916 resultados para Harry Truman


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This book examines different aspects of Asian popular culture, including films, TV, music, comedy, folklore, cultural icons, the Internet and theme parks. It raises important questions such as – What are the implications of popularity of Asian popular culture for globalization? Do regional forces impede the globalizing of cultures? Or does the Asian popular culture flow act as a catalyst or conveying channel for cultural globalization? Does the globalization of culture pose a threat to local culture? It addresses two seemingly contradictory and yet parallel processes in the circulation of Asian popular culture: the interconnectedness between Asian popular culture and western culture in an era of cultural globalization that turns subjects such as Pokémon, Hip Hop or Cosmopolitan into truly global phenomena, and the local derivatives and versions of global culture that are necessarily disconnected from their origins in order to cater for the local market. It thereby presents a collective argument that, whilst local social formations, and patterns of consumption and participation in Asia are still very much dependent on global cultural developments and the phenomena of modernity, yet such dependence is often concretized, reshaped and distorted by the local media to cater for the local market. Contents: Introduction: Asian Popular Culture: The Global (Dis)continuity Anthony Y.H. Fung Part 1: The Dominance of Global Continuity: Cultural Localization and Adaptation 1. One Region, Two Modernities: Disneyland in Tokyo and Hong Kong Micky Lee and Anthony Y.H. Fung 2. Comic Travels: Disney Publishing in the People’s Republic of China Jennifer Altehenger 3. When Chinese Youth Meet Harry Potter: Translating Consumption and Middle Class Identification John Nguyet Erni 4.New Forms of Transborder Visuality in Urban China: Saving Face for Magazine Covers Eric Kit-Wai Ma 5. Cultural Consumption and Masculinity: A Case Study of GQ Magazine Covers in Taiwan Hong-Chi Shiau Part 2: Global Discontinuity: The Local Absorption of Global Culture 6. An Unlocalized and Unglobalized Subculture: English Language Independent Music in Singapore Kai Khiun Liew and Shzr Ee Tan 7. The Localized Production of Jamaican Music in Thailand Viriya Sawangchot 8. Consuming Online Games in Taiwan: Global Games and Local Market Lai-Chi Chen 9. The Rise of the Korean Cinema in Inbound and Outbound Globalization Shin Dong Kim Part 3: Cultural Domestication: A New Form of Global Continuity 10. Pocket Capitalism and Virtual Intimacy: Pokémon as a Symptom of Post-Industrial Youth Culture Anne Allison 11. Playing the Global Game: Japan Brand and Globalization Kukhee Choo Part 4: China as a Rising Market: Cultural Antagonism and Globalization 12. China’s New Creative Strategy: The Utilization of Cultural Soft Power and New Markets Michael Keane and Bonnie Liu 13. Renationalizing Hong Kong Cinema: The Gathering Force of the Mainland Market Michael Curtin

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A5/1 is a shift register based stream cipher which provides privacy for the GSM system. In this paper, we analyse the loading of the secret key and IV during the initialisation process of A5/1. We demonstrate the existence of weak key-IV pairs in the A5/1 cipher due to this loading process; these weak key-IV pairs may generate one, two or three registers containing all-zero values, which may lead in turn to weak keystream sequences. In the case where two or three registers contain only zeros, we describe a distinguisher which leads to a complete decryption of the affected messages.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a model for the generation of a MAC tag using a stream cipher. The input message is used indirectly to control segments of the keystream that form the MAC tag. Several recent proposals can be considered as instances of this general model, as they all perform message accumulation in this way. However, they use slightly different processes in the message preparation and finalisation phases. We examine the security of this model for different options and against different types of attack, and conclude that the indirect injection model can be used to generate MAC tags securely for certain combinations of options. Careful consideration is required at the design stage to avoid combinations of options that result in susceptibility to forgery attacks. Additionally, some implementations may be vulnerable to side-channel attacks if used in Authenticated Encryption (AE) algorithms. We give design recommendations to provide resistance to these attacks for proposals following this model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Non-linear feedback shift register (NLFSR) ciphers are cryptographic tools of choice of the industry especially for mobile communication. Their attractive feature is a high efficiency when implemented in hardware or software. However, the main problem of NLFSR ciphers is that their security is still not well investigated. The paper makes a progress in the study of the security of NLFSR ciphers. In particular, we show a distinguishing attack on linearly filtered NLFSR (or LF-NLFSR) ciphers. We extend the attack to a linear combination of LF-NLFSRs. We investigate the security of a modified version of the Grain stream cipher and show its vulnerability to both key recovery and distinguishing attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, we apply the algebraic attack approach of Berbain et al. to Trivium-like ciphers and perform new analyses on them. We demonstrate a new algebraic attack on Bivium-A. This attack requires less time and memory than previous techniques to recover Bivium-A's initial state. Though our attacks on Bivium-B, Trivium and Trivium-N are worse than exhaustive keysearch, the systems of equations which are constructed are smaller and less complex compared to previous algebraic analyses. We also answer an open question posed by Berbain et al. on the feasibility of applying their technique on Trivium-like ciphers. Factors which can affect the complexity of our attack on Trivium-like ciphers are discussed in detail. Analysis of Bivium-B and Trivium-N are omitted from this manuscript. The full paper is available on the IACR ePrint Archive.