845 resultados para Sounds of silent cinema
Resumo:
How do prevailing narratives about Native Americans, particularly in the medium of film, conspire to promote the perspective of the dominant culture? What makes the appropriation of Indigenous images so metaphorically popular? In the past hundred years, little has changed in the forms of representation favored by Hollywood. The introductory chapter elucidates the problem and outlines the scope of this study. As each subsequent chapter makes clear, the problem is as relevant today as it has been throughout the entire course of filmic history. Chapter Two analyzes representational trends and defines each decade according to its favorite stereotype. The binary of the bloodthirsty savage is just as prevalent as it was during the 1920s and 30s. The same holds true for the drunken scapegoat and the exotic maiden, which made their cinematic debuts in the 1940s and 50s. But Hollywood has added new types as well. The visionary peacemaker and environmental activist have also made an appearance within the last forty years. What matters most is not the realism of these images, but rather the purposes to which they can be put toward validating whatever concerns the majority filmmakers wish to promote. Whether naïvely or not, such representations continue to evacuate Indigenous agency to the advantage of the majority. A brief historical overview confirms this legacy. Various disciplines have sought to interrogate this problem. Chapter three investigates the field of postcolonial studies, which makes inquiry into the various ways these narratives are produced, marketed, and consumed. It also raises the key questions of for whom, and by whom, these narratives are constructed. Additional consideration is given to their value as commodities in the mass marketplace. Typically the products of a boutique-multiculturalism, their storylines are apt to promote the prevailing point of view. Critical theory provides a foundational framework for chapter four. What is the blockbuster formula and how do the instruments of capital promote it? Concepts such as culture industry and repressive tolerance examine both the function and form of the master narrative, as well as its use to control the avenues of dissent. Moreover, the public sphere and its diminishment highlight the challenges inherent in the widespread promotion of an alternative set of narratives. Nonetheless, challenges to prevailing narratives do exist, particularly in the form of Trickster narratives. Often subject to persistent misrecognition, the Trickster demonstrates a potent form of agency that undeniably dismantles the hegemony of Western cinema. The final chapter examines some of the Trickster's more subtle and obscure productions. Usually subjugated to the realm of the mystical, rather than the mythical, these misinterpreted forms have the power to speak in circles around a majority audience. Intended for an Other audience, they are coded in a language that delivers a type of direction through indirection, promoting a poignant agency all their own.
Resumo:
BACKGROUND Rheumatic heart disease accounts for up to 250 000 premature deaths every year worldwide and can be regarded as a physical manifestation of poverty and social inequality. We aimed to estimate the prevalence of rheumatic heart disease in endemic countries as assessed by different screening modalities and as a function of age. METHODS We searched Medline, Embase, the Latin American and Caribbean System on Health Sciences Information, African Journals Online, and the Cochrane Database of Systematic Reviews for population-based studies published between Jan 1, 1993, and June 30, 2014, that reported on prevalence of rheumatic heart disease among children and adolescents (≥5 years to <18 years). We assessed prevalence of clinically silent and clinically manifest rheumatic heart disease in random effects meta-analyses according to screening modality and geographical region. We assessed the association between social inequality and rheumatic heart disease with the Gini coefficient. We used Poisson regression to analyse the effect of age on prevalence of rheumatic heart disease and estimated the incidence of rheumatic heart disease from prevalence data. FINDINGS We included 37 populations in the systematic review and meta-analysis. The pooled prevalence of rheumatic heart disease detected by cardiac auscultation was 2·9 per 1000 people (95% CI 1·7-5·0) and by echocardiography it was 12·9 per 1000 people (8·9-18·6), with substantial heterogeneity between individual reports for both screening modalities (I(2)=99·0% and 94·9%, respectively). We noted an association between social inequality expressed by the Gini coefficient and prevalence of rheumatic heart disease (p=0·0002). The prevalence of clinically silent rheumatic heart disease (21·1 per 1000 people, 95% CI 14·1-31·4) was about seven to eight times higher than that of clinically manifest disease (2·7 per 1000 people, 1·6-4·4). Prevalence progressively increased with advancing age, from 4·7 per 1000 people (95% CI 0·0-11·2) at age 5 years to 21·0 per 1000 people (6·8-35·1) at 16 years. The estimated incidence was 1·6 per 1000 people (0·8-2·3) and remained constant across age categories (range 2·5, 95% CI 1·3-3·7 in 5-year-old children to 1·7, 0·0-5·1 in 15-year-old adolescents). We noted no sex-related differences in prevalence (p=0·829). INTERPRETATION We found a high prevalence of rheumatic heart disease in endemic countries. Although a reduction in social inequalities represents the cornerstone of community-based prevention, the importance of early detection of silent rheumatic heart disease remains to be further assessed. FUNDING UBS Optimus Foundation.
