410 resultados para Phoneme representations
Resumo:
Corackerup Breakaway expands understandings of the role of photographic media in the representation of landscapes. It does so by combining architectural construction with B&W photographic processing techniques. A purpose-built room-sized camera obscura is first constructed over a portion of the landscape to be recorded. Photosensitive paper is applied to the interior wall surfaces and is exposed to the inverted light entering a small aperture. These photographs are subsequently developed within the camera itself and consequently 'suffer' embellishments and aberrations from the makeshift darkroom conditions. In this way the specificity of both the landscape and the event of its recording are registered in the final image. Many images were destroyed in the process. The idea of the work is to help the viewer reflect on the role media plays in our understanding of landscape and to thus question the means by which they themselves record and interpret landscape representations.
Resumo:
Working Sheep expands understandings of the role of photographic media in the representation of landscapes. It does so by combining architectural construction with B&W photographic processing techniques. A purpose-built room-sized camera obscura is first constructed over a portion of the landscape to be recorded. Photosensitive paper is applied to the interior wall surfaces and is exposed to the inverted light entering a small aperture. These photographs are subsequently developed within the camera itself and consequently 'suffer' embellishments and aberrations from the makeshift darkroom conditions. In this way the specificity of both the landscape and the event of its recording are registered in the final image. Many images were destroyed in the process. The idea of the work is to help the viewer reflect on the role media plays in our understanding of landscape and to thus question the means by which they themselves record and interpret landscape representations.
Resumo:
Analytical and computational models of the intervertebral disc (IVD) are commonly employed to enhance understanding of the biomechanics of the human spine and spinal motion segments. The accuracy of these models in predicting physiological behaviour of the spine is intrinsically reliant on the accuracy of the material constitutive representations employed to represent the spinal tissues. There is a paucity of detailed mechanical data describing the material response of the reinforcedground matrix in the anulus fibrosus of the IVD. In the present study, the ‘reinforcedground matrix’ was defined as the matrix with the collagen fibres embedded but not actively bearing axial load, thus incorporating the contribution of the fibre-fibre and fibre-matrix interactions. To determine mechanical parameters for the anulus ground matrix, mechanical tests were carried out on specimens of ovine anulus, under unconfined uniaxial compression, simple shear and biaxial compression. Test specimens of ovine anulus fibrosus were obtained with an adjacent layer of vertebral bone/cartilage on the superior and inferior specimen surface. Specimen geometry was such that there were no continuous collagen fibres coupling the two endplates. Samples were subdivided according to disc region - anterior, lateral and posterior - to determine the regional inhomogeneity in the anulus mechanical response. Specimens were loaded at a strain rate sufficient to avoid fluid outflow from the tissue and typical stress-strain responses under the initial load application and under repeated loading were determined for each of the three loading types. The response of the anulus tissue to the initial and repeated load cycles was significantly different for all load types, except biaxial compression in the anterior anulus. Since the maximum applied strain exceeded the damage strain for the tissue, experimental results for repeated loading reflected the mechanical ability of the tissue to carry load, subsequent to the initiation of damage. To our knowledge, this is the first study to provide experimental data describing the response of the ‘reinforcedground matrix’ to biaxial compression. Additionally, it is novel in defining a study objective to determine the regionally inhomogeneous response of the ‘reinforcedground matrix’ under an extensive range of loading conditions suitable for mechanical characterisation of the tissue. The results presented facilitate the development of more detailed and comprehensive constitutive descriptions for the large strain nonlinear elastic or hyperelastic response of the anulus ground matrix.
Resumo:
The OED informs us that “gender” has at its root the Latin genus, meaning “race, kind,” and emerges as early as the fifth century as a term for differentiating between types of (especially) people and words. In the following 1500 years, gender appears in linguistic and biological contexts to distinguish types of words and bodies from one another, as when words in Indo-European languages were identified as masculine, feminine, or neuter, and humans were identified as male or female. It is telling that gender has historically (whether overtly or covertly) been a tool of negotiation between our understandings of bodies, and meanings derived from and attributed to them. Within the field of children’s literature studies, as in other disciplines, gender in and of itself is rarely the object of critique. Rather, specific constructions of gender structure understandings of subjectivity; allow or disallow certain behaviors or experiences on the basis of biological sex; and dictate a specific vision of social relations and organization. Critical approaches to gender in children’s literature have included linguistic analysis (Turner-Bowker; Sunderland); analysis of visual representations (Bradford; Moebius); cultural images of females (Grauerholz and Pescosolido); consideration of gender and genre (Christian-Smith; Stephens); ideological (Nodelman and Reimer); psychoanalytic (Coats); discourse analysis (Stephens); and masculinity studies (Nodelman) among others. In the adjacent fields of education and literacy studies, gender has been a sustained point of investigation, often deriving from perceived gendering of pedagogical practices (Lehr) or of reading preferences and competencies, and in recent years, perceptions of boys as “reluctant readers” (Moss). The ideology of patriarchy has primarily come under critical scrutiny 2 because it has been used to locate characters and readers within the specific binary logic of gender relations that historically subordinated the feminine to the masculine. Just as feminism might be broadly defined as resistance to existing power structures, a gendered reading might be broadly defined as a “resistant reading” in that it most often reveals or contests that which a text assumes to be the norm.
