579 resultados para past group identities


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Digital forensics concerns the analysis of electronic artifacts to reconstruct events such as cyber crimes. This research produced a framework to support forensic analyses by identifying associations in digital evidence using metadata. It showed that metadata based associations can help uncover the inherent relationships between heterogeneous digital artifacts thereby aiding reconstruction of past events by identifying artifact dependencies and time sequencing. It also showed that metadata association based analysis is amenable to automation by virtue of the ubiquitous nature of metadata across forensic disk images, files, system and application logs and network packet captures. The results prove that metadata based associations can be used to extract meaningful relationships between digital artifacts, thus potentially benefiting real-life forensics investigations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Community-based protests against major construction and engineering projects are becoming increasingly common as concerns over issues such as corporate social accountability, climate change and corruption become more prominent in the public's mind. Public perceptions of risk associated with these projects can have a contagious effect, which mismanaged can escalate into long-term and sometimes acrimonious protest stand-offs that have negative implications for the community, firms involved and the construction industry as a whole. This paper investigates the role of core group members in sustaining community-based protest against construction and engineering projects. Using a thematic story telling approach which draws on ethnographic method and social contagion theories, it presents an in-depth analysis of a single case study - one of Australia's longest standing community protests against a construction project. It concludes that core group members play a critical role, within anarchic structures which provide a high degree of spontaneity and improvisation, in sustaining movement continuity by building collective identity, mobilising resources and a moving interface which developers find hard to communicate with.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis investigates the influence of passenger group dynamics on passengers' behaviour in an international airport. A simulation model is built to analyse passengers' behaviour during airport departure processes and during an emergency event. Results from the model showed that passengers' group dynamics have significant influences on the performance and utilisation of airport services. The agent-based model also provides a convenient way to investigate the effectiveness of space design and service allocations, which may contribute to the enhancement of passenger airport experiences.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Over the past decade the mitochondrial (mt) genome has become the most widely used genomic resource available for systematic entomology. While the availability of other types of ‘–omics’ data – in particular transcriptomes – is increasing rapidly, mt genomes are still vastly cheaper to sequence and are far less demanding of high quality templates. Furthermore, almost all other ‘–omics’ approaches also sequence the mt genome, and so it can form a bridge between legacy and contemporary datasets. Mitochondrial genomes have now been sequenced for all insect orders, and in many instances representatives of each major lineage within orders (suborders, series or superfamilies depending on the group). They have also been applied to systematic questions at all taxonomic scales from resolving interordinal relationships (e.g. Cameron et al., 2009; Wan et al., 2012; Wang et al., 2012), through many intraordinal (e.g. Dowton et al., 2009; Timmermans et al., 2010; Zhao et al. 2013a) and family-level studies (e.g. Nelson et al., 2012; Zhao et al., 2013b) to population/biogeographic studies (e.g. Ma et al., 2012). Methodological issues around the use of mt genomes in insect phylogenetic analyses and the empirical results found to date have recently been reviewed by Cameron (2014), yet the technical aspects of sequencing and annotating mt genomes were not covered. Most papers which generate new mt genome report their methods in a simplified form which can be difficult to replicate without specific knowledge of the field. Published studies utilize a sufficiently wide range of approaches, usually without justification for the one chosen, that confusion about commonly used jargon such as ‘long PCR’ and ‘primer walking’ could be a serious barrier to entry. Furthermore, sequenced mt genomes have been annotated (gene locations defined) to wildly varying standards and improving data quality through consistent annotation procedures will benefit all downstream users of these datasets. The aims of this review are therefore to: 1. Describe in detail the various sequencing methods used on insect mt genomes; 2. Explore the strengths/weakness of different approaches; 3. Outline the procedures and software used for insect mt genome annotation, and; 4. Highlight quality control steps used for new annotations, and to improve the re-annotation of previously sequenced mt genomes used in systematic or comparative research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

"This work forms part of a much larger collaborative album project in progress between Tim Bruniges, Julian Knowles and David Trumpmanis which explores the intersections between traditional rock instrumentation and analogue and digital media. All of the creative team are performers, composers and producers. The material for the album was thus generated by a series of in studio improvisations and performances with each collaborator assuming a range of different and alternating roles – guitars, electronics, drums, percussion, bass, keyboards production. Thematically the work explores the intersection of instrumental (post) rock, ambient music, and historical electro-acoustic tape composition traditions. Over the past 10 years, musical practice has become increasingly hybrid, with the traditional boundaries between genre becoming progressively eroded. At the same time, digital tools have replaced many of the major analogue technologies that dominated music production and performance in the 20th century. The disappearance of analogue media in mainstream musical practice has had a profound effect on the sonic characteristics of contemporary music and the gestural basis for its production. Despite the increasing power of digital technologies, a small but dedicated group of practitioners has continued to prize and use analogue technology for its unique sounds and the non-linearity of the media, aestheticising its inherent limitations and flaws. At the most radical end of this spectrum lie glitch and lo-fi musical forms, seen in part as reactions to the clinical nature of digital media and the perceived lack of character associated with its transparency. Such developments have also problematised the traditional relationships between media and genre, where specific techniques and their associated sounds have become genre markers. Tristate is an investigation into this emerging set of dialogues between analogue and digital media across composition, production and performance. It employs analogue tape loops in performance, where a tape machine ‘performer’ records and hand manipulates loops of an electric guitar performer on ‘destroyed’ tape stock (intentionally damaged tape), processing the output of this analogue system in the digital domain with contemporary sound processors. In doing so it investigates how the most extreme sonic signatures of analogue media – tape dropout and noise – can be employed alongside contemporary digital sound gestures in both compositional and performance contexts and how the extremes of the two media signatures can brought together both compositionally and performatively. In respect of genre, the work established strategies for merging compositional techniques from the early musique concrete tradition of the 1940s with late 60s popular music experimentalism and the laptop glitch electronica movement of the early 2000s. Lastly, the work explores how analogue recording studio technologies can be used as performance tools, thus illuminating and foregrounding the performative/gestural dimensions of traditional analogue studio tools in use."

