342 resultados para Running Kinematics
Resumo:
This paper discusses my video installation Running Men as an example of how an artist’s appropriative engagements with screen images of the perilous body can reflect the technological zeitgeist of the last hundred years but also create a space of meditative and mediated reflection in Slavoj Žižek’s “endlessness” of the present-future. In this artwork, iconic male characters from Hollywood films are recontextualised to create infinitely looping scenes of running; trapping the characters in a kind of Nietchzen eternal recurrence that suspends them between impending violence and uncertain futures. Stemming primarily from my investigation into anxiety as a shared social experience, one perhaps primed by the increasing intensity of visual culture in the 21st century, these digitally reconfigured bodies become avatars or surrogates for myself, and for the viewer. Through selective editing, these emblematic figures are caught in a space of relentless confusion and paranoia – they run with, and from anxiety. They are never caught by any unseen pursuers, but are equally unable to catch up to any unseen goal. These figures map an historical trajectory of violence and masculinity as it has been projected through various iterations of screen culture Simultaneously, as celebrities, they are also fictions of the media sphere, both real and ethereal, they are impossible to grasp but paradoxically are objects of identification and emulation. In this duality, the work also references cinema’s tangled conflation of character and celebrity identity. This discussion will address the two distinct but connected sites and activities of body/image engagement. Firstly, the artistic process and conceptual ramifications of this activity, and secondly in the artwork’s potential as an installation to provide an opportunity for the viewer (like the artist) to reflect on the constructed-ness and complicated power structures at play in the representation of a gendered body.
Resumo:
Shared Services (SS) involves the convergence and streamlining of an organisation’s functions to ensure timely service delivery as effectively and efficiently as possible. As a management structure designed to promote value generation, cost savings and improved service delivery by leveraging on economies of scale, the idea of SS is driven by cost reduction and improvements in quality levels of service and efficiency. Current conventional wisdom is that the potential for SS is increasing due to the increasing costs of changing systems and business requirements for organisations and in implementing and running information systems. In addition, due to commoditisation of large information systems such as enterprise systems, many common, supporting functions across organisations are becoming more similar than not, leading to an increasing overlap in processes and fuelling the notion that it is possible for organisations to derive benefits from collaborating and sharing their common services through an inter-organisational shared services (IOSS) arrangement. While there is some research on traditional SS, very little research has been done on IOSS. In particular, it is unclear what are the potential drivers and inhibitors of IOSS. As the concepts of IOSS and SS are closely related to that of Outsourcing, and their distinction is sometimes blurred, this research has the first objective of seeking a clear conceptual understanding of the differences between SS and Outsourcing (in motivators, arrangements, benefits, disadvantages, etc) and based on this conceptual understanding, the second objective of this research is to develop a decision model (Shared Services Potential model) which would aid organisations in deciding which arrangement would be more appropriate for them to adopt in pursuit of process improvements for their operations. As the context of the study is on universities in higher education sharing administrative services common to or across them and with the assumption that such services were homogenous in nature, this thesis also reports on a case study. The case study involved face to face interviews from representatives of an Australian university to explore the potential for IOSS. Our key findings suggest that it is possible for universities to share services common across them as most of them were currently using the same systems although independently.
Resumo:
Amphibian is an 10’00’’ musical work which explores new musical interfaces and approaches to hybridising performance practices from the popular music, electronic dance music and computer music traditions. The work is designed to be presented in a range of contexts associated with the electro-acoustic, popular and classical music traditions. The work is for two performers using two synchronised laptops, an electric guitar and a custom designed gestural interface for vocal performers - the e-Mic (Extended Mic-stand Interface Controller). This interface was developed by one of the co-authors, Donna Hewitt. The e-Mic allows a vocal performer to manipulate the voice in real time through the capture of physical gestures via an array of sensors - pressure, distance, tilt - along with ribbon controllers and an X-Y joystick microphone mount. Performance data are then sent to a computer, running audio-processing software, which is used to transform the audio signal from the microphone. In this work, data is also exchanged between performers via a local wireless network, allowing performers to work with shared data streams. The duo employs the gestural conventions of guitarist and singer (i.e. 'a band' in a popular music context), but transform these sounds and gestures into new digital music. The gestural language of popular music is deliberately subverted and taken into a new context. The piece thus explores the nexus between the sonic and performative practices of electro acoustic music and intelligent electronic dance music (‘idm’). This work was situated in the research fields of new musical interfacing, interaction design, experimental music composition and performance. The contexts in which the research was conducted were live musical performance and studio music production. The work investigated new methods for musical interfacing, performance data mapping, hybrid performance and compositional practices in electronic music. The research methodology was practice-led. New insights were gained from the iterative experimental workshopping of gestural inputs, musical data mapping, inter-performer data exchange, software patch design, data and audio processing chains. In respect of interfacing, there were innovations in the design and implementation of a novel sensor-based gestural interface for singers, the e-Mic, one of the only existing gestural controllers for singers. This work explored the compositional potential of sharing real time performance data between performers and deployed novel methods for inter-performer data exchange and mapping. As regards stylistic and performance innovation, the work explored and demonstrated an approach to the hybridisation of the gestural and sonic language of popular music with recent ‘post-digital’ approaches to laptop based experimental music The development of the work was supported by an Australia Council Grant. Research findings have been disseminated via a range of international conference publications, recordings, radio interviews (ABC Classic FM), broadcasts, and performances at international events and festivals. The work was curated into the major Australian international festival, Liquid Architecture, and was selected by an international music jury (through blind peer review) for presentation at the International Computer Music Conference in Belfast, N. Ireland.
