413 resultados para A Chosen Witness


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Due to the numerous possibilities of voicing concerns and the flood of data we are exposed to, local issues are at a risk of being overlooked. Following a research agenda proposed by Foth et al. (2013), this thesis explored the possible contributions of situated digital and tangible media for communicating local issues. Making use of the location of an issue could thereby not only allow to reach the targeted audience but also for a deeper involvement of citizens. Through the development of a design intervention in public space, called Local Commons, the benefits of this approach were investigated. Therefore, the intervention combined digital and tangible media in order to engage the public to contribute and debate different perspectives on a given local issue. The interaction with the intervention was thereby twofold. First, the intervention invited the audience to submit images of their perspectives on the issue, which were displayed on a public screen. Via tangible buttons in front of the screen, the audience then had the possibility to agree or disagree to the displayed perspectives, creating a space for deliberation. In a field study, the concept was subsequently tested and evaluated. The results of this study, although not generalisable, supported the chosen approach of this thesis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This research is in the field of arts education. Eisner claims that ‘teachers rarely view themselves as artists’ (Taylor, 1993:21). Situating professional dance artists and teacher-artists (Mc Lean, 2009) in close proximity to classroom dance teachers, spatially, through a shared rehearsal studio and creatively, by engaging them in a co-artistry approach, allows participants to map unique and new creative processes, kinaesthetically and experientially. This pratice encourages teachers to attune and align themselves with artists’ states of mind and enables them to nurture both their teacher-self and their artist-self (Lichtenstein 2009). The research question was: can interactions between professional dance artists, teacher-artists (Mc Lean, 2009) and classroom dance teachers change classroom dance teachers’ self-perceptions? The research found that Artists in Residence projects provide up-skilling in situ for classroom dance teachers, and give credence to the act of art making for classroom dance teachers within their peer context, positively enhancing their self-image and promoting self-identification as ‘teacher-artists’ (Mc Lean, 2009). This project received an Artist in Residence Grant (an Australia Council for the Arts, Education Queensland and Queensland Arts Council partnership). The research findings were chosen for inclusion in the Queensland Performing Arts Complex program, Feet First: an invitation to dance, 2013 and selected for inclusion on the Creative Campus website, http://www.creative-campus.org.uk.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This body of photographic work has been created to firstly, explore a new approach to practice-led research that uses an “action genre” approach to reflective practice (Lemke) and secondly, to visually explore human interaction with the fundamental item in life - water. The first of these is based on the contention that to understand the meanings inherent in photographs we cannot look merely at the end result. It is essential to keep looking at the actions of practitioners, and the influences upon them, to determine how external influences affect the meaning potential of editorial photographs (Grayson, 2012). WATER therefore, provides an ideal platform to reflect upon the actions and influences involved in creating work within the photographic genre of photojournalism. It enables this practitioner to reflect on each stage of production to gain a better understanding of how external influences impact the narrative potential within images created. There are multi-faceted influences experienced by photographers who are creating images that, in turn, are part of constructing and presenting the narrative potential of editorial photographs. There is an important relationship between professional photographers and the technical, cultural, economic and institutional forces that impinge upon all stages of production and publication. What results is a greater understanding of technical, cultural, economic and institutional forces that impinge upon all stages of production and publication. Therefore, to understand the meanings inherent in photographs within WATER, I do not look merely at the end result. It provides a case study looking at my actions in the filed, and the influences upon me, to determine how external influences affect the meaning potential of these photographs (Grayson, 2012). As a result, this project adds to the body of scholarship around the definition of Photojournalism, how it has adapted to the current media environment and provides scope for further research into emerging new genres within editorial photography, such as citizen photojournalism. Concurrently, the photographs themselves were created to visually explore how there remains a humanistic desire to interact with the natural form of water even while living a modern cosmopolitan life around it. Taking a photojournalistic approach to exploring this phenomenon, the images were created by “capturing moments as they happened” with no posing or setting up of images. This serendipitous approach to the photographic medium provides the practitioner with at least an attempt to direct the subjectivity contained explicitly in photographs. What results is a series of images that extend the visual dialogue around the role of water within modern humanistic lifestyles and how it remains an integral part of our society’s behaviors. It captures important moments that document this relationship at this time of modern development. The resulting works were exhibited and published as part of the Head On Photo Festival, Australia's largest photo festival and the world's second largest festival in Sydney 20-24 May 2013. The WATER series of images were curated by three Magnum members; Ian Berry, Eli Reed and Chris Steele-Perkins. Magnum is a highly regarded international photographic co-operative with editorial offices in New York, London, Paris and Tokyo. There was a projection of the works as part of the official festival programme, presented to both members of the public and Sydney’s photography professionals. In addition, a sample of images from the WATER series was chosen for inclusion in the Magnum-published hardcover book. References Grayson, Louise. 