342 resultados para Speculative attacks
Resumo:
"Bollywood Extras" has been described as a bit like Vladimir Nabokov's "Lolita" (1955) meets Nathanael West's "Day of the Locust" (1939). Unlike those two classics, this new novel by Dr D. Bruno Starrs is set in 21st Century India's Hindi-language film industry epicenter known as 'Bollywood', Mumbai's answer to America's 'Hollywood'. And there is another major difference: the story (i.e. the narrative interaction between an American Extras Casting Agent, 'Dr Arden Pyle', an under-age wannabe Bollywood starlet, 'Chandy', and the despicable but wealthy Indian man who stalks her, 'Ishmail'), is all staged against a backdrop of rabid religious terrorism. Written with the unique black comedic and literary flair Dr D. Bruno Starrs is renown for, this, his 3rd full-length novel, boldly captures the feel of Mumbai and the small-time players in its big-time film industry, with style, humor and originality. Tom Flood, winner of the Miles Franklin Literary Award and founder of Flood Manuscripts, said this of the novel's second last draft: "What is best about 'Bollywood Extras' will likely be its albatross in the sliced bread world of mainstream publishing. Three strengths that make the work what it is - the length, the style, the intellectual capital - will be three strikes against it when it comes to the money. While I delight in rich language and agile invention, I've given you the reasons the trade ('legit') presses won't take 'Bollywood Extras'. Do I think you should you change it? No. I like it. Why ruin an interesting work for money?" As a professional assessor, Flood did, of course, offer many suggestions and these were duly implemented, although the author steadfastly adhered to the style he had already cemented, thus not changing in anyway what Flood refers to as its three strengths. Dr Starrs knew (having accessed Flood's professional services previously) that a 'Thumbs Up' from the best manuscript assessor in the country meant that Bollywood Extras was ready to be birthed. So, here it is: Dr Starrs has delivered his 3rd baby and 'christened' it "Bollywood Extras"!
Resumo:
This background paper to a panel discussion by four QUT staff members explores depression, mood disorders, suicide and meaning in life.
Resumo:
On 20 September 2001, the former US President, George W. Bush, declared what is now widely, and arguably infamously, known as a ‘war on terror’. In response to the fatal 9/11 attacks in New York and Washington, DC, President Bush identified the US military response as having far-reaching and long-lasting consequences. It was, he argued, ‘our war on terror’ that began ‘with al Qaeda, but … it will not end until every terrorist group of global reach has been found, stopped and defeated’ (CNN 2001). This was to be a war that would, in the words of former British Prime Minister, Tony Blair, seek to eliminate a threat that was ‘aimed at the whole democratic world’ (Blair 2001). Blair claimed that this threat is of such magnitude that unprecedented measures would need to be taken to uphold freedom and security. Blair would later admit that it was a war that ‘divided the country’ and was based on evidence ‘about Saddam having actual biological and chemical weapons, as opposed to the capability to develop them, has turned out to be wrong’ (Blair 2004). The failures of intelligence ushered in new political rhetoric in the form of ‘trust me’ because ‘instinct is no science’ (Blair 2004). The war on terror has been one of the most significant international events in the past three decades, alongside the collapse of the former Soviet Union, the end of apartheid in South Africa, the unification of Europe and the marketization of the People's Republic of China. Yet, unlike the other events, it will not be remembered for advancing democracy or sovereignty, but for the conviction politics of particular politicians who chose to dispense with international law and custom in pursuit of personal instincts that proved fatal. Since the invasions of Afghanistan in October 2001 and …
Resumo:
This project investigates machine listening and improvisation in interactive music systems with the goal of improvising musically appropriate accompaniment to an audio stream in real-time. The input audio may be from a live musical ensemble, or playback of a recording for use by a DJ. I present a collection of robust techniques for machine listening in the context of Western popular dance music genres, and strategies of improvisation to allow for intuitive and musically salient interaction in live performance. The findings are embodied in a computational agent – the Jambot – capable of real-time musical improvisation in an ensemble setting. Conceptually the agent’s functionality is split into three domains: reception, analysis and generation. The project has resulted in novel techniques for addressing a range of issues in each of these domains. In the reception domain I present a novel suite of onset detection algorithms for real-time detection and classification of percussive onsets. This suite achieves reasonable discrimination between the kick, snare and hi-hat attacks of a standard drum-kit, with sufficiently low-latency to allow perceptually simultaneous triggering of accompaniment notes. The onset detection algorithms are designed to operate in the context of complex polyphonic audio. In the analysis domain I present novel beat-tracking and metre-induction algorithms that operate in real-time and are responsive to change in a live setting. I also present a novel analytic model of rhythm, based on musically salient features. This model informs the generation process, affording intuitive parametric control and allowing for the creation of a broad range of interesting rhythms. In the generation domain I present a novel improvisatory architecture drawing on theories of music perception, which provides a mechanism for the real-time generation of complementary accompaniment in an ensemble setting. All of these innovations have been combined into a computational agent – the Jambot, which is capable of producing improvised percussive musical accompaniment to an audio stream in real-time. I situate the architectural philosophy of the Jambot within contemporary debate regarding the nature of cognition and artificial intelligence, and argue for an approach to algorithmic improvisation that privileges the minimisation of cognitive dissonance in human-computer interaction. This thesis contains extensive written discussions of the Jambot and its component algorithms, along with some comparative analyses of aspects of its operation and aesthetic evaluations of its output. The accompanying CD contains the Jambot software, along with video documentation of experiments and performances conducted during the project.