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper the renormalization group (RG) method of Chen, Goldenfeld, and Oono [Phys. Rev. Lett., 73 (1994), pp.1311-1315; Phys. Rev. E, 54 (1996), pp.376-394] is presented in a pedagogical way to increase its visibility in applied mathematics and to argue favorably for its incorporation into the corresponding graduate curriculum.The method is illustrated by some linear and nonlinear singular perturbation problems. Key word. © 2012 Society for Industrial and Applied Mathematics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper introduces a straightforward method to asymptotically solve a variety of initial and boundary value problems for singularly perturbed ordinary differential equations whose solution structure can be anticipated. The approach is simpler than conventional methods, including those based on asymptotic matching or on eliminating secular terms. © 2010 by the Massachusetts Institute of Technology.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article elucidates and analyzes the fundamental underlying structure of the renormalization group (RG) approach as it applies to the solution of any differential equation involving multiple scales. The amplitude equation derived through the elimination of secular terms arising from a naive perturbation expansion of the solution to these equations by the RG approach is reduced to an algebraic equation which is expressed in terms of the Thiele semi-invariants or cumulants of the eliminant sequence { Zi } i=1 . Its use is illustrated through the solution of both linear and nonlinear perturbation problems and certain results from the literature are recovered as special cases. The fundamental structure that emerges from the application of the RG approach is not the amplitude equation but the aforementioned algebraic equation. © 2008 The American Physical Society.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article lays down the foundations of the renormalization group (RG) approach for differential equations characterized by multiple scales. The renormalization of constants through an elimination process and the subsequent derivation of the amplitude equation [Chen, Phys. Rev. E 54, 376 (1996)] are given a rigorous but not abstract mathematical form whose justification is based on the implicit function theorem. Developing the theoretical framework that underlies the RG approach leads to a systematization of the renormalization process and to the derivation of explicit closed-form expressions for the amplitude equations that can be carried out with symbolic computation for both linear and nonlinear scalar differential equations and first order systems but independently of their particular forms. Certain nonlinear singular perturbation problems are considered that illustrate the formalism and recover well-known results from the literature as special cases. © 2008 American Institute of Physics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We have developed a technique that circumvents the process of elimination of secular terms and reproduces the uniformly valid approximations, amplitude equations, and first integrals. The technique is based on a rearrangement of secular terms and their grouping into the secular series that multiplies the constants of the asymptotic expansion. We illustrate the technique by deriving amplitude equations for standard nonlinear oscillator and boundary-layer problems. © 2008 The American Physical Society.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper the method of renormalization group (RG) [Phys. Rev. E 54, 376 (1996)] is related to the well-known approximations of Rytov and Born used in wave propagation in deterministic and random media. Certain problems in linear and nonlinear media are examined from the viewpoint of RG and compared with the literature on Born and Rytov approximations. It is found that the Rytov approximation forms a special case of the asymptotic expansion generated by the RG, and as such it gives a superior approximation to the exact solution compared with its Born counterpart. Analogous conclusions are reached for nonlinear equations with an intensity-dependent index of refraction where the RG recovers the exact solution. © 2008 Optical Society of America.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Lawyering and Positive Professional Identities aims to help law students successfully navigate the demands of law studies and legal practice through the development of positive professional legal identities. It does this by focusing on the knowledge, skills and attitudes necessary for law students to be motivated and engaged learners, and psychologically healthy individuals. The text will fill an important gap for many law schools seeking to enact the threshold learning outcomes for law by addressing these important topics in their curricula. It is a valuable guide for all law students who wish to maximise their success and chances of thriving at law school and beyond. Positive lawyering knowledge and practice are central themes of this book, with a particular emphasis on lawyers’ roles as upholders of the rule of law, as dispute resolvers and as ethical professionals. Throughout, the authors provide practical, experience-based advice on the development of core skills for legal education and practice.