990 resultados para speed limits
Resumo:
‘Temporally urgent’ reactions are extremely rapid, spatially precise movements that are evoked following discrete stimuli. The involvement of primary motor cortex (M1) and its relationship to stimulus intensity in such reactions is not well understood. Continuous theta burst stimulation (cTBS) suppresses focal regions of the cortex and can assess the involvement of motor cortex in speed of processing. The primary objective of this study was to explore the involvement of M1 in speed of processing with respect to stimulus intensity. Thirteen healthy young adults participated in this experiment. Behavioral testing consisted of a simple button press using the index finger following median nerve stimulation of the opposite limb, at either high or low stimulus intensity. Reaction time was measured by the onset of electromyographic activity from the first dorsal interosseous (FDI) muscle of each limb. Participants completed a 30 min bout of behavioral testing prior to, and 15 min following, the delivery of cTBS to the motor cortical representation of the right FDI. The effect of cTBS on motor cortex was measured by recording the average of 30 motor evoked potentials (MEPs) just prior to, and 5 min following, cTBS. Paired t-tests revealed that, of thirteen participants, five demonstrated a significant attenuation, three demonstrated a significant facilitation and five demonstrated no significant change in MEP amplitude following cTBS. Of the group that demonstrated attenuated MEPs, there was a biologically significant interaction between stimulus intensity and effect of cTBS on reaction time and amplitude of muscle activation. This study demonstrates the variability of potential outcomes associated with the use of cTBS and further study on the mechanisms that underscore the methodology is required. Importantly, changes in motor cortical excitability may be an important determinant of speed of processing following high intensity stimulation.
Resumo:
The recent judgment of the Grand Chamber of the European Court of Human Rights (ECtHR) in Vinter and others v United Kingdom provides a much needed clarification of the parameters of the prohibition on inhuman and degrading punishment under Article 3 of the European Convention on Human Rights (ECHR) as it applies to whole life orders of imprisonment under mandatory life sentences – essentially, life imprisonment without parole. The Grand Chamber’s judgment refines Strasbourg doctrine on life imprisonment and the prospect of release and illuminates key principles concerning inhuman and degrading punishment under Article 3 of the ECHR. This article considers the judgment’s profound significance in relation to both human rights and penology.
Resumo:
The European Union's commitment to citizen participation in policymaking and implementation reflects a wider concern for securing Europe's ‘unity in diversity’. However, across its member-states, individuals belonging to the diverse linguistic, ethnic and social groups often referred to as ‘Roma’ find themselves excluded from political, social and economic participation in countries where they live. The past decade saw the appearance of a more concerted approach to improve the participation of individuals belonging to these groups in social and economic processes. This article examines what it refers to as the European Governance for Romani inclusion (EGRI), assessing policy steps undertaken at the European institutional level towards Romani inclusion and the tools for policy implementation. The paper concludes that the EGRI has offered only limited opportunities for the marginalised Roma to redress their exclusion.
Resumo:
In this paper, we explore various arithmetic units for possible use in high-speed, high-yield ALUs operated at scaled supply voltage with adaptive clock stretching. We demonstrate that careful logic optimization of the existing arithmetic units (to create hybrid units) indeed make them further amenable to supply voltage scaling. Such hybrid units result from mixing right amount of fast arithmetic into the slower ones. Simulations on different hybrid adder and multipliers in BPTM 70 nm technology show 18%-50% improvements in power compared to standard adders with only 2%-8% increase in die-area at iso-yield. These optimized datapath units can be used to construct voltage scalable robust ALUs that can operate at high clock frequency with minimal performance degradation due to occasional clock stretching. © 2009 IEEE.
Resumo:
A fully homomorphic encryption (FHE) scheme is envisioned as a key cryptographic tool in building a secure and reliable cloud computing environment, as it allows arbitrary evaluation of a ciphertext without revealing the plaintext. However, existing FHE implementations remain impractical due to very high time and resource costs. To the authors’ knowledge, this paper presents the first hardware implementation of a full encryption primitive for FHE over the integers using FPGA technology. A large-integer multiplier architecture utilising Integer-FFT multiplication is proposed, and a large-integer Barrett modular reduction module is designed incorporating the proposed multiplier. The encryption primitive used in the integer-based FHE scheme is designed employing the proposed multiplier and modular reduction modules. The designs are verified using the Xilinx Virtex-7 FPGA platform. Experimental results show that a speed improvement factor of up to 44 is achievable for the hardware implementation of the FHE encryption scheme when compared to its corresponding software implementation. Moreover, performance analysis shows further speed improvements of the integer-based FHE encryption primitives may still be possible, for example through further optimisations or by targeting an ASIC platform.
