18 resultados para illusion

em Queensland University of Technology - ePrints Archive


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study investigated the Kinaesthetic Fusion Effect (KFE) first described by Craske and Kenny in 1981. In Experiment 1 the study did not replicate these findings following a change in the reporting method used by participants. Participants did not perceive any reduction in the sagittal separation of a button pressed by the index finger of one arm and a probe touching the other, following repeated exposure to the tactile stimuli present on both unseen arms. This study’s failure to replicate the widely-cited KFE as described by Craske et al. (1984) suggests that it may be contingent on several aspects of visual information, especially the availability of a specific visual reference, the role of instructions regarding gaze direction, and the potential use of a line of sight strategy when referring felt positions to an interposed surface. In addition, a foreshortening effect was found; this may result from a line-of-sight judgment and represent a feature of the reporting method used. Finally, this research will benefit future studies that require participants to report the perceived locations of the unseen limbs. Experiment 2 investigated the KFE when the visual reference was removed and participants made reports of touched position, blindfolded. A number of interesting outcomes arose from this change and may provide clarification to the phenomena.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Thatcher Illusion is generally discussed as a phenomenon related to face perception. Nonetheless, we show that compellingly strong Thatcher Effects can be elicited with non-face stimuli, provided that the stimulus set has a familiar standard configuration and a canonical view. Apparently, the Thatcher Illusion is not about faces, nor is it about Thatcher. It just might, however, be about Britain...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

At present, the rate of small firm adoption of the Internet's ubiquitous World Wide Web (the web) far exceeds the actual exploitation its commercial potential. An inability to strategically acquire, comprehend and use external knowledge is proposed as a major barrier to optimal exploitation of the Internet. This paper discusses the limitations of applying market orientation theory to explain and guide small firm exploitation of the web. Absorptive capacity is introduced as an alternative theory that when viewed from an evolutionary perspective provides potentially more insightful discussion. An inability to detect emerging business model dominant designs is suggested to be a mixture of the nature of the technology that supports the Internet and underdeveloped small firm knowledge processing capabilities. We conclude with consideration of the practical and theoretical implications that arise from the paper.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis consists of a confessional narrative, What My Mother Doesn’t Know, and an accompanying exegesis, And Why I Should (Maybe) Tell Her. The creative piece employs the confessional mode as a subversive device in three separate narratives, each of which situates the bed as a site of resistance. The exegesis investigates how this self-disclosure in a domestic space flouts the governing rules of self-representation, specifically: telling the truth, respecting privacy and displaying normalcy. The female confession, I argue, creates an alternative space in women’s autobiography where notions of truth-telling can be undermined, the political dimensions of personal experience can be uncovered and the discourse of normality can be negotiated. In particular, women’s confessions told in, on or about the bed, dismantle the genre’s illusion of self and confirm the representative aspects of women’s experience. Framed within these parameters of power and powerlessness, the exegesis includes textual analyses of Charlotte Perkins Gilman’s The Yellow Wallpaper (1892), Tracey Emin’s My Bed (1999) and Lauren Slater’s Lying (2000), each of which exposes in a bedroom space, the author’s most obscure, intimate and traumatic experiences. Situated firmly within and against the genre’s traditional masculine domain, the exegesis also includes mediations on the creative work that validate the bed as my fabric for confession.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dangerous Places is a novel about the gap between mythological (or 'dreamed') constructions of reality and actual life. The story centres on V en, a married woman with two young children. Her love for her children is fiercely protective and encompassing, but she feels alienated from her husband and to a certain extent her society; so when her first love, Yanni, re-enters her life,she is strongly tempted to resume her affair with him. She is however seduced more by the memories she has 'mythologized' about him than by his physical reality; in the course of the novel she is forced to come to terms with her own delusions. The subplot of the novel involves other characters who are caught between illusion and reality as well, and who deal with 'truth' in differing ways. The themes of the book are explored using a number of structures which underlie and support the surface story. The Greek myths of Adonis/ Aphrodite and Hades/Persephone are framing agents for the plot, and the setting in contemporary Brisbane and North Stradbroke Island is symbolic.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper examines discussions of Generation Y within higher education discourse, arguing the sector’s use of the term to describe students is misguided for three reasons. First, portraying students as belonging to Generation Y homogenises people undertaking higher education as young, middle-class and technologically literate. Second, speaking of Generation Y students allows constructivism to be reinvented as a ‘new’ learning and teaching philosophy. Third, the Generation Y university student has become a central figure in concerns about technology’s role in learning and teaching. While the notion of the ‘Generation Y student’ creates the illusion that higher education institutions understand their constituents, ultimately, it is of little value in explaining young adults’ educational experiences.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Moon appears to be much larger closer to the horizon than when higher in the sky. This is called the ‘Moon Illusion’ since the observed size of the Moon is not actually larger when the Moon is just above the horizon. This article describes a technique for verifying that the observed size of the Moon in not larger on the horizon. The technique can be easily performed in a high school teaching environment. Moreover, the technique demonstrates the surprising fact that the observed size of the Moon is actually smaller on the horizon due to atmospheric refraction. For the purposes of this paper, several images of the moon were taken with the Moon close to the horizon and close to the zenith. Images were processed using a free program called ImageJ. The Moon was found to be 5.73 ±0.04% smaller in area on the horizon then at the zenith.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study investigated how contemporary puppet-based theatre can create deeply imaginative experiences for adult audiences. Designed to interrogate the potential effects of double-vision (Tillis, 1992), the theories of the sublime (Kant, 2008; 2003) and the uncanny (Jentsch, 1906; Freud, 1919) were used to create a series of creative guidelines. As practice-led research, the project embraced an iterative approach consisting of two cycles for creative experimentation, and a third for the creation of the final performance work The Harbinger, presented as a part of La Boite Theatre Company’s mainstage season. A theoretical investigation was also conducted to inform the developing practice.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article analyses Yeondoo Jung's exhibition at MAAP Space, Brisbane. Jung's video artworks works often reveal their mechanisms of pictorial illusion, and expose the apparatuses by which still and moving images are constructed more generally. This article examines the two specific works exhibited at MAAP Space, and situates them in the contexts of moving image theory and practice.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mobility across space is an exemplary characteristic of the global era and an important aspect of the cultural experience of many people in advanced industrialised nations. Mobility evokes powerful images that effectively counter any illusion of stationary life and provide a break from the insularity of the local and parochial. High levels of mobility are simultaneously a fact, a necessity and a cultural aspiration. In recent times, debates about mobility in social theory have considered the relationship between mobility and cosmopolitan culture and identities (Hannerz, 1990, Urry, 1990, 2000, Beck, 2006). Against this backdrop, this paper also draws on some of the more recent discussions about the emergence of globalised and cosmopolitan identities among young people (Beck and Beck-Gernsheim, 2009). Using data from a longitudinal study of young people in Queensland, this paper provides an insight into young people’s aspirations about future mobility. The data affirm Skeggs’ (2004) comment that mobility is an unequal resource, and demonstrate that aspirations of future mobility reflect numerous social, economic and cultural realities of young people’s lives. This inevitably leads us to problematise the established, and often abstract, nexus between cosmopolitanism and mobility in contemporary debates about cosmopolitanism.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

