991 resultados para Space consumption
Resumo:
This paper reads season 1 of the critically-acclaimed Canadian television series “Slings & Arrows” (2003). This six-episode series is set in a fictionalised version of the Stratford Festival, and tells the story of a plagued production of Shakespeare’s Hamlet. It follows the play’s rehearsal after the death of the festival’s artistic director; Geoffrey Tennant (himself a plagued Hamlet) takes over the role of director, and must face his past in order to produce a Hamlet that will save the festival, redeem his reputation, and repair his interpersonal relationships. Drawing on popular and theatrical understandings of Shakespeare’s play, the series negotiates tropes of metatheatre, filiality, cultural production and consumption, in order to demonstrate the ongoing relevance and legitimacy of “Shakespeare” in the twenty-first century. The “Slings & Arrows” narrative revolves around the doubled-plot of Hamlet and the experiences of the company mounting Hamlet. In quite obvious ways, the show thus thematises ways in which Shakespeare can be used to read one’s own life and world. In the broader sense, however, the show also offers theatre/performance as a catalyst for affect. In doing so, the show functions as a relatively straight adaptation of Hamlet, and a metatheatrical/metafictional commentary on the functions of Hamlet within contemporary culture. In Shakespeare’s play, the production of “The Mouse-Trap” proves, both to Hamlet and the audience, the legitimacy of the ghost’s claims. Similarly, in “Slings & Arrows”, the successful performance of Hamlet legitimises Geoffrey’s position as artistic director of the festival, and affirms for the viewer the value of Shakespearean production in contemporary culture. In each text, theatre/performance enables and legitimises a son carrying out a dead father’s wishes in order to restore or reproduce socio-cultural order. The metatheatrics of these gestures engage the reader/viewer in a self-reflexive process whereby the ‘value’ of theatre is thematised and performed, and the consumer is positioned as the arbiter and agent of that value: complicit in its production even as they are the site of its consumption.
Resumo:
This paper considers the scope to develop an approach to the spatial dimensions of media and culture that is informed by cultural-economic geography. I refer to cultural-economic geography as that strand of research in the field of geography that has been informed on the one hand by the ‘cultural turn’ in both geographical and economic thought, and which focuses on the relationship between, space, knowledge and identity in the spheres of production and consumption, and on the other to work by geographers that has sought to map the scale and significance of the cultural or creative industries as new drivers of the global economy. The paper considers the extent to which this work enables those engaged with urban cultural policy to get beyond some of the impasses that have arisen with the development of “creative cities” policies derived from the work of authors such as Richard Florida as well as the business management literature on clusters. It will frame these debates in the context of recent work by Michael Curtin on media capitals, and the question of whether cities in East Asia can emerge as media capitals from outside of the US-Europe-dominated transnational cultural axis.
Resumo:
Entertainment is consumer-driven culture, and some consumers of entertainment products display uncommon levels of loyalty towards their favourite sports star, actor or musician. This essay examines fanaticism and loyalty through the prism of consumer rituals. Further, a Ritual-Loyalty model is proposed to help investigate the relationship between the constructs. Finally, the paper offers directions for future research regarding entertainment consumers.
Resumo:
The present study tested the utility of an extended version of the theory of planned behaviour that included a measure of planning, in the prediction of eating foods low in saturated fats among adults diagnosed with Type 2 diabetes and/or cardiovascular disease. Participants (N = 184) completed questionnaires assessing standard theory of planned behaviour measures (attitude, subjective norm, and perceived behavioural control) and the additional volitional variable of planning in relation to eating foods low in saturated fats. Self-report consumption of foods low insaturated fats was assessed 1 month later. In partial support of the theory of planned behaviour, results indicated that attitude and subjective norm predicted intentions to eat foods low in saturated fats and intentions and perceived behavioural control predicted the consumption of foods low in saturated fats. As an additional variable, planning predicted the consumption of foods low in saturated fats directly and also mediated the intention–behaviour and perceived behavioural control–behaviour relationships, suggesting an important role for planning as a post-intentional construct determining healthy eating choices. Suggestions are offered for interventions designed to improve adherence to healthy eating recommendations for people diagnosed with these chronic conditions with a specific emphasis on the steps and activities that are required to promote a healthier lifestyle.
Resumo:
A hierarchical structure is used to represent the content of the semi-structured documents such as XML and XHTML. The traditional Vector Space Model (VSM) is not sufficient to represent both the structure and the content of such web documents. Hence in this paper, we introduce a novel method of representing the XML documents in Tensor Space Model (TSM) and then utilize it for clustering. Empirical analysis shows that the proposed method is scalable for a real-life dataset as well as the factorized matrices produced from the proposed method helps to improve the quality of clusters due to the enriched document representation with both the structure and the content information.