Resumo:
Importance: Although rheumatic heart disease has been nearly eradicated in high-income countries, 3 in 4 children grow up in parts of the world where it is still endemic. Objectives: To determine the prevalence of clinically silent and manifest rheumatic heart disease as a function of age, sex, and socioeconomic status and to estimate age-specific incidence. Design, Setting, and Participants: In this school-based cross-sectional study with cluster sampling, 26 schools in the Sunsari district in Eastern Nepal with 5467 eligible children 5 to 15 years of age were randomly selected from 595 registered schools. After exclusion of 289 children, 5178 children were enrolled in the present study from December 12, 2012, through September 12, 2014. Data analysis was performed from October 1, 2014, to April 15, 2015. Exposures: Demographic and socioeconomic characteristics were acquired in a standardized interview by means of a questionnaire customized to the age of the children. A focused medical history was followed by a brief physical examination. Cardiac auscultation and transthoracic echocardiography were performed by 2 independent physicians. Main Outcomes and Measures: Rheumatic heart disease according to the World Heart Federation criteria. Results: The median age of the 5178 children enrolled in the study was 10 years (interquartile range, 8-13 years), and 2503 (48.3%) were female. The prevalence of borderline or definite rheumatic heart disease was 10.2 (95% CI, 7.5-13.0) per 1000 children and increased with advancing age from 5.5 (95% CI, 3.5-7.5) per 1000 children 5 years of age to 16.0 (95% CI, 14.9-17.0) in children 15 years of age, whereas the mean incidence remained stable at 1.1 per 1000 children per year. Children with rheumatic heart disease were older than children without rheumatic heart disease (median age [interquartile range], 11 [9-14] years vs 10 [8-13] years; P = .03), more commonly female (34 [64.2%] vs 2469 [48.2%]; P = .02), and more frequently went to governmental schools (40 [75.5%] vs 2792 [54.5%]; P = .002). Silent disease (n = 44) was 5 times more common than manifest disease (n = 9). Conclusions and Relevance: Rheumatic heart disease affects 1 in 100 schoolchildren in Eastern Nepal, is primarily clinically silent, and may be more common among girls. The overall prevalence and the ratio of manifest to subclinical disease increase with advancing age, whereas the incidence remains stable at 1.1 per 1000 children per year. Early detection of silent disease may help prevent progression to severe valvular damage.
Resumo:
Background. First synthesized in 1874, dichlorodiphenyltrichloroethane (DDT) was not used until the second half of World War II after its insecticidal properties were discovered in 1939. For decades DDT has been used globally with the intent of eradicating malaria. This began in 1955 when the eighth World Health Assembly launched a global campaign selecting DDT as the chemical of choice for the eradication of malaria. The United States banned DDT use in 1972 partially due to the publication of “Silent Spring” by Rachel Carson in 1962 which suggested that DDT was harmful to the environment, wildlife and is a carcinogen. ^ Objectives. To critically review the literature on DDT, and evaluate its importance in malaria prevention and control. Methods: The design of this systematic literature review is a narrative summary and evaluation of the papers reviewed. The data came from searches using PubMed and MEDLINE which are free and publicly available databases. Inclusive criteria that were considered during the search are English language peer reviewed journal articles published in the last 20 years. The keywords were: “insecticidal and agricultural use of DDT”, “human impact of malaria”, “economic impact of malaria”, “benefits of DDT”, “effects of DDT”, “importance of malaria control”, and alternatives to DDT for malaria control. ^ Results. Malaria continues to be one of the most common infectious diseases and creates a tremendous global public health problem. WHO recommends DDT for malaria vector control because compared to other pesticides, it is the most persistent in indoor spraying. ^ Conclusion. Indoor spraying of DDT in malaria endemic areas may cause increased exposure of the chemical to humans; however I conclude that the overall benefits outweigh the risks because more lives are saved due to fewer infections with malaria.^
Resumo:
El artículo analiza las representaciones fílmicas de la conciencia social y la experiencia de clase, en relación a varias series de películas del cine clásico, tanto europeo como hollywoodense, que ponen en escena a sujetos sociales colectivos y conflictos sociales. Se intenta responder a la pregunta sobre la posibilidad y alcances de la representación visual y fílmica de las categorías teóricas de las ciencias sociales En esta dirección se examina la homogeneización de las masas en la epopeya de multitudes anónimas en la época del cine mudo, en el cine épico-histórico de la Italia fascista y en las superproducciones históricas estadounidenses de los años cincuenta, así como la aparición fílmica del sujeto histórico proletariado en el cine de la vanguardia rusa de la década de 1920 y su preocupación por filmar expresamente la conciencia revolucionaria y los conflictos de concientización.
Resumo:
El artículo analiza las representaciones fílmicas de la conciencia social y la experiencia de clase, en relación a varias series de películas del cine clásico, tanto europeo como hollywoodense, que ponen en escena a sujetos sociales colectivos y conflictos sociales. Se intenta responder a la pregunta sobre la posibilidad y alcances de la representación visual y fílmica de las categorías teóricas de las ciencias sociales En esta dirección se examina la homogeneización de las masas en la epopeya de multitudes anónimas en la época del cine mudo, en el cine épico-histórico de la Italia fascista y en las superproducciones históricas estadounidenses de los años cincuenta, así como la aparición fílmica del sujeto histórico proletariado en el cine de la vanguardia rusa de la década de 1920 y su preocupación por filmar expresamente la conciencia revolucionaria y los conflictos de concientización.
Resumo:
El artículo analiza las representaciones fílmicas de la conciencia social y la experiencia de clase, en relación a varias series de películas del cine clásico, tanto europeo como hollywoodense, que ponen en escena a sujetos sociales colectivos y conflictos sociales. Se intenta responder a la pregunta sobre la posibilidad y alcances de la representación visual y fílmica de las categorías teóricas de las ciencias sociales En esta dirección se examina la homogeneización de las masas en la epopeya de multitudes anónimas en la época del cine mudo, en el cine épico-histórico de la Italia fascista y en las superproducciones históricas estadounidenses de los años cincuenta, así como la aparición fílmica del sujeto histórico proletariado en el cine de la vanguardia rusa de la década de 1920 y su preocupación por filmar expresamente la conciencia revolucionaria y los conflictos de concientización.
Resumo:
Esta tesis se centra en el análisis de dos aspectos complementarios de la ciberdelincuencia (es decir, el crimen perpetrado a través de la red para ganar dinero). Estos dos aspectos son las máquinas infectadas utilizadas para obtener beneficios económicos de la delincuencia a través de diferentes acciones (como por ejemplo, clickfraud, DDoS, correo no deseado) y la infraestructura de servidores utilizados para gestionar estas máquinas (por ejemplo, C & C, servidores explotadores, servidores de monetización, redirectores). En la primera parte se investiga la exposición a las amenazas de los ordenadores victimas. Para realizar este análisis hemos utilizado los metadatos contenidos en WINE-BR conjunto de datos de Symantec. Este conjunto de datos contiene metadatos de instalación de ficheros ejecutables (por ejemplo, hash del fichero, su editor, fecha de instalación, nombre del fichero, la versión del fichero) proveniente de 8,4 millones de usuarios de Windows. Hemos asociado estos metadatos con las vulnerabilidades en el National Vulnerability Database (NVD) y en el Opens Sourced Vulnerability Database (OSVDB) con el fin de realizar un seguimiento de la decadencia de la vulnerabilidad en el tiempo y observar la rapidez de los usuarios a remiendar sus sistemas y, por tanto, su exposición a posibles ataques. Hemos identificado 3 factores que pueden influir en la actividad de parches de ordenadores victimas: código compartido, el tipo de usuario, exploits. Presentamos 2 nuevos ataques contra el código compartido y un análisis de cómo el conocimiento usuarios y la disponibilidad de exploit influyen en la actividad de aplicación de parches. Para las 80 vulnerabilidades en nuestra base de datos que afectan código compartido entre dos aplicaciones, el tiempo entre el parche libera en las diferentes aplicaciones es hasta 118 das (con una mediana de 11 das) En la segunda parte se proponen nuevas técnicas de sondeo activos para detectar y analizar las infraestructuras de servidores maliciosos. Aprovechamos técnicas de sondaje activo, para detectar servidores maliciosos en el internet. Empezamos con el análisis y la detección de operaciones de servidores explotadores. Como una operación identificamos los servidores que son controlados por las mismas personas y, posiblemente, participan en la misma campaña de infección. Hemos analizado un total de 500 servidores explotadores durante un período de 1 año, donde 2/3 de las operaciones tenían un único servidor y 1/2 por varios servidores. Hemos desarrollado la técnica para detectar servidores explotadores a diferentes tipologías de servidores, (por ejemplo, C & C, servidores de monetización, redirectores) y hemos logrado escala de Internet de sondeo para las distintas categorías de servidores maliciosos. Estas nuevas técnicas se han incorporado en una nueva herramienta llamada CyberProbe. Para detectar estos servidores hemos desarrollado una novedosa técnica llamada Adversarial Fingerprint Generation, que es una metodología para generar un modelo único de solicitud-respuesta para identificar la familia de servidores (es decir, el tipo y la operación que el servidor apartenece). A partir de una fichero de malware y un servidor activo de una determinada familia, CyberProbe puede generar un fingerprint válido para detectar todos los servidores vivos de esa familia. Hemos realizado 11 exploraciones en todo el Internet detectando 151 servidores maliciosos, de estos 151 servidores 75% son desconocidos a bases de datos publicas de servidores maliciosos. Otra cuestión que se plantea mientras se hace la detección de servidores maliciosos es que algunos de estos servidores podrán estar ocultos detrás de un proxy inverso silente. Para identificar la prevalencia de esta configuración de red y mejorar el capacidades de CyberProbe hemos desarrollado RevProbe una nueva herramienta a través del aprovechamiento de leakages en la configuración de la Web proxies inversa puede detectar proxies inversos. RevProbe identifica que el 16% de direcciones IP maliciosas activas analizadas corresponden a proxies inversos, que el 92% de ellos son silenciosos en comparación con 55% para los proxies inversos benignos, y que son utilizado principalmente para equilibrio de carga a través de múltiples servidores. ABSTRACT In this dissertation we investigate two fundamental aspects of cybercrime: the infection of machines used to monetize the crime and the malicious server infrastructures that are used to manage the infected machines. In the first part of this dissertation, we analyze how fast software vendors apply patches to secure client applications, identifying shared code as an important factor in patch deployment. Shared code is code present in multiple programs. When a vulnerability affects shared code the usual linear vulnerability life cycle is not anymore effective to describe how the patch deployment takes place. In this work we show which are the consequences of shared code vulnerabilities and we demonstrate two novel attacks that can be used to exploit this condition. In the second part of this dissertation we analyze malicious server infrastructures, our contributions are: a technique to cluster exploit server operations, a tool named CyberProbe to perform large scale detection of different malicious servers categories, and RevProbe a tool that detects silent reverse proxies. We start by identifying exploit server operations, that are, exploit servers managed by the same people. We investigate a total of 500 exploit servers over a period of more 13 months. We have collected malware from these servers and all the metadata related to the communication with the servers. Thanks to this metadata we have extracted different features to group together servers managed by the same entity (i.e., exploit server operation), we have discovered that 2/3 of the operations have a single server while 1/3 have multiple servers. Next, we present CyberProbe a tool that detects different malicious server types through a novel technique called adversarial fingerprint generation (AFG). The idea behind CyberProbe’s AFG is to run some piece of malware and observe its network communication towards malicious servers. Then it replays this communication to the malicious server and outputs a fingerprint (i.e. a port selection function, a probe generation function and a signature generation function). Once the fingerprint is generated CyberProbe scans the Internet with the fingerprint and finds all the servers of a given family. We have performed a total of 11 Internet wide scans finding 151 new servers starting with 15 seed servers. This gives to CyberProbe a 10 times amplification factor. Moreover we have compared CyberProbe with existing blacklists on the internet finding that only 40% of the server detected by CyberProbe were listed. To enhance the capabilities of CyberProbe we have developed RevProbe, a reverse proxy detection tool that can be integrated with CyberProbe to allow precise detection of silent reverse proxies used to hide malicious servers. RevProbe leverages leakage based detection techniques to detect if a malicious server is hidden behind a silent reverse proxy and the infrastructure of servers behind it. At the core of RevProbe is the analysis of differences in the traffic by interacting with a remote server.
Resumo:
Plasmodium falciparum, the agent of malignant malaria, is one of mankind’s most severe scourges. Efforts to develop preventive vaccines or remedial drugs are handicapped by the parasite’s rapid evolution of drug resistance and protective antigens. We examine 25 DNA sequences of the gene coding for the highly polymorphic antigenic circumsporozoite protein. We observe total absence of silent nucleotide variation in the two nonrepeated regions of the gene. We propose that this absence reflects a recent origin (within several thousand years) of the world populations of P. falciparum from a single individual; the amino acid polymorphisms observed in these nonrepeat regions would result from strong natural selection. Analysis of these polymorphisms indicates that: (i) the incidence of recombination events does not increase with nucleotide distance; (ii) the strength of linkage disequilibrium between nucleotides is also independent of distance; and (iii) haplotypes in the two nonrepeat regions are correlated with one another, but not with the central repeat region they span. We propose two hypotheses: (i) variation in the highly polymorphic central repeat region arises by mitotic intragenic recombination, and (ii) the population structure of P. falciparum is clonal—a state of affairs that persists in spite of the necessary stage of physiological sexuality that the parasite must sustain in the mosquito vector to complete its life cycle.
