7 resultados para digital literature

em DRUM (Digital Repository at the University of Maryland)


Relevância:

40.00% 40.00%

Publicador:

Resumo:

Using scientific methods in the humanities is at the forefront of objective literary analysis. However, processing big data is particularly complex when the subject matter is qualitative rather than numerical. Large volumes of text require specialized tools to produce quantifiable data from ideas and sentiments. Our team researched the extent to which tools such as Weka and MALLET can test hypotheses about qualitative information. We examined the claim that literary commentary exists within political environments and used US periodical articles concerning Russian literature in the early twentieth century as a case study. These tools generated useful quantitative data that allowed us to run stepwise binary logistic regressions. These statistical tests allowed for time series experiments using sea change and emergency models of history, as well as classification experiments with regard to author characteristics, social issues, and sentiment expressed. Both types of experiments supported our claim with varying degrees, but more importantly served as a definitive demonstration that digitally enhanced quantitative forms of analysis can apply to qualitative data. Our findings set the foundation for further experiments in the emerging field of digital humanities.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The word 'impromptu' began to appear in music literature in the early 19th century, specifically as title for a relatively short composition written for solo piano. The first impromptus appear to have been named so by the publishers. However, the composers themselves soon embraced the title to indicate, for the most part, fairly short character pieces. Impromptus do not follow any specific structural pattern, although many are cast in ternary form. The formal design ranges from strict compound ternary in the early impromptus to through-composed and variation forms. The peak of impromptu's popularity undoubtedly came during the middle and late19th century. However, they are still being composed today, albeit much less frequently. Although there have been many variants of impromptus in relation to formal design and harmonic language over the years, the essence of impromptu remains the same: it is still a short character piece with a general feeling of spontaneity. Overall, impromptus may be categorized into several different groups: some appear as part of a larger cycle, such as Dvorak's G minor Impromptu from his Piano Pieces, B. 110; many others use an element of an additional genre that enhances the character ofthe impromptu, such as Liszt's Valse-Impromptu and Antonio Bibalo's Tango Impromptu; yet another group consists of works based on opera themes, such as Liszt's Impromptu Brillant sur des themes de Rossini et Spontini and Czerny's Impromptus et variations sur Oberon, Op. 134. My recording project includes well-known impromptus, such as Schubert's Op. 142 and the four by Chopin, as well as lesser known works that have not been performed or recorded often. There are four impromptus that have been recorded here for the first time, including those written by Leopold Godowsky, Antonio Bibalo, Altin Volaj, and Nikolay Mazhara. I personally requested the two last named composers to contribute impromptus to this project. My selection represents works by twenty composers and reflects the different types of impromptus that have been encountered through almost three hundred years of the genre's existence, from approximately 1817 (VoriSek) to 2008 (Volaj and Mazhara).

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In satisfaction of requirements for a Doctor of Musical Arts degree at the University of Maryland, College Park, three recitals were given consisting of works of the early 21st Century European composers. The works performed on these recitals showcase a variety of compositional styles that explore different qualities of the violin. The purpose of this project was to demonstrate how the war and conflict in Europe and attendant radical cultural and social developments affected these composers. The first recital program includes: Sonata for Violin and Cello and Piece en Forme de Habanera by Maurice Ravel; Op. 30 Mythesfor Violin and Piano by Karol Szymanowski; Concertina for Violin and Piano and Sonata No.2 for Violin Solo by Grazyna Bacewicz. The second recital program consists of: Sonata for Violin and Piano by Leos Janacek; Quartet for the End of Time: movement VIII "Louange a l'Immortalite de Jesus" by Oliver Messiaen; Sonata for Solo Violin by Erwin Schulhoff; and Passacaglia & Fuga for String Trio by Hans Krasa. The third recital highlights the works of Russian composers: Sonata for Violin and Piano Op.134 by Dmitri Shostakovich; and Violin Sonata No.2 in D major Op. 94 by Sergei Prokofiev. These composers represent individual, distinct and fascinating adaptation to events beyond their control as well as their power of transformation. The first recital was performed in collaboration with Hsiang-Ling Hsiao on piano and Gozde Yasar on cello. The second recital was given with Hsiang-Ling Hsiao on piano, Gozde Yasar on cello, and Asli Gultekin Ozek on viola. The third recital was performed with David Ballena on piano. The recitals were recorded on compact discs and are archived within the Digital Repository at the University of Maryland (DRUM).