2012. “Editorial photographs and patterns of practice.” Journalism Practice. Accessed: http://www.tandfonline.com/doi/abs/10.1080/17512786.2012.726836#.UbZN-L--1RQ Lemke, Jay. 1995. Textual Politics: Discourse and Social Dynamics. London: Taylor & Francis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Previous studies have demonstrated the importance of weather variables in influencing the incidence of influenza. However, the role of air pollution is often ignored in identifying the environmental drivers of influenza. This research aims to examine the impacts of air pollutants and temperature on the incidence of pediatric influenza in Brisbane, Australia. Lab-confirmed daily data on influenza counts among children aged 0-14years in Brisbane from 2001 January 1st to 2008 December 31st were retrieved from Queensland Health. Daily data on maximum and minimum temperatures for the same period were supplied by the Australian Bureau of Meteorology. Winter was chosen as the main study season due to it having the highest pediatric influenza incidence. Four Poisson log-linear regression models, with daily pediatric seasonal influenza counts as the outcome, were used to examine the impacts of air pollutants (i.e., ozone (O3), particulate matter≤10μm (PM10) and nitrogen dioxide (NO2)) and temperature (using a moving average of ten days for these variables) on pediatric influenza. The results show that mean temperature (Relative risk (RR): 0.86; 95% Confidence Interval (CI): 0.82-0.89) was negatively associated with pediatric seasonal influenza in Brisbane, and high concentrations of O3 (RR: 1.28; 95% CI: 1.25-1.31) and PM10 (RR: 1.11; 95% CI: 1.10-1.13) were associated with more pediatric influenza cases. There was a significant interaction effect (RR: 0.94; 95% CI: 0.93-0.95) between PM10 and mean temperature on pediatric influenza. Adding the interaction term between mean temperature and PM10 substantially improved the model fit. This study provides evidence that PM10 needs to be taken into account when evaluating the temperature-influenza relationship. O3 was also an important predictor, independent of temperature.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Stagnation-point total heat transfer was measured on a 1:27.7 model of the Flight Investigation of Reentry Environment II flight vehicle. Experiments were performed in the X1 expansion tube at an equivalent flight velocity and static enthalpy of 11 km/s and 12.7 MJ/kg, respectively. Conditions were chosen to replicate the flight condition at a total flight time of 1639.5 s, where radiation contributed an estimated 17-36% of the total heat transfer. This contribution is theorized to reduce to <2% in the scaled experiments, and the heating environment on the test model was expected to be dominated by convection. A correlation between reported flight heating rates and expected experimental heating, referred to as the reduced flight value, was developed to predict the level of heating expected on the test model. At the given flow conditions, the reduced flight value was calculated to be 150 MW/m2. Average stagnation-point total heat transfer was measured to be 140 ± 7% W/m2, showing good agreement with the predicted value. Experimentally measured heat transfer was found to have good agreement of between 5 and 15% with a number of convective heating correlations, confirming that convection dominates the tunnel heating environment, and that useful experimental measurements could be made in weakly coupled radiating flow

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Stigmergy is a biological term used when discussing a sub-set of insect swarm-behaviour describing the apparent organisation seen during their activities. Stigmergy describes a communication mechanism based on environment-mediated signals which trigger responses among the insects. This phenomenon is demonstrated in the behavior of ants and their food gathering process when following pheromone trails, where the pheromones are a form of environment-mediated communication. What is interesting with this phenomenon is that highly organized societies are achieved without an apparent management structure. Stigmergy is also observed in human environments, both natural and engineered. It is implicit in the Web where sites provide a virtual environment supporting coordinative contributions. Researchers in varying disciplines appreciate the power of this phenomenon and have studied how to exploit it. As stigmergy becomes more widely researched we see its definition mutate as papers citing original work become referenced themselves. Each paper interprets these works in ways very specific to the research being conducted. Our own research aims to better understand what improves the collaborative function of a Web site when exploiting the phenomenon. However when researching stigmergy to develop our understanding we discover a lack of a standardized and abstract model for the phenomenon. Papers frequently cited the same generic descriptions before becoming intimately focused on formal specifications of an algorithm, or esoteric discussions regarding sub-facets of the topic. None provide a holistic and macro-level view to model and standardize the nomenclature. This paper provides a content analysis of influential literature documenting the numerous theoretical and experimental papers that have focused on stigmergy. We establish that stigmergy is a phenomenon that transcends the insect world and is more than just a metaphor when applied to the human world. We present from our own research our general theory and abstract model of semantics of stigma in stigmergy. We hope our model will clarify the nuances of the phenomenon into a useful road-map, and standardise vocabulary that we witness becoming confused and divergent. Furthermore, this paper documents the analysis on which we base our next paper: Special Theory of Stigmergy: A Design Pattern for Web 2.0 Collaboration.