18 resultados para Classical tragedy

em Queensland University of Technology - ePrints Archive


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article introduces a “pseudo classical” notion of modelling non-separability. This form of non-separability can be viewed as lying between separability and quantum-like non-separability. Non-separability is formalized in terms of the non-factorizabilty of the underlying joint probability distribution. A decision criterium for determining the non-factorizability of the joint distribution is related to determining the rank of a matrix as well as another approach based on the chi-square-goodness-of-fit test. This pseudo-classical notion of non-separability is discussed in terms of quantum games and concept combinations in human cognition.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

THE Little Dog Laughed. By Douglas Carter Beane. Queensland Theatre Company. Cremorne Theatre, Brisbane. February 11. DOUGLAS Carter Beane's The Little Dog Laughed is a comedy about truth and its consequences. Set mainly in New York, the story follows film star Mitchell Green's developing relationship with Alex, a rentboy he calls one night while drunk and lonely in a hotel room. Scenes in which Mitchell and Alex test the strength of something they seem to have found together are punctuated by monologues from Mitchell's agent Diane and Alex's ex-girlfriend Ellen. We start to see glimpses of their separate lives, what their shared life might look like and, eventually, a crisis that brings all four characters together in the pursuit of a somewhat conflicted set of ideas about what happiness is and what it takes to be happy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Travel time is an important network performance measure and it quantifies congestion in a manner easily understood by all transport users. In urban networks, travel time estimation is challenging due to number of reasons such as, fluctuations in traffic flow due to traffic signals, significant flow to/from mid link sinks/sources, etc. The classical analytical procedure utilizes cumulative plots at upstream and downstream locations for estimating travel time between the two locations. In this paper, we discuss about the issues and challenges with classical analytical procedure such as its vulnerability to non conservation of flow between the two locations. The complexity with respect to exit movement specific travel time is discussed. Recently, we have developed a methodology utilising classical procedure to estimate average travel time and its statistic on urban links (Bhaskar, Chung et al. 2010). Where, detector, signal and probe vehicle data is fused. In this paper we extend the methodology for route travel time estimation and test its performance using simulation. The originality is defining cumulative plots for each exit turning movement utilising historical database which is self updated after each estimation. The performance is also compared with a method solely based on probe (Probe-only). The performance of the proposed methodology has been found insensitive to different route flow, with average accuracy of more than 94% given a probe per estimation interval which is more than 5% increment in accuracy with respect to Probe-only method.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Key establishment is a crucial primitive for building secure channels in a multi-party setting. Without quantum mechanics, key establishment can only be done under the assumption that some computational problem is hard. Since digital communication can be easily eavesdropped and recorded, it is important to consider the secrecy of information anticipating future algorithmic and computational discoveries which could break the secrecy of past keys, violating the secrecy of the confidential channel. Quantum key distribution (QKD) can be used generate secret keys that are secure against any future algorithmic or computational improvements. QKD protocols still require authentication of classical communication, although existing security proofs of QKD typically assume idealized authentication. It is generally considered folklore that QKD when used with computationally secure authentication is still secure against an unbounded adversary, provided the adversary did not break the authentication during the run of the protocol. We describe a security model for quantum key distribution extending classical authenticated key exchange (AKE) security models. Using our model, we characterize the long-term security of the BB84 QKD protocol with computationally secure authentication against an eventually unbounded adversary. By basing our model on traditional AKE models, we can more readily compare the relative merits of various forms of QKD and existing classical AKE protocols. This comparison illustrates in which types of adversarial environments different quantum and classical key agreement protocols can be secure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Here we unveil a tragic triptych of three Australian women painfully painted onto the walls of interior surfaces. The woman at the centre of the triptych is Florence Broadhurst whose tragic death still remains a mystery. To the right is Australian skin illustrator Emma Hack who recreates Broadhurst’s wallpapers, mimicking their colourful patterns onto live models. Hack perfectly assimilates the models’ body into the wallpaper, camouflaging bodies except for small hints at something more in the foreground. In the process of Hack’s images, the models become statues, standing painfully still holding their breath for minutes at a time. The third woman, to the left of the triptych, is the fictional character Candy from the 2006 Australian film Candy. Candy’s traumatic struggle with addiction ends with her conveying her pain in a poem she writes on the walls of her home; culminating her tragic story into a disturbed domestic wall surface. This research tries to understand this relationship with the surface through tragedy as a reciprocal agreement between surface and subject and not a permanent transference between one state and another. What the surface provides in times of personal struggle and turmoil is a method for us to come to terms with out material existence.