898 resultados para Intrusion signature format
Resumo:
In a university context how should colour be taught in order to engage students? Entwistle states, ‘What we learn depends on how we learn, and why we have to learn it.’ Therefore, there is a need to address the accumulating evidence that highlights the effects of learning environments on the quality of student learning when considering colour education. It is necessary to embrace the contextual demands while ensuring that the student knowledge of colour and the joy of discovering its characteristics in practice are enhanced. Institutional policy is forcing educators to re-evaluate traditional studio’s effectiveness and the intensive 'hands-on' interactive approach that is embedded in such an approach. As curriculum development involves not only theory and project work, the classroom culture and physical environment also need to be addressed. The increase in student numbers impacting the number of academic staff/student ratio, availability of teaching support as well as increasing variety of student age, work commitments, learning styles and attitudes have called for positive changes to how we teach. The Queensland University of Technology’s restructure in 2005 was a great opportunity to re-evaluate and redesign the approach to teaching within the design units of Interior Design undergraduate program –including colour. The resultant approach “encapsulates a mode of delivery, studio structure, as well as the learning context in which students and staff interact to facilitate learning”1 with a potential “to be integrated into a range of Interior Design units as it provides an adaptive educational framework rather than a prescriptive set of rules”.
Resumo:
Isolating the impact of a colour, or a combination of colours, is extremely difficult to achieve because it is difficult to remove other environmental elements such as sound, odours, light, and occasion from the experience of being in a place. In order to ascertain the impact of colour on how we interpret the world in day to day situations, the current study records participant responses to achromatic scenes of the built environment prior to viewing the same scene in colour. A number of environments were photographed in colour or copied from design books; and copies of the images saved as both colour and black/grey/white. An overview of the study will be introduced by firstly providing examples of studies which have linked colour to meaning and emotions. For example, yellow is said to be connected to happiness1 ; or red evokes feelings of anger2 or passion. A link between colour and the way we understand and/or feel is established however, there is a further need for knowledge of colour in context. In response to this need, the current achromatic/chromatic environmental study will be described and discussed in light of the findings. Finally, suggestions for future research are posed. Based on previous research the authors hypothesised that a shift in environmental perception by participants would occur. It was found that the impact of colour includes a shift in perception of aspects such as its atmosphere and youthfulness. Through studio-class discussions it was also noted that the predicted age of the place, the function, and in association, the potential users when colour was added (or deleted) were often challenged. It is posited that the ability of a designer (for example, interior designer, architect, or landscape architect) to design for a particular target group—user and/or clients will be enhanced through more targeted studies relating colour in situ. The importance of noting the perceptual shift for the participants in our study, who were young designers, is the realisation that colour potentially holds the power to impact on the identity of an architectural form, an interior space, and/or particular elements such as doorways, furniture settings, and the like.
Resumo:
Tertiary education is increasingly a contested space where advances in Information Communications Technologies and their application to technology-mediated e-learning environments have forced university administrators and educators to dislocate themselves from traditional correspondence modes of student engagement. Compounding this paradigmatic shift within the traditional sphere of distance education pedagogy are multiple and conflicting pressures on academics to develop flexible, engaging, cost-effective and sustainable interactive learning resources that incorporate both multimedia and hypermedia. This chapter reports on a study that examined factors that influence educators’ decision to adopt and integrate educational technology and convert traditional print-based distance education materials into interactive multimodal e-learning formats. Although the broader study was conducted in a single Australian university and investigated pedagogical, institutional and individual factors, this chapter restricts its focus to solely the pedagogical motivations and concerns of educators. It is argued that findings from the study have significance at the institutional level, particularly in terms of developing an underlying pedagogical rationale that can permeate the e-learning culture throughout the university, while at the same time, providing a roadmap for educators who are yet to fully engage with the e-learning format.
