Journal articles on the topic 'Digital pre-distortion, DPD'

To see the other types of publications on this topic, follow the link: Digital pre-distortion, DPD.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 21 journal articles for your research on the topic 'Digital pre-distortion, DPD.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Lee, Kwang-Pyo, Soon-Il Hong, and Eui-Rim Jeong. "A Polynomial Digital Pre-Distortion Technique Based on Iterative Architecture." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 1 (February 1, 2016): 106. http://dx.doi.org/10.11591/ijece.v6i1.9338.

Full text
Abstract:
A digital predistortion (DPD) technique based on an iterative adaptation structure is proposed for linearizing power amplifiers (PAs). To obtain proper DPD parameters, a feedback path that converts the PA’s output to a baseband signal is required, and memory is also needed to store the baseband feedback signals. DPD parameters are usually found by an adaptive algorithm by using the transmitted signals and the corresponding feedback signals. However, for the adaptive algorithm to converge to a reliable solution, long feedback samples are required, which increases hardware complexity and cost. Considering that the convergence time of the adaptive algorithm highly depends on the initial condition, we propose a DPD technique that requires relatively shorter feedback samples. Specifically, the proposed DPD iteratively utilizes the short feedback samples in memory while keeping and using the DPD parameters found at the former iteration as the initial condition at the next iteration. Computer simulation shows that the proposed technique performs better than the conventional technique, as the former requires much shorter feedback memory than the latter.
APA, Harvard, Vancouver, ISO, and other styles
2

Lee, Kwang-Pyo, Soon-Il Hong, and Eui-Rim Jeong. "A Polynomial Digital Pre-Distortion Technique Based on Iterative Architecture." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 1 (February 1, 2016): 106. http://dx.doi.org/10.11591/ijece.v6i1.pp106-112.

Full text
Abstract:
A digital predistortion (DPD) technique based on an iterative adaptation structure is proposed for linearizing power amplifiers (PAs). To obtain proper DPD parameters, a feedback path that converts the PA’s output to a baseband signal is required, and memory is also needed to store the baseband feedback signals. DPD parameters are usually found by an adaptive algorithm by using the transmitted signals and the corresponding feedback signals. However, for the adaptive algorithm to converge to a reliable solution, long feedback samples are required, which increases hardware complexity and cost. Considering that the convergence time of the adaptive algorithm highly depends on the initial condition, we propose a DPD technique that requires relatively shorter feedback samples. Specifically, the proposed DPD iteratively utilizes the short feedback samples in memory while keeping and using the DPD parameters found at the former iteration as the initial condition at the next iteration. Computer simulation shows that the proposed technique performs better than the conventional technique, as the former requires much shorter feedback memory than the latter.
APA, Harvard, Vancouver, ISO, and other styles
3

Majdinasab, Elham, and Abumoslem Jannesari. "Joint digital pre-distortion model based on Chebyshev expansion." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 4 (August 1, 2022): 3781. http://dx.doi.org/10.11591/ijece.v12i4.pp3781-3791.

Full text
Abstract:
<span>In this paper, a new low complexity model is proposed for the joint digital pre-distortion of in-phase/quadrature-phase (I/Q) imbalance, local oscillator (LO) leakage, and power amplifier nonlinearity in direct-conversion transmitters (DCTs). In this structure, we proposed a set of orthogonal basis functions based on Chebyshev expansion to attenuate the problem of numerical instability created during the conventional model identification method. This robust joint digital pre-distortion (DPD) utilized the indirect learning architecture and updated the coefficients vector based on the recursive least square (RLS) algorithm. To verify the operation and efficiency of the proposed model, an extensive simulation in MATLAB was carried out. The results showed a significant reduction in the conditional number and the coefficient dispersion of the observation matrix. Furthermore, the power of the signal in the adjacent channel decreased by more than 16 dB for the orthogonal frequency division multiplexing (OFDM), 16 QAM input signal. In comparison to the previous digital pre-distorter models, the proposed DPD builds strong numerical stability with the least coefficients.</span>
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Boyuan, and Wei Wu. "Principles, applications, and challenges of digital predistortion technology." Applied and Computational Engineering 54, no. 1 (March 29, 2024): 64–75. http://dx.doi.org/10.54254/2755-2721/54/20241262.

Full text
Abstract:
A power amplifier plays a crucial role in the transmitter end of wireless communication systems. Despite enhancing operational efficiency, it inadvertently introduces nonlinear distortion, leading to signal degradation and spectral regrowth. This occurrence necessitates the incorporation of additional linearization techniques in transmitter terminals to optimize both efficiency and linearity concurrently. Among these, Digital Pre-Distortion (DPD) technology stands out as a well-researched and extensively employed strategy for alleviating the nonlinear distortion induced by power amplifiers. This paper embarks on a comprehensive exploration of DPD technology, offering insight into its evolutionary path and elaborating on its foundational principles and essential techniques. The discussion extends to elucidate the significant technical challenges and the burgeoning trends within the DPD technology landscape. The narrative underscores the significance of DPD in enhancing the performance and efficiency of wireless communication systems, particularly in the context of burgeoning technological advancements and escalating demands for superior communication quality and broader bandwidth. Through a meticulous examination of the DPD technology paradigm, this paper contributes to the ongoing discourse and research, shedding light on prospective developmental avenues and potential enhancements that could further augment the efficacy and reliability of DPD technology in contemporary communication systems.
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Qingyue, Zhugang Wang, Gert Frølund Pedersen, and Ming Shen. "Joint Satellite-Transmitter and Ground-Receiver Digital Pre-Distortion for Active Phased Arrays in LEO Satellite Communications." Remote Sensing 14, no. 17 (September 1, 2022): 4319. http://dx.doi.org/10.3390/rs14174319.

Full text
Abstract:
A novel joint satellite-transmitter and ground-receiver (JSG) digital pre-distortion (DPD) (JSG-DPD) technique is proposed to improve the linearity and power efficiency of the space-borne active phased arrays (APAs) in low Earth orbit (LEO) satellite communications. Different from the conventional DPD technique that requires a complex RF feedback loop, the DPD coefficients based on a generalized memory polynomial (GMP) model are extracted at the ground-receiver and then transmitted to the digital baseband front-end of the LEO satellite-transmitter via a satellite–ground bi-directional transmission link. The issue of the additive white Gaussian noise (AWGN) of the satellite–ground channel affecting the extraction of DPD coefficients is tackled using a superimposing training sequences (STS) method. The proposed technique has been experimentally verified using a 28 GHz phased array. The performance improvements in terms of error vector amplitude (EVM) and adjacent channel power ratio (ACPR) are 7.5% and 3.6 dB, respectively. Requiring limited space-borne resources, this technique offers a promising solution to achieve APA DPD for LEO satellite communications.
APA, Harvard, Vancouver, ISO, and other styles
6

Sharma, Vipin, Rajeev Kumar Arya, and Sandeep Kumar. "Power Amplifier Optimization for M2M Node using DPD and Hybrid DFT-s-OFDM with CFR." Engineering, Technology & Applied Science Research 13, no. 6 (December 5, 2023): 12080–85. http://dx.doi.org/10.48084/etasr.6220.

Full text
Abstract:
Power Amplifiers (PAs) play a vital role in mobile communication. However, their inherent nonlinearity can lead to issues such as unwanted radiation, interference with neighboring channels, and distortion within the desired frequency range. To address these problems, PAs are typically operated at a lower power level than their saturation point, sacrificing power efficiency to improve Error Vector Magnitude (EVM) performance. Consequently, more than 70-80% of the DC power is wasted as heat. This inefficiency necessitates the exploration of techniques to enhance PA efficiency while maintaining acceptable linearity and performance. Digital Pre-Distortion (DPD) is a useful technique to linearize PAs. DPD allows affordable nonlinear PAs to function with minimal distortion in their nonlinear operating regions. This results in amplified signals with increased power output and improved power efficiency. Using nonlinear functions, the output signal of the PA can be linearized, mitigate distortions, and be effectively optimized. When using various operating channels and varying time, temperature, and PA nonlinearity, the DPD must adjust. In order to increase the power efficiency of 5G systems, DPD-enabled systems are inculcating with adaptive DFT-s-OFDM employed 5G physical layer along with the Crest Factor Reduction (CFR) algorithm.
APA, Harvard, Vancouver, ISO, and other styles
7

Alizadeh, Mahmoud, Peter Händel, and Daniel Rönnow. "Behavioral modeling and digital pre-distortion techniques for RF PAs in a 3 × 3 MIMO system." International Journal of Microwave and Wireless Technologies 11, no. 10 (June 20, 2019): 989–99. http://dx.doi.org/10.1017/s1759078719000862.

Full text
Abstract:
AbstractModern telecommunications are moving towards (massive) multi-input multi-output (MIMO) systems in 5th generation (5G) technology, increasing the dimensionality of the systems dramatically. In this paper, the impairments of radio frequency (RF) power amplifiers (PAs) in a 3 × 3 MIMO system are compensated in both the time and the frequency domains. A three-dimensional (3D) time-domain memory polynomial-type model is proposed as an extension of conventional 2D models. Furthermore, a 3D frequency-domain technique is formulated based on the proposed time-domain model to reduce the dimensionality of the model, while preserving the performance in terms of model errors. In the 3D frequency-domain technique, the bandwidth of the system is split into several narrow sub-bands, and the parameters of the model are estimated for each sub-band. This approach requires less computational complexity, and also the procedure of the parameters estimation for each sub-band can be implemented independently. The device-under-test consists of three RF PAs including input and output cross-talk channels. The proposed techniques are evaluated in both behavioral modeling and digital pre-distortion (DPD) perspectives. The experimental results show that the proposed DPD technique can compensate the errors of non-linearity and memory effects in the both time and frequency domains.
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Yunfeng, Yonghui Huang, Martin Hedegaard Nielsen, Feridoon Jalili, Wei Wei, Jian Ren, Yingzeng Yin, Ming Shen, and Gert Frølund Pedersen. "A Cross-Mode Universal Digital Pre-Distortion Technology for Low-Sidelobe Active Antenna Arrays in 5G and Satellite Communications." Electronics 10, no. 16 (August 22, 2021): 2031. http://dx.doi.org/10.3390/electronics10162031.

Full text
Abstract:
A cross-mode universal digital pre-distortion (CMUDPD) technology is proposed here to linearize low-sidelobe active antenna arrays with non-uniform fixed power levels for each branch, which are desired in satellite communications with stringent requirements to minimize interference. In low-sidelobe arrays formed by nonuniform amplitude excitation, conventional digital pre-distortion (DPD) techniques require multiple feedback paths for either one-to-one or average linearization of the PAs, which increases system complexity and is infeasible for large-scale arrays. This is because the power amplifiers (PAs) usually operate in different modes where the supply voltages, bias voltages, and input power levels are different. The proposed CMUDPD method aims at solving this issue by intentionally arranging the PAs to work in different modes but with shared nonlinear characteristics. Based on the nonlinear correlation established among the PAs’ different operating modes, a single feedback path is sufficient to capture the common nonlinearity of all the PAs and determine the parameters of the CMUDPD module. The concept is explained in theory and validated by simulations and experiments using GaN PAs operating with three significantly different output power levels and two orthogonal frequency division multiplexing (OFDM) signal bandwidths.
APA, Harvard, Vancouver, ISO, and other styles
9

Ma, Chuan Hui, Wen Sheng Pan, You Xi Tang, and Chao Jin Qing. "Design of Unsymmetrical Doherty Power Amplifier for 460MHz LTE-Advanced Applications." Applied Mechanics and Materials 347-350 (August 2013): 1768–72. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.1768.

Full text
Abstract:
An unsymmetrical Doherty power amplifier (DPA) at 460MHz is presented in this paper. The carrier and peaking amplifier of the DPA, which base on two equal-sized devices, are matched with different networks to mitigate the performance degradation caused by the limited load modulation. Measured with continuous wave (CW), the unsymmetrical DPA saturates at an output power of 49.2dBm and achieves a drain efficiency of 51% at 6dB back-off. Using a one-carrier long term evolution advanced (LTE-Advanced) signal with 20MHz bandwidth, the unsymmetrical DPA exhibits a drain efficiency of 48.7% at an average output power of 42.1dBm, along with adjacent channel leakage ratio (ACLR) of-34.1dBc and-53.3dBc before and after digital pre-distortion (DPD), respectively.
APA, Harvard, Vancouver, ISO, and other styles
10

Hadi, Muhammad Usman, Jian Song, Sunish Kumar Orappanpara Soman, Ardavan Rahimian, and Adnan Ahmad Cheema. "Experimental Evaluation of Hybrid Fibre–Wireless System for 5G Networks." Telecom 3, no. 2 (April 2, 2022): 218–33. http://dx.doi.org/10.3390/telecom3020014.

Full text
Abstract:
This article describes a novel experimental study considering a multiband fibre–wireless system for constructing the transport network for fifth-generation (5G) networks. This study describes the development and testing of a 5G new radio (NR) multi-input multi-output (MIMO) hybrid fibre–wireless (FiWi) system for enhanced mobile broadband (eMBB) using digital pre-distortion (DPD). Analog radio over fibre (A-RoF) technology was used to create the optical fronthaul (OFH) that includes a 3 GHz supercell in a long-range scenario as well as a femtocell scenario using the 20 GHz band. As a proof of concept, a Mach Zehnder modulator with two independent radio frequency waveforms modifies a 1310 nm optical carrier using a distributed feedback laser across 10 km of conventional standard single-mode fibre. It may be inferred that a hybrid FiWi-based MIMO-enabled 5G NR system based on OFH could be a strong competitor for future mobile haul applications. Moreover, a convolutional neural network (CNN)-based DPD is used to improve the performance of the link. The error vector magnitude (EVM) performance for 5G NR bands is predicted to fulfil the Third Generation Partnership Project’s (3GPP) Release 17 standards.
APA, Harvard, Vancouver, ISO, and other styles
11

Du, Xuekun, Chang Jiang You, Yulong Zhao, Xiang Li, Mohamed Helaoui, Jingye Cai, and Fadhel M. Ghannouchi. "Wideband high-efficiency linearized PA design with reduction in memory effects and IMD3." International Journal of Microwave and Wireless Technologies 10, no. 4 (April 12, 2018): 391–400. http://dx.doi.org/10.1017/s1759078718000417.

Full text
Abstract:
ABSTRACTAn analytical method is proposed to reduce the memory effects and third-order intermodulation distortions for improving the linearity of wideband power amplifier (PA). An excellent linearity can be obtained by reducing the second-harmonic output power levels and reducing the envelope voltage components in the megahertz range. An improved wideband Chebyshev low-pass matching network including the bias network is analyzed and designed to validate the proposed method. The measured results indicate that a wideband high-efficiency linearized PA is realized from 1.35 to 2.45 GHz (fractional bandwidth = 58%) with power added efficiency of 60–78%, power gain of 10.8–12.3 dB, and output power of 40.0–41.2 dBm. For a 20 MHz LTE modulated signal, the adjacent channel leakage ratios (ACLRs) of the proposed PA with digital pre-distortion (DPD) linearization are −55.7 ~ −53.9 dBc across 1.5–2.4 GHz at an average output power of 32.4–33.6 dBm. For a 40 MHz two-carrier LTE modulated signal, the ACLRs of the proposed PA with DPD linearization are −51.1 ~ −48.2 dBc at an average output power of ~30.5 dBm in the frequency range from 1.5 GHz to 2.4 GHz.
APA, Harvard, Vancouver, ISO, and other styles
12

Jordão, Marina, Rafael Caldeirinha, Arnaldo S. R. Oliveira, and Nuno Borges Carvalho. "A Survey on Over-The-Air Linearization Methods for MIMO Systems." Energies 14, no. 8 (April 16, 2021): 2225. http://dx.doi.org/10.3390/en14082225.

Full text
Abstract:
Transmitter antenna arrays are typically coupled to several RF chains, which imposes stringent requirements on the linearization of each power amplifier (PA) present in the system. For this and other reasons discussed in this work, Over-the-air (OTA) linearization methods are considered to linearize transmitter antenna arrays in 5G scenarios. However, several factors need to be considered when applying OTA linearization methods. In this paper, an extended critical review of validated OTA linearization methods is presented. The main goal is to point out and discuss the most prominent methods, in order to determine which one is the most suitable for a specific application. In particular, analysis for each method is performed and, subsequently, their benefits and the disadvantages are systematically discussed. This is sought to fill-in a gap in the scientific literarure and, thus, to help radio-frequency engineers in the implementation of OTA digital pre-distortion (DPD) techniques for multiple input multiple output (MIMO) systems.
APA, Harvard, Vancouver, ISO, and other styles
13

Jake, J., E. Mwangi, and K. Langat. "Spectral Re-Growth Suppression in the FBMC-OQAM Signal Under the Non-linear Behavior of a Power Amplifier." Engineering, Technology & Applied Science Research 9, no. 5 (October 9, 2019): 4801–7. http://dx.doi.org/10.48084/etasr.3097.