Resumo:
Nodule is 19'54" musical work for two electronic music performers, two laptop computers and a custom built, sensor-based microphone controller - the e-Mic (Extended Mic-stand Interface Controller). This interface was developed by one of the co-authors, Donna Hewitt. The e-Mic allows a vocal performer to manipulate their voice in real time by capturing physical gestures via an array of sensors - pressure, distance, tilt – in addition to ribbon controllers and an X-Y joystick microphone mount. Performance data are then sent to a computer, running audio-processing software, which is used to transform the audio signal from the microphone in real time. The work seeks to explore the liminal space between the electro-acoustic music tradition and more recent developments in the electronic dance music tradition. It does so on both a performative (gestural) and compositional (sonic) level. Visually, the performance consists of a singer and a laptop performer, hybridising the gestural context of these traditions. On a sonic level, the work explores hybridity at deeper levels of the musical structure than simple bricolage or collage approaches. Hybridity is explored at the level of the sonic gesture (source material), in production (audio processing gestures), in performance gesture, and in approaches to the use of the frequency spectrum, pulse and meter. The work was designed to be performed in a range of contexts from concert halls, to clubs, to rock festivals, across a range of staging and production platforms. As a consequence, the work has been tested in a range of audience contexts, and has allowed the transportation of compositional and performance practices across traditional audience demographic boundaries.
Resumo:
This project report presents the results of a study on wireless communication data transfer rates for a mobile device running a custombuilt construction defect reporting application. The study measured the time taken to transmit data about a construction defect, which included digital imagery and text, in order to assess the feasibility of transferring various types and sizes of data and the ICT-supported construction management applications that could be developed as a consequence. Data transfer rates over GPRS through the Telstra network and WiFi over a private network were compared. Based on the data size and data transfer time, the rate of transfer was calculated to determine the actual data transmission speeds at which the information was being sent using the wireless mobile communication protocols. The report finds that the transmission speeds vary considerably when using GPRS and can be significantly slower than what is advertised by mobile network providers. While WiFi is much faster than GPRS, the limited range of WiFi limits the protocol to residential-scale construction sites.
Resumo:
In my work with secondary school students who have disengaged from mainstream classrooms, I have often been surprised at the ways they enthusiastically engage with the projects on offer. They have demonstrated that, in apparent contradiction of their classroom behaviour, they still maintain hope in achieving a positive outcome from education. In a long-running schools-university project employing a “students-as-researchers” approach to investigating educational disadvantage, “at-risk” students have produced high quality results. Naturally, I wanted to know what it was about this sort of pedagogy that seemed to work for them. In this chapter, then, I outline the project and discuss some reasons for disengagement. I then address the features of the project that the participants themselves have identified as being instrumental in their re-engagement with formal education. Finally, I consider how these features may be transposed to maintaining the educational engagement of at-risk students in mainstream classrooms.
Resumo:
In Australia, a range of Federal Government services have been provided online for some time, but direct, online citizen consultation and involvement in processes of governance is relatively new. Moves towards more extensive citizen involvement in legislative processes are now being driven in a “top-down” fashion by government agencies, or in a “bottom-up” manner by individuals and third-sector organisations. This chapter focusses on one example from each of these categories, as well as discussing the presence of individual politicians in online social networking spaces. It argues that only a combination of these approaches can achieve effective consultation between citizens and policymakers. Existing at a remove from government sites and the frameworks for public communication which govern them, bottom-up consultation tools may provide a better chance for functioning, self-organising user communities to emerge, but they are also more easily ignored by governments not directly involved in their running. Top-down consultation tools, on the other hand, may seem to provide a more direct line of communication to relevant government officials, but for that reason are also more likely to be swamped by users who wish simply to register their dissent rather than engage in discussion. The challenge for governments, politicians, and user communities alike is to develop spaces in which productive and undisrupted exchanges between citizens and policymakers can take place.
