Journal articles on the topic 'Agent-oriented information technology'

To see the other types of publications on this topic, follow the link: Agent-oriented information technology.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 41 journal articles for your research on the topic 'Agent-oriented information technology.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Dostatni, Ewa, Jacek Diakun, Adam Hamrol, and Waldemar Mazur. "Application of agent technology for recycling‐oriented product assessment." Industrial Management & Data Systems 113, no. 6 (June 21, 2013): 817–39. http://dx.doi.org/10.1108/imds-02-2013-0062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Masloboev, A. V. "A multi-agent technology for network-centric control information support of regional security." Informacionno-technologicheskij vestnik, no. 2 (July 30, 2018): 92–102. http://dx.doi.org/10.21499/2409-1650-2018-2-92-102.

Full text
Abstract:
The article represents research and work-out results in the field of applied agent-based decision support system development for regional security management. General problem statement of the regional security management information support is carried out. Modeling and automation tools of security manager activities within the region safeguarding process, interacting in the unified information environment, are proposed. A multi-agent technology for network-centric control information support of regional security has been developed. The technology is based on agent-oriented and system dynamics methodologies integration and use hybrid smart agents with integrated simulation toolkit.
APA, Harvard, Vancouver, ISO, and other styles
3

Musumba, George Wamamu, Ruth Diko Wario, and Patrick Kanyi Wamuyu. "Towards an Agent-Oriented Business Collaboration Model." International Journal of Distributed Artificial Intelligence 10, no. 2 (July 2018): 1–27. http://dx.doi.org/10.4018/ijdai.2018070101.

Full text
Abstract:
Business collaborations have gained prominence in many domains mediated by information technology platforms. These collaborations, normally referred to as virtual enterprises (VEs) consider varying core competencies of participants. The VEs' dynamic nature requires participants to be dynamically selected and engaged. This requires a flexible systematic approach, lacking in existing literature, to handle varying forms of VEs. This study aims to consider a VE from an enterprise integration viewpoint and to develop an agent-based model that supports the VE's formation and operation phases. This model will provide support to business managers in making decisions efficiently by delegating part of the processes to software agents. An agent-based VE (ABVE) model prototype is developed. Case studies from various domains are used in the demonstration of the model's applicability and possible generalization. After evaluation it is shown that users are motivated to use the model as an effective tool for VE formation and collaborations in diverse domains with an 88.86% acceptance rate.
APA, Harvard, Vancouver, ISO, and other styles
4

Stenin, A. A., V. P. Pasko, M. A. Soldatova, and I. G. Drozdovich. "MULTI-AGENT LATENT SEMANTIC INTERNET TECHNOLOGY FOR THE FORMATION OF A SUBJECT-ORIENTED KNOWLEDGE MODEL." Radio Electronics, Computer Science, Control, no. 3 (October 9, 2021): 166–74. http://dx.doi.org/10.15588/1607-3274-2021-3-14.

Full text
Abstract:
Context. The article proposes a latent-semantic technology for extracting information from Internet resources, which allows processing information in natural language, as well as a multi-agent search algorithm based on it. The relevance of this approach to the search for subject-oriented information determined by the fact that currently a direct lexical comparison of queries with document indexes does not fully satisfy the developer. The object of the study is a multi-agent latent-semantic algorithm for searching for subject-oriented information. Objective. The work is to increase the efficiency of forming a knowledge model that is adequate for this subject area. Method. A latent semantic technology based on the weighted descriptor method developed by the authors is proposed. The main difference from the existing methods is that the analysis of words occurring in the text both in frequency and taking into account semantics carried out by selecting the appropriate descriptors, which improves the quality of the information found. Results. The developed latent-semantic technology of information search tested in the task of constructing a knowledge model of automated decision support systems for operational and dispatching control of urban engineering networks. The conducted modeling of the search for subject-oriented information in this subject area showed the effectiveness of the developed approach. Conclusions. Improving the efficiency of search and semantic content of subject-oriented information of the knowledge model of this subject area achieved by using the weighted descriptor method based on Zipf’s laws in this technology. The prospects for further research are to build evolutionary models of knowledge and improve the quality of updated information.
APA, Harvard, Vancouver, ISO, and other styles
5

LUCK, MICHAEL. "Foundations of multi-agent systems: issues and directions." Knowledge Engineering Review 12, no. 3 (September 1997): 307–8. http://dx.doi.org/10.1017/s026988899700310x.

Full text
Abstract:
The last ten years have seen a marked increase of interest in agent-oriented technology, in several areas of computer science, including both software engineering and artificial intelligence. Agents are being used, and touted, for applications as diverse as personalised information management, electronic commerce, interface design, computer games, and management of complex commercial and industrial processes. Several deployed systems already use agent technology, and many more commercial and industrial applications are in development.
APA, Harvard, Vancouver, ISO, and other styles
6

Alsetoohy, Omar, and Baker Ayoun. "Intelligent agent technology." Journal of Hospitality and Tourism Technology 9, no. 1 (March 12, 2018): 109–24. http://dx.doi.org/10.1108/jhtt-04-2017-0028.

Full text
Abstract:
Purpose This paper aims to empirically investigate the influence of the intelligent agent technology (IAT) on hotels’ food procurement practices (FPPRs) and food procurement performance (FPP). The study also explores the influence of FPPR on FPP in hotels. Design/methodology/approach Data from a survey of managers at luxury hotels in Florida, which yielded an effective sample of 78, were subjected to partial least squares structural equation modeling analysis. Findings IAT usage has statistically significant positive effect on both FPPR and FPP. Additionally, the results indicated that PPR has a positive influence on FPP. Research limitations/implications The study provided academia with a comprehensive review of the prior research on IAT benefits in food supply chain management (FSCM) and a comprehensive explanation of how the hotel FPPR are being performed by IAT. It also offers industry and technology specific insights. Practical implications Hotel managers should pay more attention to IAT application regarding the FPPR, specifically gathering information, supplier contract, contacting, requisitioning and intelligence and analysis. Moreover, hotel managers should enhance their employees’ abilities to be technology-oriented to maximize IAT benefits in FPP. Originality/value The results represent an extension to the technological innovation literature of the hospitality industry to bridge the gap of IAT in hotel FP. The framework used in the study serves as a foundation for future research studies in the hospitality industry, in FSCM in particular.
APA, Harvard, Vancouver, ISO, and other styles
7

Wu, Chao-Lin, Chun-Feng Liao, and Li-Chen Fu. "Service-Oriented Smart-Home Architecture Based on OSGi and Mobile-Agent Technology." IEEE Transactions on Systems, Man and Cybernetics, Part C (Applications and Reviews) 37, no. 2 (March 2007): 193–205. http://dx.doi.org/10.1109/tsmcc.2006.886997.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Singh Chowhan, Rahul. "Mobile Agent based Workflow Management System (MAWFMS) for Information Flow and Business Processes." Oriental journal of computer science and technology 11, no. 1 (March 23, 2018): 40–49. http://dx.doi.org/10.13005/ojcst11.01.08.

Full text
Abstract:
Mobile agents are a very novice field with wider scope of research in the stream of a integrated coherent networks, parallel programming, automated learning, remote execution and artificial intelligence. A mobile agent is a representative that is often treated as moving object developed using any object oriented programming language. Using a WFMS is an emerging current trend in modeling, research methodologies and implementing the information/data flow and various related business processes within an organization. Work is often credited as a task, information, a document, data, announcements or a job that passes through different nodes within an organization. The integration of WFMS involves the automation of various processes such as tasks, documents, processed data, and information or rules to accomplish a task. This automation within the technology can be achieved by integration of agent based technology that makes use of Mobile Agent Paradigm. This paper briefs about various features, benefits and role mobile agents in Workflow management system. This also highlights how the implementation of MAWFMS can smoothen and simplifies the workflow managements in multifarious event based environments.
APA, Harvard, Vancouver, ISO, and other styles
9

Verdaasdonk, Peter. "An Object-Oriented Model for Ex Ante Accounting Information." Journal of Information Systems 17, no. 1 (March 1, 2003): 43–61. http://dx.doi.org/10.2308/jis.2003.17.1.43.

Full text
Abstract:
Present accounting data models such as the Resource-Event-Agent (REA) model merely focus on the modeling of static accounting phenomena. In this paper, it is argued that these models are not able to provide relevant ex ante accounting data for operations management decisions. These decisions require dynamic descriptions of the consequences of alternative future courses of actions and the resulting events. Therefore, a new object-oriented model is presented that enables the use of ex ante accounting data for this purpose. In comparison to the REA model, the object-oriented model presented in this paper includes new static aspects as “recipes,” “potential contracts,” and “reservations,” together with behavioral aspects expressed as theoretical scripts for the retrieval of relevant accounting data.
APA, Harvard, Vancouver, ISO, and other styles
10

Davies, Benjamin, Iza Romanowska, Kathryn Harris, and Stefani A. Crabtree. "Combining Geographic Information Systems and Agent-Based Models in Archaeology: Part 2 of 3." Advances in Archaeological Practice 7, no. 2 (May 2019): 185–93. http://dx.doi.org/10.1017/aap.2019.5.

Full text
Abstract:
ABSTRACTArchaeologists are using spatial data in increasingly sophisticated analyses and invoking more explicit considerations of space in their interpretations. Geographic information systems (GIS) have become standard technology for professional archaeologists in the collection and management of spatial data. Many calls have been made to develop and adapt digital geospatial technologies for interpretation and understanding past social dynamics, but this has been limited to some extent by the static nature of map-oriented GIS approaches. Here, we illustrate how coupling GIS with agent-based modeling (ABM) can assist with more dynamic explorations of past uses of space and geospatial phenomena.
APA, Harvard, Vancouver, ISO, and other styles
11

Xia, Xiao Peng, and Guang Sheng Ren. "Research on Manufacturing Execution System Oriented to Agile Manufacturing." Key Engineering Materials 419-420 (October 2009): 397–400. http://dx.doi.org/10.4028/www.scientific.net/kem.419-420.397.

Full text
Abstract:
As a bridge between top-level transaction and low-level control system of facilities, MES (Manufacturing Execution System) is the key technology to implement the integration of all enterprise information systems. The research on MES oriented to agile manufacturing is of great importance in improving the level of management and automation. This paper is a brief introduction to the features of MES and its key technologies based on agile manufacturing environment. In view of the advanced technology and its practicability and feasibility, the methodology of software reuse is employed to study MES oriented to agile manufacturing. Meanwhile, the author analyses its key technologies, proposes an integration framework of MES oriented to agile manufacturing which can realize the horizontal integration and vertical integration for MES by adopting agent components, and presents a solution to MES’s implementation for the agile manufacturing company.
APA, Harvard, Vancouver, ISO, and other styles
12

Chen, Shang-Yuan. "An Agent-Based Smart Skin for Building Smart Homes." Open House International 32, no. 2 (June 1, 2007): 74–88. http://dx.doi.org/10.1108/ohi-02-2007-b0009.

Full text
Abstract:
The smart open house provides optimal adaptability using sensing, operating, information, and communications technology, in conjunction with open building in-filled components, to perceive user needs and environmental changes, and thereby meet the needs for sustainability and a healthy living environment. These needs are particularly pressing in view of the aged society that will emerge in Taiwan after 2020. Based on the smart open house hypothesis, this study proposes using agent-based smart skins in a smart open house, where an agent-based smart skin is embedded in a lifetime home (or ageless home) with an open system construction. The agent-based smart skin operating mechanism employs fuzzy logic inference and neuro-fuzzy learning to process environmental information from sensing devices and drive skin elements, achieving adaptive action, meeting residents' lifetime use needs, and offering a user experience-oriented smart care capability.
APA, Harvard, Vancouver, ISO, and other styles
13

Wang, Min Jie, Y. J. Cai, and W. G. Yan. "Study on Key Technologies of DNC System Oriented Networked Manufacturing." Key Engineering Materials 291-292 (August 2005): 667–72. http://dx.doi.org/10.4028/www.scientific.net/kem.291-292.667.

Full text
Abstract:
As one of major methods to meet information integration of numerical control machines in workshop, DNC (Direct Numerical Control or Distributed Numerical Control) oriented networked manufacturing (Web-DNC system) differs dramatically from conventional ones by having: (1) concurrently supporting networked manufacturing; (2) sharing the numerical control machines via network; (3) optimizing the configuration and reorganization of numerical control resources. This paper deals with the key technologies of Web-DNC system, including: the implementing architecture model with four layers (user layer, service layer, agent layer and facility layer) and the topology architecture. The BL2000 SCM is selected as a COM server to meet the required capabilities of DNC controller. Compared with the communication architecture with fieldbus, a simpler function model of DNC communication technology based on Ethernet technology is presented. A Web-DNC system prototype is developed and proved to be effective in information integration of numerical control machines in injecton workshop.
APA, Harvard, Vancouver, ISO, and other styles
14

Afaneh, Suha, and Issam Al Hadid. "Airport Enterprise Service Bus with Three Levels Self-Healing Architecture (AESB-3LSH)." International Journal of Space Technology Management and Innovation 3, no. 2 (July 2013): 1–23. http://dx.doi.org/10.4018/ijstmi.2013070101.

Full text
Abstract:
This paper introduces the different aviation and airport information technology systems. Also, this paper provides Airport Enterprise Service Bus with Three Levels Self-Healing Architecture based on the Service Oriented Architecture (SOA) that improves the information accessibility and sharing across the different Airport’s departments, integrate the existing legacy systems with other applications, and improve and maximize the system’s reliability, adaptability, robustness and availability using the Self-Healing Agent, Virtual Web Service Self-Healing Connector and Extended Execution Engine with Process Execution Self-Healing Manager to guarantee the Quality of Service (QoS) or Service provided and business process execution.
APA, Harvard, Vancouver, ISO, and other styles
15

Ahn, Jinho. "Novel Directory Service and Message Delivery Mechanism Enabling Scalable Mobile Agent Communication." Mobile Information Systems 4, no. 4 (2008): 333–49. http://dx.doi.org/10.1155/2008/376805.

Full text
Abstract:
Mobile agent technology has emerged as a promising programming paradigm for developing highly dynamic and large-scale service-oriented computing middlewares due to its desirable features. For this purpose, first of all, scalable location-transparent agent communication issue should be addressed in mobile agent systems despite agent mobility. Although there were proposed several directory service and message delivery mechanisms, their disadvantages force them not to be appropriate to both low-overhead location management and fast delivery of messages to agents migrating frequently. To mitigate their limitations, this paper presents a scalable distributed directory service and message delivery mechanism. The proposed mechanism enables each mobile agent to autonomously leave tails of forwarding pointers on some few of its visiting nodes depending on its preferences. This feature results in low message forwarding overhead and low storage and maintenance cost of increasing chains of pointers per host. Also, keeping mobile agent location information in the effective binding cache of each sending agent, the sending agent can communicate with mobile agents much faster compared with the existing ones.
APA, Harvard, Vancouver, ISO, and other styles
16

Yi, Zhen Zhen, Ke Zhao, Ya Tao Li, and Wei Xu. "Research on Knowledge-Based Intelligent Tutoring System." Applied Mechanics and Materials 55-57 (May 2011): 1424–29. http://dx.doi.org/10.4028/www.scientific.net/amm.55-57.1424.

Full text
Abstract:
Aiming at students’ learning process, and based on the analysis of tutorship rules of students’ learning after class, a Knowledge-Based Intelligent Tutoring System is given. The system comprehensively uses agent technology, the knowledge-based automatic reasoning, resource modeling for knowledge classification, field natural language understanding, data mining, computer networks, databases and other technologies. It creates a student-oriented self-motivated learning environment in which students can learn abundant knowledge of one or many subjects, send the problems encountered in their own learning to the system server by network, and get real-time multiple tutorship information as an excellent teacher do.
APA, Harvard, Vancouver, ISO, and other styles
17

Susilowati, Wandika Wita, and Suyatno Suyatno. "Teacher competence in implementing higher-order thinking skills oriented learning in elementary schools." Premiere Educandum : Jurnal Pendidikan Dasar dan Pembelajaran 11, no. 1 (June 1, 2021): 1. http://dx.doi.org/10.25273/pe.v11i1.7762.