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The participatory turn, fuelled by discourses and rhetoric regarding social media, and in the aftermath of the dot.com crash of the early 2000s, enrols to some extent an idea of being able to deploy networks to achieve institutional aims. The arts and cultural sector in the UK, in the face of funding cuts, has been keen to engage with such ideas in order to demonstrate value for money; by improving the efficiency of their operations, improving their respective audience experience and ultimately increasing audience size and engagement. Drawing on a case study compiled via a collaborative research project with a UK-based symphony orchestra (UKSO) we interrogate the potentials of social media engagement for audience development work through participatory media and networked publics. We argue that the literature related to mobile phones and applications (‘apps’) has focused primarily on marketing for engagement where institutional contexts are concerned. In contrast, our analysis elucidates the broader potentials and limitations of social-media-enabled apps for audience development and engagement beyond a marketing paradigm. In the case of UKSO, it appears that the technologically deterministic discourses often associated with institutional enrolment of participatory media and networked publics may not necessarily apply due to classical music culture. More generally, this work raises the contradictory nature of networked publics and argues for increased critical engagement with the concept.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This chapter draws on biographical data about two notable pattern designers of wall surfaces in the interior. Both had personal histories of multiple careers and geographical locations and both their lives ended in mysterious circumstances. One of the pattern designers, Jim Thompson, disappeared in the Malaysian highlands in 1967 and was never found. The other, Florence Broadhurst, was brutally murdered in 1977; her case remains unsolved. This chapter theorizes that the patterned surface attracted Broadhurst and Thompson as a space to occupy and record their divergent pasts, and questions what it is to lose oneself in the surface of the interior, to find freedom (or slavery) in the abdication of control. This notion is further evidenced in creative works, including the Australian film Candy and the work by skin illustrator Emma Hack. What is it to work with the self as a two-dimensional representation in the outside world? Occupying the surface suggests a reflexive relationship with identity, that makes-over and re-shapes truths, lies and re-constructions. The chapter reminds us that the surface is never in stasis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Classical ballet requires dancers to exercise significant muscle control and strength both while stationary and when moving. Following the Royal Academy of Dance (RAD) syllabus, 8 male and 27 female dancers (aged 20.2 + 1.9 yr) in a fulltime university undergraduate dance training program were asked to stand in first position for 10 seconds and then perform 10 repeats of a demi-plié exercise to a counted rhythm. Accelerometer records from the wrist, sacrum, knee and ankle were compared with the numerical scores from a professional dance instructor. The sacrum mounted sensor detected lateral tilts of the torso in dances with lower scores (Spearman’s rank correlation coefficient r = -0.64, p < 0.005). The RMS acceleration amplitude of wrist mounted sensor was linearly correlated to the movement scores (Spearman’s rank correlation coefficient r = 0.63, p < 0.005). The application of sacrum and wrist mounted sensors for biofeedback during dance training is a realistic, low cost option.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper considers the key findings of a year-long collaborative research project focusing on the audience of the London Symphony Orchestra and their introduction of a new mobile telephone (‘app’) ticketing system. A mixed-method approach was employed, utilizing focus groups and questionnaires with over 80 participants, to research a sample group of university students. This research develops our understanding of classical music audiences, and highlights the continued individualistic, middle-class, and exclusionary culture of classical music attendance and patterns of behaviours. The research also suggests that a mobile phone app does prove a useful mechanism for selling discounted tickets, but shows little indication of being a useful means of expanding this audience beyond its traditional demographic.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Initial attempts to obtain lattice based signatures were closely related to reducing a vector modulo the fundamental parallelepiped of a secret basis (like GGH [9], or NTRUSign [12]). This approach leaked some information on the secret, namely the shape of the parallelepiped, which has been exploited on practical attacks [24]. NTRUSign was an extremely efficient scheme, and thus there has been a noticeable interest on developing countermeasures to the attacks, but with little success [6]. In [8] Gentry, Peikert and Vaikuntanathan proposed a randomized version of Babai’s nearest plane algorithm such that the distribution of a reduced vector modulo a secret parallelepiped only depended on the size of the base used. Using this algorithm and generating large, close to uniform, public keys they managed to get provably secure GGH-like lattice-based signatures. Recently, Stehlé and Steinfeld obtained a provably secure scheme very close to NTRUSign [26] (from a theoretical point of view). In this paper we present an alternative approach to seal the leak of NTRUSign. Instead of modifying the lattices and algorithms used, we do a classic leaky NTRUSign signature and hide it with gaussian noise using techniques present in Lyubashevky’s signatures. Our main contributions are thus a set of strong NTRUSign parameters, obtained by taking into account latest known attacks against the scheme, a statistical way to hide the leaky NTRU signature so that this particular instantiation of CVP-based signature scheme becomes zero-knowledge and secure against forgeries, based on the worst-case hardness of the O~(N1.5)-Shortest Independent Vector Problem over NTRU lattices. Finally, we give a set of concrete parameters to gauge the efficiency of the obtained signature scheme.