Resumo:
In this video, a thumping house-music track is accompanied by lines of rotating text, which resemble computer screen-savers. The text is sourced from websites offering tips for dating and seducing potential lovers. This work engages with the language of online forums. It reworks text from online advice forums and mixes them with visual codes of computer graphics. By extending on some of Nicolas Bourriaud’s ideas around ‘postproduction’ and the creative and critical strategies of ‘editing’, it offers new speculative perspectives on the relationship between screen realities, desire and romance.
Resumo:
In this video, a male voice performs a script combining stories sourced from an anonymous confessions website. On screen, imagery of fireworks repeats into increasingly kaleidoscopic patterns. This work engages with the relationship between screen culture and contemporary subjectivity. It contrasts private confessions with the public spectacle of fireworks to question the ways screen cultures are informing constructions of subjectivity. By extending on some of Nicolas Bourriaud’s ideas around ‘postproduction’ and the creative and critical strategies of ‘editing’, it offers a speculative understanding of the contemporary tension between public and private.
Resumo:
The paper will describe the ongoing project, Imagining the City: Brisbane Short Story Competition. In 2010, as part of a study investigating urban planning and the gentrification of inner city landmarks, QUT researchers developed six personas to help inform the design of city apartments. Rather than view these personas as static, the authors solicited creative responses to promote further development. Submissions of short stories based on one of the persons, and set in Brisbane, were invited from the general public. Successful stories will be published in an online anthology and as an iPhone application. The paper draws on ethnographic fiction theory to answer the question, how can research, specifically persona and use scenario, be transformed into fiction? The authors suggest that such creative responses in the form of fiction may be useful for urban designers.
Resumo:
This paper discusses human and post-human relationships with nature and animals, using the work e. Menura Superba1 as a focal point. This interactive artwork takes the form of a Lyre bird in a cage, that mimics it’s audience in evocative ways. It is inspired by the historical practice of displaying taxidermy specimens and live species as trophies of travels to distant lands, and as symbols of wealth and status. In both form and intent the work hybridises elements from Enlightenment culture, with materials that conjure associations with dystopic post human futures (wire, post consumer electronic & other waste, as well working parts such as mobile phone screens, LED’s, camera, and cabling etc). Speculative science fiction, such as Phillip K Dick in Do Androids Dream of Electric Sheep? (Blade Runner), provides prescient stories about future (post) human worlds. This novel remains thought provoking as it describes a world that is all to rapidly approaching: where human activity has caused the destruction of most large animal species. In this fictional world, care for animals is not only a civic duty, it is one of the ways humans distinguish themselves from androids. As in Enlightenment times, ownership of animals (real, taxidermies, ersatz) is a form of commodity fetishism indicative of social status. Though whilst well heeled Victorians may have owned an elephant or have been proud of a trophy specimen, the wealthy in Dick’s future must be content with once common, even ersatz, animals such as sheep and owls, and would be repulsed to the core by the notion of killing an animal, even an ersatz animal, for sport. In becoming post human, humans have sought to separate themselves from the natural world, destroying much of it in the process. No technical prothesis will bring back to life the species we have rendered extinct. This (evolving) relationship between humanity and other species, therefore forms a central question in this work, providing a way of approaching the post human, and problematising anthropocentric perspectives. The world promised by post-human technology is indeed rich with possibility, but without corresponding steps to ensure the sustainability of technology (human society), this paper asks whether the richness of that experience will continue to be mirrored by the richness of the environments within which we exist?
Resumo:
The timing and order of divergences within the genus Rattus have, to date, been quite speculative. In order to address these important issues we sequenced six new whole mitochondrial genomes from wild-caught specimens from four species, Rattus exulans, Rattus praetor, Rattus rattus and Rattus tanezumi. The only rat whole mitochondrial genomes available previously were all from Rattus norvegicus specimens. Our phylogenetic and dating analyses place the deepest divergence within Rattus at ∼3.5 million years ago (Mya). This divergence separates the New Guinean endemic R. praetor lineage from the Asian lineages. Within the Asian/Island Southeast Asian clade R. norvegicus diverged earliest at ∼2.9 Mya. R. exulans and the ancestor of the sister species R. rattus and R. tanezumi subsequently diverged at ∼2.2 Mya, with R. rattus and R. tanezumi separating as recently as ∼0.4 Mya. Our results give both a better resolved species divergence order and diversification dates within Rattus than previous studies.
Resumo:
Hong Kong in summer (June - October) is hot and humid. Construction workers have to undertake physically demanding activities and often in confined spaces. They are vulnerable to heat stress in summer hence health and safety measures associated to heat stress measured by scientific and clinical parameters are urgently needed. This paper provides an initial report of a research project funded by the Research Grants Council (RGC) of the HKSAR. The aim of this study is to develop a set of indices measured by clinical and scientific methods to detect impending attacks of heat stress. These indices would be of tremendous value in better safeguarding workers’ health and safety by reducing the occurrences of heat stress on site. This paper firstly reports on the statistics of construction incidents arising from heat stress. Qualitative and quantitative research methods applied in conducting the research are discussed. It is believed that the construction industry and the government would benefit a lot as a result of this study.
Resumo:
The mosaic novel - with its independent 'story-tiles' linking together to form a complete narrative - has the potential to act as a reflection on the periodic resurfacing of unconscious memories in the conscious lives of fictional characters. This project is an exploration of the mosaic text as a fictional analogue of involuntary memory. These concepts are investigated as they appear in traditional fairy tales and engaged with in this thesis's creative component, Sourdough and Other Stories (approximately 80,000 words), a mosaic novel comprising sixteen interconnected 'story-tiles'. Traditional fairy tales are non-reflective and conducive to forgetting (i.e. anti-memory); fairy tale characters are frequently portrayed as psychologically two-dimensional, in that there is no examination of the mental and emotional distress caused when children are stolen/ abandoned/ lost and when adults are exiled. Sourdough and Other Stories is a creative examination of, and attempted to remedy, this lack of psychological depth. This creative work is at once something more than a short story collection, and something that is not a traditional novel, but instead a culmination of two modes of writing. It employs the fairy tale form to explore James' 'thorns in the spirit' (1898, p.199) in fiction; the anxiety caused by separation from familial and community groups. The exegesis, A Story Told in Parts - Sourdough and Other Stories is a critical essay (approximately 20,000 words in length), a companion piece to the mosaic novel, which analyses how my research question proceeded from my creative work, and considers the theoretical underpinnings of the creative work and how it enacts the research question: 'Can a writer use the structural possibilities of the mosaic text to create a fictional work that is an analogue of an involuntary memory?' The cumulative effect of the creative and exegetical works should be that of a dialogue between the two components - each text informing the other and providing alternate but complementary lenses with which to view the research question.
Resumo:
In many applications, where encrypted traffic flows from an open (public) domain to a protected (private) domain, there exists a gateway that bridges the two domains and faithfully forwards the incoming traffic to the receiver. We observe that indistringuishability against (adaptive) chosen-ciphertext attacks (IND-CCA), which is a mandatory goal in face of active attacks in a public domain, can be essentially relaxed to indistinguishability against chosen-plaintext attacks (IND-CPA) for ciphertexts once they pass the gateway that acts as an IND-CCA/CPA filter by first checking the validity of an incoming IND-CCA ciphertext, then transforming it (if valid) into an IND-CPA ciphertext, and forwarding the latter to the receipient in the private domain. "Non-trivial filtering" can result in reduced decryption costs on the receivers' side. We identify a class of encryption schemes with publicaly verifiable ciphertexts that admit generic constructions of (non-trivial) IND-CCA/CPA filters. These schemes are characterized by existence of public algorithms that can distinguish between valid and invalid ciphertexts. To this end, we formally define (non-trivial) public verifiability of ciphertexts for general encryption schemes, key encapsulation mechanisms, and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption flavours. We further analyze the security impact of public verifiability and discuss generic transformations and concrete constructions that enjoy this property.
Resumo:
As a growing number of nations embark on a path to democracy, criminologists have become increasingly interested and engaged in the challenges, concerns, and questions connecting democracy with both crime and criminal justice. Rising levels of violence and street crime, white collar crime and corruption both in countries where democracy is securely in place and where it is struggling, have fuelled a deepening skepticism as to the capacity of democracy to deliver on its promise of security and justice for all citizens. What role does crime and criminal justice play in the future of democracy and for democratic political development on a global level? The editors of this special volume of The Annals realized the importance of collecting research from a broad spectrum of countries and covering a range of problems that affect citizens, politicians, and criminal justice officials. The articles here represent a solid balance between mature democracies like the U.S. and U.K. as well as emerging democracies around the globe – specifically in Latin America, Africa and Eastern Europe. They are based on large and small cross-national samples, regional comparisons, and case studies. Each contribution addresses a seminal question for the future of democratic political development across the globe. What is the role of criminal justice in the process of building democracy and instilling confidence in its institutions? Is there a role for unions in democratizing police forces? What is the impact of widespread disenfranchisement of felons on democratic citizenship and the life of democratic institutions? Under what circumstances do mature democracies adopt punitive sentencing regimes? Addressing sensitive topics such as relations between police and the Muslim communities of Western Europe in the wake of terrorist attacks, this volume also sheds light on the effects of terrorism on mature democracies under increasing pressure to provide security for their citizens. By taking a broad vantage point, this collection of research delves into complex topics such as the relationship between the process of democratization and violent crime waves; the impact of rising crime rates on newly established as well as secure democracies; how crime may endanger the transition to democracy; and how existing practices of criminal justice in mature democracies affect their core values and institutions. The collection of these insightful articles not only begins to fill a gap in criminological research but also addresses issues of critical interest to political scientists as well as other social and behavioral scientists and scholars. Taking a fresh approach to the intersection of crime, criminal justice, and democracy, this volume of The Annals is a must-read for criminologists and political scientists and provides a solid foundation for further interdisciplinary research.
Resumo:
This book examines public worrying over 'ethnic crime' and what it tells us about Australia today. How, for instance, can the blame for a series of brutal group sexual assaults in Sydney be so widely attributed to whole ethnic communities? How is it that the arrival of a foundering boatload of asylum-seekers mostly seeking refuge from despotic regimes in 'the Middle East' can be manipulated to characterise complete cohorts of applicants for refuge 'and their immigrant compatriots' as dangerous, dishonest, criminally inclined and inhuman? How did the airborne terror attacks on the USA on 11 September 2001 exacerbate existing tendencies in Australia to stereotype Arabs and Muslims as backward, inassimilable, without respect for Western laws and values, and complicit with barbarism and terrorism? Bin Laden in the Suburbs argues that we are witnessing the emergence of the 'Arab Other' as the pre-eminent 'folk devil' of our time. This Arab Other functions in the national imaginary to prop up the project of national belonging. It has little to do with the lived experiences of Arab, Middle Eastern or Muslim Australians, and everything to do with a host of social anxieties which overlap in a series of moral panics. Bin Laden in the Suburbs analyses a decisive moment in the history of multiculturalism in Australia. 'Unlike most migrants, the Arab migrant is a subversive will ... They invade our shores, take over our neighbourhood and rape our women. They are all little bin Ladens and they are everywhere: Explicit bin Ladens and closet bin Ladens; Conscious bin Ladens and unconscious bin Ladens; bin Ladens on the beach and bin Ladens in the suburbs, as this book is aptly titled. Within this register ... even a single Arab is a threat. Contain the Arab or exterminate the Arab? A 'tolerable' presence in the suburbs, or caged in a concentration camp? ... The politics of the Western post-colonial state is constantly and dangerously oscillating between these tendencies today. It is this dangerous oscillation that is so lucidly exposed in this book'.
Resumo:
A Flash Event (FE) represents a period of time when a web-server experiences a dramatic increase in incoming traffic, either following a newsworthy event that has prompted users to locate and access it, or as a result of redirection from other popular web or social media sites. This usually leads to network congestion and Quality-of-Service (QoS) degradation. These events can be mistaken for Distributed Denial-of-Service (DDoS) attacks aimed at disrupting the server. Accurate detection of FEs and their distinction from DDoS attacks is important, since different actions need to be undertaken by network administrators in these two cases. However, lack of public domain FE datasets hinders research in this area. In this paper we present a detailed study of flash events and classify them into three broad categories. In addition, the paper describes FEs in terms of three key components: the volume of incoming traffic, the related source IP-addresses, and the resources being accessed. We present such a FE model with minimal parameters and use publicly available datasets to analyse and validate our proposed model. The model can be used to generate different types of FE traffic, closely approximating real-world scenarios, in order to facilitate research into distinguishing FEs from DDoS attacks.