Resumo:
This article examines the difficulties of finding local solutions to the problem of contentious events in contemporary Northern Ireland. In so doing, it offers a sociological perspective on fundamental divisions in Northern Ireland: between classes and between communities. It shows how its chosen case study—parades and associated protests in north Belfast—exemplifies the most fundamental problem that endures in post-Agreement Northern Ireland, namely that political authority is not derived from a common civic culture (as is the norm in Western liberal democracy) but rather that legitimacy is still founded on the basis of the culture of either one or the other community. Haugaard’s reflections on authority and legitimacy are used to explore Northern Ireland’s atypical experience of political conflict vis-`a-vis the Western liberal democratic model. The Bourdieusian concepts of field illusio and doxa help to explain why it is that parading remains such an important political and symbolic touchstone in this society.
Resumo:
In this paper we address the idea of ‘legal but corrupt’ through a discussion of two cases: abuse scandals in the Irish Catholic Church and the financial services industry in the wake of the Global Financial Crisis. We identify two important dynamics that generated the scandals: that they were driven by strong and stable groups existing within a peculiar kind of ‘accountability space’ that we describe as ‘monastic’ and that those groups persisted with tacit or explicit support from the state. ‘Legal but corrupt’ is, we argue, a matter of insider incomprehension sustained by the ceding of sovereignty over some aspect of social or economic life.
Resumo:
On 26 December 2003 an Israeli activist was shot by the Israeli Army while he was participating in a demonstration organized by Anarchists Against the Wall (AAtW) in the West Bank. This was the first time Israeli Soldiers have deliberately shot live bullets at a Jewish-Israeli activist. This paper is an attempt to understand the set of conditions, the enveloping frameworks, and the new discourses that have made this event, and similar shootings that soon followed, possible. Situating the actions of AAtW within a much wider context of securitization—of identities, movements, and bodies—we examine strategies of resistance which are deployed in highly securitized public spaces. We claim that an unexpected matrix of identity in which abnormality is configured as security threat render the bodies of activists especially precarious. The paper thus provides an account of the new rationales of security technologies and tactics which increasingly govern public spaces.
Resumo:
Conversion of xylose to l-lactate was carried out by Lactococcus lactis IO-1 using an electrodialysis bioprocess (ED-BP). At 50 g l -1 xylose, the ED-BP was already complete in half the time (32 h) taken by the control culture without electrodialysis (>60 h). At 80 g l -1 xylose, the control culture was unable to consume >50 g l -1 xylose, whereas the ED-BP consumed 75 g l -1 xylose in 45 h. Thus, the simultaneous removal of lactate and acetate by ED-BP was associated with high-speed l-lactate production, increased xylose consumption and an increased l-lactate production. Copyright (C) 1998 Elsevier Science B.V.
Resumo:
Many organic molecules have strong absorption bands which can be accessed by ultraviolet short pulse lasers to produce efficient ionization. This resonant multiphoton ionization scheme has already been exploited as an ionization source in time-of-flight mass spectrometers used for environmental trace analysis. In the present work we quantify the ultimate potential of this technique by measuring absolute ion yields produced from the interaction of 267 nm femtosecond laser pulses with the organic molecules indole and toluene, and gases Xe, N2 and O2. Using multiphoton ionization cross sections extracted from these results, we show that the laser pulse parameters required for real-time detection of aromatic molecules at concentrations of one part per trillion in air and a limit of detection of a few attomoles are achievable with presently available commercial laser systems. The potential applications for the analysis of human breath, blood and tissue samples are discussed.
Resumo:
Very high speed and low area hardware architectures of the SHACAL-1 encryption algorithm are presented in this paper. The SHACAL algorithm was a submission to the New European Schemes for Signatures, Integrity and Encryption (NESSIE) project and it is based on the SHA-1 hash algorithm. To date, there have been no performance metrics published on hardware implementations of this algorithm. A fully pipelined SHACAL-1 encryption architecture is described in this paper and when implemented on a Virtex-II X2V4000 FPGA device, it runs at a throughput of 17 Gbps. A fully pipelined decryption architecture achieves a speed of 13 Gbps when implemented on the same device. In addition, iterative architectures of the algorithm are presented. The SHACAL-1 decryption algorithm is derived and also presented in this paper, since it was not provided in the submission to NESSIE. © Springer-Verlag Berlin Heidelberg 2003.