951 resultados para graphic designer
Resumo:
SFC FOLLOW-ON VOUCHER The project was undertaken as a SFC Follow-on Voucher (£40K) alongside a student project with BDes (Hons) Design & Digital Arts (D&DA).James Blake (Centre for Media & Culture) brought together students and staff to develop digital content, including films, for a transmedia project and the induction video on the coaches to Ratho. Malcolm Innes, Ian Lambert, Andrew O’Dowd, and Euan Winton (Centre for Design Practice & Research) developed the Old Earth Museum (both physical and virtual), and transmedia designer and research student Beata Zemanek oversaw the transmedia strategy and making of the Gatekeeper film, supported by D&DA students and graduates.
Resumo:
Marggraf Turley, Richard, 'Johnny's in the Basement: Keats, Bob Dylan and Influence', In: 'The Monstrous Debt: Modalities of Romantic Influence in Twentieth Century Literature', (Detroit, MI: Wayne State University Press), pp.181-204, 2006 RAE2008
Resumo:
Barkre, M.; Mathijs, E.; Sexton, J.; Egan, K.; Hunter, R. and Selfe, M. (2007). Audiences and Receptions of Sexual Violence in Contemporary Cinema. London: British Board of Film Classification. RAE2008
Resumo:
The article examines the relevance of Aristotle’s analysis that concerns the syllogistic figures. On the assumption that Aristotle’s analytics was inspired by the method of geometric analysis, we show how Aristotle used the three terms (letters), when he formulated the three syllogistic figures. So far it has not been appropriately recognized that the three terms — the major, the middle and the minor one — were viewed by Aristotle syntactically and predicatively in the form of diagrams. Many scholars have misunderstood Aristotle in that in the second and third figure the middle term is outside and that in the second figure the major term is next to the middle one, whereas in the third figure it is further from it. By means of diagrams, we have elucidated how this perfectly accords with Aristotle's planar and graphic arrangement. In the light of these diagrams, one can appropriately capture the definition of syllogism as a predicative set of terms. Irrespective of the tricky question concerning the abbreviations that Aristotle himself used with reference to these types of predication, the reconstructed figures allow us better to comprehend the reductions of syllogism to the first figure. We assume that the figures of syllogism are analogous to the figures of categorical predication, i.e., they are specific syntactic and semantic models. Aristotle demanded certain logical and methodological competence within analytics, which reflects his great commitment and contribution to the field.
Resumo:
Wydział Nauk Geograficznych i Geologicznych
Resumo:
Wydział Fizyki
Resumo:
Overlay networks have been used for adding and enhancing functionality to the end-users without requiring modifications in the Internet core mechanisms. Overlay networks have been used for a variety of popular applications including routing, file sharing, content distribution, and server deployment. Previous work has focused on devising practical neighbor selection heuristics under the assumption that users conform to a specific wiring protocol. This is not a valid assumption in highly decentralized systems like overlay networks. Overlay users may act selfishly and deviate from the default wiring protocols by utilizing knowledge they have about the network when selecting neighbors to improve the performance they receive from the overlay. This thesis goes against the conventional thinking that overlay users conform to a specific protocol. The contributions of this thesis are threefold. It provides a systematic evaluation of the design space of selfish neighbor selection strategies in real overlays, evaluates the performance of overlay networks that consist of users that select their neighbors selfishly, and examines the implications of selfish neighbor and server selection to overlay protocol design and service provisioning respectively. This thesis develops a game-theoretic framework that provides a unified approach to modeling Selfish Neighbor Selection (SNS) wiring procedures on behalf of selfish users. The model is general, and takes into consideration costs reflecting network latency and user preference profiles, the inherent directionality in overlay maintenance protocols, and connectivity constraints imposed on the system designer. Within this framework the notion of user’s "best response" wiring strategy is formalized as a k-median problem on asymmetric distance and is used to obtain overlay structures in which no node can re-wire to improve the performance it receives from the overlay. Evaluation results presented in this thesis indicate that selfish users can reap substantial performance benefits when connecting to overlay networks composed of non-selfish users. In addition, in overlays that are dominated by selfish users, the resulting stable wirings are optimized to such great extent that even non-selfish newcomers can extract near-optimal performance through naïve wiring strategies. To capitalize on the performance advantages of optimal neighbor selection strategies and the emergent global wirings that result, this thesis presents EGOIST: an SNS-inspired overlay network creation and maintenance routing system. Through an extensive measurement study on the deployed prototype, results presented in this thesis show that EGOIST’s neighbor selection primitives outperform existing heuristics on a variety of performance metrics, including delay, available bandwidth, and node utilization. Moreover, these results demonstrate that EGOIST is competitive with an optimal but unscalable full-mesh approach, remains highly effective under significant churn, is robust to cheating, and incurs minimal overheads. This thesis also studies selfish neighbor selection strategies for swarming applications. The main focus is on n-way broadcast applications where each of n overlay user wants to push its own distinct file to all other destinations as well as download their respective data files. Results presented in this thesis demonstrate that the performance of our swarming protocol for n-way broadcast on top of overlays of selfish users is far superior than the performance on top of existing overlays. In the context of service provisioning, this thesis examines the use of distributed approaches that enable a provider to determine the number and location of servers for optimal delivery of content or services to its selfish end-users. To leverage recent advances in virtualization technologies, this thesis develops and evaluates a distributed protocol to migrate servers based on end-users demand and only on local topological knowledge. Results under a range of network topologies and workloads suggest that the performance of the distributed deployment is comparable to that of the optimal but unscalable centralized deployment.
Resumo:
An improved technique for 3D head tracking under varying illumination conditions is proposed. The head is modeled as a texture mapped cylinder. Tracking is formulated as an image registration problem in the cylinder's texture map image. The resulting dynamic texture map provides a stabilized view of the face that can be used as input to many existing 2D techniques for face recognition, facial expressions analysis, lip reading, and eye tracking. To solve the registration problem in the presence of lighting variation and head motion, the residual error of registration is modeled as a linear combination of texture warping templates and orthogonal illumination templates. Fast and stable on-line tracking is achieved via regularized, weighted least squares minimization of the registration error. The regularization term tends to limit potential ambiguities that arise in the warping and illumination templates. It enables stable tracking over extended sequences. Tracking does not require a precise initial fit of the model; the system is initialized automatically using a simple 2D face detector. The only assumption is that the target is facing the camera in the first frame of the sequence. The formulation is tailored to take advantage of texture mapping hardware available in many workstations, PC's, and game consoles. The non-optimized implementation runs at about 15 frames per second on a SGI O2 graphic workstation. Extensive experiments evaluating the effectiveness of the formulation are reported. The sensitivity of the technique to illumination, regularization parameters, errors in the initial positioning and internal camera parameters are analyzed. Examples and applications of tracking are reported.
Resumo:
A comparison study was carried out between a wireless sensor node with a bare die flip-chip mounted and its reference board with a BGA packaged transceiver chip. The main focus is the return loss (S parameter S11) at the antenna connector, which was highly depended on the impedance mismatch. Modeling including the different interconnect technologies, substrate properties and passive components, was performed to simulate the system in Ansoft Designer software. Statistical methods, such as the use of standard derivation and regression, were applied to the RF performance analysis, to see the impacts of the different parameters on the return loss. Extreme value search, following on the previous analysis, can provide the parameters' values for the minimum return loss. Measurements fit the analysis and simulation well and showed a great improvement of the return loss from -5dB to -25dB for the target wireless sensor node.
Resumo:
Along with the growing demand for cryptosystems in systems ranging from large servers to mobile devices, suitable cryptogrophic protocols for use under certain constraints are becoming more and more important. Constraints such as calculation time, area, efficiency and security, must be considered by the designer. Elliptic curves, since their introduction to public key cryptography in 1985 have challenged established public key and signature generation schemes such as RSA, offering more security per bit. Amongst Elliptic curve based systems, pairing based cryptographies are thoroughly researched and can be used in many public key protocols such as identity based schemes. For hardware implementions of pairing based protocols, all components which calculate operations over Elliptic curves can be considered. Designers of the pairing algorithms must choose calculation blocks and arrange the basic operations carefully so that the implementation can meet the constraints of time and hardware resource area. This thesis deals with different hardware architectures to accelerate the pairing based cryptosystems in the field of characteristic two. Using different top-level architectures the hardware efficiency of operations that run at different times is first considered in this thesis. Security is another important aspect of pairing based cryptography to be considered in practically Side Channel Analysis (SCA) attacks. The naively implemented hardware accelerators for pairing based cryptographies can be vulnerable when taking the physical analysis attacks into consideration. This thesis considered the weaknesses in pairing based public key cryptography and addresses the particular calculations in the systems that are insecure. In this case, countermeasures should be applied to protect the weak link of the implementation to improve and perfect the pairing based algorithms. Some important rules that the designers must obey to improve the security of the cryptosystems are proposed. According to these rules, three countermeasures that protect the pairing based cryptosystems against SCA attacks are applied. The implementations of the countermeasures are presented and their performances are investigated.
Resumo:
Reflecting on Gus Van Sant’s films Gerry (2003) Elephant (2004) and Last Days (2005), the director’s long-term sound-designer Leslie Shatz observed that “You have to get into the totality of the experience and not just the dialogue”. Shatz’s comment expresses something fundamental about the experimental approach to cinema and to soundscapes undertaken by Van Sant in these three films, unofficially known as the “Death Trilogy”. This thesis contends that Van Sant makes deliberate aesthetic choices which do indicate a distinctly “auteurist” leaning. However, I also argue that intertextual elements, prior knowledge, and audience participation in meaningmaking enhance the experience of, and reveal the nuances in, the soundtracks themselves. This thesis aims to contribute to a growing body of work within filmmusic scholarship concerned with resisting a traditional bias in the field: that film music should be understood as a means of characterisation and as emotional signifier. The films of the “Death Quartet”, which includes Paranoid Park (2007), I believe, offer fertile ground on which to explore these new approaches. It is my contention that these films deconstruct the traditional approach to soundtracking and the relationship between soundtrack and character, and that only an approach sensitive to the aesthetic and philosophical functions of music and sound can adequately acknowledge their unique cinematic qualities.