Resumo:
The Safety Effectiveness Indicators (SEI) Project has used extensive research to determine what safety effectiveness measures can be developed by industry, for industry use to improve its safety performance. These indicators can measure how effectively the 13 safety management tasks1 (SMTs) selected for this workbook are undertaken. Currently, positive performance indicators (PPIs) are only able to measure the number of activities undertaken. They do not provide information on whether each activity is being undertaken effectively, and therefore do not provide data which can be used by industry to target areas of focus and improvement. The initial workbook contained six SMTs, and was piloted on various construction sites during August 2008. The workbook was refined through feedback from the pilot, and 13 SMTs were used in a field trial during the months of October, November and December 2008. The project team also carried out 12 focus groups in Brisbane, Canberra, Sydney and Melbourne during April, May and June 2008, and developed an initial format of this workbook through these groups and team workshops. Simplification of the language was a recurring theme, and we have attempted to do this throughout the project. The challenge has been to ensure we keep the descriptions short, to the point and relevant to all companies, without making them too specific. The majority of the construction industry participants also requested an alteration to the scale used, so a ‘Yes’/‘No’/’Not applicable’ format is used in this workbook. This workbook, based on industry feedback, is for use on site by various construction companies and contains 13 SMTs. However, you are invited to personalise the SEI tools to better suit your individual company and workplaces.
Resumo:
Monitoring unused or dark IP addresses offers opportunities to extract useful information about both on-going and new attack patterns. In recent years, different techniques have been used to analyze such traffic including sequential analysis where a change in traffic behavior, for example change in mean, is used as an indication of malicious activity. Change points themselves say little about detected change; further data processing is necessary for the extraction of useful information and to identify the exact cause of the detected change which is limited due to the size and nature of observed traffic. In this paper, we address the problem of analyzing a large volume of such traffic by correlating change points identified in different traffic parameters. The significance of the proposed technique is two-fold. Firstly, automatic extraction of information related to change points by correlating change points detected across multiple traffic parameters. Secondly, validation of the detected change point by the simultaneous presence of another change point in a different parameter. Using a real network trace collected from unused IP addresses, we demonstrate that the proposed technique enables us to not only validate the change point but also extract useful information about the causes of change points.
Resumo:
Elaborated Intrusion theory (Kavanagh, Andrade & May 2005) distinguishes between unconscious, associative processes as the precursors of desire, and controlled processes of cognitive elaboration that lead to conscious sensory images of the target of desire and associated affect. We argue that these mental images play a key role in motivating human behavior. Consciousness is functional in that it allows competing goals to be compared and evaluated. The role of effortful cognitive processes in desire helps to explain the different time courses of craving and physiological withdrawal.
Resumo:
Cognitive modelling of phenomena in clinical practice allows the operationalisation of otherwise diffuse descriptive terms such as craving or flashbacks. This supports the empirical investigation of the clinical phenomena and the development of targeted treatment interventions. This paper focuses on the cognitive processes underpinning craving, which is recognised as a motivating experience in substance dependence. We use a high-level cognitive architecture, Interacting Cognitive Subsystems (ICS), to compare two theories of craving: Tiffany's theory, centred on the control of automated action schemata, and our own Elaborated Intrusion theory of craving. Data from a questionnaire study of the subjective aspects of everyday desires experienced by a large non-clinical population are presented. Both the data and the high-level modelling support the central claim of the Elaborated Intrusion theory that imagery is a key element of craving, providing the subjective experience and mediating much of the associated disruption of concurrent cognition.
Resumo:
The depiction of drapery (generalised cloth as opposed to clothing) is a well-established convention of Neo-Classical sculpture and is often downplayed by art historians as of purely rhetorical value. It can be argued however that sculpted drapery has served a spectrum of expressive ends, the variety and complexity of which are well illustrated by a study of its use in portrait sculpture. For the Neo-Classical portrait bust, drapery had substantial iconographic and political meaning, signifying the new Enlightenment notions of masculine authority. Within the portrait bust, drapery also served highly strategic aesthetic purposes, alleviating the abruptness of the truncated format and the compromising visual consequences of the “cropped” body. With reference to Joseph Nollekens’ portraits of English statesman Charles James Fox and the author’s own sculptural practice, this paper analyses the Neo-Classical use of drapery to propose that rendered fabric, far from mere stylistic flourish, is a highly charged visual signifier with much scope for exploration in contemporary sculptural practice.