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Prostate cancer is the most commonly diagnosed malignancy and the second leading cause of cancer related deaths in Australian men. Treatment in the early stages of the disease involves surgery, radiation and/or hormone therapy. However, in late stages of the disease these treatments are no longer effective and only palliative care is available. Therefore, there is a focus on exploration of novel therapies to increase survival and treatment efficacy. Advanced prostate cancer is characterised by bone or other distant metastasis. Spreading of the primary tumour to a secondary location is a complex process requiring an initial loss in cell-cell adhesion followed by increased cell migration and invasion. One gene family that has been known to affect cell-to-cell contact in other model systems are the Eph receptor tyrosine kinases. They are the largest family of receptor tyrosine kinases made up of 14 vertebrate Eph receptors that bind to nine cell membrane bound ephrin ligands. Eph-ephrin interaction is crucial in regulating cell behaviour in developmental processes and it is now thought that the underlying mechanisms involved in development may also be involved in cancer. Aberrant expression has been reported in many human malignancies including prostate cancer. Furthermore, expression has been linked with metastasis and poor prognosis in other tumour models. This study explores the potential role of the Eph receptor family in prostate cancer, in particular the roles of EphA2, EphA3 and ephrin-A5. Gene expression profiles were established for the Eph family in a series of prostate cancer cell lines using quantitative real time RT-PCR. A smaller subset of the most prominently expressed genes was chosen to screen a cohort of clinical samples. Elevated levels of EphA2, EphA3 and their ligands, ephrin-A1 and ephrin-A5 were observed in individual cell lines. Interestingly high EphA3 expression was observed in the androgen responsive cell lines while EphA2 was more prominent in the androgen independent cell lines. However, studies using 5-dihydrotestosterone suggest that EphA3 expression in not regulated by androgen. Cells expressing EphA2 showed a greater ability for migration and invasion while cells expressing EphA3 showed poor migration and invasion. Forced expression of EphA2 in the LNCaP cell line resulted in a more invasive phenotype while forced expression of EphA3 in the PC-3 cell line suggests a possible negative effect for EphA3 on cell migration and invasion. Cell signalling studies show activation of EphA2 decreases activity of proteins thought to be involved in pathways regulating cell movement including Akt, Src and FAK. Changes to the activation status of Rho family members, including RhoA and Rac1, associated with reorganisation of the actin cytoskeleton, an important part of cell migration was also observed. As a result, activation of EphA2 in PC-3 cells resulted in a less invasive phenotype. A novel finding in this study was the discovery of a combination of two EphA2 Mabs able to activate EphA2. Preliminary results show a potential for this antibody combination to reduce prostate cancer invasion in vitro. A unique aspect of Eph-ephrin interaction is the resulting bi-directional signalling that occurs through both the receptor and ligand. In this study a potential role for ephrin-A5 mediated signalling in prostate cancer was observed. LNCaP cells express high levels of EphA3 and its high affinity ligand ephrin-A5. In stripe assays, used to study guidance cues, LNCaP cells show strong attraction/migration to EphA3-Fc stripes but not ephrin-A5-Fc stripes suggesting ephrin-A5 mediated reverse cell signalling is involved. Knockdown of ephrin-A5 using shRNA resulted in a decrease in attraction/migration to EphA3-Fc stripes. Furthermore a reduction in proliferation was also observed in vitro. A subcutaneous xenograft model using ephrin-A5 shRNA cells versus controls showed a decrease in tumour formation. This study demonstrates a difference in EphA2 and EphA3 function in prostate cancer migration/invasion and a potential role for ephrin-A5 in prostate cancer cell adhesion and growth.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study investigated the impact of digital networked social interactions on the design of public urban spaces. Urban informatics, social media, ubiquitous computing, and mobile technology offer great potential to urban planning, as tools of communication, community engagement, and placemaking. The study considers the function of public spaces as 'third places,' that is, social places that are familiar, comfortable, social and meaningful for everyday life outside the home and work. Libraries were chosen as the study's focus. The study produced findings and insights at the intersection of urban planning (place), cultural geography and urban sociology (people), and information communication technology (technology) – the triad of urban informatics.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper I use the case study of Darren, derived from two interviews in a research study of racism in the city of Stoke, UK (Gadd, Dixon and Jefferson 2005; Gadd and Dixon 2011), to explore how best to approach the topic of hate-motivated violence. This entails discussing the relationships among racism (the original object of study), hate-motivated violence (the more general term) and prejudices of various sorts. Because that discussion, I argue, justifies a psychoanalytic starting point, and since violence has become, almost quintessentially, masculine, this leads on to an exploration of what can be learnt from psychoanalysis about the relations among sexuality, masculinity, hatred and violence. This involves brief discussions of some key psychoanalytic terms, but only what is needed to enable sense to be made of my chosen case, which I shall then interrogate using these psychoanalytic ideas, focused on understanding the origins and nature of Darren’s hatred.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