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This recording dissertation surveys post-1945 literature written for piano trio (violin, violoncello and piano) by ten Danish composers. The literature was first considered for inclusion by searching a database provided by the Danish Music Information Center (www.mic.dk). Scores were rented from the publisher Edition Wilhelm Hansen AS, or purchased from the publisher Samfundet til Udgivelse af Dansk Musik. An additional score published by Viking Musikforlag was used as well. The music was then studied and evaluated for selection. During the selection process, the following criteria were considered: 1) quality of the compositions; 2) recognition of the composers at the national or international level; 3) whether the compositions had been previously recorded; and 4) variety of compositional styles. The selected works are written by Niels Viggo Bentzon, Vagn Holmboe, Anders Koppel, Herman D. Koppel, Bent Lorentzen, Anders Nordentoft, Per Norgard, Michael Nyvang, Karl Aage Rasmussen, and Poul Rovsing Olsen. The selected compositions were practiced, rehearsed, and performed under direct supervision of the composers and other expert musicians. In order to better understand the compositional style of each composer, relevant books, articles, and recordings were researched and studied. This recording dissertation is supported by a written document. A subjective preference for program balance was exercised to determine the order of recorded works. The written document is divided into chapters defined by composer, following the order of the recorded document, which include the composers' biographies and notes referring to the recorded compositions. The recording took place at the Manzius Gaarden, Birkerod, Denmark during three sessions: July 31-August 2, 2002, March 2 and 3, 2003, and June 2-4, 2003. The music for this dissertation was recorded by the members of the Jalina Trio; Line Fredens, violin, Janne Fredens, cello and Natsuki Fukasawa, piano. Aksel Trige, a well-respected recording engineer, was engaged for the recording and editing. Additionally, a Hamburg Steinway concert grand piano was rented and a Joseph Guarnerius filius Andreas Cremona violin (1706) was provided by the Augustinus Fonden, Denmark. The cellist used her own instrument, Vuillaume of Paris (c. 1850). The expense of this recording was partially paid by generous grants from the Augustinus Fonden, the Solist Foreningen af 1921, and the Dansk Musikerforbunds Kollective Rettighedsmidler. The compositions selected for this recording dissertation are assumed to be previously unrecorded, with the exception of Poul Rovsing Olsen's Trio II.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Contemporary integrated circuits are designed and manufactured in a globalized environment leading to concerns of piracy, overproduction and counterfeiting. One class of techniques to combat these threats is circuit obfuscation which seeks to modify the gate-level (or structural) description of a circuit without affecting its functionality in order to increase the complexity and cost of reverse engineering. Most of the existing circuit obfuscation methods are based on the insertion of additional logic (called “key gates”) or camouflaging existing gates in order to make it difficult for a malicious user to get the complete layout information without extensive computations to determine key-gate values. However, when the netlist or the circuit layout, although camouflaged, is available to the attacker, he/she can use advanced logic analysis and circuit simulation tools and Boolean SAT solvers to reveal the unknown gate-level information without exhaustively trying all the input vectors, thus bringing down the complexity of reverse engineering. To counter this problem, some ‘provably secure’ logic encryption algorithms that emphasize methodical selection of camouflaged gates have been proposed previously in literature [1,2,3]. The contribution of this paper is the creation and simulation of a new layout obfuscation method that uses don't care conditions. We also present proof-of-concept of a new functional or logic obfuscation technique that not only conceals, but modifies the circuit functionality in addition to the gate-level description, and can be implemented automatically during the design process. Our layout obfuscation technique utilizes don’t care conditions (namely, Observability and Satisfiability Don’t Cares) inherent in the circuit to camouflage selected gates and modify sub-circuit functionality while meeting the overall circuit specification. Here, camouflaging or obfuscating a gate means replacing