996 resultados para Dramatic scheme


Relevância:

60.00% 60.00%

Publicador:

Resumo:

El presente trabajo se ocupa de analizar el film Fedra de Jules Dassin en relaci162n a las tragedias Hipólito de Eurípides y Fedra, de Séneca, prestando especial atención a los aspectos que permiten actualizar la tragedia en un nuevo contexto histórico y cultural. A tal efecto se analiza el esquema dramático del mito y los constituyentes básicos de la identidad de los personajes principales

Relevância:

60.00% 60.00%

Publicador:

Resumo:

El presente trabajo se ocupa de analizar el film Fedra de Jules Dassin en relaci162n a las tragedias Hipólito de Eurípides y Fedra, de Séneca, prestando especial atención a los aspectos que permiten actualizar la tragedia en un nuevo contexto histórico y cultural. A tal efecto se analiza el esquema dramático del mito y los constituyentes básicos de la identidad de los personajes principales

Relevância:

60.00% 60.00%

Publicador:

Resumo:

El presente trabajo se ocupa de analizar el film Fedra de Jules Dassin en relaci162n a las tragedias Hipólito de Eurípides y Fedra, de Séneca, prestando especial atención a los aspectos que permiten actualizar la tragedia en un nuevo contexto histórico y cultural. A tal efecto se analiza el esquema dramático del mito y los constituyentes básicos de la identidad de los personajes principales

Relevância:

30.00% 30.00%

Publicador:

Resumo:

It could be said that road congestion is one of the most significant problems within any modern metropolitan area. For several decades now, around the globe, congestion in metropolitan areas has been worsening for two main reasons. Firstly, road congestion has significantly increased due to a higher demand for road space because of growth in populations, economic activity and incomes (Hensher & Puckett, 2007). This factor, in conjunction with a significant lack of investment in new road and public transport infrastructure, has seen the road network capacities of cities exceeded by traffic volumes and thus, resulted in increased traffic congestion. This relentless increase in road traffic congestion has resulted in a dramatic increase in costs for both the road users and ultimately the metropolitan areas concerned (Bureau of Transport and Regional Economics, 2007). In response to this issue, several major cities around the world, including London, Stockholm and Singapore, have implemented congestion-charging schemes in order to combat the effects of road congestion. A congestion-charging scheme provides a mechanism for regulating traffic flows into the congested areas of a city, whilst simultaneously generating public revenue that can be used to improve both the public transport and road networks of the region. The aim of this paper was to assess the concept of congestion-charging, whilst reflecting on the experiences of various cities that have already implemented such systems. The findings from this paper have been used to inform the design of a congestion-charging scheme for the city of Brisbane in Australia in a supplementary study (Whitehead, Bunker, & Chung, 2011). The first section of this paper examines the background to road congestion; the theory behind different congestion-charging schemes; and the various technologies involved with the concept. The second section of this paper details the experiences, in relation to implementing a congestion-charging scheme, from the city of Stockholm in Sweden. This research has been crucial in forming a list of recommendations and lessons learnt for the design of a congestion-charging scheme in Australia. It is these recommendations that directly inform the proposed design of the Brisbane Cordon Scheme detailed in Whitehead et al. (2011).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tzeng et al. proposed a new threshold multi-proxy multi-signature scheme with threshold verification. In their scheme, a subset of original signers authenticates a designated proxy group to sign on behalf of the original group. A message m has to be signed by a subset of proxy signers who can represent the proxy group. Then, the proxy signature is sent to the verifier group. A subset of verifiers in the verifier group can also represent the group to authenticate the proxy signature. Subsequently, there are two improved schemes to eliminate the security leak of Tzeng et al.’s scheme. In this paper, we have pointed out the security leakage of the three schemes and further proposed a novel threshold multi-proxy multi-signature scheme with threshold verification.