Full text
Abstract:
<p>Information and technology development in the last decade have caused fundamental changes in all of the life aspects, including in the educational aspect. Learning in the school was demanded to be an agent of instilling the ability of higher-order thinking (HoTS) so that the students could deal with life challenging in future life. The teachers also must have competence in implementing HoTS oriented learning. This study aimed to explore teachers’ competencies and implement HoTS oriented learning in the public elementary school 2 of Ketaon, Boyolali Regency. Data was collected through interviews, observation, and documentation. The data collected further were analyzed by using the data analysis technique of the interactive inductive model of Miles and Huberman. The the research results showed that 1) there are five competencies used by the teachers in implementing HoTS oriented learning as follows; Educational Competence, Competence for Technological Commercialization, Competence in Globalization, Competence In Future Strategies, and Counsellor Competence. 2) Efforts made by teachers are to improve competence in implementing HoTS oriented learning by following the training and education program, participating in the empowerment of professional teacher development organizations such as teachers’ cluster working groups (KKG)<em>,</em> teacher working group (MGMP), webinar, technical guidance, and workshop. In addition, the role of colleagues contributed to increasing teachers’ competencies</p>
APA, Harvard, Vancouver, ISO, and other styles
18

Tan, Siti Sehat, Rima Purnamayan, Adhe Phoppy WE, Sigid Handoko, Catur Oktivian I.H., and Muhammad Yusron. "Institutional strengthening of farmer groups on sustainable intercropping in Majalengka Regency, West Java Province." E3S Web of Conferences 306 (2021): 02038. http://dx.doi.org/10.1051/e3sconf/202130602038.

Full text
Abstract:
The government implements a special effort program (of food self-sufficiency) to achieve national food sovereignty focusing on three commodities (rice, maize, and soybeans). One of the efforts is to increase production with the intercropping pattern (Turiman). The program sustainability must be supported by strong farmer institutions. This study aimed to obtain the information about the farmer groups institution as a strong capital for sustainable farming. This study used a qualitative approach with data related to the assessment problem. This study also used relevant literature to learn the correlation between empirical facts and government programs. The study was conducted in June 2019 in Babakan Village, Majalengka Sub District, Majalengka Regency, West Java Province on 100 respondents. Based on the results, the farmers were still oriented to the monoculture model (maize). The supporting organization as a transformation institution was still very weak as indicated by the organizational structure. The low farmer knowledge on the technology introduced and the farmer group management as a technology transfer agent were still oriented towards monopoly profits. Thus, the Turiman model can be come a consideration for its sustainability. Such conditions require government intervention to achieve the strength farmer group institutions with various appropriate methods, such as assistance in managing organizations and collecting business assets as well as business capital.
APA, Harvard, Vancouver, ISO, and other styles
19

Xu, Xiaoyan, Yi Mei, Yanhong Sun, and Xiaoli Zhu. "Analysis of the Effectiveness of Promotion Strategies of Social Platforms for the Elderly with Different Levels of Digital Literacy." Applied Sciences 11, no. 9 (May 10, 2021): 4312. http://dx.doi.org/10.3390/app11094312.

Full text
Abstract:
This paper aimed to examine the effectiveness of social platform promotion strategies for the elderly with different digital literacy. Despite extensive research on the development of youth-oriented social platforms, research on the development of social platforms specifically targeting older adults with varying levels of digital literacy is lacking. The elderly population is divided into passive information receivers (PIRs) and active information seekers (AISs) according to their information seeking expertise, and an empirical study was conducted to assess the behavioral characteristics of PIRs and AISs. Grounded in innovation diffusion research and our empirical results, an agent-based model was developed, and the impact of the proportion of PIRs on the macro result of the social platform adoption (i.e., market penetration) and the impact of promotional strategies on market penetration under different proportions of PIRs were analyzed. The results demonstrate a direct negative effect of the proportion of PIRs on market penetration and a moderating effect on the effectiveness of various promotional strategies.
APA, Harvard, Vancouver, ISO, and other styles
20

Bardone, Emanuele, and Davide Secchi. "Inquisitiveness: distributing rational thinking." Team Performance Management: An International Journal 23, no. 1/2 (March 14, 2017): 66–81. http://dx.doi.org/10.1108/tpm-10-2015-0044.

Full text
Abstract:
Purpose This study aims at redefining bounded rationality on the basis of a more socialized view of the individual. In doing so, it introduces “inquisitiveness” as a key disposition that some team members use to assemble and integrate knowledge when solving problems. Design/methodology/approach Using an agent-based computational simulation, this research models different simulated employees working together in “ad hoc” teams to solve problems. Findings Results show that inquisitiveness may work as an efficiency “driver” that, when present, economizes on the knowledge needed by team members to solve problems. In addition to that, results also show that environments with many problems are more suitable for inquisitive individuals to be effective. Originality/value Following the late Herbert Simon, the paper takes the stance that rationality should be redefined as a socially oriented process and introduces inquisitiveness as one – although probably not the only one – of the characteristics that help individuals and teams to make rational decisions.
APA, Harvard, Vancouver, ISO, and other styles
21

Mykhailov, Dmytro. "A moral analysis of intelligent decision-support systems in diagnostics through the lens of Luciano Floridi’s information ethics." Human Affairs 31, no. 2 (April 1, 2021): 149–64. http://dx.doi.org/10.1515/humaff-2021-0013.

Full text
Abstract:
Abstract Contemporary medical diagnostics has a dynamic moral landscape, which includes a variety of agents, factors, and components. A significant part of this landscape is composed of information technologies that play a vital role in doctors’ decision-making. This paper focuses on the so-called Intelligent Decision-Support System that is widely implemented in the domain of contemporary medical diagnosis. The purpose of this article is twofold. First, I will show that the IDSS may be considered a moral agent in the practice of medicine today. To develop this idea I will introduce the approach to artificial agency provided by Luciano Floridi. Simultaneously, I will situate this approach in the context of contemporary discussions regarding the nature of artificial agency. It is argued here that the IDSS possesses a specific sort of agency, includes several agent features (e.g. autonomy, interactivity, adaptability), and hence, performs an autonomous behavior, which may have a substantial moral impact on the patient’s well-being. It follows that, through the technology of artificial neural networks combined with ‘deep learning’ mechanisms, the IDSS tool achieves a specific sort of independence (autonomy) and may possess a certain type of moral agency. Second, I will provide a conceptual framework for the ethical evaluation of the moral impact that the IDSS may have on the doctor’s decision-making and, consequently, on the patient’s wellbeing. This framework is the Object-Oriented Model of Moral Action developed by Luciano Floridi. Although this model appears in many contemporary discussions in the field of information and computer ethics, it has not yet been applied to the medical domain. This paper addresses this gap and seeks to reveal the hidden potentialities of the OOP model for the field of medical diagnosis.
APA, Harvard, Vancouver, ISO, and other styles
22

Rojc, Matej, Zdravko Kačič, Marko Presker, and Izidor Mlakar. "TTS-driven Embodied Conversation Avatar for UMB-SmartTV." International Journal of Computers and Communications 15 (April 14, 2021): 1–7. http://dx.doi.org/10.46300/91013.2021.15.1.

Full text
Abstract:
When human-TV interaction is performed by remote controller and mobile devices only, the interactions tend to be mechanical, dreary and uninformative. To achieve more advanced interaction, and more human-human like, we introduce the virtual agent technology as a feedback interface. Verbal and co-verbal gestures are linked through complex mental processes, and although they represent different sides of the same mental process, the formulations of both are quite different. Namely, verbal information is bound by rules and grammar, whereas gestures are influenced by emotions, personality etc. In this paper a TTS-driven behavior generation system is proposed for more advanced interface used for smart IPTV platforms. The system is implemented as a distributive non-IPTV service and integrated into UMB-SmartTV in a service-oriented fashion. The behavior generation system fuses speech and gesture production models by using FSMs and HRG structures. Features for selecting the shape and alignment of co-verbal movement are based on linguistic features (that can be extracted from arbitrary input text), and prosodic features (as predicted within several processing steps in the TTS engine). At the end, the generated speech and co-verbal behavior are animated by an embodied conversational agent (ECA) engine and represented to the user within the UMB-SmarTV user interface.
APA, Harvard, Vancouver, ISO, and other styles
23

Calmet, Jacques, and Marvin Oliver Schneider. "Decision Making Modeled as a Theorem Proving Process." International Journal of Decision Support System Technology 4, no. 3 (July 2012): 1–11. http://dx.doi.org/10.4018/jdsst.2012070101.

Full text
Abstract:
The authors introduce a theoretical framework enabling to process decisions making along some of the lines and methodologies used to mechanize mathematics and more specifically to mechanize the proofs of theorems. An underlying goal of Decision Support Systems is to trust the decision that is designed. This is also the main goal of their framework. Indeed, the proof of a theorem is always trustworthy. By analogy, this implies that a decision validated through theorem proving methodologies brings trust. To reach such a goal the authors have to rely on a series of abstractions enabling to process all of the knowledge involved in decision making. They deal with an Agent Oriented Abstraction for Multiagent Systems, Object Mechanized Computational Systems, Abstraction Based Information Technology, Virtual Knowledge Communities, topological specification of knowledge bases using Logical Fibering. This approach considers some underlying hypothesis such that knowledge is at the heart of any decision making and that trust transcends the concept of belief. This introduces methodologies from Artificial Intelligence. Another overall goal is to build tools using advanced mathematics for users without specific mathematical knowledge.
APA, Harvard, Vancouver, ISO, and other styles
24

Murthy, Uday S., and Guido L. Geerts. "An REA Ontology-Based Model for Mapping Big Data to Accounting Information Systems Elements." Journal of Information Systems 31, no. 3 (May 1, 2017): 45–61. http://dx.doi.org/10.2308/isys-51803.

Full text
Abstract:
ABSTRACT The term “Big Data” refers to massive volumes of data that grow at an increasing rate and encompass complex data types such as audio and video. While the applications of Big Data and analytic techniques for business purposes have received considerable attention, it is less clear how external sources of Big Data relate to the transaction processing-oriented world of accounting information systems. This paper uses the Resource-Event-Agent Enterprise Ontology (REA) (McCarthy 1982; International Standards Organization [ISO] 2007) to model the implications of external Big Data sources on business transactions. The five-phase REA-based specification of a business transaction as defined in ISO (2007) is used to formally define associations between specific Big Data elements and business transactions. Using Big Data technologies such as Apache Hadoop and MapReduce, a number of information extraction patterns are specified for extracting business transaction-related information from Big Data. We also present a number of analytics patterns to demonstrate how decision making in accounting can benefit from integrating specific external Big Data sources and conventional transactional data. The model and techniques presented in this paper can be used by organizations to formalize the associations between external Big Data elements in their environment and their accounting information artifacts, to build architectures that extract information from external Big Data sources for use in an accounting context, and to leverage the power of analytics for more effective decision making.
APA, Harvard, Vancouver, ISO, and other styles
25

Fan, Ying, and Run Hong Niu. "To tweet or not to tweet? Exploring the effectiveness of service recovery strategies using social media." International Journal of Operations & Production Management 36, no. 9 (September 5, 2016): 1014–36. http://dx.doi.org/10.1108/ijopm-10-2013-0461.

Full text
Abstract:
Purpose The purpose of this paper is to explore influencing factors that affect the effectiveness of service recovery strategies using social network from operations management perspective. Specifically, the authors study the relationships between social media agent responses to customer complaints, customer emotion changes and customer satisfaction. Furthermore, the authors investigate the roles of recovery speed and failure severity in the service recovery process using social network platform. Design/methodology/approach The results are based on 347 mini cases drawn from the Twitter accounts of a sample of airlines. Grounded theory approach is used to conduct qualitative analysis using NVivo 9, a qualitative data analysis program. A conceptual framework was developed, then tested using χ2 analysis. Findings Agent responses that do not require customers to take further initiatives for problem solving have positive effects on customer emotion alleviation and satisfaction. In contrast, responses that provide further directions poses negative effect on service recovery outcomes. There is a strong positive linkage between customer emotion change and customer satisfaction. Surprisingly, the direct effect of recovery speed on customer emotion and satisfaction is not supported by the data. Rather, it plays a moderating role in affecting the relationship between agent responses and customer satisfaction. The qualitative data further reveals the pivotal role of failure severity, one of key service failure attributes. Research limitations/implications The authors study service businesses’ recovery strategies using social media. A conceptual framework is developed to link agent responses, customer emotion changes and customer satisfaction from the lens of service providers, using an operations-oriented approach. Finding on recovery speed and failure severity reveal that these variables play different roles when service recovery is operated on social media platform as compared to traditional channels. Additionally, relying on tweets as data sources has constrained us from assessing other long-term service recovery outcomes such as loyalty, repurchase intent and word of mouth. The drawback is resulted from the limited information conveyed through tweets, which tends to be short and brief. The study focusses on the airline industry, which limits the generalizability of the findings to other service industries. Practical implications The authors highlight the value and potential of service recovery strategies using social network and provide insights for recovery operations where agent responses should be focussing on real time problem solving. The findings support the benefits of empowering social network agents for service recovery operations. Improving recovery speed should be less of a priority as it serves as a qualifier when service recovery is operated via social network. Given the pivotal role of failure severity, it is critical for social network agents to stand in the shoes of the complaining customers, making imminent assessment of the actual failure severity and taking action accordingly in real time. In the meantime, effective communication through social network may help to lower perceived magnitude of failure by customers, which in turn enhance the effectiveness of other service recovery efforts. Originality/value This study is the first attempt to investigate the service recovery process using social media from an operations-oriented perspective. The results supports the potentials of employing service recovery strategies using social media.
APA, Harvard, Vancouver, ISO, and other styles
26

Maffei, Antonio, and Mauro Onori. "Evolvable Production Systems: Environment for New Business Models." Key Engineering Materials 467-469 (February 2011): 1592–97. http://dx.doi.org/10.4028/www.scientific.net/kem.467-469.1592.

Full text
Abstract:
The increasing threats and opportunities, on the global markets, challenge today the company at several levels. The actual Manufacturing Systems becomes dramatic for the survival and prosperity of the organization. Agility, Sustainability and high rate of Re-usability are the main objectives of an “Evolvable Production System”. Task-specific and process-oriented modules with embedded intelligence, together with distributed control based on agent technology are the cornerstones of an EPS. The realization and management of this kind of systems entail an ontological approach due to their implicit complexity. The reference architecture is the key to canalize the underlying holism of an EPS towards an effective instantiation, which exploits the “Emergent Behavior”, the key driver of the Evolvability of a system. The issues related with the application of this view, such as dynamic link between product and system design as well as the management of a module repository, underline the weakness of present business models. Therefore a model for the emplacement of a System that follows the “Evolvable Paradigm” predicament has been produced in order to enable further studies. One of the conclusions of the work is the need for a more suitable approach to business by the main actors involved in the realization of an EPS. Sharing information and standards about product design and modules realization becomes a compulsory strategic choice.
APA, Harvard, Vancouver, ISO, and other styles
27

Rincon, Jaime, Vicente Julian, and Carlos Carrascosa. "FLaMAS: Federated Learning Based on a SPADE MAS." Applied Sciences 12, no. 7 (April 6, 2022): 3701. http://dx.doi.org/10.3390/app12073701.

Full text
Abstract:
In recent years federated learning has emerged as a new paradigm for training machine learning models oriented to distributed systems. The main idea is that each node of a distributed system independently trains a model and shares only model parameters, such as weights, and does not share the training data set, which favors aspects such as security and privacy. Subsequently, and in a centralized way, a collective model is built that gathers all the information provided by all of the participating nodes. Several federated learning framework proposals have been developed that seek to optimize any aspect of the learning process. However, a lack of flexibility and dynamism is evident in many cases. In this regard, this study aims to provide flexibility and dynamism to the federated learning process. The methodology used consists of designing a multi-agent system that can form a federated learning framework where the agents act as nodes that can be easily added to the system dynamically. The proposal has been evaluated with different experiments on the SPADE platform; the results obtained demonstrate the benefits of the federated system while facilitating flexibility and scalability.
APA, Harvard, Vancouver, ISO, and other styles
28

Hulchiy, Olesia P., Iryna M. Khomenko, Nadiia M. Zakharova, and Olena O. Zelikovska. "ОПЫТ ИСПОЛЬЗОВАНИЯ SMART-ТЕХНОЛОГИЙ В ПОСЛЕДИПЛОМНОМ ОБРАЗОВАНИИ ВРАЧЕЙ ПРОФИЛАКТИЧЕСКОЙ МЕДИЦИНЫ." Information Technologies and Learning Tools 65, no. 3 (July 1, 2018): 236. http://dx.doi.org/10.33407/itlt.v65i3.1882.