Resumo:
In this paper, we concern ourselves with finding a control strategy that minimizes energy consumption along a trajectory connecting two given configurations. We develop an algorithm, based on our previous work with the time optimal problem, which provides implementable control strategies that are energy efficient. We find an interesting correlation between the duration of these trajectories and the optimal duration. We present the algorithm, control strategy and experimental results from our test-bed vehicle.
Resumo:
The Australian beach is now accepted as a significant part of Australian national culture and identity. However, Huntsman (2001) and Booth (2001) both believe that the beach is dying: “intellectuals have failed to apply to the beach the attention they have lavished on the bush…” (Huntsman 2001, 218). Yet the beach remains a prominent image in contemporary literature and film; authors such as Tim Winton and Robert Drewe frequently set their stories in and around the coast. Although initially considered a space of myth (Fiske, Hodge, and Turner 1987), Meaghan Morris labelled the beach as ‘ordinary’ (1998), and as recently as 2001 in the wake of the Sydney Olympic Games, Bonner, McKee, and Mackay termed the beach ‘tacky’ and ‘familiar’. The beach, it appears, defies an easy categorisation. In fact, I believe the beach is more than merely mythic or ordinary, or a combination of the two. Instead it is an imaginative space, seamlessly shifting its metaphorical meanings dependent on readings of the texts. My studies examine the beach through five common beach myths; this paper will explore the myth of the beach as an egalitarian space. Contemporary Australian national texts no longer conform to these mythical representations – (in fact, was the beach ever a space of equality?), instead creating new definitions for the beach space that continually shifts in meaning. Recent texts such as Tim Winton’s Breath (2008) and Stephen Orr’s Time’s Long Ruin (2010) lay a more complex metaphorical meaning upon the beach space. This paper will explore the beach as a space of egalitarianism in conjunction with recent Australian fiction and films in order to discover how the contemporary beach is represented.
Resumo:
Traditional approaches to the use of machine learning algorithms do not provide a method to learn multiple tasks in one-shot on an embodied robot. It is proposed that grounding actions within the sensory space leads to the development of action-state relationships which can be re-used despite a change in task. A novel approach called an Experience Network is developed and assessed on a real-world robot required to perform three separate tasks. After grounded representations were developed in the initial task, only minimal further learning was required to perform the second and third task.
Resumo:
Most salad vegetables are eaten fresh by consumers. However, raw vegetables may pose a risk of transmitting opportunistic bacteria to immunocompromised people, including cystic fibrosis (CF) patients. In particular, CF patients are vulnerable to chronic Pseudomonas aeruginosa lung infections and this organism is the primary cause of morbidity and mortality in this group. Clonal variants of P. aeruginosa have been identified as emerging threats to people afflicted with CF; however it has not yet been proven from where these clones originate or how they are transmitted. Due to the organisms‟ aquatic environmental niche, it was hypothesised that vegetables may be a source of these clones. To test this hypothesis, lettuce, tomatoes, mushrooms and bean sprout packages (n = 150) were analysed from a green grocer, supermarket and farmers‟ market within the Brisbane region, availability permitting. The internal and external surfaces of the vegetables were separately analysed for the presence of clonal strains of P. aeruginosa using washings and homogenisation techniques, respectively. This separation was in an attempt to establish which surface was contaminated, so that recommendations could be made to decrease or eliminate P. aeruginosa from these foods prior to consumption. Soil and water samples (n = 17) from local farms were also analysed for the presence of P. aeruginosa. Presumptive identification of isolates recovered from these environmental samples was made based on growth on Cetrimide agar at 42°C, presence of the cytochrome-oxidase enzyme and inability to ferment lactose. P. aeruginosa duplex real-time polymerase chain reaction assay (PAduplex) was performed on all bacterial isolates presumptively identified as P. aeruginosa. Enterobacterial repetitive intergenic consensus strain typing PCR (ERIC-PCR) was subsequently performed on confirmed bacterial isolates. Although 72 P. aeruginosa were isolated, none of these proved to be clonal strains. The significance of these findings is that vegetables may pose a risk of transmitting sporadic strains of P. aeruginosa to people afflicted with CF and possibly, other immunocompromised people.
Resumo:
Current knowledge about the relationship between transport disadvantage and activity space size is limited to urban areas, and as a result, very little is known to date about this link in a rural context. In addition, although research has identified transport disadvantaged groups based on their size of activity spaces, these studies have, however, not empirically explained such differences and the result is often a poor identification of the problems facing disadvantaged groups. Research has shown that transport disadvantage varies over time. The static nature of analysis using the activity space concept in previous research studies has lacked the ability to identify transport disadvantage in time. Activity space is a dynamic concept; and therefore possesses a great potential in capturing temporal variations in behaviour and access opportunities. This research derives measures of the size and fullness of activity spaces for 157 individuals for weekdays, weekends, and for a week using weekly activity-travel diary data from three case study areas located in rural Northern Ireland. Four focus groups were also conducted in order to triangulate the quantitative findings and to explain the differences between different socio-spatial groups. The findings of this research show that despite having a smaller sized activity space, individuals were not disadvantaged because they were able to access their required activities locally. Car-ownership was found to be an important life line in rural areas. Temporal disaggregation of the data reveals that this is true only on weekends due to a lack of public transport services. In addition, despite activity spaces being at a similar size, the fullness of activity spaces of low-income individuals was found to be significantly lower compared to their high-income counterparts. Focus group data shows that financial constraint, poor connections both between public transport services and between transport routes and opportunities forced individuals to participate in activities located along the main transport corridors.
Resumo:
This report provides an evaluation of the Capalaba Youth Space.The evaluation included elements of process and impact evaluation and used a participatory action research approach informed by engagement processes, focus groups, a community survey, interviews and secondary analysis of existing data.
Resumo:
Estimating and predicting degradation processes of engineering assets is crucial for reducing the cost and insuring the productivity of enterprises. Assisted by modern condition monitoring (CM) technologies, most asset degradation processes can be revealed by various degradation indicators extracted from CM data. Maintenance strategies developed using these degradation indicators (i.e. condition-based maintenance) are more cost-effective, because unnecessary maintenance activities are avoided when an asset is still in a decent health state. A practical difficulty in condition-based maintenance (CBM) is that degradation indicators extracted from CM data can only partially reveal asset health states in most situations. Underestimating this uncertainty in relationships between degradation indicators and health states can cause excessive false alarms or failures without pre-alarms. The state space model provides an efficient approach to describe a degradation process using these indicators that can only partially reveal health states. However, existing state space models that describe asset degradation processes largely depend on assumptions such as, discrete time, discrete state, linearity, and Gaussianity. The discrete time assumption requires that failures and inspections only happen at fixed intervals. The discrete state assumption entails discretising continuous degradation indicators, which requires expert knowledge and often introduces additional errors. The linear and Gaussian assumptions are not consistent with nonlinear and irreversible degradation processes in most engineering assets. This research proposes a Gamma-based state space model that does not have discrete time, discrete state, linear and Gaussian assumptions to model partially observable degradation processes. Monte Carlo-based algorithms are developed to estimate model parameters and asset remaining useful lives. In addition, this research also develops a continuous state partially observable semi-Markov decision process (POSMDP) to model a degradation process that follows the Gamma-based state space model and is under various maintenance strategies. Optimal maintenance strategies are obtained by solving the POSMDP. Simulation studies through the MATLAB are performed; case studies using the data from an accelerated life test of a gearbox and a liquefied natural gas industry are also conducted. The results show that the proposed Monte Carlo-based EM algorithm can estimate model parameters accurately. The results also show that the proposed Gamma-based state space model have better fitness result than linear and Gaussian state space models when used to process monotonically increasing degradation data in the accelerated life test of a gear box. Furthermore, both simulation studies and case studies show that the prediction algorithm based on the Gamma-based state space model can identify the mean value and confidence interval of asset remaining useful lives accurately. In addition, the simulation study shows that the proposed maintenance strategy optimisation method based on the POSMDP is more flexible than that assumes a predetermined strategy structure and uses the renewal theory. Moreover, the simulation study also shows that the proposed maintenance optimisation method can obtain more cost-effective strategies than a recently published maintenance strategy optimisation method by optimising the next maintenance activity and the waiting time till the next maintenance activity simultaneously.
Resumo:
The traditional Vector Space Model (VSM) is not able to represent both the structure and the content of XML documents. This paper introduces a novel method of representing XML documents in a Tensor Space Model (TSM) and then utilizing it for clustering. Empirical analysis shows that the proposed method is scalable for large-sized datasets; as well, the factorized matrices produced from the proposed method help to improve the quality of clusters through the enriched document representation of both structure and content information.
Resumo:
A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.