970 resultados para Malayalam handwritten characters
Resumo:
Ruth Finnegan (2006, 179) describes how family myths have the power to provoke images that recur throughout generations. This paper will document my own encounter with such persistent images in the stories of a mother and daughter. Both mother and daughter told stories about encountering cross-dressing men in the streets of Brisbane, and both showed similar anxiety over their own body size. As a creative writer working with oral histories, I found these stories of the disguised body compelling. By drawing on the storytelling strategies and preoccupations present in the interview, I used imagination and fictional techniques to investigate the possibility of symbolic resonance of memories across generations. In her novel Beloved, Toni Morrison (1987) uses the notion of ‘rememory’ to describe how characters actively make and suppress meanings in their recollections. Like Morrison, my writing speaks to notions around the way stories are remembered and told.
Resumo:
The mosaic novel - with its independent 'story-tiles' linking together to form a complete narrative - has the potential to act as a reflection on the periodic resurfacing of unconscious memories in the conscious lives of fictional characters. This project is an exploration of the mosaic text as a fictional analogue of involuntary memory. These concepts are investigated as they appear in traditional fairy tales and engaged with in this thesis's creative component, Sourdough and Other Stories (approximately 80,000 words), a mosaic novel comprising sixteen interconnected 'story-tiles'. Traditional fairy tales are non-reflective and conducive to forgetting (i.e. anti-memory); fairy tale characters are frequently portrayed as psychologically two-dimensional, in that there is no examination of the mental and emotional distress caused when children are stolen/ abandoned/ lost and when adults are exiled. Sourdough and Other Stories is a creative examination of, and attempted to remedy, this lack of psychological depth. This creative work is at once something more than a short story collection, and something that is not a traditional novel, but instead a culmination of two modes of writing. It employs the fairy tale form to explore James' 'thorns in the spirit' (1898, p.199) in fiction; the anxiety caused by separation from familial and community groups. The exegesis, A Story Told in Parts - Sourdough and Other Stories is a critical essay (approximately 20,000 words in length), a companion piece to the mosaic novel, which analyses how my research question proceeded from my creative work, and considers the theoretical underpinnings of the creative work and how it enacts the research question: 'Can a writer use the structural possibilities of the mosaic text to create a fictional work that is an analogue of an involuntary memory?' The cumulative effect of the creative and exegetical works should be that of a dialogue between the two components - each text informing the other and providing alternate but complementary lenses with which to view the research question.
Resumo:
Twitter is a social media service that has managed very successfully to embed itself deeply in the everyday lives of its users. Its short message length (140 characters), and one-way connections (‘following’ rather than ‘friending’) lend themselves effectively to random and regular updates on almost any form of personal or professional activity – and it has found uses from the interpersonal (e.g. boyd et al., 2010) through crisis communication (e.g. Bruns et al., 2012) to political debate (e.g. Burgess & Bruns, 2012). In such uses, Twitter does not necessarily replace existing media channels, such as the broadcast or online offerings of the mainstream media, but often complements them, providing its users with alternative opportunities to contribute more actively to the wider mediasphere. This is true especially where Twitter is used alongside television, as a simple backchannel to live programming or for more sophisticated uses. In this article, we outline four aspects – dimensions – of the way that the ‘old’ medium of television intersects and, in some cases, interacts, with the ‘new’ medium of Twitter.
Resumo:
The 2010 LAGI competition was held on three underutilized sites in the United Arab Emirates. By choosing Staten Island, New York in 2012 the competition organises have again brought into question new roles for public open space in the contemporary city. In the case of the UEA sites, the competition produced many entries which aimed to create a sculpture and by doing so, they attracted people to the selected empty spaces in an arid climate. In a way these proposals were the incubators and the new characters of these empty spaces. The competition was thus successful at advancing understandings of the expanded role of public open spaces in EAU and elsewhere. LAGI 2012 differs significantly to the UAE program because Fresh Kills Park has already been planned as a public open space for New Yorkers - with or without these clean energy sculptures. Furthermore, Fresh Kills Park is already an (gas) energy generating site in its own right. We believe Fresh Kills Park, as a site, presents a problem which somewhat transcends the aims of the competition brief. Advancing a sustainable urban design proposition for the site therefore requires a fundamental reconsideration of the established paradigms public open space. Hence our strategy is to not only create an energy generating, site specific art work, but to create synergy between the public and the site engagement while at the same time complement the idiosyncrasies of the pre-existing engineered landscape. Current PhD research about energy generation in public open spaces informs this work.
Resumo:
For the majority of its producers and consumers, pornography functions as entertainment rather than art. This paper draws on my recent work mapping out entertainment as an area of study (for the new Entertainment Industries programme at Queensland University of Technology) to explore what it means for this object of study to treat it as adult entertainment. Entertainment is audience-centred culture. It is commonly based around characters and story. It encourages seriality, and is unafraid of adaptation. Its dominant mode is fun, its favourite narrative resolution the happy ending. It commonly encourages audience activity and its aesthetics are organized around fast-moving, vulgar spectacle. Its primary purpose is to create an emotional response. In this article I test mainstream pornography against each of these characteristics as a way of mapping out the shape of pornography as it functions in its everyday form, and explain the advantages of such an approach.
