462 resultados para Set design

em Queensland University of Technology - ePrints Archive


Relevância:

60.00% 60.00%

Publicador:

Resumo:

Like many cautionary tales, The Hunger Games takes as its major premise an observation about contemporary society, measuring its ballistic arc in order to present graphically its logical conclusions. The Hunger Games gazes back to the panem et circenses of Ancient Rome, staring equally cynically forward, following the trajectory of reality television to its unbearably barbaric end point – a sadistic voyeurism for an effete elite of consumers. At each end of the historical spectrum (and in the present), the prevailing social form is Arendt’s animal laborans. Consumer or consumed, Panem’s population is (with the exception of the inner circle) either deprived of the possibility of, or distracted from, political action. Within the confines of the Games themselves, Law is abandoned or de‐realised: Law – an elided Other in the pseudo‐Hobbesian nightmare that is the Arena. The Games are played out, as were gladiatorial combats and other diversions of the Roman Empire, against a background resonant of Juvenal’s concern for his contemporaries’ attachment to short term gratification at the expense the civic virtues of justice and caring which are (or would be) constitutive of a contemporary form of Arendt’s homo politicus. While the Games are, on their face, ‘reality’ they are (like the realities presented in contemporary reality television) a simulated reality, de‐realised in a Foucauldian set design constructed as a distraction for Capitol, and for the residents of the Districts, a constant reminder of their subservience to Capitol. Yet contemporary Western culture, for which manipulative reality TV is but a symptom of an underlying malaise, is inscribed at least as an incipient Panem, Its public/political space is diminished by the effective slavery of the poor, the pre‐occupation with and distractions of materiality and modern media, and the increasing concentration of power/wealth into a smaller proportion of the population.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Harold Pinter's work opens the walls to the relatively closed rooms of domesticity. The room of the love affair, the unpredictable liaison, the cramped cluttered rooms of poverty and the disaffected. This study uses Pinter's rooms to analyse existing ideologies of gender, territory, power and domesticity. Pinter's rooms are more often than not reflections of familiar domestic spaces. This research investigates Pinter's rooms through a case study of a theatre set for one of his plays and textual analysis of selected works, developing an understanding of how Pinter's characters reflect behaviours within the domestic environment, mimicking while subverting domestic ecologies.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The Woods Bagot 2007 refurbishment of the Qantas and British Airways Bangkok Business lounge in the Survarnabhumi Airport features wall finishes designed by wallpaper designer, Florence Broadhurst (1899-1977) and Thai Silk trader, Jim Thompson (1906-1967). This distinctive selection, which is proclaimed on the airport’s website, of patterned wall surfaces side by side draws attention to their striking similarities and their defining differences . Thompson and Broadhurst would appear to be worlds apart, but here in the airport their work brings them together. Thompson, the son of a wealthy cotton family in America, worked as an architect before joining the army. He moved to Bangkok to start The Thai Silk Company in 1948. Broadhurst was born on a farm in Mt. Perry, Queensland. She began her career as a performance artist, as part of an Australian troupe in Shanghai, moving onto pursue a career in fashion design, catering to the middle and upper classes in London. Upon her return to Australia, Broadhurst started a print design company in 1959. Both Broadhurst and Thompson pursued multiple careers, lived many lives, and died under mysterious circumstances. Broadhurst was murdered in 1977 at her Sydney print warehouse, which remains an unsolved crime. Thompson disappeared in Malaysia in 1967 and his body has never been found. This chapter investigates the parallels between Thompson and Broadhurst and what lead them to design such popular patterns for wall surfaces towards the end of their careers. While neither designer was a household name, their work is familiar to most, seen in the costume and set design of films, on the walls of restaurants and cafes and even in family homes. The reason for the popularity of their patterns has not previously been analysed. However, this chapter suggests that the patterns are intriguing because they contain something of their designers’ identities. It suggests that the coloured surface provides a way of camouflaging and hiding its subjects’ histories, such that Broadhurst and Thompson, consciously or unconsciously, used the patterned surface as a plane in which their past lives could be buried. The revealing nature of the stark white wall, compared with the forgiveness provided by the pattern in which to hide, is elaborated by painter and advocate for polychromatic architecture, Fernand Léger in his essay, “The Wall, The Architect, The Painter (1965).” Léger writes that, “the modern architect has gone too far in his magnificent attempts to cleanse through emptiness,” and that the resultant white walls of modernity create ‘an impalpability of air, of slick, brilliant new surfaces where nothing can be hidden any longer …even shadows don’t dare to enter’. To counter the exposure produced by the white wall, Thompson and Broadhurst designed patterned surfaces that could harbour their personal histories. Broadhurst and Thompson’s works share a number of commonalities in their design production, even though their work in print design commenced a decade apart. Both designers opted to work more with traditional methods of pattern making. Broadhurst used hand-operated screens, and Thompson outsourced work to local