997 resultados para architectural identity


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mon projet de thèse démontre comment le genre de la bande dessinée peut être mobilisé de façon à déstabiliser les idéologies identitaires dominantes dans un contexte autobiographique. À partir de théories contemporaines de récits de vie et de leurs emphase sur la construction du sujet au travers du processus autobiographique, j’explore les façons par lesquelles les propriétés formelles de la bande dessinée permettent aux artistes féminines et minoritaires d’affirmer leurs subjectivités et de s’opposer aux idéaux hégémoniques reliés à la représentation du genre, du traumatisme, de la sexualité, de l’ethnicité, et du handicap, en s’auto-incarnant à même la page de bande dessinée. Par une analyse visuelle formelle, ma thèse prouve que les esthétiques hyper-personnelles du dessin à la main découlant d’une forme ancrée dans l’instabilité générique et le (re)mixage continu des codes verbaux et visuels permettent aux artistes de déstabiliser les régimes de représentation conventionnels dans une danse complexe d’appropriation et de resignification qui demeure toujours ouverte à la création de nouveaux sens. Suite à l’introduction, mon second chapitre explique la résistance de Julie Doucet par rapport aux plaisirs visuels découlant de la contemplation des femmes dans la bande dessinée par son utilisation du concept originairement misogyne de la matérialité féminine grotesque comme principe génératif à partir duquel elle articule une critique de la forme et du contenu des représentations normatives et restrictives du corps féminin. Le troisième chapitre considère la capacité de la bande dessinée à représenter le traumatisme, et se penche sur les efforts de Phoebe Gloeckner visant à faire face aux abus sexuels de son enfance par l’entremise d’un retour récursif sur des souvenirs visuels fondamentaux. Le chapitre suivant maintient que la nature sérielle de la bande dessinée, sa multimodalité et son association à la culture zine, fournissent à Ariel Schrag les outils nécessaires pour expérimenter sur les codes visuels et verbaux de façon à décrire et à affirmer le sens identitaire en flux de l’adolescent queer dans sa quadrilogie expérimentale Künstlerroman. Le cinquième chapitre suggère que l’artiste de provenance Libanaise Toufic El Rassi utilise la forme visuelle pour dénoncer les mécanismes générateurs de préjugés anti-Arabes, et qu’il affirme son identité grâce au pouvoir de rhétorique temporaire que lui procure l’incarnation d’un stéréotype connu. Mon dernier chapitre démontre comment Al Davison emploie la bande dessinée pour mettre en scène des rencontres d’observations dynamiques avec le spectateur implicite pouvant potentiellement aider l’auteur à éviter le regard objectivant généralement associé à la perception du handicap.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Derek Parfit est célèbre pour avoir soutenu que l'identité personnelle ne comptait pas pour déterminer la survie d'une personne. Sa phrase « personal identity is not what matters » est inspirée d'une approche réductionniste de l'identité personnelle qui consiste à dire que la personne humaine se réduit à un corps, un cerveau et une série d'événements mentaux causalement liés. Dans cette optique, ce qui compte, c'est la continuité psychologique. Cet article vise à montrer que dans des dynamiques de reconnaissances (et de non-reconnaissances), l'identité personnelle peut compter dans la définition de l'identité personnelle à travers le temps ; en deux mots, que l'identité personnelle compte. Partant des conceptions narrativistes défendues par Paul Ricoeur et Charles Taylor, j'en viens à défendre une théorie constructiviste-institutionnaliste de l'identité personnelle qui prend en considération le caractère institué et construit de l'identité personnelle. Le but de cet article est donc de défendre la thèse selon laquelle l'identité personnelle compte pour dans les réflexions éthiques et politiques.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this computerized, globalised and internet world our computer collects various types of information’s about every human being and stores them in files secreted deep on its hard drive. Files like cache, browser history and other temporary Internet files can be used to store sensitive information like logins and passwords, names addresses, and even credit card numbers. Now, a hacker can get at this information by wrong means and share with someone else or can install some nasty software on your computer that will extract your sensitive and secret information. Identity Theft posses a very serious problem to everyone today. If you have a driver’s license, a bank account, a computer, ration card number, PAN card number, ATM card or simply a social security number you are more than at risk, you are a target. Whether you are new to the idea of ID Theft, or you have some unanswered questions, we’ve compiled a quick refresher list below that should bring you up to speed. Identity theft is a term used to refer to fraud that involves pretending to be someone else in order to steal money or get other benefits. Identity theft is a serious crime, which is increasing at tremendous rate all over the world after the Internet evolution. There is widespread agreement that identity theft causes financial damage to consumers, lending institutions, retail establishments, and the economy as a whole. Surprisingly, there is little good public information available about the scope of the crime and the actual damages it inflicts. Accounts of identity theft in recent mass media and in film or literature have centered on the exploits of 'hackers' - variously lauded or reviled - who are depicted as cleverly subverting corporate firewalls or other data protection defenses to gain unauthorized access to credit card details, personnel records and other information. Reality is more complicated, with electronic identity fraud taking a range of forms. The impact of those forms is not necessarily quantifiable as a financial loss; it can involve intangible damage to reputation, time spent dealing with disinformation and exclusion from particular services because a stolen name has been used improperly. Overall we can consider electronic networks as an enabler for identity theft, with the thief for example gaining information online for action offline and the basis for theft or other injury online. As Fisher pointed out "These new forms of hightech identity and securities fraud pose serious risks to investors and brokerage firms across the globe," I am a victim of identity theft. Being a victim of identity theft I felt the need for creating an awareness among the computer and internet users particularly youngsters in India. Nearly 70 per cent of Indian‘s population are living in villages. Government of India already started providing computer and internet facilities even to the remote villages through various rural development and rural upliftment programmes. Highly educated people, established companies, world famous financial institutions are becoming victim of identity theft. The question here is how vulnerable the illiterate and innocent rural people are if they suddenly exposed to a new device through which some one can extract and exploit their personal data without their knowledge? In this research work an attempt has been made to bring out the real problems associated with Identity theft in developed countries from an economist point of view.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Now a days, email has become the most widely communication way in daily life. The main reason for using email is probably because of the convenience and speed in which it can be transmitted irrespective of geographical distances. To improve security and efficiency of email system, most of the email system adopt PKI and IBE encryption schemes. However, both PKI and IBE encryption schemes have their own shortcomings and consequently bring security issues to email systems. This paper proposes a new secure email system based on IBE which combines finger print authentication and proxy service for encryption and decryption