Resumo:
Antechinus mysticus sp. nov. occurs in coastal Australia, ranging from just north of the Queensland (Qld)/New South Wales (NSW) border to Mackay (mid-east Qld), and is sympatric with A. flavipes (Waterhouse) and A. subtropicus Van Dyck & Crowther in south-east Qld. The new species can be distinguished in the field, having paler feet and tail base than A. flavipes and a greyish head that merges to buff-yellow on the rump and flanks, compared with the more uniform brown head and body of A. subtropicus and A. stuartii Macleay. Features of the dentary can also be used for identification: A. mysticus differs from A. flavipes in having smaller molar teeth, from A. subtropicus in having a larger gap between front and rear palatal vacuities, and from A. stuartii in having a generally broader snout. Here, we present a morphological analysis of the new species in comparison with every member of the genus, including a discussion of genetic structure and broader evolutionary trends, as well as an identification key to species based on dental characters. It seems likely that the known geographic range of A. mysticus will expand as taxonomic focus on the genus is concentrated in south-east Queensland and north-east New South Wales.
Resumo:
This book has been painstakingly researched by a scholar whose intellectual competencies span several disciplines: history, sociology, criminology, culture, drama and film studies. It is theoretically sophisticated and yet not dense as it reads like a novel with an abundance of interesting complex characters.
Resumo:
Most current computer systems authorise the user at the start of a session and do not detect whether the current user is still the initial authorised user, a substitute user, or an intruder pretending to be a valid user. Therefore, a system that continuously checks the identity of the user throughout the session is necessary without being intrusive to end-user and/or effectively doing this. Such a system is called a continuous authentication system (CAS). Researchers have applied several approaches for CAS and most of these techniques are based on biometrics. These continuous biometric authentication systems (CBAS) are supplied by user traits and characteristics. One of the main types of biometric is keystroke dynamics which has been widely tried and accepted for providing continuous user authentication. Keystroke dynamics is appealing for many reasons. First, it is less obtrusive, since users will be typing on the computer keyboard anyway. Second, it does not require extra hardware. Finally, keystroke dynamics will be available after the authentication step at the start of the computer session. Currently, there is insufficient research in the CBAS with keystroke dynamics field. To date, most of the existing schemes ignore the continuous authentication scenarios which might affect their practicality in different real world applications. Also, the contemporary CBAS with keystroke dynamics approaches use characters sequences as features that are representative of user typing behavior but their selected features criteria do not guarantee features with strong statistical significance which may cause less accurate statistical user-representation. Furthermore, their selected features do not inherently incorporate user typing behavior. Finally, the existing CBAS that are based on keystroke dynamics are typically dependent on pre-defined user-typing models for continuous authentication. This dependency restricts the systems to authenticate only known users whose typing samples are modelled. This research addresses the previous limitations associated with the existing CBAS schemes by developing a generic model to better identify and understand the characteristics and requirements of each type of CBAS and continuous authentication scenario. Also, the research proposes four statistical-based feature selection techniques that have highest statistical significance and encompasses different user typing behaviors which represent user typing patterns effectively. Finally, the research proposes the user-independent threshold approach that is able to authenticate a user accurately without needing any predefined user typing model a-priori. Also, we enhance the technique to detect the impostor or intruder who may take over during the entire computer session.
Resumo:
A key strategy in facilitating learning in Open Disclosure training is the use of hypothetical, interactive scenarios called ‘simulations’. According to Clapper (2010), the ‘advantages of using simulation are numerous and include the ability to help learners make meaning of complex tasks, while also developing critical thinking and cultural skills’. Simulation, in turn, functions largely through improvisation and role-play, in which participants ‘act out’ particular roles and characters according to a given scenario, without recourse to a script. To maximise efficacy in the Open Disclosure training context, role-play requires the specialist skills of professionally trained actors. Core capacities that professional actors bring to the training process include (among others) believability, an observable and teachable skill which underpins the western traditions of actor training; and flexibility, which pertains to the actor’s ability to vary performance strategies according to the changing dynamics of the learning situation. The Patient Safety and Quality Improvement Service of Queensland Health utilises professional actors as a key component of their Open Disclosure Training Program. In engaging actors in this work, it is essential that Facilitators of Open Disclosure training have a solid understanding of the acting process: what acting is; how actors work to a brief; how they improvise; and how they sustainably manage a wide range of emotional states. In the simulation context, the highly skilled actor can optimise learning outcomes by adopting or enacting – in collaboration with the Facilitator - a pedagogical function.