the candidate gate by a 4X1 Multiplexer which can be configured to perform all possible 2-input/ 1-output functions as proposed by Bao et al. [4]. It is important to emphasize that our approach not only obfuscates but alters sub-circuit level functionality in an attempt to make IP piracy difficult. The choice of gates to obfuscate determines the effort required to reverse engineer or brute force the design. As such, we propose a method of camouflaged gate selection based on the intersection of output logic cones. By choosing these candidate gates methodically, the complexity of reverse engineering can be made exponential, thus making it computationally very expensive to determine the true circuit functionality. We propose several heuristic algorithms to maximize the RE complexity based on don’t care based obfuscation and methodical gate selection. Thus, the goal of protecting the design IP from malicious end-users is achieved. It also makes it significantly harder for rogue elements in the supply chain to use, copy or replicate the same design with a different logic. We analyze the reverse engineering complexity by applying our obfuscation algorithm on ISCAS-85 benchmarks. Our experimental results indicate that significant reverse engineering complexity can be achieved at minimal design overhead (average area overhead for the proposed layout obfuscation methods is 5.51% and average delay overhead is about 7.732%). We discuss the strengths and limitations of our approach and suggest directions that may lead to improved logic encryption algorithms in the future. References: [1] R. Chakraborty and S. Bhunia, “HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 28, no. 10, pp. 1493–1502, 2009. [2] J. A. Roy, F. Koushanfar, and I. L. Markov, “EPIC: Ending Piracy of Integrated Circuits,” in 2008 Design, Automation and Test in Europe, 2008, pp. 1069–1074. [3] J. Rajendran, M. Sam, O. Sinanoglu, and R. Karri, “Security Analysis of Integrated Circuit Camouflaging,” ACM Conference on Computer Communications and Security, 2013. [4] Bao Liu, Wang, B., "Embedded reconfigurable logic for ASIC design obfuscation against supply chain attacks,"Design, Automation and Test in Europe Conference and Exhibition (DATE), 2014 , vol., no., pp.1,6, 24-28 March 2014.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This dissertation argues that “disaffection” is an overlooked but foundational posture of mid-twentieth-century British and Anglophone literature. Previously misdiagnosed as quietism or apathy, disaffection instead describes how many late modernist writers mediated between their ideological misgivings and the pressure to respond to dire political crises, from the Second World War to the creation of new postcolonial nations. Stylists of disaffection—such as Henry Green, Virginia Woolf, Elizabeth Bowen, and V. S. Naipaul—grappled with how limiting cultural assumptions, for instance, about class and nation, seemed to inhere in particular aesthetic techniques like stream of consciousness or realism. Disaffected literature appeals to but then disrupts a given technique’s projection of these assumptions and the social totality that they imagine. This literary “bait-and-switch” creates a feeling of dysphoria whereby readers experience a text unnervingly different from what they had been led to expect. Recognizing the formative work of literary disaffection in late modernism offers an original way to conceptualize the transition between modernist and postmodernist literature in the twentieth century.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Racism continues to thrive on the Internet. Yet, little is known about racism in online settings and the potential consequences. The purpose of this study was to develop the Perceived Online Racism Scale (PORS), the first measure to assess people’s perceived online racism experiences as they interact with others and consume information on the Internet. Items were developed through a multi-stage process based on literature review, focus-groups, and qualitative data collection. Based on a racially diverse large-scale sample (N = 1023), exploratory and confirmatory factor analyses provided support for a 30-item bifactor model with the following three factors: (a) 14-item PORS-IP (personal experiences of racism in online interactions), (b) 5-item PORS-V (observations of other racial/ethnic minorities being offended), and (c) 11-item PORS-I (consumption of online contents and information denigrating racial/ethnic minorities and highlighting racial injustice in society). Initial construct validity examinations suggest that PORS is significantly linked to psychological distress.