372 resultados para illusion


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the Thatcher illusion, a face with inverted eyes and mouth looks abnormal when upright but not when inverted. Behavioral studies have shown that thatcherization of an upright face disrupts perceptual processing of the local configuration. We recorded high-density EEG from normal observers to study ERP correlates of the illusion during the perception of faces and nonface objects, to determine whether inversion and thatcherization affect similar neural mechanisms. Observers viewed faces and houses in four conditions (upright vs. inverted, and normal vs. thatcherized) while detecting an oddball category (chairs). Thatcherization delayed the N170 component over occipito-temporal cortex to faces, but not to houses. This modulation matched the illusion as it was larger for upright than inverted faces. The P1 over medial occipital regions was delayed by face inversion but unaffected by thatcherization. Finally, face thatcherization delayed P2 over occipito-temporal but not over parietal regions, while inversion affected P2 across categories. All effects involving thatcherization were face-specific. These results indicate that effects of face inversion and feature inversion (in thatcherized faces) can be distinguished on a functional as well as neural level, and that they affect configural processing of faces in different time windows. © 2006 Elsevier Inc.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The NHS Trust v A (a child) & Ors [2007] EWHC 169

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Although the Ebbinghaus illusion is commonly used as an example of a simple size-contrast effect, previous studies have emphasised its complexity by identifying many factors that potentially influence the magnitude of the illusion. Here, in a series of three experiments, we attempt to simplify this complexity. In each trial, subjects saw a display comprising, on one side, a target stimulus surrounded by inducers and, on the other, an isolated probe stimulus. Their task was to indicate whether the probe appeared larger or smaller than the target. Probe size was adjusted with a one-up, one-down staircase procedure to find the point of subjective equality between probe and target. From these experiments, we argue that the apparent effects of inducer size are often confounded by the relative completeness of the inducing surround and that factors such as the similarity of the inducers and target are secondary. We suggest a simple model that can explain most of the data in terms of just two primary and independent factors: the relative size of the inducers and target, and the distance between the inducers and the target. The balance between these two factors determines whether the size of the target is underestimated or overestimated. © 2005 a Pion publication.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Focusing illusion describes how, when making choices, people may put disproportionate attention on certain attributes of the options and hence, causing those options to be overvalued. For instance, in deciding whether or not to take out a loan, people may focus more on getting the loan than on its small and dispersed costs. Building on recent literature on focusing illusion in economic choice, we theoretically propose and empirically test that focusing illusion can be advantageously exploited such that attention is put back on the ignored attributes. To demonstrate this, we use hypothetical loan decisions where people choose between loans with different repayment plans to finance a purchase. We show that when adding a steeply decreasing-installments plan to the original choice set of not borrowing or borrowing under a fixed-installments plan, the preference for the fixed-installments plan is lessened. This is because preference for the fixed-installments plan shifted towards not borrowing. We discuss potential applications of our results in designing choice sets of intertemporal sequences.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Acknowledgements We thank Brian Roberts and Mike Harris for responding to our questions regarding their paper; Zoltan Dienes for advice on Bayes factors; Denise Fischer, Melanie Römer, Ioana Stanciu, Aleksandra Romanczuk, Stefano Uccelli, Nuria Martos Sánchez, and Rosa María Beño Ruiz de la Sierra for help collecting data; Eva Viviani for managing data collection in Parma. We thank Maurizio Gentilucci for letting us use his lab, and the Centro Intradipartimentale Mente e Cervello (CIMeC), University of Trento, and especially Francesco Pavani for lending us his motion tracking equipment. We thank Rachel Foster for proofreading. KKK was supported by a Ph.D. scholarship as part of a grant to VHF within the International Graduate Research Training Group on Cross-Modal Interaction in Natural and Artificial Cognitive Systems (CINACS; DFG IKG-1247) and TS by a grant (DFG – SCHE 735/3-1); both from the German Research Council.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Scharff-technique is used for eliciting information from human sources. At the very core of the technique is the “illusion of knowing it all” tactic, which aims to inflate a source's perception of how much knowledge an interviewer holds about the event to be discussed. For the current study, we mapped the effects following two different ways of introducing this particular tactic; a traditional way of implementation where the interviewer explicitly states that s/he already knows most of the important information (the traditional condition), and a new way of implementation where the interviewer just starts to present the information that s/he holds (the just start condition). The two versions were compared in two separate experiments. In Experiment 1 (N = 60), we measured the participants’ perceptions of the interviewer's knowledge, and in Experiment 2 (N = 60), the participants’ perceptions of the interviewer's knowledge gaps. We found that participants in the just start condition (a) believed the interviewer had more knowledge (Experiment 1), and (b) searched less actively for gaps in the interviewer's knowledge (Experiment 2), compared to the traditional condition. We will discuss the current findings and how sources test and perceive the knowledge his or her interviewer possesses within a framework of social hypothesis testing.