961 resultados para Puget-sound


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Freeway barriers used to be just great slabs of concrete that lined the road to tr and protect nearby residents from the constant rumble of the traffic. But in recent years, their visual appeal has become as important as their practical purpose with architects and designers clamouring to show off their ideas to the vast traveling public. Melbourne's Craigieburn Bypass is the latest to be recognised for its dual appeal winning the Urban Design Award at the recent Victorian Architecture Awards.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An interpretative methodology for understanding meaning in cinema since the 1950s, auteur analysis is an approach to film studies in which an individual, usually the director, is studied as the author of her or his films. The principal argument of this thesis is that proponents of auteurism have privileged examination of the visual components in a film-maker’s body of work, neglecting the potentially significant role played by sound. The thesis seeks to address this problematic imbalance by interrogating the creative use of sound in the films written and directed by Rolf de Heer, asking the question, “Does his use of sound make Rolf de Heer an aural auteur?” In so far as the term ‘aural’ encompasses everything in the film that is heard by the audience, the analysis seeks to discover if de Heer has, as Peter Wollen suggests of the auteur and her or his directing of the visual components (1968, 1972 and 1998), unconsciously left a detectable aural signature on his films. The thesis delivers an innovative outcome by demonstrating that auteur analysis that goes beyond the mise-en-scène (i.e. visuals) is productive and worthwhile as an interpretive response to film. De Heer’s use of the aural point of view and binaural sound recording, his interest in providing a ‘voice’ for marginalised people, his self-penned song lyrics, his close and early collaboration with composer Graham Tardif and sound designer Jim Currie, his ‘hands-on’ approach to sound recording and sound editing and his predilection for making films about sound are all shown to be examples of de Heer’s aural auteurism. As well as the three published (or accepted for publication) interviews with de Heer, Tardif and Currie, the dissertation consists of seven papers refereed and published (or accepted for publication) in journals and international conference proceedings, a literature review and a unifying essay. The papers presented are close textual analyses of de Heer’s films which, when considered as a whole, support the thesis’ overall argument and serve as a comprehensive auteur analysis, the first such sustained study of his work, and the first with an emphasis on the aural.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The anisotropic pore structure and elasticity of cancellous bone cause wave speeds and attenuation in cancellous bone to vary with angle. Previously published predictions of the variation in wave speed with angle are reviewed. Predictions that allow tortuosity to be angle dependent but assume isotropic elasticity compare well with available data on wave speeds at large angles but less well for small angles near the normal to the trabeculae. Claims for predictions that only include angle-dependence in elasticity are found to be misleading. Audio-frequency data obtained at audio-frequencies in air-filled bone replicas are used to derive an empirical expression for the angle-and porosity-dependence of tortuosity. Predictions that allow for either angle dependent tortuosity or angle dependent elasticity or both are compared with existing data for all angles and porosities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

SoundCipher is a software library written in the Java language that adds important music and sound features to the Processing environment that is widely used by media artists and otherwise has an orientation toward computational graphics. This article introduces the SoundCipher library and its features, describes its influences and design intentions, and positions it within the field of computer music programming tools. SoundCipher enables the rich history of algorithmic music techniques to be accessible within one of today’s most popular media art platforms. It also provides an accessible means for learning to create algorithmic music and sound programs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Anna Hickey-Mody and Melissa Iocca invented a new name for the cinema-goer at "Bad Boy Bubby" (1993) when they wrote: "In de Heer's film, the viewer is primarily a listener, or aurator, and secondly a spectator" and I have argued the label 'aurator' can also be used for the person experiencing "Ten Canoes" (2006). This Aboriginal Australian Dreamtime fable features dialogue recorded entirely in the Ganalbingu language of the Indigenous people it stars, and is a prime example of what I would suggest can be labeled 'The Aboriginal Australian Films of Rolf de Heer'. "The Tracker" (2002) and "Dr. Plonk" (2007) have also included depictions of Aboriginal Australians and each of the trio utilizes Cat Hope's "innovative sound ideas" to present what I argue is an aural auteur's signature revealing a post-colonial Australian world-view that privileges the justice system and eco-spirituality of Aboriginal Australians.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Guy Webster is a sound artist who has been featured in numerous festivals, galleries, conferences and theatres in Australia, Japan, UK and Europe. As part of the Transmute Collective he developed the immersive soundscape of Intimate Transactions. On 2nd November, 2005 Jilliann Hamilton and Jeremy Yuille met with Guy Webster to discuss his approach to immersion in soundsapes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article compares YouTube and the National Film and Sound Archive (NFSA) as resources for television historians interested in viewing old Australian television programs. The author searched for seventeen important television programs, identified in a previous research project, to compare what was available in the two archives and how easy it was to find. The analysis focused on differences in curatorial practices of accessioning and cataloguing. NFSA is stronger in current affairs and older programs, while YouTube is stronger in game shows and lifestyle programs. YouTube is stronger than the NFSA on “human interest” material—births, marriages, and deaths. YouTube accessioning more strongly accords with popular histories of Australian television. Both NFSA and YouTube offer complete episodes of programs, while YouTube also offers many short clips of “moments.” YouTube has more surprising pieces of rare ephemera. YouTube cataloguing is more reliable than that of the NFSA, with fewer broken links. The YouTube metadata can be searched more intuitively. The NFSA generally provides more useful reference information about production and broadcast dates.