27 resultados para Artur Rei Lendas
Resumo:
While Conceptual fashion design practices have been a pervasive influence in fashion since the early 1980s, there is little academic analysis that might explain how they are distinct from conventional fashion design practices. In addition, fashion practitioners have not historically contributed to fashion research. As a result, contemporary fashion practitioners have difficulty setting critical contexts and expanding their creative work as there is little relevant literature available from practitioner perspectives. This project uses practice-led research to develop a discourse for understanding Conceptual fashion design process and how it relates to more conventional fashion design practices. In this exegesis I use Conceptual art as a lens to expand understandings of Conceptual fashion and my own creative practice. This analysis demonstrates that there are valuable connections to be drawn between Conceptual art and Conceptual fashion practice. In particular, these connections reveal the differences between the way Conceptual and more conventional fashion designers relate to the conceptual and the visual in their design process. This exploration demonstrates that while fashion is a visual field, Conceptual fashion designers produce a more ‘intellectual’ type of fashion that uses the visual to communicate ideas that question the nature of fashion. I explore the relevance of these ideas through application and experimentation in my creative practice projects by drawing from systems and rules identified in the work of early Conceptual artists and contemporary Conceptual fashion designers.
Resumo:
In this chapter, we discuss four related areas of cryptology, namely, authentication, hashing, message authentication codes (MACs), and digital signatures. These topics represent active and growing research topics in cryptology. Space limitations allow us to concentrate only on the essential aspects of each topic. The bibliography is intended to supplement our survey. We have selected those items which providean overview of the current state of knowledge in the above areas. Authentication deals with the problem of providing assurance to a receiver that a communicated message originates from a particular transmitter, and that the received message has the same content as the transmitted message. A typical authentication scenario occurs in computer networks, where the identity of two communicating entities is established by means of authentication. Hashing is concerned with the problem of providing a relatively short digest–fingerprint of a much longer message or electronic document. A hashing function must satisfy (at least) the critical requirement that the fingerprints of two distinct messages are distinct. Hashing functions have numerous applications in cryptology. They are often used as primitives to construct other cryptographic functions. MACs are symmetric key primitives that provide message integrity against active spoofing by appending a cryptographic checksum to a message that is verifiable only by the intended recipient of the message. Message authentication is one of the most important ways of ensuring the integrity of information that is transferred by electronic means. Digital signatures provide electronic equivalents of handwritten signatures. They preserve the essential features of handwritten signatures and can be used to sign electronic documents. Digital signatures can potentially be used in legal contexts.
Resumo:
In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.
Resumo:
In a traditional anti-jamming system a transmitter who wants to send a signal to a single receiver spreads the signal power over a wide frequency spectrum with the aim of stopping a jammer from blocking the transmission. In this paper, we consider the case that there are multiple receivers and the transmitter wants to broadcast a message to all receivers such that colluding groups of receivers cannot jam the reception of any other receiver. We propose efficient coding methods that achieve this goal and link this problem to well-known problems in combinatorics. We also link a generalisation of this problem to the Key Distribution Pattern problem studied in combinatorial cryptography.
Resumo:
The power of sharing computation in a cryptosystem is crucial in several real-life applications of cryptography. Cryptographic primitives and tasks to which threshold cryptosystems have been applied include variants of digital signature, identification, public-key encryption and block ciphers etc. It is desirable to extend the domain of cryptographic primitives which threshold cryptography can be applied to. This paper studies threshold message authentication codes (threshold MACs). Threshold cryptosystems usually use algebraically homomorphic properties of the underlying cryptographic primitives. A typical approach to construct a threshold cryptographic scheme is to combine a (linear) secret sharing scheme with an algebraically homomorphic cryptographic primitive. The lack of algebraic properties of MACs rules out such an approach to share MACs. In this paper, we propose a method of obtaining a threshold MAC using a combinatorial approach. Our method is generic in the sense that it is applicable to any secure conventional MAC by making use of certain combinatorial objects, such as cover-free families and their variants. We discuss the issues of anonymity in threshold cryptography, a subject that has not been addressed previously in the literature in the field, and we show that there are trade-offis between the anonymity and efficiency of threshold MACs.
Resumo:
Taking into consideration of growing energy needs and concern for environmental degradation, clean and inexhaustible energy source, such as solar energy, is receiving greater attention for various applications. The use of solar energy system reduces pollution, waste and has little or no harmful effects on the environment. It is appreciated that this source of energy can be complementary rather than being competitive to conventional energy sources. In order to collect and harness energy from the sun, a solar collector is essential. A solar collector is basically a heat exchanger that transforms solar radiant energy into heat or thermal energy. Improvement of performance is essential for commercial acceptance of their use in such applications. Many studies have been undertaken on the enhancement of thermal performance of solar collectors, using diverse materials of various shapes, dimensions and layouts. In the literature, various collector designs have been proposed and tested with the objective of meeting these requirements [1-8]. Omer et al. [1] found the efficiency of a solar collector of about 70% in a solar assisted heat pump system. Traditional solar collectors are single phase collectors, in which the working fluid is either air or water. Different modifications are suggested and applied to improve the heat transfer between the absorber and working fluid in a collector. These modifications include the use of absorber with fins attached [2,3], corrugated absorber [4,5], matrix type absorber [6], V-groove solar air collector [7]. Karim et al. [8] approached a review of design and construction of three types (flat, vee-grooved, and finned) of air collectors. Two-phase collectors, on the other hand, have significant potential for continuous operation round the clock, when used in conjunction with a compressor, as found in a solar assisted heat-pump cycle.
Resumo:
This report provides an overview of the tornado impact on the safe operation and shutdown of nuclear power plants in the United States. The motivation for this review stems from the damage and failure of the Fukushima nuclear power plant on March 11, 2011. That disaster warrants comparison of the safety measures in place within the global nuclear power industry.
Resumo:
The zombie has long been regarded as a “fundamentally American creation” (Bishop 2010) and a western monster representing the fears and anxieties of Western society. Since the renaissance of the zombie movie in the early 2000s, a subsequent surge in international production has seen the release of movies from Norway, Cuba, Pakistan and Thailand to name a few. Although Japanese zombie movies have been far more visible for Western cult audiences than in mainstream markets, Japanese cinema has emerged as one of the more prolific producers of zombie films outside of Anglophone or Western European countries in recent years. Films such as Helldriver (2010), Zombie TV (2013), Versus (2000), Tokyo Zombie (2005), Happiness of the Katakuris (2001) and anime television series High School of the Dead (2010) have generated varying degrees of popularity and critical attention internationally. At first glance Japanese zombie films, with musical zombie interludes, undead yakuza henchmen and revenge-seeking yūrei zombies, appear fundamentally different to their Western counterparts. Yet, on closer examination, the Japanese zombie movie could be regarded as a hybrid and intertextual generic form drawing on syntactic conventions at the core of a universal zombie sub-genre established by Western filmmaking traditions, while also distilling culturally specific tropes unique to various Japanese horror cinema sub-genres. Most importantly, the Japanese zombie film extracts, emphasises and revises particular conventions and motifs common within Western zombie films that are particularly relevant to Japanese audiences. This chapter investigates the cultural resonance of key generic motifs identifiable in the Japanese zombie film. It establishes a production context and the influence of Japanese horror cinema on style and thematic concerns. It then examines the function of prominent narrative conventions, namely: the source, outbreak and spread of infection; mutation and the representation of the monster; and the inclusion of supernatural and religious motifs.
Resumo:
The identification of molecular networks at the system level in mammals is accelerated by next-generation mammalian genetics without crossing, which requires both the efficient production of whole-body biallelic knockout (KO) mice in a single generation and high-performance phenotype analyses. Here, we show that the triple targeting of a single gene using the CRISPR/Cas9 system achieves almost perfect KO efficiency (96%–100%). In addition, we developed a respiration-based fully automated noninvasive sleep phenotyping system, the Snappy Sleep Stager (SSS), for high-performance (95.3% accuracy) sleep/wake staging. Using the triple-target CRISPR and SSS in tandem, we reliably obtained sleep/wake phenotypes, even in double-KO mice. By using this system to comprehensively analyze all of the N-methyl-D-aspartate (NMDA) receptor family members, we found Nr3a as a short-sleeper gene, which is verified by an independent set of triple-target CRISPR. These results demonstrate the application of mammalian reverse genetics without crossing to organism-level systems biology in sleep research.