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Interactivity – a networked loop in which a performer’s live data feeds a digital system – can bridge the divide between live performance and digital entities in transmedia dance performances. In the ‘entanglement scene’ of Australian Dance Theatre’s Multiverse (2014), choreographer Garry Stewart and the creative coders and animators at the Deakin Motion.Lab utilise ‘faux-interactivity’, or a perceived relationship between the dancers and digital entities that exists only from the perspective of the audience. The spectre of ‘faux-interactivity’ challenges the spontaneity in live, embodied performance art because it both integrates live performance with prerendered digital content and offers a potential structure for a shared, dispersed creative and choreographic process across numerous and shared artistic and technological platforms. This paper investigates the concept of ‘faux-interactivity’, suggesting that its use can be a catalyst for moving beyond the limitations and values of ‘real’, or functional interactive systems within a theatrical context, and positing that definitions of ‘interactivity’ might be further expanded to accommodate the shifting timelines inherent in the disparate creative processes of human performance and coding.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis consists of a confessional narrative, What My Mother Doesn’t Know, and an accompanying exegesis, And Why I Should (Maybe) Tell Her. The creative piece employs the confessional mode as a subversive device in three separate narratives, each of which situates the bed as a site of resistance. The exegesis investigates how this self-disclosure in a domestic space flouts the governing rules of self-representation, specifically: telling the truth, respecting privacy and displaying normalcy. The female confession, I argue, creates an alternative space in women’s autobiography where notions of truth-telling can be undermined, the political dimensions of personal experience can be uncovered and the discourse of normality can be negotiated. In particular, women’s confessions told in, on or about the bed, dismantle the genre’s illusion of self and confirm the representative aspects of women’s experience. Framed within these parameters of power and powerlessness, the exegesis includes textual analyses of Charlotte Perkins Gilman’s The Yellow Wallpaper (1892), Tracey Emin’s My Bed (1999) and Lauren Slater’s Lying (2000), each of which exposes in a bedroom space, the author’s most obscure, intimate and traumatic experiences. Situated firmly within and against the genre’s traditional masculine domain, the exegesis also includes mediations on the creative work that validate the bed as my fabric for confession.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dangerous Places is a novel about the gap between mythological (or 'dreamed') constructions of reality and actual life. The story centres on V en, a married woman with two young children. Her love for her children is fiercely protective and encompassing, but she feels alienated from her husband and to a certain extent her society; so when her first love, Yanni, re-enters her life,she is strongly tempted to resume her affair with him. She is however seduced more by the memories she has 'mythologized' about him than by his physical reality; in the course of the novel she is forced to come to terms with her own delusions. The subplot of the novel involves other characters who are caught between illusion and reality as well, and who deal with 'truth' in differing ways. The themes of the book are explored using a number of structures which underlie and support the surface story. The Greek myths of Adonis/ Aphrodite and Hades/Persephone are framing agents for the plot, and the setting in contemporary Brisbane and North Stradbroke Island is symbolic.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper examines discussions of Generation Y within higher education discourse, arguing the sector’s use of the term to describe students is misguided for three reasons. First, portraying students as belonging to Generation Y homogenises people undertaking higher education as young, middle-class and technologically literate. Second, speaking of Generation Y students allows constructivism to be reinvented as a ‘new’ learning and teaching philosophy. Third, the Generation Y university student has become a central figure in concerns about technology’s role in learning and teaching. While the notion of the ‘Generation Y student’ creates the illusion that higher education institutions understand their constituents, ultimately, it is of little value in explaining young adults’ educational experiences.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Moon appears to be much larger closer to the horizon than when higher in the sky. This is called the ‘Moon Illusion’ since the observed size of the Moon is not actually larger when the Moon is just above the horizon. This article describes a technique for verifying that the observed size of the Moon in not larger on the horizon. The technique can be easily performed in a high school teaching environment. Moreover, the technique demonstrates the surprising fact that the observed size of the Moon is actually smaller on the horizon due to atmospheric refraction. For the purposes of this paper, several images of the moon were taken with the Moon close to the horizon and close to the zenith. Images were processed using a free program called ImageJ. The Moon was found to be 5.73 ±0.04% smaller in area on the horizon then at the zenith.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study investigated how contemporary puppet-based theatre can create deeply imaginative experiences for adult audiences. Designed to interrogate the potential effects of double-vision (Tillis, 1992), the theories of the sublime (Kant, 2008; 2003) and the uncanny (Jentsch, 1906; Freud, 1919) were used to create a series of creative guidelines. As practice-led research, the project embraced an iterative approach consisting of two cycles for creative experimentation, and a third for the creation of the final performance work The Harbinger, presented as a part of La Boite Theatre Company’s mainstage season. A theoretical investigation was also conducted to inform the developing practice.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article analyses Yeondoo Jung's exhibition at MAAP Space, Brisbane. Jung's video artworks works often reveal their mechanisms of pictorial illusion, and expose the apparatuses by which still and moving images are constructed more generally. This article examines the two specific works exhibited at MAAP Space, and situates them in the contexts of moving image theory and practice.