10,232 research outputs found
The Art History Canon and the Art History Survey Course: Subverting the Western Narrative.
Art History enrollments at the college level are declining as students flock to STEM majors and perceive Art History as dated and of little use in today’s modern, scientific world. Yet Art History classes can teach valuable skills. When taught in a broad context, the objects art history studies engage critical thinking and can generate new forms of knowledge. However, the pedagogical structure and content of introductory art history survey course does not always offer students the creative leeway to make these connections. Instructors at the college level often retreat to the methods and content that have been a part of the discipline since its inception in the late 19thcentury; the professor as expert authority on the western canon of objects and the grand narrative of progressive development that accompanies them. As university students are becoming more ethnically and socially diverse, the objects covered in the survey continue to speak to a white, European audience that is no longer the only audience listening. While art history remains useful, its canon of objects has become problematic, and reinforces the othering of the non- western world.
This essay will first examine how the modern canon and art history’s pedagogical practices came to be by examining the history of the discipline, and the theories, methods and texts that developed alongside academic art history. It will then take a brief look at how modern philosophy, primarily the conceptual ideas of Deleuze and Guattari, can provide a new framework for examining how the teaching of art history can be globalized and taught in a more meaningful way
NEW CONSERVATION PROGRAMS AND PARTNERSHIPS, HOW PUBLIC SECTOR TECHNICAL SERVICE PROVIDERS WILL PARTICIPATE
Land Economics/Use,
Is J 133658.3-295105 a Radio Source at z >= 1.0 or at the Distance of M 83?
We present Gemini optical imaging and spectroscopy of the radio source J
133658.3-295105. This source has been suggested to be the core of an FR II
radio source with two detected lobes. J 133658.3-295105 and its lobes are
aligned with the optical nucleus of M 83 and with three other radio sources at
the M 83 bulge outer region. These radio sources are neither supernova remnants
nor H II regions. This curious configuration prompted us to try to determine
the distance to J 133658.3-295105. We detected H_alpha emission redshifted by ~
130 km s^-1 with respect to an M 83 H II region 2.5" east-southeast of the
radio source. We do not detect other redshifted emission lines of an optical
counterpart down to m_i = 22.2 +/- 0.8. Two different scenarios are proposed:
the radio source is at z >= 2.5, a much larger distance than the previously
proposed lower limit z >= 1.0, or the object was ejected by a gravitational
recoil event from the M 83 nucleus. This nucleus is undergoing a strong
dynamical evolution, judging from previous three-dimensional spectroscopy.Comment: 6 pages, 4 figure
Recommended from our members
Cloned Access Point Detection and Point Detection and Prevention Mechanism in IEEE 802.11 Wireless Mesh Networks
IEEE 802.11 Wireless Mesh Network (WMN) is an
emerging low cost, decentralized community-based broadband technology, which is based on self-healing and multi-hop deployment of Access Points (APs), so that to increase the coverage area with maximum freedom to end-users to join or leave the
network from anywhere anytime having low deployment and maintenance cost. Such kind of decentralized structure and multihop architecture increases its security vulnerabilities especially
against the APs. One of such possible security attack is the placement of cloned AP to create serious performance degradation in IEEE 802.11 WMN. In this paper, we discuss the different
security vulnerabilities of AP in IEEE 802.11 WMN along with possible research directions. We also propose a mutual cooperation mechanism between the multi-hop APs and serving gateway so that
to detect and prevent the possibility of cloned AP. In this way the large scale exploitation of IEEE 802.11 WMN can be eliminated
Recommended from our members
Passive security threats and consequences in IEEE 802.11 wireless mesh networks
The Wireless Mesh Network (WMN) is ubiquitous emerging broadband wireless network. However, the open wireless medium, multi-hop multi-radio architecture and ad-hoc connectivity amongst end-users are such characteristics which increases the vulnerabilities of WMN towards many passive and active attacks. A secure network ensures the confidentiality, integrity and availability of wireless network. Integrity and availability is compromised by active attacks, while the confidentiality of end-users traffic is compromised by passive attacks. Passive attacks are silent in nature and do not harm the network traffic or normal network operations, therefore very difficult to detect. However, passive attacks lay down a foundation for later launching an active attack. In this article, we discuss the vulnerable features and possible passive threats in WMN along with current security mechanisms as well as future research directions. This article will serve as a baseline guide for the passive security threats and related issues in WMNs
- …