Resumo:
Security-critical communications devices must be evaluated to the highest possible standards before they can be deployed. This process includes tracing potential information flow through the device's electronic circuitry, for each of the device's operating modes. Increasingly, however, security functionality is being entrusted to embedded software running on microprocessors within such devices, so new strategies are needed for integrating information flow analyses of embedded program code with hardware analyses. Here we show how standard compiler principles can augment high-integrity security evaluations to allow seamless tracing of information flow through both the hardware and software of embedded systems. This is done by unifying input/output statements in embedded program execution paths with the hardware pins they access, and by associating significant software states with corresponding operating modes of the surrounding electronic circuitry.
Resumo:
Prags Boulevard will form a 2km long pedestrian spine running east-west between the historic cities of Copenhagen and Amager. It is located on a some-what run down site, which accommodated illicit functions such as casual drug use and drinking, as well as sheds for squatters. The renovation of this site by the city of Copenhagen forms part of the Holmbladsgade renovation project, and a two-phase competition was held in 2001 to develop a green area and meeting place, transforming it into a place that residents would want to visit rather than avoid. The designer, local landscape architect Kristine Jensens recognises that though the site is linear it ‘has no traffic importance’, though as she notes ‘we like the project because it runs straight east west from the city pulse to the water of Oresund’. In developing the project, she has attempted to allow it to ‘run parallel’ to its existing illicit uses, using a ‘light touch’ of insertions. While it would be hard to describe the project as truly light in its touch (graphically, it is a very bold scheme), there is no doubt that it is parallel: in terms of use it runs alongside rather than against existing uses; in terms of its type it’s all about length, like a boulevard, although it clearly differs from a boulevard in other respects.
Resumo:
A recent article in the Journal of Science and Medicine in Sport by Chapman et al.1 reported data from an empirical investigation comparing lower extremity joint motions, joint coordination and muscle recruitment in expert and novice cyclists. 3D kinematic and intramuscular electromyographic (EMG) analyses revealed no differences between expert and novice cyclists for normalised joint angles and velocities of the pelvis, hip, knee and ankle. However, significant differences in the strength of sagittal plane kinematics for hip–ankle and knee–ankle joint couplings were reported, with expert cyclists displaying tighter coupling relationships than novice cyclists. Furthermore, significant differences between expert and novice cyclists for all muscle recruitment parameters, except timing of peak EMG amplitude, were also reported.
Resumo:
President’s Message AITPM President’s Message, July 2009 Hello fellow AITPM members, It’s now very early July so many Australians are going to experience a range of new, or increases in, fees, charges, and perhaps taxes by State and local governments. For example, Queenslanders are to be hit at the petrol pump, no longer living with the luxury of the State’s previous 8c per litre fuel subsidy, bringing general motorists’ fuel costs into line with the other States. A consolation is that they now don’t have to live with the real or perceived “price gouging” that has appeared in the past to make Queensland prices much closer than 8c to those in other States. Environmental lobbyists argue that this Government’s decision brings public transport costs closer to parity with private transport. However, my sense from sloppy petrol price elasticities is that the State’s motorists will get used to the reversal of what was a reverse tax pretty quickly, an amount which can be less than day-of-the week fluctuation. On the other hand, withholding this State revenue may help in some way the funding of the several major public transport infrastructure projects in progress; not to mention some of the cost of running the Transit Authority’s expanding service commitments. Other policy actions, such as a Federal Government review of taxation on employees’ package vehicles, which might discourage rather than encourage excess kilometres travelled, may have a greater environmental benefit. Of course, a downside is that many vehicles used so are Australian built, and discouraging fleet turnover may damage an industry which faces ever increasing uncertainty, and particularly at the present, is in need of some care and attention. I for one hope to this end that the new 4 cylinder (1.8L petrol or 2L diesel) so called “true Holden” Cruze and Toyota’s pending Camry Hybrid are both roaring successes, and will be taken up in droves as fleet and employee use vehicles. I’m not sure what drive-trains Ford and Holden plan to drop into their next full sized models but even if they’re not Australian sourced, let’s hope they coordinate the requisite performance expected by the “Aussie Battler” with suitable green credentials. I am also encouraged to see that already many Government fleet vehicles are smaller in size, but still fit for purpose. For instance, my local police station uses the Camry based Aurion as a district car. I close again in reminding everyone that AITPM’s flagship event, the 2009 AITPM National Conference, Traffic Beyond Tomorrow, is being held in Adelaide from 5 to 7 August. www.aitpm.com has all of the details about how to register, sponsor a booth, session, etc. Best regards all, Jon Bunker
Resumo:
If our only sources of information were the newspapers and the television, the available evidence would suggest that youth is a terrible problem. Not only would we be convinced that most crime is committed by the social category of youth, but that young people are running out of control, that the streets are no longer safe, that all manner of standards are dropping, that the schools are in chaos, and that, as a consequence of these facts, society faces ruin. Fortunately, there is a considerable body of academic literature which rebuts these assertions, and via a more rigorous and objective analysis of society, it has sought to explain the practices, cultures and circumstances through and by which contemporary youth is formed.
