891 resultados para commemoration and memory


Relevância:

80.00% 80.00%

Publicador:

Resumo:

Memoir, 288 pages. An account of journeys made by the author from Australia to Iceland as a way of interrogating notions of cultural belonging, family, and homecoming. "In 1990, Kári Gíslason travelled to Iceland to meet his father for the first time. What he finds is not what he expected. Born from a secret liaison between a British mother and an Icelandic father, Kári Gíslason was the subject of a promise – a promise elicited from his father to not reveal his identity. The Icelandic city of Reykjavík, where Kári was born, was also home to his father and his father’s wife and five children – none of whom knew of Kári’s existence. Moving regularly between Iceland and Australia, he grew up aware of his father’s identity, but understanding that it was the subject of a secret pact between his parents. At the age of 27, he makes a decision to break the pact and contacts his father’s other family. What follows, and what leads him there, makes for a riveting journey over landscapes, time and memory. Kári travels from the freezing cold winters of Iceland to the shark net at Sydney’s Balmoral, an unsettled life in the English countryside and the harsh yellow summer of Brisbane, and back again. He traces the steps of his mother who answered an ad in The Times for an English-speaking secretary in 1970 and found herself in Iceland among the ‘Army of Foreign Secretaries’, and in the arms of a secret lover. Iceland becomes the substitute for the father Kári never really knew as he discovers the meaning of ‘home’ and closes the circle of his own fatherless life."-- publisher website

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper present an efficient method using system state sampling technique in Monte Carlo simulation for reliability evaluation of multi-area power systems, at Hierarchical Level One (HLI). System state sampling is one of the common methods used in Monte Carlo simulation. The cpu time and memory requirement can be a problem, using this method. Combination of analytical and Monte Carlo method known as Hybrid method, as presented in this paper, can enhance the efficiency of the solution. Incorporation of load model in this study can be utilised either by sampling or enumeration. Both cases are examined in this paper, by application of the methods on Roy Billinton Test System(RBTS).

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, we apply the approach of Berbain et al. to Trivium-like ciphers and perform new algebraic analyses on them, namely Trivium and its reduced versions: Trivium-N, Bivium-A and Bivium-B. In doing so, we answer an open question in the literature. We demonstrate a new algebraic attack on Bivium-A. This attack requires less time and memory than previous techniques which use the F4 algorithm to recover Bivium-A's initial state. Though our attacks on Bivium-B, Trivium and Trivium-N are worse than exhaustive keysearch, the systems of equations which are constructed are smaller and less complex compared to previous algebraic analysis. Factors which can affect the complexity of our attack on Trivium-like ciphers are discussed in detail.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This research is an autoethnographic investigation of consumption experiences, public and quasi-public spaces, and their relationship to community within an inner city neighbourhood. The research specifically focuses on the gentrifying inner city, where class-based processes of change can have implications for people’s abilities to remain within, or feel connected to place. However, the thesis draws on broader theories of the throwntogetherness of the contemporary city (e.g., Amin and Thrift, 2002; Massey 2005) to argue that the city is a space where place-based meanings cannot be seen to be fixed, and are instead better understood as events of place – based on ever shifting interrelations between the trajectories of people and things. This perspective argues the experience of belonging to community is not just born of a social encounter, but also draws on the physical and symbolic elements of the context in which it is situated. The thesis particularly explores the ways people construct identifications within this shifting urban environment. As such, consumption practices and spaces offer one important lens through which to explore the interplay of the physical, social and symbolic. Consumer research tells us that consumption practices can facilitate experiences in which identity-defining meaning can be generated and shared. Consumption spaces can also support different kinds of collective identification – as anchoring realms for specific cultural groups or exposure realms that enable individuals to share in the identification practices of others with limited risk (Aubert-Gamet & Cova, 1999). Furthermore, the consumption-based lifestyles that gentrifying inner city neighbourhoods both support and encourage can also mean that consumption practices may be a key reason that people are moving through public space. That is, consumption practices and spaces may provide a purpose for which – and spatial frame against which – our everyday interactions and connections with people and objects are undertaken within such neighbourhoods. The purpose of this investigation then was to delve into the subjectivities at the heart of identifying with places, using the lens of our consumption-based experiences within them. The enquiry describes individual and collective identifications and emotional connections, and explores how these arise within and through our experiences within public and quasi-public spaces. It then theorises these ‘imaginings’ as representative of an experience of community. To do so, it draws on theories of imagination and its relation to community. Theories of imagined community remind us that both the values and identities of community are held together by projections that create relational links out of objects and shared practices (e.g., Benedict Anderson, 2006; Urry, 2000). Drawing on broader theories of the processes of the imagination, this thesis suggests that an interplay between reflexivity and fantasy – which are products of the critical and the fascinated consciousness – plays a role in this imagining of community (e.g., Brann, 1991; Ricoeur, 1994). This thesis therefore seeks to explore how these processes of imagining are implicated within the construction of an experience of belonging to neighbourhood-based community through consumption practices and the public and quasi-public spaces that frame them. The key question of this thesis is how do an individual’s consumption practices work to construct an imagined presence of neighbourhood-based community? Given the focus on public and quasi-public spaces and our experiences within them, the research also asked how do experiences in the public and quasi-public spaces that frame these practices contribute to the construction of this imagined presence? This investigation of imagining community through consumption practices is based on my own experiences of moving to, and attempting to construct community connections within, an inner city neighbourhood in Melbourne, Australia. To do so, I adopted autoethnographic methodology. This is because autoethnography provides the methodological tools through which one can explore and make visible the subjectivities inherent within the lived experiences of interest to the thesis (Ellis, 2004). I describe imagining community through consumption as an extension of a placebased self. This self is manifest through personal identification in consumption spaces that operate as anchoring realms for specific cultural groups, as well as through a broader imagining of spaces, people, and practices as connected through experiences within realms of exposure. However, this is a process that oscillates through cycles of identification; these anchor one within place personally, but also disrupt those attachments. This instability can force one to question the orientation and motives of these imaginings, and reframe them according to different spaces and reference groups in ways that can also work to construct a more anonymous and, conversely, more achievable collective identification. All the while, the ‘I’ at the heart of this identification is in an ongoing process of negotiation, and similarly, the imagined community is never complete. That is, imagining community is a negotiation, with people and spaces – but mostly with the different identifications of the self. This thesis has been undertaken by publication, and thus the process of imagining community is explored and described through four papers. Of these, the first two focus on specific types of consumption spaces – a bar and a shopping centre – and consider the ways that anchoring and exposure within these spaces support the process of imagining community. The third paper examines the ways that the public and quasi-public spaces that make up the broader neighbourhood context are themselves throwntogether as a realm of exposure, and considers the ways this shapes my imaginings of this neighbourhood as community. The final paper develops a theory of imagined community, as a process of comparison and contrast with imagined others, to provide a summative conceptualisation of the first three papers. The first paper, chapter five, explores this process of comparison and contrast in relation to authenticity, which in itself is a subjective assessment of identity. This chapter was written as a direct response to the recent work of Zukin (2010), and draws on theories of authenticity as applied to personal and collective identification practices by consumer researchers Arnould and Price (2000). In this chapter, I describe how my assessments of the authenticity of my anchoring experiences within one specific consumption space, a neighbourhood bar, are evaluated in comparison to my observations of and affective reactions to the social practices of another group of residents in a different consumption space, the local shopping centre. Chapter five also provides an overview of the key sites and experiences that are considered in more detail in the following two chapters. In chapter six, I again draw on my experiences within the bar introduced in chapter five, this time to explore the process of developing a regular identity within a specific consumption space. Addressing the popular theory of the cafe or bar as third place (Oldenburg, 1999), this paper considers the purpose of developing anchored relationships with people within specific consumption spaces, and explores the different ways this may be achieved in an urban context where the mobilities and lifestyle practices of residents complicate the idea of a consumption space as an anchoring or third place. In doing so, this chapter also considers the manner in which this type of regular identification may be seen to be the beginning of the process of imagining community. In chapter seven, I consider the ways the broader public spaces of the neighbourhood work cumulatively to expose different aspects of its identity by following my everyday movements through the neighbourhood’s shopping centre and main street. Drawing on the theories of Urry (2000), Massey (2005), and Amin (2007, 2008), this chapter describes how these spaces operate as exposure realms, enabling the expression of different senses of the neighbourhood’s spaces, times, cultures, and identities through their physical, social, and symbolic elements. Yet they also enable them to be united: through habitual pathways, group practices of appropriation of space, and memory traces that construct connections between objects and experiences. This chapter describes this as a process of exposure to these different elements. Our imagination begins to expand the scope of the frames onto which it projects an imagined presence; it searches for patterns within the physical, social, and symbolic environment and draws connections between people and practices across spaces. As the final paper, chapter eight, deduces, it is in making these connections that one constructs the objects and shared practices of imagined community. This chapter describes this as an imagining of neighbourhood as a place-based extension of the self, and then explores the ways in which I drew on physical, social, and symbolic elements in an attempt to construct a fit between the neighbourhood’s offerings and my desires for place-based identity definition. This was as a cumulative but fragmented process, in which positive and negative experiences of interaction and identification with people and things were searched for their potential to operate as the objects and shared practices of imagined community. This chapter describes these connections as constructed through interplay between reflexivity and fantasy, as the imagination seeks balance between desires for experiences of belonging, and the complexities of constructing them within the throwntogether context of the contemporary city. The conclusion of the thesis describes the process of imagining community as a reflexive fantasy, that is, as a product of both the critical and fascinated consciousness (Ricoeur, 1994). It suggests that the fascinated consciousness imbues experiences with hope and desire, which the reflexive imagining can turn to disappointment and shame as it critically reflects on the reality of those fascinated projections. At the same time, the reflexive imagination also searches the practices of others for affirmation of those projections, effectively seeking to prove the reality of the fantasy of the imagined community.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Liuwei Dihuang Wan (LWD), a classic Chinese medicinal formulae, has been used to improve or restore declined functions related to aging and geriatric diseases, such as impaired mobility, vision, hearing, cognition and memory. It has attracted increasingly much attention as one of the most popular and valuable herbal medicines. However, the systematic analysis of the chemical constituents of LDW is difficult and thus has not been well established. In this paper, a rapid, sensitive and reliable ultra-performance liquid chromatography with electrospray ionization quadrupole time-of-flight high-definition mass spectrometry (UPLC-ESI-Q-TOF-MS) method with automated MetaboLynx analysis in positive and negative ion mode was established to characterize the chemical constituents of LDW. The analysis was performed on a Waters UPLCTM HSS T3 using a gradient elution system. MS/MS fragmentation behavior was proposed for aiding the structural identification of the components. Under the optimized conditions, a total of 50 peaks were tentatively characterized by comparing the retention time and MS data. It is concluded that a rapid and robust platform based on UPLC-ESI-Q-TOF-MS has been successfully developed for globally identifying multiple-constituents of traditional Chinese medicine prescriptions. This is the first report on systematic analysis of the chemical constituents of LDW. This article is protected by copyright. All rights reserved.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In the brain, membrane associated nongenomic steroid receptors can induce fast-acting responses to ion conductance and second messenger systems of neurons. Emerging data suggest that membrane associated glucocorticoid and mineralocorticoid receptors may directly regulate synaptic excitability during times of stress when adrenal hormones are elevated. As the key neuron signaling interface, the synapse is involved in learning and memory, including traumatic memories during times of stress. The lateral amygdala is a key site for synaptic plasticity underlying conditioned fear, which can both trigger and be coincident with the stress response. A large body of electrophysiological data shows rapid regulation of neuronal excitability by steroid hormone receptors. Despite the importance of these receptors, to date, only the glucocorticoid receptor has been anatomically localized to the membrane. We investigated the subcellular sites of mineralocorticoid receptors in the lateral amygdala of the Sprague-Dawley rat. Immunoblot analysis revealed the presence of mineralocorticoid receptors in the amygdala. Using electron microscopy, we found mineralocorticoid receptors expressed at both nuclear including: glutamatergic and GABAergic neurons and extra nuclear sites including: presynaptic terminals, neuronal dendrites, and dendritic spines. Importantly we also observed mineralocorticoid receptors at postsynaptic membrane densities of excitatory synapses. These data provide direct anatomical evidence supporting the concept that, at some synapses, synaptic transmission is regulated by mineralocorticoid receptors. Thus part of the stress signaling response in the brain is a direct modulation of the synapse itself by adrenal steroids.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper presents a new framework for distributed intrusion detection based on taint marking. Our system tracks information flows between applications of multiple hosts gathered in groups (i.e., sets of hosts sharing the same distributed information flow policy) by attaching taint labels to system objects such as files, sockets, Inter Process Communication (IPC) abstractions, and memory mappings. Labels are carried over the network by tainting network packets. A distributed information flow policy is defined for each group at the host level by labeling information and defining how users and applications can legally access, alter or transfer information towards other trusted or untrusted hosts. As opposed to existing approaches, where information is most often represented by two security levels (low/high, public/private, etc.), our model identifies each piece of information within a distributed system, and defines their legal interaction in a fine-grained manner. Hosts store and exchange security labels in a peer to peer fashion, and there is no central monitor. Our IDS is implemented in the Linux kernel as a Linux Security Module (LSM) and runs standard software on commodity hardware with no required modification. The only trusted code is our modified operating system kernel. We finally present a scenario of intrusion in a web service running on multiple hosts, and show how our distributed IDS is able to report security violations at each host level.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, we apply the algebraic attack approach of Berbain et al. to Trivium-like ciphers and perform new analyses on them. We demonstrate a new algebraic attack on Bivium-A. This attack requires less time and memory than previous techniques to recover Bivium-A's initial state. Though our attacks on Bivium-B, Trivium and Trivium-N are worse than exhaustive keysearch, the systems of equations which are constructed are smaller and less complex compared to previous algebraic analyses. We also answer an open question posed by Berbain et al. on the feasibility of applying their technique on Trivium-like ciphers. Factors which can affect the complexity of our attack on Trivium-like ciphers are discussed in detail. Analysis of Bivium-B and Trivium-N are omitted from this manuscript. The full paper is available on the IACR ePrint Archive.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Satirical poem on social media, literary reviews and memory

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Adult neural stem cells (NSCs) play important roles in learning and memory and are negatively impacted by neurological disease. It is known that biochemical and genetic factors regulate self-renewal and differentiation, and it has recently been suggested that mechanical and solid-state cues, such as extracellular matrix (ECM) stiffness, can also regulate the functions of NSCs and other stem cell types. However, relatively little is known of the molecular mechanisms through which stem cells transduce mechanical inputs into fate decisions, the extent to which mechanical inputs instruct fate decisions versus select for or against lineage-committed blast populations, or the in vivo relevance of mechanotransductive signaling molecules in native stem cell niches. Here we demonstrate that ECM-derived mechanical signals act through Rho GTPases to activate the cellular contractility machinery in a key early window during differentiation to regulate NSC lineage commitment. Furthermore, culturing NSCs on increasingly stiff ECMs enhances RhoA and Cdc42 activation, increases NSC stiffness, and suppresses neurogenesis. Likewise, inhibiting RhoA and Cdc42 or downstream regulators of cellular contractility rescues NSCs from stiff matrix- and Rho GTPase-induced neurosuppression. Importantly, Rho GTPase expression and ECM stiffness do not alter proliferation or apoptosis rates indicating that an instructive rather than selective mechanism modulates lineage distributions. Finally, in the adult brain, RhoA activation in hippocampal progenitors suppresses neurogenesis, analogous to its effect in vitro. These results establish Rho GTPase-based mechanotransduction and cellular stiffness as biophysical regulators of NSC fate in vitro and RhoA as an important regulatory protein in the hippocampal stem cell niche.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In 2008, Jenny Roche commissioned Jodi Melnick to make the solo Business of the Bloom on her. Four years later, Roche re-enters this piece and draws on their many years of working together to inhabits its ideas and impulses from a new perspective. In this new 'altered copy', Roche refers to this previous work; embellishing, redirecting and abstracting moments. By reinterpreting both her earlier self and footage of Melnick dancing a reworked version of the solo in performance, Roche connects with the polyvalent nature of both interpretation and memory. This reworked version outlines the relationship that dancers have to movement traces that circulate after a dancing event. Suzanne Ravn (2009) found that dancers experienced the reapperance of movement traces from previous works when moving. Martin Nachbar (2012) writing from his first-person perspective as a dancer, describes the dancer who discerns between the past of movement that is remembered and the current moment of its performance. He outlines how past and present movement experiences cohabitate in the embodied present. Timmy de Laet (2012) identifies the emerging trait of re-enactment in contemporary dance, in which contemporary artists such as Nachbar dialogue with past choreographies to comment on the various mnemonic dimensions of dance. De Laet (2012) explains that the function of these works are not to preserve the past choreographies as might be achieved through reconstruction but to contemplate creatively issues of ephemerality and preservation of dance. Altered copy addresses this dialogue between the past and present body.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

