926 resultados para Tuft, Harry
Severus Snape : The Complexity and Unconventional Heroism of Severus Snape in the Harry Potter Books
Resumo:
Being an evildoer and being evil is not always the same thing; author J.K Rowling’s character Professor Severus Snape from the Harry Potter series is balancing on that very line. Although being unfair and mean to the protagonist Harry Potter all through the series, Professor Snape is revealed as a hero in the seventh book Harry Potter and the Deathly Hallows (2007). This essay focuses on some of the complex psychological reasons as to why Snape acts the way he does towards Harry and why many readers consider him to be just as great a hero as the protagonist. It argues that his difficult upbringing is the cause of his complexity and the series of books are analyzed from a structuralist perspective, using A.J Greimas’ actantial model and Frank Kermode’s theories about endings and plot twists. Snape’s hate for Harry’s father, caused by years of bullying, is examined as well as his love for Harry’s mother. This essay also discusses in what ways Snape’s change of allegiance, brought on by his eternal love for Harry’s mother, is a great aid in defeating the Dark Lord.
Resumo:
Tämä tutkielma käsittelee henkilönnimien käännösstrategioita neljän ensimmäisen Harry Potter -kirjan suomennoksissa ja ranskannoksissa. Tutkimuksessa verrataan kvantitatiivisesti suomentajan ja ranskantajan käyttämiä käännösstrategioita ja pyritään löytämään lainalaisuuksia. Alkuhypoteeseina ovat, että suomentaja olisi käyttänyt useimmiten strategianaan käännöstä, ja että ranskantaja olisi useimmiten päätynyt suoraan lainaan. Lisäksi tutkitaan, onko henkilöhahmon tyypillä, esimerkiksi, onko kyseessä eläin, taulu vai aave, ollut vaikutusta käytettyyn käännösstrategiaan. Strategioiden luokitteluun käytettiin Minna Saarelman (2008) kirjallisuuden erisnimien käännösstrategioiden luokittelua. Hahmotyyppien luokittelu muodostettiin aineistona toimivien kirjojen aikaisemman tuntemuksen perusteella. Keskeisimmät tulokset ovat, että suomentaja ja ranskantaja ovat käyttäneet yhtälailla pääasiallisena käännösstrategianaan nimen suoraa lainaa. Itse asiassa lainojen osuus kummissakin käännöksissä oli varsin huomattava. Yllättävä tulos oli, että suomennoksissa käännösten osuus oli varsin pieni verrattuna lainojen määrään. Hahmotyypillä ei havaittu olevan suoranaista vaikutusta valittuun käännösstrategiaan. Katseena tulevaisuuteen mahdollisiksi jatkotutkimuksen aiheiksi suositellaan kvantitatiivista tutkimusta kunkin erisnimen esiintymismääristä. Tällaisella tutkimuksella voitaisiin tutkia, miksi esimerkiksi suomennoksia lukiessa syntyy vaikutelma, että valtaosa henkilönnimistä on käännetty eikä suinkaan lainattu.
Resumo:
Syftet med denna översiktliga artikel är att beskriva tre författares sätt att överföra erfarenheter av naturupplevelser förknippade med skog och skogsbruk till ett textmedium. Textstudierna är relaterade till en pragmatisk kontext där den faktiska betydelsen av naturskildringar för praktiskt bruk är av vikt. Med utgångspunkt i dessa mer deskriptiva avdelningar kommer jag avslutningsvis att försöka kategorisera naturskildringsmetoderna på ett sådant sätt att kategorierna skulle kunna fungera som grova matriser för beskrivningar av naturskildringar överlag.
Resumo:
Concert Program
Resumo:
The MPEG-21 Multimedia Framework provides for controlled distribution of multimedia works through its Intellectual Property Management and Protection ("IPMP") Components and Rights Expression Language ("MPEG REL"). The IPMP Components provide a framework by which the components of an MPEG-21 digital item can be protected from undesired access, while MPEG REL provides a mechanism for describing the conditions under which a component of a digital item may be used and distributed. This chapter describes how the IPMP Components and MPEG REL were used to implement a series of digital rights management applications at the Cooperative Research Centre for Smart Internet Technology in Australia. While the IPMP Components and MPEG REL were initially designed to facilitate the protection of copyright, the applications also show how the technology can be adapted to the protection of private personal information and sensitive corporate information.
Resumo:
The study objective was to determine whether the ‘cardiac decompensation score’ could identify cardiac decompensation in a patient with existing cardiac compromise managed with intraaortic balloon counterpulsation (IABP). A one-group, posttest-only design was utilised to collect observations in 2003 from IABP recipients treated in the intensive care unit of a 450 bed Australian, government funded, public, cardiothoracic, tertiary referral hospital. Twenty-three consecutive IABP recipients were enrolled, four of whom died in ICU (17.4%). All non-survivors exhibited primarily rising scores over the observation period (p < 0.001) and had final scores of 25 or higher. In contrast, the maximum score obtained by a survivor at any time was 15. Regardless of survival, scores for the 23 participants were generally decreasing immediately following therapy escalation (p = 0.016). Further reflecting these changes in patient support, there was also a trend for scores to move from rising to falling at such treatment escalations (p = 0.024). This pilot study indicates the ‘cardiac decompensation score’ to accurately represent changes in heart function specific to an individual patient. Use of the score in conjunction with IABP may lead to earlier identification of changes occurring in a patient's cardiac function and thus facilitate improved IABP outcomes.
Resumo:
An initialisation process is a key component in modern stream cipher design. A well-designed initialisation process should ensure that each key-IV pair generates a different key stream. In this paper, we analyse two ciphers, A5/1 and Mixer, for which this does not happen due to state convergence. We show how the state convergence problem occurs and estimate the effective key-space in each case.
Resumo:
Sfinks is a shift register based stream cipher designed for hardware implementation. The initialisation state update function is different from the state update function used for keystream generation. We demonstrate state convergence during the initialisation process, even though the individual components used in the initialisation are one-to-one. However, the combination of these components is not one-to-one.
Resumo:
Both the SSS and SOBER-t32 stream cipher designs use a single word-based shift register and a nonlinear filter function to produce keystream. In this paper we show that the algebraic attack method previously applied to SOBER-t32 is prevented from succeeding on SSS by the use of the key dependent substitution box (SBox) in the nonlinear filter of SSS. Additional assumptions and modifications to the SSS cipher in an attempt to enable algebraic analysis result in other difficulties that also render the algebraic attack infeasible. Based on these results, we conclude that a well chosen key-dependent substitution box used in the nonlinear filter of the stream cipher provides resistance against such algebraic attacks.
Resumo:
This paper presents a model for generating a MAC tag with a stream cipher using the input message indirectly. Several recent proposals represent instances of this model with slightly different options. We investigate the security of this model for different options, and identify cases which permit forgery attacks. Based on this, we present a new forgery attack on version 1.4 of 128-EIA3. Design recommendations to enhance the security of proposals following this general model are given.