Resumo:
The title of this book, Hard Lesson: Reflections on Crime control in Late Modernity, contains a number of clues about its general theoretical direction. It is a book concerned, fist and foremost, with the vagaries of crime control in western neo-liberal and English speaking countries. More specifically, Hard Lessons draws attention to a number of examples in which discrete populations – those who have in one way or another offended against the criminal law - have become the subjects of various forms of stare intervention, regulation and control. We are concerned most of all with the ways in which recent criminal justice policies and practices have resulted in what are variously described as unintended consequences, unforeseen outcomes, unanticipated results, counter-productive effects or negative side effects. At their simplest, such terms refer to the apparent gulf between intention and outcome; they often form the basis for considerable amount of policy reappraisal, soul searching and even nihilistic despair among the mamandirns of crime control. Unintended consequences can, of course, be both positive and negative. Occasionally, crime control measures may result in beneficial outcomes, such as the use of DNA to acquit wrongly convicted prisoners. Generally, however, unforeseen effects tend to be negative and even entirely counterproductive, and/or directly opposite to what were originally intended. All this, of course, presupposes some sort of rational, well meaning and transparent policy making process so beloved by liberal social policy theorists. Yet, as Judith Bessant points out in her chapter, this view of policy formulation tends to obscure the often covert, regulatory and downright malevolent intentions contained in many government policies and practices. Indeed, history is replete with examples of governments seeking to mask their real aims from a prying public eye. Denials and various sorts of ‘techniques of neutralisation’ serve to cloak the real or ‘underlying’ aims of the powerful (Cohen 2000). The latest crop of ‘spin doctors’ and ‘official spokespersons’ has ensured that the process of governmental obfuscation, distortion and concealment remains deeply embedded in neo-liberal forms of governance. There is little new or surprising in this; nor should we be shocked when things ‘go wrong’ in the domain of crime control since many unintended consequences are, more often than not, quite predictable. Prison riots, high rates of recidivism and breaches of supervision orders, expansion rather than contraction of control systems, laws that create the opposite of what was intended – all these are normative features of western crime control. Indeed, without the deep fault lines running between policy and outcome it would be hard to imagine what many policy makers, administrators and practitioners would do: their day to day work practices and (and incomes) are directly dependent upon emergent ‘service delivery’ problems. Despite recurrent howls of official anguish and occasional despondency it is apparent that those involved in the propping up the apparatus of crime control have a vested interest in ensuring that polices and practices remain in an enduring state of review and reform.
Resumo:
In-place digital augmentation enhances the experience of physical spaces through digital technologies that are directly accessible within that space. This can take place in many forms and ways, e.g., through location-aware applications running on the individuals’ portable devices, such as smart phones, or through large static devices, such as public displays, which are located within the augmented space and accessible by everyone. The hypothesis of this study is that in-place digital augmentation, in the context of civic participation, where citizens collaboratively aim at making their community or city a better place, offers significant new benefits, because it allows access to services or information that are currently inaccessible to urban dwellers where and when they are needed: in place. This paper describes our work in progress deploying a public screen to promote civic issues in public, urban spaces, and to encourage public feedback and discourse via mobile phones.
Resumo:
The wide range of contributing factors and circumstances surrounding crashes on road curves suggest that no single intervention can prevent these crashes. This paper presents a novel methodology, based on data mining techniques, to identify contributing factors and the relationship between them. It identifies contributing factors that influence the risk of a crash. Incident records, described using free text, from a large insurance company were analysed with rough set theory. Rough set theory was used to discover dependencies among data, and reasons using the vague, uncertain and imprecise information that characterised the insurance dataset. The results show that male drivers, who are between 50 and 59 years old, driving during evening peak hours are involved with a collision, had a lowest crash risk. Drivers between 25 and 29 years old, driving from around midnight to 6 am and in a new car has the highest risk. The analysis of the most significant contributing factors on curves suggests that drivers with driving experience of 25 to 42 years, who are driving a new vehicle have the highest crash cost risk, characterised by the vehicle running off the road and hitting a tree. This research complements existing statistically based tools approach to analyse road crashes. Our data mining approach is supported with proven theory and will allow road safety practitioners to effectively understand the dependencies between contributing factors and the crash type with the view to designing tailored countermeasures.