2012 saw the publication of competing and complementary lines of Australian “classics”: “A&R Australian Classics” (HarperCollins) and “Text Classics” (Text Publishing). While Angus and Robertson were key in establishing a canon of Australian children’s classics in the twentieth century, it was the Text Classics line which included a selection of young people’s titles in their 2013. In turn, Penguin Australia launched a selection of “Australian Children’s Classics”. In so doing, these publishers were drawing on particular literary and visual cultural traditions in Australian children’s literature. Public assertions of a particular selection of children’s books reveals not only contemporary assumptions about desirable childhood experiences but about the operation of nostalgia therein. In encouraging Australian adults to judge books by their covers, such gestures imply that Australian children may be similarly understood. Importantly, the illusion of unity, sameness, and legibility which is promised by circumscribed canons of “classic” children’s literature may well imply a desire for similarly illusory, unified, legible, “classic” childhood. This paper attends to public attempts to materialise (and legitimise) a canon of classic Australian children’s literature. In particular, it considers the ways in which publishing, postage stamps, and book awards make visible a range of children’s books, but do so in order to either fix or efface the content or meaning of the books themselves. Moving between assertions of the best books for children from the 1980s to today, and of the social values circulated within those books, this paper considers the possibilities and problematics of an Australian children’s canon.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Two of the three cross-curriculum priorities for the national Australian Curriculum prescribed by the Australian Curriculum Assessment and Reporting Authority (ACARA) are focussed on what might be called diversity education: “Aboriginal and Torres Strait Islander histories and culture”, and "Asia and Australia's Engagement with Asia” (ACARA, “Cross”). One need not be versed in complex rhetorical theory to understand that, laudable and legitimate as such priorities are, their existence implies that mainstream education in Australia has been or is characterised by the marginalisation or erasure of Australia's history—the original Indigenous cultures are not only living and vibrant today, but also have tens of thousands of years’ “head start” on Australia’s settler cultures—and of its geography—Australia is, after all, located in some physical proximity to Asia. Some might even suggest that Australia is in Asia. These temporal and spatial “forgettings” constitute a kind of cultural perversity which the cross-curricular priorities both seek to address and serve to reinscribe. Even as ACARA requires Australian school students to engage with Aboriginal and Asian histories, cultures, societies, they imply that such histories, cultures, and societies are “diverse”, that they are not those of the students in Australian classrooms; producing them as objects of study rather than as lived experience. This should not necessarily be surprising. Michael W. Apple has provocatively argued that: “one of the perverse effects of a national curriculum actually will be to ‘legitimise inequality.’ It may in fact help create the illusion that whatever the massive differences in schools, they all have something in common” (18). In the Australian context, attempts to mitigate such perversity are articulated via the selection of literary texts. As educators move to resource ACARA’s cross-curricular priorities, ACARA notes that “Teachers and schools are best placed to make decisions about the selection of texts in their teaching and learning programs that address the content in the Australian Curriculum while also meeting the needs of the students in their classes” (ACARA, “Advice”). This assertion appears on a webpage called “Advice on selection of literary texts” which is notable first and foremost for its total lack of any literary texts being named, and its list of weblinks pointing to lists of texts compiled elsewhere, by other organisations, and in the main, compiled to serve agendas other than the Australian curriculum. One of the major resources referred to by ACARA for literary text selection is the Children’s Book Council of Australia (CBCA). Of course, the CBCA’s annual book awards do not share ACARA’s educational priorities, but do have a history of being drawn upon by schools as a curriculum resource. In this paper, I consider the literary texts which have been prized by the CBCA in recent years attending to their engagements with Aboriginal cultures.