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We describe a new species of dasyurid marsupial within the genus Antechinus that was previously known as a northern outlier of Dusky Antechinus (A. swainsonii). The Black-tailed Antechinus, Antechinus arktos sp. nov., is known only from areas of high altitude and high rainfall on the Tweed Volcano caldera of far south-east Queensland and north-east New South Wales, Australia. Antechinus arktos formerly sheltered under the taxonomic umbrella of A. swainsonii mimetes, the widespread mainland form of Dusky Antechinus. With the benefit of genetic hindsight, some striking morphological differences are herein resolved: A. s. mimetes is more uniformly deep brown-black to grizzled grey-brown from head to rump, with brownish (clove brown—raw umber) hair on the upper surface of the hindfoot and tail, whereas A. arktos is more vibrantly coloured, with a marked change from greyish-brown head to orange-brown rump, fuscous black on the upper surface of the hindfoot and dense, short fur on the evenly black tail. Further, A. arktos has marked orange-brown fur on the upper and lower eyelid, cheek and in front of the ear and very long guard hairs all over the body; these characters are more subtle in A. s. mimetes. There are striking genetic differences between the two species: at mtDNA, A. s. mimetes from north-east New South Wales is 10% divergent to A. arktos from its type locality at Springbrook NP, Queensland. In contrast, the Ebor A. s. mimetes clades closely with conspecifics from ACT and Victoria. A. arktos skulls are strikingly different to all subspecies of A. swainsonii. A. arktos are markedly larger than A. s. mimetes and A. s. swainsonii (Tasmania) for a range of craniodental measures. Antechinus arktos were historically found at a few proximate mountainous sites in south-east Queensland, and have only recently been recorded from or near the type locality. Even there, the species is likely in low abundance. The Black-tailed Antechinus has plausibly been detrimentally affected by climate change in recent decades, and will be at further risk with increasing warming trends.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Antechinus argentus sp. nov. is currently only known from the plateau at the eastern escarpment of Kroombit Tops National Park, about 400km NNW of Brisbane and 60km SSW of Gladstone, south-east Queensland, Australia. Antechinus flavipes (Waterhouse) is also known from Kroombit Tops NP, 4.5km W of the nearest known population of A. argentus; A. mysticus Baker, Mutton and Van Dyck has yet to be found within Kroombit Tops, but is known from museum specimens taken at Bulburin NP, just 40km ESE, as well as extant populations about 400km to both the south-east and north-west of Kroombit NP. A. argentus can be easily distinguished in the field, having an overall silvery/grey appearance with much paler silver feet and drabber deep greyish-olive rump than A. flavipes, which has distinctive yellow-orange toned feet, rump and tail-base; A. argentus fur is also less coarse than that of A. flavipes. A. argentus has a striking silver-grey head, neck and shoulders, with pale, slightly broken eye-rings, which distinguish it from A. mysticus which has a more subtle greyish-brown head, pale buff dabs of eyeliner and more colourful brownish-yellow rump. Features of the dentary can also be used for identification: A. argentus differs from A. flavipes in having smaller molar teeth, as well as a narrower and smaller skull and from A. mysticus in having on average a narrower snout, smaller skull and dentary lengths and smaller posterior palatal vacuities in the skull. A. argentus is strongly divergent genetically (at mtDNA) from both A. flavipes (9.0–11.2%) and A. mysticus (7.2–7.5%), and forms a very strongly supported clade to the exclusion of all other antechinus species, in both mtDNA and combined (mtDNA and nDNA) phylogenies inferred here. We are yet to make detailed surveys in search of A. argentus from forested areas to the immediate east and north of Kroombit Tops. However, A. mysticus has only been found at these sites in low densities in decades past and not at all in several recent trapping expeditions conducted by the authors. With similar habitat types in close geographic proximity, it is plausible that A. argentus may be found outside Kroombit. Nevertheless, it is striking that from a range of surveys conducted at Kroombit Tops in the last 15 years and intensive surveys by the authors in the last 3 years, totalling more than 5 080 trap nights, just 13 A. argentus have been captured from two sites less than 6 km apart. If this is even close to the true geographic extent of the species, it would possess one of the smallest distributions of an Australian mammal species. With several threats identified, we tentatively recommend that A. argentus be listed as Endangered, pending an exhaustive trapping survey of Kroombit and surrounds.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Western economies are highly dependent on service innovation for their growth and employment. An important driver for economic growth is, therefore, the development of new, innovative services like electronic services, mobile end-user services, new financial or personalized services. Service innovation joins four trends that currently shape the western economies: the growing importance of services, the need for innovation, changes in consumer and business markets, and the advancements in information and communication technology (ICT).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this chapter we will make the transition towards the design of business models and the related critical issues. We develop a model that helps us understand the causalities that play a role in understanding the viability and feasibility of the business models, i.e. long-term profitability and market adoption. We argue that designing viable business models requires balancing the requirements and interests of the actors involved, within and between the various business model domains. Requirements in the service domain guide the design choices in the technology domain, which in turn affect network formation and the financial arrangements. It is important to understand the Critical Design Issues (CDIs) involved in business models and their interdependencies. In this chapter, we present the Critical Design Issues involved in designing mobile service business models, and demonstrate how they are linked to the Critical Success Factors (CSFs) with regard to business model viability. This results in a causal model for understanding business model viability, as well as providing grounding for the business model design approach outlined in Chapter 5.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many research and development projects that are carried out by firms and research institutes are technology-oriented. There is a large gap between research results, for instance in the form of prototypes, and the actual service offerings to customers. This becomes problematic when an organization wants to bring the results from such a project to the market, which will be particularly troublesome when the research results do not readily fit traditional offerings, roles and capabilities in the industry, nor the financial arrangements. In this chapter, we discuss the design of a business model for a mobile health service, starting with a research prototype that was developed for patients with chronic lower back pain, using the STOF model and method. In a number of design sessions, an initial business model was developed that identifies critical design issues that play a role in moving from prototype toward market deployment. The business model serves as a starting-point to identify and commit relevant stakeholders, and to draw up a business plan and case. This chapter is structured as follows. We begin by discussing the need for mobile health business models. Next, the research and development project on mobile health and the prototype for chronic lower back pain patients are introduced, after which the approach used to develop the business model is described, followed by a discussion of the developed mobile health business model for each of the STOF domains. We conclude with a discussion regarding the lessons that were learned with respect to the development of a business model on the basis of a prototype.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Common Scrambling Algorithm Stream Cipher (CSASC) is a shift register based stream cipher designed to encrypt digital video broadcast. CSA-SC produces a pseudo-random binary sequence that is used to mask the contents of the transmission. In this paper, we analyse the initialisation process of the CSA-SC keystream generator and demonstrate weaknesses which lead to state convergence, slid pairs and shifted keystreams. As a result, the cipher may be vulnerable to distinguishing attacks, time-memory-data trade-off attacks or slide attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present CHURNs, a method for providing freshness and authentication assurances to human users. In computer-to-computer protocols, it has long been accepted that assurances of freshness such as random nonces are required to prevent replay attacks. Typically, no such assurance of freshness is presented to a human in a human-and-computer protocol. A Computer–HUman Recognisable Nonce (CHURN) is a computer-aided random sequence that the human has a measure of control over and input into. Our approach overcomes limitations such as ‘humans cannot do random’ and that humans will follow the easiest path. Our findings show that CHURNs are significantly more random than values produced by unaided humans; that humans may be used as a second source of randomness, and we give measurements as to how much randomness can be gained from humans using our approach; and that our CHURN-generator makes the user feel more in control, thus removing the need for complete trust in devices and underlying protocols. We give an example of how a CHURN may be used to provide assurances of freshness and authentication for humans in a widely used protocol.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Audio recording of 10 tracks funded by Legacy, The Australia Council, and Arts Queensland. The recordings explore the untold stories of soldiers' wives through song. It features the vocal and songwriting talents of Jackie Marshall, Bertie Page, Sahara Beck, Emma Bosworth, Roz Pappalardo, and Kristy Apps. Recorded, Mixed, Mastered, and Co-Produced by Phil Graham.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The rat theta class glutathione S-transferase (GST) 5-5 has been shown to affect the mutagenicity of halogenated alkanes and epoxides. In Salmonella typhimurium TA1535 expressing the rat GST5-5 the number of revertants was increased compared to the control strain by CH2Br2, ethylene dibromide (EDB) and 1,2,3,4-diepoxybutane (BDE); in contrast, mutagenicity of 1,2-epoxy-3-(4'-nitrophenoxy)propane (EPNP) was reduced. S.typhimurium TA1535 cells were transformed with an expression plasmid carrying the cDNA of the human theta ortholog GST1-1 either in sense or antisense orientation, the latter being the control. These transformed bacteria were utilized for mutagenicity assays. Mutagenicity of EDB, BDE, CH2Br2, epibromohydrin and 1,3-dichloroacetone was higher in the S.typhimurium TA1535 expressing GSTT1-1 than in the control strain. The expression of active enzyme did not affect the mutagenicity of 1,2-epoxy-3-butene or propylene oxide, GSTT1-1 expression reduced the mutagenicity of EPNP. Glutathione S-transferase 5-5 and GSTT1-1 modulate genotoxicity of several industrially important chemicals in the same way. Polymorphism of the GSTT1 locus in humans may therefore cause differences in cancer susceptibility between the two phenotypes.