Full text
Abstract:
The article describes the activities of scientific and pedagogical staff on information technology (IT) in the modernization of the educational process in the context of health reform and the development of public health in Ukraine. The major challenges and obstacles facing the institutions of postgraduate training preventive medicine physicians have been analyzed. By surveying the trainees, the authors have investigated and summarized the needs of post-graduate students for the development of their IT skills in the workplace, methods for enhancing and supporting their motivation, their vision of how their educational institution is committed to meeting their expectations. The article considers the implementation of smart technologies from the standpoint of a practically oriented approach to modernizing of the post-graduate training. The possibilities of smart-technologies to raise cognitive activity, develop communication skills (trainee-trainee, trainee-educator), distribute individual vitagenic and professional experience in the course of training, as well as their role in adapting the training to the needs of a particular audience have been analyzed. The use of the most effective smart-technologies in each of the main stages of the pedagogical process (updating of knowledge and understanding, application of knowledge, analysis, synthesis and evaluation) has been shown. The authors have presented the algorithm for information and analytical competence development in preventive medicine physicians, including smart-technologies application, in terms of performing by pedagogical staff’s different professional roles as a manager, a change agent, a coach etc. It has been proved that one of strategic tasks of postgraduate training of preventive medicine physicians is systemic and complex implementation of smart-technologies into educational process with a perspective informatization of educational environment.
APA, Harvard, Vancouver, ISO, and other styles
29

Kaur, Harpreet. "DO WE REALLY NEED COMPUTERS IN CLASSROOM INSTRUCTIONS." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2, no. 3 (June 30, 2012): 64–66. http://dx.doi.org/10.24297/ijct.v2i3a.2673.

Full text
Abstract:
The Quality of education depends to a great extent on thequality of teachers. It is a known fact that quality teachers optfor an innovation in their teaching aspect through integratingtechnology in the classroom instruction to give the best tostudents. Since technology is a powerful tool for problem –solving, conceptual development and critical thinking help tomake the learning process much easier for the students. To beeffective in the classroom instruction, teachers should acquirethe knowledge and skills to use the new challenges inpromoting innovative teaching strategies that are studentcentered,collaborative, engaging, authentic, self-directed andbased on the development of higher order thinking skills withrespect to handling classes for students which aim to achievehigh academic standards.Today learning is approached as a constructive, self-regulated,and cooperative to meet the individual difference andtechnology-oriented process. In these approaches a strongemphasis is placed on the learner as an active agent in theknowledge acquisition process. This view on learning andinstruction is in contrast with the ‗Objectivistic‘ viewpoint inwhich information provided by, for example, a teacher ismore or less directly transferred to the learner. In theconstructive viewpoint, the teacher plays a more facilitativerole, supporting learners in a self-directed, constructivelearning process. Developments in the objectivistic traditionwere encouraged by the availability of computer-basedlearning environments that were in line with this approach,such as programmed instruction, tutorials, drill-and-practiceprograms. Also within the constructivist approach we findcomputer-learning environments that help to advancedevelopments
APA, Harvard, Vancouver, ISO, and other styles
30

Evans, Lois, Patricia Franks, and Hsuanwei Michelle Chen. "Voices in the cloud: social media and trust in Canadian and US local governments." Records Management Journal 28, no. 1 (March 19, 2018): 18–46. http://dx.doi.org/10.1108/rmj-11-2016-0041.

Full text
Abstract:
Purpose This study aims to examine how 20 local governments in Canada and the USA operationalize the government–citizen trust relationship through the administration of social media by answering two questions: Can local governments use social media to increase citizen trust? and if local governments can use social media, what can be learned about the administration of social media that results in an increase in citizen trust of government? Design/methodology/approach Based on a normative belief that increasing the trustworthiness of government is a desired outcome, the working proposition is that social media may offer a low-barrier method for engaging citizens and supporting trust-based relationships, if social media programs are administered in a way that operationalizes this objective. Using content analysis of data collected from interview transcripts and documentary sources, this exploratory, process-oriented study emphasizes the social, organizational and functional contexts of social media and social media as records. Findings The study found that most cities had extensive programs featuring multiple accounts on a number of common platforms. The cities maintained tight control over content, account creation and employee and audience participation to ensure compliance with federal and provincial or state legislation and to mitigate technology and content-based risks. The cities used social media to broadcast information, respond to service requests and provide issue management. Social media results were measured sporadically on an ad hoc basis for operational purposes and only two cities had dedicated procedures in place for managing social media as records. Contrary to previous research, this study indicates that fiduciary trust relationships do require trust by the agent (i.e. institution) and the principal (i.e. citizen). Research limitations/implications To increase generalizability, an effort was made to select cities that were demographically and geographically diverse by selecting a range of population sizes and locations. However, selection was skewed towards cities with well-developed social media programs, and as a result, over half of the cities were national, provincial or state capitals or larger population centres. While these cities experienced economic advantages, the participants in the study identified challenges around resourcing and capacity, and their responses are expected to be of value to cities operating under similar constraints. Additionally, this study represents a point in time, as social media use at the local governments continued to expand and evolve during and after the data collection period. Practical implications This paper identifies three scenarios where social media content from local government accounts should be managed as records, including: the documentation of incidents, the on-going collection of city content from high-profile accounts and the “on demand” collection of citizens’ content where cities have asked for citizen input on topics or issues. Social implications This study provides an in-depth characterization of social media administration and use by 20 local governments in Canada and the USA. Considering the progress made by cities in e-government using their websites as a base, cities can develop greater capacity for open government, meaning wider participation by citizens in the decisions that affect them on a daily basis. To achieve goals of transparency, accountability and civic participation, cities will need to develop capacity around social media measurement, reporting and procedures for managing social media as records. Originality/value In providing a detailed and complete description of social media use in 20 cities in two countries, this study moves beyond a compliance- and requirement-driven approach to consider the larger question of government–citizen trust and the relevance of records within this relationship.
APA, Harvard, Vancouver, ISO, and other styles
31

Singh, Aarti, Anu Sharma, and Nilanjan Dey. "Semantics and Agents Oriented Web Personalization." International Journal of Service Science, Management, Engineering, and Technology 6, no. 2 (April 2015): 35–49. http://dx.doi.org/10.4018/ijssmet.2015040103.

Full text
Abstract:
Advent of technologies like semantic web, multi-agent systems, web mining has changed the internet as knowledge provider. Web personalization offers a solution to the information overload problem in current web by providing users a personalized experience, considering their interest, behavior, context and emotions. Semantic web technology is based on use of software agents, ontologies and reasoning to add meaning to web information. An important technology for achieving personalization is the use of independent intelligent software agents. This work reviews, web personalization in the light of semantic web and software agent technology. A comparative study of recent works in the domain of web personalization has been carried out for this purpose. This review highlights ample scope for application of intelligent agents in the web personalization domain for solving many existing issues like personalized content management, user profile learning, modeling and adaptive interactions with users.
APA, Harvard, Vancouver, ISO, and other styles
32

Tarovik, O. V., A. G. Topaj, A. B. Krestyantsev, and A. A. Kondratenko. "Arctic Marine Transport System Simulation: Multidisciplinary Approach Fundamentals and Practical Experience." Arctic: Ecology and Economy, no. 1(25) (March 2017): 86–101. http://dx.doi.org/10.25283/2223-4594-2017-1-86-101.

Full text
Abstract:
Development of new offshore projects in the Arctic begins with comprehensive analysis of Marine Transport System’s (MTS) performance. At the same time researchers with different professional orientation (shipbuilders, logisticians, economists and managers etc.) are often have narrow view while making their investigations of MTS, focusing mostly at corresponding familiar sides of the system. It leads to specific “disproportional” description of MTS’s when some components considered in detail but other are out of investigation that in some cases may result in inaccurate conclusions. This makes authors sure that the only proper approach to investigate complex arctic MTS should be multidisciplinary. Article contains the description of integrated R&D project fulfilled at State Krylov Research Centre and devoted to realization of multidisciplinary methodology and corresponding software for arctic MTS design and analysis. Integrated software solution is based on object-oriented paradigm and combines such scientific areas as geographic information systems (GIS), shipbuilding disciplines, discrete event and agent-based simulation models. Theoretical base of the solution and its architecture envelops the following subject fields: ship design and fleet sizing, resistance and propulsion of ships including ice-going capabilities, vessel routing in ice, scheduling, downstream and upstream logistics, navigation process simulation, environment conditions stochastic modeling, operation research, queue theory, economy and management. Software has a modular structure with open and expansible architecture, which makes possible to add new functionality and upgrade existing program blocks in accordance with demands of specific project. Simulation model serve as the center of multidisciplinary integration because this technology allows reproducing behavior of different objects of MTS under dynamic conditions. Realized in AnyLogic ® framework simulation model replicates vessel operation process according to individual schedule generated by special planning component. Vessel’s activities simulated in modeled time with consideration of special aspects of operational planning and resolving accidents. Main model also includes specialized sub-models that provide opportunity to describe many local dynamic essences such as processes of offshore drilling and production, freeze-up of channel in fast ice, different ship interaction aspects, “weather windows” in ports etc. Number of instances are also given in the article, they allows to conclude that adequate and consistent model of MTS working in heavy ice-conditions or having complex organization scheme could be obtained only by means of simulation modeling under multidiscipline approach.
APA, Harvard, Vancouver, ISO, and other styles
33

Sgurev, Vassil, Vladimir Jotsov, and Mincho Hadjiski. "Intelligent Systems: Methodology, Models, and Applications in Emerging Technologies." Journal of Advanced Computational Intelligence and Intelligent Informatics 9, no. 1 (January 20, 2005): 3–4. http://dx.doi.org/10.20965/jaciii.2005.p0003.

Full text
Abstract:
From year to year the number of investigations on intelligent systems grows rapidly. For example this year 245 papers from 45 countries were sent for the Second International IEEE Conference on Intelligent Systems (www.ieee-is.org; www.fnts-bg.org/is) and this is an increase of more than 50% by all indicators. The presented papers on intelligent systems were marked by big audiences and they provoked a significant interest that ultimately led to the formation of vivid discussions, exchange of ideas and locally provoked the creation of working groups for different applied projects. All this reflects the worldwide tendencies for the leading role of the research on intelligent systems theoretically and practically. The greater part of the presented research dealt with traditional for the intelligent systems problems like artificial intelligence, knowledge engineering, intelligent agents, neural and fuzzy networks, intelligent data processing, intelligent control and decision making systems, and also new interdisciplinary problems like ontology and semantics in Internet, fuzzy intuitionistic logic. The majority of papers from the European and American researchers are dedicated to the theory and the applications of the intelligent systems with machine learning, fuzzy inference or uncertainty. Another big group of papers focuses on the domain of building and integrating ontologies of applications with heterogeneous multiagent systems. A great number of papers on intelligent systems deals with fuzzy sets. The papers of many other researchers underscore the significance of the contemporary perception-oriented methods and also of different applications in the intelligent systems. On the first place this is valid for the paradigm of L. A. Zadeh 'computing with words'. The Guest Editors in the present specialized journal volume would like to introduce a wealth of research with an applied and theoretical character that possesses a common characteristic and it is the conference best papers complemented and updated by the new elaborations of the authors during the last half a year. A short description of the presented in the volume papers follows. In 'Combining Local and Global Access to Ontologies in a Multiagent System' <B>R. Brena and H. Ceballos (Mexico)</B> proposed an original way for operation with ontologies where a part of the ontology is processed by a client's component and the rest is transmitted to the other agents by an ontology agent. The inter-agent communication is improved in this way. In 'Fuzzy Querying of Evolutive Situations: Application to Driving Situations' <B>S. Ould Yahia and S. Loriette-Rougegrez (France)</B> present an approach to analysis of driving situations using multimedia images and fuzzy estimates that will improve the driver's security. In 'Rememberng What You Forget in an Online Shopping Context' <B>M. Halvey and M. Keane (Ireland)</B> presented their approach to constructing online system that predicts the items for future shopping sessions using a novel idea called Memory Zones. In 'Reinforcement Learning for Online Industrial Process Control' the authors <B>J. Govindhasamy et al. (Ireland)</B> use a synthesis of dynamic programming, reinforcement learning and backpropagation for a goal of modeling and controlling an industrial grinding process. The felicitous combination of methods contributes for a greater effectiveness of the applications compared to the existing controllers. In 'Dynamic Visualization of Information: From Database to Dataspace' the authors <B>C. St-Jacques and L. Paquin (Canada)</B> suggested a friendly online access to large multimedia databases. <B>W. Huang (UK)</B> redefines in 'Towards Context-Aware Knowledge Management in e-Enterprises' the concept of context in intelligent systems and proposes a set of meta-information elements for context description in a business environment. His approach is applicable in the E-business, in the Semantic Web and in the Semantic Grid. In 'Block-Based Change Detection in the Presence of Ambient Illuminaion Variations' <B>T. Alexandropoulos et al. (Greece)</B> use a statistic analysis, clustering and pattern recognition algorithms, etc. for the goal of noise extraction and the global illumination correction. In 'Combining Argumentation and Web Search Technology: Towards a Qualitative Approach for Ranking Results' <B>C. Chesñevar (Spain) and A. Maguitman (USA)</B> proposed a recommender system for improving the WEB search. Defeasible argumentation and decision support methods have been used in the system. In 'Modified Axiomatic Basis of Subjective Probability' <B>K. Tenekedjiev et al. (Bulgaria)</B> make a contribution to the axiomatic approach to subjective uncertainty by introducing a modified set of six axioms to subjective probabilities. In 'Fuzzy Rationality in Quantitative Decision Analysis' <B>N. Nikolova et al. (Bulgaria)</B> present a discussion on fuzzy rationality in the elicitation of subjective probabilities and utilities. The possibility to make this special issue was politely offered to the Guest Editors by Prof. Kaoru Hirota, Prof. Toshio Fukuda and we thank them for that. Due to the help of Kenta Uchino and also due to the new elaborations presented by explorers from Europe and America the appearance of this special issue became possible.
APA, Harvard, Vancouver, ISO, and other styles
34

Chengqi Zhang*, Ling Guan**, and Zheru Chi. "Introduction to the Special Issue on Learning in Intelligent Algorithms and Systems Design." Journal of Advanced Computational Intelligence and Intelligent Informatics 3, no. 6 (December 20, 1999): 439–40. http://dx.doi.org/10.20965/jaciii.1999.p0439.

Full text
Abstract:
Learning has long been and will continue to be a key issue in intelligent algorithms and systems design. Emulating the behavior and mechanisms of human learning by machines at such high levels as symbolic processing and such low levels as neuronal processing has long been a dominant interest among researchers worldwide. Neural networks, fuzzy logic, and evolutionary algorithms represent the three most active research areas. With advanced theoretical studies and computer technology, many promising algorithms and systems using these techniques have been designed and implemented for a wide range of applications. This Special Issue presents seven papers on learning in intelligent algorithms and systems design from researchers in Japan, China, Australia, and the U.S. <B>Neural Networks:</B> Emulating low-level human intelligent processing, or neuronal processing, gave birth of artificial neural networks more than five decades ago. It was hoped that devices based on biological neural networks would possess characteristics of the human brain. Neural networks have reattracted researchers' attention since the late 1980s when back-propagation algorithms were used to train multilayer feed-forward neural networks. In the last decades, we have seen promising progress in this research field yield many new models, learning algorithms, and real-world applications, evidenced by the publication of new journals in this field. <B>Fuzzy Logic:</B> Since L. A. Zadeh introduced fuzzy set theory in 1965, fuzzy logic has increasingly become the focus of many researchers and engineers opening up new research and problem solving. Fuzzy set theory has been favorably applied to control system design. In the last few years, fuzzy model applications have bloomed in image processing and pattern recognition. <B>Evolutionary Algorithms:</B> Evolutionary optimization algorithms have been studied over three decades, emulating natural evolutionary search and selection so powerful in global optimization. The study of evolutionary algorithms includes evolutionary programming (EP), evolutionary strategies (ESs), genetic algorithms (GAs), and genetic programming (GP). In the last few years, we have also seen multiple computational algorithms combined to maximize system performance, such as neurofuzzy networks, fuzzy neural networks, fuzzy logic and genetic optimization, neural networks, and evolutionary algorithms. This Special Issue also includes papers that introduce combined techniques. <B>Wang</B> et al present an improved fuzzy algorithm for enhanced eyeground images. Examination of the eyeground image is effective in diagnosing glaucoma and diabetes. Conventional eyeground image quality is usually too poor for doctors to obtain useful information, so enhancement is required to eliminate this. Due to details and uncertainties in eyeground images, conventional enhancement such as histogram equalization, edge enhancement, and high-pass filters fail to achieve good results. Fuzzy enhancement enhances images in three steps: (1) transferring an image from the spatial domain to the fuzzy domain; (2) conducting enhancement in the fuzzy domain; and (3) returning the image from the fuzzy domain to the spatial domain. The paper detailing this proposes improved mapping and fast implementation. <B>Mohammadian</B> presents a method for designing self-learning hierarchical fuzzy logic control systems based on the integration of evolutionary algorithms and fuzzy logic. The purpose of such an approach is to provide an integrated knowledge base for intelligent control and collision avoidance in a multirobot system. Evolutionary algorithms are used as in adaptation for learning fuzzy knowledge bases of control systems and learning, mapping, and interaction between fuzzy knowledge bases of different fuzzy logic systems. Fuzzy integral has been found useful in data fusion. <B>Pham and Wagner</B> present an approach based on the fuzzy integral and GAs to combine likelihood values of cohort speakers. The fuzzy integral nonlinearly fuses similarity measures of an utterance assigned to cohort speakers. In their approach, Gas find optimal fuzzy densities required for fuzzy fusion. Experiments using commercial speech corpus T146 show their approach achieves more favorable performance than conventional normalization. Evolution reflects the behavior of a society. <B>Puppala and Sen</B> present a coevolutionary approach to generating behavioral strategies for cooperating agent groups. Agent behavior evolves via GAs, where one genetic algorithm population is evolved per individual in the cooperative group. Groups are evaluated by pairing strategies from each population and best strategy pairs are stored together in shared memory. The approach is evaluated using asymmetric room painting and results demonstrate the superiority of shared memory over random pairing in consistently generating optimal behavior patterns. Object representation and template optimization are two main factors affecting object recognition performance. <B>Lu</B> et al present an evolutionary algorithm for optimizing handwritten numeral templates represented by rational B-spline surfaces of character foreground-background-distance distribution maps. Initial templates are extracted from training a feed-forward neural network instead of using arbitrarily chosen patterns to reduce iterations required in evolutionary optimization. To further reduce computational complexity, a fast search is used in selection. Using 1,000 optimized numeral templates, the classifier achieves a classification rate of 96.4% while rejecting 90.7% of nonnumeral patterns when tested on NIST Special Database 3. Determining an appropriate number of clusters is difficult yet important. <B>Li</B> et al based their approach based on rival penalized competitive learning (RPCL), addressing problems of overlapped clusters and dependent components of input vectors by incorporating full covariance matrices into the original RPCL algorithm. The resulting learning algorithm progressively eliminates units whose clusters contain only a small amount of training data. The algorithm is applied to determine the number of clusters in a Gaussian mixture distribution and to optimize the architecture of elliptical function networks for speaker verification and for vowel classification. Another important issue on learning is <B>Kurihara and Sugawara's</B> adaptive reinforcement learning algorithm integrating exploitation- and exploration-oriented learning. This algorithm is more robust in dynamically changing, large-scale environments, providing better performance than either exploitation- learning or exploration-oriented learning, making it is well suited for autonomous systems. In closing we would like to thank the authors who have submitted papers to this Special Issue and express our appreciation to the referees for their excellent work in reading papers under a tight schedule.
APA, Harvard, Vancouver, ISO, and other styles
35

Zeer, E. F., E. E. Symanyuk, and E. V. Lebedeva. "Transprofessionalism as a Predictor for the Preadaptation of an Agent to the Professional Future." Sibirskiy Psikhologicheskiy Zhurnal, no. 79 (2021): 89–107. http://dx.doi.org/10.17223/17267080/79/6.

Full text
Abstract:
The article analyzes the possibilities of transprofessionalism as a factor in the preadaptation of a personality to an uncertain professional future in a post-industrial society. The logical-semantic model of transprofessionalism and a heuristic model of an agent’s preadaptation to uncertain professional future are presented. The foresight technology system was chosen as a methodology for developing transprofessionalism and predicting the social and professional future. It was focused on the formation of readiness for changes and the preadaptation for unpredictable future. The result of this technology is the convergence of a post-industrial society characteristics and semantic qualities of the professional future. The generalization of the research results allowed the authors to justify the possibility of high school training of transprofessionals with meta-professional skills who are ready to meet the challenges of the digital economy. The purpose of the research was to determine effective technologies for the training of innovative specialists (transprofessionals) on the basis of the developed transprofessional models of pre-adaptation to the professional future. The methodological basis of the study was non-classical psychology and a convergent ap-proach. In the scientific substantiation of transprofessionalism as a predictor of preadaptation to the future, the concept of professional development, the multidimensional, transdiscipli-nary, competence and project approaches, as well as the modeling of the predictable future were used. The article presents the logical-semantic and heuristic models of convergence and transprofessionalism development, as well as foresight technologies for preparing agents for an uncertain professional future. The structure of transprofessionalism is revealed through a meaningful analysis and description of its components’ interaction, which include the trans-fessional orientation, as well as the regulatory, vocational and educational, information and communication, operational and technological components. The intercoordinate space in the proposed model forms the psychological potential of the personality, its resource capabilities. Based on the analysis of trends and challenges of the post-industrial society, it was concluded that it is necessary to introduce into the educational process the technology of problem-oriented learning (PBL) and foresight technologies aimed at developing students' readiness for change, proactive goal-setting and self-design in a variable educational space (high humanitarian technologies, minors, design methods involving digital didactic tools, game technologies, discussions and moderation, etc.). Concerning practical significance, the materials of the article can be used for the preparation of transprofessional specialists who are ready for pre-adaptation of an uncertain social and professional future.
APA, Harvard, Vancouver, ISO, and other styles
36

Scafuto, Isabel Cristina, Priscila Rezende, and Marcos Mazzieri. "International Journal of Innovation - IJI completes 7 years." International Journal of Innovation 8, no. 2 (August 31, 2020): 137–43. http://dx.doi.org/10.5585/iji.v8i2.17965.

Full text
Abstract:
International Journal of Innovation - IJI completes 7 yearsInternational Journal of Innovation - IJI has now 7 years old! In this editorial comment, we not only want to talk about our evolution but get even closer to the IJI community. It is our first editorial comment, a new IJI's communication channel. Some of the changes are already described on our website.IJI is an innovation-focused journal that was created to support scientific research and thereby contribute to practice. Also, IJI was born internationally, receiving and supporting research from around the world. We welcome articles in Portuguese, English, and Spanish.We have published eight volumes in IJI since 2013, totaling 131 articles. Our journal is indexed in: Dialnet and Red Iberoamericana de Innovación y Conocimiento Científico; Ebsco Host; Erih Plus; Gale - Cengage Learning; Latindex; Proquest; Redalyc; Web of Science Core Collection (Emerging Sources Citation Index), among others. We provide free access “open access” to all its content. Articles can be read, downloaded, copied, distributed, printed and / or searched.We want to emphasize that none of this would be possible without the authors that recognized in IJI a relevant journal to publicize their work. Nor can we fail to mention the tireless and voluntary action of the reviewers, always contributing to the articles' improvement and skilling up our journal, more and more.All editors who passed through IJI have a fundamental role in this trajectory. And, none of this would be possible without the editorial team of Uninove. Everyone who passed and the current team. We want to express that our work as current editors of IJI would not be possible without you. Changes in the Intenational Journal of Innovation – IJIAs we mentioned earlier, IJI was born in 2013. And, over time, we are improving its structure always to improve it. In this section, we want to show some changes we made. We intend that editorial comments become a communication channel and that they can help our readers, authors, and reviewers to keep up with these changes.Although IJI is a comprehensive Innovation journal, one of the changes we want to inform you is that now, at the time of submission, the author will choose one of the available topics that best suit your article. The themes are: Innovative Entrepreneurship; Innovation and Learning; Innovation and Sustainability; Internationalization of Innovation; Innovation Systems; Emerging Innovation Themes and; Digital Transformation. Below, we present each theme so that everyone can get to know them:Innovative Entrepreneurship: emerging markets provided dynamic advantages for small businesses and their entrepreneurs to exploit the supply flows of resources, capacities, and knowledge-based on strategies oriented to the management of innovation. Topics covered in this theme include, for example: resources and capabilities that support innovative entrepreneurship; innovation habitats (Universities, Science and Technology Parks, Incubators and Accelerators) and their influences on the development of knowledge-intensive spin-offs and start-ups; open innovation, triple/quadruple helix, knowledge transfer, effectuation, bricolage and co-creation of value in knowledge-intensive entrepreneurship ecosystems; and adequate public policies to support innovative entrepreneurship.Innovation and Learning: discussions on this topic focus on the relationship between learning and innovation as topics with the potential to improve teaching and learning. They also focus on ways in which we acquire knowledge through innovation and how knowledge encourages new forms of innovation. Topics covered in this theme include, for example: innovative projects for learning; innovation-oriented learning; absorptive capacity; innovation in organizational learning and knowledge creation; unlearning and learning for technological innovation; new learning models; dynamics of innovation and learning; skills and innovation.Innovation and Sustainability: discussions on this topic seek to promote the development of innovation with a focus on sustainability, encouraging new ways of thinking about sustainable development issues. Topics covered in this theme include, for example: development of new sustainable products; circular economy; reverse logistic; smart cities; technological changes for sustainable development; innovation and health in the scope of sustainability; sustainable innovation and policies; innovation and education in sustainability and social innovation.Internationalization of Innovation: the rise of developing countries as an innovation center and their new nomenclature for emerging markets have occupied an important place in the international research agenda on global innovation and Research and Development (RD) strategies. Topics covered in this theme include, for example: resources and capabilities that support the internationalization of innovation and RD; global and local innovation and RD strategies; reverse innovation; internationalization of start-ups and digital companies; development of low-cost products, processes and services with a high-value offer internationalized to foreign markets; innovations at the base of the pyramid, disruptive and/or frugal developed and adopted in emerging markets and replicated in international markets; institutional factors that affect firms' innovation efforts in emerging markets.Innovation Systems: regulation and public policies define the institutional environment to drive innovation. Topics include industrial policy, technological trends and macroeconomic performance; investment ecosystem for the development and commercialization of new products, based on government and private investments; investment strategies related to new companies based on science or technology; Technology transfer to, from and between developing countries; technological innovation in all forms of business, political and economic systems. Topics such as triple helix, incubators, and other structures for cooperation, fostering and mobilizing innovation are expected in this section.Emerging Themes: from the applied themes, many emerging problems have a significant impact on management, such as industry 4.0, the internet of things, artificial intelligence or social innovations, or non-economic benefits. Intellectual property is treated as a cognitive database and can be understood as a technological library with the registration of the product of human creativity and invention. Social network analysis reveals the relationships between transforming agents and other elements; therefore, encouraged to be used in research and submitted in this section. The theoretical field not fully developed is not a barrier to explore any theme or question in this section.Digital Transformation: this interdisciplinary theme covers all the antecedents, intervening, and consequent effects of digital transformation in the field of technology-based companies and technology-based business ventures. The technological innovator (human side of innovation) as an entrepreneur, team member, manager, or employee is considered an object of study either as an agent of innovation or an element of the innovation process. Digital change or transformation is considered as a process that moves from the initial status to the new digital status, anchored in the theories of innovation, such as adoption, diffusion, push / pull of technology, innovation management, service innovation, disruptive innovation, innovation frugal innovation economy, organizational behavior, context of innovation, capabilities and transaction costs. Authors who submit to IJI will realize that they now need to make a structured summary at the time of submission. The summary must include the following information:(maximum of 250 words + title + keywords = Portuguese, English and Spanish).Title.Objective of the study (mandatory): Indicate the objective of the work, that is, what you want to demonstrate or describe.Methodology / approach (mandatory): Indicate the scientific method used in carrying out the study. In the case of theoretical essays, it is recommended that the authors indicate the theoretical approach adopted.Originality / Relevance (mandatory): Indicate the theoretical gap in which the study is inserted, also presenting the academic relevance of the discipline.Main results (mandatory): briefly indicate the main results achieved.Theoretical-methodological contributions (mandatory): Indicate the main theoretical and / or methodological implications that have been achieved with the results of the study.Social / managerial contributions (mandatory): Indicate the main managerial and / or social implications obtained through the results of the study.Keywords: between three and five keywords that characterize the work. Another change regarding the organization of the IJI concerns the types of work. In addition to the Editorial Comment and Articles, the journal will include Technological Articles, Perspectives, and Reviews. Thus, when submitting a study, authors will be able to choose from the available options for types of work. Throughout the next issues of the IJI, in the editorial comments, we will pass on pertinent information about every kind of work, to assist the authors in their submissions.Currently, the IJI is available to readers with new works three times a year (January-April; May-August; September-December) with publications in English, Portuguese and Spanish. From what comes next, we will have some changes in the periodicity. Next stepsAs editors, we want the IJI to continue with a national and international impact and increase its relevance in the indexing bases. For this, we will work together with the entire editorial team, reviewers, and authors to improve the work. We will do our best to give full support to the evaluators who are so dedicated to making constructive evaluations to the authors. We will also support authors with all the necessary information.With editorial comments, we intend to pass on knowledge to readers, authors, and reviewers to improve the articles gradually. We also aim to support classroom activities and content.Even with the changes reported here, we continue to accept all types of work, as long as they have an appropriate methodology. We also maintain our scope and continue to publish all topics involving innovation. We want to support academic events on fast tracks increasingly. About the articles in this edition of IJIThis issue is the first we consider the new organization of the International Journal of Innovation - IJI. We started with this editorial comment talking about the changes and improvements that we are making at IJI—as an example, showing the reader, reviewer, and author that the scope remains the same. However, at the time of submission, the author has to choose one of the proposed themes and have a mandatory abstract structured in three languages (English, Portuguese, and Spanish).In this issue, we have a section of perspectives that addresses the “Fake Agile” phenomenon. This phenomenon is related to the difficulties that companies face throughout the agile transformation, causing companies not to reach full agility and not return to their previous management model.Next, we publish the traditional section with scientific articles. The article “Critical success factors of the incubation network of enterprises of the IFES” brings critical success factors as the determining variables to keep business incubators competitive, improving their organizational processes, and ensuring their survival. Another published article, “The sharing economy dilemma: the response of incumbent firms to the rise of the sharing economy”, addresses the sharing economy in terms of innovation. The results of the study suggest that the current response to the sharing economy so far is moderate and limited. The article “Analysis of the provision for implementation of reverse logistics in the supermarket retail” made it possible to observe that through the variables that define retail characteristics, it is not possible to say whether a supermarket will implement the reverse logistics process. And the article “Capability building in fuzzy front end management in a high technology services company”, whose main objective was to assess the adherence among Fuzzy Front End (FFE) facilitators, was reported in the literature its application in the innovation process of a company, an innovative multinational high-tech services company.We also published the article “The evolution of triple helix movement: an analysis of scientific communications through bibliometric technique”. The study is a bibliometric review that brings essential contributions to the area. This issue also includes a literature review entitled “Service innovation tools: a literature review” that aimed to systematically review the frameworks proposed and applied by the literature on service innovation.The technological article “A model to adopt Enterprise Resource Planning (ERP) and Business Intelligence (BI) among Saudi SMEs”, in a new IJI publication section, addresses the main issues related to the intention to use ERPBI in the Saudi private sector.As we mentioned earlier in this editorial, IJI has a slightly different organization. With the new format, we intend to contribute to the promotion of knowledge in innovation. Also, we aim to increasingly present researchers and students with possibilities of themes and gaps for their research and bring insights to professionals in the field.Again, we thank the reviewers who dedicate their time and knowledge in the evaluations, always helping the authors. We wish you, readers, to enjoy the articles in this issue and feel encouraged to send your studies in innovation to the International Journal of Innovation - IJI.
APA, Harvard, Vancouver, ISO, and other styles
37

Khan, Majid Ali, Shankar K. Vaithianathan, Kresimir Sivoncik, and Ladislau Boloni. "TOWARDS AN AGENT FRAMEWORK FOR GRID COMPUTING." International Journal of Computing, August 1, 2014, 56–62. http://dx.doi.org/10.47839/ijc.2.3.230.

Full text
Abstract:
This paper presents an agent oriented approach for grid computing. As opposed to existing approaches, agent technology promises a more flexible approach, easier installation and management of the grid framework, and better ability to autonomously recover from failures. The semantically rich, ontological description of the grid applications, services and resources opens the possibility for better monitoring and resource management, and better user interfaces - both for customers and service providers.
APA, Harvard, Vancouver, ISO, and other styles
38

Losh, Elizabeth. "Artificial Intelligence." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2710.

