9 research outputs found

    French literary images of the Algerian war : an ideological analysis

    Get PDF
    The Algerian war of 1954 to 1962 is generally acknowledged to have been the apogee of France's uniquely traumatic retreat from overseas empire. Yet, despite the war's rapid establishment as the focus for a vast body of literature in the broadest sense, the experience of those years is only now beginning to be acknowledged by the French nation in anything like a balanced way. The present study seeks to contribute to the continuing elucidation of this historical failure of assimilation by considering the specific role played by prose fiction in contemporary and subsequent perceptions of the relevant events. Previous research into this aspect of the Franco-Algerian relationship has tended either to approach it as a minor element in a larger conceptual whole or to attach insufficient importance to its fundamentally political nature. This thesis is conceived as an analysis of the images of the Algerian war communicated in a representative sample of French literature produced both during and after the conflict itself. The method adopted is an ideological one, with particular attention being given in each of the seven constituent chapters to the selected texts' depiction of one of the principal parties to the conflict, together with their attendant political mythologies. This reading is primarily informed by the Barthesian model of semiosis, which is drawn upon to explain the linguistic foundations of the systematic literary obfuscation of this period of colonial history. By analysing points of ideological tension in the fictional imaging of the war, we are able to identify and to evaluate examples of both artistic mystification and demystifying art. It is argued in conclusion that the former category of narrative has never ceased to predominate, thus enabling French public opinion to continue to avoid its ultimate responsibility for the war and its conduct

    Time- and value-continuous explainable affect estimation in-the-wild

    Get PDF
    Today, the relevance of Affective Computing, i.e., of making computers recognise and simulate human emotions, cannot be overstated. All technology giants (from manufacturers of laptops to mobile phones to smart speakers) are in a fierce competition to make their devices understand not only what is being said, but also how it is being said to recognise user’s emotions. The goals have evolved from predicting the basic emotions (e.g., happy, sad) to now the more nuanced affective states (e.g., relaxed, bored) real-time. The databases used in such research too have evolved, from earlier featuring the acted behaviours to now spontaneous behaviours. There is a more powerful shift lately, called in-the-wild affect recognition, i.e., taking the research out of the laboratory, into the uncontrolled real-world. This thesis discusses, for the very first time, affect recognition for two unique in-the-wild audiovisual databases, GRAS2 and SEWA. The GRAS2 is the only database till date with time- and value-continuous affect annotations for Labov effect-free affective behaviours, i.e., without the participant’s awareness of being recorded (which otherwise is known to affect the naturalness of one’s affective behaviour). The SEWA features participants from six different cultural backgrounds, conversing using a video-calling platform. Thus, SEWA features in-the-wild recordings further corrupted by unpredictable artifacts, such as the network-induced delays, frame-freezing and echoes. The two databases present a unique opportunity to study time- and value-continuous affect estimation that is truly in-the-wild. A novel ‘Evaluator Weighted Estimation’ formulation is proposed to generate a gold standard sequence from several annotations. An illustration is presented demonstrating that the moving bag-of-words (BoW) representation better preserves the temporal context of the features, yet remaining more robust against the outliers compared to other statistical summaries, e.g., moving average. A novel, data-independent randomised codebook is proposed for the BoW representation; especially useful for cross-corpus model generalisation testing when the feature-spaces of the databases differ drastically. Various deep learning models and support vector regressors are used to predict affect dimensions time- and value-continuously. Better generalisability of the models trained on GRAS2 , despite the smaller training size, makes a strong case for the collection and use of Labov effect-free data. A further foundational contribution is the discovery of the missing many-to-many mapping between the mean square error (MSE) and the concordance correlation coefficient (CCC), i.e., between two of the most popular utility functions till date. The newly invented cost function |MSE_{XY}/σ_{XY}| has been evaluated in the experiments aimed at demystifying the inner workings of a well-performing, simple, low-cost neural network effectively utilising the BoW text features. Also proposed herein is the shallowest-possible convolutional neural network (CNN) that uses the facial action unit (FAU) features. The CNN exploits sequential context, but unlike RNNs, also inherently allows data- and process-parallelism. Interestingly, for the most part, these white-box AI models have shown to utilise the provided features consistent with the human perception of emotion expression

    Demystifying Internet of Things Security

    Get PDF
    Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms

    Irreversible Noise: The Rationalisation of Randomness and the Fetishisation of Indeterminacy