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In recent decades, assessment practices within Australian law schools have moved from the overwhelming use of end-of-year closed-book examinations to an increase in the use of a wider range of techniques. This shift is often characterised as providing a ‘better’ learning environment for students, contributing more positively to their own ‘personal development’ within higher education, or, considered along the lines of critical legal thought, as ‘liberating’ them from the ‘conservatising’ and ‘indoctrinating’ effects of the power relations that operate in law schools. This paper seeks to render problematic such liberal-progressive narratives about these changes to law school assessment practices. It will do so by utilising the work of French historian and philosopher Michel Foucault on power, arguing that the current range of assessment techniques demonstrates a shift in the ‘economy’ of power relations within the law school. Rather than ‘liberating’ students from relations of power, these practices actually extend the power relations through which students are governed. This analysis is intended to inform legal education research and assessment practice by providing a far more nuanced conceptual framework than one that seeks to ‘free’ law students from these ‘repressive’ practices, or hopes to ‘objectively’ contribute to their ‘personal development’.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Characteristics of modal sound radiation of finite cylindrical shells are studied using finite element and boundary element methods in this paper. In the low frequency range, modal radiation efficiencies of finite cylindrical shells are found to asymptotically approach those of the corresponding infinite cylindrical shell when structural trace wavelengths of the cylindrical shells are greater than the acoustic wavelength. Modal radiation efficiencies for each group of modes having the same circumferential modal index decrease as the axial modal index increases. They converge to each other when the axial trace wavelength is much greater than the circumferential trace wavelength. The mechanism leading to lower radiation efficiency of modes with higher circumferential modal index of short cylinders is explained. Similar to those of flat plate panels, change in slope or waviness is observed in modal radiation efficiency curves of modes with higher order axial modal index at medium frequencies. This is attributed to the interference of sound radiated by neighbouring vibrating cells when the distance between nodal lines of a vibrating mode is in the same order or smaller than the acoustic wavelength. Effects of the internal sound field on modal radiation efficiencies of a finite open-end cylinder are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sound Thinking provides techniques and approaches to critically listen, think, talk and write about music you hear or make. It provides tips on making music and it encourages regular and deep thinking about music activities, which helps build a musical dialog that leads to deeper understanding.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In microscopic traffic simulators, the interaction between vehicles is considered. The dynamics of the system then becomes an emergent property of the interaction between its components. Such interactions include lane-changing, car-following behaviours and intersection management. Although, in some cases, such simulators produce realistic prediction, they do not allow for an important aspect of the dynamics, that is, the driver-vehicle interaction. This paper introduces a physically sound vehicle-driver model for realistic microscopic simulation. By building a nanoscopic traffic simulation model that uses steering angle and throttle position as parameters, the model aims to overcome unrealistic acceleration and deceleration values, as found in various microscopic simulation tools. A physics engine calculates the driving force of the vehicle, and the preliminary results presented here, show that, through a realistic driver-vehicle-environment simulator, it becomes possible to model realistic driver and vehicle behaviours in a traffic simulation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents Capital Music, a mobile application enabling real-time sharing of song choices with collocated urban dwellers. Due to the real-time, location-based peer-to-peer approach of the application, a user experience study was performed utilising the Wizard of Oz method. The study provides insight into how sharing non-privacy sensitive but personal data in an anonymous way can influence the user experience of people in public urban places. We discuss the findings in relation to how Capital Music influences the process of “cocooning” in public urban places, the practice of designing anonymous interactions between collocated strangers, and how the sharing of song choices can create a sense of commonality between anonymous users in the urban space. The outcomes of this study are relevant for future location-based social networking applications that aim to create interactions between collocated strangers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Proving security of cryptographic schemes, which normally are short algorithms, has been known to be time-consuming and easy to get wrong. Using computers to analyse their security can help to solve the problem. This thesis focuses on methods of using computers to verify security of such schemes in cryptographic models. The contributions of this thesis to automated security proofs of cryptographic schemes can be divided into two groups: indirect and direct techniques. Regarding indirect ones, we propose a technique to verify the security of public-key-based key exchange protocols. Security of such protocols has been able to be proved automatically using an existing tool, but in a noncryptographic model. We show that under some conditions, security in that non-cryptographic model implies security in a common cryptographic one, the Bellare-Rogaway model [11]. The implication enables one to use that existing tool, which was designed to work with a different type of model, in order to achieve security proofs of public-key-based key exchange protocols in a cryptographic model. For direct techniques, we have two contributions. The first is a tool to verify Diffie-Hellmanbased key exchange protocols. In that work, we design a simple programming language for specifying Diffie-Hellman-based key exchange algorithms. The language has a semantics based on a cryptographic model, the Bellare-Rogaway model [11]. From the semantics, we build a Hoare-style logic which allows us to reason about the security of a key exchange algorithm, specified as a pair of initiator and responder programs. The other contribution to the direct technique line is on automated proofs for computational indistinguishability. Unlike the two other contributions, this one does not treat a fixed class of protocols. We construct a generic formalism which allows one to model the security problem of a variety of classes of cryptographic schemes as the indistinguishability between two pieces of information. We also design and implement an algorithm for solving indistinguishability problems. Compared to the two other works, this one covers significantly more types of schemes, but consequently, it can verify only weaker forms of security.