Full text
Abstract:
Typically, the filter bank multicarrier with offset quadrature amplitude modulation (FBMC-OQAM) bears some impressive properties that make it popular as one of the substitutes to orthogonal frequency division multiplexing (OFDM) for the upcoming technology of broadband wireless communication systems. Although FBMC-OQAM preserves the multicarrier modulation (MCM) features, its spectrum usually suffers from impairments when subjected to the nonlinear behavior of a power amplifier (PA) which results in spectral re-growth. Due to the spectrum limitation and low energy efficiency foreseen in the forthcoming 5G networks, it is vital to confine the spectrum of the FBMC-OQAM signal within the allocated band of interest. In this paper, the suppression of the spectral re-growth experienced on the FBMC-OQAM signal due to the nonlinear distortion effects introduced by the PA is investigated. The crest factor reduction (CFR) method in combination with an adaptive digital pre-distortion (DPD) are used. The peak windowing technique based on sequential asymmetric superposition windowing (SASW) algorithm is used in the CFR part while the least square estimation with QR-decomposition (LSE/QR) has been used as the coefficient’s estimator and adaptation algorithm in the DPD part. The performance of the two combined techniques has been evaluated on SystemVue2018 simulation platform. The adjacent channel leakage ratio (ACLR) and the error vector magnitude (EVM) have been considered as the performance merits. The simulation results show that the proposed techniques significantly improve the spectrum, first by reducing the PAPR of the FBMC-OQAM signal by about 1.5dB. Secondly, the spectral re-growth has been reduced by about -45.74dB adjacent channel leakage suppression and the error vector magnitude measure has been obtained to be about 7.12%. (-22.95dB). These values lead to better average input power of the FBMC-OQAM signal and improvement in the spectral efficiency and they are in accordance with the 3GPP standard for wideband signals in nonlinear systems.
APA, Harvard, Vancouver, ISO, and other styles
14

Li, Renyi, Chen Ge, Chenwei Liang, and Shichang Zhong. "Design of Inner Matching Three-Stage High-Power Doherty Power Amplifier Based on GaN HEMT Model." Micromachines 15, no. 3 (March 13, 2024): 388. http://dx.doi.org/10.3390/mi15030388.

Full text
Abstract:
This paper introduces the structure and characteristics of an internal-matching high-power Doherty power amplifier based on GaN HEMT devices with 0.25 μm process platforms from the Nanjing Electronic Devices Institute. Through parameter extraction and load-pull testing of the model transistor, an EE_HEMT model for the 1.2 mm gate-width GaN HEMT device was established. This model serves as the foundation for designing a high-power three-stage Doherty power amplifier. The amplifier achieved a saturated power gain exceeding 9 dB in continuous wave mode, with a saturated power output of 49.7 dBm. The drain efficiency was greater than 65% at 2.6 GHz. At 9 dB power back-off point, corresponding to an output power of 40.5 dBm, the drain efficiency remained above 55%. The performance of the amplifier remains consistent within the 2.55–2.62 GHz frequency range. The measured power, efficiency, and gain of the designed Doherty power amplifier align closely with the simulation results based on the EE_HEMT model, validating the accuracy of the established model. Furthermore, the in-band matching design reduces the size and weight of the amplifier. The amplifier maintains normal operation even after high and low-temperature testing, demonstrating its reliability. In conjunction with DPD (digital pre-distortion) for the modulated signal test, the amplifier exhibits extremely high linearity (ACLR < −50.93 dBc). This Doherty power amplifier holds potential applications in modern wireless communication scenarios.
APA, Harvard, Vancouver, ISO, and other styles
15

Vigneau, Marc, Mariano Ercoli, and Stephan Maroldt. "Fully integrated three-way LDMOS Doherty PAs for 1.8–2.2 GHz dual-band and 2.6 GHz m-MIMO 5G applications." International Journal of Microwave and Wireless Technologies 13, no. 6 (March 1, 2021): 543–60. http://dx.doi.org/10.1017/s1759078721000131.

Full text
Abstract:
AbstractThis paper presents a fully integrated three-way Doherty architecture to address the challenges of 5G applications using laterally-diffused metal-oxide semiconductor (LDMOS) technology. By using the so-called CDS cancelation method for the Doherty combiner design, a wideband impedance transformation is achieved, that combined with the three-way Doherty power amplifier (DPA) architecture allows for high efficiency in deep back-off, with a reduced load modulation for high bandwidth. Throughout this paper, the design approach and realization are described, while multiple critical design challenges will be addressed such as low frequency drain resonance optimization, impact of in-package coupling effects, and linearity versus efficiency tradeoff. Two state-of-the-art three-way fully integrated LDMOS DPA monolithic microwave integrated circuit (MMICs) are presented to demonstrate how these measures have been successfully applied to different power amplifier (PA) line-up components for 5G base station systems. First, a 60 W 1.8–2.2 GHz multi-stage device for driver application in true dual-band operation is presented. The circuit design pays special attention to extended PA video bandwidth thanks to integrated passive device. After digital pre-distortion (DPD) in dual-band operation, this highly linear device achieves an outstanding adjacent channel leakage ratio (ACLR) of −56 dBc for a 2cLTE 20 MHz 8 dB peak-to-average ratio signal spaced by 345 MHz, thus 385 MHz instantaneous bandwidth (IBW), with 29% efficiency at 35 dBm, 12 dB output back-off (OBO). Second, the simulation and measurement results of a 55 W 2.6 GHz multi-stage DPA for massive-MIMO final stage application are presented, which yields an excellent linearized efficiency of 49% using a 200 MHz 10cLTE signal with an ACLR lower than −47.5 dBc. For 8cLTE 20 MHz (160 MHz IBW), the device yields 50% efficiency with −50.7 dBc ACLR linearized after DPD. The achieved efficiency is well comparable to published GaN DPAs. These results were achieved by improved simulation techniques to minimize frequency dispersion and thus allow high efficiency operation over wide bandwidth. Both devices show that LDMOS is not only a mature technology which allows those PAs to be reliable and low-cost for mass production in very compact packages, but also provide best-in-class RF performance according to the needs of 5G base station systems.
APA, Harvard, Vancouver, ISO, and other styles
16

Griffiths, David, and Helene Burningham. "Comparison of pre- and self-calibrated camera calibration models for UAS-derived nadir imagery for a SfM application." Progress in Physical Geography: Earth and Environment 43, no. 2 (July 24, 2018): 215–35. http://dx.doi.org/10.1177/0309133318788964.

Full text
Abstract:
Structure from Motion (SfM) is a tool being increasingly utilised in geosciences for high-resolution three-dimensional mapping of landscapes. However, a number of authors have demonstrated that broad-scale systematic deformations, in the form of ‘doming’ and ‘bowling’, can occur when applied to linear (low-amplitude, feature-limited) topographies. In such contexts, a more rigorous lens calibration and ground control point acquisition process is required, which means that application of SfM to environments such as tidal flats or desert plains can be challenging. Uncertainties in elevation models generated through SfM were investigated here in the context of the low elevation, micro-topographic environment of saltmarsh. Eight digital surface models (DSMs) were generated for a saltmarsh site in the Deben Estuary (Suffolk, UK) using imagery acquired by a low-cost consumer grade unmanned aerial system (UAS). The results provide clear illustration of the systematic bowling effect following self-calibration during bundle adjustment. This was due to poor estimations of distortion parameters in the camera model. Deformation was most pronounced when UAS-GPS data were used for georeferencing. The use of dGPS-determined ground control points improved the DSM, but did not fully mitigate the deformations. By introducing a pre-calibrated model, derived using a typical checkerboard routine, deformation was significantly mitigated. These results were tested in both the commercial Agisoft PhotoScan® and open-source Micmac software. When self-calibration was used, Micmac generated significantly more accurate DSMs because a more complex lens distortion model could be implemented. The results show that when mapping flat topographies, pre-calibration of the camera model out-performs self-calibration. However, if pre-calibration is not possible, a complex distortion model (such as Micmac’s Four model) can be utilised to limit deformation. The results of the software analysis concluded there is no one-size fits all software solution, and therefore customisable open-source systems offer many potential benefits.
APA, Harvard, Vancouver, ISO, and other styles
17

Wadsley, Michael, and Niklas Ihssen. "Restricting social networking site use for one week produces varied effects on mood but does not increase explicit or implicit desires to use SNSs: Findings from an ecological momentary assessment study." PLOS ONE 18, no. 11 (November 8, 2023): e0293467. http://dx.doi.org/10.1371/journal.pone.0293467.

Full text
Abstract:
Recent research on the addictive potential of modern technologies such as the internet, smartphones, or social networking sites (SNSs) has suggested that emotional and motivational changes associated with the sudden discontinuation of engagement with the technology mirror the aversive consequences seen when drug use is ceased abruptly. This has been observed even in moderate users and interpreted as a manifestation of withdrawal, an important marker of physical dependence in substance use disorders. On the other hand, a growing literature emphasises the positive effects of “digital detox” on mental health and well-being. Using a battery of affective and motivational measures, both explicit and implicit, the present study tracked the effects of a week of significantly reduced SNS use in moderate to heavy SNS users (N = 51). Our pre-registered analyses showed that the intervention elicited affective changes neither consistent with a general withdrawal syndrome (i.e., increased negative affect and cravings) nor with a general beneficial effect on well-being: While our data indicated some abstinence-related decreases of negative affect and boredom, they also showed a reduction of positive affect. These changes occurred regardless of problematic/addictive use behaviours. Importantly, restricting SNS use for one week had no effect on implicit measures of SNS use motivation (i.e., approach biases, time distortion and effort expenditure for SNS access) nor did it influence explicit cravings and SNS cue-reactivity. Together our findings suggest that restricting SNS use has nuanced and potentially offsetting effects on well-being. These could arise because use reduction may concurrently remove experiences that trigger negative emotions (e.g., upward social comparisons or Fear of Missing Out) but also those that elicit positive emotions (e.g., social approval). The hypothesised lack of a net effect on well-being would be consistent with our finding that voluntary reduction of SNS use does not mitigate or exacerbate SNS-related urges.
APA, Harvard, Vancouver, ISO, and other styles
18

"Performance Evaluation of Digital Pre-Distortion Technique using Low-Complexity and Low-Precision ADC." International Journal of Innovative Technology and Exploring Engineering 8, no. 12 (October 10, 2019): 1836–40. http://dx.doi.org/10.35940/ijitee.l2859.1081219.

Full text
Abstract:
This paper analyzes the Digital Pre-Distortion linearization technique using a low-precision Analog-to-Digital Converter (ADC). The output of a power amplifier exhibits various spurious emissions, spectral regrowth and intermodulation distortion (IMD) products due to its non-linear behavior. So, to preserve the performance of power amplifier, linearization becomes mandatory. Digital Pre-Distortion does the training on the output of the power amplifier (distorted signal) and generates exactly the inverse characteristics to that of power amplifier. Their cascading results into a linear response. In practical systems, the output of power amplifier has to go through an analog-to-digital converter for digital processing and a low-resolution ADC results in the degradation of the signal and affects the DPD performance. But a low-resolution ADC not only reduces the computational complexity in the digital processing but it also provides lower power consumption and costs less because less hardware would be required. In this work, the aim is to find the precision up to which ADC resolution can be reduced without affecting the DPD performance in a significant manner. This paper evaluates the performance of two DPD systems - Full-band DPD and Sub-band DPD and from simulations, it is observed that for a full-band DPD, 1-bit ADC can be reliably used and for a sub-band DPD, single bit to 4-bits ADC can be used.
APA, Harvard, Vancouver, ISO, and other styles
19

Abounemra, A. M. Elelimy, Mohamed Helaoui, and Fadhel M. Ghannouchi. "Design of an efficiency enhanced wideband Doherty power amplifier based on synthesising of a modified harmonic‐control load modulation network." IET Microwaves, Antennas & Propagation, February 18, 2024. http://dx.doi.org/10.1049/mia2.12464.

Full text
Abstract:
AbstractA design of a broadband Doherty power amplifier (DPA) using a novel harmonic control network (HCN) is presented. The DPA structure focused on manipulating harmonic components using this new HCN to enhance the bandwidth of operation and power efficiency. The proposed HCN combines a third harmonic suppression network (THSN) with the second harmonic impedance inverter circuit (SHIIC). In the design, the second harmonic component of the main transistor and the peaking transistor are short‐circuited by their associated SHIIC. Additionally, the carefully designed SHIIC and THSN circuit placed between the main and peaking transistors realise open circuit conditions at the third harmonic for both transistors at the saturation state and back‐off regions. Side by side with the aid of the properly designed post‐matching tuned network (PMTN), these harmonic loading conditions make both amplifiers to operate in continuous Class‐F modes with enhanced‐added efficiencies over wideband conditions. As a result, a succession of highly efficient DPA modes can be formed over a continuous frequency range in the full Doherty region, resulting in a reduced‐size enhanced power efficiency wideband DPA. For verification, a wideband DPA operating from 1.1 to 1.8 GHz was designed and implemented using the proposed topology. The measured drain efficiency of the implemented DPA at 6‐dB back‐off is 52.5%–67.5%, while the saturated power across the specified bandwidth is 43–43.7 dBm. The fabricated DPA exhibits an average efficiency of 48.7%–59.4%, when supplied by a 40‐MHz long‐term evolution (LTE) signal with a 7.5‐dB peak‐to‐average power ratio (PAPR). Performing digital pre‐distortion (DPD) improves the adjacent channel power ratio (ACLR) from −25.8 dBc to −47.6 dBc.
APA, Harvard, Vancouver, ISO, and other styles
20

Holloway, Donell Joy, Lelia Green, and Kylie Stevenson. "Digitods: Toddlers, Touch Screens and Australian Family Life." M/C Journal 18, no. 5 (August 20, 2015). http://dx.doi.org/10.5204/mcj.1024.

Full text
Abstract:
Introduction Children are beginning to use digital technologies at younger and younger ages. The emerging trend of very young children (babies, toddlers and pre-schoolers) using Internet connected devices, especially touch screen tablets and smartphones, has elicited polarising opinions from early childhood experts. At present there is little actual research about the risks or benefits of tablet and smartphone use by very young children. Current usage recommendations, based on research into passive television watching which claims that screen time is detrimental, is in conflict with advice from education experts and app developers who commend interactive screen time as engaging and educational. Guidelines from the health professions typically advise strict time limits on very young children’s screen-time. Based for the most part on policy developed by the American Academy of Paediatrics, it is usually recommended that children under two have no screen time at all (Brown), and children over this age have no more than two hours a day (Strasburger, et al.). On the other hand, early childhood education guidelines promote the development of digital literacy skills (Department of Education). Further, education-based research indicates that access to computers and the Internet in the preschool years is associated with overall educational achievement (Bittman et al.; Cavanaugh et al; Judge et al; Neumann). The US based National Association for Education of Young Children’s position statement on technology for zero to eight year-olds declares that “when used intentionally and appropriately, technology and interactive media are effective tools to support learning and development” (NAEYC). This article discusses the notion of Digitods—a name for those children born since the introduction of the iPhone in 2007 who have ready access to touchscreen technologies since birth. It reports on the limited availability of evidence-based research about these children’s ICT use concluding that current research and recommendations are not grounded in the everyday life of very young children and their families. The article then reports on the beginnings of a research project funded by the Australian Research Council entitled Toddlers and Tablets: exploring the risks and benefits 0-5s face online. This research project recognises that at this stage it is parents who “are the real experts in their toddlers’ use of screen technologies. Accordingly, the project’s methodological approach draws on parents, pre-schoolers and their families as communities of practice in the construction of social meaning around toddlers’ use of touch screen technology. Digitods In 2000 Bill Gates introduced the notion of Generation I to describe the first cohort of children raised with the Internet as a reality in their lives. They are those born after the 1990s and will, in most cases; have no memory of life without the Net. [...] Generation I will be able to conceive of the Internet’s possibilities far more profoundly than we can today. This new generation will become agents of change as the limits of the Internet expand to include educational, scientific, and business applications that we cannot even imagine. (Gates)Digitods, on the other hand, is a term that has been used in education literature (Leathers et al.) to describe those children born after the introduction of the iPhone in 2007. These children often begin their lives with ready access to the Internet via easily usable touch screen devices, which could have been designed with toddlers’ touch and swipe movements in mind. Not only are they the youngest group of children to actively engage with the Internet they are the first group to grow up with a range of mobile Internet devices (Leathers et al.). The difference between Digitods and Gates’s Generation I is that Digitods are the first pre-verbal, non-ambulant infants to have ready access to digital technologies. Somewhere around the age of 10 months to fourteen months a baby learns to point with his or her forefinger. At this stage the child is ready to swipe and tap a touch screen (Leathers et al.). This is in contrast to laptops and PCs given that very young children often need assistance to use a mouse or keyboard. The mobility of touch screen devices allows very young children to play at the kitchen table, in the bedroom or on a car trip. These mobile devices have, of course, a myriad of mobile apps to go with them. These apps create an immediacy of access for infants and pre-schoolers who do not need to open a web browser to find their favourite sites. In the lives of these children it seems that it has always been possible to touch and swipe their way into games, books and creative and communicative experiences (Holloway et al. 149). The interactivity of most pre-school apps, as opposed to more passive screen activities such as watching television shows or videos (both offline or online), requires toddlers and pre-schoolers to pay careful attention, think about things and act purposefully (Leathers et al.). It is this interactivity which is the main point of difference, one which holds the potential to engage and educate our youngest children. It should be noted within this discussion about Digitods that, while the trope Digital Natives tends to homogenise an entire generation, the authors do not assume that all children born today are Digitods by default. Many children do not have the same privileged opportunities as others, or the (parental) cultural capital, to enable access, ease of use and digital skill development. In addition to this it is not implied that Digitods will be more tech savvy than their older siblings. The term is used more to describe and distinguish those children who have digital access almost since birth—in order to differentiate or tease out everyday family practices around these children’s ICT use and the possible risks and benefits this access affords babies, toddlers and pre-schoolers. While the term Digital Native has also been criticised as being a white middle class phenomenon this is not necessarily the case with Digitods. In the Southeast Asia and the Pacific region developed countries like Japan, Korea, New Zealand and Singapore have extremely high rates of touchscreen use by very young children (Child Sciences; Jie; Goh; Unantenne). Other countries such as the Philippines and Indonesia have moved to a high smart phone usage by very young children while at the same time have only nascent ICT access and instruction within their education systems (Unantenne). The Digitod Parent Parents of Digitods are usually experienced Internet users themselves, and many are comfortable with their children using these child-friendly touch screen devices (Findahl). Digital technologies are integral to their everyday lives, often making daily life easier and improving communication with family and friends, even during the high pressure parenting years of raising toddlers and pre-schoolers. Even though many parents and caregivers are enabling very young children’s use of touch screen technologies, they are also concerned about the changes they are making. This is because very young children’s use of touch screen devices “has become another area where they fear possible criticism and in which their parental practices risk negative evaluation by others” (Holloway et al). The tensions between expert advice regarding young children’s screen-time and parents’ and caregivers’ own judgments are also being played out online. Parenting blogs, online magazines and discussion groups are all joining in the debate: On the one hand, parents want their children to swim expertly in the digital stream that they will have to navigate all their lives; on the other hand, they fear that too much digital media, too early, will sink them. Parents end up treating tablets like precision surgical instruments, gadgets that might perform miracles for their child’s IQ and help him win some nifty robotics competition—but only if they are used just so. (Rosin)Thus, with over 80 000 children’s apps marketed as educational in the Apple App Store alone, parents can find it difficult to choose apps that are worth purchasing (Yelland). Nonetheless, recent research regarding Australian children shows that three to five year olds who access touch screen devices will typically have five or more specific apps to choose from (5.23 on average) (Neumann). With little credible evidence or considered debate, parents have been left to make their own choices about the pros and cons of their young children’s access to touch screens. Nonetheless, one immediate benefit that comes to mind is toddlers and pre-schoolers video chatting with dispersed family member—due to increased globalisation, guest worker arrangements, FIFO (fly-in fly-out) workforces and family separation or divorce. Such clear benefits around sociability and youngsters’ connection with significant others make previous screen-related guidelines out of date and no longer contextually relevant. Little Research Attention Family ownership of tablet devices as well as touch screen phones has risen dramatically in the last five years. With very young children being loaned these technologies by mum or dad, and a tendency in Australia to rely on market-orientated research regarding ownership and usage, there is very little knowledge about touch screen usage rates for very young Australian children. UK and US usage figures indicate that over the last few years there has been a five-fold increase in tablet uptake by zero to eight year olds (Ofcom; Rideout). Although large scale, comparative Australian data is not available, previous research regarding older children indicates that Australia is similar to high use countries like some Scandinavian nations and the UK (Green et al.). In addition to this, two small research projects in Australia, with under 160 participant families each, indicate that two thirds of these children (0-5) use touchscreen devices (Neumann; Coenenna et. al.). Beyond usage figures, there is also very limited evidence-based research about very young children’s app use. Interactive technologies available via touch screen technologies have been available domestically for a very short time. Consequently, “valid scientific research has not been completed and replicated due to [the lack of] available time” (Leathers el al. 129) and longitudinal studies which rely on an intervention group (in this case exposure to children’s apps) and a control group (no exposure) are even fewer and more time-consuming. Interestingly, researchers have revisited the issue of passive screen viewing. A recent 2015 review of previous 2007 research, which linked babies watching videos with poor language development, has found that there was statistical and methodological issues with the 2007 study and that there are no strong inferences to be drawn between media exposure and language development (Ferguson and Donellan). Thus, there seems to be no conclusive evidence-based research on which to inform parents and educators about the possible downside or benefits of touch screen use. Nonetheless, early childhood experts have been quick to weigh in on the possible effects of screen usage, some providing restrictive guidelines and recommendations, with others advocating the use of interactive apps for very young children for their educational value. This knowledge-gap disguises what is actually happening in the lives of real Australian families. Due to the lack of local data, as well as worldwide research, it is essential that Australian researchers obtain a comprehensive understanding about actual behaviour around touch screen use in the lives of children aged between zero and five and their families. Beginning Research While research into very young children’s touch screen use is beginning to take place, few results have been published. When researching two to three year olds’ learning from interactive versus non-interactive videos Kirkorian, Choi and Pempek found that “toddlers may learn more from interactive media than from non-interactive video” (Kirkorian et al). This means that the use of interactive apps on touch screen devices may hold a greater potential for learning than passive video or television viewing for children in this age range. Another study considered the degree to which the young children could navigate to and use apps on touch screen devices by observing and analysing YouTube videos of infants and young children using touch screens (Hourcade et al.). It was found that between the ages of 12 months and 17 months the children filmed seemed to begin to “make meaningful use of the tablets [and] more than 90 per cent of children aged two [had] reached this level of ability” (1923). The kind of research mentioned above, usually the preserve of psychologists, paediatricians and some educators, does not, however, ground very young children’s use in their domestic context—in the spaces and with those people with whom most touch screen usage takes place. With funding from the Australian Research Council Australian, Irish and UK researchers are about to adopt a media studies (domestication) approach to comprehensively investigate digital media use in the everyday lives of very young children. This Australian-based research project positions very young children’s touch screen use within the family and will help provide an understanding of the everyday knowledge and strategies that this cohort of technology users (very young children and their parents) have already developed—in the knowledge vacuum left by the swift appropriation and incorporation of these new media technologies into the lives of families with very young children. Whilst using a conventional social constructionist perspective, the project will also adopt a co-creation of knowledge approach. The co-creation of knowledge approach (Fong) has links with the communities of practice literature (Wegner) and recognises that parents, care-givers and the children themselves are the current experts in this field in terms of the everyday uses of these technologies by very young children. Families’ everyday discourse and practices regarding their children’s touch screen use do not necessarily work through obvious power hierarchies (via expert opinions), but rather through a process of meaning making where they shape their own understandings and attitudes through experience and shared talk within their own everyday family communities of practice. This Toddlers and Tablets research is innovative in many ways. It seeks to capture the enthusiasm of young children’s digital interactions and to pioneer new ways of ‘beginnings’ researching with very young children, as well as with their parents. The researchers will work with parents and children in their broad domestic contexts (including in and out-of-home activities, and grandparental and wider-family involvement) to co-create knowledge about young children’s digital technologies and the social contexts in which these technologies are used. Aspects of these interactions, such as interviews and observations of everyday digital interactions will be recorded (audio and video respectively). In addition to this, data collected from media commentary, policy debates, research publications and learned articles from other disciplinary traditions will be interrogated to see if there are correlations, contrasts, trends or synergies between parents’ construction of meaning, public commentary and current research. Critical discourse tools and methods (Chouliaraki and Fairclough) will be used to analyse verbatim transcripts, video, and all written materials. Conclusion Very young children are uniquely dependent upon others for the basic necessities of life and for the tools they need, and will need to develop, to claim their place in the world. Given the ubiquitous role played by digital media in the lives of their parents and other caregivers it would be a distortion of everyday life for children to be excluded from the technologies that are routinely used to connect with other people and with information. In the same way that adults use digital media to renew and strengthen social and emotional bonds across distance, so young children delight in ‘Facetime’ and other technologies that connect them audio-visually with friends and family members who are not physically co-present. Similarly, a very short time spent in the company of toddlers using touch screens is sufficient to demonstrate the sheer delight that these young infants have in developing their sense of agency and autonomy (https://www.youtube.com/watch?v=aXV-yaFmQNk). Media, communications and cultural studies are beginning to claim a space for evidence based policy drawn from everyday activities in real life contexts. Research into the beginnings of digital life, with families who are beginning to find a way to introduce these technologies to the youngest generation, integrating them within social and emotional repertoires, may prove to be the start of new understandings into the communication skills of the preverbal and preliterate young people whose technology preferences will drive future development – with their parents likely trying to keep pace. Acknowledgment This research is supported under Australia Research Council’s Discovery Projects funding scheme (project number DP150104734). References Bittman, Michael, et al. "Digital Natives? New and Old Media and Children's Outcomes." Australian Journal of Education 55.2 (2011): 161-75. Brown, Ari. "Media Use by Children Younger than 2 Years." Pediatrics 128.5 (2011): 1040-45. Burr, Vivien. Social Constructionism. 2nd ed. London: Routledge, 2003. Cavanaugh, Cathy, et al. "The Effects of Distance Education on K–12 Student Outcomes: A Meta-Analysis." Naperville, Ill.: Learning Point Associates, 2004. 5 Mar. 2009 ‹http://www.ncrel.org/tech/distance/index.html›. Child Sciences and Parenting Research Office. Survey of Media Use by Children and Parents (Summary). Tokyo: Benesse Educational Research and Development Institute, 2014. Coenena, Pieter, Erin Howiea, Amity Campbella, and Leon Strakera. Mobile Touch Screen Device Use among Young Australian Children–First Results from a National Survey. Proceedings 19th Triennial Congress of the IEA. 2015. Chouliaraki, Lilie and Norman Fairclough. Discourse in Late Modernity: Rethinking Critical Discourse Analysis. Edinburgh: Edinburgh UP, 1999. Department of Education. "Belonging, Being and Becoming: The Early Years Learning Framework for Australia." Australian Government, 2009. Ferguson, Christopher J., and M. Brent Donnellan. "Is the Association between Children’s Baby Video Viewing and Poor Language Development Robust? A Reanalysis of Zimmerman, Christakis, and Meltzoff (2007)." Developmental Psychology 50.1 (2014): 129. Findahl, Olle. Swedes and the Internet 2013. Stockholm: The Internet Infrastructure Foundation, 2013. Fong, Patrick S.W. "Co-Creation of Knowledge by Multidisciplinary Project Teams." Management of Knowledge in Project Environments. Eds. E. Love, P. Fong, and Z. Irani. Burlington, MA: Elsevier, 2005. 41-56. Gates, Bill. "Enter 'Generation I': The Responsibility to Provide Access for All to the Most Incredible Learning Tool Ever Created." Instructor 109.6 (2000): 98. Goh, Wendy W.L., Susanna Bay, and Vivian Hsueh-Hua Chen. "Young School Children’s Use of Digital Devices and Parental Rules." Telematics and Informatics 32.4 (2015): 787-95. Green, Lelia, et al. "Risks and Safety for Australian Children on the Internet: Full Findings from the AU Kids Online Survey of 9-16 Year Olds and Their Parents." Cultural Science Journal 4.1 (2011): 1-73. Holloway, Donell, Lelia Green, and Carlie Love. "'It's All about the Apps': Parental Mediation of Pre-Schoolers' Digital Lives." Media International Australia 153 (2014): 148-56. Hourcade, Juan Pablo, Sarah Mascher, David Wu, and Luiza Pantoja. Look, My Baby Is Using an iPad! An Analysis of YouTube Videos of Infants and Toddlers Using Tablets. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, 2015. Jie S.H. "ICT Use Statistics of Households and Individuals in Korea." 10th World Telecommunication/ICT Indicators Meeting (WTIM-12). Korea Internet & Security Agency (KISA), 25-7 Sep. 2012.Judge, Sharon, Kathleen Puckett, and Sherry Mee Bell. "Closing the Digital Divide: Update from the Early Childhood Longitudinal Study." The Journal of Educational Research 100.1 (2006): 52-60. Kirkorian, H., K. Choi, and Pempek. "Toddlers' Word Learning from Contingent and Non-Contingent Video on Touchscreens." Child Development (in press). Leathers, Heather, Patti Summers, and Desollar. Toddlers on Technology: A Parents' Guide. Illinois: AuthorHouse, 2013. NAEYC. Technology and Interactive Media as Tools in Early Childhood Programs Serving Children from Birth through Age 8 [Position Statement]. Washington: National Association for the Education of Young Children, the Fred Rogers Center for Early Learning and Children’s Media at Saint Vincent College, 2012. Neumann, Michelle M. "An Examination of Touch Screen Tablets and Emergent Literacy in Australian Pre-School Children." Australian Journal of Education 58.2 (2014): 109-22. Ofcom. Children and Parents: Media Use and Attitudes Report. London, 2013. Rideout, Victoria. Zero to Eight: Children’s Media Use in America 2013. San Francisco: Common Sense Media, 2013. Rosin, Hanna. "The Touch-Screen Generation." The Atlantic, 20 Apr. 2013. Strasburger, Victor C., et al. "Children, Adolescents, and the Media." Pediatrics 132.5 (2013): 958-61. Unantenne, Nalika. Mobile Device Usage among Young Kids: A Southeast Asia Study. Singapore: The Asian Parent and Samsung Kids Time, 2014. Wenger, Etienne. Communities of Practice: Learning, Meaning, and Identity. New York: Cambridge University Press, 1998. Wenger, Etienne. "Communities of Practice and Social Learning Systems." Organization 7.2 (2000): 225-46. Yelland, Nicola. "Which Apps Are Educational and Why? It’s in the Eye of the Beholder." The Conversation 13 July 2015. 16 Aug. 2015 ‹http://theconversation.com/which-apps-are-educational-and-why-its-in-the-eye-of-the-beholder-37968›.
APA, Harvard, Vancouver, ISO, and other styles
21

Losh, Elizabeth. "Artificial Intelligence." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2710.

Full text
Abstract:
On the morning of Thursday, 4 May 2006, the United States House Permanent Select Committee on Intelligence held an open hearing entitled “Terrorist Use of the Internet.” The Intelligence committee meeting was scheduled to take place in Room 1302 of the Longworth Office Building, a Depression-era structure with a neoclassical façade. Because of a dysfunctional elevator, some of the congressional representatives were late to the meeting. During the testimony about the newest political applications for cutting-edge digital technology, the microphones periodically malfunctioned, and witnesses complained of “technical problems” several times. By the end of the day it seemed that what was to be remembered about the hearing was the shocking revelation that terrorists were using videogames to recruit young jihadists. The Associated Press wrote a short, restrained article about the hearing that only mentioned “computer games and recruitment videos” in passing. Eager to have their version of the news item picked up, Reuters made videogames the focus of their coverage with a headline that announced, “Islamists Using US Videogames in Youth Appeal.” Like a game of telephone, as the Reuters videogame story was quickly re-run by several Internet news services, each iteration of the title seemed less true to the exact language of the original. One Internet news service changed the headline to “Islamic militants recruit using U.S. video games.” Fox News re-titled the story again to emphasise that this alert about technological manipulation was coming from recognised specialists in the anti-terrorism surveillance field: “Experts: Islamic Militants Customizing Violent Video Games.” As the story circulated, the body of the article remained largely unchanged, in which the Reuters reporter described the digital materials from Islamic extremists that were shown at the congressional hearing. During the segment that apparently most captured the attention of the wire service reporters, eerie music played as an English-speaking narrator condemned the “infidel” and declared that he had “put a jihad” on them, as aerial shots moved over 3D computer-generated images of flaming oil facilities and mosques covered with geometric designs. Suddenly, this menacing voice-over was interrupted by an explosion, as a virtual rocket was launched into a simulated military helicopter. The Reuters reporter shared this dystopian vision from cyberspace with Western audiences by quoting directly from the chilling commentary and describing a dissonant montage of images and remixed sound. “I was just a boy when the infidels came to my village in Blackhawk helicopters,” a narrator’s voice said as the screen flashed between images of street-level gunfights, explosions and helicopter assaults. Then came a recording of President George W. Bush’s September 16, 2001, statement: “This crusade, this war on terrorism, is going to take a while.” It was edited to repeat the word “crusade,” which Muslims often define as an attack on Islam by Christianity. According to the news reports, the key piece of evidence before Congress seemed to be a film by “SonicJihad” of recorded videogame play, which – according to the experts – was widely distributed online. Much of the clip takes place from the point of view of a first-person shooter, seen as if through the eyes of an armed insurgent, but the viewer also periodically sees third-person action in which the player appears as a running figure wearing a red-and-white checked keffiyeh, who dashes toward the screen with a rocket launcher balanced on his shoulder. Significantly, another of the player’s hand-held weapons is a detonator that triggers remote blasts. As jaunty music plays, helicopters, tanks, and armoured vehicles burst into smoke and flame. Finally, at the triumphant ending of the video, a green and white flag bearing a crescent is hoisted aloft into the sky to signify victory by Islamic forces. To explain the existence of this digital alternative history in which jihadists could be conquerors, the Reuters story described the deviousness of the country’s terrorist opponents, who were now apparently modifying popular videogames through their wizardry and inserting anti-American, pro-insurgency content into U.S.-made consumer technology. One of the latest video games modified by militants is the popular “Battlefield 2” from leading video game publisher, Electronic Arts Inc of Redwood City, California. Jeff Brown, a spokesman for Electronic Arts, said enthusiasts often write software modifications, known as “mods,” to video games. “Millions of people create mods on games around the world,” he said. “We have absolutely no control over them. It’s like drawing a mustache on a picture.” Although the Electronic Arts executive dismissed the activities of modders as a “mustache on a picture” that could only be considered little more than childish vandalism of their off-the-shelf corporate product, others saw a more serious form of criminality at work. Testifying experts and the legislators listening on the committee used the video to call for greater Internet surveillance efforts and electronic counter-measures. Within twenty-four hours of the sensationalistic news breaking, however, a group of Battlefield 2 fans was crowing about the idiocy of reporters. The game play footage wasn’t from a high-tech modification of the software by Islamic extremists; it had been posted on a Planet Battlefield forum the previous December of 2005 by a game fan who had cut together regular game play with a Bush remix and a parody snippet of the soundtrack from the 2004 hit comedy film Team America. The voice describing the Black Hawk helicopters was the voice of Trey Parker of South Park cartoon fame, and – much to Parker’s amusement – even the mention of “goats screaming” did not clue spectators in to the fact of a comic source. Ironically, the moment in the movie from which the sound clip is excerpted is one about intelligence gathering. As an agent of Team America, a fictional elite U.S. commando squad, the hero of the film’s all-puppet cast, Gary Johnston, is impersonating a jihadist radical inside a hostile Egyptian tavern that is modelled on the cantina scene from Star Wars. Additional laughs come from the fact that agent Johnston is accepted by the menacing terrorist cell as “Hakmed,” despite the fact that he utters a series of improbable clichés made up of incoherent stereotypes about life in the Middle East while dressed up in a disguise made up of shoe polish and a turban from a bathroom towel. The man behind the “SonicJihad” pseudonym turned out to be a twenty-five-year-old hospital administrator named Samir, and what reporters and representatives saw was nothing more exotic than game play from an add-on expansion pack of Battlefield 2, which – like other versions of the game – allows first-person shooter play from the position of the opponent as a standard feature. While SonicJihad initially joined his fellow gamers in ridiculing the mainstream media, he also expressed astonishment and outrage about a larger politics of reception. In one interview he argued that the media illiteracy of Reuters potentially enabled a whole series of category errors, in which harmless gamers could be demonised as terrorists. It wasn’t intended for the purpose what it was portrayed to be by the media. So no I don’t regret making a funny video . . . why should I? The only thing I regret is thinking that news from Reuters was objective and always right. The least they could do is some online research before publishing this. If they label me al-Qaeda just for making this silly video, that makes you think, what is this al-Qaeda? And is everything al-Qaeda? Although Sonic Jihad dismissed his own work as “silly” or “funny,” he expected considerably more from a credible news agency like Reuters: “objective” reporting, “online research,” and fact-checking before “publishing.” Within the week, almost all of the salient details in the Reuters story were revealed to be incorrect. SonicJihad’s film was not made by terrorists or for terrorists: it was not created by “Islamic militants” for “Muslim youths.” The videogame it depicted had not been modified by a “tech-savvy militant” with advanced programming skills. Of course, what is most extraordinary about this story isn’t just that Reuters merely got its facts wrong; it is that a self-identified “parody” video was shown to the august House Intelligence Committee by a team of well-paid “experts” from the Science Applications International Corporation (SAIC), a major contractor with the federal government, as key evidence of terrorist recruitment techniques and abuse of digital networks. Moreover, this story of media illiteracy unfolded in the context of a fundamental Constitutional debate about domestic surveillance via communications technology and the further regulation of digital content by lawmakers. Furthermore, the transcripts of the actual hearing showed that much more than simple gullibility or technological ignorance was in play. Based on their exchanges in the public record, elected representatives and government experts appear to be keenly aware that the digital discourses of an emerging information culture might be challenging their authority and that of the longstanding institutions of knowledge and power with which they are affiliated. These hearings can be seen as representative of a larger historical moment in which emphatic declarations about prohibiting specific practices in digital culture have come to occupy a prominent place at the podium, news desk, or official Web portal. This environment of cultural reaction can be used to explain why policy makers’ reaction to terrorists’ use of networked communication and digital media actually tells us more about our own American ideologies about technology and rhetoric in a contemporary information environment. When the experts come forward at the Sonic Jihad hearing to “walk us through the media and some of the products,” they present digital artefacts of an information economy that mirrors many of the features of our own consumption of objects of electronic discourse, which seem dangerously easy to copy and distribute and thus also create confusion about their intended meanings, audiences, and purposes. From this one hearing we can see how the reception of many new digital genres plays out in the public sphere of legislative discourse. Web pages, videogames, and Weblogs are mentioned specifically in the transcript. The main architecture of the witnesses’ presentation to the committee is organised according to the rhetorical conventions of a PowerPoint presentation. Moreover, the arguments made by expert witnesses about the relationship of orality to literacy or of public to private communications in new media are highly relevant to how we might understand other important digital genres, such as electronic mail or text messaging. The hearing also invites consideration of privacy, intellectual property, and digital “rights,” because moral values about freedom and ownership are alluded to by many of the elected representatives present, albeit often through the looking glass of user behaviours imagined as radically Other. For example, terrorists are described as “modders” and “hackers” who subvert those who properly create, own, legitimate, and regulate intellectual property. To explain embarrassing leaks of infinitely replicable digital files, witness Ron Roughead says, “We’re not even sure that they don’t even hack into the kinds of spaces that hold photographs in order to get pictures that our forces have taken.” Another witness, Undersecretary of Defense for Policy and International Affairs, Peter Rodman claims that “any video game that comes out, as soon as the code is released, they will modify it and change the game for their needs.” Thus, the implication of these witnesses’ testimony is that the release of code into the public domain can contribute to political subversion, much as covert intrusion into computer networks by stealthy hackers can. However, the witnesses from the Pentagon and from the government contractor SAIC often present a contradictory image of the supposed terrorists in the hearing transcripts. Sometimes the enemy is depicted as an organisation of technological masterminds, capable of manipulating the computer code of unwitting Americans and snatching their rightful intellectual property away; sometimes those from the opposing forces are depicted as pre-modern and even sub-literate political innocents. In contrast, the congressional representatives seem to focus on similarities when comparing the work of “terrorists” to the everyday digital practices of their constituents and even of themselves. According to the transcripts of this open hearing, legislators on both sides of the aisle express anxiety about domestic patterns of Internet reception. Even the legislators’ own Web pages are potentially disruptive electronic artefacts, particularly when the demands of digital labour interfere with their duties as lawmakers. Although the subject of the hearing is ostensibly terrorist Websites, Representative Anna Eshoo (D-California) bemoans the difficulty of maintaining her own official congressional site. As she observes, “So we are – as members, I think we’re very sensitive about what’s on our Website, and if I retained what I had on my Website three years ago, I’d be out of business. So we know that they have to be renewed. They go up, they go down, they’re rebuilt, they’re – you know, the message is targeted to the future.” In their questions, lawmakers identify Weblogs (blogs) as a particular area of concern as a destabilising alternative to authoritative print sources of information from established institutions. Representative Alcee Hastings (D-Florida) compares the polluting power of insurgent bloggers to that of influential online muckrakers from the American political Right. Hastings complains of “garbage on our regular mainstream news that comes from blog sites.” Representative Heather Wilson (R-New Mexico) attempts to project a media-savvy persona by bringing up the “phenomenon of blogging” in conjunction with her questions about jihadist Websites in which she notes how Internet traffic can be magnified by cooperative ventures among groups of ideologically like-minded content-providers: “These Websites, and particularly the most active ones, are they cross-linked? And do they have kind of hot links to your other favorite sites on them?” At one point Representative Wilson asks witness Rodman if he knows “of your 100 hottest sites where the Webmasters are educated? What nationality they are? Where they’re getting their money from?” In her questions, Wilson implicitly acknowledges that Web work reflects influences from pedagogical communities, economic networks of the exchange of capital, and even potentially the specific ideologies of nation-states. It is perhaps indicative of the government contractors’ anachronistic worldview that the witness is unable to answer Wilson’s question. He explains that his