Resumo:
De Certeau (1984) constructs the notion of belonging as a sentiment which develops over time through the everyday activities. He explains that simple everyday activities are part of the process of appropriation and territorialisation and suggests that over time belonging and attachment are established and built on memory, knowledge and the experiences of everyday activities. Based on the work of de Certeau, non-Indigenous Australians have developed attachment and belonging to places based on the dispossession of Aboriginal people and on their everyday practices over the past two hundred years. During this time non-Indigenous people have marked their appropriation and territorialisation with signs, symbols, representations and images. In marking their attachment, they also define how they position Australia’s Indigenous people by both our presence and our absence. This paper will explore signs and symbols within spaces and places in health services and showcase how they reflect the historical, political, cultural, social and economic values, and power relations of broader society. It will draw on the voices of Aboriginal women to demonstrate their everyday experiences of such sites. It will conclude by highlighting how Aboriginal people assert their identities and un-ceded sovereignty within such health sites and actively resist on-going white epistemological notions of us and the logic of patriarchal white sovereignty.
Resumo:
Recovering position from sensor information is an important problem in mobile robotics, known as localisation. Localisation requires a map or some other description of the environment to provide the robot with a context to interpret sensor data. The mobile robot system under discussion is using an artificial neural representation of position. Building a geometrical map of the environment with a single camera and artificial neural networks is difficult. Instead it would be simpler to learn position as a function of the visual input. Usually when learning images, an intermediate representation is employed. An appropriate starting point for biologically plausible image representation is the complex cells of the visual cortex, which have invariance properties that appear useful for localisation. The effectiveness for localisation of two different complex cell models are evaluated. Finally the ability of a simple neural network with single shot learning to recognise these representations and localise a robot is examined.
Resumo:
RatSLAM is a vision-based SLAM system based on extended models of the rodent hippocampus. RatSLAM creates environment representations that can be processed by the experience mapping algorithm to produce maps suitable for goal recall. The experience mapping algorithm also allows RatSLAM to map environments many times larger than could be achieved with a one to one correspondence between the map and environment, by reusing the RatSLAM maps to represent multiple sections of the environment. This paper describes experiments investigating the effects of the environment-representation size ratio and visual ambiguity on mapping and goal navigation performance. The experiments demonstrate that system performance is weakly dependent on either parameter in isolation, but strongly dependent on their joint values.
Resumo:
RatSLAM is a system for vision based Simultaneous Localization and Mapping (SLAM) that has been shown to be capable of building stable representations of real world environments. In this paper we describe a method for using RatSLAM representations as the basis for navigation to designated goal locations. The method uses a new component, goal memory, to learn the temporal gradient between places. Paths are recalled or inferred from the goal memory by following the temporal gradient from the robot’s current position to the goal location. Experimental results have been gathered in a combined office and laboratory environment using a Pioneer robot. The experiments show that the robot can perform vision based SLAM on-line and in real time, and then use those representations immediately to navigate directly to designated goal locations.
Resumo:
Ecological networks are often represented as utopian webs of green meandering through cities, across states, through regions and even across a country (Erickson, 2006, p.28; Fabos, 2004, p.326; Walmsley, 2006). While this may be an inspiring goal for some in developed countries, the reality may be somewhat different in developing countries. China, in its shift to urbanisation and suburbanisation, is also being persuaded to adjust its planning schemes according to these aspirational representations of green spaces (Yu et al, 2006, p.237; Zhang and Wang, 2006, p.455). The failure of other countries to achieve regional goals of natural and cultural heritage protection on the ground in this way (Peterson et al, 2007; Ryan et al, 2006; von Haaren and Reich, 2006) suggests that there may be flaws in the underpinning concepts that are widely circulated in North American and Western European literature (Jongman et al, 2004; Walmsley, 2006). In China, regional open space networks, regional green infrastructure or regional ecological corridors as we know them in the West, are also likely to be problematic, at least in the foreseeable future. Reasons supporting this view can be drawn from lessons learned from project experience in landscape planning and related fields of study in China and overseas. Implementation of valuable regional green space networks is problematic because: • the concept of region as a spatial unit for planning green space networks is ambiguous and undefinable for practical purposes; • regional green space networks traditionally require top down inter-governmental cooperation and coordination which are generally hampered by inequalities of influence between and within government agencies; • no coordinating body with funding powers exists for regional green space development and infrastructure authorities are still in transition from engineering authorities; • like other infrastructure projects, green space is likely to become a competitive rather than a complementary resource for city governments; • stable long-term management, maintenance and uses of green space networks must fit into a ‘family’ social structure rather than a ‘public good’ social structure, particularly as rural and urban property rights are being re-negotiated with city governments; and • green space provision is a performance indicator of urban improvement in cities within the city hierarchy and remains quantitatively-based (land area, tree number and per capita share) rather than qualitatively-based with local people as the focus.