weavers and refrained from operating out of a factory. Despite humble beginnings, Broadhurst and Thompson enjoyed international success with their wall patterns being featured in a number of renowned international hotels in Bahrain, Singapore, Sydney, and London in the 1970s and 1980s. Their patterns were also transferred to fabric for soft furnishings and clothing. Thompson’s patterns were used for costumes in films including the King and I and Ben Hur. Broadhurst’s patterns were also widely used by fashion designers and artists, such as Akira Isogowa‘s costume design for Salome, a 1998 production by the Sydney Dance Company. Most recently her print designs have been used by skin illustrator Emma Hack, in a series of works painting female bodies into Broadhurst’s patterns. Hack’s works camouflage the models’ bodies into the patterned surface, assimilating subject and surface, hinting at there being something living within the patterned wall. More than four decades after Broadhurst’s murder and five decades since Thompson’s disappearance, their print designs persist as more than just a legacy. They are applied as surface finishes with the same fervour as when the designs were first released. This chapter argues that the reason for the ongoing celebration of their work is that there is the impalpable presence of the creator in the patterns. It suggests that the patterns blur the boundary between subject and surface.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This is a theoretical investigation seeking to learn more about architecture by looking at architectural practice through another discipline. In this research architecture is investigated by examining its relationship with bodies through performance and theatre set design. This thesis aims to build on existing architectural theory, in which an absence of discourse on the body has been identified, by analysing representations of architecture and the body in performance. The research specifically examines the relationship between the body, architecture and authority in performance through the analysis of several performance works.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Most departmental computing infrastructure reflects the state of networking technology and available funds at the time of construction, which converge in a preconceived notion of homogeneity of network architecture and usage patterns. The DMAN (Digital Media Access Network) project, a large-scale server and network foundation for the Hong Kong Polytechnic University's School of Design was created as a platform that would support a highly complex academic environment while giving maximum freedom to students, faculty and researchers through simplicity and ease of use. As a centralized multi-user computation backbone, DMAN faces an extremely hetrogeneous user and application profile, exceeding implementation and maintenance challenges of typical enterprise, and even most academic server set-ups. This paper sumarizes the specification, implementation and application of the system while describing its significance for design education in a computational context.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper suggests ways for educators and designers to understand and merge priorities in order to inform the development of mobile learning (m-learning) applications that maximise user experiences and hence learning opportunities. It outlines a User Experience Design (UXD) theory and development process that requires designers to conduct a thorough initial contextual inquiry into a particular domain in order to set project priorities and development guidelines. A matrix that identifies the key contextual considerations namely the social, cultural, spatial, technical and temporal constructs of any domain is presented as a vital tool for achieving successful UXD. The frame of reference provided by this matrix ensures that decisions made throughout the design process are attributable to a desired user experience. To illustrate how the proposed UXD theory and development process supports the creation of effective m-learning applications, this paper documents the development process of MILK (Mobile Informal Learning Kit). MILK is a support tool that allows teachers and students to develop event paths that consist of a series SMS question and answer messages that lead players through a series of checkpoints between point A and point B. These event paths can be designed to suit desired learning scenarios and can be used to explore a particular place or subject. They can also be designed to facilitate formal or informal learning experiences.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The paper describes three design models that make use of generative and evolutionary systems. The models describe overall design methods and processes. Each model defines a set of tasks to be performed by the design team, and in each case one of the tasks requires a generative or evolutionary design system. The architectures of these systems are also broadly described.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Understanding users' capabilities, needs and expectations is key to the domain of Inclusive Design. Much of the work in the field could be informed and further strengthened by clear, valid and representative data covering the full range of people's capabilities. This article reviews existing data sets and identifies the challenges inherent in measuring capability in a manner that is informative for work in Inclusive Design. The need for a design-relevant capability data set is identified and consideration is given to a variety of capability construct operationalisation issues including questions associated with self-report and performance measures, sampling and the appropriate granularity of measures. The need for further experimental work is identified and a programme of research designed to culminate in the design of a valid and reliable capability survey is described.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