Full text
Abstract:
On the morning of Thursday, 4 May 2006, the United States House Permanent Select Committee on Intelligence held an open hearing entitled “Terrorist Use of the Internet.” The Intelligence committee meeting was scheduled to take place in Room 1302 of the Longworth Office Building, a Depression-era structure with a neoclassical façade. Because of a dysfunctional elevator, some of the congressional representatives were late to the meeting. During the testimony about the newest political applications for cutting-edge digital technology, the microphones periodically malfunctioned, and witnesses complained of “technical problems” several times. By the end of the day it seemed that what was to be remembered about the hearing was the shocking revelation that terrorists were using videogames to recruit young jihadists. The Associated Press wrote a short, restrained article about the hearing that only mentioned “computer games and recruitment videos” in passing. Eager to have their version of the news item picked up, Reuters made videogames the focus of their coverage with a headline that announced, “Islamists Using US Videogames in Youth Appeal.” Like a game of telephone, as the Reuters videogame story was quickly re-run by several Internet news services, each iteration of the title seemed less true to the exact language of the original. One Internet news service changed the headline to “Islamic militants recruit using U.S. video games.” Fox News re-titled the story again to emphasise that this alert about technological manipulation was coming from recognised specialists in the anti-terrorism surveillance field: “Experts: Islamic Militants Customizing Violent Video Games.” As the story circulated, the body of the article remained largely unchanged, in which the Reuters reporter described the digital materials from Islamic extremists that were shown at the congressional hearing. During the segment that apparently most captured the attention of the wire service reporters, eerie music played as an English-speaking narrator condemned the “infidel” and declared that he had “put a jihad” on them, as aerial shots moved over 3D computer-generated images of flaming oil facilities and mosques covered with geometric designs. Suddenly, this menacing voice-over was interrupted by an explosion, as a virtual rocket was launched into a simulated military helicopter. The Reuters reporter shared this dystopian vision from cyberspace with Western audiences by quoting directly from the chilling commentary and describing a dissonant montage of images and remixed sound. “I was just a boy when the infidels came to my village in Blackhawk helicopters,” a narrator’s voice said as the screen flashed between images of street-level gunfights, explosions and helicopter assaults. Then came a recording of President George W. Bush’s September 16, 2001, statement: “This crusade, this war on terrorism, is going to take a while.” It was edited to repeat the word “crusade,” which Muslims often define as an attack on Islam by Christianity. According to the news reports, the key piece of evidence before Congress seemed to be a film by “SonicJihad” of recorded videogame play, which – according to the experts – was widely distributed online. Much of the clip takes place from the point of view of a first-person shooter, seen as if through the eyes of an armed insurgent, but the viewer also periodically sees third-person action in which the player appears as a running figure wearing a red-and-white checked keffiyeh, who dashes toward the screen with a rocket launcher balanced on his shoulder. Significantly, another of the player’s hand-held weapons is a detonator that triggers remote blasts. As jaunty music plays, helicopters, tanks, and armoured vehicles burst into smoke and flame. Finally, at the triumphant ending of the video, a green and white flag bearing a crescent is hoisted aloft into the sky to signify victory by Islamic forces. To explain the existence of this digital alternative history in which jihadists could be conquerors, the Reuters story described the deviousness of the country’s terrorist opponents, who were now apparently modifying popular videogames through their wizardry and inserting anti-American, pro-insurgency content into U.S.-made consumer technology. One of the latest video games modified by militants is the popular “Battlefield 2” from leading video game publisher, Electronic Arts Inc of Redwood City, California. Jeff Brown, a spokesman for Electronic Arts, said enthusiasts often write software modifications, known as “mods,” to video games. “Millions of people create mods on games around the world,” he said. “We have absolutely no control over them. It’s like drawing a mustache on a picture.” Although the Electronic Arts executive dismissed the activities of modders as a “mustache on a picture” that could only be considered little more than childish vandalism of their off-the-shelf corporate product, others saw a more serious form of criminality at work. Testifying experts and the legislators listening on the committee used the video to call for greater Internet surveillance efforts and electronic counter-measures. Within twenty-four hours of the sensationalistic news breaking, however, a group of Battlefield 2 fans was crowing about the idiocy of reporters. The game play footage wasn’t from a high-tech modification of the software by Islamic extremists; it had been posted on a Planet Battlefield forum the previous December of 2005 by a game fan who had cut together regular game play with a Bush remix and a parody snippet of the soundtrack from the 2004 hit comedy film Team America. The voice describing the Black Hawk helicopters was the voice of Trey Parker of South Park cartoon fame, and – much to Parker’s amusement – even the mention of “goats screaming” did not clue spectators in to the fact of a comic source. Ironically, the moment in the movie from which the sound clip is excerpted is one about intelligence gathering. As an agent of Team America, a fictional elite U.S. commando squad, the hero of the film’s all-puppet cast, Gary Johnston, is impersonating a jihadist radical inside a hostile Egyptian tavern that is modelled on the cantina scene from Star Wars. Additional laughs come from the fact that agent Johnston is accepted by the menacing terrorist cell as “Hakmed,” despite the fact that he utters a series of improbable clichés made up of incoherent stereotypes about life in the Middle East while dressed up in a disguise made up of shoe polish and a turban from a bathroom towel. The man behind the “SonicJihad” pseudonym turned out to be a twenty-five-year-old hospital administrator named Samir, and what reporters and representatives saw was nothing more exotic than game play from an add-on expansion pack of Battlefield 2, which – like other versions of the game – allows first-person shooter play from the position of the opponent as a standard feature. While SonicJihad initially joined his fellow gamers in ridiculing the mainstream media, he also expressed astonishment and outrage about a larger politics of reception. In one interview he argued that the media illiteracy of Reuters potentially enabled a whole series of category errors, in which harmless gamers could be demonised as terrorists. It wasn’t intended for the purpose what it was portrayed to be by the media. So no I don’t regret making a funny video . . . why should I? The only thing I regret is thinking that news from Reuters was objective and always right. The least they could do is some online research before publishing this. If they label me al-Qaeda just for making this silly video, that makes you think, what is this al-Qaeda? And is everything al-Qaeda? Although Sonic Jihad dismissed his own work as “silly” or “funny,” he expected considerably more from a credible news agency like Reuters: “objective” reporting, “online research,” and fact-checking before “publishing.” Within the week, almost all of the salient details in the Reuters story were revealed to be incorrect. SonicJihad’s film was not made by terrorists or for terrorists: it was not created by “Islamic militants” for “Muslim youths.” The videogame it depicted had not been modified by a “tech-savvy militant” with advanced programming skills. Of course, what is most extraordinary about this story isn’t just that Reuters merely got its facts wrong; it is that a self-identified “parody” video was shown to the august House Intelligence Committee by a team of well-paid “experts” from the Science Applications International Corporation (SAIC), a major contractor with the federal government, as key evidence of terrorist recruitment techniques and abuse of digital networks. Moreover, this story of media illiteracy unfolded in the context of a fundamental Constitutional debate about domestic surveillance via communications technology and the further regulation of digital content by lawmakers. Furthermore, the transcripts of the actual hearing showed that much more than simple gullibility or technological ignorance was in play. Based on their exchanges in the public record, elected representatives and government experts appear to be keenly aware that the digital discourses of an emerging information culture might be challenging their authority and that of the longstanding institutions of knowledge and power with which they are affiliated. These hearings can be seen as representative of a larger historical moment in which emphatic declarations about prohibiting specific practices in digital culture have come to occupy a prominent place at the podium, news desk, or official Web portal. This environment of cultural reaction can be used to explain why policy makers’ reaction to terrorists’ use of networked communication and digital media actually tells us more about our own American ideologies about technology and rhetoric in a contemporary information environment. When the experts come forward at the Sonic Jihad hearing to “walk us through the media and some of the products,” they present digital artefacts of an information economy that mirrors many of the features of our own consumption of objects of electronic discourse, which seem dangerously easy to copy and distribute and thus also create confusion about their intended meanings, audiences, and purposes. From this one hearing we can see how the reception of many new digital genres plays out in the public sphere of legislative discourse. Web pages, videogames, and Weblogs are mentioned specifically in the transcript. The main architecture of the witnesses’ presentation to the committee is organised according to the rhetorical conventions of a PowerPoint presentation. Moreover, the arguments made by expert witnesses about the relationship of orality to literacy or of public to private communications in new media are highly relevant to how we might understand other important digital genres, such as electronic mail or text messaging. The hearing also invites consideration of privacy, intellectual property, and digital “rights,” because moral values about freedom and ownership are alluded to by many of the elected representatives present, albeit often through the looking glass of user behaviours imagined as radically Other. For example, terrorists are described as “modders” and “hackers” who subvert those who properly create, own, legitimate, and regulate intellectual property. To explain embarrassing leaks of infinitely replicable digital files, witness Ron Roughead says, “We’re not even sure that they don’t even hack into the kinds of spaces that hold photographs in order to get pictures that our forces have taken.” Another witness, Undersecretary of Defense for Policy and International Affairs, Peter Rodman claims that “any video game that comes out, as soon as the code is released, they will modify it and change the game for their needs.” Thus, the implication of these witnesses’ testimony is that the release of code into the public domain can contribute to political subversion, much as covert intrusion into computer networks by stealthy hackers can. However, the witnesses from the Pentagon and from the government contractor SAIC often present a contradictory image of the supposed terrorists in the hearing transcripts. Sometimes the enemy is depicted as an organisation of technological masterminds, capable of manipulating the computer code of unwitting Americans and snatching their rightful intellectual property away; sometimes those from the opposing forces are depicted as pre-modern and even sub-literate political innocents. In contrast, the congressional representatives seem to focus on similarities when comparing the work of “terrorists” to the everyday digital practices of their constituents and even of themselves. According to the transcripts of this open hearing, legislators on both sides of the aisle express anxiety about domestic patterns of Internet reception. Even the legislators’ own Web pages are potentially disruptive electronic artefacts, particularly when the demands of digital labour interfere with their duties as lawmakers. Although the subject of the hearing is ostensibly terrorist Websites, Representative Anna Eshoo (D-California) bemoans the difficulty of maintaining her own official congressional site. As she observes, “So we are – as members, I think we’re very sensitive about what’s on our Website, and if I retained what I had on my Website three years ago, I’d be out of business. So we know that they have to be renewed. They go up, they go down, they’re rebuilt, they’re – you know, the message is targeted to the future.” In their questions, lawmakers identify Weblogs (blogs) as a particular area of concern as a destabilising alternative to authoritative print sources of information from established institutions. Representative Alcee Hastings (D-Florida) compares the polluting power of insurgent bloggers to that of influential online muckrakers from the American political Right. Hastings complains of “garbage on our regular mainstream news that comes from blog sites.” Representative Heather Wilson (R-New Mexico) attempts to project a media-savvy persona by bringing up the “phenomenon of blogging” in conjunction with her questions about jihadist Websites in which she notes how Internet traffic can be magnified by cooperative ventures among groups of ideologically like-minded content-providers: “These Websites, and particularly the most active ones, are they cross-linked? And do they have kind of hot links to your other favorite sites on them?” At one point Representative Wilson asks witness Rodman if he knows “of your 100 hottest sites where the Webmasters are educated? What nationality they are? Where they’re getting their money from?” In her questions, Wilson implicitly acknowledges that Web work reflects influences from pedagogical communities, economic networks of the exchange of capital, and even potentially the specific ideologies of nation-states. It is perhaps indicative of the government contractors’ anachronistic worldview that the witness is unable to answer Wilson’s question. He explains that his agency focuses on the physical location of the server or ISP rather than the social backgrounds of the individuals who might be manufacturing objectionable digital texts. The premise behind the contractors’ working method – surveilling the technical apparatus not the social network – may be related to other beliefs expressed by government witnesses, such as the supposition that jihadist Websites are collectively produced and spontaneously emerge from the indigenous, traditional, tribal culture, instead of assuming that Iraqi insurgents have analogous beliefs, practices, and technological awareness to those in first-world countries. The residual subtexts in the witnesses’ conjectures about competing cultures of orality and literacy may tell us something about a reactionary rhetoric around videogames and digital culture more generally. According to the experts before Congress, the Middle Eastern audience for these videogames and Websites is limited by its membership in a pre-literate society that is only capable of abortive cultural production without access to knowledge that is archived in printed codices. Sometimes the witnesses before Congress seem to be unintentionally channelling the ideas of the late literacy theorist Walter Ong about the “secondary orality” associated with talky electronic media such as television, radio, audio recording, or telephone communication. Later followers of Ong extend this concept of secondary orality to hypertext, hypermedia, e-mail, and blogs, because they similarly share features of both speech and written discourse. Although Ong’s disciples celebrate this vibrant reconnection to a mythic, communal past of what Kathleen Welch calls “electric rhetoric,” the defence industry consultants express their profound state of alarm at the potentially dangerous and subversive character of this hybrid form of communication. The concept of an “oral tradition” is first introduced by the expert witnesses in the context of modern marketing and product distribution: “The Internet is used for a variety of things – command and control,” one witness states. “One of the things that’s missed frequently is how and – how effective the adversary is at using the Internet to distribute product. They’re using that distribution network as a modern form of oral tradition, if you will.” Thus, although the Internet can be deployed for hierarchical “command and control” activities, it also functions as a highly efficient peer-to-peer distributed network for disseminating the commodity of information. Throughout the hearings, the witnesses imply that unregulated lateral communication among social actors who are not authorised to speak for nation-states or to produce legitimated expert discourses is potentially destabilising to political order. Witness Eric Michael describes the “oral tradition” and the conventions of communal life in the Middle East to emphasise the primacy of speech in the collective discursive practices of this alien population: “I’d like to point your attention to the media types and the fact that the oral tradition is listed as most important. The other media listed support that. And the significance of the oral tradition is more than just – it’s the medium by which, once it comes off the Internet, it is transferred.” The experts go on to claim that this “oral tradition” can contaminate other media because it functions as “rumor,” the traditional bane of the stately discourse of military leaders since the classical era. The oral tradition now also has an aspect of rumor. A[n] event takes place. There is an explosion in a city. Rumor is that the United States Air Force dropped a bomb and is doing indiscriminate killing. This ends up being discussed on the street. It ends up showing up in a Friday sermon in a mosque or in another religious institution. It then gets recycled into written materials. Media picks up the story and broadcasts it, at which point it’s now a fact. In this particular case that we were telling you about, it showed up on a network television, and their propaganda continues to go back to this false initial report on network television and continue to reiterate that it’s a fact, even though the United States government has proven that it was not a fact, even though the network has since recanted the broadcast. In this example, many-to-many discussion on the “street” is formalised into a one-to many “sermon” and then further stylised using technology in a one-to-many broadcast on “network television” in which “propaganda” that is “false” can no longer be disputed. This “oral tradition” is like digital media, because elements of discourse can be infinitely copied or “recycled,” and it is designed to “reiterate” content. In this hearing, the word “rhetoric” is associated with destructive counter-cultural forces by the witnesses who reiterate cultural truisms dating back to Plato and the Gorgias. For example, witness Eric Michael initially presents “rhetoric” as the use of culturally specific and hence untranslatable figures of speech, but he quickly moves to an outright castigation of the entire communicative mode. “Rhetoric,” he tells us, is designed to “distort the truth,” because it is a “selective” assembly or a “distortion.” Rhetoric is also at odds with reason, because it appeals to “emotion” and a romanticised Weltanschauung oriented around discourses of “struggle.” The film by SonicJihad is chosen as the final clip by the witnesses before Congress, because it allegedly combines many different types of emotional appeal, and thus it conveniently ties together all of the themes that the witnesses present to the legislators about unreliable oral or rhetorical sources in the Middle East: And there you see how all these products are linked together. And you can see where the games are set to psychologically condition you to go kill coalition forces. You can see how they use humor. You can see how the entire campaign is carefully crafted to first evoke an emotion and then to evoke a response and to direct that response in the direction that they want. Jihadist digital products, especially videogames, are effective means of manipulation, the witnesses argue, because they employ multiple channels of persuasion and carefully sequenced and integrated subliminal messages. To understand the larger cultural conversation of the hearing, it is important to keep in mind that the related argument that “games” can “psychologically condition” players to be predisposed to violence is one that was important in other congressional hearings of the period, as well one that played a role in bills and resolutions that were passed by the full body of the legislative branch. In the witness’s testimony an appeal to anti-game sympathies at home is combined with a critique of a closed anti-democratic system abroad in which the circuits of rhetorical production and their composite metonymic chains are described as those that command specific, unvarying, robotic responses. This sharp criticism of the artful use of a presentation style that is “crafted” is ironic, given that the witnesses’ “compilation” of jihadist digital material is staged in the form of a carefully structured PowerPoint presentation, one that is paced to a well-rehearsed rhythm of “slide, please” or “next slide” in the transcript. The transcript also reveals that the members of the House Intelligence Committee were not the original audience for the witnesses’ PowerPoint presentation. Rather, when it was first created by SAIC, this “expert” presentation was designed for training purposes for the troops on the ground, who would be facing the challenges of deployment in hostile terrain. According to the witnesses, having the slide show showcased before Congress was something of an afterthought. Nonetheless, Congressman Tiahrt (R-KN) is so impressed with the rhetorical mastery of the consultants that he tries to appropriate it. As Tiarht puts it, “I’d like to get a copy of that slide sometime.” From the hearing we also learn that the terrorists’ Websites are threatening precisely because they manifest a polymorphously perverse geometry of expansion. For example, one SAIC witness before the House Committee compares the replication and elaboration of digital material online to a “spiderweb.” Like Representative Eshoo’s site, he also notes that the terrorists’ sites go “up” and “down,” but the consultant is left to speculate about whether or not there is any “central coordination” to serve as an organising principle and to explain the persistence and consistency of messages despite the apparent lack of a single authorial ethos to offer a stable, humanised, point of reference. In the hearing, the oft-cited solution to the problem created by the hybridity and iterability of digital rhetoric appears to be “public diplomacy.” Both consultants and lawmakers seem to agree that the damaging messages of the insurgents must be countered with U.S. sanctioned information, and thus the phrase “public diplomacy” appears in the hearing seven times. However, witness Roughhead complains that the protean “oral tradition” and what Henry Jenkins has called the “transmedia” character of digital culture, which often crosses several platforms of traditional print, projection, or broadcast media, stymies their best rhetorical efforts: “I think the point that we’ve tried to make in the briefing is that wherever there’s Internet availability at all, they can then download these – these programs and put them onto compact discs, DVDs, or post them into posters, and provide them to a greater range of people in the oral tradition that they’ve grown up in. And so they only need a few Internet sites in order to distribute and disseminate the message.” Of course, to maintain their share of the government market, the Science Applications International Corporation also employs practices of publicity and promotion through the Internet and digital media. They use HTML Web pages for these purposes, as well as PowerPoint presentations and online video. The rhetoric of the Website of SAIC emphasises their motto “From Science to Solutions.” After a short Flash film about how SAIC scientists and engineers solve “complex technical problems,” the visitor is taken to the home page of the firm that re-emphasises their central message about expertise. The maps, uniforms, and specialised tools and equipment that are depicted in these opening Web pages reinforce an ethos of professional specialisation that is able to respond to multiple threats posed by the “global war on terror.” By 26 June 2006, the incident finally was being described as a “Pentagon Snafu” by ABC News. From the opening of reporter Jake Tapper’s investigative Webcast, established government institutions were put on the spot: “So, how much does the Pentagon know about videogames? Well, when it came to a recent appearance before Congress, apparently not enough.” Indeed, the very language about “experts” that was highlighted in the earlier coverage is repeated by Tapper in mockery, with the significant exception of “independent expert” Ian Bogost of the Georgia Institute of Technology. If the Pentagon and SAIC deride the legitimacy of rhetoric as a cultural practice, Bogost occupies himself with its defence. In his recent book Persuasive Games: The Expressive Power of Videogames, Bogost draws upon the authority of the “2,500 year history of rhetoric” to argue that videogames represent a significant development in that cultural narrative. Given that Bogost and his Watercooler Games Weblog co-editor Gonzalo Frasca were actively involved in the detective work that exposed the depth of professional incompetence involved in the government’s line-up of witnesses, it is appropriate that Bogost is given the final words in the ABC exposé. As Bogost says, “We should be deeply bothered by this. We should really be questioning the kind of advice that Congress is getting.” Bogost may be right that Congress received terrible counsel on that day, but a close reading of the transcript reveals that elected officials were much more than passive listeners: in fact they were lively participants in a cultural conversation about regulating digital media. After looking at the actual language of these exchanges, it seems that the persuasiveness of the misinformation from the Pentagon and SAIC had as much to do with lawmakers’ preconceived anxieties about practices of computer-mediated communication close to home as it did with the contradictory stereotypes that were presented to them about Internet practices abroad. In other words, lawmakers found themselves looking into a fun house mirror that distorted what should have been familiar artefacts of American popular culture because it was precisely what they wanted to see. References ABC News. “Terrorist Videogame?” Nightline Online. 21 June 2006. 22 June 2006 http://abcnews.go.com/Video/playerIndex?id=2105341>. Bogost, Ian. Persuasive Games: Videogames and Procedural Rhetoric. Cambridge, MA: MIT Press, 2007. Game Politics. “Was Congress Misled by ‘Terrorist’ Game Video? We Talk to Gamer Who Created the Footage.” 11 May 2006. http://gamepolitics.livejournal.com/285129.html#cutid1>. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. julieb. “David Morgan Is a Horrible Writer and Should Be Fired.” Online posting. 5 May 2006. Dvorak Uncensored Cage Match Forums. http://cagematch.dvorak.org/index.php/topic,130.0.html>. Mahmood. “Terrorists Don’t Recruit with Battlefield 2.” GGL Global Gaming. 16 May 2006 http://www.ggl.com/news.php?NewsId=3090>. Morgan, David. “Islamists Using U.S. Video Games in Youth Appeal.” Reuters online news service. 4 May 2006 http://today.reuters.com/news/ArticleNews.aspx?type=topNews &storyID=2006-05-04T215543Z_01_N04305973_RTRUKOC_0_US-SECURITY- VIDEOGAMES.xml&pageNumber=0&imageid=&cap=&sz=13&WTModLoc= NewsArt-C1-ArticlePage2>. Ong, Walter J. Orality and Literacy: The Technologizing of the Word. London/New York: Methuen, 1982. Parker, Trey. Online posting. 7 May 2006. 9 May 2006 http://www.treyparker.com>. Plato. “Gorgias.” Plato: Collected Dialogues. Princeton: Princeton UP, 1961. Shrader, Katherine. “Pentagon Surfing Thousands of Jihad Sites.” Associated Press 4 May 2006. SonicJihad. “SonicJihad: A Day in the Life of a Resistance Fighter.” Online posting. 26 Dec. 2005. Planet Battlefield Forums. 9 May 2006 http://www.forumplanet.com/planetbattlefield/topic.asp?fid=13670&tid=1806909&p=1>. Tapper, Jake, and Audery Taylor. “Terrorist Video Game or Pentagon Snafu?” ABC News Nightline 21 June 2006. 30 June 2006 http://abcnews.go.com/Nightline/Technology/story?id=2105128&page=1>. U.S. Congressional Record. Panel I of the Hearing of the House Select Intelligence Committee, Subject: “Terrorist Use of the Internet for Communications.” Federal News Service. 4 May 2006. Welch, Kathleen E. Electric Rhetoric: Classical Rhetoric, Oralism, and the New Literacy. Cambridge, MA: MIT Press, 1999. Citation reference for this article MLA Style Losh, Elizabeth. "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/08-losh.php>. APA Style Losh, E. (Oct. 2007) "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/08-losh.php>.
APA, Harvard, Vancouver, ISO, and other styles
39

Campbell, Sian Petronella. "On the Record: Time and The Self as Data in Contemporary Autofiction." M/C Journal 22, no. 6 (December 4, 2019). http://dx.doi.org/10.5204/mcj.1604.

Full text
Abstract:
In January of this year, artist Christian Marclay’s 24-hour video installation The Clock came to Melbourne. As Ben Lerner explains in 10:04, the autofictional novel Lerner published in 2014, The Clock by Christian Marclay “is a clock: it is a twenty-four hour montage of thousands of scenes from movies and a few from TV edited together so as to be shown in real time; each scene indicates the time with a shot of a timepiece or its mention in dialogue, time in and outside of the film is synchronized” (52). I went to see The Clock at ACMI several times, with friends and alone, in the early morning and late at night. Each time I sank back into the comfortable chairs and settled into the communal experience of watching time pass on a screen in a dark room. I found myself sucked into the enforced narrative of time, the way in which the viewer – in this case myself, and those sharing the experience with me – sought to impose a sort of meaning on the arguably meaningless passing of the hours. In this essay, I will explore how we can expand our thinking of the idea of autofiction, as a genre, to include contemporary forms of digital media such as social media or activity trackers, as the authors of these new forms of digital media act as author-characters by playing with the divide between fact and fiction, and requiring their readers to ascertain meaning by interpreting the clues layered within. I will analyse the ways in which the meaning of autofictional texts—such as Lerner’s 10:04, but also including social media feeds, blogs and activity trackers—shifts depending on their audience. I consider that as technology develops, we increasingly use data to contextualise ourselves within a broader narrative – health data, media, journalistic data. As the sociologist John B. Thompson writes, “The development of the media not only enriches and transforms the process of self-formation, it also produces a new kind of intimacy which did not exist before … individuals can create and establish a form of intimacy which is essentially non-reciprocal” (208). New media and technologies have emerged to assist in this process of self-formation through the collection and publication of data. This essay is interested in analysing this process of self-formation, and its relationship to the genre of autofiction.Contemporary Digital Media as AutofictionWhile humans have always recorded themselves throughout history, with the rise of new technologies the instinct to record the self is increasingly becoming an automatic one; an instinct we can tie to what media theorist Nick Couldry terms as “presencing”: an “emerging requirement in everyday life to have a public presence beyond one’s bodily presence, to construct an objectification of oneself” (50). We are required to participate in ‘presencing’ by opting-in to new media; it is now uncommon – even unfavourable – for someone not to engage in any forms of social media or self-monitoring. We are now encouraged to participate in ‘presencing’ through the recording and online publication of data that would have once been considered private, such as employment histories and activity histories. Every Instagram photo, Snapchat or TikTok video contributes to an accumulating digital presence, an emerging narrative of the self. Couldry notes that presencing “is not the same as calling up a few friends to tell them some news; nor, although the audience is unspecific, is it like putting up something on a noticeboard. That is because presencing is oriented to a permanent site in public space that is distinctively marked by the producer for displaying that producer’s self” (50).In this way, we can see that in effect we are all becoming increasingly positioned to become autofiction authors. As an experimental form of literature, autofiction has been around for a long time, the term having first been introduced in the 1970s, and with Serge Doubrovsky widely credited with having introduced the genre with the publication of his 1977 novel Fils (Browning 49). In the most basic terms, autofiction is simply a work of fiction featuring a protagonist who can be interpreted as a stand-in for its author. And while autofiction is also confused with or used interchangeably with other genres such as metafiction or memoir, the difference between autofiction and other genres, writes Arnaud Schmitt, is that autoficton “relies on fiction—runs on fiction, to be exact” (141). Usually the reader can pick up on the fact that a novel is an autofictional one by noting that the protagonist and the author share a name, or key autobiographical details, but it is debatable as to whether the reader in fact needs to know that the work is autofictional in the first place in order to properly engage with it as a literary text.The same ideas can be applied to the application of digital media today. Kylie Cardell notes that “personal autobiographical but specifically diaristic (confessional, serial, quotidian) disclosure is increasingly positioned as a symptomatic feature of online life” (507). This ties in with Couldry’s idea of ‘presencing’; confession is increasingly a requirement when it comes to participation in digital media. As technology advances, the ways in which we can present and record the self evolve, and the narrative we can produce of the self expands alongside our understanding of the relationship between fact and fiction. Though of course we have always fabricated different narratives of the self, whether it be through diary entries or letter-writing, ‘presencing’ occurs when we literally present these edited versions of ourselves to an online audience. Lines become blurred between fiction and non-fiction, and the ability to distinguish between ‘fake’ and ‘real’ becomes almost impossible.Increasingly, such a distinction fails to seem important, and in some cases, this blurred line becomes the point, or a punchline; we can see this most clearly in TikTok videos, wherein people (specifically, or at least most typically, young people—Generation Z) play with ideas of truth and unreality ironically. When a teenager posts a video of themselves on TikTok dancing in their school cafeteria with the caption, “I got suspended for this, don’t let this flop”, the savvy viewer understands without it needing to be said that the student was not actually suspended – and also understands that even less outlandish or unbelievable digital content is unreliable by nature, and simply the narrative the author or producer wishes to convey; just like the savvy reader of an autofiction novel understands, without it actually being said, that the novel is in part autobiographical, even when the author and protagonist do not share a name or other easily identifiable markers.This is the nature of autofiction; it signals to the reader its status as a work of autofiction by littering intertextual clues throughout. Readers familiar with the author’s biography or body of work will pick up on these clues, creating a sense of uneasiness in the reader as they work to discern what is fact and what is not.Indeed, in 10:04, Lerner flags the text as a work of autofiction by sketching a fictional-not-fictional image of himself as an author of a story, ‘The Golden Vanity’ published in The New Yorker, that earned him a book deal—a story the ‘real’ Ben Lerner did in fact publish, two years before the publication of 10:04: “a few months before, the agent had e-mailed me that she believed I could get a “strong six-figure” advance based on a story of mine that had appeared in The New Yorker” (Lerner 4).In a review of 10:04 for the Sydney Review of Books, Stephanie Bishop writes:we learn that he did indeed write a proposal, that there was a competitive auction … What had just happened? Where are we in time? Was the celebratory meal fictional or real? Can we (and should we) seek to distinguish these categories?Here Lerner is ‘presencing’, crafting a multilayered version of himself across media by assuming that the reader of his work is also a reader of The New Yorker (an easy assumption to make given that his work often appears in, and is reviewed in, The New Yorker). Of course, this leads to the question: what becomes of autofiction when it is consumed by someone who is unable to pick up on the many metareferences layered within its narrative? In this case, the work itself becomes a joke that doesn’t land – much like a social media feed being consumed by someone who is not its intended audience.The savvy media consumer also understands that even the most meaningless or obtuse of media is all part of the overarching narrative. Lerner highlights the way we try and impose meaning onto (arguably) meaningless media when he describes his experience of watching time pass in Marclay’s The Clock:Big Ben, which I would come to learn appears frequently in the video, exploded, and people in the audience applauded… But then, a minute later, a young girl awakes from a nightmare and, as she’s comforted by her father (Clark Gable as Rhett Butler), you see Big Ben ticking away again outside their window, no sign of damage. The entire preceding twenty-four hours might have been the child’s dream, a storm that never happened, just one of many ways The Clock can be integrated into an overarching narrative. Indeed it was a greater challenge for me to resist the will to integration. (Lerner 52-53)This desire to impose an overarching narrative that Lerner speaks of – and which I also experienced when watching The Clock, as detailed in the introduction to this essay – is what the recording of the self both aims to achieve and achieves by default; it is the point and also the by-product. The Self as DataThe week my grandmother died, in 2017, my father bought me an Apple Watch. I had recently started running and—perhaps as an outlet for my grief—was looking to take my running further. I wanted a smart watch to help me record my runs; to turn the act of running into data that I could quantify and thus understand. This, in turn, would help me understand something about myself. Deborah Lupton explains my impulse here when she writes, “the body/self is portrayed as a conglomerate of quantifiable data that can be revealed using digital devices” (65). I wanted to reveal my ‘self’ by recording it, similar to the way the data accumulated in a diary, when reflected upon, helps a diarist understand their life more broadly. "Is a Fitbit a diary?”, asks Kylie Cardell. “The diary in the twenty-first century is already vastly different from many of its formal historical counterparts, yet there are discursive resonances. The Fitbit is a diary if we think of diary as a chronological record of data, which it can be” (348). The diary, as with the Apple Watch or Fitbit, is simply just a record of the self moving through time.Thus I submitted myself to the task of turning as much of myself into digital data as was possible to do so. Every walk, swim, meditation, burst of productivity, lapse in productivity, and beat of my heart became quantified, as Cardell might say, diarised. There is a very simple sort of pleasure in watching the red, green and blue rings spin round as you stand more, move more, run more. There is something soothing in knowing that at any given moment in time, you can press a button and see exactly what your heart is doing; even more soothing is knowing that at any given time, you can open up an app and see what your heart has been doing today, yesterday, this month, this year. It made sense to me that this data was being collected via my timepiece; it was simply the accumulation of my ‘self,’ as viewed through the lens of time.The Apple Watch was just the latest in a series of ways I have tasked technology with the act of quantifying myself; with my iPhone I track my periods with the Clue app. I measure my mental health with apps such as Shine, and my daily habits with Habitica. I have tried journaling apps such as Reflectly and Day One. While I have never actively tracked my food intake, or weight, or sex life, I know if I wanted to I could do this, too. And long before the Apple Watch, and long before my iPhone, too, I measured myself. In the late 2000s, I kept an online blog. Rebecca Blood notes that the development of blogging technology allowed blogging to become about “whatever came to mind. Walking to work. Last night’s party. Lunch” (54). Browning expands on this, noting that bloggingemerged as a mode of publication in the late ’90s, expressly smudging the boundaries of public and private. A diaristic mode, the blog nonetheless addresses (a) potential reader(s), often with great intimacy — and in its transition to print, as a boundary-shifting form with ill-defined goals regarding its readership. (49)(It is worth noting here that while of course many different forms of blogging exist and have always existed, this essay is only concerned with the diaristic blog that Blood and Browning speak of – arguably the most popular, and at least the most well known, form of blog.)My blog was also ostensibly about my own life, but really it was a work of autofiction, in the same way that my Apple Watch data, when shared, became a work of autofiction – which is to say that I became the central character, the author-character, whose narrative I was shaping with each post, using time as the setting. Jenny Davis writes:if self-quantifiers are seeking self-knowledge through numbers, then narratives and subjective interpretations are the mechanisms by which data morphs into selves. Self-quantifiers don’t just use data to learn about themselves, but rather, use data to construct the stories that they tell themselves about themselves.Over time, I became addicted to the blogging platform’s inbuilt metrics. I would watch with interest as certain posts performed better than others, and eventually the inevitable happened: I began – mostly unconsciously – to try and mould the content of my blogs to achieve certain outcomes – similar to the way that now, in 2019, it is hard to say whether I use an app to assist myself to meditate/journal/learn/etc, or whether I meditate/journal/learn/etc in order to record myself having done so.David Sedaris notes how the collection of data subconsciously, automatically leads to its manipulation in his essay collection, Calypso:for reasons I cannot determine my Fitbit died. I was devastated when I tapped the broadest part of it and the little dots failed to appear. Then I felt a great sense of freedom. It seemed that my life was now my own again. But was it? Walking twenty-five miles, or even running up the stairs and back, suddenly seemed pointless, since, without the steps being counted and registered, what use were they? (Sedaris, 49)In this way, the data we collect on and produce about ourselves, be it fitness metrics, blog posts, Instagram stories or works of literature or art, allows us to control and shape our own narrative, and so we do, creating what Kylie Cardell describes as “an autobiographical representation of self that is coherent and linear, “excavated” from a mass of personal data” (502).Of course, as foregrounded earlier, it is important to highlight the way ideas of privacy and audience shift in accordance with the type of media being consumed or created. Within different media, different author-characters emerge, and the author is required to participate in ‘presencing’ in different ways. For instance, data that exists only for the user does not require the user, or author, to participate in the act of ‘presencing’ at all – an example of this might be the Clue app, which records menstruation history. This information is only of interest to myself, and is not published or shared anywhere, with anyone. However even data intended for a limited audience still requires participation in ‘presencing’. While I only ‘share’ my Apple Watch’s activity with a few people, even just the act of sharing this activity influences the activity itself, creating an affect in which the fact of the content’s consumption shapes the creation of the content itself. Through consumption of Apple Watch data alone, a narrative can be built in which I am lazy, or dedicated, an early riser or a late sleeper, the kind of person who prefers setting their own goals, or the kind of person who enjoys group activities – and knowing that this narrative is being built requires me to act, consciously, in the experience of building it, which leads to the creation of something unreal or fictional interspersed with factual data. (All of which is to admit that sometimes I go on a run not because I want to go on a run, but because I want to be the sort of person who has gone on a run, and be seen as such: in this way I am ‘presencing’.)Similarly, the ephemeral versus permanent nature of data shared through media like Snapchat or Instagram dictates its status as a work of autofiction. When a piece of data – for instance, a photograph on Instagram – is published permanently, it contributes to an evolving autofictional narrative. The ‘Instagrammed’ self is both real and unreal, both fictional and non-fictional. The consumer of this data can explore an author’s social media feed dating back years and consume this data in exactly the way the author intends. However, the ‘stories’ function on Instagram, for instance, allows the consumption of this data to change again. Content is published for a limited amount of time—usually 24 hours—then disappears, and is able to be shared with either the author’s entire group of followers, or a select audience, allowing an author more creative freedom to choose how their data is consumed.Anxiety and AutofictionWhy do I feel the need to record all this data about myself? Obviously, this information is, to an extent, useful. If you are a person who menstruates, knowing exactly when your last period was, how long it lasted and how heavy it was is useful information to have, medically and logistically. If you run regularly, tracking your runs can be helpful in improving your time or routine. Similarly, recording the self in this way can be useful in keeping track of your moods, your habits, and your relationships.Of course, as previously noted, humans have always recorded ourselves. Cardell notes that “although the forms, conditions, and technology for diary keeping have changed, a motivation for recording, documenting, and accounting for the experience of the self over time has endured” (349). Still, it is hard to ignore the fact that ultimately, we seem to be entering some sort of age of digital information hoarding, and harder still to ignore the sneaking suspicion that this all seems to speak to a growing anxiety – and specifically, an anxiety of the self.Gayle Greene writes that “all writers are concerned with memory, since all writing is a remembrance of things past; all writers draw on the past, mine it as a quarry. Memory is especially important to anyone who cares about change, for forgetting dooms us to repetition” (291). If all writers are concerned with memory, as Greene posits, then perhaps we can draw the conclusion that autofiction writers are concerned with an anxiety of forgetting, or of being forgotten. We are self-conscious as authors of autofictional media; concerned with how our work is and will continue to be perceived – and whether it is perceived at all. Marjorie Worthington believes that that the rise in self-conscious fiction has resulted in an anxiety of obsolescence; that this anxiety in autofiction occurs “when a cultural trope (such as 'the author' is deemed to be in danger of becoming obsolete (or 'dying')” (27). However, it is worth considering the opposite – that an anxiety of obsolescence has resulted in a rise of self-conscious fiction, or autofiction.This fear of obsolescence is pervasive in new digital media – Instagram stories and Snapchats, which once disappeared forever into a digital void, are now able to be saved and stored. The fifteen minutes of fame has morphed into fifteen seconds: in this way, time works both for and against the anxious author of digital autofiction. Technologies evolve quicker than we can keep up, with popular platforms becoming obsolete at a rapid pace. This results in what Kylie Cardell sees as an “anxiety around the traces of lives accumulating online and the consequences of 'accidental autobiography,' as well as the desire to have a 'tidy,' representable, and 'storied' life” (503).This same desire can be seen at the root of autofiction. The media theorist José van Dijck notes thatwith the advent of photography, and later film and television, writing tacitly transformed into an interior means of consciousness and remembrance, whereupon electronic forms of media received the artificiality label…writing gained status as a more authentic container of past recollection. (15)Autofiction, however, disrupts this tacit transformation. It is a co-mingling of a desire to record the self, as well as a desire to control one’s own narrative. The drive to represent oneself in a specific way, with consideration to one’s audience and self-brand, has become the root of social media, but is so pervasive now that it is often an unexamined, subconscious one. In autofiction, this drive is not subconscious, it is self-conscious.ConclusionAs technology has developed, new ways to record, present and evaluate the self have emerged. While an impulse to self-monitor has always existed within society, with the rise of ‘presencing’ through social media this impulse has been made public. In this way, we can see presencing, or the public practice of self-performing through media, as an inherently autofictional practice. We can understand that the act of presencing stems from a place of anxiety and self-consciousness, and understand that is in fact impossible to create autofiction without self-consciousness. As we begin to understand that all digital media is becoming inherently autofictional in nature, we’re increasingly required to force to draw our own conclusions about the media we consume—just like the author-character of 10:04 is forced to draw his own conclusions about the passing of time, as represented by Big Ben, when interacting with Marclay’s The Clock. By analysing and comparing the ways in which the emerging digital landscape and autofiction both share a common goal of recording and preserving an interpretation of the ‘self’, we can then understand a deeper understanding of the purpose that autofiction serves. ReferencesBishop, Stephanie. “The Same but Different: 10:04 by Ben Lerner.” Sydney Review of Books 6 Feb. 2015. <https://sydneyreviewofbooks.com/10-04-ben-lerner/>.Blood, Rebecca. "How Blogging Software Reshapes the Online Community." Communications of the ACM 47.12 (2004): 53-55.Browning, Barbara. "The Performative Novel." TDR: The Drama Review 62.2 (2018): 43-58. Davis, Jenny. “The Qualified Self.” Cyborgology 13 Mar. 2013. <http://thesocietypages.org/cyborgology/2013/03/13/the-qualified-self/>.Cardell, Kylie. “The Future of Autobiography Studies: The Diary.” a/b: Auto/Biography Studies 32.2 (2017): 347-350.Cardell, Kylie. “Modern Memory-Making: Marie Kondo, Online Journaling, and the Excavation, Curation, and Control of Personal Digital Data.” a/b: Auto/Biography Studies 32.3 (2017): 499-517.Couldry, Nick. Media, Society, World: Social Theory and Digital Media Practice. Great Britain: Polity Press, 2012.Greene, Gayle. “Feminist Fiction and the Uses of Memory.” Signs 16.2 (1991): 290-321.Lerner, Ben. 10:04. London: Faber and Faber, 2014.Lerner, Ben. “The Golden Vanity.” The New Yorker 11 June 2012. <https://www.newyorker.com/magazine/2012/06/18/the-golden-vanity>.Lupton, Deborah. “You Are Your Data: Self-Tracking Practices and Concepts of Data.” Lifelogging. Ed. Stefan Selke. Wiesbaden: Springer, 2016. 61-79.Schmitt, Arnaud. “David Shields's Lyrical Essay: The Dream of a Genre-Free Memoir, or beyond the Paradox.” a/b: Auto/Biography Studies 31.1 (2016): 133-146.Sedaris, David. Calypso. United States: Little Brown, 2018.Thompson, John B. The Media and Modernity: A Social Theory of the Media. California: Stanford University Press, 1995.Van Dijck, José. Mediated Memories in the Digital Age. Stanford: Stanford UP, 2007.Worthington, Marjorie. The Story of "Me": Contemporary American Autofiction. Nebraska: University of Nebraska Press, 2018.
APA, Harvard, Vancouver, ISO, and other styles
40