Resumo:
This thesis is about the derivation of the addition law on an arbitrary elliptic curve and efficiently adding points on this elliptic curve using the derived addition law. The outcomes of this research guarantee practical speedups in higher level operations which depend on point additions. In particular, the contributions immediately find applications in cryptology. Mastered by the 19th century mathematicians, the study of the theory of elliptic curves has been active for decades. Elliptic curves over finite fields made their way into public key cryptography in late 1980’s with independent proposals by Miller [Mil86] and Koblitz [Kob87]. Elliptic Curve Cryptography (ECC), following Miller’s and Koblitz’s proposals, employs the group of rational points on an elliptic curve in building discrete logarithm based public key cryptosystems. Starting from late 1990’s, the emergence of the ECC market has boosted the research in computational aspects of elliptic curves. This thesis falls into this same area of research where the main aim is to speed up the additions of rational points on an arbitrary elliptic curve (over a field of large characteristic). The outcomes of this work can be used to speed up applications which are based on elliptic curves, including cryptographic applications in ECC. The aforementioned goals of this thesis are achieved in five main steps. As the first step, this thesis brings together several algebraic tools in order to derive the unique group law of an elliptic curve. This step also includes an investigation of recent computer algebra packages relating to their capabilities. Although the group law is unique, its evaluation can be performed using abundant (in fact infinitely many) formulae. As the second step, this thesis progresses the finding of the best formulae for efficient addition of points. In the third step, the group law is stated explicitly by handling all possible summands. The fourth step presents the algorithms to be used for efficient point additions. In the fifth and final step, optimized software implementations of the proposed algorithms are presented in order to show that theoretical speedups of step four can be practically obtained. In each of the five steps, this thesis focuses on five forms of elliptic curves over finite fields of large characteristic. A list of these forms and their defining equations are given as follows: (a) Short Weierstrass form, y2 = x3 + ax + b, (b) Extended Jacobi quartic form, y2 = dx4 + 2ax2 + 1, (c) Twisted Hessian form, ax3 + y3 + 1 = dxy, (d) Twisted Edwards form, ax2 + y2 = 1 + dx2y2, (e) Twisted Jacobi intersection form, bs2 + c2 = 1, as2 + d2 = 1, These forms are the most promising candidates for efficient computations and thus considered in this work. Nevertheless, the methods employed in this thesis are capable of handling arbitrary elliptic curves. From a high level point of view, the following outcomes are achieved in this thesis. - Related literature results are brought together and further revisited. For most of the cases several missed formulae, algorithms, and efficient point representations are discovered. - Analogies are made among all studied forms. For instance, it is shown that two sets of affine addition formulae are sufficient to cover all possible affine inputs as long as the output is also an affine point in any of these forms. In the literature, many special cases, especially interactions with points at infinity were omitted from discussion. This thesis handles all of the possibilities. - Several new point doubling/addition formulae and algorithms are introduced, which are more efficient than the existing alternatives in the literature. Most notably, the speed of extended Jacobi quartic, twisted Edwards, and Jacobi intersection forms are improved. New unified addition formulae are proposed for short Weierstrass form. New coordinate systems are studied for the first time. - An optimized implementation is developed using a combination of generic x86-64 assembly instructions and the plain C language. The practical advantages of the proposed algorithms are supported by computer experiments. - All formulae, presented in the body of this thesis, are checked for correctness using computer algebra scripts together with details on register allocations.
