103 resultados para Black Hawk War, 1832.


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This essay is a critique of the discourse concerned with a so coiled Crisis of Representation. It examines the role of representational media (text and drawing) in the formation of the notion of an architectural ‘work’ and argues that there is no necessary privilege to any ordering of modes of representation rather particular orderings uncover specific agendas.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

War is a tragic event and its mental health consequences can be profound. Recent studies indicate substantial rates of posttraumatic stress disorder and other behavioral alterations because of war exposure. Understanding the psychological, behavioral, and neurobiological mechanism of mental health and behavioral changes related to war exposure is critical to helping those in need of care. Substantial work to encourage bench to bedside to community knowledge and communication is a core component of addressing this world health need.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The ‘war on terror’ and ongoing terrorist attacks around the world have generated a growing body of literature on national and international measures to counteract terrorist activity. This detailed study investigates an aspect of contemporary counter-terrorism that has been largely overlooked; the impact of these measures on the continued viability of the democratic state.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We describe a new species of dasyurid marsupial within the genus Antechinus that was previously known as a northern outlier of Dusky Antechinus (A. swainsonii). The Black-tailed Antechinus, Antechinus arktos sp. nov., is known only from areas of high altitude and high rainfall on the Tweed Volcano caldera of far south-east Queensland and north-east New South Wales, Australia. Antechinus arktos formerly sheltered under the taxonomic umbrella of A. swainsonii mimetes, the widespread mainland form of Dusky Antechinus. With the benefit of genetic hindsight, some striking morphological differences are herein resolved: A. s. mimetes is more uniformly deep brown-black to grizzled grey-brown from head to rump, with brownish (clove brown—raw umber) hair on the upper surface of the hindfoot and tail, whereas A. arktos is more vibrantly coloured, with a marked change from greyish-brown head to orange-brown rump, fuscous black on the upper surface of the hindfoot and dense, short fur on the evenly black tail. Further, A. arktos has marked orange-brown fur on the upper and lower eyelid, cheek and in front of the ear and very long guard hairs all over the body; these characters are more subtle in A. s. mimetes. There are striking genetic differences between the two species: at mtDNA, A. s. mimetes from north-east New South Wales is 10% divergent to A. arktos from its type locality at Springbrook NP, Queensland. In contrast, the Ebor A. s. mimetes clades closely with conspecifics from ACT and Victoria. A. arktos skulls are strikingly different to all subspecies of A. swainsonii. A. arktos are markedly larger than A. s. mimetes and A. s. swainsonii (Tasmania) for a range of craniodental measures. Antechinus arktos were historically found at a few proximate mountainous sites in south-east Queensland, and have only recently been recorded from or near the type locality. Even there, the species is likely in low abundance. The Black-tailed Antechinus has plausibly been detrimentally affected by climate change in recent decades, and will be at further risk with increasing warming trends.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Most previous work on unconditionally secure multiparty computation has focused on computing over a finite field (or ring). Multiparty computation over other algebraic structures has not received much attention, but is an interesting topic whose study may provide new and improved tools for certain applications. At CRYPTO 2007, Desmedt et al introduced a construction for a passive-secure multiparty multiplication protocol for black-box groups, reducing it to a certain graph coloring problem, leaving as an open problem to achieve security against active attacks. We present the first n-party protocol for unconditionally secure multiparty computation over a black-box group which is secure under an active attack model, tolerating any adversary structure Δ satisfying the Q 3 property (in which no union of three subsets from Δ covers the whole player set), which is known to be necessary for achieving security in the active setting. Our protocol uses Maurer’s Verifiable Secret Sharing (VSS) but preserves the essential simplicity of the graph-based approach of Desmedt et al, which avoids each shareholder having to rerun the full VSS protocol after each local computation. A corollary of our result is a new active-secure protocol for general multiparty computation of an arbitrary Boolean circuit.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mocombe and Tomlin’s Language, Literacy, and Pedagogy in Postindustrial Societies: The Case of Black Academic Underachievement is part of the Routledge Research in Education series. The purpose of the work is to set out a theoretical framework for understanding the black/white academic achievement gap in the age of globalisation and post-industrialism. The authors use each chapter to develop an explanation for the persistent black/white academic achievement gap, by theorising that the gap is an epiphenomenon of global capitalist, post-industrial structures, reinforced by education as an apparatus of the system...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis examines the role of conservative newspaper proprietors and editors to generate support for war against the Boers in South Africa. The thesis utilises Rune Ottosen's theoretical model concerning newspapers creating a pro-war mentality, and S.E. Finer's theory on the influences of the military on civilian Government. The pivotal supportive roles of Governor Lamington and Premiers Dickson and Philp and the oppositional role of Premier Dawson are also examined.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Phishing, a form of on-line identity theft, is a major problem worldwide, accounting for more than $7.5 Billion in losses in the US alone between 2005 and 2008. Australia was the first country to be targeted by Internet bank phishing in 2003 and continues to have a significant problem in this area. The major cyber crime groups responsible for phishing are based in Eastern Europe. They operate with a large degree of freedom due to the inherent difficulties in cross border law enforcement and the current situation in Eastern Europe, particularly in Russia and the Ukraine. They employ highly sophisticated and efficient technical tools to compromise victims and subvert bank authentication systems. However because it is difficult for them to repatriate the fraudulently obtained funds directly they employ Internet money mules in Australia to transfer the money via Western Union or Money gram. It is proposed a strategy, which firstly places more focus by Australian law enforcement upon transactions via Western Union and Money gram to detect this money laundering, would significantly impact the success of the Phishing attack model. This combined with a technical monitoring of Trojan technology and education of potential Internet money mules to avoid being duped would provide a winning strategy for the war on phishing for Australia.