Resumo:
The elaborated intrusion (EI) theory of desire (Kavanagh, Andrade, & May, 2005) attributes the motivational force of cravings to cognitive elaboration, including imagery, of apparently spontaneous thoughts that intrude into awareness. We report a questionnaire study in which respondents rated a craving for food or drink. Questionnaire items derived from EI theory formed a single factor alongside factors for anticipated reward/relief, resistance, and opportunity. In a multiple regression predicting strength of craving, the first three factors accounted for 36% of the variance. Opportunity did not enter the model. In a second study, the difference between individuals' strong and weak cravings to take part in a sporting activity was shown to be related to visual, auditory, and general imagery, and to anticipated reward or relief from engaging in the activity. Implications for treatment of craving-related disorders are discussed in the light of these results and of other research indicating that interference with imagery can reduce the strength of craving.
Resumo:
An interpretative methodology for understanding meaning in cinema since the 1950s, auteur analysis is an approach to film studies in which an individual, usually the director, is studied as the author of her or his films. The principal argument of this thesis is that proponents of auteurism have privileged examination of the visual components in a film-maker’s body of work, neglecting the potentially significant role played by sound. The thesis seeks to address this problematic imbalance by interrogating the creative use of sound in the films written and directed by Rolf de Heer, asking the question, “Does his use of sound make Rolf de Heer an aural auteur?” In so far as the term ‘aural’ encompasses everything in the film that is heard by the audience, the analysis seeks to discover if de Heer has, as Peter Wollen suggests of the auteur and her or his directing of the visual components (1968, 1972 and 1998), unconsciously left a detectable aural signature on his films. The thesis delivers an innovative outcome by demonstrating that auteur analysis that goes beyond the mise-en-scène (i.e. visuals) is productive and worthwhile as an interpretive response to film. De Heer’s use of the aural point of view and binaural sound recording, his interest in providing a ‘voice’ for marginalised people, his self-penned song lyrics, his close and early collaboration with composer Graham Tardif and sound designer Jim Currie, his ‘hands-on’ approach to sound recording and sound editing and his predilection for making films about sound are all shown to be examples of de Heer’s aural auteurism. As well as the three published (or accepted for publication) interviews with de Heer, Tardif and Currie, the dissertation consists of seven papers refereed and published (or accepted for publication) in journals and international conference proceedings, a literature review and a unifying essay. The papers presented are close textual analyses of de Heer’s films which, when considered as a whole, support the thesis’ overall argument and serve as a comprehensive auteur analysis, the first such sustained study of his work, and the first with an emphasis on the aural.
Resumo:
This document describes algorithms based on Elliptic Cryptography (ECC) for use within the Secure Shell (SSH) transport protocol. In particular, it specifies Elliptic Curve Diffie-Hellman (ECDH) key agreement, Elliptic Curve Menezes-Qu-Vanstone (ECMQV) key agreement, and Elliptic Curve Digital Signature Algorithm (ECDSA) for use in the SSH Transport Layer protocol.
Resumo:
3D Motion capture is a medium that plots motion, typically human motion, converting it into a form that can be represented digitally. It is a fast evolving field and recent inertial technology may provide new artistic possibilities for its use in live performance. Although not often used in this context, motion capture has a combination of attributes that can provide unique forms of collaboration with performance arts. The inertial motion capture suit used for this study has orientation sensors placed at strategic points on the body to map body motion. Its portability, real-time performance, ease of use, and its immunity from line-of-sight problems inherent in optical systems suggest it would work well as a live performance technology. Many animation techniques can be used in real-time. This research examines a broad cross-section of these techniques using four practice-led cases to assess the suitability of inertial motion capture to live performance. Although each case explores different visual possibilities, all make use of the performativity of the medium, using either an improvisational format or interactivity among stage, audience and screen that would be difficult to emulate any other way. A real-time environment is not capable of reproducing the depth and sophistication of animation people have come to expect through media. These environments take many hours to render. In time the combination of what can be produced in real-time and the tools available in a 3D environment will no doubt create their own tree of aesthetic directions in live performance. The case study looks at the potential of interactivity that this technology offers.
Resumo:
Texture based techniques for visualisation of unsteady vector fields have been applied for the visualisation of a Finite volume model for variably saturated groundwater flow through porous media. This model has been developed by staff in the School of Mathematical Sciences QUT for the study of salt water intrusion into coastal aquifers. This presentation discusses the implementation and effectiveness of the IBFV algorithm in the context of visualisation of the groundwater simulation outputs.