111 resultados para Bryant, Jacob, 1715-1804.
Resumo:
A television series is tagged with the label "cult" by the media, advertisers, and network executives when it is considered edgy or offbeat, when it appeals to nostalgia, or when it is considered emblematic of a particular subculture. By these criteria, almost any series could be described as cult. Yet certain programs exert an uncanny power over their fans, encouraging them to immerse themselves within a fictional world.In Cult Television leading scholars examine such shows as The X-Files; The Avengers; Doctor Who, Babylon Five; Star Trek; Xena, Warrior Princess; and Buffy the Vampire Slayer to determine the defining characteristics of cult television and map the contours of this phenomenon within the larger scope of popular culture.Contributors: Karen Backstein; David A. Black, Seton Hall U; Mary Hammond, Open U; Nathan Hunt, U of Nottingham; Mark Jancovich; Petra Kuppers, Bryant College; Philippe Le Guern, U of Angers, France; Alan McKee; Toby Miller, New York U; Jeffrey Sconce, Northwestern U; Eva ViethSara Gwenllian-Jones is a lecturer in television and digital media at Cardiff University and co-editor of Intensities: The Journal of Cult Media.Roberta E. Pearson is a reader in media and cultural studies at Cardiff University. She is the author of the forthcoming book Small Screen, Big Universe: Star Trek and Television.
Resumo:
Working Sheep on 'Glen Shiel' is a key work of the author's exhibition Lightsite, which toured Western Australian galleries from February 2006 to November 2007. It is a five-minute-long exposure photographic image captured inside a purpose-built, room-sized pinhole camera which is demountable and does not have a floor. The work depicts octogenarian Ian Mangan who is both one of the first and last soldier settler farmers in the Gairdner-Jerramungup district in the Great Southern Region of Western Australia. Ian, his son, Stuart and Grandson Jacob, are preparing the last mob of sheep for sale before they move off their farm. The pinhole camera-room is sited amongst the sheep in the farm's sheep yards. Stuart and Jacob are depicted here standing amongst the sheep. The light from this exterior landscape is 'projected' inside the camera-room and illuminates the interior scene which includes that part of the sheep yards upon which the floorless room is erected, along with Ian who is standing motionless inside. The image evokes the temporality of light. Here, light itself is portrayed as the primary medium through which we both perceive and describe landscape. In this way it is through the agency of light that we construct our connectivity to landscape.
Resumo:
The ready availability of suitably zoned and serviced land is one of the key factors in the timely and cost effective provision of new land for development. Unfortunately, in many high population growth areas, land that may be available does not have ready access to infrastructure, or the appropriate designation/s (zoning) in place. The corresponding lag in supply frequently bears the blame for the resultant disequilibrium in the market and affordability pressures on the end product. Government has the capacity to respond to the issue of land supply in a number of ways. Proactive measures define longer term goals and set the ground rules moving forwards. Reactive policy decisions are made in an often hostile environment where stakeholder interests conflict. With a trend to increased regulation, government risks further constraining the viability of land development in high growth areas, without full consideration of all the supply side variables. This preliminary paper will identify a number of the variables which may be constraining the supply of land for residential development in South East Queensland given the current regulatory environment. It will examine the interrelationship between these supply side constraints, a full understanding of which is required by government in order for its policies to stimulate, rather than restrict the supply of land in this high growth region.
Resumo:
When the global financial crisis has its own acronym (the “GFC”), you know its going to be around for a while. This article looks at some of the risk/opportunity assessments you should take into consideration if you are planning for your property development business to still be around when the GFC is a thing of the past.
Resumo:
Before the Global Financial Crisis many providers of finance had growth mandates and actively pursued development finance deals as a way of gaining higher returns on funds with regular capital turnover and re-investment possible. This was able to be achieved through high gearing and low presales in a strong market. As asset prices fell, loan covenants breached and memories of the 1990’s returned, banks rapidly adjusted their risk appetite via retraction of gearing and expansion of presale requirements. Early signs of loosening in bank credit policy are emerging, however parties seeking development finance are faced with a severely reduced number of institutions from which to source funding. The few institutions that are lending are filtering out only the best credit risks by way of constrictive credit conditions including: low loan to value ratios, the corresponding requirement to contribute high levels of equity, lack of support in non-prime locations and the requirement for only borrowers with well established track records. In this risk averse and capital constrained environment, the ability of developers to proceed with real estate developments is still being constrained by their inability to obtain project finance. This paper will examine the pre and post GFC development finance environment. It will identify the key lending criteria relevant to real estate development finance and will detail the related changes to credit policies over this period. The associated impact to real estate development projects will be presented, highlighting the significant constraint to supply that the inability to obtain finance poses.