Al Khoufi, Emad. "Adu, K.K. and Adjei, E. (2018). The phenomenon of data loss and cyber security issues in Ghana. Foresight, 20(2), 150–61. Ahmed, M.T.U., Bhuiya, N.I. and Rahman, M.M. (2017). A secure enterprise architecture focused on security and technology-transformation (SEAST), The 12th International Conference for Internet Technology and Secured Transactions, (ICITST-2017), Cambridge, UK, 11–4/12/2017. Alanazi, S.T., Anbar, M., Ebad, S.A., Karuppayah, S. and Al-Ani, H.A. (2020). Theory-based model and prediction analysis of information security compliance behavior in the Saudi healthcare sector. Symmetry, 12(9), 1544. DOI: 10.3390/sym12091544 Alateyah, S.A., Crowder, R.M. and Wills, G.B. (2013). Identified factors affecting the citizen’s intention to adopt e-government in Saudi Arabia. World Academy of Science, Engineering and Technology, 7(8), 904–12. Antonino, P., Duszynski, S., Jung, C. and Rudolph, M. (2010). Indicator-based architecture-level security evaluation in a service-oriented environment. In: The Fourth European Conference on Software Architecture: Copenhagen, Denmark, 23–26/08/2010. DOI: 10.1145/1842752.1842795. Chaturvedi, M., Gupta, M. and Bhattacharya, J. (2008). Cyber Security Infrastructure in India: A Study, Emerging Technologies in E-Government. Available at: http://www.csi-sigegov.org/emerging_pdf/9_70-84.pdf (Accessed on 15/11/2020). Dalol, M.H. (2018). Effectiveness of Accounting Information Systems in Light of Development of IT Infrastructure and Information Security. Master’s Dissertation, The Islamic University of Gaza, Gaza, Palestine. Dooley, K. (2001). Designing Large Scale LANs: Help for Network Designers. USA: O'Reilly Media. Ebad, S. (2018a) An exploratory study of ICT projects failure in emerging markets. Journal of Global Information Technology Management, 21(2), 139–60. DOI: 10.1080/1097198X.2018.1462071. Ebad, S. (2018b). The influencing causes of software unavailability: A case study from industry. Software Practice and Experience, 48(5), 1056–76. DOI: 10.1002/spe.2569. Hashizume, K., Rosado, D.G., Fernández-Medina, E. and Fernandez, E.B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(5), n/a. DOI: 10.1186/1869-0238-4-5. Kirby, L. (2015). Beyond Cyber Security: Protecting Your IT Infrastructure. Available at https://uptimeinstitute.com/images/Documents/ProtectingYourITInfrastructure.pdf (accessed on 15/11/2020). Lethbridge, T.C., Sim, S.E. and Singer, J. (2005). Studying software engineers: Data collection techniques for software field studies. Empirical Software Engineering, 10(3), 311–41. Marrone, M. and Kolbe, L.M. (2011). Impact of IT service management frameworks on the IT organization. Business and Information Systems Engineering, 3(1), 5–18. Mastelic, T. and Brandic, I. (2013). TimeCap: Methodology for comparing IT infrastructures based on time and capacity metrics. In: The IEEE 6th International Conference on Cloud Computing, 131–8, Santa Clara, CA, USA, 28/06–03/07/2013. Mimura, M. and Suga, Y. (2019). Filtering malicious JavaScript code with Doc2Vec on an imbalanced dataset. In: The 14th Asia Joint Conference on Information Security (AsiaJCIS), Kobe, Japan, 24–31/08/2019. Pearlson, K.E., Saunders, C.S. and Galletta, D.F. (2019). Managing and Using Information Systems. 5th edition, USA: Wiley. Popp, K. and Meyer, R. (2011). Profit from Software Ecosystems Models, Ecosystems and Partnerships in the Software Industry. Norderstedt, Germany: Books on Demand. Priem, R. (2020). Distributed ledger technology for securities clearing and settlement: Benefits, risks, and regulatory implications. Financial Innovation, 6(11), n/a. DOI: 10.1186/s40854-019-0169-6. Rabii, L. and Abdelaziz, D. (2015). Comparison of e-readiness composite indicators, The 15th International Conference on Intelligent Systems Design and Applications (ISDA), Marrakech, Morocco, 14–16/12/2015. Sanchez-Nielsen, E., Padron-Ferrer, A. and Marreo-Estevez, F. (2011). A multi-agent system for incident management solutions on IT infrastructures. In: The 14th Conference of the Spanish Association for Artificial Intelligence (CAEPIA 2011), La Laguna, Spain, 07–11/11/2011. Schoenfisch, J, Meilicke, C., Stülpnagel, J.V. and Ortmann, J (2018). Root cause analysis in IT infrastructures using ontologies and abduction in Markov logic networks. Information Systems, 74(2), 103–16. Shang, S. and Seddon, P.B. (2000). A comprehensive framework for classifying the benefits of ERP systems. In: The 2000 American Conference of Information Systems, Long Beach, California, 10–13/08/2000. Shoffner, M., Owen, P., Mostafa, J., Lamm, B., Wang, X., Schmitt, C.P. and Ahalt S.C. (2013). The secure medical research workspace: An IT infrastructure to enable secure research on clinical data. Clinical and Translational Science, 6 (3), 222–5. Shrivastava, A.K. (2015). The impact assessment of IT Infrastructure on information security: a survey report. In: International Conference on Information Security and Privacy (ICISP2015), Nagpur, India, 11–12/12/2015. Sommerville, I. (2015). Software Engineering. 10th edition, UK: Pearson. Sousa, K.J. and Oz, E. (2015). Management Information Systems. 7th edition, USA: Cengage Learning. Teymourlouei, H., and Harris, V. (2019). Effective methods to monitor IT infrastructure security for small business. In: The 2019 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 5–7/12/2019. Topper, J. (2018). Compliance is not security. Computer Fraud and Security, 2018(3), 5–8. DOI: 10.1016/S1361-3723(18)30022-8. Wohlin, C., Runeson, P., Host, M., Ohlsson, M.C., Regnell, B. and Wesslen, A. (2012). Experimentation in Software Engineering. Germany: Springer. Yasasin, E., Prester, J., Wagner, G. and Schryen, G. (2020). Forecasting IT security vulnerabilities –an empirical analysis. Computers and Security, 88(n/a), n/a. DOI: 10.1016/j.cose.2019.101610. Zambon, E., Etalle, S., Wieringa, R.J. and Hartel, P. (2010). Model-based qualitative risk assessment for availability of IT infrastructures. Software and Systems Modeling, 10(4), 553–80." Basic and Applied Sciences - Scientific Journal of King Faisal University 22, no. 1 (2021). http://dx.doi.org/10.37575/b/med/0038.

Full text
Abstract:
Few epidemiological studies have discussed the gender-specific prevalence of ischemic heart disease (IHD). We aimed to investigate the gender-specific prevalence of IHD among Saudi patients visiting the emergency department and if it is affected by diabetes mellitus and/or hypertension. Three hundred patients were recruited from Prince Sultan Cardiac Center in Al Ahsa, KSA. Hypertension was identified as systolic pressure equal to or more than 140 mmHg and/or diastolic pressure equal to or more than 90 mmHg or by the patient currently being on antihypertensive medication, and coronary artery disease (CAD) was diagnosed by electrocardiogram, cardiac markers, cardiac exercise testing or coronary angiography. Hypertension was found in 80% of males and 72% of females. A significantly higher rate of diabetes was noted in females (62%) compared to males (48%) (p<0.012). Co-existing diabetes and hypertension was found in 70% of females as compared to 38% of males. The occurrence of IHD in males was significantly higher than that in females (p<0.001). However, the incidence of myocardial infarction was greater in females (52%) compared to males (38%) (p<0.035). Co-existing hypertension and diabetes may affect the gender prevalence of myocardial infarction among emergency department patients, with more infarctions being noted among females. This finding helps to guide the treatment strategy for both genders.
APA, Harvard, Vancouver, ISO, and other styles
41

Campanioni, Chris. "How Bizarre: The Glitch of the Nineties as a Fantasy of New Authorship." M/C Journal 21, no. 5 (December 6, 2018). http://dx.doi.org/10.5204/mcj.1463.