People have adopted various formats of media such as graphics, photo and text (nickname) in order to represent themselves when communicate with others online. Avatar is known as a visual form representing a user oneself and one's identity wished. Its form can vary from a two-dimensional model to a three-dimensional model, and can be visualised with various visual forms and styles. In general, two-dimensional images including an animated image are used in online forum communities and live chat software; while three-dimensional models are often used in computer games. Avatar design is often regarded as a graphic designer's visual image creation or a user's output based on one's personal preference, yet it often causes the avatar design having no consideration of its practical visual design and users' interactive communication experience aspects. This paper will review various types and styles of avatar and discuss about avatar design from visual design and online user experience perspectives. It aims to raise a design discourse in avatar design and build up a well-articulated set of design principles for effective avatar design.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Mainstream business process modelling techniques promote a design paradigm wherein the activities to be performed within a case, together with their usual execution order, form the backbone of a process model, on top of which other aspects are anchored. This paradigm, while eective in standardised and production-oriented domains, shows some limitations when confronted with processes where case-by-case variations and exceptions are the norm. In this thesis we develop the idea that the eective design of exible process models calls for an alternative modelling paradigm, one in which process models are modularised along key business objects, rather than along activity decompositions. The research follows a design science method, starting from the formulation of a research problem expressed in terms of requirements, and culminating in a set of artifacts that have been devised to satisfy these requirements. The main contributions of the thesis are: (i) a meta-model for object-centric process modelling incorporating constructs for capturing exible processes; (ii) a transformation from this meta-model to an existing activity-centric process modelling language, namely YAWL, showing the relation between object-centric and activity-centric process modelling approaches; and (iii) a Coloured Petri Net that captures the semantics of the proposed meta-model. The meta-model has been evaluated using a framework consisting of a set of work ow patterns. Moreover, the meta-model has been embodied in a modelling tool that has been used to capture two industrial scenarios.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This approach to sustainable design explores the possibility of creating an architectural design process which can iteratively produce optimised and sustainable design solutions. Driven by an evolution process based on genetic algorithms, the system allows the designer to “design the building design generator” rather than to “designs the building”. The design concept is abstracted into a digital design schema, which allows transfer of the human creative vision into the rational language of a computer. The schema is then elaborated into the use of genetic algorithms to evolve innovative, performative and sustainable design solutions. The prioritisation of the project’s constraints and the subsequent design solutions synthesised during design generation are expected to resolve most of the major conflicts in the evaluation and optimisation phases. Mosques are used as the example building typology to ground the research activity. The spatial organisations of various mosque typologies are graphically represented by adjacency constraints between spaces. Each configuration is represented by a planar graph which is then translated into a non-orthogonal dual graph and fed into the genetic algorithm system with fixed constraints and expected performance criteria set to govern evolution. The resultant Hierarchical Evolutionary Algorithmic Design System is developed by linking the evaluation process with environmental assessment tools to rank the candidate designs. The proposed system generates the concept, the seed, and the schema, and has environmental performance as one of the main criteria in driving optimisation.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Over recent years, Unmanned Air Vehicles or UAVs have become a powerful tool for reconnaissance and surveillance tasks. These vehicles are now available in a broad size and capability range and are intended to fly in regions where the presence of onboard human pilots is either too risky or unnecessary. This paper describes the formulation and application of a design framework that supports the complex task of multidisciplinary design optimisation of UAVs systems via evolutionary computation. The framework includes a Graphical User Interface (GUI), a robust Evolutionary Algorithm optimiser named HAPEA, several design modules, mesh generators and post-processing capabilities in an integrated platform. These population –based algorithms such as EAs are good for cases problems where the search space can be multi-modal, non-convex or discontinuous, with multiple local minima and with noise, and also problems where we look for multiple solutions via Game Theory, namely a Nash equilibrium point or a Pareto set of non-dominated solutions. The application of the methodology is illustrated on conceptual and detailed multi-criteria and multidisciplinary shape design problems. Results indicate the practicality and robustness of the framework to find optimal shapes and trade—offs between the disciplinary analyses and to produce a set of non dominated solutions of an optimal Pareto front to the designer.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Experts in injection molding often refer to previous solutions to find a mold design similar to the current mold and use previous successful molding process parameters with intuitive adjustment and modification as a start for the new molding application. This approach saves a substantial amount of time and cost in experimental based corrective actions which are required in order to reach optimum molding conditions. A Case-Based Reasoning (CBR) System can perform the same task by retrieving a similar case which is applied to the new case from the case library and uses the modification rules to adapt a solution to the new case. Therefore, a CBR System can simulate human e~pertise in injection molding process design. This research is aimed at developing an interactive Hybrid Expert System to reduce expert dependency needed on the production floor. The Hybrid Expert System (HES) is comprised of CBR, flow analysis, post-processor and trouble shooting systems. The HES can provide the first set of operating parameters in order to achieve moldability condition and producing moldings free of stress cracks and warpage. In this work C++ programming language is used to implement the expert system. The Case-Based Reasoning sub-system is constructed to derive the optimum magnitude of process parameters in the cavity. Toward this end the Flow Analysis sub-system is employed to calculate the pressure drop and temperature difference in the feed system to determine the required magnitude of parameters at the nozzle. The Post-Processor is implemented to convert the molding parameters to machine setting parameters. The parameters designed by HES are implemented using the injection molding machine. In the presence of any molding defect, a trouble shooting subsystem can determine which combination of process parameters must be changed iii during the process to deal with possible variations. Constraints in relation to the application of this HES are as follows. - flow length (L) constraint: 40 mm < L < I 00 mm, - flow thickness (Th) constraint: -flow type: - material types: I mm < Th < 4 mm, unidirectional flow, High Impact Polystyrene (HIPS) and Acrylic. In order to test the HES, experiments were conducted and satisfactory results were obtained.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A group key exchange (GKE) protocol allows a set of parties to agree upon a common secret session key over a public network. In this thesis, we focus on designing efficient GKE protocols using public key techniques and appropriately revising security models for GKE protocols. For the purpose of modelling and analysing the security of GKE protocols we apply the widely accepted computational complexity approach. The contributions of the thesis to the area of GKE protocols are manifold. We propose the first GKE protocol that requires only one round of communication and is proven secure in the standard model. Our protocol is generically constructed from a key encapsulation mechanism (KEM). We also suggest an efficient KEM from the literature, which satisfies the underlying security notion, to instantiate the generic protocol. We then concentrate on enhancing the security of one-round GKE protocols. A new model of security for forward secure GKE protocols is introduced and a generic one-round GKE protocol with forward security is then presented. The security of this protocol is also proven in the standard model. We also propose an efficient forward secure encryption scheme that can be used to instantiate the generic GKE protocol. Our next contributions are to the security models of GKE protocols. We observe that the analysis of GKE protocols has not been as extensive as that of two-party key exchange protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for GKE protocols. We model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure against KCI attacks. A new proof of security for an existing GKE protocol is given under the revised model assuming random oracles. Subsequently, we treat the security of GKE protocols in the universal composability (UC) framework. We present a new UC ideal functionality for GKE protocols capturing the security attribute of contributiveness. An existing protocol with minor revisions is then shown to realize our functionality in the random oracle model. Finally, we explore the possibility of constructing GKE protocols in the attribute-based setting. We introduce the concept of attribute-based group key exchange (AB-GKE). A security model for AB-GKE and a one-round AB-GKE protocol satisfying our security notion are presented. The protocol is generically constructed from a new cryptographic primitive called encapsulation policy attribute-based KEM (EP-AB-KEM), which we introduce in this thesis. We also present a new EP-AB-KEM with a proof of security assuming generic groups and random oracles. The EP-AB-KEM can be used to instantiate our generic AB-GKE protocol.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents the outcomes of a research project, which focused on developing a set of surrogate parameters to evaluate urban stormwater quality using simulated rainfall. Use of surrogate parameters has the potential to enhance the rapid generation of urban stormwater quality data based on on-site measurements and thereby reduce resource intensive laboratory analysis. The samples collected from rainfall simulations were tested for a range of physico-chemical parameters which are key indicators of nutrients, solids and organic matter. The analysis revealed that [total dissolved solids (TDS) and dissolved organic carbon (DOC)]; [total solids (TS) and total organic carbon (TOC)]; [turbidity (TTU)]; [electrical conductivity (EC)]; [TTU and EC] as appropriate surrogate parameters for dissolved total nitrogen (DTN), total phosphorus (TP), total suspended solids (TSS), TDS and TS respectively. Relationships obtained for DTN-TDS, DTN-DOC, and TP-TS demonstrated good portability potential. The portability of the relationship developed for TP and TOC was found to be unsatisfactory. The relationship developed for TDS-EC and TS-EC also demonstrated poor portability.