This is our AS media planning four our final thriller film. We have included many aspects of the planning into this powerpoint, such as the shot list, storyboard and potential ideas.
This is our AS media planning four our final thriller film. We have included many aspects of the planning into this powerpoint, such as the shot list, storyboard and potential ideas.
This is the pitch we made for our opening scene.
We got some good feedback from the group including:
The fact we had good detail
They liked the genre and concept we had
Adjusting primitives for graph : SHORT REPORT / NOTESSubhajit Sahu
Graph algorithms, like PageRank Compressed Sparse Row (CSR) is an adjacency-list based graph representation that is
Multiply with different modes (map)
1. Performance of sequential execution based vs OpenMP based vector multiply.
2. Comparing various launch configs for CUDA based vector multiply.
Sum with different storage types (reduce)
1. Performance of vector element sum using float vs bfloat16 as the storage type.
Sum with different modes (reduce)
1. Performance of sequential execution based vs OpenMP based vector element sum.
2. Performance of memcpy vs in-place based CUDA based vector element sum.
3. Comparing various launch configs for CUDA based vector element sum (memcpy).
4. Comparing various launch configs for CUDA based vector element sum (in-place).
Sum with in-place strategies of CUDA mode (reduce)
1. Comparing various launch configs for CUDA based vector element sum (in-place).
As Europe's leading economic powerhouse and the fourth-largest hashtag#economy globally, Germany stands at the forefront of innovation and industrial might. Renowned for its precision engineering and high-tech sectors, Germany's economic structure is heavily supported by a robust service industry, accounting for approximately 68% of its GDP. This economic clout and strategic geopolitical stance position Germany as a focal point in the global cyber threat landscape.
In the face of escalating global tensions, particularly those emanating from geopolitical disputes with nations like hashtag#Russia and hashtag#China, hashtag#Germany has witnessed a significant uptick in targeted cyber operations. Our analysis indicates a marked increase in hashtag#cyberattack sophistication aimed at critical infrastructure and key industrial sectors. These attacks range from ransomware campaigns to hashtag#AdvancedPersistentThreats (hashtag#APTs), threatening national security and business integrity.
🔑 Key findings include:
🔍 Increased frequency and complexity of cyber threats.
🔍 Escalation of state-sponsored and criminally motivated cyber operations.
🔍 Active dark web exchanges of malicious tools and tactics.
Our comprehensive report delves into these challenges, using a blend of open-source and proprietary data collection techniques. By monitoring activity on critical networks and analyzing attack patterns, our team provides a detailed overview of the threats facing German entities.
This report aims to equip stakeholders across public and private sectors with the knowledge to enhance their defensive strategies, reduce exposure to cyber risks, and reinforce Germany's resilience against cyber threats.
StarCompliance is a leading firm specializing in the recovery of stolen cryptocurrency. Our comprehensive services are designed to assist individuals and organizations in navigating the complex process of fraud reporting, investigation, and fund recovery. We combine cutting-edge technology with expert legal support to provide a robust solution for victims of crypto theft.
Our Services Include:
Reporting to Tracking Authorities:
We immediately notify all relevant centralized exchanges (CEX), decentralized exchanges (DEX), and wallet providers about the stolen cryptocurrency. This ensures that the stolen assets are flagged as scam transactions, making it impossible for the thief to use them.
Assistance with Filing Police Reports:
We guide you through the process of filing a valid police report. Our support team provides detailed instructions on which police department to contact and helps you complete the necessary paperwork within the critical 72-hour window.
Launching the Refund Process:
Our team of experienced lawyers can initiate lawsuits on your behalf and represent you in various jurisdictions around the world. They work diligently to recover your stolen funds and ensure that justice is served.
At StarCompliance, we understand the urgency and stress involved in dealing with cryptocurrency theft. Our dedicated team works quickly and efficiently to provide you with the support and expertise needed to recover your assets. Trust us to be your partner in navigating the complexities of the crypto world and safeguarding your investments.
2. OVERVIEW
• We are doing a psychological thriller
• Our starting sequence is about a college student who
starts to develop a obsession of their mate.
• Themes – Obsession, stalking
3. LOCATIONS
Interior;
• Hallway of Castlefield House.
• The bedroom in Castlefield House..
• A class room.
Exterior;
• Pathway to Castlefield House
• College ground.
Permission;
We will need permission from a teacher to be able to use a certain classroom, to
make sure there will not be a lesson going on when we want to use it.
4. STRUCTURE
Act 1;
The main character is looking at a girls Facebook of whom he has been obsessed with, and it slowly zooms in a
photograph of her house that is on Facebook, and zooms back out to him standing out the front. The girl character
then walks out of her house and they start to walk to college together. They then walk to lesson together and start
chatting whilst they are working. The fable character explains about a guy she is seeing and the male gets very
jealous and starts asking a load of questions. The female then leaves to get water, and the male character takes this
opportunity to steal her keys out of her bag. After she comes back the lesson has ended; they go their separate
ways.
Act 2;
The male then runs to the girls house and uses her key to break in. He then starts to creep around her house;
gradually walking towards and then up the stairs. The male character then enters the females room and starts to
take photos of her possessions; whilst doing this he finds a photo of the girl and her boyfriend and so he starts to
scribble out his face. As he is leaving her room, he grabs one of her teddies and some clothes and starts to sniff
them and chooses one item to take with him.
Act 3;
When he has left her house, he starts to walk back to his own home. When he arrives, he goes straight to one room,
and when he walks in it pans round to a wall full of photographs of her, and some of her possessions on a self/the
floor.
Key Dramatic Moment;
The key dramatic moment is when he goes into the girls room and starts to look through all of her personal items
and picking up her things for him to take back to his house.
5. CHARACTERS
• Dave: This character will wear black clothes with a hood up when
he is not with the girl unless he is with Emily to show he feels safe
around her. He will have an unemotional face to make him look like
a sociopath. Has a deep obsession with Emily and only smiles
around her.
• Emily: Always smiling and wearing bright/light clothes to emphasis
happiness. Shown as a popular, normal student. We have made
her personality to be like this to show that she is normal like any
other person to make the audience think that it could just be
them. She feel sorry for David since he's shown as emotionally
inept.
• Black jacket to make him look tough and popular. The dialog shows
that he is suspicious of David having an obsession with Emily.
6. HOW?
• Genre Conventions- This is a film that focuses on a mentally
unstable character and we really like this idea and want to crate a
character that seems like he could do anything. We want a character
that is so obsessed with a person that it makes the watcher fear this
character yet he is friends at face value with the person they are
stalking.
• audiences? We are making the film mess with the watchers
mind since it is about a stalker. Psychological thriller fans
would like this since it is a convention of the genre.
• Mood/atmosphere creation? Our starting film sequence sets
the atmosphere of the film quite tense as the film is being
led in a direction but you do not know how it will pan out in
the end.
7. MISE EN SCENE
• Setting – The most part of our opening is set in the college that the
character go to. There is also the house of the girl who is being stalked
in the film. We decided to show both of these places as it shows the
relationship between the characters and gives a distinct feel to what
will happen in the film.
• Props – We will be using a computer at first then we will be building a
shrine with pictures of the girl he is stalking to show how obsessive the
character is.
• Lighting – Our lighting will be dependant on who the camera is showing
as the girl in the film is portrayed as light and good so we shall have
high key lighting when focused on her. But when the camera is on the
stalker, the lighting will be low key lighting as he is wrong from what
he is doing and portrayed as creepy and bad.
• Costume – David shall wear a dark hoodie and dark clothes to connote
that he is the bad one. Emily will be wearing light clothing to connote
that she is happy and good.
8. CAMERAWORK
• Genre conventions – close ups are used in thrillers to show
reactions to the earlier shots and to capture details. Tilted angle
shots are used to connote that the action going on in that scene
isn’t quite right and is out of the ordinary. Low angle shots are
used to show power and dominance over the person below or the
audience.
• POV – The audience will be informed on things that the actors will
not know for example when he takes Emily’s keys.
• Variety – It will be important to keep variety in our shots and
transitions otherwise we will bore the audience with repeated
angles so we will keep a variety of long and short shots with many
angles and transitions.
9. SOUND
• Diegetic sound – We will have dialogue which will be our
main sound in the film and other sounds will be blurred
when there is dialogue.
• Non diegetic sound – We will have some background
music and sounds to create suspense and help to show
emotion.
10. INFLUENCES FROM REASEARCH
• We were influenced by Fear (1996) since it is
about a stalker obsessed with a girl and it is
very similar
• We were also influenced by shutter island
since it messes with the watchers mind which
we want to replicate into our film.
11. FEEDBACK FROM PITCH
• WWW(what went well)
Good foreshadowing
• EBI (even better if)
Classroom scene, make it somewhere else.
Facebook profile safety(computer scene)
Can we fit all our ideas into 2 minutes?