    Get PDF
    This thesis aims to elaborate the theoretical and practical significance of the concept of noise with regard to current debates concerning realism, materialism, and rationality. The scientific conception of noise follows from the developments of thermodynamics, information theory, cybernetics, and dynamic systems theory; hence its qualification as irreversible. It is argued that this conceptualization of noise is entangled in several polemics that cross the arts and sciences, and that it is crucial to an understanding of their contemporary condition. This thesis draws on contemporary scientific theories to argue that randomness is an intrinsic functional aspect at all levels of complex dynamic systems, including higher cognition and reason. However, taking randomness or noise as given, or failing to distinguish between different descriptive levels, has led to misunderstanding and ideology. After surveying the scientific and philosophical context, the practical understanding of randomness in terms of probability theory is elaborated through a history of its development in the field of economics, where its idealization has had its most pernicious effects. Moving from the suppression of noise in economics to its glorification in aesthetics, the experience of noise in the sonic sense is first given a naturalistic neuro-phenomenological explanation. Finally, the theoretical tools developed over the course of the inquiry are applied to the use of noise in music. The rational explanation of randomness in various specified contexts, and the active manipulation of probability that this enables, is opposed to the political and aesthetic tendencies to fetishize indeterminacy. This multi-level account of constrained randomness contributes to the debate by demystifying noise, showing it to be an intrinsic and functionally necessary condition of reason and consequently of freedom

    Preserving Layered Narratives, Reconstructing the Future: Demystifying Egypt’s Tangible and Intangible Heritage

    Get PDF
    This book presents the proceedings of the second Luxor Living Lab International Workshop, a collaborative effort between the University of Lincoln (UK) and Ain Shams University (Egypt). The workshop, operating under the umbrella of the University of Lincoln's 'Heritage Living Lab,' focuses on the participatory revitalisation of cultural heritage in Luxor through innovative digital processes. The book provides a comprehensive exploration of the workshop's discussions, insights, and recommendations aimed at safeguarding Luxor's tangible and intangible heritage for future generations. Contents: 1.0 Introduction: The opening chapter sets the stage for the exploration of Egypt's cultural heritage and the workshop's purpose in demystifying the layers of history within Luxor's rich heritage. 2.0 Day One – Fatimid Cairo Tour: A detailed account of the exploration of Fatimid Cairo, providing a historical backdrop for the subsequent workshop discussions. 3.0 Day Two – Workshop Presentations: A Symphony of Insights Unveiled: Highlights of presentations by various experts and professionals, covering topics such as recent works in Luxor Temple, the cemeteries of Cairo, heritage revitalisation, introducing heritage to children and youth, and case studies from Cairo that enriched participants' experiences by showcasing live regeneration projects. 4.0 Parallel Sessions: A Kaleidoscope of Heritage Sustainability: Dives into thematic sessions discussing preservation management, sustainable development, innovation techniques, policy development, decision-making, and digital documentation in cultural heritage preservation. 5.0 Recommendations: Nurturing Heritage Sustainability: Key recommendations emerging from the workshop, including community engagement, the role of digital technologies, enhancing heritage access, interdisciplinary collaboration, and utilising heritage as a catalyst for sustainable development. 6.0 Impact and Lessons Learned: Navigating Beyond Academia: Examines the workshop's impact on participants, lessons learned, and its influence on architects, policymakers, and the community, offering valuable insights beyond academic realms. 7.0 Conclusion and Final Remarks: Nurturing Collaboration and Sustainable Heritage Practices: Summarises the findings and encourages continued collaboration in the pursuit of preserving global cultural heritage. 8.0 References: A comprehensive list of references supporting the workshop's discussions and findings. 9.0 Appendices: 8.1 Speaker Biographies: Detailed biographies of the speakers, providing insights into their expertise and contributions to the workshop. 8.2 Organisers Biographies: Background information on the organizers, detailing their roles and involvement in the Luxor Living Lab International Workshop. 8.3 Schedule: A comprehensive schedule of the workshop, outlining each session, presentation, and activity over the two days. 8.4 Participant Feedback Highlights: An overview of participant feedback, highlighting key insights and reflections gathered during the symposium's two days. The book serves as a valuable resource for scholars, practitioners, policy makers and enthusiasts engaged in the preservation and revitalisation of cultural heritage, offering a multifaceted view of Luxor's heritage and its global implications, enriched by case studies from Cairo

    Being And Becoming Entrepreneurial: A Narrative Study On The Development Of Entrepreneurial Adults In China And The United States