Resumo:
We have developed an alternative approach to optical design which operates in the analytical domain so that an optical designer works directly with rays as analytical functions of system parameters rather than as discretely sampled polylines. This is made possible by a generalization of the proximate ray tracing technique which obtains the analytical dependence of the rays at the image surface (and ray path lengths at the exit pupil) on each system parameter. The resulting method provides an alternative direction from which to approach system optimization and supplies information which is not typically available to the system designer. In addition, we have further expanded the procedure to allow asymmetric systems and arbitrary order of approximation, and have illustrated the performance of the method through three lens design examples.
Resumo:
PREMISE OF THE STUDY: We investigated the origins of 252 Southern Appalachian woody species representing 158 clades to analyze larger patterns of biogeographic connectivity around the northern hemisphere. We tested biogeographic hypotheses regarding the timing of species disjunctions to eastern Asia and among areas of North America. METHODS: We delimited species into biogeographically informative clades, compiled sister-area data, and generated graphic representations of area connections across clades. We calculated taxon diversity within clades and plotted divergence times. KEY RESULTS: Of the total taxon diversity, 45% were distributed among 25 North American endemic clades. Sister taxa within eastern North America and eastern Asia were proportionally equal in frequency, accounting for over 50% of the sister-area connections. At increasing phylogenetic depth, connections to the Old World dominated. Divergence times for 65 clades with intercontinental disjunctions were continuous, whereas 11 intracontinental disjunctions to western North America and nine to eastern Mexico were temporally congruent. CONCLUSIONS: Over one third of the clades have likely undergone speciation within the region of eastern North America. The biogeographic pattern for the region is asymmetric, consisting of mostly mixed-aged, low-diversity clades connecting to the Old World, and a minority of New World clades. Divergence time data suggest that climate change in the Late Miocene to Early Pliocene generated disjunct patterns within North America. Continuous splitting times during the last 45 million years support the hypothesis that widespread distributions formed repeatedly during favorable periods, with serial cooling trends producing pseudocongruent area disjunctions between eastern North America and eastern Asia.
Resumo:
Global branding brings with it exposure to an increasingly culturally-diverse audience. Examples of Islamic finance products being consumed by non-Muslims, and designer labels being adopted, by those outside of their intended target audience; seem to suggest that brands are being shaped more and more by consumers. Within current literature on branding, and cross-cultural consumer behaviour; there appears to have emerged a difference of opinion - as to whether a consumer’s culture has any bearing on their decision making; or subsequent influence brand personalities. The purpose of this paper is to present existing evidence; as a basis for undertaking future research.
Resumo:
This paper uses a case study approach to consider the effectiveness of the electronic survey as a research tool to measure the learner voice about experiences of e-learning in a particular institutional case. Two large scale electronic surveys were carried out for the Student Experience of e-Learning (SEEL) project at the University of Greenwich in 2007 and 2008, funded by the UK Higher Education Academy (HEA). The paper considers this case to argue that, although the electronic web-based survey is a convenient method of quantitative and qualitative data collection, enabling higher education institutions swiftly to capture multiple views of large numbers of students regarding experiences of e-learning, for more robust analysis, electronic survey research is best combined with other methods of in-depth qualitative data collection. The advantages and disadvantages of the electronic survey as a research method to capture student experiences of e-learning are the focus of analysis in this short paper, which reports an overview of large-scale data collection (1,000+ responses) from two electronic surveys administered to students using surveymonkey as a web-based survey tool as part of the SEEL research project. Advantages of web-based electronic survey design include flexibility, ease of design, high degree of designer control, convenience, low costs, data security, ease of access and guarantee of confidentiality combined with researcher ability to identify users through email addresses. Disadvantages of electronic survey design include the self-selecting nature of web-enabled respondent participation, which tends to skew data collection towards students who respond effectively to email invitations. The relative inadequacy of electronic surveys to capture in-depth qualitative views of students is discussed with regard to prior recommendations from the JISC-funded Learners' Experiences of e-Learning (LEX) project, in consideration of the results from SEEL in-depth interviews with students. The paper considers the literature on web-based and email electronic survey design, summing up the relative advantages and disadvantages of electronic surveys as a tool for student experience of e-learning research. The paper concludes with a range of recommendations for designing future electronic surveys to capture the learner voice on e-learning, contributing to evidence-based learning technology research development in higher education.