Resumo:
In a letter to a close friend dated April 1922 Le Corbusier announced that he was to publish his first major book, Architecture et révolution, which would collect “a set ofarticles from L’EN.”1—L’Esprit nouveau, the revue jointly edited by him and painter Amédée Ozenfant, which ran from 1920 to 1925.2 A year later, Le Corbusier sketched a book cover design featuring “LE CORBUSIER - SAUGNIER,” the pseudonymic compound of Pierre Jeanneret and Ozenfant, above a square-framed single-point perspective of a square tunnel vanishing toward the horizon. Occupying the lower half of the frame was the book’s provisional title in large handwritten capital letters, ARCHITECTURE OU RÉVOLUTION, each word on a separate line, the “ou” a laconic inflection of Paul Laffitte’s proposed title, effected by Le Corbusier.3 Laffitte was one of two publishers Le Corbusier was courting between 1921 and 1922.4 An advertisement for the book, with the title finally settled upon, Vers une architecture, 5 was solicited for L’Esprit nouveau number 18. This was the original title conceived with Ozenfant, and had in fact already appeared in two earlier announcements.6 “Architecture ou révolution” was retained as the name of the book’s crucial and final chapter—the culmination of six chapters extracted from essays in L’Esprit nouveau. This chapter contained the most quoted passage in Vers une architecture, used by numerous scholars to adduce Le Corbusier’s political sentiment in 1923 to the extent of becoming axiomatic of his early political thought.7 Interestingly, it is the only chapter that was not published in L’Esprit nouveau, owing to a hiatus in the journal’s production from June 1922 to November 1923.8 An agitprop pamphlet was produced in 1922, after L’Esprit nouveau 11-12, advertising an imminent issue “Architecture ou révolution” with the famous warning: “the housing crisis will lead to the revolution. Worry about housing.”9
Resumo:
MISOGYNY, no matter how it's defined, has become a political football. Fifteen minutes into the first quarter of David Williamson's Managing Carmen and Brent Lyall, a star AFL footballer, has already taken a high tackle from his hottie girlfriend, had a clanger with his manager and been caught wearing women's clothes by his acting coach. Not a good look for Brent's sponsors. By full time, Williamson's witty banter and colourful characters have hit their mark. No wonder he's already working on the screenplay.
Resumo:
The three genera of smut fungi, Ustilago, Sporisorium and Macalpinomyces, form a complex that has eluded resolution by morphology (Langdon & Fullerton 1975, Vánky 1991, Piepenbring et al. 1998) and molecular phylogenetic analysis (Stoll et al. 2003, 2005). Two suggestions to reconcile the taxonomy of the complex have been proposed. The first was to break up the current taxa into several smaller genera and subgenera, and the second to unify the three genera into a single genus, Ustilago (Vánky 2002, Piepenbring 2004). The former solution is dependent on finding morphological synapomorphies that can delimit the genera, and the latter solution dismisses the wide morphological diversity within the group (McTaggart et al. 2012b). Synapomorphic morphological characters and host plant classification delimited clades in the Ustilago-Sporisorium-Macalpinomyces complex (McTaggart et al. 2012a). The current study defines these synapomorphic characters and proposes a new classification for many species currently placed in Ustilago, Sporisorium and Macalpinomyces. This approach preserves the well-known genera Ustilago, Sporisorium and Macalpinomyces, and enables the classification to reflect morphological diversity in the complex.
Resumo:
The fungal genera Ustilago, Sporisorium and Macalpinomyces represent an unresolved complex. Taxa within the complex often possess characters that occur in more than one genus, creating uncertainty for species placement. Previous studies have indicated that the genera cannot be separated by morphology alone. Here we chronologically review the history of the Ustilago-Sporisorium-Macalpinomyces complex, argue for its resolution and suggest methods to accomplish a stable taxonomy. A combined molecular and morphological approach is required to identify synapomorphic characters that underpin a new classification. Ustilago, Sporisorium and Macalpinomyces require explicit re-description and new genera, based on monophyletic groups, are needed to accommodate taxa that no longer fit the emended descriptions. A resolved classification will end the taxonomic confusion that surrounds generic placement of these smut fungi.
Resumo:
The genera Ustilago, Sporisorium and Macalpinomyces are a polyphyletic complex of plant pathogenic fungi. The four main morphological characters used to define these genera have been considered homoplasious and not useful for resolving the complex. This study re-evaluates character homology and discusses the use of these characters for defining monophyletic groups recovered from a reconstructed phylogeny using four nuclear loci. Generic delimitation of smut fungi based on their hosts is also discussed as a means for identifying genera within this group. Morphological characters and host specificity can be used to circumscribe genera within the Ustilago-Sporisorium-Macalpinomyces complex.
Resumo:
We introduce a lightweight biometric solution for user authentication over networks using online handwritten signatures. The algorithm proposed is based on a modified Hausdorff distance and has favorable characteristics such as low computational cost and minimal training requirements. Furthermore, we investigate an information theoretic model for capacity and performance analysis for biometric authentication which brings additional theoretical insights to the problem. A fully functional proof-of-concept prototype that relies on commonly available off-the-shelf hardware is developed as a client-server system that supports Web services. Initial experimental results show that the algorithm performs well despite its low computational requirements and is resilient against over-the-shoulder attacks.