agency focuses on the physical location of the server or ISP rather than the social backgrounds of the individuals who might be manufacturing objectionable digital texts. The premise behind the contractors’ working method – surveilling the technical apparatus not the social network – may be related to other beliefs expressed by government witnesses, such as the supposition that jihadist Websites are collectively produced and spontaneously emerge from the indigenous, traditional, tribal culture, instead of assuming that Iraqi insurgents have analogous beliefs, practices, and technological awareness to those in first-world countries. The residual subtexts in the witnesses’ conjectures about competing cultures of orality and literacy may tell us something about a reactionary rhetoric around videogames and digital culture more generally. According to the experts before Congress, the Middle Eastern audience for these videogames and Websites is limited by its membership in a pre-literate society that is only capable of abortive cultural production without access to knowledge that is archived in printed codices. Sometimes the witnesses before Congress seem to be unintentionally channelling the ideas of the late literacy theorist Walter Ong about the “secondary orality” associated with talky electronic media such as television, radio, audio recording, or telephone communication. Later followers of Ong extend this concept of secondary orality to hypertext, hypermedia, e-mail, and blogs, because they similarly share features of both speech and written discourse. Although Ong’s disciples celebrate this vibrant reconnection to a mythic, communal past of what Kathleen Welch calls “electric rhetoric,” the defence industry consultants express their profound state of alarm at the potentially dangerous and subversive character of this hybrid form of communication. The concept of an “oral tradition” is first introduced by the expert witnesses in the context of modern marketing and product distribution: “The Internet is used for a variety of things – command and control,” one witness states. “One of the things that’s missed frequently is how and – how effective the adversary is at using the Internet to distribute product. They’re using that distribution network as a modern form of oral tradition, if you will.” Thus, although the Internet can be deployed for hierarchical “command and control” activities, it also functions as a highly efficient peer-to-peer distributed network for disseminating the commodity of information. Throughout the hearings, the witnesses imply that unregulated lateral communication among social actors who are not authorised to speak for nation-states or to produce legitimated expert discourses is potentially destabilising to political order. Witness Eric Michael describes the “oral tradition” and the conventions of communal life in the Middle East to emphasise the primacy of speech in the collective discursive practices of this alien population: “I’d like to point your attention to the media types and the fact that the oral tradition is listed as most important. The other media listed support that. And the significance of the oral tradition is more than just – it’s the medium by which, once it comes off the Internet, it is transferred.” The experts go on to claim that this “oral tradition” can contaminate other media because it functions as “rumor,” the traditional bane of the stately discourse of military leaders since the classical era. The oral tradition now also has an aspect of rumor. A[n] event takes place. There is an explosion in a city. Rumor is that the United States Air Force dropped a bomb and is doing indiscriminate killing. This ends up being discussed on the street. It ends up showing up in a Friday sermon in a mosque or in another religious institution. It then gets recycled into written materials. Media picks up the story and broadcasts it, at which point it’s now a fact. In this particular case that we were telling you about, it showed up on a network television, and their propaganda continues to go back to this false initial report on network television and continue to reiterate that it’s a fact, even though the United States government has proven that it was not a fact, even though the network has since recanted the broadcast. In this example, many-to-many discussion on the “street” is formalised into a one-to many “sermon” and then further stylised using technology in a one-to-many broadcast on “network television” in which “propaganda” that is “false” can no longer be disputed. This “oral tradition” is like digital media, because elements of discourse can be infinitely copied or “recycled,” and it is designed to “reiterate” content. In this hearing, the word “rhetoric” is associated with destructive counter-cultural forces by the witnesses who reiterate cultural truisms dating back to Plato and the Gorgias. For example, witness Eric Michael initially presents “rhetoric” as the use of culturally specific and hence untranslatable figures of speech, but he quickly moves to an outright castigation of the entire communicative mode. “Rhetoric,” he tells us, is designed to “distort the truth,” because it is a “selective” assembly or a “distortion.” Rhetoric is also at odds with reason, because it appeals to “emotion” and a romanticised Weltanschauung oriented around discourses of “struggle.” The film by SonicJihad is chosen as the final clip by the witnesses before Congress, because it allegedly combines many different types of emotional appeal, and thus it conveniently ties together all of the themes that the witnesses present to the legislators about unreliable oral or rhetorical sources in the Middle East: And there you see how all these products are linked together. And you can see where the games are set to psychologically condition you to go kill coalition forces. You can see how they use humor. You can see how the entire campaign is carefully crafted to first evoke an emotion and then to evoke a response and to direct that response in the direction that they want. Jihadist digital products, especially videogames, are effective means of manipulation, the witnesses argue, because they employ multiple channels of persuasion and carefully sequenced and integrated subliminal messages. To understand the larger cultural conversation of the hearing, it is important to keep in mind that the related argument that “games” can “psychologically condition” players to be predisposed to violence is one that was important in other congressional hearings of the period, as well one that played a role in bills and resolutions that were passed by the full body of the legislative branch. In the witness’s testimony an appeal to anti-game sympathies at home is combined with a critique of a closed anti-democratic system abroad in which the circuits of rhetorical production and their composite metonymic chains are described as those that command specific, unvarying, robotic responses. This sharp criticism of the artful use of a presentation style that is “crafted” is ironic, given that the witnesses’ “compilation” of jihadist digital material is staged in the form of a carefully structured PowerPoint presentation, one that is paced to a well-rehearsed rhythm of “slide, please” or “next slide” in the transcript. The transcript also reveals that the members of the House Intelligence Committee were not the original audience for the witnesses’ PowerPoint presentation. Rather, when it was first created by SAIC, this “expert” presentation was designed for training purposes for the troops on the ground, who would be facing the challenges of deployment in hostile terrain. According to the witnesses, having the slide show showcased before Congress was something of an afterthought. Nonetheless, Congressman Tiahrt (R-KN) is so impressed with the rhetorical mastery of the consultants that he tries to appropriate it. As Tiarht puts it, “I’d like to get a copy of that slide sometime.” From the hearing we also learn that the terrorists’ Websites are threatening precisely because they manifest a polymorphously perverse geometry of expansion. For example, one SAIC witness before the House Committee compares the replication and elaboration of digital material online to a “spiderweb.” Like Representative Eshoo’s site, he also notes that the terrorists’ sites go “up” and “down,” but the consultant is left to speculate about whether or not there is any “central coordination” to serve as an organising principle and to explain the persistence and consistency of messages despite the apparent lack of a single authorial ethos to offer a stable, humanised, point of reference. In the hearing, the oft-cited solution to the problem created by the hybridity and iterability of digital rhetoric appears to be “public diplomacy.” Both consultants and lawmakers seem to agree that the damaging messages of the insurgents must be countered with U.S. sanctioned information, and thus the phrase “public diplomacy” appears in the hearing seven times. However, witness Roughhead complains that the protean “oral tradition” and what Henry Jenkins has called the “transmedia” character of digital culture, which often crosses several platforms of traditional print, projection, or broadcast media, stymies their best rhetorical efforts: “I think the point that we’ve tried to make in the briefing is that wherever there’s Internet availability at all, they can then download these – these programs and put them onto compact discs, DVDs, or post them into posters, and provide them to a greater range of people in the oral tradition that they’ve grown up in. And so they only need a few Internet sites in order to distribute and disseminate the message.” Of course, to maintain their share of the government market, the Science Applications International Corporation also employs practices of publicity and promotion through the Internet and digital media. They use HTML Web pages for these purposes, as well as PowerPoint presentations and online video. The rhetoric of the Website of SAIC emphasises their motto “From Science to Solutions.” After a short Flash film about how SAIC scientists and engineers solve “complex technical problems,” the visitor is taken to the home page of the firm that re-emphasises their central message about expertise. The maps, uniforms, and specialised tools and equipment that are depicted in these opening Web pages reinforce an ethos of professional specialisation that is able to respond to multiple threats posed by the “global war on terror.” By 26 June 2006, the incident finally was being described as a “Pentagon Snafu” by ABC News. From the opening of reporter Jake Tapper’s investigative Webcast, established government institutions were put on the spot: “So, how much does the Pentagon know about videogames? Well, when it came to a recent appearance before Congress, apparently not enough.” Indeed, the very language about “experts” that was highlighted in the earlier coverage is repeated by Tapper in mockery, with the significant exception of “independent expert” Ian Bogost of the Georgia Institute of Technology. If the Pentagon and SAIC deride the legitimacy of rhetoric as a cultural practice, Bogost occupies himself with its defence. In his recent book Persuasive Games: The Expressive Power of Videogames, Bogost draws upon the authority of the “2,500 year history of rhetoric” to argue that videogames represent a significant development in that cultural narrative. Given that Bogost and his Watercooler Games Weblog co-editor Gonzalo Frasca were actively involved in the detective work that exposed the depth of professional incompetence involved in the government’s line-up of witnesses, it is appropriate that Bogost is given the final words in the ABC exposé. As Bogost says, “We should be deeply bothered by this. We should really be questioning the kind of advice that Congress is getting.” Bogost may be right that Congress received terrible counsel on that day, but a close reading of the transcript reveals that elected officials were much more than passive listeners: in fact they were lively participants in a cultural conversation about regulating digital media. After looking at the actual language of these exchanges, it seems that the persuasiveness of the misinformation from the Pentagon and SAIC had as much to do with lawmakers’ preconceived anxieties about practices of computer-mediated communication close to home as it did with the contradictory stereotypes that were presented to them about Internet practices abroad. In other words, lawmakers found themselves looking into a fun house mirror that distorted what should have been familiar artefacts of American popular culture because it was precisely what they wanted to see. References ABC News. “Terrorist Videogame?” Nightline Online. 21 June 2006. 22 June 2006 http://abcnews.go.com/Video/playerIndex?id=2105341>. Bogost, Ian. Persuasive Games: Videogames and Procedural Rhetoric. Cambridge, MA: MIT Press, 2007. Game Politics. “Was Congress Misled by ‘Terrorist’ Game Video? We Talk to Gamer Who Created the Footage.” 11 May 2006. http://gamepolitics.livejournal.com/285129.html#cutid1>. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. julieb. “David Morgan Is a Horrible Writer and Should Be Fired.” Online posting. 5 May 2006. Dvorak Uncensored Cage Match Forums. http://cagematch.dvorak.org/index.php/topic,130.0.html>. Mahmood. “Terrorists Don’t Recruit with Battlefield 2.” GGL Global Gaming. 16 May 2006 http://www.ggl.com/news.php?NewsId=3090>. Morgan, David. “Islamists Using U.S. Video Games in Youth Appeal.” Reuters online news service. 4 May 2006 http://today.reuters.com/news/ArticleNews.aspx?type=topNews &storyID=2006-05-04T215543Z_01_N04305973_RTRUKOC_0_US-SECURITY- VIDEOGAMES.xml&pageNumber=0&imageid=&cap=&sz=13&WTModLoc= NewsArt-C1-ArticlePage2>. Ong, Walter J. Orality and Literacy: The Technologizing of the Word. London/New York: Methuen, 1982. Parker, Trey. Online posting. 7 May 2006. 9 May 2006 http://www.treyparker.com>. Plato. “Gorgias.” Plato: Collected Dialogues. Princeton: Princeton UP, 1961. Shrader, Katherine. “Pentagon Surfing Thousands of Jihad Sites.” Associated Press 4 May 2006. SonicJihad. “SonicJihad: A Day in the Life of a Resistance Fighter.” Online posting. 26 Dec. 2005. Planet Battlefield Forums. 9 May 2006 http://www.forumplanet.com/planetbattlefield/topic.asp?fid=13670&tid=1806909&p=1>. Tapper, Jake, and Audery Taylor. “Terrorist Video Game or Pentagon Snafu?” ABC News Nightline 21 June 2006. 30 June 2006 http://abcnews.go.com/Nightline/Technology/story?id=2105128&page=1>. U.S. Congressional Record. Panel I of the Hearing of the House Select Intelligence Committee, Subject: “Terrorist Use of the Internet for Communications.” Federal News Service. 4 May 2006. Welch, Kathleen E. Electric Rhetoric: Classical Rhetoric, Oralism, and the New Literacy. Cambridge, MA: MIT Press, 1999. Citation reference for this article MLA Style Losh, Elizabeth. "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/08-losh.php>. APA Style Losh, E. (Oct. 2007) "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/08-losh.php>.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography