170 resultados para cleft constructions
Resumo:
The Children’s Book Council of Australia (CBCA) administers the oldest national prize for children’s literature in Australia. Each year, the CBCA confers “Book of the Year” awards to literature for young people in five categories. In 2001, the establishment of an “Early Childhood” category opened up the venerable “Picture Book” category (first awarded in 1955) to books with an implied readership up to 18 years of age. As a result, this category has emerged in recent years as a highly visible space within which the CBCA can contest discourses of cultural marginalisation insofar as Australian (“colonial”) literature is constructed as inferior or adjunct to the major Anglophone literary traditions, and the consistent identification of children’s literature (and, indeed, of children) as lesser than its ‘adult’ counterparts. The CBCA is engaged in defining, evaluating, and legitimising a tradition of Australian children’s literature which is underpinned by a canonical impulse, and is a reflexive practice of self-definition, self-evaluation and self-legitimisation for the CBCA itself. While it is obviously problematic to identify award winners as a canon, it is equally obvious that literary prizing is a cultural practice derived from the logic of canonicity. In his discussion of the United States’s Newbery Medal, Kenneth Kidd notes that “Medal books are instant classics, the selection process an ostensible simulation of the test of time” (169) and that “the Medal is part of the canonical architecture of children's literature” (169). Thus, it is instructive to consider the visions and values of the national, of the social, and of the literary-aesthetic, in the picture books chosen by the Children’s Book Council of Australia (CBCA) as the “best” of the early twenty-first century. These books not only constitute a kind of canon for contemporary Australian children’s literature, but may well come to define what contemporary Australian children’s literature means in the wider literary field. The Book of the Year: Picture Book awards given by the CBCA since 2001 demonstrate that it is not only true of the Booker Prize that, “The choices of winning books reflect not only on the books themselves, then, but also back on the Prize, affecting its reputation and creating journalistic capital which is vital for the Prize to achieve its prominence and impact.” (81). Many of the twenty-first century CBCA award-winning picture books complicate traditional or comfortable understanding of Australianness, children’s literature, or “appropriate” modes of form and content, reminding us that “moments when texts resist or complicate recuperation into national discourses offer fruitful points for exploring the relationships between text and celebratory context” (Roberts 6). The CBCA has taken the opportunities offered by the liberation of the Picture Book category from an implied readership to challenge dominant constructions of children’s literature in Australia, and in so doing, are engaged in overt practices of canonicity with potentially long-lasting effects. Works Cited: Kidd, Kenneth. “Prizing Children’s Literature: The Case of Newbery Gold.” Children's Literature 35 (2007): 166-190. Roberts, Gillian. Prizing Literature: The Celebration and Circulation of National Culture. Toronto: U Toronto P, 2011. Squires, Claire. “Book Marketing and the Booker Prize.” Judging a Book by Its Cover: Fans, Publishers, Designers, and the Marketing of Fiction. Eds. Nicole Matthews and Nickianne Moody. Aldershot: Ashgate, 2007. 71-82.
Resumo:
Silver palace is a multi-channel screen-based installation that explores the part that the landscape and narration play in cinematic constructions of gendered identity. The exhibition examines the ways in which our experience as a viewer of cinematic imagery can be both constructed and expanded within a gallery context.
Resumo:
'Across the sea' is a multi-channel screen-based installation that explores the part that the landscape and narration play in cinematic constructions of gendered identity. The work is informed by new wave cinema, feminist film theory and emergent ideas of a female gaze. across the sea considers both the role of the artist, as well as the auteur in cinema, to question how the outcomes differ when a female rather than a male gaze is writing, directing and filming the imagery. The screen-based installation of 'across the sea' seeks to further examine the ways in which our experience as a viewer of cinematic imagery can be both constructed and expanded within a gallery context. across the sea investigates the spaces that exist between the gallery and the cinema, in an effort to consider notions of femininity that exist between and throughout the varied spaces of film and art.
Resumo:
The passage of indeterminacy in the intensification of being is a digital video projection by Daniel McKewen. The work used digital visual effects and experimentation with time-based video synchronisation to manipulate images of celebrities plundered from the internet and television. The result was a sequence of images that served as both portrait of the constructed nature of screen-based imagery, as well as portrait of the pop culture audience that consumes such constructions.
Resumo:
Supporting a dying child and family surrounding the child’s death is one of the most significant and challenging roles undertaken by health professionals in paediatric end of life care. An Australian study of parent and health professional constructions of meanings around post mortem care and communication revealed the practice of health professionals speaking to a child after death. This practice conveyed respect for the personhood of the deceased child, recognised the presence of the deceased child, and assisted in involving parents in their child’s post-mortem care. Such findings illuminate an area of end of life care practice that is not often addressed. Talking to a deceased child appeared as a socially symbolic practice that may promote a continued bond between parent and child.
Resumo:
Fire resistance rating of light gauge steel frame (LSF) wall systems is obtained from fire tests based on the standard fire time-temperature curve. However, fire severity has increased in modern buildings due to higher fuel loads as a result of modern furniture and light weight constructions that make use of thermoplastics materials, synthetic foams and fabrics. Some of these materials are high in calorific values and increase both the spread of fire growth and heat release rate, thus increasing the fire severity beyond that of the standard fire curve. Further, the standard fire curve does not include a decay phase that is present in natural fires. Despite the increasing usage of LSF walls, their behaviour in real building fires is not fully understood. This paper presents the details of a research study aimed at developing realistic design fire curves for use in the fire tests of LSF walls. It includes a review of the characteristics of building fires, previously developed fire time-temperature curves, computer models and available parametric equations. The paper highlights that real building fire time-temperature curves depend on the fuel load representing the combustible building contents, ventilation openings and thermal properties of wall lining materials, and provides suitable values of many required parameters including fuel loads in residential buildings. Finally, realistic design fire time-temperature curves simulating the fire conditions in modern residential buildings are proposed for the testing of LSF walls.
Resumo:
While identity construction continues to be a widely discussed and researched area in contemporary social sciences, the existing theories have overlooked the importance of understanding why and how identities as semiotic constructions emerge in individuals' consciousness in the flow of their everyday functioning. This article seeks to address this limitation in the theorizing by proposing an alternative conceptualization of identity, according to which identity construction is triggered by rupturing life-experience, which surfaces another perspective and makes the person aware of a possibility to be otherwise or of the reality of being different. Theoretical claims put forward in the paper are drawn from data gathered in a recent study, which explored lived-through experiences of young Estonians, who made study-visits to the United Kingdom. The discussed data will also highlight some interesting aspects in Estonians' self-definition as it is constructed in relation to Eastern-European identity in the context of contemporary Britain.
Resumo:
National or International Significance Flows of cultural heritage in textual practices are vital to sustaining Indigenous communities - a national and international priority (Commonwealth of Australia, 2011). Indigenous heritage, whether passed on by oral tradition or ubiquitous social media, can be seen as a "conversation between the past and the future" (Fairclough, 2012, p. xv). Indigenous heritage involves appropriating memories within a cultural flow to pass on a spiritual legacy. This presentation reports ethnographic research of social media practices in a small independent Aboriginal school in Southeast Queensland, Australia that is resided over by the Yuggera elders and an Aboriginal principal. Quality of Research The purpose was to rupture existing notions of white literacies in schools, and to deterritorialize the uses of digital media by dominant cultures in the public sphere. Examples of learning experiences included the following: i. Integrating Indigenous language and knowledge into media text production; ii. Classroom visits from Indigenous elders; and iii. Publishing oral histories through digital scrapbooking. The program aligned with the Australian National Curriculum English (ACARA, 2014), which mandates the teaching of multimodal text creation. Data sources included a class set of digital scrapbooks collaboratively created in a preparatory-one primary classroom. The digital scrapbooks combined digitally encoded words, images of material artifacts, and digital music files. A key feature of the writing and digital design task was to retell and digitally display and archive a cultural narrative of significance to the Indigenous Australian community and its memories and material traces of the past for the future. Data analysis of the students' digital stories involved the application of key themes of negotiated, material, and digitally mediated forms of heritage practice. It drew on Australian Indigenous research by Keddie et al. (2013) to guard against the homogenizing of culture that can arise from a focus on a static view of culture. The interpretation of findings located Indigenous appropriation of social media within broader racialized politics that enables Indigenous literacy to be understood as a dynamic, negotiated, and transgenerational flows of practice. It demonstrates that Indigenous children's use of media production reflects "shifting and negotiated identities" in response to changing media environments that can function to sustain Indigenous cultural heritages (Appadurai, 1696, p. xv). Impact on practice, policy or theory The findings are important for teachers at a time when Aboriginal and Torres Strait Islander Histories and Cultures is a cross-curricular policy priority in the Australian Curriculum (ACARA, 2014). The findings show how curriculum policies can be applied to classroom practice in ways that are epistemologically consistent with Indigenous ways of knowing and being. Theoretically, it demonstrates how the children's experiences of culture are layered over time, as successive generations inherit, interweave, and hear others' cultural stories or maps. Practically, recommendations are provided for an approach to appropriating social media in schools that explicitly attends to the dynamic nature of Indigenous practices, negotiated through intercultural constructions and flows, and opening space for a critical anti-racist approach to multimodal text production. Timeliness The research is timely in the context of the accessibility and role of digital and multimodal forms of communication, including for Aboriginal and Torres Strait Islander communities.
Resumo:
The experience of disability in the global South remains relatively underreported in spite of the greater focus on disability as both an impediment to development and frequently as a result of development. This article reports a qualitative study using ethnographic techniques undertaken in the province of Khon Kaen in Northeast Thailand. The primary participants were men who had experienced a severe spinal cord injury at a time when they were breadwinners, a role which is significant in the context of a modernising state that is an active participant in a global economy. The experiences, constructions and beliefs of these men, their family carers, and other informants illustrate the complex ways in which social and cultural factors interact with the opportunities, challenges and constraints of the transition modernity. The findings, interpreted according to the ‘three bodies’ approach, illustrate the intersection of colonising effects, governmentality and resistance, and embodied experience in a cultural context.
Resumo:
Formal incentives systems aim to encourage improved performance by offering a reward for the achievement of project-specific goals. Despite argued benefits of incentive systems on project delivery outcomes, there remains debate over how incentive systems can be designed to encourage the formation of strong project relationships within a complex social system such as an infrastructure project. This challenge is compounded by the increasing emphasis in construction management research on the important mediating influence of technical and organisational context on project performance. In light of this challenge, the research presented in this paper focuses on the design of incentive systems in four infrastructure projects: two road reconstructions in the Netherlands and two building constructions in Australia. Based on a motivational theory frame, a cross case analysis is conducted to examine differences and similarities across social and cultural drivers impacting on the effectiveness of the incentive systems in light of infrastructure project context. Despite significant differences in case project characteristics, results indicate the projects’ experience similar social drivers impacting on incentive effectiveness. Significant value across the projects was placed on: varied performance goals and multiple opportunities to across the project team to pursue incentive rewards; fair risk allocation across contract parties; value-driven tender selection; improved design-build integration; and promotion of future work opportunities. However, differences across the contexts were identified. Results suggest future work opportunities were a more powerful social driver in upholding reputation and establishing strong project relationships in the Australian context. On the other hand, the relationship initiatives in the Dutch context seemed to be more broadly embraced resulting in a greater willingness to collaboratively manage project risk. Although there are limitations with this research in drawing generalizations across two sets of case projects, the results provide a strong base to explore the social and cultural influences on incentive effectiveness across different geographical and contextual boundaries in future research.
Resumo:
There growing recognition that a contributor to the repeat crises of child sexual abuse (CSA) by personnel in Christian institutions (PICIs), is the often gendered culture of Christian institutions themselves. This work explores theological discursive constructions of masculinity and sexuality and their implications for addressing CSA by PICIs. The perspectives discussed here are of PICIs who participated in a research project conducted in Australia. From these perspectives male gendered and sexual performance is constructed through discourse as both an explanation and solution to offending behaviour. Similarly, sexuality is viewed as God-given, heteronormative and legitimately expressed only within the bounds of marriage. This work draws on Foucault and feminist discourses as they relate to CSA by PICIs and institutional discourses. This work offers a perspective of PICIs that may not otherwise be heard in the common discourses of CSA in Christian Institutions.
Resumo:
Like many other cataclysmic events September 11, a day now popularly believed to have 'changed the world', has become a topic taken up by children's writers. This thesis, titled The Whole World Shook: Ethnic, National and Heroic Identities in Children's Fiction About 9/11, examines how cultural identities are constructed within fictional texts for young people written about the attacks on the Twin Towers. It identifies three significant identity categories encoded in 9/11 books for children: ethnic identities, national identities, and heroic identities. The thesis argues that the identities formed within the selected children's texts are in flux, privileging performances of identities that are contingent on post-9/11 politics. This study is located within the field of children's literature criticism, which supports the understanding that children's books, like all texts, play a role in the production of identities. Children's literature is highly significant both in its pedagogical intent (to instruct and induct children into cultural practices and beliefs) and in its obscurity (in making the complex simple enough for children, and from sometimes intentionally shying away from difficult things). This literary criticism informed the study that the texts, if they were to be written at all, would be complex, varied and most likely as ambiguous and contradictory as the responses to the attacks on New York themselves. The theoretical framework for this thesis draws on a range of critical theories including literary theory, cultural studies, studies of performativity and postmodernism. This critical framework informs the approach by providing ways for: (i) understanding how political and ideological work is performed in children's literature; (ii) interrogating the constructed nature of cultural identities; (iii) developing a nuanced methodology for carrying out a close textual analysis. The textual analysis examines a representative sample of children's texts about 9/11, including picture books, young adult fiction, and a selection of DC Comics. Each chapter focuses on a different though related identity category. Chapter Four examines the performance of ethnic identities and race politics within a sample of picture books and young adult fiction; Chapter Five analyses the construction of collective, national identities in another set of texts; and Chapter Six does analytic work on a third set of texts, demonstrating the strategic performance of particular kinds of heroic identities. I argue that performances of cultural identities constructed in these texts draw on familiar versions of identities as well as contribute to new ones. These textual constructions can be seen as offering some certainties in increasingly uncertain times. The study finds, in its sample of books a co-mingling of xenophobia and tolerance; a binaried competition between good and evil and global harmony and national insularity; and a lauding of both the commonplace hero and the super-human. Being a recent corpus of texts about 9/11, these texts provide information on the kinds of 'selves' that appear to be privileged in the West since 2001. The thesis concludes that the shifting identities evident in texts that are being produced for children about 9/11 offer implicit and explicit accounts of what constitute good citizenship, loyalty to nation and community, and desirable attributes in a Western post-9/11 context. This thesis makes an original contribution to the field of children's literature by providing a focussed and sustained analysis of how texts for children about 9/11 contribute to formations of identity in these complex times of cultural unease and global unrest.