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study examined the relationship of race and rural/urban setting to physical, behavioral, psychosocial, and environmental factors associated with physical activity. Subjects included 1,668 eighth-grade girls from 31 middle schools: 933 from urban settings, and 735 from rural settings. Forty-six percent of urban girls and 59% of rural girls were Black. One-way and two-way ANOVAs with school as a covariate were used to analyze the data. Results indicated that most differences were associated with race rather than setting. Black girls were less active than White girls, reporting significantly fewer 30-minute blocks of both vigorous and moderate-to-vigorous physical activity. Black girls also spent more time watching television, and had higher BMIs and greater prevalence of overweight than White girls. However, enjoyment of physical education and family involvement in physical activity were greater among Black girls titan White girls. Rural White girls and urban Black girls had more favorable attitudes toward physical activity. Access to sports equipment, perceived safety of neighborhood, and physical activity self-efficacy were higher in White girls than Black girls.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function f G (x 1,...,x n ) = x 1 ·x 2 ⋯ x n in an arbitrary finite group (G,·), where the input of party P i is x i  ∈ G for i = 1,...,n. For flexibility, we are interested in protocols for f G which require only black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our results are as follows. First, on the negative side, we show that if (G,·) is non-abelian and n ≥ 4, then no ⌈n/2⌉-private protocol for computing f G exists. Second, on the positive side, we initiate an approach for construction of black-box protocols for f G based on k-of-k threshold secret sharing schemes, which are efficiently implementable over any black-box group G. We reduce the problem of constructing such protocols to a combinatorial colouring problem in planar graphs. We then give two constructions for such graph colourings. Our first colouring construction gives a protocol with optimal collusion resistance t < n/2, but has exponential communication complexity O(n*2t+1^2/t) group elements (this construction easily extends to general adversary structures). Our second probabilistic colouring construction gives a protocol with (close to optimal) collusion resistance t < n/μ for a graph-related constant μ ≤ 2.948, and has efficient communication complexity O(n*t^2) group elements. Furthermore, we believe that our results can be improved by further study of the associated combinatorial problems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The terrorist attacks of 11 September 2001 marked a turning point in international politics, representing a new type of threat that could not easily be anticipated or prevented through state-based structures of security alone. Opening up interdisciplinary conversations between strategic, economic, ethical and legal approaches to global terrorism, this edited book recognises a fundamental issue: while major crises initially tend to reinforce old thinking and behavioural patterns, they also allow societies to challenge and overcome entrenched habits, thereby creating the foundations for a new and perhaps more peaceful future. This volume addresses the issues that are at stake in this dual process of political closure, and therefore rethinks how states can respond to terrorist threats. The contributors range from leading conceptual theorists to policy-oriented analysts, from senior academics to junior researchers. The book explores how terrorism has had a profound impact on how security is being understood and implemented, and uses a range of hitherto neglected sources of insight, such as those between political, economic, legal and ethical factors, to examine the nature and meaning of security in a rapidly changing world.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With its foregrounding of the political issue of the denial of Aboriginal Australian sovereignty by British invaders in its big budget, mainstream narrative, 'The Sapphires' (Wayne Blair 2012) is shown to be another example of a "fourth formation" (Starrs 2012) in Moore and Muecke's 1985 model. Blair's feel-good movie features an all-Aboriginal Australian troupe of singers, The Sapphires, who undertake a journey of self-discovery whereby they learn the importance of choosing the protest songs of black Soul over the white coloniser's "whining" Country and Western songs and this is historically contextualised with a discussion of Aboriginal Australians and popular radio. Furthermore, this paper argues the iconic 'Welcome to Country' is twice subverted to reinforce this theme, firstly in the Cummeragunja pub and secondly in war-torn Vietnam. Finally, the prediction is made that a "fifth formation", in which seeking recognition of Aboriginal Australian sovereignty is no longer the goal because it has become the ongoing reality, will soon be the project of Australian film-makers as they celebrate this long overdue societal shift.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The annual Anzac Day observance is a focus for articulating popular notions of Australian national identity. Early Anzac Day observations were characterised by a diversity of observational modes, many distinctly masculine and militarist in character; including sports, competitions and marches. It was from the late 1920s that the now characteristic structure of the day (dawn service - march -follow-on - afternoon celebrations including eating, drinking and playing of the gambling game two-up, illegal on every other day of the year} became the dominant form. 1 Widely believed to have experienced an extended nadir in the 1960s and 1970s, since the 1980s Anzac Day has arguably become the single most important national event in the Australian calendar, involving probably the largest-numbers of Australians, many of them young, in the same temporal observance in a multitude of locations across the country and around the world.2 To date, there is a rich literature around Anzac Day observations and meanings focussing on its cultural I folkioric role'; the production of (masculinised) national identity;pilgrimage;' popular memory I history;' and the contemporary reshaping of the Anzac myth by and for indigenous participants.'