922 resultados para Latin poetry, Medieval and modern.
Resumo:
O objetivo desta tese é, por um lado, abordar a relação entre o corpo e a linguagem a partir das perspectivas da poesia, do teatro e da performance. Por outro lado, propomos que a compreensão de tal campo relacional pode esclarecer pontos em comum entre essas diferentes artes, trazendo uma nova percepção do fenômeno poético. Para tal, fez-se necessário operar um desvio com relação à concepção moderna que entende o corpo enquanto substância material extensa e a linguagem como algo associado à substância subjetiva ideal do pensamento. Pelo contrário, procuramos trabalhar com a hipótese de que corpo e linguagem se encontram em estado de relação senão necessária ao menos constante, valendo-nos da ideia do corpo-em-vida, e da linguagem enquanto ação e enquanto discurso. A análise opera um recorte contemporâneo entre obras que vão das poetas Angélica Freitas e MarÃlia Garcia até a da atriz e encenadora Cristina Flores, e da performer norte-americana Laurie Anderson. A escrita da tese nos levou a uma combinação entre aspectos formais do ensaio e do drama, numa costura de múltiplas vozes, de modo a concretizar o entrelaçamento entre as ideias vividas ao longo da pesquisa e a experiência fÃsica da produção do texto
Resumo:
Nanoindentation is a popular technique for measuring the intrinsic mechanical response of bone and has been used to measure a single-valued elastic modulus. However, bone is a composite material with 20-80 nm hydroxyapatite plates embedded in a collagen matrix, and modern instrumentation allows for measurements at these small length scales. The present study examines the indentation response of bone and artificial gelatin-apatite nanocomposite materials across three orders of magnitude of lengthscale, from nanometers to micrometers, to isolate the composite phase contributions to the overall response. The load-displacement responses were variable and deviated from the quadratic response of homogeneous materials at small depths. The distribution of apparent elastic modulus values narrowed substantially with increasing indentation load. Indentation of particulate nanocomposites was simulated using finite element analysis. Modeling results replicated the convergence in effective modulus seen in the experiments. It appears that the apatite particles are acting as the continuous ("matrix") phase in bone and nanocomposites. Copyright © 2004 by ASME.
Resumo:
The distribution for percent content of light mineral is divided in detail to emphasize distributional trends of higher and lower contents by using 222 samples of light mineral in the southern Yellow Sea. 5 mineral provinces are divided, and they are I-north mineral province of the southern Yellow Sea, the sediment dominantly derived from the Yellow River; II-mixed mineral province, the sediment derived from both the Yellow River and Yangtze River; III-middle mineral province, the sediment derived mainly from the Yellow River and a part of sediment derived from Yangtze River; IV-province east of Yangtze River mouth, the sediment derived dominantly from Yangtze River; and V south mineral province, sediment was affected by relict sediment and modern sediment of Yangtze River. In this paper, the assemblage of dominant mineral and diagnostic mineral for the five provinces are discerned.
Resumo:
Planktonic foraminiferal faunas, oxygen isotope and modern analog technique sea surface temperature records were obtained in piston core DGKS9603 (28degrees08.869'N, 127degrees16.238'E, water depth 1100 in) collected from the middle Okinawa Trough. During the last glaciation, four cold events were identified and correlate Heinrich events (HE) H2-5 of the last 45 ka. During the last deglaciation, core DGKS9603 has begun to be influenced by the Kuroshio since about 16 cal ka BP. Three weakenings of this warm current occurred at about 2.8-5.3, 11.4 and 15.5 cal ka BP respectively. Among the three fluctuations, the oldest one is synchronous with HE1 and could be a response to the strong cooling observed in the North Atlantic Ocean. The fluctuation occurring at about 11.4 cal ka ago corresponds to the Younger Dryas within the age error bars. Our observations provide new evidence that the HEs documented from Greenland and the northern North Atlantic had a global climatic impact. Changes in the intensity of the East Asian monsoon could be the main mechanism responsible for the paleoccanographic variations observed in the Okinawa Trough. (C) 2001 Elsevier Science B.V. All rights reserved.
Resumo:
Malicious software (malware) have significantly increased in terms of number and effectiveness during the past years. Until 2006, such software were mostly used to disrupt network infrastructures or to show coders’ skills. Nowadays, malware constitute a very important source of economical profit, and are very difficult to detect. Thousands of novel variants are released every day, and modern obfuscation techniques are used to ensure that signature-based anti-malware systems are not able to detect such threats. This tendency has also appeared on mobile devices, with Android being the most targeted platform. To counteract this phenomenon, a lot of approaches have been developed by the scientific community that attempt to increase the resilience of anti-malware systems. Most of these approaches rely on machine learning, and have become very popular also in commercial applications. However, attackers are now knowledgeable about these systems, and have started preparing their countermeasures. This has lead to an arms race between attackers and developers. Novel systems are progressively built to tackle the attacks that get more and more sophisticated. For this reason, a necessity grows for the developers to anticipate the attackers’ moves. This means that defense systems should be built proactively, i.e., by introducing some security design principles in their development. The main goal of this work is showing that such proactive approach can be employed on a number of case studies. To do so, I adopted a global methodology that can be divided in two steps. First, understanding what are the vulnerabilities of current state-of-the-art systems (this anticipates the attacker’s moves). Then, developing novel systems that are robust to these attacks, or suggesting research guidelines with which current systems can be improved. This work presents two main case studies, concerning the detection of PDF and Android malware. The idea is showing that a proactive approach can be applied both on the X86 and mobile world. The contributions provided on this two case studies are multifolded. With respect to PDF files, I first develop novel attacks that can empirically and optimally evade current state-of-the-art detectors. Then, I propose possible solutions with which it is possible to increase the robustness of such detectors against known and novel attacks. With respect to the Android case study, I first show how current signature-based tools and academically developed systems are weak against empirical obfuscation attacks, which can be easily employed without particular knowledge of the targeted systems. Then, I examine a possible strategy to build a machine learning detector that is robust against both empirical obfuscation and optimal attacks. Finally, I will show how proactive approaches can be also employed to develop systems that are not aimed at detecting malware, such as mobile fingerprinting systems. In particular, I propose a methodology to build a powerful mobile fingerprinting system, and examine possible attacks with which users might be able to evade it, thus preserving their privacy. To provide the aforementioned contributions, I co-developed (with the cooperation of the researchers at PRALab and Ruhr-Universität Bochum) various systems: a library to perform optimal attacks against machine learning systems (AdversariaLib), a framework for automatically obfuscating Android applications, a system to the robust detection of Javascript malware inside PDF files (LuxOR), a robust machine learning system to the detection of Android malware, and a system to fingerprint mobile devices. I also contributed to develop Android PRAGuard, a dataset containing a lot of empirical obfuscation attacks against the Android platform. Finally, I entirely developed Slayer NEO, an evolution of a previous system to the detection of PDF malware. The results attained by using the aforementioned tools show that it is possible to proactively build systems that predict possible evasion attacks. This suggests that a proactive approach is crucial to build systems that provide concrete security against general and evasion attacks.
Resumo:
Pyatt, F.B., Pyatt, A.J., Walker, C., Sheen, T., Grattan, J.P, The heavy metal content of skeletons from an ancient metalliferous polluted area in southern Jordan with particular reerence to bioaccumulation and human health, Ecotoxicology & Environmental Safety 60, 13th August 2003, 295-300
Resumo:
Wydział Biologii: Instytut Antropologii
Resumo:
My text is an attempt to apply Charles Taylor’s theory, dealing with the origins of the modern self, to Czech autobiographical literature originating in Romanticism. Taking a cue from Jean Starobinski and Philippe Lejeune’s concepts of modern autobiography, I analyse Karel Hynek Mácha’s personal diary from 1835 and try to find and emphasize its narrative and compositional aspects, which anticipate the poetics of modern poetic diaries.
Resumo:
The early music revival of the late twentieth century revolutionized music with the birth of historically lnformed performance. With this revolution came a stereotype of the "early music singing voice" as small, bright, straight-toned, and unfortunately, often inferior techrucally to the mainstream opera singer. An assessment of the validity of this stereotype was made though readings of treatises and modern manuals of performance practice, and through listening to recordings. Sources on ornamentation, recitative, dance rhythm, and baroque gesture were examined, resulting in the finding that these issues are far more important to historical accuracy than are voice timbre and size. This dissertation is comprised of three historically informed performances intended to satisfy both the early music specialist and the mainstream voice teacher. Program One (May 15, 2004) is a performance of The "Peasant" Cantata, BWV 212, by J.S. Bach, with The Bach Sinfonia at the Washington Conservatory of Music. Program Two (January 29, 2005) is the role of Eurilla in a staged production of Antonio Vivaldi's serenata, Eurilla e Alcindo. The performance is a collaboration with the Baltimore-based ensemble, La Rocinante, and is conducted from the keyboard by Joseph Gascho. Program Three (March 14, 2005) is a solo recital entitled, Fairest Isle: Music of Baroque London. All three programs are documented in a digital audio format available on compact disc, with accompanying programs and notes also available in digital format.