Resumo:
Aim. The paper is a report of a study to demonstrate how the use of schematics can provide procedural clarity and promote rigour in the conduct of case study research. Background. Case study research is a methodologically flexible approach to research design that focuses on a particular case – whether an individual, a collective or a phenomenon of interest. It is known as the 'study of the particular' for its thorough investigation of particular, real-life situations and is gaining increased attention in nursing and social research. However, the methodological flexibility it offers can leave the novice researcher uncertain of suitable procedural steps required to ensure methodological rigour. Method. This article provides a real example of a case study research design that utilizes schematic representation drawn from a doctoral study of the integration of health promotion principles and practices into a palliative care organization. Discussion. The issues discussed are: (1) the definition and application of case study research design; (2) the application of schematics in research; (3) the procedural steps and their contribution to the maintenance of rigour; and (4) the benefits and risks of schematics in case study research. Conclusion. The inclusion of visual representations of design with accompanying explanatory text is recommended in reporting case study research methods.
Resumo:
The capacity to solve tasks that contain high concentrations of visual-spatial information, including graphs, maps and diagrams, is becoming increasingly important in educational contexts as well as everyday life. This research examined gender differences in the performance of students solving graphics tasks from the Graphical Languages in Mathematics (GLIM) instrument that included number lines, graphs, maps and diagrams. The participants were 317 Australian students (169 males and 148 females) aged 9 to 12 years. Boys outperformed girls on graphical languages that required the interpretation of information represented on an axis and graphical languages that required movement between two- and three-dimensional representations (generally Map language).
Resumo:
To date, most applications of algebraic analysis and attacks on stream ciphers are on those based on lin- ear feedback shift registers (LFSRs). In this paper, we extend algebraic analysis to non-LFSR based stream ciphers. Specifically, we perform an algebraic analysis on the RC4 family of stream ciphers, an example of stream ciphers based on dynamic tables, and inves- tigate its implications to potential algebraic attacks on the cipher. This is, to our knowledge, the first pa- per that evaluates the security of RC4 against alge- braic attacks through providing a full set of equations that describe the complex word manipulations in the system. For an arbitrary word size, we derive alge- braic representations for the three main operations used in RC4, namely state extraction, word addition and state permutation. Equations relating the inter- nal states and keystream of RC4 are then obtained from each component of the cipher based on these al- gebraic representations, and analysed in terms of their contributions to the security of RC4 against algebraic attacks. Interestingly, it is shown that each of the three main operations contained in the components has its own unique algebraic properties, and when their respective equations are combined, the resulting system becomes infeasible to solve. This results in a high level of security being achieved by RC4 against algebraic attacks. On the other hand, the removal of an operation from the cipher could compromise this security. Experiments on reduced versions of RC4 have been performed, which confirms the validity of our algebraic analysis and the conclusion that the full RC4 stream cipher seems to be immune to algebraic attacks at present.
Resumo:
Through an exploration of representations of metamorphosis and the creation of a body of written work, this thesis uses a critical examination of theoretical approaches to metamorphosis in combination with textual analysis of representations of metamorphosis and creative practice as research to arrive at the beginnings of an ethic of writing. The creative work, The Coming, consists of a collection of short fiction, The Coming, and two collections of poetry, Orison and Milagros. The exegesis, Transhuman Change: towards an ethic of writing, explores theories about metamorphosis as a figure for writing, as a trope, and as a motif for exploring identity to contextualise the analysis of representations of metamorphosis from which the ethic is developed. With reference to the psychosexual development theory of Jacques Lacan and Elaine Scarry’s philosophy of the body, pain, language and creativity, the exegesis examines existing approaches to metamorphosis and uses supplementary textual analysis of influential representations of metamorphosis from Ovid to Pygmalion, X-Men and Extreme Makeover to explore assumptions about the body, language, the self, gender in western culture. The limitations of the performance of representations of metamorphosis as a figure for the self’s survival of death are considered in the light of voice as metonym for self to propose an ethic which valorises life. The experience of sex and the construction of gender in representations of metamorphosis are considered in the light of Lacan’s theory of desire and Scarry’s theory of the body and language to propose an ethic of representing gender ironically. The motif of the faithless lover and the Pygmalion myth are considered in the light of the (m)other’s role in language to propose an ethic in which indeterminacy constitutes the condition for being aware of oneself among selves. Each of the three proposals is discussed in relation to the short fiction, memoir and poems produced in the course of this research to test their limits and possibilities as the foundation of an emerging ethic of writing.
Resumo:
Spatial representations, metaphors and imaginaries (cyberspace, web pages) have been the mainstay of internet research for a long time. Instead of repeating these themes, this paper seeks to answer the question of how we might understand the concept of time in relation to internet research. After a brief excursus on the general history of the concept, this paper proposes three different approaches to the conceptualisation of internet time. The common thread underlying all the approaches is the notion of time as an assemblage of elements such as technical artefacts, social relations and metaphors. By drawing out time in this way, the paper addresses the challenge of thinking of internet time as coexistence, a clash of fluxes, metaphors, lived experiences and assemblages. In other words, this paper proposes a way to articulate internet time as a multiplicity.