2,596 research outputs found

    UK organic research funding – scope and aims

    Get PDF
    This report was presented at the UK Organic Research 2002 Conference. This paper outlines the development of the research programme, describing its rationale and objectives, and providing an indication of likely future priorities

    Dynamic-model study of planetary-entry configurations in the Langley spin tunnel

    Get PDF
    Dynamic model study to determine low subsonic speed stability and drag characteristics during vertical descent of entry configurations considered for probes of planetary atmosphere

    But Simon Said…A Question of Acknowledgement

    Get PDF

    Two Indexical Theories of Names

    Get PDF
    In this paper I argue that there is no motivation to support the Strong Indexical Theory of Names as opposed to its counterpart the Weak Indexical Theory of Names. The Strong Indexical Theory, as proposed by Pelczar, argues that names are indexicals. According to Pelczar, names are context-sensitive to an antecedently performed speech-act, which fixes the referent in that context. However, the content of ambiguous terms can also be fixed by a speech-act, and so according to the strong theory ambiguous terms are indexicals. Furthermore, the meaning of any term can also shift over time and thus unambiguous terms could potentially become ambiguous in the future. Hence, I argue that all terms, ambiguous and unambiguous, are indexicals according to the Strong Indexical Theory of Names. However, indexicals are different from other terms in that the content of an indexical is determined through a single social convention, while the content of all other terms, including names, are determined through two social conventions. Thus, as I argue, names are in the same semantic category as ambiguous terms, which is the main thesis of the Weak Indexical Theory of Names. Moreover, the Strong Indexical Theory claims to resolve the problem of propositional attitudes through an appeal to the reflexive character of names. Yet, the weak alternative also agrees that names have a reflexive character and can also resolve the problem through the same method. In the end, there is no motivation to support the strong theory as opposed to the Weak Indexical Theory of Names

    The Effect of Financial Sector Development on FDI led Growth in China

    Get PDF
    Abstract: Over the past several decades developing countries have attracted and relied on Foreign Direct Investment (FDI) to supply their economies with the investment needed to maintain high economic growth and development. In their pursuit of FDI, many developing countries have passed policies and regulations aimed at attracting inward FDI. Because of the high growth rates and high returns on investment in many of these economies they have experience a large increase in FDI inflow over the past few decades. As these economies have grown and investment has increased, the financial services sector in the developing world has grown to service the increased demand. In 2011 the World Bank and IMF’s Financial Sector Assessment Program on China found that between 2005 and 2010 total bank assets had grown nearly 19%, while the total assets of non-bank financial institutions had grown 35.1% from 2007 to 2010 (World Bank and IMF Financial Sector Assessment Program, 2011, p.25 & 27). With this massive growth in the financial services sector it is important to understand the effects of financial sector development on FDI’s relationship to economic growth in host countries. Keeping this in mind, as policy makers continue to attract FDI it is imperative they know not only its effects on growth but what policies they can enact at a provincial level to maximize positive effects. This study uses both national and provincial level data to assess the effects of financial sector development on FDI’s relationship to economic growth. While the scholarly literature on FDI is fairly well established, literature focusing specifically on financial sector development’s effect on FDI’s and growth is less robust. Many studies such as Carkovic and Levine (2002) find that the effect of FDI interacted with financial sector development on growth to be positive, but not robust. My research utilizes variation in financial sector development between provinces in China to determine the effect financial sector development has on FDI led growth

    Easy Does it Cookbook

    Get PDF
    Published by Cresent Press, 3 Sycamore Crescent, Mount Merrion, Co. Dublin in 1995. Photography : Neil Macdougald, Cooking and Food Styling :Brenda Costigan. Printed at Aston Colour Press ltd. 143 p. col. ill., 22 cm.https://arrow.tudublin.ie/irckbooks/1119/thumbnail.jp

    The Milky Way to Good Cooking: Fun to Cook and Good to Eat

    Get PDF
    This pamphlet contains advice on how to whip, unmoulding adn how to improve your own soups and stews. The recipes are for Springtime Chicken Salad, Boston Chicken Loaf, Hot Cheese Souffle, Salmon Mousse, Raspberry Souffle, Vanilla Fudge, Walnut Fudge, Chocolate and Raisin Fudge, Mixed Fruit Cake, Cheese Cake, Brownies, Swiss Jelly, Jelly Souffle, Quiche Lorraine, Mushroom Tart, Coconut Rice Pudding, Pavlova, Ham and Asparagus au Gratin. Please note the date is approximat

    Go Directly to Jail, Do Not Pass Go, Do Not Keep House

    Get PDF

    Implementation of an identity based encryption sub-system for secure e-mail and other applications

    Get PDF
    This thesis describes the requirements for, and design of, a suite of a sub-systems which support the introduction of Identity Based Encryption (IBE) to Intrenet communications. Current methods for securing Internet transmission are overly complex to users and require expensive and complex supporting infrastructure for distributing credentials such as certificates or public keys. Identity Based Encryption holds a promise of simplifying the process without compromising the security. In this thesis I will outline the theory behind the cryptography required , give a background to e-M ail and messaging protocols,the current security methods, the infrastructure used, the issues with these methods, and the break through that recent innovations in Identity Based Encryption hopes to deliver.I will describe an implementation of a sub-system that secures e-Mail and other protocolsin desktop platforms with as little impact on the end user as possible

    Elliptic Curve Cryptography on Modern Processor Architectures

    Get PDF
    Abstract Elliptic Curve Cryptography (ECC) has been adopted by the US National Security Agency (NSA) in Suite "B" as part of its "Cryptographic Modernisation Program ". Additionally, it has been favoured by an entire host of mobile devices due to its superior performance characteristics. ECC is also the building block on which the exciting field of pairing/identity based cryptography is based. This widespread use means that there is potentially a lot to be gained by researching efficient implementations on modern processors such as IBM's Cell Broadband Engine and Philip's next generation smart card cores. ECC operations can be thought of as a pyramid of building blocks, from instructions on a core, modular operations on a finite field, point addition & doubling, elliptic curve scalar multiplication to application level protocols. In this thesis we examine an implementation of these components for ECC focusing on a range of optimising techniques for the Cell's SPU and the MIPS smart card. We show significant performance improvements that can be achieved through of adoption of EC
    corecore