Resumo:
This presenation is part of the UDIA (Qld) Property Development Essentials program, which is a two-day introductory course designed for new entrants to the property industry. The course provides practical advice and direction for those looking to take the first steps into the development industry. This presentation identifies economic factors and their influence on land acquisitions, as well as providing an understanding the property development and business cycles and their impacts on acquisition strategies (long v. short term projects)
Resumo:
The changing development and population sprawl in major cities, especially those located in high rainfall areas, has resulted in the need to review and re-assess potential flood impacts in these cities. In many cases these new flood lines and flood maps have placed residential property that was previously considered to be flood free to now be considered to be potentially flood liable. Previous research based in Sydney and the UK has identified the fact that residential property that has been subject to flooding has a decreased price and higher investment risk than flood free property in the same location. These studies have also shown that the greatest impact on residential property subject to flooding is just following a flood event. In June 2009, Brisbane City Council released revised flood maps for the Greater Brisbane region and these maps have identified areas that have not previously been considered flood liable. This paper will analyse the sale performance of flood liable streets in the main flood areas of Brisbane over the period January 1990 through to June 2009, to determine the variation in price for these flood liable areas to the residential property immediately adjoining them. The average sale price will be tracked on both a geographic location and socio-economic basis.
Resumo:
This is a preliminary scoping presentation. It outlines some of the very early issues identified this research topic.
Resumo:
In this paper, the authors propose a new structure for the decoupling of circulant symmetric arrays of more than four elements. In this case, network element values are again obtained through a process of repeated eigenmode decoupling, here by solving sets of nonlinear equations. However, the resulting circuit is much simpler and can be implemented on a single layer. The corresponding circuit topology for the 6-element array is displayed in figure diagrams. The procedure will be illustrated by considering different examples.
Resumo:
Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides the obvious feature which is to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor encrypted traffic. Our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment. In this paper, we introduce a novel protocol that utilises a secret-sharing scheme to detect attacks in encrypted networks.
Interaction between disinhibition and restraint: Implications for body weight and eating disturbance
Resumo:
An increase in obesity is usually accompanied by an increase in eating disturbances. Susceptibility to these states may arise from different combinations of underlying traits: Three Factor Eating Questionnaire (TFEQ) Restraint and Disinhibition. Two studies were conducted to examine the interaction between these traits; one on-line study (n=351) and one laboratory-based study (n=120). Participants completed a battery of questionnaires and provided self-report measures of body weight and physical activity. A combination of high Disinhibition and high Restraint was associated with a problematic eating behaviour profile (EAT-26), and a higher rate of smoking and alcohol consumption. A combination of high Disinhibition and low Restraint was associated with a higher susceptibility to weight gain and a higher sedentary behaviour. These data show that different combinations of Disinhibition and Restraint are associated with distinct weight and behaviour outcomes.
Resumo:
Over the years, approaches to obesity prevention and treatment have gone from focusing on genetic and other biological factors to exploring a diversity of diets and individual behavior modification interventions anchored primarily in the power of the mind, to the recent shift focusing on societal interventions to design ";temptation-proof"; physical, social, and economic environments. In spite of repeated calls to action, including those of the World Health Organization (WHO), the pandemic continues to progress. WHO recently projected that if the current lifestyle trend in young and adult populations around the world persist, by 2012 in countries like the USA, health care costs may amount to as much as 17.7% of the GDP. Most importantly, in large part due to the problems of obesity, those children may be the first generation ever to have a shorter life expectancy than that of their parents. This work presents the most current research and proposals for addressing the pandemic. Past studies have focused primarly on either genetic or behavioral causes for obesity, however today's research indicates that a strongly integrated program is the best prospect for success in overcoming obesity. Furthermore, focus on the role of society in establishing an affordable, accessible and sustainable program for implementing these lifestyle changes is vital, particularly for those in economically challenged situations, who are ultimately at the highest risk for obesity. Using studies from both neuroscience and behavioral science to present a comprehensive overview of the challenges and possible solutions, The brain-to-society approach to obesity prevention focuses on what is needed in order to sustain a healthy, pleasurable and affordable lifestyle.
Resumo:
Type unions, pointer variables and function pointers are a long standing source of subtle security bugs in C program code. Their use can lead to hard-to-diagnose crashes or exploitable vulnerabilities that allow an attacker to attain privileged access over classified data. This paper describes an automatable framework for detecting such weaknesses in C programs statically, where possible, and for generating assertions that will detect them dynamically, in other cases. Exclusively based on analysis of the source code, it identifies required assertions using a type inference system supported by a custom made symbol table. In our preliminary findings, our type system was able to infer the correct type of unions in different scopes, without manual code annotations or rewriting. Whenever an evaluation is not possible or is difficult to resolve, appropriate runtime assertions are formed and inserted into the source code. The approach is demonstrated via a prototype C analysis tool.
Resumo:
Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides being used to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted Networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor such encrypted traffic. We therefore describe how our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment.