109 resultados para digital time with memory


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Within contemporary performance arenas young people are fast becoming part of the vanguard of contemporary performance. Performativity, convergence and openness of form are key animating concepts in the landscape of Theatre for Young People (TYP). To ignore what is taking place in the making of performance for and by young people is to ignore the new possibilities in meaning-making and theatrical form. This thesis investigates the contemporary practice within the field of Theatre for Young People. Pivotal to the study are three hallmarks of contemporary performance – shifting notions of performativity; convergence articulated in the use of technology and theatrical genres; and Umberto Eco’s realisation of openness in form and authorship. The thesis draws from theatre and performance studies, globalisation theory and youth studies. Using interviews of Theatre for Young People practitioners and observation of thirty-nine performances, this thesis argues that young people and Theatre for Young People companies are among the leaders of a paradigm shift in developing and delivering performance works. In this period of rapid technological change young people are embracing and manipulating technology (sound, image, music) to represent whom they are and what they want to say. Positioned as ‘cultural catalysts’ (McRobbie, 1999), ‘the new pioneers’ (Mackay, 1993) and ‘first navigators’ (Rushkoff, 1996) young people are using mediatised culture and digital technologies with ease, placing them at the forefront of a shift in cultural production. The processes of deterritorialisation allows for the synthesis of new cultural and performance genres by fragmenting and hybridising traditional cultural categories and forms including the use of new media technologies. Almost half of all TYP performances now incorporate the technologies of reproduction. The relationship between live and mediatised forms, the visceral and the virtual is allowing young people to navigate and make meaning of cultural codes and cultural forms as well as to engage in an open dialogue with their audiences. This thesis examines the way young people are using elements of deterritorialisation to become producers of new performance genres. The thesis considers the contemporary situation in relation to issues of performance making and performance delivery within a global, networked and technology-driven society.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, we propose an approach which attempts to solve the problem of surveillance event detection, assuming that we know the definition of the events. To facilitate the discussion, we first define two concepts. The event of interest refers to the event that the user requests the system to detect; and the background activities are any other events in the video corpus. This is an unsolved problem due to many factors as listed below: 1) Occlusions and clustering: The surveillance scenes which are of significant interest at locations such as airports, railway stations, shopping centers are often crowded, where occlusions and clustering of people are frequently encountered. This significantly affects the feature extraction step, and for instance, trajectories generated by object tracking algorithms are usually not robust under such a situation. 2) The requirement for real time detection: The system should process the video fast enough in both of the feature extraction and the detection step to facilitate real time operation. 3) Massive size of the training data set: Suppose there is an event that lasts for 1 minute in a video with a frame rate of 25fps, the number of frames for this events is 60X25 = 1500. If we want to have a training data set with many positive instances of the event, the video is likely to be very large in size (i.e. hundreds of thousands of frames or more). How to handle such a large data set is a problem frequently encountered in this application. 4) Difficulty in separating the event of interest from background activities: The events of interest often co-exist with a set of background activities. Temporal groundtruth typically very ambiguous, as it does not distinguish the event of interest from a wide range of co-existing background activities. However, it is not practical to annotate the locations of the events in large amounts of video data. This problem becomes more serious in the detection of multi-agent interactions, since the location of these events can often not be constrained to within a bounding box. 5) Challenges in determining the temporal boundaries of the events: An event can occur at any arbitrary time with an arbitrary duration. The temporal segmentation of events is difficult and ambiguous, and also affected by other factors such as occlusions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Australia is a multi-ethnic, multi-cultural country with a long history of migration. In 2006, 22% of the population was born overseas. Thai migrants accounted for 0.2% of the population at this time, with a nearly 40% increase from around 19,000 in 1996 to 30,555 in 2006.1 Despite this, little is known about the health of this migrant group. We investigated the health status and health service utilisation of a Thai community through a cross-sectional postal survey conducted from May to September 2010. Participants were members of a Brisbane Thai temple, aged 18 years and older, who self identified as being Thai. Current health status was assessed using the SF-36v22 and self-report of diagnosed medical conditions. Use of health services was assessed using questions adapted from the Welsh Health Survey.3 Socio-demographic variables included gender, age, language spoken at home, year of arrival in Australia and type of health care insurance.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

It is commonly assumed that rates of accumulation of organic-rich strata have varied through geologic time with some periods that were particularly favorable for accumulation of petroleum source rocks or coals. A rigorous analysis of the validity of such an assumption requires consideration of the basic fact that although sedimentary rocks have been lost through geologic time to erosion and metamorphism. Consequently, their present-day global abundance decreases with their geologic age. Measurements of the global abundance of coal-bearing strata suggest that conditions for coal accumulation were exceptionally favorable during the late Carboniferous. Strata of this age constitute 21% of the world's coal-bearing strata. Global rates of coal accumulation appear to have been relatively constant since the end of the Carboniferous, with the exception of the Triassic which contains only 1.75% of the world's coal-bearing strata. Estimation of the global amount of discovered oil by age of the source rock show that 58% of the world's oil has been sourced from Cretaceous or younger strata and 99% from Silurian or younger strata. Although most geologic periods were favourable for oil source-rock accumulation the mid-Permian to mid-Jurassic appears to have been particularly unfavourable accounting for less than 2% of the world's oil. Estimation of the global amount of discovered natural gas by age of the source rock show that 48% of the world's oil has been sourced from Cretaceous or younger strata and 99% from Silurian or younger strata. The Silurian and Late Carboniferous were particularly favourable for gas source-rock accumulation respectively accounting for 12.9% and 6.9% of the world's gas. By contrast, Permian and Triassic source rocks account for only 1.7% of the world's natural gas. Rather than invoking global climatic or oceanic events to explain the relative abundance of organic rich sediments through time, examination of the data suggests the more critical control is tectonic. The majority of coals are associated with foreland basins and the majority of oil-prone source rocks are associated with rifting. The relative abundance of these types of basin through time determines the abundance and location of coals and petroleum source rocks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, we apply the approach of Berbain et al. to Trivium-like ciphers and perform new algebraic analyses on them, namely Trivium and its reduced versions: Trivium-N, Bivium-A and Bivium-B. In doing so, we answer an open question in the literature. We demonstrate a new algebraic attack on Bivium-A. This attack requires less time and memory than previous techniques which use the F4 algorithm to recover Bivium-A's initial state. Though our attacks on Bivium-B, Trivium and Trivium-N are worse than exhaustive keysearch, the systems of equations which are constructed are smaller and less complex compared to previous algebraic analysis. Factors which can affect the complexity of our attack on Trivium-like ciphers are discussed in detail.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis examines the social practice of homework. It explores how homework is shaped by the discourses, policies and guidelines in circulation in a society at any given time with particular reference to one school district in the province of Newfoundland and Labrador, Canada. This study investigates how contemporary homework reconstitutes the home as a pedagogical site where the power of the institution of schooling circulates regularly from school to home. It examines how the educational system shapes the organization of family life and how family experiences with homework may be different in different sites depending on the accessibility of various forms of cultural capital. This study employs a qualitative approach, incorporating multiple case studies, and is complemented by insights from institutional ethnography and critical discourse analysis. It draws on the theoretical concepts of Foucault including power and power relations, and governmentality and surveillance, as well as Bourdieu’s concepts of economic, social and cultural capital for analysis. It employs concepts from Bourdieu’s work as they have been expanded on by researchers including Reay (1998), Lareau (2000), and Griffith and Smith (2005). The studies of these researchers allowed for an examination of homework as it related to families and mothers’ work. Smith’s (1987; 1999) concepts of ruling relations, mothers’ unpaid labour, and the engine of inequality were also employed in the analysis. Family interviews with ten volunteer families, teacher focus group sessions with 15 teachers from six schools, homework artefacts, school newsletters, homework brochures, and publicly available assessment and evaluation policy documents from one school district were analyzed. From this analysis key themes emerged and the findings are documented throughout five data analysis chapters. This study shows a change in education in response to a system shaped by standards, accountability and testing. It documents an increased transference of educational responsibility from one educational stakeholder to another. This transference of responsibility shifts downward until it eventually reaches the family in the form of homework and educational activities. Texts in the form of brochures and newsletters, sent home from school, make available to parents specific subject positions that act as instruments of normalization. These subject positions promote a particular ‘ideal’ family that has access to certain types of cultural capital needed to meet the school’s expectations. However, the study shows that these resources are not equally available to all and some families struggle to obtain what is necessary to complete educational activities in the home. The increase in transference of educational work from the school to the home results in greater work for parents, particularly mothers. As well, consideration is given to mother’s role in homework and how, in turn, classroom instructional practices are sometimes dependent on the work completed at home with differential effects for children. This study confirms previous findings that it is mothers who assume the greatest role in the educational trajectory of their children. An important finding in this research is that it is not only middle-class mothers who dedicate extensive time working hard to ensure their children’s educational success; working-class mothers also make substantial contributions of time and resources to their children’s education. The assignments and educational activities distributed as homework require parents’ knowledge of technical school pedagogy to help their children. Much of the homework being sent home from schools is in the area of literacy, particularly reading, but requires parents to do more than read with children. A key finding is that the practices of parents are changing and being reconfigured by the expectations of schools in regard to reading. Parents are now being required to monitor and supervise children’s reading, as well as help children complete reading logs, written reading responses, and follow up questions. The reality of family life as discussed by the participants in this study does not match the ‘ideal’ as portrayed in the educational documents. Homework sessions often create frustrations and tensions between parents and children. Some of the greatest struggles for families were created by mathematical homework, homework for those enrolled in the French Immersion program, and the work required to complete Literature, Heritage and Science Fair projects. Even when institutionalized and objectified capital was readily available, many families still encountered struggles when trying to carry out the assigned educational tasks. This thesis argues that homework and education-related activities play out differently in different homes. Consideration of this significance may assist educators to better understand and appreciate the vast difference in families and the ways in which each family can contribute to their children’s educational trajectory.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

FTIR spectra are reported of CO adsorbed on silica-supported copper catalysts prepared from copper(II) acetate monohydrate. Fully oxidised catalyst gave bands due to CO on CuO, isolated Cu2+ cations on silica and anion vacancy sites in CuO. The highly dispersed CuO aggregated on reduction to metal particles which gave bands due to adsorbed CO characteristic of both low-index exposed planes and stepped sites on high-index planes. Partial surface oxidation with N2O or H2O generated Cu+ adsorption sites which were slowly reduced to Cu° by CO at 300 K. Surface carbonate initially formed from CO was also slowly depleted with time with the generation of CO2. The results are consistent with adsorbed carbonate being an intermediate in the water-gas shift reaction of H2O and CO to H2 and CO2.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Road crashes contribute to a significant amount of child mortality and morbidity in Australia. In fact, passenger injuries contribute to the majority of child crash road trauma. A number of factors contribute to child injury and death in motor vehicles, including inappropriate seating position, inappropriate choice of restraint, and incorrect installation and use of child restraints. Prior to March 2010, child restraint legislation in Queensland only required children twelve months and younger to be seated in a properly adjusted and fastened child restraint. This legislation left older infants and young children potentially suboptimally protected. From March 2010, new legislation specified seating position and type of child restraint required, depending on the age of the child. This research was underpinned by the Health Belief Model (HBM), which explores health related behaviour, behaviour change, environmental factors influencing behaviour change (including legislative changes) and is flexible enough to be used in relation to parents' health practices for their children, rather than parent health directly. This thesis investigates the extent to which the changes to child restraint legislation have led parents in regional areas of Queensland to use appropriate restraint practices for their children and determines the extent to which the constructs of the HBM, parental perceptions, barriers and environmental factors contribute to the appropriateness of child seating and restraint use. Study One included three sets of observations taken in two regional cities of Queensland prior to the legislative amendment, during an educative period of six months, and after the enactment of the legislation. Each child's seating position and restraint type were recorded. Results showed that the proportion of children observed occupying the front seat decreased by 15.6 per cent with the announcement the legislation. There was no decrease in front seat use at the enactment of the legislation. The proportion of children observed using dedicated child restraints increased by 8.8 per cent with the announcement of the legislation when there was one child in the vehicle. Further, there was a 10.1 per cent increase in the proportion of children observed using a seat belt that fit with the announcement when there was one child in the vehicle and with the enactment of the legislation regardless of the number of children in the vehicle (21.8 per cent for one child, 39.7 per cent for two children and 40.2 per cent for three or more children). Study Two comprised initial intercept interviews, later followed up by telephone, with parents with children aged eight years and younger at the announcement and telephone interviews at the enactment of the legislation in one regional city in Queensland. Parents reported their child restraint practices, and opinions, knowledge and understanding of the requirements of the new legislation. Parent responses were analysed in terms of the constructs in the HBM. When asked which seating position their child 'usually' used, parents reported child front seat use was nil (0.0 per cent) and did not change with the enactment of the legislative amendment. However, when parents were asked whether they allowed children to use the front seat at some point within the six months prior to the interview, reported child front seat use was 7 (5.4 per cent) children at T2 and 10 (9.6 per cent) at T3. Reported use of age-appropriate child restraints did not increase with the enactment of the legislation (p = 0.77, ns). Parents reported restraint practices were classed as either appropriate or inappropriate. Parents who reported appropriate restraint practices were those whose children were sitting in optimal restraints and seating positions for their age according to the requirements of the legislation. Parents who reported inappropriate restraint practices were those who had one or more children who were suboptimally restrained or seated for their age according to the requirements of the legislation. Neither parents' perceptions about their susceptibility of being in a crash nor the likelihood of severity of child injury if involved in a crash yielded significant differences in the appropriateness of reported parent restraint practices over time with the enactment of the legislation. A trend in the data suggested parents perceived a benefit to using appropriate restraint practices was to avoid fines and demerit points. Over 75 per cent of parents who agreed that child restraints provide better protection for children than an adult seat belt reported appropriately seating and restraining their children (2 (1) = 8.093, p<.05). The self-efficacy measure regarding parents' confidence in installing a child restraint showed a significant association with appropriate parental restraint practices (2 (1) = 7.036, p<.05). Results suggested that some parents may have misinterpreted the announcement of the legislative amendment as the announcement of the enforcement of the legislation instead. Some parents who correctly reported details of the legislation did not report appropriate child restraint practices. This finding shows that parents' knowledge of the legislative amendment does not necessarily have an impact on their behaviour to appropriately seat and restrain children. The results of these studies have important implications for road safety and the prevention of road-related injury and death to children in Queensland. Firstly, parents reported feeling unsure of how to install restraints, which suggests that there may be children travelling in restraints that have not been installed correctly, putting them at risk. Interventions to alert and encourage parents to seek advice when unsure about the correct installation of child restraints could be considered. Secondly, some parents in this study although they were using the most appropriate restraint for their children, reported using a type that was not the most appropriate restraint for the child's age according to the legislation. This suggests that intervention may be effective in helping parents make a more accurate choice of the most appropriate type of restraint to use with children, especially as the child ages and child restraint requirements change. Further research could be conducted to ascertain the most effective methods of informing and motivating parents to use the most appropriate restraints and seating positions for their children, as these results show a concerning disparity between reported restraint practices and those that were observed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, we apply the algebraic attack approach of Berbain et al. to Trivium-like ciphers and perform new analyses on them. We demonstrate a new algebraic attack on Bivium-A. This attack requires less time and memory than previous techniques to recover Bivium-A's initial state. Though our attacks on Bivium-B, Trivium and Trivium-N are worse than exhaustive keysearch, the systems of equations which are constructed are smaller and less complex compared to previous algebraic analyses. We also answer an open question posed by Berbain et al. on the feasibility of applying their technique on Trivium-like ciphers. Factors which can affect the complexity of our attack on Trivium-like ciphers are discussed in detail. Analysis of Bivium-B and Trivium-N are omitted from this manuscript. The full paper is available on the IACR ePrint Archive.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This is the first volume in a book series examining how organizations in the creative industries respond to disruptive change and how they themselves generate business innovations. The aspiration of this book series is to understand some of the common forces behind the disruptions occurring in so many creative industries today and identifying the most promising strategies and responses by organizations to create new value propositions, business models and business practices that can enable these industry participants to cope with and eventually thrive as their industries and sectors are transformed. The chapters included in the volume examine the processes of disruption and transformation due to the technology of the Internet, social forces driven by social media, the development of new portable digital devices with greater capabilities and smaller size, the decreasing costs of new information, and the creation of new business models and forms of intellectual property ownership rights for a digitized industry. The context for this volume is the publishing industries, understood as the industries for the publishing of fiction and non-fiction books, academic literature, consumer as well as trade magazines, and daily newspapers. This volume includes chapters by an internationally diverse array of media scholars whose chapters provide insights into these phenomena in Eastern Europe, Finland, France, Germany, Norway, Portugal, Russia, and the United States, using different methodological frameworks including, but not limited to, surveys, in-depth interviews and multiple-case studies. One gap that this book series seeks to fill is that between the study of business innovation and disruption by innovation scholars largely based in business school settings and similar studies by scholarly experts from non-business school disciplines, including the broader social sciences (e.g. sociology, political science, economic geography) and creative industry based professional school disciplines (e.g. architecture, communications, design, film making, journalism, media studies, performing arts, photography and television). Future volumes of this book series will examine disruption and business innovation in the film, video and photography sectors (volume two), the music sector (volume three) and interactive entertainment (volume four), with subsequent volumes focusing on the most relevant developments in creative industry business innovation and disruption that emerge.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, a Bayesian hierarchical model is used to anaylze the female breast cancer mortality rates for the State of Missouri from 1969 through 2001. The logit transformations of the mortality rates are assumed to be linear over the time with additive spatial and age effects as intercepts and slopes. Objective priors of the hierarchical model are explored. The Bayesian estimates are quite robustness in terms change of the hyperparamaters. The spatial correlations are appeared in both intercepts and slopes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We show that the LASH-x hash function is vulnerable to attacks that trade time for memory, including collision attacks as fast as 2(4x/11) and preimage attacks as fast as 2(4x/7). Moreover, we briefly mention heuristic lattice based collision attacks that use small memory but require very long messages that are expected to find collisions much faster than 2 x/2. All of these attacks exploit the designers’ choice of an all zero IV. We then consider whether LASH can be patched simply by changing the IV. In this case, we show that LASH is vulnerable to a 2(7x/8) preimage attack. We also show that LASH is trivially not a PRF when any subset of input bytes is used as a secret key. None of our attacks depend upon the particular contents of the LASH matrix – we only assume that the distribution of elements is more or less uniform.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Safety of repair, maintenance, alteration, and addition (RMAA) works have long been neglected because RMAAworks are often minute and only last for a short period of time. With rising importance of the RMAA sector in many developed societies, safety of RMAA works has begun to draw attention. Many RMAA contracting companies are small- and medium-sized enterprises (SMEs) that do not have comprehensive safety management systems. Existing safety legislation and regulations for new construction sites are not fully applicable to RMAAworks. Instead of relying on explicit and well-established safety systems, tacit safety knowledge plays an extremely important role in RMAA projects. To improve safety of RMAAworks, safety knowledge should be better managed. However, safety knowledge is difficult to capture in RMAA works. This study aims to examine safety management practices of RMAA contracting companies to see how safety knowledge of RMAA projects is managed. Findings show that RMAA contracting companies undertaking large-scale RMAA projects have more initiatives of safety management. Safety management of small-scale RMAA works relies heavily on the motivation of site supervisors and self-regulation of workers. Better tacit knowledge management improves safety performance. To enhance safety capability of RMAA contracting companies, a knowledge sharing culture should be cultivated. The government should provide assistance to SMEs to implement proper safety management practices in small-sized projects. Potentials of applying computer software technology in RMAA projects to capture, store, and retrieve safety information should be explored. Employees should be motivated to share safety knowledge by giving proper recognition to those who are willing to share.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Design process phases of development, evaluation and implementation were used to create a garment to simultaneously collect reliable data of speech production and intensity of movement of toddlers (18-36 months). A series of prototypes were developed and evaluated that housed accelerometer-based motion sensors and a digital transmitter with microphone. The approved test garment was a top constructed from loop-faced fabric with interior pockets to house devices. Extended side panels allowed for sizing. In total, 56 toddlers (28 male; 28 female; 16-36 months of age) participated in the study providing pilot and baseline data. The test garment was effective in collecting data as evaluated for accuracy and reliability using ANOVA for accelerometer data, transcription of video for type of movement, and number and length of utterances for speech production. The data collection garment has been implemented in various studies across disciplines.