730 resultados para dynamic digital displays


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Whilst the dynamics informing processes have taken time to become clear, civic resistance initiated by young people using new media began in Egypt in 2010 against the Mubarak regime, soon widened to Tunisia, Yemen and Libya. Known as the 'Arab Spring', this phenomenon re-ignited discussion about the political role of digital space and its democratic potential. While parallels between authoritarian regimes and universities and educational institutions might seem overdrawn to some readers, I suggest there is value in considering the 'Digital Spring' (apropos the 'Arab Spring') as a metaphor to suggest the possibility that similar processes are taking place in schools and universities. This invites discussion about the political significance of digital space and its democratic potential in those institutions. To assess how some young people engage in digitally mediated politics within schools and universities, I identify five propositions which amalgamate descriptive and normative elements derived from Habermas and Dahlgren. These propositions offer an ideal taxonomy of normative and descriptive elements to establish whether digital technology promotes participation and debate in ways that sustain democratic practice.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Extant models of decision making in social neurobiological systems have typically explained task dynamics as characterized by transitions between two attractors. In this paper, we model a three-attractor task exemplified in a team sport context. The model showed that an attacker–defender dyadic system can be described by the angle x between a vector connecting the participants and the try line. This variable was proposed as an order parameter of the system and could be dynamically expressed by integrating a potential function. Empirical evidence has revealed that this kind of system has three stable attractors, with a potential function of the form V(x)=−k1x+k2ax2/2−bx4/4+x6/6, where k1 and k2 are two control parameters. Random fluctuations were also observed in system behavior, modeled as white noise εt, leading to the motion equation dx/dt = −dV/dx+Q0.5εt, where Q is the noise variance. The model successfully mirrored the behavioral dynamics of agents in a social neurobiological system, exemplified by interactions of players in a team sport.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article establishes whether there is a case for revising traditional accounts of politics and the public sphere given the ways in which digital technology is now being used in Western and non-Western settings to engage people politically. The article presents a case for framing this inquiry in terms of imaginaries. It then argues for a new political imaginary which helps to specify what is required for deliberative democratic practice in a way that shifts us away from the dominant liberal-utilitarian political imaginary that currently informs the political value systems of most Western nations. Drawing on the work of key political theorists such as Habermas and Dahlgren, five propositions or conditions for deliberative practice are identified that can be used in empirical investigation to help determine the democratic capacity and potential of new political communication and civic spaces being opened by means of digital media.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Children's Literature Digital Resources is a full text digital repository of Australian children’s literature from 1830 to 1945. Users can read online the complete texts of a selection of early Australian children’s literature, both popular and rare. Digitised items include children’s and young adult fiction, poetry, short stories, and picture books. Users can also read related full text critical articles that were digitised as part of the project.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Digital Storytelling is a powerful means for enabling communication and social participation. Ordinary people work with expert creative practitioners to create first person narratives for a wide and growing range of purposes, including community building, cultural engagement, brand identification and public communication. A digital story usually combines 15-30 still images and a recorded script of 100-250 words to create an original personal digital story in the form of a 2-3 minute digital video. This form of co-creative media takes advantage of newly accessible technologies but is based in the ancient and universal tradition of storytelling. Digital storytelling is being adopted internationally in a variety of institutional contexts. It was introduced at QUT by Distinguished Professor John Hartley in 2004 when he brought well known UK based digital storytelling expert Daniel Meadows to the Creative Industries Faculty to trainer researchers and Faculty in the technique. Since 2005 Creative Industries Faculty researchers have adapted digital storytelling for use in a variety of research contexts including heritage, youth welfare, health, and international development, in collaboration with a range of external partner organisations. More than 300 digital stories have been produced by QUT researchers, staff and students. These have been presented on the World Wide Web, broadcast on community media, released on DVD and exhibited in various forms. In addition CIF researchers have produced numerous journal articles, conference papers and books reporting the outcomes of research projects utilising digital storytelling in research. As a result of research activity the Creative Industries Faculty is now well positioned as a leading site for teaching and learning in digital storytelling. Faculty research activity in digital storytelling has generated interest in adapting the form for use in undergraduate and postgraduate Creative Industries curriculum and in service teaching, including short courses for external clients.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since the 2000s, teachers in an increasing number of Australian schools have been learning how to support students with refugee backgrounds. For some of these students, entry into the Australian school system is not easy. English literacy is integral to some of the challenges confronting the students. In response, educators have been developing and researching ways of engaging with the students’ language and literacy learning. Much of the focus has been on traditional print-based school literacies. In contrast, I look here at student engagement in digital literacies in an after-school media club. Several concepts from the theory of French sociologist, Pierre Bourdieu are useful for understanding the position of students of refugee background in the Australian school system. Like other conflict theories, Bourdieusian theory has sometimes been criticised as ‘pessimistic’, that is, for suggesting that schools necessarily reproduce social disadvantage. However, others have used Bourdieusian theory to analyse and critique the reproductive work of schooling for groups of students who experience educational disadvantage. I align myself with this latter tradition. Specifically, I use Bourdieu’s triad of concepts to explain aspects of the literacy education experiences of some young people of refugee background: field, capital and habitus. In particular, I look at questions of the legitimation of students’ competences as capital in literate fields within and beyond the school context. Data are drawn from an Australian Research Council-funded project, Digital Learning and Print Literacy: A design experiment for the reform of low socio-economic, culturally diverse schools (2009-14). The data analysed in this chapter include interviews and observations relating to the participation of two Congolese girls in an after school media club. Implications are drawn for teachers of literacy in culturally and linguistically diverse contexts. Consideration is made of early childhood, primary and secondary settings.