    Get PDF
    Today’s youth have lives dramatically different from the past and face an unpredictable future and challenging job market, thus being entrepreneurial is increasingly more important to cultivate (Ford, 2015). I aim to understand the state and development of being entrepreneurial and its implications for broadly educating young people, as one approach to better preparing our students for the future (Auerswald, 2012; de Villiers Scheepers et al., 2018).Although the general research interest in entrepreneurship is burgeoning, the developmental perspective has been limited. Additionally, the development of Entrepreneurial individuals across diverse age groups and countries has not been studied extensively and their narratives of being and becoming entrepreneurial have not been heard and studied. Thus, I have used the self-narratives of 24 entrepreneurial individuals in China and the US to explore how they are developing to be entrepreneurial. Specifically, I explored their current state of being entrepreneurial and developmental processes that have contributed to these states. My sample was divided evenly across the Chinese and United States contexts, and also stratified by age groups (from 18 to 39; and 40 and above) and gender (male and female). I sought to understand what factors might have affected the entrepreneurial development in different individuals, according to their own understanding, and explored whether differences exist across countries, gender, and age groups. I placed a particular emphasis on developmental patterns that were revealed in the analytic process. Interviews were analyzed through a coding and interpretive process informed by grounded theory (Glaser & Strauss, 1967). First, five key themes emerged related to being of entrepreneurial: (1) Learning as a Way of Being; (2) Action!; (3) Staying in the Arena; (4) Connecting Elements, People, Information and Resources; and (5) Disrupting. Secondly, in terms of factors affecting entrepreneurial development, both internal (self-characteristics) and external (environmental) factors were identified from the narrative accounts, and the developmental process was presented as dynamic and complex. Key developmental sources of influence include: (1)Emerging Self Identities and Experiences from Childhood and Teen Years; (2) Early Entrepreneurial Experiences; (3) Family influence; (4) Work-Related Experience; (5) School Impact; and (6) Virtual and Physical entrepreneurial environments. Finally, differences and commonalities across the countries, age groups, and gender emerged and are discussed. Overall, entrepreneurial development can and should be broadly encouraged given the narratives and lessons shared by the participants. Recommendations and implications for supporting students’ “entrepreneurial development” are presented: (1) It is the mindset, not the occupation; (2) Demystifying the entrepreneurial mindset as a way of thinking and being; (3) It takes a village to raise an entrepreneurial child; (4) Developing an entrepreneurial mindset as a way to achieve personal growth and fulfillment. Lastly, the limits and future direction are discussed

    Volitional Cybersecurity

    Get PDF
    This dissertation introduces the “Volitional Cybersecurity” (VCS) theory as a systematic way to think about adoption and manage long-term adherence to cybersecurity approaches. The validation of VCS has been performed in small- and medium-sized enterprises or businesses (SMEs/SMBs) context. The focus on volitional activities promotes theoretical viewpoints. Also, it aids in demystifying the aspects of cybersecurity behaviour in heterogeneous contexts that have neither been systematically elaborated in prior studies nor embedded in cybersecurity solutions. Abundant literature demonstrates a lack of adoption of manifold cybersecurity remediations. It is still not adequately clear how to select and compose cybersecurity approaches into solutions for meeting the needs of many diverse cybersecurity-adopting organisations. Moreover, the studied theories in this context mainly originated from disciplines other than information systems and cybersecurity. The constructs were developed based on data, for instance, in psychology or criminology, that seem not to fit properly for the cybersecurity context. Consequently, discovering new methods and theories that can be of help in active and volitional forms of cybersecurity behaviour in diverse contexts may be conducive to a better quality of cybersecurity engagement. This leads to the main research question of this dissertation: How can we support volitional forms of behaviour with a self-paced tool to increase the quality of cybersecurity engagement? The main contribution of this dissertation is the VCS theory. VCS is a cybersecurity-focused theory structured around the core concept of volitional cybersecurity behaviour. It suggests that a context can be classified based on the cybersecurity competence of target groups and their distinct requirements. This classification diminishes the complexity of the context and is predictive of improvement needs for each class. Further, the theory explicates that supporting three factors: A) personalisation, B) cybersecurity competence, and C) connectedness to cybersecurity expertise affect the adoption of cybersecurity measures and better quality of cybersecurity engagement across all classes of the context. Therefore, approaches that ignore the personalisation of cybersecurity solutions, the cybersecurity competence of target groups, and the connectedness of recipients to cybersecurity expertise may lead to poorer acceptance of the value or utility of solutions. Subsequently, it can cause a lack of motivation for adopting cybersecurity solutions and adherence to best practices. VCS generates various implications. It has implications for cybersecurity research in heterogeneous contexts to transcend the common cybersecurity compliance approaches. Building on VCS, researchers could develop interventions looking for volitional cybersecurity behaviour change. Also, it provides knowledge that can be useful in the design of self-paced cybersecurity tools. VCS explains why the new self-paced cybersecurity tool needs specific features. The findings of this dissertation have been subsequently applied to the follow-up project design. Further, it has implications for practitioners and service providers to reach out to the potential end-users of their solutions
    corecore