd0108 did not have typical prey-independent-type mutations. The dual growth mode may reflect the high carbon content of the river, and gives B. bacteriovorus Tiberius extended non-predatory contact with the other bacteria present. The HD100 and Tiberius genomes were extensively syntenic despite their different cultured-terrestrial/freshly-isolated aquatic histories; but there were significant differences in gene content indicative of genomic flux and LGT. Gene content comparisons support previously published in silico predictions for LGT in strain HD100 with substantial conservation of genes predicted to have ancient LGT origins but little conservation of AT-rich genes predicted to be recently acquired.
CONCLUSIONS: The natural niche and dual predatory, and prey-independent growth of the B. bacteriovorus Tiberius strain afforded it extensive non-predatory contact with other marine and freshwater bacteria from which LGT is evident in its genome. Thus despite their arsenal of DNA-lytic enzymes; Bdellovibrio are not always predatory in natural niches and their genomes are shaped by acquiring whole genes from other bacteria.
Resumo:
The proposed multi-table lookup architecture provides SDN-based, high-performance packet classification in an OpenFlow v1.1+ SDN switch. The objective of the demonstration is to show the functionality of the architecture deployed on the NetFPGA SUME Platform.
Resumo:
Several studies in the last decade have pointed out that many devices, such as computers, are often left powered on even when idle, just to make them available and reachable on the network, leading to large energy waste. The concept of network connectivity proxy (NCP) has been proposed as an effective means to improve energy efficiency. It impersonates the presence of networked devices that are temporally unavailable, by carrying out background networking routines on their behalf. Hence, idle devices could be put into low-power states and save energy. Several architectural alternatives and the applicability of this concept to different protocols and applications have been investigated. However, there is no clear understanding of the limitations and issues of this approach in current networking scenarios. This paper extends the knowledge about the NCP by defining an extended set of tasks that the NCP can carry out, by introducing a suitable communication interface to control NCP operation, and by designing, implementing, and evaluating a functional prototype.
Resumo:
This chapter examines the current ‘architecture’ of the British state, in particular the way in which governmental power is distributed among the nations of the United Kingdom. The theme of this chapter will be to show how the continuing (and, as James Bryce argued, inevitable) tension between centripetal and centrifugal forces can be usefully applied to power relations between the various nations of the United Kingdom, and between these nations and Europe, providing a basis for analyzing how these nations are drawn or impelled by some forces towards a centralized unitary polity, whilst at the same time other forces tend towards dispersion of power. The resulting pattern might be analyzed along a spectrum from centralization to independence, with subsidiarity, devolution and federalism being seen as weigh stations along the way, but given how complex the variations in the distribution of power between these nations and the centre have become over time, the construction of any static architectural blueprint of the British state is bound to be misleading. Indeed, the architectural metaphor, with its implications of stability might usefully be rethought.