Resumo:
The term urban acupuncture refers to a concept where a localised intervention or treatment is used for the revitalisation and (re)creation of cities by targeting strategic points, poking or activating networks into action. These actions impart stimuli for further responses and opportunity through small projects rather than large developments. Urban Acupuncture activates dynamic transformative forces of the place and focuses on the maintenance of a healthy situation rather than on the cure of problems, and thus metaphorically resonates with the principles of the practice of acupuncture in traditional Chinese medicine...
Resumo:
Digital and interactive technologies are becoming increasingly embedded in everyday lives of people around the world. Application of technologies such as real-time, context-aware, and interactive technologies; augmented and immersive realities; social media; and location-based services has been particularly evident in urban environments where technological and sociocultural infrastructures enable easier deployment and adoption as compared to non-urban areas. There has been growing consumer demand for new forms of experiences and services enabled through these emerging technologies. We call this ambient media, as the media is embedded in the natural human living environment. This workshop focuses on ambient media services, applications, and technologies that promote people’s engagement in creating and recreating liveliness in urban environments, particularly through arts, culture, and gastronomic experiences. The RelCi workshop series is organized in cooperation with the Queensland University of Technology (QUT), in particular the Urban Informatics Lab and the Tampere University of Technology (TUT), in particular the Entertainment and Media Management (EMMi) Lab. The workshop runs under the umbrella of the International Ambient Media Association (AMEA) (http://www.ambientmediaassociation.org), which is hosting the international open access journal entitled “International Journal on Information Systems and Management in Creative eMedia”, and the international open access series “International Series on Information Systems and Management in Creative eMedia” (see http://www.tut.fi/emmi/Journal). The RelCi workshop took place for the first time in 2012 in conjunction with ICME 2012 in Melbourne, Autralia; and this year’s edition took place in conjunction with INTERACT 2013 in Cape Town, South Africa. Besides, the International Ambient Media Association (AMEA) organizes the Semantic Ambient Media (SAME) workshop series, which took place in 2008 in conjunction with ACM Multimedia 2008 in Vancouver, Canada; in 2009 in conjunction with AmI 2009 in Salzburg, Austria; in 2010 in conjunction with AmI 2010 in Malaga, Spain; in 2011 in conjunction with Communities and Technologies 2011 in Brisbane, Australia; in 2012 in conjunction with Pervasive 2012 in Newcastle, UK; and in 2013 in conjunction with C&T 2013 in Munich, Germany.
Resumo:
The detailed molecular mechanisms underlying the regulation of sleep duration in mammals are still elusive. To address this challenge, we constructed a simple computational model, which recapitulates the electrophysiological characteristics of the slow-wave sleep and awake states. Comprehensive bifurcation analysis predicted that a Ca2+-dependent hyperpolarization pathway may play a role in slow-wave sleep and hence in the regulation of sleep duration. To experimentally validate the prediction, we generate and analyze 21 KO mice. Here we found that impaired Ca2+-dependent K+ channels (Kcnn2 and Kcnn3), voltage-gated Ca2+ channels (Cacna1g and Cacna1h), or Ca2+/calmodulin-dependent kinases (Camk2a and Camk2b) decrease sleep duration, while impaired plasma membrane Ca2+ ATPase (Atp2b3) increases sleep duration. Pharmacological intervention and whole-brain imaging validated that impaired NMDA receptors reduce sleep duration and directly increase the excitability of cells. Based on these results, we propose a hypothesis that a Ca2+-dependent hyperpolarization pathway underlies the regulation of sleep duration in mammals.