On 25 March 1997 the Witness program on Channel 7 screened a story about the conviction of Neil Chidiac in February 1989 for conspiracy to import a trafficable quantity of heroin in NSW. The program questioned the justice of Chidiac's conviction and filmed his recent release from prison on parole after serving over eight years in prison, still protesting his innocence. Witness featured an interview with the chief Crown witness against Chidiac, Alfred Oti, in which Oti completely repudiated the testimony he gave at the trial and admitted to lying at the behest of the police in order to secure advantages for himself...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Scientific visualisations such as computer-based animations and simulations are increasingly a feature of high school science instruction. Visualisations are adopted enthusiastically by teachers and embraced by students, and there is good evidence that they are popular and well received. There is limited evidence, however, of how effective they are in enabling students to learn key scientific concepts. This paper reports the results of a quantitative study conducted in Australian chemistry classrooms. The visualisations chosen were from free online sources, intended to model the ways in which classroom teachers use visualisations, but were found to have serious flaws for conceptual learning. There were also challenges in the degree of interactivity available to students using the visualisations. Within these limitations, no significant difference was found for teaching with and without these visualisations. Further study using better designed visualisations and with explicit attention to the pedagogy surrounding the visualisations will be required to gather high quality evidence of the effectiveness of visualisations for conceptual development.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Proxy re-encryption (PRE) is a highly useful cryptographic primitive whereby Alice and Bob can endow a proxy with the capacity to change ciphertext recipients from Alice to Bob, without the proxy itself being able to decrypt, thereby providing delegation of decryption authority. Key-private PRE (KP-PRE) specifies an additional level of confidentiality, requiring pseudo-random proxy keys that leak no information on the identity of the delegators and delegatees. In this paper, we propose a CPA-secure PK-PRE scheme in the standard model (which we then transform into a CCA-secure scheme in the random oracle model). Both schemes enjoy highly desirable properties such as uni-directionality and multi-hop delegation. Unlike (the few) prior constructions of PRE and KP-PRE that typically rely on bilinear maps under ad hoc assumptions, security of our construction is based on the hardness of the standard Learning-With-Errors (LWE) problem, itself reducible from worst-case lattice hard problems that are conjectured immune to quantum cryptanalysis, or “post-quantum”. Of independent interest, we further examine the practical hardness of the LWE assumption, using Kannan’s exhaustive search algorithm coupling with pruning techniques. This leads to state-of-the-art parameters not only for our scheme, but also for a number of other primitives based on LWE published the literature.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity security reductions without random oracles in groups equipped with a bilinear map. Selective-identity secure IBE is a slightly weaker security model than the standard security model for IBE. In this model the adversary must commit ahead of time to the identity that it intends to attack, whereas in an adaptive-identity attack the adversary is allowed to choose this identity adaptively. Our first system—BB1—is based on the well studied decisional bilinear Diffie–Hellman assumption, and extends naturally to systems with hierarchical identities, or HIBE. Our second system—BB2—is based on a stronger assumption which we call the Bilinear Diffie–Hellman Inversion assumption and provides another approach to building IBE systems. Our first system, BB1, is very versatile and well suited for practical applications: the basic hierarchical construction can be efficiently secured against chosen-ciphertext attacks, and further extended to support efficient non-interactive threshold decryption, among others, all without using random oracles. Both systems, BB1 and BB2, can be modified generically to provide “full” IBE security (i.e., against adaptive-identity attacks), either using random oracles, or in the standard model at the expense of a non-polynomial but easy-to-compensate security reduction.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We describe a short signature scheme that is strongly existentially unforgeable under an adaptive chosen message attack in the standard security model. Our construction works in groups equipped with an efficient bilinear map, or, more generally, an algorithm for the Decision Diffie-Hellman problem. The security of our scheme depends on a new intractability assumption we call Strong Diffie-Hellman (SDH), by analogy to the Strong RSA assumption with which it shares many properties. Signature generation in our system is fast and the resulting signatures are as short as DSA signatures for comparable security. We give a tight reduction proving that our scheme is secure in any group in which the SDH assumption holds, without relying on the random oracle model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recently, a convex hull-based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then clicking randomly within this convex hull. While some rudimentary security issues of this protocol have been discussed, a comprehensive security analysis has been lacking. In this paper, we analyze the security of this convex hull-based protocol. In particular, we show two probabilistic attacks that reveal the user’s secret after the observation of only a handful of authentication sessions. These attacks can be efficiently implemented as their time and space complexities are considerably less than brute force attack. We show that while the first attack can be mitigated through appropriately chosen values of system parameters, the second attack succeeds with a non-negligible probability even with large system parameter values that cross the threshold of usability.