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Computational neuroscience aims to elucidate the mechanisms of neural information processing and population dynamics, through a methodology of incorporating biological data into complex mathematical models. Existing simulation environments model at a particular level of detail; none allow a multi-level approach to neural modelling. Moreover, most are not engineered to produce compute-efficient solutions, an important issue because sufficient processing power is a major impediment in the field. This project aims to apply modern software engineering techniques to create a flexible high performance neural modelling environment, which will allow rigorous exploration of model parameter effects, and modelling at multiple levels of abstraction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As the Internet becomes deeply embedded into consumers’ daily life, the digital virtual world brings significant influence to consumers’ self and narrative. Prior studies look at consumer self from either from a certain online space or comparing consumers’ physical and digital virtual selves but not the integration of the physical/digital world. This paper aims to explore the meanings of the digital virtual space on consumers’ narrative as a whole (their interests, dreams, or subjectivity). We utilise a postmodern concept of the cyborg to understand the cultural complexity, subjective meanings of, and the extent to which the digital virtual space plays a role in consumers’ self-narrative. We conducted in-depth interviews and gathered three consumer narratives. Our findings indicate that consumers’ narrative contains important fragments from both physical and digital virtual worlds and their physical and digital virtual selves form a feedback loop that strengthen their overall narrative.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The dynamic nature of tissue temperature and the subcutaneous properties, such as blood flow, fatness, and metabolic rate, leads to variation in local skin temperature. Therefore, we investigated the effects of using multiple regions of interest when calculating weighted mean skin temperature from four local sites. Twenty-six healthy males completed a single trial in a thermonetural laboratory (mean ± SD): 24.0 (1.2) °C; 56 (8%) relative humidity; < 0.1 m/s air speed). Mean skin temperature was calculated from four local sites (neck, scapula, hand and shin) in accordance with International Standards using digital infrared thermography. A 50 x 50 mm square, defined by strips of aluminium tape, created six unique regions of interest, top left quadrant, top right quadrant, bottom left quadrant, bottom right quadrant, centre quadrant and the entire region of interest, at each of the local sites. The largest potential error in weighted mean skin temperature was calculated using a combination of a) the coolest and b) the warmest regions of interest at each of the local sites. Significant differences between the six regions interest were observed at the neck (P < 0.01), scapula (P < 0.001) and shin (P < 0.05); but not at the hand (P = 0.482). The largest difference (± SEM) at each site was as follows: neck 0.2 (0.1) °C; scapula 0.2 (0.0) °C; shin 0.1 (0.0) °C and hand 0.1 (0.1) °C. The largest potential error (mean ± SD) in weighted mean skin temperature was 0.4 (0.1) °C (P < 0.001) and the associated 95% limits of agreement for these differences was 0.2 to 0.5 °C. Although we observed differences in local and mean skin temperature based on the region of interest employed, these differences were minimal and are not considered physiologically meaningful.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the security of digital signature algorithms based on these constructions. They showed that the security of signature schemes based on the two randomized hash function modes relies on properties similar to the second preimage resistance rather than on the collision resistance property of the hash functions. One of the randomized hash function modes was named the RMX hash function mode and was recommended for practical purposes. The National Institute of Standards and Technology (NIST), USA standardized a variant of the RMX hash function mode and published this standard in the Special Publication (SP) 800-106. In this article, we first discuss a generic online birthday existential forgery attack of Dang and Perlner on the RMX-hash-then-sign schemes. We show that a variant of this attack can be applied to forge the other randomize-hash-then-sign schemes. We point out practical limitations of the generic forgery attack on the RMX-hash-then-sign schemes. We then show that these limitations can be overcome for the RMX-hash-then-sign schemes if it is easy to find fixed points for the underlying compression functions, such as for the Davies-Meyer construction used in the popular hash functions such as MD5 designed by Rivest and the SHA family of hash functions designed by the National Security Agency (NSA), USA and published by NIST in the Federal Information Processing Standards (FIPS). We show an online birthday forgery attack on this class of signatures by using a variant of Dean’s method of finding fixed point expandable messages for hash functions based on the Davies-Meyer construction. This forgery attack is also applicable to signature schemes based on the variant of RMX standardized by NIST in SP 800-106. We discuss some important applications of our attacks and discuss their applicability on signature schemes based on hash functions with ‘built-in’ randomization. Finally, we compare our attacks on randomize-hash-then-sign schemes with the generic forgery attacks on the standard hash-based message authentication code (HMAC).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the hash-then-sign digital signature schemes such as DSS and RSA in order to free their reliance on the collision resistance property of the hash functions. They have shown that to forge a RMX-hash-then-sign signature scheme, one has to solve a cryptanalytical task which is related to finding second preimages for the hash function. In this article, we will show how to use Dean’s method of finding expandable messages for finding a second preimage in the Merkle-Damgård hash function to existentially forge a signature scheme based on a t-bit RMX-hash function which uses the Davies-Meyer compression functions (e.g., MD4, MD5, SHA family) in 2 t/2 chosen messages plus 2 t/2 + 1 off-line operations of the compression function and similar amount of memory. This forgery attack also works on the signature schemes that use Davies-Meyer schemes and a variant of RMX published by NIST in its Draft Special Publication (SP) 800-106. We discuss some important applications of our attack.