We have developed a Hierarchical Look-Ahead Trajectory Model (HiLAM) that incorporates the firing pattern of medial entorhinal grid cells in a planning circuit that includes interactions with hippocampus and prefrontal cortex. We show the model’s flexibility in representing large real world environments using odometry information obtained from challenging video sequences. We acquire the visual data from a camera mounted on a small tele-operated vehicle. The camera has a panoramic field of view with its focal point approximately 5 cm above the ground level, similar to what would be expected from a rat’s point of view. Using established algorithms for calculating perceptual speed from the apparent rate of visual change over time, we generate raw dead reckoning information which loses spatial fidelity over time due to error accumulation. We rectify the loss of fidelity by exploiting the loop-closure detection ability of a biologically inspired, robot navigation model termed RatSLAM. The rectified motion information serves as a velocity input to the HiLAM to encode the environment in the form of grid cell and place cell maps. Finally, we show goal directed path planning results of HiLAM in two different environments, an indoor square maze used in rodent experiments and an outdoor arena more than two orders of magnitude larger than the indoor maze. Together these results bridge for the first time the gap between higher fidelity bio-inspired navigation models (HiLAM) and more abstracted but highly functional bio-inspired robotic mapping systems (RatSLAM), and move from simulated environments into real-world studies in rodent-sized arenas and beyond.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The text elaborates on the creation of Candlestick Park and Parque de la Pedra Tosca as landscape architectural productions that integrated cultural and ecological processes in its spatialization as a response to scarcity and memory

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This text is the outcome of a conversation with Manuel Aires Mateus (Aires Mateus Arquitectos) and discusses the importance of architecture and memory in contemporary architectural productions