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The recent discovery of the monumental 5000 years old tower tombs on top of the up to 1850 m high Shir plateau has raised numerous questions about the economic and infrastructural basis of the agro-pastoral-piscicultural society which likely has constructed them. The scattered oasis settlement of Maqta, situated just below the towers in a rugged desert environment has therefore been studied from 2001 to 2003 to understand its prehistoric and present role along the ancient trade route which connected the inner-Omani Sharqiya across the southern Hajar mountains with the ocean port of Tiwi. Maqta consists of a central area with 59 buildings and 12 scattered temporary settlements comprising a total of about 200 semi-nomadic inhabitants and next to 900 sheep and goats. The 22 small springs with a flow rate between 5 and 1212-l h^-1 are watering 16 terrace systems totaling 4.5 ha of which 2.9 ha are planted to date palms (Phoenix dactylifera L.), 0.4 ha to wheat landraces (Triticum durum and Triticum aestivum) during the cooler winter months, 0.4 are left fallow and 0.8 h are abandoned. During a pronounced drought period from 2001 to 2003, the springs’ flow rate declined between 38% and 72%. Most of the recent buildings of the central housing area were found empty or used as temporary stores by the agro-pastoral population watching their flocks on the surrounding dry mountains. There is no indication that there ever was a settlement older than the present one. A number of Hafit (3100–2700 BC) and Umm an-Nar (2700–2000 BC) tombs just above the central housing area and further along one of the trade routes to the coast are the only indication of an old pastoral landuse in Maqta territory where oasis agriculture may have entered only well after 1000 AD. With this little evidence of existence during the 3rd millennium BC, Maqta is unlikely to have played any major role favouring the construction of the nearby monumental Shir tower tombs other than providing water for herders and their flocks, early migrant traders or tower tomb constructors.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Traditionally, we've focussed on the question of how to make a system easy to code the first time, or perhaps on how to ease the system's continued evolution. But if we look at life cycle costs, then we must conclude that the important question is how to make a system easy to operate. To do this we need to make it easy for the operators to see what's going on and to then manipulate the system so that it does what it is supposed to. This is a radically different criterion for success. What makes a computer system visible and controllable? This is a difficult question, but it's clear that today's modern operating systems with nearly 50 million source lines of code are neither. Strikingly, the MIT Lisp Machine and its commercial successors provided almost the same functionality as today's mainstream sytsems, but with only 1 Million lines of code. This paper is a retrospective examination of the features of the Lisp Machine hardware and software system. Our key claim is that by building the Object Abstraction into the lowest tiers of the system, great synergy and clarity were obtained. It is our hope that this is a lesson that can impact tomorrow's designs. We also speculate on how the spirit of the Lisp Machine could be extended to include a comprehensive access control model and how new layers of abstraction could further enrich this model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Resumen tomado de la publicaci??n

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Resumen tomado de la publicaci??n

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Resumen tomado de la publicaci??n

Relevância:

20.00% 20.00%

Publicador:

Resumo:

WAIS Seminar, presented 29 Mar 2012

Relevância:

20.00% 20.00%

Publicador:

Resumo:

For Ethics in a Complex World module. General topics with links to resources about identity and privacy. Mainly looking at online identity and how you manage it effectively.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Three things to think about and Three possible futures to discuss

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Week 4

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article presents a reflection about the Disability like a human phenomenon, which needs not only new definitions if not a criticism point of view as a Concept, with the end of indicate representations forms not only for people with disabilities if not for the citizens in general. Considers discourses that identify arguments from social sciences, appearing the Disability like a differentiate condition between human beings, mainly for an exclusion process that announce social behaviors in relations with the persons with disabilities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

El presente trabajo describe la identidad organizacional de una antigua Universidad Colombiana – Universidad del Rosario – desde 1890 hasta 1991. Esta descripción detallada se realizó con el propósito de hacer preguntas y señalar algunos de los desafíos que esta universidad se encontrará al educar las nuevas generaciones de la nación para la sociedad del conocimiento. Este documento también describe brevemente las características más importantes de la sociedad del conocimiento, así como las características de las universidades que desarrollan sus actividades en ella. También, se hace una síntesis sobre el estado de desarrollo de la sociedad del conocimiento en Colombia. Finalmente, se extraen algunas conclusiones a acerca de las oportunidades de cambio que tendrá la identidad Rosarista para continuar siendo relevante en el siglo XXI.