Carbon and nitrogen isotope analysis for dietary reconstruction and carbon and nitrogen incremental dentine analysis
View/ Open
The Forgotten Cemetery (27.57Mb)
Download
Publication date
2022-12Author
Delaney, s.Murphy, E.
Beaumont, Julia
Cassidy, L.
Drain, D.
Gillig, N.
Gormley, S.
Halstead, L.
Jackson, I.
Jones, M.
Le Roy, M.
Loyer, J.
Mattiangeli, V.
McAlister, G.
McCarthy, M.
McSparron, C.
OCarroll, E.
O'Neill, B.
O’Reilly, R.
Scully, S.
Stevens, P.
White, J.
White, L.
Young, T.
Keyword
ArchaeologyRanelagh
Co. Roscommon
Ireland
Dentine analysis
Carbon incremental dentine analysis
Nitrogen incremental dentine analysis
Diet
Medieval Ireland
Rights
© 2022 Transport Infrastructure Ireland. Reproduced with permission from the publisher.Peer-Reviewed
YesOpen Access status
openAccess
Metadata
Show full item recordAbstract
In 2015, a previously unknown enclosed settlement and burial ground was found near the summit of a low hill in Ranelagh townland, just north of Roscommon town. The site—officially designated Ranelagh 1, and hereafter referred to variously as ‘the Ranelagh site’, ‘the site at Ranelagh’ or simply ‘Ranelagh’—was excavated over a 54-week period by Excavation Director Shane Delaney for Irish Archaeological Consultancy (IAC) Ltd between October 2015 and October 20161 . Excavations revealed that the site was established during the fourth century AD; for over 1,000 years, until the final phase of burial activity proper concluded there shortly after AD 1400, the site would have been a prominent feature in both the geographical and psychological landscape of the time. Cillín (children’s) burials continued at the site until about AD 1650, further asserting this prominence.Version
Published versionCitation
Beaumont J (2022) Carbon and nitrogen isotope analysis for dietary reconstruction and carbon and nitrogen incremental dentine analysis. In: Delaney S and Murphy E et al. The Forgotten Cemetery: excavations at Ranelagh, Co. Roscommon. Dublin: Transport Infrastructure Ireland. TII Heritage 13. pp 243-246.Link to published version
https://www.tii.ie/technical-services/archaeology/publications/tii-heritage/Type
Book chapterCollections
Related items
Showing items related by title, author, creator and subject.
-
Performance Analysis and Enhancement of QoS Framework for Fixed WiMAX Networks. Design, analysis and evaluation of 802.16 Point-to-Multipoint (PMP) Quality of Service Framework based on uplink scheduler and call admission control analysis.Awan, Irfan U.; Laias, Elmabruk M. (University of BradfordSchool of Informatics, Department of Computing., 2010-05-28)Given the current developments and advances in the scientific and technological aspects of human knowledge and introducing new approaches in various fields of telecommunication technologies and industries, there has been an increasing growth in its players¿ plans and a positive change in their outlooks in order to achieve the target of "anywhere and anytime access". Recent developments of WiMAX (Worldwide interoperability for Microwave Access) networks, as a sign of increasing needs and demands for new telecommunication services and capabilities, have led to revolutions in global telecommunication which should be perceived properly in terms of the commercial and technical aspects in order to enjoy the new opportunities. Most experts believe that WiMAX technology is a preliminary step to develop Fourth Generation networks known as 4G technologies. It has not only succeeded in the utilization of several of the latest telecommunication techniques in the form of unique practical standards, but also paved the way for the quantitative and qualitative developments of high-speed broadband access. IEEE 802.16 Standard introduces several advantages, and one of them is the support for Quality of Services (QoS) at the Media Access Control (MAC) level. For these purposes, the standard defines several scheduling classes at MAC layer to treat service flow in a different way, depending on QoS requirements. In this thesis, we have proposed a new QoS framework for Point-to-Multi Point (PMP) 802.16 systems operating in Time Division Duplexing (TDD) mode over a WirelessMAN-OFDM physical layer. The proposed framework consists of a Call Admission Control (CAC) module and a scheduling scheme for the uplink traffic as well as a simple frame allocation scheme. The proposed CAC module interacts with the uplink scheduler status and it makes its decision based on the scheduler queue status; on the other hand, the proposed scheduling scheme for the uplink traffic aims to support realtime flows and adapts the frame-by-frame allocations to the current needs of the connections, with respect to the grants boundaries fixed by the CAC module. Extensive OPNET simulation demonstrates the effectiveness of the proposed architecture.
-
Understanding the Corpus of E-Government Research: An analysis of the literature using co-citation analysis and social network analysisSaip, M.A.; Kamala, Mumtaz A.; Tassabehji, Rana (2016-09)The growing body of published e-government literature highlights the importance of e-government in society and the need to make sense of e-government by academia. In order to understand the future of e-government, it is important to understand the research that has been conducted and highlight the issues and themes that have been identified as important by empirical study. This paper analyses the corpus of e-government research published from 2000 to 2013 using Bibliometric and Social Network Analysis (SNA) methods to develop an intellectual structure of e-government research. Factor analysis, multidimensional scaling and centrality measurement are also applied to the e-government dataset using UCINET to identify the core influential articles in the field. This study identifies three core clusters of e-government research that centre around (i) e-government development models (ii) adoption and acceptance of e-government, and (iii) e-government using social media and highlights areas for future research in the field. Discover the world's research
-
Threat analysis versus risk analysis in intelligence and security assessmentAdeka, Muhammad I.; Shepherd, Simon J.; Abd-Alhameed, Raed (2014)A realisation of the relationships among the security terms threat, vulnerability and risk, led to a perception of inconsistency about the security assessment procedure in the defence and public security industry in Nigeria. This is a practice whereby threat analysis is usually over-emphasised to the detriment of vulnerability and risk analyses. An original misconception surrounding the term analysis, as employed in the Intelligence Cycle, and its opposite counterpart, synthesis, was suspect. This paper was designed to sort out the technical relationship between analysis and synthesis, with a view to exploiting the implications optimally. It was revealed that the two terms are opposite in meaning but need to be intricately inter-woven in their employment as evaluation techniques. Unfortunately, most intelligence and security “analysts” embark on analysis with little or no idea about synthesis, thus muddling up the two concepts to the advantage of analysis. This original misconception led to a culture of non systematism and haphazardness in the intelligence assessment procedure. This culture was transmitted, in situ, from intelligence „analysis‟ to security „analysis.‟ Thus, the terms vulnerability and risk in security assessment suffer an almost identical fate with synthesis. It is the same reason that is most probably responsible for the divergence in the security assessment procedure between the public and private segments of the security industry. The implications of this anomaly include the virtual disappearance of synthesist in the global professional vocabulary of intelligence and security organisations, except for India; with resultant inconsistencies in the definition of intelligence analysis, and a culture of lack of systematism and accountability in the security assessment procedure. It is proposed that the phrase intelligence analysis, as employed in intelligence processing, should be replaced with intelligence synthesis. Intelligence products should be made amenable to re-evaluation and accountability. In military and security operations, the object of security assessment should be risk analysis, as opposed to threat analysis. Newly suggested terminologies are analosynthesis, synthonalysis and equisynalysis. Similarly, thesis, as a synonym of dissertation, should be replaced with synthesis.