The suffix-free-prefix-free hash function construction and its indifferentiability security analysis
Resumo:
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash functions by Coron et al. and in subsequent works, the initial value (IV) of hash functions is fixed. In addition, these indifferentiability results do not depend on the Merkle–Damgård (MD) strengthening in the padding functionality of the hash functions. We propose a generic n -bit-iterated hash function framework based on an n -bit compression function called suffix-free-prefix-free (SFPF) that works for arbitrary IV s and does not possess MD strengthening. We formally prove that SFPF is indifferentiable from a random oracle (RO) when the compression function is viewed as a fixed input-length random oracle (FIL-RO). We show that some hash function constructions proposed in the literature fit in the SFPF framework while others that do not fit in this framework are not indifferentiable from a RO. We also show that the SFPF hash function framework with the provision of MD strengthening generalizes any n -bit-iterated hash function based on an n -bit compression function and with an n -bit chaining value that is proven indifferentiable from a RO.
Resumo:
At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the security of digital signature algorithms based on these constructions. They showed that the security of signature schemes based on the two randomized hash function modes relies on properties similar to the second preimage resistance rather than on the collision resistance property of the hash functions. One of the randomized hash function modes was named the RMX hash function mode and was recommended for practical purposes. The National Institute of Standards and Technology (NIST), USA standardized a variant of the RMX hash function mode and published this standard in the Special Publication (SP) 800-106. In this article, we first discuss a generic online birthday existential forgery attack of Dang and Perlner on the RMX-hash-then-sign schemes. We show that a variant of this attack can be applied to forge the other randomize-hash-then-sign schemes. We point out practical limitations of the generic forgery attack on the RMX-hash-then-sign schemes. We then show that these limitations can be overcome for the RMX-hash-then-sign schemes if it is easy to find fixed points for the underlying compression functions, such as for the Davies-Meyer construction used in the popular hash functions such as MD5 designed by Rivest and the SHA family of hash functions designed by the National Security Agency (NSA), USA and published by NIST in the Federal Information Processing Standards (FIPS). We show an online birthday forgery attack on this class of signatures by using a variant of Dean’s method of finding fixed point expandable messages for hash functions based on the Davies-Meyer construction. This forgery attack is also applicable to signature schemes based on the variant of RMX standardized by NIST in SP 800-106. We discuss some important applications of our attacks and discuss their applicability on signature schemes based on hash functions with ‘built-in’ randomization. Finally, we compare our attacks on randomize-hash-then-sign schemes with the generic forgery attacks on the standard hash-based message authentication code (HMAC).
Resumo:
In this paper we present concrete collision and preimage attacks on a large class of compression function constructions making two calls to the underlying ideal primitives. The complexity of the collision attack is above the theoretical lower bound for constructions of this type, but below the birthday complexity; the complexity of the preimage attack, however, is equal to the theoretical lower bound. We also present undesirable properties of some of Stam’s compression functions proposed at CRYPTO ’08. We show that when one of the n-bit to n-bit components of the proposed 2n-bit to n-bit compression function is replaced by a fixed-key cipher in the Davies-Meyer mode, the complexity of finding a preimage would be 2 n/3. We also show that the complexity of finding a collision in a variant of the 3n-bits to 2n-bits scheme with its output truncated to 3n/2 bits is 2 n/2. The complexity of our preimage attack on this hash function is about 2 n . Finally, we present a collision attack on a variant of the proposed m + s-bit to s-bit scheme, truncated to s − 1 bits, with a complexity of O(1). However, none of our results compromise Stam’s security claims.