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider the following problem: a user stores encrypted documents on an untrusted server, and wishes to retrieve all documents containing some keywords without any loss of data confidentiality. Conjunctive keyword searches on encrypted data have been studied by numerous researchers over the past few years, and all existing schemes use keyword fields as compulsory information. This however is impractical for many applications. In this paper, we propose a scheme of keyword field-free conjunctive keyword searches on encrypted data, which affirmatively answers an open problem asked by Golle et al. at ACNS 2004. Furthermore, the proposed scheme is extended to the dynamic group setting. Security analysis of our constructions is given in the paper.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we make progress towards solving an open problem posed by Katz and Yung at CRYPTO 2003. We propose the first protocol for key exchange among n ≥2k+1 parties which simultaneously achieves all of the following properties: 1. Key Privacy (including forward security) against active attacks by group outsiders, 2. Non-malleability — meaning in particular that no subset of up to k corrupted group insiders can ‘fix’ the agreed key to a desired value, and 3. Robustness against denial of service attacks by up to k corrupted group insiders. Our insider security properties above are achieved assuming the availability of a reliable broadcast channel.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Woods Bagot 2007 refurbishment of the Qantas and British Airways Bangkok Business lounge in the Survarnabhumi Airport features wall finishes designed by wallpaper designer, Florence Broadhurst (1899-1977) and Thai Silk trader, Jim Thompson (1906-1967). This distinctive selection, which is proclaimed on the airport’s website, of patterned wall surfaces side by side draws attention to their striking similarities and their defining differences . Thompson and Broadhurst would appear to be worlds apart, but here in the airport their work brings them together. Thompson, the son of a wealthy cotton family in America, worked as an architect before joining the army. He moved to Bangkok to start The Thai Silk Company in 1948. Broadhurst was born on a farm in Mt. Perry, Queensland. She began her career as a performance artist, as part of an Australian troupe in Shanghai, moving onto pursue a career in fashion design, catering to the middle and upper classes in London. Upon her return to Australia, Broadhurst started a print design company in 1959. Both Broadhurst and Thompson pursued multiple careers, lived many lives, and died under mysterious circumstances. Broadhurst was murdered in 1977 at her Sydney print warehouse, which remains an unsolved crime. Thompson disappeared in Malaysia in 1967 and his body has never been found. This chapter investigates the parallels between Thompson and Broadhurst and what lead them to design such popular patterns for wall surfaces towards the end of their careers. While neither designer was a household name, their work is familiar to most, seen in the costume and set design of films, on the walls of restaurants and cafes and even in family homes. The reason for the popularity of their patterns has not previously been analysed. However, this chapter suggests that the patterns are intriguing because they contain something of their designers’ identities. It suggests that the coloured surface provides a way of camouflaging and hiding its subjects’ histories, such that Broadhurst and Thompson, consciously or unconsciously, used the patterned surface as a plane in which their past lives could be buried. The revealing nature of the stark white wall, compared with the forgiveness provided by the pattern in which to hide, is elaborated by painter and advocate for polychromatic architecture, Fernand Léger in his essay, “The Wall, The Architect, The Painter (1965).” Léger writes that, “the modern architect has gone too far in his magnificent attempts to cleanse through emptiness,” and that the resultant white walls of modernity create ‘an impalpability of air, of slick, brilliant new surfaces where nothing can be hidden any longer …even shadows don’t dare to enter’. To counter the exposure produced by the white wall, Thompson and Broadhurst designed patterned surfaces that could harbour their personal histories. Broadhurst and Thompson’s works share a number of commonalities in their design production, even though their work in print design commenced a decade apart. Both designers opted to work more with traditional methods of pattern making. Broadhurst used hand-operated screens, and Thompson outsourced work to local weavers and refrained from operating out of a factory. Despite humble beginnings, Broadhurst and Thompson enjoyed international success with their wall patterns being featured in a number of renowned international hotels in Bahrain, Singapore, Sydney, and London in the 1970s and 1980s. Their patterns were also transferred to fabric for soft furnishings and clothing. Thompson’s patterns were used for costumes in films including the King and I and Ben Hur. Broadhurst’s patterns were also widely used by fashion designers and artists, such as Akira Isogowa‘s costume design for Salome, a 1998 production by the Sydney Dance Company. Most recently her print designs have been used by skin illustrator Emma Hack, in a series of works painting female bodies into Broadhurst’s patterns. Hack’s works camouflage the models’ bodies into the patterned surface, assimilating subject and surface, hinting at there being something living within the patterned wall. More than four decades after Broadhurst’s murder and five decades since Thompson’s disappearance, their print designs persist as more than just a legacy. They are applied as surface finishes with the same fervour as when the designs were first released. This chapter argues that the reason for the ongoing celebration of their work is that there is the impalpable presence of the creator in the patterns. It suggests that the patterns blur the boundary between subject and surface.