Resumo:
We provide a select overview of tools supporting traditional Jewish learning. Then we go on to discuss our own HyperJoseph/HyperIsaac project in instructional hypermedia. Its application is to teaching, teacher training, and self-instruction in given Bible passages. The treatment of two narratives has been developed thus far. The tool enables an analysis of the text in several respects: linguistic, narratological, etc. Moreover, the Scriptures' focality throughout the cultural history makes this domain of application particularly challenging, in that there is a requirement for the tool to encompass the accretion of receptions in the cultural repertoire, i.e., several layers of textual traditions—either hermeneutic (i.e., interpretive), or appropriations—related to the given core passage, thus including "secondary" texts (i.e., such that are responding or derivative) from as disparate realms as Roman-age and later homiletics, Medieval and later commentaries or supercommentaries, literary appropriations, references to the arts and modern scholarship, etc. in particular, the Midrash (homiletic expansions) is adept at narrative gap filling, so the narratives mushroom at the interstices where the primary text is silent. The genealogy of the project is rooted in Weiss' index of novelist Agnon's writings, which was eventually upgraded into a hypertextual tool, including Agnon's full-text and ancillary materials. Those early tools being intended primarily for reference and research-support in literary studies, the Agnon hypertext system was initially emulated in the conception of HyperJoseph, which is applied to the Joseph story from Genesis. Then, the transition from a tool for reference to an instructional tool required a thorough reconception in an educational perspective, which led to HyperIsaac, on the sacrifice of Isaac, and to a redesign and upgrade of HyperJoseph as patterned after HyperIsaac.
Resumo:
In The Eye of Power, Foucault delineated the key concerns surrounding hospital architecture in the latter half of the eighteenth century as being the ‘visibility of bodies, individuals and things'. As such, the ‘new form of hospital' that came to be developed ‘was at once the effect and support of a new type of gaze'. This was a gaze that was not simply concerned with ways of minimising overcrowding or cross-contamination. Rather, this was a surveillance intended to produce knowledge about the pathological bodies contained within the hospital walls. This would then allow for their appropriate classification. Foucault went on to describe how these principles came to be applied to the architecture of prisons. This was exemplified for him in the distinct shape of Bentham's panopticon. This circular design, which has subsequently become an often misused synonym for a contemporary culture of surveillance, was premised on a binary of the seen and the not-seen. An individual observer could stand at the central point of the circle and observe the cells (and their occupants) on the perimeter whilst themselves remaining unseen. The panopticon in its purest form was never constructed, yet it conveys the significance of the production of knowledge through observation that became central to institutional design at this time and modern thought more broadly. What is curious though is that whilst the aim of those late eighteenth century buildings was to produce wellventilated spaces suffused with light, this provoked an interest in its opposite. The gothic movement in literature that was developing in parallel conversely took a ‘fantasy world of stone walls, darkness, hideouts and dungeons…' as its landscape (Vidler, 1992: 162). Curiously, despite these modern developments in prison design, the façade took on these characteristics. The gothic imagination came to describe that unseen world that lay behind the outer wall. This is what Evans refers to as an architectural ‘hoax'. The façade was taken to represent the world within the prison walls and it was the façade that came to inform the popular imagination about what occurred behind it. The rational, modern principles ordering the prison became conflated with the meanings projected by and onto the façade. This confusion of meanings have then been repeated and reenforced in the subsequent representations of the prison. This is of paramount importance since it is the cinematic and televisual representation of the prison, as I argue here and elsewhere, that maintain this erroneous set of meanings, this ‘hoax'.
Resumo:
The aim of this article is to analyze the social policy in Latin America in a context of emerging welfare states. To understand the changes one takes into consideration the theories about institutional reform and the transformations produced in the XX century and the beginning of the XXI to substitute a social security regime mainly based on segmentation of benefi ts and on programs to fi ght poverty by another with an institutional and redistributive nature. The paper pays attention in particular to the path of the most developed welfare states of Latin America: Costa Rica, Chile, Argentina, Brasil y Uruguay.