Resumo:
Cac1p is a subunit of yeast chromatin assembly factor I (yCAF-I) that is thought to assemble nucleosomes containing diacetylated histones onto newly replicated DNA [Kaufman, P. D., Kobayashi, R. & Stillman, B. (1997) Genes Dev. 11, 345–357]. Although cac1Δ cells could establish and maintain transcriptional repression at telomeres, they displayed a reduced heritability of the repressed state. Single-cell analysis revealed that individual cac1Δ cells switch from transcriptionally “off” to transcriptionally “on” more often per cell cycle than wild-type cells. In addition, cac1Δ cells were defective for transcriptional silencing near internal tracts of C1–3A sequence, but they showed no defect in silencing at the silent mating type loci when analyzed by a reverse transcription–PCR assay. Despite the loss of transcriptional silencing at telomeres and internal C1–3A tracts, subtelomeric DNA was organized into nucleosomes that had all of the features characteristic of silent chromatin, such as hypoacetylation of histone H4 and protection from methylation by the Escherichia coli dam methylase. Thus, these features of silent chromatin are not sufficient for stable maintenance of a silent chromatin state. We propose that the inheritance of the transcriptionally repressed state requires the specific pattern of histone acetylation conferred by yCAF-I-mediated nucleosome assembly.
Resumo:
Mode of access: Internet.
Resumo:
Health professionals need to be cognizant of the varying perceptions of health shared by people from different religious, sociocultural, and linguistic backgrounds to deliver culturally sensitive health care. In this qualitative study, the authors used semistructured interviews to provide insight into how 10 older Arabian Gulf Muslim persons understand and perceive health and illness with emphasis on the role of Islam in formulating health behaviors. Participants' views were strongly influenced by their religious convictions. Good health was equated with the absence of visible disease, with participants demonstrating limited understanding of silent or insidious disease. They attended doctors for treatment of visible disease rather than seeking preventive health care for diseases such as hypertension, diabetes, and hyperlipidemia. Building oil the results from this study could help inform both health service planners and providers to improve the appropriateness, relevancy, and effectiveness of aged care services for these individuals.
Resumo:
We intend with this research to contribute to the contemporary debate pertinent to the history of Brazilian cinema, its historiography and its writing procedures. Thereunto, we sustain the view that the historical interpretation composed by the essays Panorama do Cinema Brasileiro: 1896/1966 (1966) and Cinema: trajetória no subdesenvolvimento (1973) arranged by the critic and historian Paulo Emilio Salles Gomes, due to their epistemological postulates and narrative strategies, constitutes a version about the history of national cinema of expressive discursive efficacy.
Resumo:
This work aims to contribute to theoretical and methodological analysis of writing the history of Brazilian cinema. The object of this study the trilogy of articles in Cinema: the trajectory of underdevelopment regimented, the critic and historian Paulo Emílio Salles Gomes, seeks to understand the process of setting up a web interpretative history of our film based on this work and how to rescue its historicity.
Resumo:
During the Royal Shakespeare Company's 2014 summer season, both parts of Henry IV and The Two Gentlemen of Verona were presented as Live from Stratford-upon-Avon broadcasts in cinemas around the world. This article presents a case study of these broadcasts, drawing on the author's observations and insights as their producer as well as interview contributions from those involved in both the stage and screen presentations. Recognising that the hybrid form of “live cinema” performance has developed rapidly over the past five years but is as-yet little-documented, the study develops an analytical approach to its creative processes and to its aesthetics. This discussion is combined with a consideration of the history of earlier screen adaptations of RSC productions at Stratford-upon-Avon. The article details the stages of the production process for the Live from Stratford-upon-Avon broadcasts in 2014 and considers the ways in which the broadcast teams collaborate with the casts and creative teams of the theatre productions. In addition, the article explores processes of adaptation in the journey from stage to screen, the poetics of multi-camera presentation and questions of “live-ness”, the social experience of viewing performance in the cinema, and possible developments for live theatre on screen.