241,295 research outputs found

    Signs of the Times: Nineteenth - Twentieth Century Graffiti in the Farms of the Yorkshire Wolds

    Get PDF
    This paper is concerned with graffiti found in farm buildings on the Yorkshire Wolds, dating between the late nineteenth and late twentieth centuries. It uses an archaeological approach to explore the social and performative nature of these inscriptions, to analyse their content and character, and to consider the communities responsible for their creation. We argue that this was a vital medium of expression for a particular group of farm-workers – the horselads – and was part of the way in which they negotiated their status and identity during a period of great social upheaval and agricultural change (Giles and Giles 2007). We situate the making of these marks within the horselads’ seasonal rhythms of labour and broader patterns of inhabitation. Finally, we explore spatial and stratigraphic relationships associated with graffiti panels, to elucidate different groups within these communities, and analyse how they changed over time

    A First Practical Fully Homomorphic Crypto-Processor Design: The Secret Computer is Nearly Here

    Get PDF
    Following a sequence of hardware designs for a fully homomorphic crypto-processor - a general purpose processor that natively runs encrypted machine code on encrypted data in registers and memory, resulting in encrypted machine states - proposed by the authors in 2014, we discuss a working prototype of the first of those, a so-called `pseudo-homomorphic' design. This processor is in principle safe against physical or software-based attacks by the owner/operator of the processor on user processes running in it. The processor is intended as a more secure option for those emerging computing paradigms that require trust to be placed in computations carried out in remote locations or overseen by untrusted operators. The prototype has a single-pipeline superscalar architecture that runs OpenRISC standard machine code in two distinct modes. The processor runs in the encrypted mode (the unprivileged, `user' mode, with a long pipeline) at 60-70% of the speed in the unencrypted mode (the privileged, `supervisor' mode, with a short pipeline), emitting a completed encrypted instruction every 1.67-1.8 cycles on average in real trials.Comment: 6 pages, draf

    Accounting for knowledge embedded in physical objects and environments : the role of artefacts in transferring knowledge

    Get PDF
    The intention to investigate the role of artefacts (objects and environments) in codifying, embedding and disseminating knowledge was inspired by an awareness that organisations across all sectors are increasingly being asked not only to provide products in the first instance, but also to support them throughout their service life. Thus a move from product-delivery to product-service designs is suggested. This paper considers ways in which knowledge can be embedded into the physical properties of artefacts and how this can consequently aid the dissemination and management of knowledge in and across stages of life cycles. A literature review and fieldwork based on an ethnomethodological approach are used to investigate this topic. Accounts of the situated meaning of artefacts within social processes are obtained using ethnographic armchair research. Unique adequacy is used to achieve an understanding of how people make sense of artefacts. The initial findings of the current research show that knowledge can be embedded or encoded into the physical properties of artefacts and that this can be successfully transferred from artefact to user

    Benno Wissing and the Modernization of de Stijl

    Get PDF

    Harmonious architecture and kinetic linear energy

    Get PDF
    This is a chapter in a book based upon the work from an Erasmus International Project which took place in Athens in July 2012

    Influencing driver behaviour through road marking

    Get PDF
    This paper will describe how road marking can be used to influence driver behaviour in order to improve road safety and traffic flows. Extensive use will be made of examples from recent research undertaken by the authors on overtaking lane design, speed change management, managing speed around curves and improving the safety of high risk sections of roads. This research included both on-road and driving simulator-based measurements. The concept of self explaining roads and what is required to implement it will also be described

    Time-division SQUID multiplexers with reduced sensitivity to external magnetic fields

    Full text link
    Time-division SQUID multiplexers are used in many applications that require exquisite control of systematic error. One potential source of systematic error is the pickup of external magnetic fields in the multiplexer. We present measurements of the field sensitivity figure of merit, effective area, for both the first stage and second stage SQUID amplifiers in three NIST SQUID multiplexer designs. These designs include a new variety with improved gradiometry that significantly reduces the effective area of both the first and second stage SQUID amplifiers.Comment: 4 pages, 7 figures. Submitted for publication in the IEEE Transactions on Applied Superconductivity, August 201

    Spartan Daily, September 30, 2014

    Get PDF
    Volume 143, Issue 14https://scholarworks.sjsu.edu/spartandaily/1513/thumbnail.jp
    • 

    corecore