948 resultados para Sound walk
Resumo:
Guy Webster is a sound artist who has been featured in numerous festivals, galleries, conferences and theatres in Australia, Japan, UK and Europe. As part of the Transmute Collective he developed the immersive soundscape of Intimate Transactions. On 2nd November, 2005 Jilliann Hamilton and Jeremy Yuille met with Guy Webster to discuss his approach to immersion in soundsapes.
Resumo:
This article compares YouTube and the National Film and Sound Archive (NFSA) as resources for television historians interested in viewing old Australian television programs. The author searched for seventeen important television programs, identified in a previous research project, to compare what was available in the two archives and how easy it was to find. The analysis focused on differences in curatorial practices of accessioning and cataloguing. NFSA is stronger in current affairs and older programs, while YouTube is stronger in game shows and lifestyle programs. YouTube is stronger than the NFSA on “human interest” material—births, marriages, and deaths. YouTube accessioning more strongly accords with popular histories of Australian television. Both NFSA and YouTube offer complete episodes of programs, while YouTube also offers many short clips of “moments.” YouTube has more surprising pieces of rare ephemera. YouTube cataloguing is more reliable than that of the NFSA, with fewer broken links. The YouTube metadata can be searched more intuitively. The NFSA generally provides more useful reference information about production and broadcast dates.
Resumo:
In recent decades, assessment practices within Australian law schools have moved from the overwhelming use of end-of-year closed-book examinations to an increase in the use of a wider range of techniques. This shift is often characterised as providing a ‘better’ learning environment for students, contributing more positively to their own ‘personal development’ within higher education, or, considered along the lines of critical legal thought, as ‘liberating’ them from the ‘conservatising’ and ‘indoctrinating’ effects of the power relations that operate in law schools. This paper seeks to render problematic such liberal-progressive narratives about these changes to law school assessment practices. It will do so by utilising the work of French historian and philosopher Michel Foucault on power, arguing that the current range of assessment techniques demonstrates a shift in the ‘economy’ of power relations within the law school. Rather than ‘liberating’ students from relations of power, these practices actually extend the power relations through which students are governed. This analysis is intended to inform legal education research and assessment practice by providing a far more nuanced conceptual framework than one that seeks to ‘free’ law students from these ‘repressive’ practices, or hopes to ‘objectively’ contribute to their ‘personal development’.
Resumo:
Characteristics of modal sound radiation of finite cylindrical shells are studied using finite element and boundary element methods in this paper. In the low frequency range, modal radiation efficiencies of finite cylindrical shells are found to asymptotically approach those of the corresponding infinite cylindrical shell when structural trace wavelengths of the cylindrical shells are greater than the acoustic wavelength. Modal radiation efficiencies for each group of modes having the same circumferential modal index decrease as the axial modal index increases. They converge to each other when the axial trace wavelength is much greater than the circumferential trace wavelength. The mechanism leading to lower radiation efficiency of modes with higher circumferential modal index of short cylinders is explained. Similar to those of flat plate panels, change in slope or waviness is observed in modal radiation efficiency curves of modes with higher order axial modal index at medium frequencies. This is attributed to the interference of sound radiated by neighbouring vibrating cells when the distance between nodal lines of a vibrating mode is in the same order or smaller than the acoustic wavelength. Effects of the internal sound field on modal radiation efficiencies of a finite open-end cylinder are discussed.
Resumo:
Despite the dangers associated with drink walking, limited research is currently available regarding the factors which influence individuals to engage in this risky behaviour. This study examined the influence of psychosocial factors upon individuals’ intentions to drink walk across four experimental scenarios (and a control condition). Specifically, a 2 × 2 repeated measures design was utilised in which all of the scenarios incorporated a risky pedestrian crossing situation (i.e., a pedestrian crossing against a red man signal) but differed according to the level of group identity (i.e., low/strangers and high/friends) and conformity (low and high). Individuals were assessed for their intentions to drink walk within each of these different scenarios. Undergraduate students (N = 151), aged 17–30 years, completed a questionnaire. Overall, most of the study's hypotheses were supported with individuals reporting the highest intentions to drink walk when in the presence of friends (i.e., high group identity) and their friends were said to be also crossing against the red man signal (i.e., high conformity). The findings may have significant implications for the design of countermeasures to reduce drink walking. For instance, the current findings would suggest that potentially effective strategies may be to promote resilience to peer influence as well as highlight the negative consequences associated with following the behaviour of other intoxicated pedestrians who are crossing against a red signal.
Resumo:
Sound Thinking provides techniques and approaches to critically listen, think, talk and write about music you hear or make. It provides tips on making music and it encourages regular and deep thinking about music activities, which helps build a musical dialog that leads to deeper understanding.
Resumo:
In microscopic traffic simulators, the interaction between vehicles is considered. The dynamics of the system then becomes an emergent property of the interaction between its components. Such interactions include lane-changing, car-following behaviours and intersection management. Although, in some cases, such simulators produce realistic prediction, they do not allow for an important aspect of the dynamics, that is, the driver-vehicle interaction. This paper introduces a physically sound vehicle-driver model for realistic microscopic simulation. By building a nanoscopic traffic simulation model that uses steering angle and throttle position as parameters, the model aims to overcome unrealistic acceleration and deceleration values, as found in various microscopic simulation tools. A physics engine calculates the driving force of the vehicle, and the preliminary results presented here, show that, through a realistic driver-vehicle-environment simulator, it becomes possible to model realistic driver and vehicle behaviours in a traffic simulation.
Resumo:
This paper presents Capital Music, a mobile application enabling real-time sharing of song choices with collocated urban dwellers. Due to the real-time, location-based peer-to-peer approach of the application, a user experience study was performed utilising the Wizard of Oz method. The study provides insight into how sharing non-privacy sensitive but personal data in an anonymous way can influence the user experience of people in public urban places. We discuss the findings in relation to how Capital Music influences the process of “cocooning” in public urban places, the practice of designing anonymous interactions between collocated strangers, and how the sharing of song choices can create a sense of commonality between anonymous users in the urban space. The outcomes of this study are relevant for future location-based social networking applications that aim to create interactions between collocated strangers.
Resumo:
Proving security of cryptographic schemes, which normally are short algorithms, has been known to be time-consuming and easy to get wrong. Using computers to analyse their security can help to solve the problem. This thesis focuses on methods of using computers to verify security of such schemes in cryptographic models. The contributions of this thesis to automated security proofs of cryptographic schemes can be divided into two groups: indirect and direct techniques. Regarding indirect ones, we propose a technique to verify the security of public-key-based key exchange protocols. Security of such protocols has been able to be proved automatically using an existing tool, but in a noncryptographic model. We show that under some conditions, security in that non-cryptographic model implies security in a common cryptographic one, the Bellare-Rogaway model [11]. The implication enables one to use that existing tool, which was designed to work with a different type of model, in order to achieve security proofs of public-key-based key exchange protocols in a cryptographic model. For direct techniques, we have two contributions. The first is a tool to verify Diffie-Hellmanbased key exchange protocols. In that work, we design a simple programming language for specifying Diffie-Hellman-based key exchange algorithms. The language has a semantics based on a cryptographic model, the Bellare-Rogaway model [11]. From the semantics, we build a Hoare-style logic which allows us to reason about the security of a key exchange algorithm, specified as a pair of initiator and responder programs. The other contribution to the direct technique line is on automated proofs for computational indistinguishability. Unlike the two other contributions, this one does not treat a fixed class of protocols. We construct a generic formalism which allows one to model the security problem of a variety of classes of cryptographic schemes as the indistinguishability between two pieces of information. We also design and implement an algorithm for solving indistinguishability problems. Compared to the two other works, this one covers significantly more types of schemes, but consequently, it can verify only weaker forms of security.
Resumo:
Purpose. To determine whether Australia's Walk to Work Day media campaign resulted in behavioural change among targeted groups. Methods. Pre- and postcampaign telephone surveys of a cohort of adults aged 18 to 65 years (n = 1100, 55% response rate) were randomly sampled from Australian major melropolitan areas. Tests for dependent samples were applied (McNemax chi(2) or paired t-test). Results. Among participants who did not usually actively commute to work was a significant decrease in car only use an increase in walking combined with public transport. Among those who were employed was a significant increase in total time walking (+16 min/wk; t [780] = 2.04, p < .05) and in other moderate physical activity (+120 min/wk; t [1087] = 4.76, p < .005), resulting in a significant decrease in the proportion who were inactive (chi(2) (1) = 6.1, p < .05). Conclusion. Although nonexperimental, the Walk to Work Day initiative elicited short-term changes in targeted behaviors among target groups. Reinforcement by integrating worksite health promotion strategies may be required for sustained effects.
Resumo:
By the end of the 20th century the shift from professional recording studio to personal computer based recording systems was well established (Chadabe 1997) and musicians could increasingly see the benefits of value adding to the musical process by producing their own musical endeavours. At the Queensland University of Technology (QUT) where we were teaching, the need for a musicianship program that took account of these trends was becoming clear. The Sound Media Musicianship unit described in this chapter was developed to fill this need and ran from 1999 through 2010.
Resumo:
Sound tagging has been studied for years. Among all sound types, music, speech, and environmental sound are three hottest research areas. This survey aims to provide an overview about the state-of-the-art development in these areas.We discuss about the meaning of tagging in different sound areas at the beginning of the journey. Some examples of sound tagging applications are introduced in order to illustrate the significance of this research. Typical tagging techniques include manual, automatic, and semi-automatic approaches.After reviewing work in music, speech and environmental sound tagging, we compare them and state the research progress to date. Research gaps are identified for each research area and the common features and discriminations between three areas are discovered as well. Published datasets, tools used by researchers, and evaluation measures frequently applied in the analysis are listed. In the end, we summarise the worldwide distribution of countries dedicated to sound tagging research for years.