Full text
Abstract:
As the ball dropped on 1999, is it any wonder that No Doubt played, “It’s the End of the World as We Know It” by R.E.M. live on MTV? Any discussion of the Nineties—and its pinnacle moment, Y2K—requires a discussion of both the cover and the glitch, two performative and technological enactments that fomented the collapse between author-reader and user-machine that has, twenty years later, become normalised in today’s Post Internet culture. By staging failure and inviting the audience to participate, the glitch and the cover call into question the original and the origin story. This breakdown of normative borders has prompted the convergence of previously demarcated media, genres, and cultures, a constellation from which to recognise a stochastic hybrid form. The Cover as a Revelation of Collaborative MurmurBefore Sean Parker collaborated with Shawn Fanning to launch Napster on 1 June 1999, networked file distribution existed as cumbersome text-based programs like Internet Relay Chat and Usenet, servers which resembled bulletin boards comprising multiple categories of digitally ripped files. Napster’s simple interface, its advanced search filters, and its focus on music and audio files fostered a peer-to-peer network that became the fastest growing website in history, registering 80 million users in less than two years.In harnessing the transgressive power of the Internet to force a new mode of content sharing, Napster forced traditional providers to rethink what constitutes “content” at a moment which prefigures our current phenomena of “produsage” (Bruns) and the vast popularity of user-generated content. At stake is not just the democratisation of art but troubling the very idea of intellectual property, which is to say, the very concept of ownership.Long before the Internet was re-routed from military servers and then mainstreamed, Michel Foucault understood the efficacy of anonymous interactions on the level of literature, imagining a culture where discourse would circulate without any need for an author. But what he was asking in 1969 is something we can better answer today, because it seems less germane to call into question the need for an author in a culture in which everyone is writing, producing, and reproducing text, and more effective to think about re-evaluating the notion of a single author, or what it means to write by yourself. One would have to testify to the particular medium we have at our disposal, the Internet’s ultimate permissibility, its provocations for collaboration and co-creation. One would have to surrender the idea that authors own anything besides our will to keep producing, and our desire for change; and to modulate means to resist without negating, to alter without omitting, to enable something new to come forward; the unfolding of the text into the anonymity of a murmur.We should remind ourselves that “to author” all the way down to its Latin roots signifies advising, witnessing, and transferring. We should be reminded that to author something means to forget the act of saying “I,” to forget it or to make it recede in the background in service of the other or others, on behalf of a community. The de-centralisation of Web development and programming initiated by Napster inform a poetics of relation, an always-open structure in which, as Édouard Glissant said, “the creator of a text is effaced, or rather, is done away with, to be revealed in the texture of his creation” (25). When a solid melts, it reveals something always underneath, something at the bottom, something inside—something new and something that was always already there. A cover, too, is both a revival and a reworking, an update and an interpretation, a retrospective tribute and a re-version that looks toward the future. In performing the new, the original as singular is called into question, replaced by an increasingly fetishised copy made up of and made by multiples.Authorial Effacement and the Exigency of the ErrorY2K, otherwise known as the Millennium Bug, was a coding problem, an abbreviation made to save memory space which would disrupt computers during the transition from 1999 to 2000, when it was feared that the new year would become literally unrecognisable. After an estimated $300 billion in upgraded hardware and software was spent to make computers Y2K-compliant, something more extraordinary than global network collapse occurred as midnight struck: nothing.But what if the machine admits the possibility of accident? Implicit in the admission of any accident is the disclosure of a new condition—something to be heard, to happen, from the Greek ad-cadere, which means to fall. In this drop into non-repetition, the glitch actualises an idea about authorship that necessitates multi-user collaboration; the curtain falls only to reveal the hidden face of technology, which becomes, ultimately, instructions for its re-programming. And even as it deviates, the new form is liable to become mainstreamed into a new fashion. “Glitch’s inherently critical moment(um)” (Menkman 8) indicates this potential for technological self-insurgence, while suggesting the broader cultural collapse of generic markers and hierarchies, and its ensuing flow into authorial fluidity.This feeling of shock, this move “towards the ruins of destructed meaning” (Menkman 29) inherent in any encounter with the glitch, forecasted not the immediate horror of Y2K, but the delayed disasters of 9/11, Hurricane Katrina, Deepwater Horizon Oil Spill, Indian Ocean tsunami, Sichuan Province earthquake, global financial crisis, and two international wars that would all follow within the next nine years. If, as Menkman asserts, the glitch, in representing a loss of self-control “captures the machine revealing itself” (30), what also surfaces is the tipping point that edges us toward a new becoming—not only the inevitability of surrender between machine and user, but their reversibility. Just as crowds stood, transfixed before midnight of the new millennium in anticipation of the error, or its exigency, it’s always the glitch I wait for; it’s always the glitch I aim to re-create, as if on command. The accidental revelation, or the machine breaking through to show us its insides. Like the P2P network that Napster introduced to culture, every glitch produces feedback, a category of noise (Shannon) influencing the machine’s future behaviour whereby potential users might return the transmission.Re-Orienting the Bizarre in Fantasy and FictionIt is in the fantasy of dreams, and their residual leakage into everyday life, evidenced so often in David Lynch’s Twin Peaks, where we can locate a similar authorial agency. The cult Nineties psycho-noir, and its discontinuous return twenty-six years later, provoke us into reconsidering the science of sleep as the art of fiction, assembling an alternative, interactive discourse from found material.The turning in and turning into in dreams is often described as an encounter with the “bizarre,” a word which indicates our lack of understanding about the peculiar processes that normally happen inside our heads. Dreams are inherently and primarily bizarre, Allan J. Hobson argues, because during REM sleep, our noradrenergic and serotonergic systems do not modulate the activated brain, as they do in waking. “The cerebral cortex and hippocampus cannot function in their usual oriented and linear logical way,” Hobson writes, “but instead create odd and remote associations” (71). But is it, in fact, that our dreams are “bizarre” or is it that the model itself is faulty—a precept premised on the normative, its dependency upon generalisation and reducibility—what is bizarre if not the ordinary modulations that occur in everyday life?Recall Foucault’s interest not in what a dream means but what a dream does. How it rematerialises in the waking world and its basis in and effect on imagination. Recall recollection itself, or Erin J. Wamsley’s “Dreaming and Offline Memory Consolidation.” “A ‘function’ for dreaming,” Wamsley writes, “hinges on the difficult question of whether conscious experience in general serves any function” (433). And to think about the dream as a specific mode of experience related to a specific theory of knowledge is to think about a specific form of revelation. It is this revelation, this becoming or coming-to-be, that makes the connection to crowd-sourced content production explicit—dreams serve as an audition or dress rehearsal in which new learning experiences with others are incorporated into the unconscious so that they might be used for production in the waking world. Bert O. States elaborates, linking the function of the dream with the function of the fiction writer “who makes models of the world that carry the imprint and structure of our various concerns. And it does this by using real people, or ‘scraps’ of other people, as the instruments of hypothetical facts” (28). Four out of ten characters in a dream are strangers, according to Calvin Hall, who is himself a stranger, someone I’ve never met in waking life or in a dream. But now that I’ve read him, now that I’ve written him into this work, he seems closer to me. Twin Peak’s serial lesson for viewers is this—even the people who seem strangers to us can interact with and intervene in our processes of production.These are the moments that a beginning takes place. And even if nothing directly follows, this transfer constitutes the hypothesised moment of production, an always-already perhaps, the what-if stimulus of charged possibility; the soil plot, or plot line, for freedom. Twin Peaks is a town in which the bizarre penetrates the everyday so often that eventually, the bizarre is no longer bizarre, but just another encounter with the ordinary. Dream sequences are common, but even more common—and more significant—are the moments in which what might otherwise be a dream vision ruptures into real life; these moments propel the narrative.Exhibit A: A man who hasn’t gone outside in a while begins to crumble, falling to the earth when forced to chase after a young girl, who’s just stolen the secret journal of another young girl, which he, in turn, had stolen.B: A horse appears in the middle of the living room after a routine vacuum cleaning and a subtle barely-there transition, a fade-out into a fade-in, what people call a dissolve. No one notices, or thinks to point out its presence. Or maybe they’re distracted. Or maybe they’ve already forgotten. Dissolve.(I keep hitting “Save As.” As if renaming something can also transform it.)C: All the guests at the Great Northern Hotel begin to dance the tango on cue—a musical, without any music.D: After an accident, a middle-aged woman with an eye patch—she was wearing the eye patch before the accident—believes she’s seventeen again. She enrolls in Twin Peaks High School and joins the cheerleading team.E: A woman pretending to be a Japanese businessman ambles into the town bar to meet her estranged husband, who fails to recognise his cross-dressing, race-swapping wife.F: A girl with blond hair is murdered, only to come back as another girl, with the same face and a different name. And brown hair. They’re cousins.G: After taking over her dead best friend’s Meals on Wheels route, Donna Hayward walks in to meet a boy wearing a tuxedo, sitting on the couch with his fingers clasped: a magician-in-training. “Sometimes things can happen just like this,” he says with a snap while the camera cuts to his grandmother, bed-ridden, and the appearance of a plate of creamed corn that vanishes as soon as she announces its name.H: A woman named Margaret talks to and through a log. The log, cradled in her arms wherever she goes, becomes a key witness.I: After a seven-minute diegetic dream sequence, which includes a one-armed man, a dwarf, a waltz, a dead girl, a dialogue played backward, and a significantly aged representation of the dreamer, Agent Cooper wakes up and drastically shifts his investigation of a mysterious small-town murder. The dream gives him agency; it turns him from a detective staring at a dead-end to one with a map of clues. The next day, it makes him a storyteller; all the others, sitting tableside in the middle of the woods become a captive audience. They become readers. They read into his dream to create their own scenarios. Exhibit I. The cycle of imagination spins on.Images re-direct and obfuscate meaning, a process of over-determination which Foucault says results in “a multiplication of meanings which override and contradict each other” (DAE 34). In the absence of image, the process of imagination prevails. In the absence of story, real drama in our conscious life, we form complex narratives in our sleep—our imaginative unconscious. Sometimes they leak out, become stories in our waking life, if we think to compose them.“A bargain has been struck,” says Harold, an under-5 bit player, later, in an episode called “Laura’s Secret Diary.” So that she might have the chance to read Laura Palmer’s diary, Donna Hayward agrees to talk about her own life, giving Harold the opportunity to write it down in his notebook: his “living novel” the new chapter which reads, after uncapping his pen and smiling, “Donna Hayward.”He flips to the front page and sets a book weight to keep the page in place. He looks over at Donna sheepishly. “Begin.”Donna begins talking about where she was born, the particulars of her father—the lone town doctor—before she interrupts the script and asks her interviewer about his origin story. Not used to people asking him the questions, Harold’s mouth drops and he stops writing. He puts his free hand to his chest and clears his throat. (The ambient, wind-chime soundtrack intensifies.) “I grew up in Boston,” he finally volunteers. “Well, actually, I grew up in books.”He turns his head from Donna to the notebook, writing feverishly, as if he’s begun to write his own responses as the camera cuts back to his subject, Donna, crossing her legs with both hands cupped at her exposed knee, leaning in to tell him: “There’s things you can’t get in books.”“There’s things you can’t get anywhere,” he returns, pen still in his hand. “When we dream, they can be found in other people.”What is a call to composition if not a call for a response? It is always the audience which makes a work of art, re-framed in our own image, the same way we re-orient ourselves in a dream to negotiate its “inconsistencies.” Bizarreness is merely a consequence of linguistic limitations, the overwhelming sensory dream experience which can only be re-framed via a visual representation. And so the relationship between the experience of reading and dreaming is made explicit when we consider the associations internalised in the reader/audience when ingesting a passage of words on a page or on the stage, objects that become mental images and concept pictures, a lens of perception that we may liken to another art form: the film, with its jump-cuts and dissolves, so much like the defamiliarising and dislocating experience of dreaming, especially for the dreamer who wakes. What else to do in that moment but write about it?Evidence of the bizarre in dreams is only the evidence of the capacity of our human consciousness at work in the unconscious; the moment in which imagination and memory come together to create another reality, a spectrum of reality that doesn’t posit a binary between waking and sleeping, a spectrum of reality that revels in the moments where the two coalesce, merge, cross-pollinate—and what action glides forward in its wake? Sustained un-hesitation and the wish to stay inside one’s self. To be conscious of the world outside the dream means the end of one. To see one’s face in the act of dreaming would require the same act of obliteration. Recognition of the other, and of the self, prevents the process from being fulfilled. Creative production and dreaming, like voyeurism, depend on this same lack of recognition, or the recognition of yourself as other. What else is a dream if not a moment of becoming, of substituting or sublimating yourself for someone else?We are asked to relate a recent dream or we volunteer an account, to a friend or lover. We use the word “seem” in nearly every description, when we add it up or how we fail to. Everything seems to be a certain way. It’s not a place but a feeling. James, another character on Twin Peaks, says the same thing, after someone asks him, “Where do you want to go?” but before he hops on his motorcycle and rides off into the unknowable future outside the frame. Everything seems like something else, based on our own associations, our own knowledge of people and things. Offline memory consolidation. Seeming and semblance. An uncertainty of appearing—both happening and seeing. How we mediate—and re-materialise—the dream through text is our attempt to re-capture imagination, to leave off the image and better become it. If, as Foucault says, the dream is always a dream of death, its purpose is a call to creation.Outside of dreams, something bizarre occurs. We call it novelty or news. We might even bestow it with fame. A man gets on the wrong plane and ends up halfway across the world. A movie is made into the moment of his misfortune. Years later, in real life and in movie time, an Iranian refugee can’t even get on the plane; he is turned away by UK immigration officials at Charles de Gaulle, so he spends the next sixteen years living in the airport lounge; when he departs in real life, the movie (The Terminal, 2004) arrives in theaters. Did it take sixteen years to film the terminal exile? How bizarre, how bizarre. OMC’s eponymous refrain of the 1996 one-hit wonder, which is another way of saying, an anomaly.When all things are counted and countable in today’s algorithmic-rich culture, deviance becomes less of a statistical glitch and more of a testament to human peculiarity; the repressed idiosyncrasies of man before machine but especially the fallible tendencies of mankind within machines—the non-repetition of chance that the Nineties emblematised in the form of its final act. The point is to imagine what comes next; to remember waiting together for the end of the world. There is no need to even open your eyes to see it. It is just a feeling. ReferencesBruns, Axel. “Towards Produsage: Futures for User-Led Content Production.” Cultural Attitudes towards Technology and Communication 2006: Proceedings of the Fifth International Conference, eds. Fay Sudweeks, Herbert Hrachovec, and Charles Ess. Murdoch: School of Information Technology, 2006. 275-84. <https://eprints.qut.edu.au/4863/1/4863_1.pdf>.Foucault, Michel. “Dream, Imagination and Existence.” Dream and Existence. Ed. Keith Hoeller. Pittsburgh: Review of Existential Psychology & Psychiatry, 1986. 31-78.———. “What Is an Author?” The Foucault Reader: An Introduction to Foucault’s Thought. Ed. Paul Rainbow. New York: Penguin, 1991.Glissant, Édouard. Poetics of Relation. Trans. Betsy Wing. Ann Arbor: U of Michigan P, 1997.Hall, Calvin S. The Meaning of Dreams. New York: McGraw Hill, 1966.Hobson, J. Allan. The Dream Drugstore: Chemically Altered State of Conscious­ness. Cambridge: MIT Press, 2001.Menkman, Rosa. The Glitch Moment(um). Amsterdam: Network Notebooks, 2011.Shannon, Claude Elwood. “A Mathematical Theory of Communication.” The Bell System Technical Journal 27 (1948): 379-423.States, Bert O. “Bizarreness in Dreams and Other Fictions.” The Dream and the Text: Essays on Literature and Language. Ed. Carol Schreier Rupprecht. Albany: SUNY P, 1993.Twin Peaks. Dir. David Lynch. ABC and Showtime. 1990-3 & 2017. Wamsley, Erin. “Dreaming and Offline Memory Consolidation.” Current Neurology and Neuroscience Reports 14.3 (2014): 433. “Y2K Bug.” Encyclopedia Britannica. 18 July 2018. <https://www.britannica.com/technology/Y2K-bug>.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography