Journal articles on the topic 'Improvised explosive devices – Computer simulation'

To see the other types of publications on this topic, follow the link: Improvised explosive devices – Computer simulation.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 33 journal articles for your research on the topic 'Improvised explosive devices – Computer simulation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Santos, Anastasio P., Ricardo Castedo, Lina M. López, María Chiquito, José I. Yenes, Alejandro Alañón, Elisa Costamagna, and Santiago Martínez-Almajano. "Reinforced Concrete Building with IED Detonation: Test and Simulation." Applied Sciences 12, no. 15 (August 3, 2022): 7803. http://dx.doi.org/10.3390/app12157803.

Full text
Abstract:
There is growing concern about the possibility of a suicide bomber being immolated when the army forces or the law enforcement agencies discover the place where they prepare their material or simply find themselves inside a building. To study the possible effects that these improvised explosive devices (IEDs) would have on the structures, eight tests were carried out with various configurations of IEDs with vest bombs inside a reinforced concrete (including walls and roof) building constructed ad hoc for these tests. These vests were made with different explosives (black powder, ANFO, AN/AL, PG2). For the characterization of these tests, a high-speed camera and pressure and acceleration sensors were used. The structure behaved surprisingly well, as it withstood all the first seven detonations without apparent structural damage. In the last detonation, located on the ground and with a significant explosive charge, the structural integrity of the roof and some of the walls was compromised. The simulation of the building was carried out with the LS-DYNA software with a Lagrangian formulation for the walls, using the LBE (based on CONWEP) module for the application of the charge. Despite the difficulty of this simulation, the results obtained, in terms of applied pressures and measured accelerations, are acceptable with differences of about 20%.
APA, Harvard, Vancouver, ISO, and other styles
2

Langdon, Genevieve S., Ruixuan Qi, Trevor J. Cloete, and Steeve Chung Kim Yuen. "Influence of Ball Bearing Size on the Flight and Damage Characteristics of Blast-Driven Ball Bearings." Applied Sciences 12, no. 3 (January 21, 2022): 1133. http://dx.doi.org/10.3390/app12031133.

Full text
Abstract:
This paper presents insights into the influence of ball size on the flight characteristics and damage of a ball bearing embedded in a rear detonated cylindrical charge. It includes results from a post-test damage analysis of ball bearings from previously reported experiments. Computational simulations using Ansys Autodyn were used to provide extra information about the velocity variation during flight and the damage sustained by the ball bearings during the blast event. The influence of bearing size (diameter and mass) was investigated using the validated simulation models to extend the dataset beyond the initial experimental work. The peak bearing velocity is influenced by the charge mass to ball bearing mass ratio and the aspect ratio of the charge. Larger ball bearings require extra momentum to accelerate them to higher velocities, but their higher surface area means a greater portion of the explosive charge is involved in transferring kinetic energy to the projectile. Tensile spalling was to be the major damage mechanism within the ball bearings. The charge aspect ratio also influenced the hydrostatic pressure propagation within the ball bearing itself, affecting the location and degree of internal cracking within the bearings. These findings will prove valuable to blast protection engineers considering the effects of embedded projectiles in improvised explosive devices.
APA, Harvard, Vancouver, ISO, and other styles
3

Price, Matthew A., Vinh-Tan Nguyen, Oubay Hassan, and Ken Morgan. "An approach to modeling blast and fragment risks from improvised explosive devices." Applied Mathematical Modelling 50 (October 2017): 715–31. http://dx.doi.org/10.1016/j.apm.2017.06.015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Colreavy-Donnelly, Simon, Fabio Caraffini, Stefan Kuhn, Mario Gongora, Johana Florez-Lozano, and Carlos Parra. "Shallow buried improvised explosive device detection via convolutional neural networks." Integrated Computer-Aided Engineering 27, no. 4 (September 11, 2020): 403–16. http://dx.doi.org/10.3233/ica-200638.

Full text
Abstract:
The issue of detecting improvised explosive devices, henceforth IEDs, in rural or built-up urban environments is a persistent and serious concern for governments in the developing world. In many cases, such devices are plastic, or varied metallic objects containing rudimentary explosives, which are not visible to the naked eye and are difficult to detect autonomously. The most effective strategy for detecting land mines also happens to be the most dangerous. This paper intends to leverage the use of a Convolutional Neural Network (CNN) to aid in the discovery of such IEDs. As part of a related project, an autonomous sensor array was used to detect the devices in terrains too hazardous for a human to survey. This paper presents a CNN and its training methodology, suitable to make use of the sensor system. This convolutional neural network can accurately distinguish between a potential IED and surrounding undergrowth and natural features of the environment in real-time. The training methodology enabled the CNN to successfully recognise the IEDs with an accuracy of 98.7%, in well-lit conditions. The results are evaluated against other convolutional neural systems as well as against a deterministic algorithm, showing that the proposed CNN outperforms its competitors including the deterministic method.
APA, Harvard, Vancouver, ISO, and other styles
5

Heider, S. A., and W. L. Dunn. "A simulation study of fast neutron interrogation for standoff detection of improvised explosive devices." Radiation Physics and Chemistry 116 (November 2015): 341–44. http://dx.doi.org/10.1016/j.radphyschem.2015.04.013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bajić, Milan, and Milan Bajić. "Modeling and Simulation of Very High Spatial Resolution UXOs and Landmines in a Hyperspectral Scene for UAV Survey." Remote Sensing 13, no. 5 (February 24, 2021): 837. http://dx.doi.org/10.3390/rs13050837.

Full text
Abstract:
This paper presents methods for the modeling and simulation of explosive target placement in terrain spectral images (i.e., real hyperspectral 90-channel VNIR data), considering unexploded ordnances, landmines, and improvised explosive devices. The models used for landmine detection operate at sub-pixel levels. The presented research uses very fine spatial resolutions, 0.945 × 0.945 mm for targets and 1.868 × 1.868 cm for the scene, where the number of target pixels ranges from 52 to 116. While previous research has used the mean spectral value of the target, it is omitted in this paper. The model considers the probability of detection and its confidence intervals, which are derived and used in the analysis of the considered explosive targets. The detection results are better when decreased target endmembers are used to match the scene resolution, rather than using endmembers at the full resolution of the target. Unmanned aerial vehicles, as carriers of snapshot hyperspectral cameras, enable flexible target resolution selection and good area coverage.
APA, Harvard, Vancouver, ISO, and other styles
7

Paulo, Eugene P., Richard Jimenez, Bobby Rowden, and Christopher Causee. "Simulation Analysis of a System to Defeat Maritime Improvised Explosive Devices (MIED) in a US Port." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 7, no. 2 (April 2010): 115–25. http://dx.doi.org/10.1177/1548512910365849.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Garcia-Fernandez, Maria, Yuri Alvarez Lopez, and Fernando Las-Heras Andres. "Airborne Multi-Channel Ground Penetrating Radar for Improvised Explosive Devices and Landmine Detection." IEEE Access 8 (2020): 165927–43. http://dx.doi.org/10.1109/access.2020.3022624.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Alterman, Dariusz, Mark G. Stewart, and Michael D. Netherton. "Probabilistic assessment of airblast variability and fatality risk estimation for explosive blasts in confined building spaces." International Journal of Protective Structures 10, no. 3 (May 15, 2019): 306–29. http://dx.doi.org/10.1177/2041419619849083.

Full text
Abstract:
Explosive blasts in confined building spaces, such as lobbies or foyers, can amplify blast loads. This article uses the computational fluid dynamics model ProsAir to estimate blast loads in a typical ground floor lobby of a commercial or government building. Monte-Carlo simulation is used to probabilistically model the effect that variability and uncertainty of charge mass and location, net equivalent quantity factor, temperature, atmospheric pressure and model errors have on airblast variability. The analysis then calculates the probability of casualties due to the effects of pressure and impulse, where human vulnerability due to the effects of pressure and impulse is a function of lung rupture, whole-body displacement or skull fracture (or the combination of the three). The terrorist threats considered are improvised explosive devices ranging in mass from 5 kg (backpack bomb) to 23 kg (suitcase bomb) detonated in various locations inside the building. As expected, blast pressure and fatality risks are dependent on the type of facade glazing (e.g. vulnerable glazing allows venting of the blast), improvised explosive device size and location. It was found that the mean fatality risk for a 23 kg terrorist improvised explosive device is 8.6%, but there is a 5% chance that fatality risks can exceed 20%. It was also found that a probabilistic analysis yielded lower mean fatality risks than a deterministic analysis. The effect of venting was also significant. Mean fatality risks increased by up to 10-fold if there was no venting (i.e. a bunker-like structure without windows), but reduced by about 30% for a fully vented structure (i.e. no windows). This probabilistic analysis allows decision-makers to be more aware of terrorism risks to building occupants, and how improved building design and security measures may ameliorate these risks.
APA, Harvard, Vancouver, ISO, and other styles
10

Ródenas-García, José F., Ramón A. Otón-Martínez, Joaquín Sancho-Val, Oscar de Francisco Ortiz, Roberto Jiménez Pacheco, and Iván Gil Garnacho. "Experimental Evaluation of the Factors That Influence Cylindrical Water Projection Devices against IEDs." Applied Sciences 13, no. 2 (January 15, 2023): 1167. http://dx.doi.org/10.3390/app13021167.

Full text
Abstract:
Terrorists usually employ Improvised Explosive Devices (IEDs) to cause maximum damage with a single action, in asymmetric war scenarios. In the counter-terrorism fight, bomb disposal specialists have to combat these instruments by safeguarding their lives, avoiding fortuitous IED explosion, and preserving evidence of the device that could lead to the capture of the perpetrators. Some very effective deactivation tools that combine these features are high-speed water-explosive projection devices. To understand and quantify the impacts of the many factors that intervene in their operation and effectiveness, extensive experimental tests should be conducted. However, Operations Research techniques allow robust results to be obtained by minimizing experiments. This study focuses on the use of Design of Experiments (DoE), with a factorial experiment plan divided into two levels, to analyze the influence of the amount of explosive, the diameter of the device (that is, the mass of water to be projected), the density of the water, the distance at which the IED is located, and the resistance of the inner tube material. Results show that the mass of explosive, the diameter of the device, the interaction of the mass of explosive and the density of the water, and the interaction between the resistance of the inner tube and the diameter of the container have a strong influence on the speed of projected water.
APA, Harvard, Vancouver, ISO, and other styles
11

Hyvernaud, Jérémy, Edson Martinod, Valérie Bertrand, Romain Négrier, Joël Andrieu, and Michèle Lalande. "Design of a High-Power UWB Antenna Incorporating a Solid Dielectric for Electronic Warfare Applications." International Journal of Antennas and Propagation 2021 (August 9, 2021): 1–7. http://dx.doi.org/10.1155/2021/3040640.

Full text
Abstract:
In this paper, a high-power ultrawideband antenna is presented for the purpose of remotely neutralizing improvised explosive devices. The developed antenna has a bandwidth between 230 MHz and 2 GHz, as well as a maximum realized gain of 18.7 dB. The antenna structure incorporates a solid dielectric (HDPE 1000) so that it can be powered, without risk of a possible breakdown voltage, by a Marx generator which delivers a bipolar pulse with a peak amplitude of +/−250 kV, a rise time of 170 ps, and a duration of 1 ns. The radiated electric field obtained in simulation is, respectively, 1 MV/m peak and 126 kV/m peak at a distance of 1 m and 10 m.
APA, Harvard, Vancouver, ISO, and other styles
12

Sławiński, Grzegorz, Piotr Malesa, and Marek Świerczewski. "Analysis Regarding the Risk of Injuries of Soldiers Inside a Vehicle during Accidents Caused by Improvised Explosive Devices." Applied Sciences 9, no. 19 (September 29, 2019): 4077. http://dx.doi.org/10.3390/app9194077.

Full text
Abstract:
This article presents the description of the mechanism of selected dysfunctions of the human skeletal system and internal organs. The problem is wide and requires extensive experimental and numerical research. This article presents the outline of the problem regarding the creation of personal injuries of soldiers inside armored vehicles. The explanation of the mechanism of injuries caused as a result of strong effects of pulse forces, resulting from both the consequences of the wave of pressure created during an explosion, as well as high accelerations of the vehicle’s hull, is presented herein. Examples of the results of numerical analyses of the pressure wave impact from an explosion are presented in the Article. LS-Dyna software was used to perform the numerical calculations. The analyses were carried out using the Conwep algorithm implemented in the calculation code. The significance of calculation methods, thanks to which it is possible to recreate a simulation in which there is a risk of injuries of soldiers without posing a threat to their health and life, should be noted here. The main parts of the human body, such as the bottom limb, the pelvic belt, the cervical spine and the abdomen, have been considered. Mechanisms causing typical injuries of soldiers inside vehicles under which explosives are detonated have been analyzed for particular body parts through multiple numerical simulations. The analysis of the process of injury creation has been conducted on the basis of the statistical data regarding the most common injuries of soldiers. The validation process of numerical analyses was carried out using the results of experimental research.
APA, Harvard, Vancouver, ISO, and other styles
13

Sławiński, Grzegorz, and Tadeusz Niezgoda. "Protection of Occupants Military Vehicles Against Mine Threats and Improvised Explosive Devices (IED) / Ochrona Załogi Pojazdu Wojskowego Przed Wybuchem Min i Improwizowanych Urządzeń Wybuchowych (IED)." Journal of KONBiN 33, no. 1 (September 1, 2015): 113–22. http://dx.doi.org/10.1515/jok-2015-0009.

Full text
Abstract:
Abstract Risk of danger for military vehicle crew life and health increases when explosion under vehicle appears. Consideration of this phenomenon in the aspect of soldiers safety is based on coupled analysis of soldier’s body, car seat and vehicle construction elements. As the effect of blast wave interaction the vibrations of construction and passanger body acceleration appear. In the paper the analysis of improvised explosive device (IED) detonation under the military vehicle was carried out in the aspect of soldier neck spine injury. The analysis was made with the usage of numerical methods in LS Dyna computer code and considered the changeble values of displacement and acceleration registered during detonation.
APA, Harvard, Vancouver, ISO, and other styles
14

Chiquito, Maria, Ricardo Castedo, Lina M. Lopez, Anastasio P. Santos, Juan M. Mancilla, and Jose I. Yenes. "Blast Wave Characteristics and TNT Equivalent of Improvised Explosive Device at Small scaled Distances." Defence Science Journal 69, no. 4 (July 15, 2019): 328–35. http://dx.doi.org/10.14429/dsj.69.13637.

Full text
Abstract:
A significant number of airblast test have been carried out with the purpose to characterise and analyse the properties of improvised explosive device (IED) with non-conventional explosives in terms of knowing the effects on people and/or structures. Small devices with 1.5 kg of explosive, initiated with a detonating cord have been studied. Seven different mixtures have been tested with two types of ammonium nitrate AN (technical and fertilizer) in different forms like prills or powder. In some cases, the ammonium nitrate has been mixed with fuel oil while in others, it has been mixed with aluminum. The TNT equivalent based on pressure, impulse, arrival time, positive phase duration and shock front velocity have been calculated and analysed for each mixture. Comparing the field test data obtained with respect to the representation of the UFC 3-340-02 values, it can be seen that the parameters measured are consistent. The IEDs with fertilizer ammonium nitrate do not detonate with the present charge conditions so the shockwave generated is only due to the detonating cord. When using the technical ammonium nitrate, ANFO can partially detonate and generate a potentially dangerous shockwave. Finally, the IED with AN and aluminum produces a TNT equivalent close to one when the technical AN is used.
APA, Harvard, Vancouver, ISO, and other styles
15

Hu, Bo, Guo Qiang Li, Su Wen Chen, and Wen Long Shi. "State-of-the-Art Review on Anti-Ram Bollards." Applied Mechanics and Materials 90-93 (September 2011): 3206–13. http://dx.doi.org/10.4028/www.scientific.net/amm.90-93.3206.

Full text
Abstract:
Perimeter protection is an important physical protection approach for buildings and infrastructures, which is also regarded as the first line of protection. Vehicle borne improvised explosive devices (VBIED) have been recognized as a major design threat by many government agencies for years, since they have been so extensively used in past terrorist attacks against critical buildings and infrastructures. Preventing unauthorized vehicles from approaching a protected area with vehicle barriers installed in perimeter of the buildings and infrastructures would consequently reduce blast and debris threats. The history of test certification standard for vehicle barriers is briefly reviewed. The research achievements on anti-ram bollards, one type of vehicle barriers, in the fields of crash test, numerical simulation, and design theory are presented. The remaining problems and deficiencies of the research are pointed out and the corresponding proposals are put forward. Finally, some further research works on anti-ram bollards are proposed.
APA, Harvard, Vancouver, ISO, and other styles
16

Trană, Eugen, Marin Lupoae, Bogdan Iftimie, and Alexandru Cătălin Casapu. "Assessment of the Sympathetic Detonation of Blasting Caps." Applied Sciences 12, no. 24 (December 12, 2022): 12761. http://dx.doi.org/10.3390/app122412761.

Full text
Abstract:
The neutralization of improvised explosive devices (IEDs) involves the use of disrupting agents propelled explosively. Due to the special nature of such materials, a proper investigation of the parts most susceptible to sympathetic detonation is in order. The initiation of IEDs is caused by detonation products, shock waves, and propelled disruptive agents. In this paper, initiation of IED composition (acceptor charge) due to the neutralization system’s (donor charge’s) explosive charge detonation is evaluated based on the influence of the first two of the three above-mentioned factors. One of the most susceptible components of IEDs to sympathetic initiation is the blasting cap. Based on an experimental and numerical mix approach, blasting cap tendency to sympathetic detonation in open field had been investigated. The suitability of critical energy fluence and Chapman–Jouguet threshold criteria to the sympathetic detonation tendency of blasting caps was investigated. Experimental and numerical/analytical results describing the phenomenon are in agreement.
APA, Harvard, Vancouver, ISO, and other styles
17

AKBULUT, Ozkan, and Ahmet Gungor PAKFILIZ. "Buried Wire Detection and Clustering Algorithm with Ground Penetrating Radar." Review of Computer Engineering Research 9, no. 4 (October 14, 2022): 222–38. http://dx.doi.org/10.18488/76.v9i4.3168.

Full text
Abstract:
Improvised explosive devices (IEDs) have recently become a considerable national security concern for governments due to their increased use. Since IEDs do not have a particular shape, detecting and classifying IEDs becomes a complex problem. Due to the irregularity of the wire shape, recent research focuses on detecting command wire, which is the triggering mechanism in IEDs. This study proposes a detection and clustering algorithm for wire detection. The synthetic data were generated using the gprMax software, an open-source Finite-Difference Time-Domain (FDTD) simulation environment. Different wire and clutter orientations were simulated while creating a 2D GPR database. Three different prescreening algorithms are compared concerning computational time and signal-to-noise ratio. The Go Decomposition (GoDec) method was used at the preprocessing stage. Discriminating the buried wire from clutter was conducted using the k-means clustering method. The proposed algorithm results show promising outcomes over simulated GPR 2D C-scans.
APA, Harvard, Vancouver, ISO, and other styles
18

Sotomayor, Teresita M., Margaret P. Bailey, and Stephen L. Dorton. "Using Simulation to Address a Training Gap in Battlefield Ocular Trauma: A Lateral Canthotomy and Cantholysis (LCC) Prototype Training System." Military Medicine 184, Supplement_1 (March 1, 2019): 335–41. http://dx.doi.org/10.1093/milmed/usy285.

Full text
Abstract:
Abstract Over the past 15 years of conflict, eye injuries have ocurred at a steady rate of 5–10% of combat casualties, attributed to the enemy’s use of improvised explosive devices. Many of these injuries result in a compartment syndrome of the orbit, easily decompressed through the use of a simple procedure called a Lateral Canthotomy and Cantholysis (LCC). Current training curricula at the U.S. Army Center for Pre-Hospital Medicine at Fort Sam Houston, Texas incorporates LCC training presented in lectures and taught using cadavers and goats (resources permitting), but lacks a LCC training device for the development of psychomotor skills. Requirements analysis, iterative design and development, and testing were performed for a simulation-based training system that may be used to practice the LCC procedure. Subject matter experts have conducted numerous reviews of the prototype system, where feedback is used to drive subsequent designs. Further work, including formal analysis of training effectiveness, will be performed to validate the training system. This will benefit will benefit military and civilian training programs by training psychomotor skills to enhance competency in the LCC procedure for preserving eyesight.
APA, Harvard, Vancouver, ISO, and other styles
19

Klomp, Sander R., Dennis W. J. M. van de Wouw, and Peter H. N. de With. "Real-time Small-object Change Detection from Ground Vehicles Using a Siamese Convolutional Neural Network." Journal of Imaging Science and Technology 63, no. 6 (November 1, 2019): 60402–1. http://dx.doi.org/10.2352/j.imagingsci.technol.2019.63.6.060402.

Full text
Abstract:
Abstract Detecting changes in an uncontrolled environment using cameras mounted on a ground vehicle is critical for the detection of roadside Improvised Explosive Devices (IEDs). Hidden IEDs are often accompanied by visible markers, whose appearances are a priori unknown. Little work has been published on detecting unknown objects using deep learning. This article shows the feasibility of applying convolutional neural networks (CNNs) to predict the location of markers in real time, compared to an earlier reference recording. The authors investigate novel encoder‐decoder Siamese CNN architectures and introduce a modified double-margin contrastive loss function, to achieve pixel-level change detection results. Their dataset consists of seven pairs of challenging real-world recordings, and they investigate augmentation with artificial object data. The proposed network architecture can compare two images of 1920 × 1440 pixels in 27 ms on an RTX Titan GPU and significantly outperforms state-of-the-art networks and algorithms on our dataset in terms of F-1 score by 0.28.
APA, Harvard, Vancouver, ISO, and other styles
20

Pešić, Miloš, Nikola Jović, Vladimir Milovanović, Mladen Pantić, and Miroslav Živković. "FE mesh density influence on blast loading analysis." IOP Conference Series: Materials Science and Engineering 1271, no. 1 (December 1, 2022): 012016. http://dx.doi.org/10.1088/1757-899x/1271/1/012016.

Full text
Abstract:
Abstract To examine the influence of mesh density on the blast loads of anti-landmines (ALMs) and improvised explosive devices (IEDs) under an armored vehicle, models with different FE mesh densities were numerically analysed. The multi-material arbitrary Lagrangian-Eulerian (MM-ALE) algorithm was used to simulate under armored vehicle explosions. Explicit dynamic analysis was performed in LS-DYNA. Blast loading simulation was performed using the ConWep (conventional weapon) loading model, which is implemented in LS-DYNA. The material characteristics of high-strength steel were used to model the protective plates on the armored vehicle. Protective plates were modeled in a V-shape and as a deformable solid with the Johnson-Cook plasticity model. In this paper, the FE model with different mesh densities was numerically tested to analyse the influence of mesh density on the obtained results. For the purposes of the modeling, different types of finite elements were used for the FE models. The floor of the vehicle was modeled with 3D hexahedral eight-noded finite elements, and the protective plates were modeled with four-noded plate finite elements. The maximal value of plastic strain and the maximal value of the displacement of the central node on the protective plate was chosen as the parameters to compare the obtained results.
APA, Harvard, Vancouver, ISO, and other styles
21

Fox, William P., John Binstock, and Mike Minutas. "Modeling and Methodology for Incorporating Existing Technologies to Produce Higher Probabilities of Detecting Suicide Bombers." International Journal of Operations Research and Information Systems 4, no. 3 (July 2013): 1–18. http://dx.doi.org/10.4018/joris.2013070101.

Full text
Abstract:
Among the many weapons currently used by terrorist organizations against public welfare and coalition forces, human-born Improvised Explosive Devices (IEDs) present a significant threat. Commonly referred to as suicide bombers, these individuals enter crowded public areas in order to detonate their IED, inflicting lethal damage to the surrounding individuals. Constructed of non-standard parts and hidden under layers of clothing, these human-born IEDs go undetected until detonated. Currently, there are no detection systems that can identify suicide bombers at adequate standoff distances. The authors developed models and a methodology that examine current technologies to increase the probability of identifying a suicide bomber at a checkpoint or marketplace with an adequate standoff distance. The proposed methodology employs sensor technology incorporating unique detection threshold values. The authors analyze our proposed methodology utilizing a simulation model that provides both the probability of detecting a bomber and the probability of a false detection. These simulations will allow us to determine the threshold values for each sensor that result in the best probability of detection of a suicide bomber and allows for a small probability of false detections. Using experimentally “good” threshold values, the authors were able to drastically increase the probability of detection with a combination of radar and thermal imagery. In this paper, the main sensor is the hand-held radar.
APA, Harvard, Vancouver, ISO, and other styles
22

Parate, Bhupesh Ambadas, K. D. Deodhar, and V. K. Dixit. "Qualification Testing, Evaluation and Test Methods of Gas Generator for IEDs Applications." Defence Science Journal 71, no. 4 (July 1, 2021): 462–69. http://dx.doi.org/10.14429/dsj.71.16601.

Full text
Abstract:
In this work, the design qualification testing, evaluation and test methods of gas generator using double base (DB) propellant having square flake shape is explained for an improvised explosive devices (IEDs) applications. Various kinds of the gas generators are used to save life of an aeronaut in the fastest way from the disable fighter aircraft. Due to their ruggedised design, compactness, safe transportation, repeatability in performance and quick operation, the gas generator are used. The gas generator is designed and developed keeping functional, mechanical and structural requirements in mind. The gas generators are subjected to the various qualification tests, electrical characterisation followed by closed vessel (CV) firings at hot and cold temperatures. The gas generators after the successful qualification tests are validated through the ground trials i.e. dynamic firing of disruptor during the development phase. The damage caused due to impact of the projectile is assessed in terms of crater as acceptance criteria at stand-off distance of 0.5 m and 1m. The gas generator discussed in this research article is used to disrupt the suspected IEDs by creating a high-speed jet using water-jet disruptor. In conclusion, after successful qualification testing, the gas generator for IEDs application meets all the specifications as per user’s requirements.
APA, Harvard, Vancouver, ISO, and other styles
23

Белкин, М. Е., А. В. Алешин, Д. А. Фофанов, and А. С. Сигов. "Исследование радиофотонного принципа построения реактивного блокиратора радиоуправляемых взрывных устройств." Письма в журнал технической физики 46, no. 22 (2020): 31. http://dx.doi.org/10.21883/pjtf.2020.22.50305.18420.

Full text
Abstract:
A new approach to design an ultra-wideband jammer of radio-controlled explosive devices, in which a multichannel processing unit based on a set of narrowband radio-signal receiving channels with the introduction of noise interference into each channel is replaced by a single-channel microwave-photonics analogue using an optoelectronic radio-signal processor based on an optical recirculation circuit to suppress the channel of the firing code transmission, is proposed and preliminarily investigated. The layout and results of computer simulation for the proposed optoelectronic processor when transmitting standard telecommunication radio signals that confirm the possibility and determine the basic conditions for blocking a radio channel, are highlighted.
APA, Harvard, Vancouver, ISO, and other styles
24

Zhou, Tianchi, Peng Sun, and Rui Han. "An Active Path-Associated Cache Scheme for Mobile Scenes." Future Internet 14, no. 2 (January 19, 2022): 33. http://dx.doi.org/10.3390/fi14020033.

Full text
Abstract:
With the widespread growth of mass content, information-centric networks (ICN) have become one of the research hotspots of future network architecture. One of the important features of ICN is ubiquitous in-network caching. In recent years, the explosive growth of mobile devices has brought content dynamics, which poses a new challenge to the original ICN caching mechanism. This paper focuses on the WiFi mobile scenario of ICN. We design a new path-associated active caching scheme to shorten the time delay of users obtaining content to enhance the user experience. In this article, based on the WiFi scenario, we first propose a solution for neighbor access point selection from a theoretical perspective, considering the caching cost and transition probability. The cache content is then forwarded based on the selected neighbor set. For cached content, we propose content freshness according to mobile characteristics and consider content popularity at the same time. For cache nodes, we focus on the size of the remaining cache space and the number of hops from the cache to the user. We have implemented this strategy based on the value of caching on the forwarding path. The simulation results show that our caching strategy has a significant improvement in performance compared with active caching and other caching strategies.
APA, Harvard, Vancouver, ISO, and other styles
25

Kim, Sungwook. "A New Multicasting Device-to-Device Communication Control Scheme for Virtualized Cellular Networks." Wireless Communications and Mobile Computing 2019 (February 13, 2019): 1–9. http://dx.doi.org/10.1155/2019/3540674.

Full text
Abstract:
With the explosion in the number of wireless services, the unprecedented growth of mobile date traffic has brought a heavy burden on the traditional cellular networks. To meet the explosive traffic services, the potential of network virtualization and multicasting device-to-device (MD2D) technology have been proposed as a promising solution for next-generation networks. In this paper, we propose a novel MD2D control scheme for virtualized cellular networks, which enables device clustering for local MD2D services to obtain the finest system performance. By taking into consideration dynamic situations and competitive environments, we formulate our control algorithms as a game model with imperfect system information. Inspired by the incentive mechanism and evolutionary decision process, the proposed game approach can guide selfish mobile devices toward honest behaviors, and the MD2D services are provided based on the step-by-step interactive feedback process. Through numerical evaluation and simulation analysis, we not only quantify the outcome of our proposed scheme’s system throughput, bandwidth utilization, and MD2D service efficiency, but also provide the performance comparison with existing schemes. Finally, we provide further challenges and various opportunities in the research area of MD2D-enabled cellular network operations.
APA, Harvard, Vancouver, ISO, and other styles
26

Liu, Yong, Jingya Zhao, Qinghua Zhu, and Yanqiu Wang. "An Improved Method for Parametric Spatial Spectrum Estimation in Internet of Things." Wireless Communications and Mobile Computing 2021 (May 5, 2021): 1–10. http://dx.doi.org/10.1155/2021/9976751.

Full text
Abstract:
When massive numbers of wireless IoT devices are being deployed, cognitive spectrum management is critical to satisfy the explosive broadband requirements of IoT applications. Heterogeneous the target of the spatial spectrum estimation which is part of array signal processing is to achieve the evaluation of space signal parameters and source location, which result in that the spatial spectrum estimation becomes the most basic content of the array signal processing. It needs a method by which the large dimensional array still has its consistency. Therefore, this paper studies an improved large dimensional array parameterized spatial spectrum estimation method based on Pisarenko method, named G-Pisarenko method. Firstly, an improved estimator about the logarithm of the covariance matrix of a certain bilinear form is analyzed which is based on the theory of large dimension random matrix. We can find out a relatively better method, i.e., MW method. The method will become the primitive method for us to improve. Then, aimed at the relating covariance matrix in MW, we use an improved large dimensional array estimation method which can improve the logarithm of the covariance matrix estimation. Finally, we compare the improved method and the original method by simulation, and it can be seen the clear advantage of G-Pisarenko method when the sample number and observed dimensions are in the same order of magnitude.
APA, Harvard, Vancouver, ISO, and other styles
27

Bhupesh A. Parate, Prashant Potdar, Sunil Chandel, and Himanshu Shekhar. "Light Weight Aluminum Cartridge Case Design for IED’s Application - ANSYS." Journal of Modern Mechanical Engineering and Technology 7 (June 25, 2020): 16–26. http://dx.doi.org/10.31875/2409-9848.2020.07.3.

Full text
Abstract:
This paper describes the design analysis of the aluminum cartridge case, its testing, Analytical Simulation (ANSYS) and evaluation against Improvised Explosive Devices (IEDs) applications. Aluminum material is light in weight, non-corrosive and compatible with the propellant. Because of excellent properties, it is widely used in defence application sector. In the armament system, an effort is being made to reduce the cost, the weight of material from logistic point of view and its manufacturing process so as to meet the design requirements. Brass cartridge cases are being widely used in various types of ammunition for last 100 years e.g. armaments of small arm cartridges, artillery shell and power cartridges for fighter aircraft. Cartridges are made of either aluminum, steel or brass is filled with the propellants and pyrotechnic composition. With suitable means of ignition, the propellant generates the hot combustion gases at high pressure and temperature. These combustion gases are utilized to perform certain work on the system. The aluminum cartridge case for water disruptor applications plays a significant role in the destruction of the suspicious objects. This paper discusses the design aspects of the aluminum cartridge case for disruptor application of suspected IEDs. Performance evaluation parameters i.e. maximum pressure (Pmax) and time to reach maximum pressure (TPmax) of aluminum cartridge have been carried out in a Closed Vessel (CV) using a Data Acquisition System (DAS). The material properties of aluminum such as tensile strength, percentage elongation and yield strength are determined using a Universal Testing Machine (UTM). Using the data obtained by the above methods, an attempt has been made to determine stress, strain and deformation of the cartridge case theoretically and numerically using ANSYS software. The results obtained by both methods are compared. The results are in good agreement with each other. It is observed that the percentage error for von -Mises stresses is 10.2 % using numerical and theoretical approaches. The percentage error between numerical and theoretical values of the hoop and longitudinal stresses are 6.71 % and 6.78 %. The percentage error between numerical and theoretical values of the hoop and longitudinal strains are 1.36 % and 3.64 %. The errors between theoretical and numerical values for radial displacements are 2.83 %. The novelty in this research work is that the design analysis of aluminium cartridge case is carried out using ANSYS software simulating the real- world problem. The analytical results are compared with numerical results. The actual pressure experienced by the cartridge case generated by the propellant burning is taken into consideration. This pressure is measured by a pressure transducer fitted over a specially designed test rig using a DAS. The sample of aluminum case is tested for hardness and microstructure. The results show there is no significant difference before and after the hardness and microstructure of the material. The results of ANSYS for stress and strain are in good agreement with theoretically calculated results and numerical analysis as percentage error is less than 11. This draws the inference for validating numerical and theoretical results. It is seen that 57.352 % saving in weight using aluminum cartridge is achieved. Using ANSYS, hoop stress 382.7 MPa, Hoop strain 4.32x10-3, longitudinal strain 0.8602x10-3 and longitudinal stress 191.5 MPa are estimated. The main objective of this paper is to carry out design and analysis of aluminum cartridge case analytically as well as numerically.
APA, Harvard, Vancouver, ISO, and other styles
28

Notghi, Bahram, Rajneesh Bhardwaj, Shantanu Bailoor, Kimberly A. Thompson, Ashley A. Weaver, Joel D. Stitzel, and Thao D. Nguyen. "Biomechanical Evaluations of Ocular Injury Risk for Blast Loading." Journal of Biomechanical Engineering 139, no. 8 (June 28, 2017). http://dx.doi.org/10.1115/1.4037072.

Full text
Abstract:
Ocular trauma is one of the most common types of combat injuries resulting from the exposure of military personnel with improvised explosive devices. The injury mechanism associated with the primary blast wave is poorly understood. We employed a three-dimensional computational model, which included the main internal ocular structures of the eye, spatially varying thickness of the cornea-scleral shell, and nonlinear tissue properties, to calculate the intraocular pressure and stress state of the eye wall and internal ocular structure caused by the blast. The intraocular pressure and stress magnitudes were applied to estimate the injury risk using existing models for blunt impact and blast loading. The simulation results demonstrated that blast loading can induce significant stresses in the different components of the eyes that correlate with observed primary blast injuries in animal studies. Different injury models produced widely different injury risk predictions, which highlights the need for experimental studies evaluating mechanical and functional damage to the ocular structures caused by the blast loading.
APA, Harvard, Vancouver, ISO, and other styles
29

Krishnaveni, G., D. Dominic Xavier, R. Sarathkumar, G. Kavitha, and M. Senbagan. "Simulation of Blast Induced Traumatic Brain Injury using Finite Element Method." International Journal of Vehicle Structures and Systems 13, no. 2 (June 7, 2021). http://dx.doi.org/10.4273/ijvss.13.2.17.

Full text
Abstract:
Because of increase in threat from militant groups and during war exposure to blast wave from improvised explosive devices, Traumatic Brain Injury (TBI), a signature injury is on rise worldwide. During blast, the biological system is exposed to a sudden blast over pressure which is several times higher than the ambient pressure causing the damage in the brain. The severity of TBI due to air blast may vary from brief change in mental status or consciousness (termed as mild) to extended period of unconsciousness or memory loss after injuries (termed as severe). The blast wave induced impact on head propagates as shock wave with the broad spectrum of frequencies and stress concentrations in the brain. The primary blast TBI is directly induced by pressure differentials across the skull/fluid/soft tissue interfaces and is further reinforced by the reflected stress waves within the cranial cavity, leading to stress concentrations in certain regions of the brain. In this paper, an attempt has been made to study the behaviour of a human brain model subjected to blast wave based on finite element model using LSDYNA code. The parts of a typical human head such as skull, scalp, CSF, brain are modelled using finite element with properties assumed based on available literature. The model is subjected to blast from frontal lobe, occipital lobe, temporal lobe of the brain. The interaction of the blast wave with the head and subsequent transformation of various forms of shock energy internally have been demonstrated in the human head model. The brain internal pressure levels and the shear stress distribution in the various lobes of the brain such as frontal, parietal, temporal and occipital are determined and presented.
APA, Harvard, Vancouver, ISO, and other styles
30

GAĆANOVIĆ, MIĆO, and NIKOLA DRAGOVIĆ. "NEW POSSIBILITIES FOR THE PASSIVE ELIMINATION OF STATIC ELECTRICITY." Safety Engineering 3, no. 2 (July 15, 2013). http://dx.doi.org/10.7562/se2013.3.02.03.

Full text
Abstract:
The new possibilities of passive elimination of static electricity, both in production processes and in everyday life are given in this paper. The paper considered passive solutions for elimination of static electricity which are the result of years of research in technological processes in which the concentrations of explosive and flammable mixtures and dust are present. The proposed solutions have the status of an internationally protected patent. A comparison between offered passive solutions and the present state of technology in both passive and active devices for the elimination of static electricity is made. Computer simulation of work and the level of the elimination of static electricity of the proposed passive devices for the elimination of static electricity for all phases of state (solid, liquid, gas and powder) is made and processed in a computer software MATLAB / Simulink v7.6 (R2010b). The obtained results are commented in the paper, and the risk assessment of possible electrostatic discharge in hazardous areas is made as defined by the Directive ATEX 137. Key words: electricity, passive devices for the elimination of static electricity, hazardous area, risk assessment, ATEX 137
APA, Harvard, Vancouver, ISO, and other styles
31

Navaneeth, Arathi, Vignesh P. P, Sreehari N. R, and K. Pramilarani. "Secure File/Data Transfer Between Airgap Network." International Journal of Scientific Research in Science, Engineering and Technology, July 20, 2021, 149–55. http://dx.doi.org/10.32628/ijsrset21843.

Full text
Abstract:
Wireless Data communication is fastest growing technology era in which the research society has recently embarked. Today, Computer data can include financial transactions such as electronic payments, M- wallets and sensitive multimedia contents. The explosive volumes of computer devices personal data, bring-up more attention to securely data storage rather than consideration on data privacy and confidentiality levels. In this scenario Air Gap Data Communication, Machine Leaning (ML) and image processing brings an important role in the electronic data management. It is always expensive and hard to manage the data manually without adopting machine learning and image processing techniques using metadata. The contribution of this research article is to demonstrate a securing computer data storage secrecy and privacy in cloud communication framework in terms of automatic data classification using computer training datasets with help of Training dataset which classifies the data based on the confidentiality level of the record with higher accuracy and powerful timelines as compared to the traditional KNN algorithms and RSA algorithm securing such confidential data category afterwards by applying various existing cryptographic solutions to assuring data privacy, confidentiality levels and alerting the use of abusive contents and simulation results demonstrates that reducing the overall cost. Training dataset which classifies the data based on the confidentiality level of the record with higher accuracy and powerful timelines as compared to the traditional KNN algorithms and RSA algorithm securing such confidential data category.
APA, Harvard, Vancouver, ISO, and other styles
32

Chesher, Chris. "Mining Robotics and Media Change." M/C Journal 16, no. 2 (March 8, 2013). http://dx.doi.org/10.5204/mcj.626.

Full text
Abstract:
Introduction Almost all industries in Australia today have adopted digital media in some way. However, uses in large scale activities such as mining may seem to be different from others. This article looks at mining practices with a media studies approach, and concludes that, just as many other industries, mining and media have converged. Many Australian mine sites are adopting new media for communication and control to manage communication, explore for ore bodies, simulate forces, automate drilling, keep records, and make transport and command robotic. Beyond sharing similar digital devices for communication and computation, new media in mining employ characteristic digital media operations, such as numerical operation, automation and managed variability. This article examines the implications of finding that some of the most material practices have become mediated by new media. Mining has become increasingly mediated through new media technologies similar to GPS, visualisation, game remote operation, similar to those adopted in consumer home and mobile digital media. The growing and diversified adoption of digital media championed by companies like Rio Tinto aims not only ‘improve’ mining, but to change it. Through remediating practices of digital mining, new media have become integral powerful tools in prospective, real time and analytical environments. This paper draws on two well-known case studies of mines in the Pilbara and Western NSW. These have been documented in press releases and media reports as representing changes in media and mining. First, the West Angelas mines in the Pilbara is an open cut iron ore mine introducing automation and remote operation. This mine is located in the remote Pilbara, and is notable for being operated remotely from a control centre 2000km away, near Perth Airport, WA. A growing fleet of Komatsu 930E haul trucks, which can drive autonomously, traverses the site. Fitted with radars, lasers and GPS, these enormous vehicles navigate through the open pit mine with no direct human control. Introducing these innovations to mine sites become more viable after iron ore mining became increasingly profitable in the mid-2000s. A boom in steel building in China drove unprecedented demand. This growing income coincided with a change in public rhetoric from companies like Rio Tinto. They pointed towards substantial investments in research, infrastructure, and accelerated introduction of new media technologies into mining practices. Rio Tinto trademarked the term ‘Mine of the future’ (US Federal News Service 1), and publicised their ambitious project for renewal of mining practice, including digital media. More recently, prices have been more volatile. The second case study site is a copper and gold underground mine at Northparkes in Western NSW. Northparkes uses substantial sensing and control, as well as hybrid autonomous and remote operated vehicles. The use of digital media begins with prospecting, and through to logistics of transportation. Engineers place explosives in optimal positions using computer modelling of the underground rock formations. They make heavy use of software to coordinate layer-by-layer use of explosives in this advanced ‘box cut’ mine. After explosives disrupt the rock layer a kilometre underground, another specialised vehicle collects and carries the ore to the surface. The Sandvik loader-hauler-dumper (LHD) can be driven conventionally by a driver, but it can also travel autonomously in and out of the mine without a direct operator. Once it reaches a collection point, where the broken up ore has accumulated, a user of the surface can change the media mode to telepresence. The human operator then takes control using something like a games controller and multiple screens. The remote operator controls the LHD to fill the scoop with ore. The fully-loaded LHD backs up, and returns autonomously using laser senses to follow a trail to the next drop off point. The LHD has become a powerful mediator, reconfiguring technical, material and social practices throughout the mine. The Meanings of Mining and Media Are Converging Until recently, mining and media typically operated ontologically separately. The media, such as newspapers and television, often tell stories about mining, following regular narrative scripts. There are controversies and conflicts, narratives of ecological crises, and the economics of national benefit. There are heroic and tragic stories such as the Beaconsfield mine collapse (Clark). There are new industry policies (Middelbeek), which are politically fraught because of the lobbying power of miners. Almost completely separately, workers in mines were consumers of media, from news to entertainment. These media practices, while important in their own right, tell nothing of the approaching changes in many other sectors of work and everyday life. It is somewhat unusual for a media studies scholar to study mine sites. Mine sites are most commonly studied by Engineering (Bellamy & Pravica), Business and labour and cultural histories (McDonald, Mayes & Pini). Until recently, media scholarship on mining has related to media institutions, such as newspapers, broadcasters and websites, and their audiences. As digital media have proliferated, the phenomena that can be considered as media phenomena has changed. This article, pointing to the growing roles of media technologies, observes the growing importance that media, in these terms, have in the rapidly changing domain of mining. Another meaning for ‘media’ studies, from cybernetics, is that a medium is any technology that translates perception, makes interpretations, and performs expressions. This meaning is more abstract, operating with a broader definition of media — not only those institutionalised as newspapers or radio stations. It is well known that computer-based media have become ubiquitous in culture. This is true in particular within the mining company’s higher ranks. Rio Tinto’s ambitious 2010 ‘Mine of the Future’ (Fisher & Schnittger, 2) program was premised on an awareness that engineers, middle managers and senior staff were already highly computer literate. It is worth remembering that such competency was relatively uncommon until the late 1980s. The meanings of digital media have been shifting for many years, as computers become experienced more as everyday personal artefacts, and less as remote information systems. Their value has always been held with some ambivalence. Zuboff’s (387-414) picture of loss, intimidation and resistance to new information technologies in the 1980s seems to have dissipated by 2011. More than simply being accepted begrudgingly, the PC platform (and variants) has become a ubiquitous platform, a lingua franca for information workers. It became an intimate companion for many professions, and in many homes. It was an inexpensive, versatile and generalised convergent medium for communication and control. And yet, writers such as Gregg observe, the flexibility of networked digital work imposes upon many workers ‘unlimited work’. The office boundaries of the office wall break down, for better or worse. Emails, utility and other work-related behaviours increasingly encroach onto domestic and public space and time. Its very attractiveness to users has tied them to these artefacts. The trail that leads the media studies discipline down the digital mine shaft has been cleared by recent work in media archaeology (Parikka), platform studies (Middelbeek; Montfort & Bogost; Maher) and new media (Manovich). Each of these redefined Media Studies practices addresses the need to diversify the field’s attention and methods. It must look at more specific, less conventional and more complex media formations. Mobile media and games (both computer-based) have turned out to be quite different from traditional media (Hjorth; Goggin). Kirschenbaum’s literary study of hard drives and digital fiction moves from materiality to aesthetics. In my study of digital mining, I present a reconfigured media studies, after the authors, that reveals heterogeneous media configurations, deserving new attention to materiality. This article also draws from the actor network theory approach and terminology (Latour). The uses of media / control / communications in the mining industry are very complex, and remain under constant development. Media such as robotics, computer modelling, remote operation and so on are bound together into complex practices. Each mine site is different — geologically, politically, and economically. Mines are subject to local and remote disasters. Mine tunnels and global prices can collapse, rendering active sites uneconomical overnight. Many technologies are still under development — including Northparkes and West Angelas. Both these sites are notable for their significant use of autonomous vehicles and remote operated vehicles. There is no doubt that the digital technologies modulate all manner of the mining processes: from rocks and mechanical devices to human actors. Each of these actors present different forms of collusion and opposition. Within a mining operation, the budgets for computerised and even robotic systems are relatively modest for their expected return. Deep in a mine, we can still see media convergence at work. Convergence refers to processes whereby previously diverse practices in media have taken on similar devices and techniques. While high-end PCs in mining, running simulators; control data systems; visualisation; telepresence, and so on may be high performance, ruggedised devices, they still share a common platform to the desktop PC. Conceptual resources developed in Media Ecology, New Media Studies, and the Digital Humanities can now inform readings of mining practices, even if their applications differ dramatically in size, reliability and cost. It is not entirely surprising that some observations by new media theorists about entertainment and media applications can also relate to features of mining technologies. Manovich argues that numerical representation is a distinctive feature of new media. Numbers have always already been key to mining engineering. However, computers visualise numerical fields in simulations that extend out of the minds of the calculators, and into visual and even haptic spaces. Specialists in geology, explosives, mechanical apparatuses, and so on, can use plaftorms that are common to everyday media. As the significance of numbers is extended by computers in the field, more and more diverse sources of data provide apparently consistent and seamless images of multiple fields of knowledge. Another feature that Manovich identifies in new media is the capacity for automation of media operations. Automation of many processes in mechanical domains clearly occurred long before industrial technologies were ported into new media. The difference with new media in mine sites is that robotic systems must vary their performance according to feedback from their extra-system environments. For our purposes, the haul trucks in WA are software-controlled devices that already qualify as robots. They sense, interpret and act in the world based on their surroundings. They evaluate multiple factors, including the sensors, GPS signals, operator instructions and so on. They can repeat the path, by sensing the differences, day after day, even if the weather changes, the track wears away or the instructions from base change. Automation compensates for differences within complex and changing environments. Automation of an open-pit mine haulage system… provides more consistent and efficient operation of mining equipment, it removes workers from potential danger, it reduces fuel consumption significantly reducing greenhouse gas (GHG) emissions, and it can help optimize vehicle repairs and equipment replacement because of more-predictable and better-controlled maintenance. (Parreire and Meech 1-13) Material components in physical mines tend to become modular and variable, as their physical shape lines up with the logic of another of Manovich’s new media themes, variability. Automatic systems also make obsolete human drivers, who previously handled those environmental variations, for better or for worse, through the dangerous, dull and dirty spaces of the mine. Drivers’ capacity to control repeat trips is no longer needed. The Komatsu driverless truck, introduced to the WA iron ore mines from 2008, proved itself to be almost as quick as human drivers at many tasks. But the driverless trucks have deeper advantages: they can run 23 hours each day with no shift breaks; they drive more cautiously and wear the equipment less than human drivers. There is no need to put up workers and their families up in town. The benefit most often mentioned is safety: even the worst accident won’t produce injuries to drivers. The other advantage less mentioned is that autonomous trucks don’t strike. Meanwhile, managers of human labour also need to adopt certain strategies of modulation to support the needs and expectations of their workers. Mobile phones, televisions and radio are popular modes of connecting workers to their loved ones, particularly in the remote and harsh West Angelas site. One solution — regular fly-in-fly out shifts — tends also to be alienating for workers and locals (Cheshire; Storey; Tonts). As with any operations, the cost of maintaining a safe and comfortable environment for workers requires trade-offs. Companies face risks from mobile phones, leaking computer networks, and espionage that expose the site to security risks. Because of such risks, miners tend be subject to disciplinary regimes. It is common to test alcohol and drug levels. There was some resistance from workers, who refused to change to saliva testing from urine testing (Latimer). Contesting these machines places the medium, in a different sense, at the centre of regulation of the workers’ bodies. In Northparkes, the solution of hybrid autonomous and remote operation is also a solution for modulating labour. It is safer and more comfortable, while also being more efficient, as one experienced driver can control three trucks at a time. This more complex mode of mediation is necessary because underground mines are more complex in geology, and working environments to suit full autonomy. These variations provide different relationships between operators and machines. The operator uses a games controller, and watches four video views from the cabin to make the vehicle fill the bucket with ore (Northparkes Mines, 9). Again, media have become a pivotal element in the mining assemblage. This combines the safety and comfort of autonomous operation (helping to retain staff) with the required use of human sensorimotor dexterity. Mine systems deserve attention from media studies because sites are combining large scale physical complexity with increasingly sophisticated computing. The conventional pictures of mining and media rarely address the specificity of subjective and artefactual encounters in and around mine sites. Any research on mining communication is typically within the instrumental frames of engineering (Duff et al.). Some of the developments in mechanical systems have contributed to efficiency and safety of many mines: larger trucks, more rock crushers, and so on. However, the single most powerful influence on mining has been adopting digital media to control, integrate and mining systems. Rio Tinto’s transformative agenda document is outlined in its high profile ‘Mine of the Future’ agenda (US Federal News Service). The media to which I refer are not only those in popular culture, but also those with digital control and communications systems used internally within mines and supply chains. The global mining industry began adopting digital communication automation (somewhat) systematically only in the 1980s. Mining companies hesitated to adopt digital media because the fundamentals of mining are so risky and bound to standard procedures. Large scale material operations, extracting and processing minerals from under the ground: hardly to be an appropriate space for delicate digital electronics. Mining is also exposed to volatile economic conditions, so investing in anything major can be unattractive. High technology perhaps contradicts an industry ethos of risk-taking and masculinity. Digital media became domesticated, and familiar to a new generation of formally educated engineers for whom databases and algorithms (Manovich) were second nature. Digital systems become simultaneously controllers of objects, and mediators of meanings and relationships. They control movements, and express communications. Computers slide from using meanings to invoking direct actions over objects in the world. Even on an everyday scale, computer operations often control physical processes. Anti-lock Braking Systems regulate a vehicle’s braking pressure to avoid the danger when wheels lock-up. Or another example, is the ATM, which involves both symbolic interactions, and also exchange of physical objects. These operations are examples of the ‘asignifying semiotic’ (Guattari), in which meanings and non-meanings interact. There is no operation essential distinction between media- and non-media digital operations. Which are symbolic, attached or non-consequential is not clear. This trend towards using computation for both meanings and actions has accelerated since 2000. Mines of the Future Beyond a relatively standard set of office and communications software, many fields, including mining, have adopted specialised packages for their domains. In 3D design, it is AutoCAD. In hard sciences, it is custom modelling. In audiovisual production, it may be Apple and Adobe products. Some platforms define their subjectivity, professional identity and practices around these platforms. This platform orientation is apparent in areas of mining, so that applications such as the Gemcom, Rockware, Geological Database and Resource Estimation Modelling from Micromine; geology/mine design software from Runge, Minemap; and mine production data management software from Corvus. However, software is only a small proportion of overall costs in the industry. Agents in mining demand solutions to peculiar problems and requirements. They are bound by their enormous scale; physical risks of environments, explosive and moving elements; need to negotiate constant change, as mining literally takes the ground from under itself; the need to incorporate geological patterns; and the importance of logistics. When digital media are the solution, there can be what is perceived as rapid gains, including greater capacities for surveillance and control. Digital media do not provide more force. Instead, they modulate the direction, speed and timing of activities. It is not a complete solution, because too many uncontrolled elements are at play. Instead, there are moment and situations when the degree of control refigures the work that can be done. Conclusions In this article I have proposed a new conception of media change, by reading digital innovations in mining practices themselves as media changes. This involved developing an initial reading of the operations of mining as digital media. With this approach, the array of media components extends far beyond the conventional ‘mass media’ of newspapers and television. It offers a more molecular media environment which is increasingly heterogeneous. It sometimes involves materiality on a huge scale, and is sometimes apparently virtual. The mining media event can be a semiotic, a signal, a material entity and so on. It can be a command to a human. It can be a measurement of location, a rock formation, a pressure or an explosion. The mining media event, as discussed above, is subject to Manovich’s principles of media, being numerical, variable and automated. In the mining media event, these principles move from the aesthetic to the instrumental and physical domains of the mine site. The role of new media operates at many levels — from the bottom of the mine site to the cruising altitude of the fly-in-fly out aeroplanes — has motivated significant changes in the Australian industry. When digital media and robotics come into play, they do not so much introduce change, but reintroduce similarity. This inversion of media is less about meaning, and more about local mastery. Media modulation extends the kinds of influence that can be exerted by the actors in control. In these situations, the degrees of control, and of resistance, are yet to be seen. Acknowledgments Thanks to Mining IQ for a researcher's pass at Mining Automation and Communication Conference, Perth in August 2012. References Bellamy, D., and L. Pravica. “Assessing the Impact of Driverless Haul Trucks in Australian Surface Mining.” Resources Policy 2011. Cheshire, L. “A Corporate Responsibility? The Constitution of Fly-In, Fly-Out Mining Companies as Governance Partners in Remote, Mine-Affected Localities.” Journal of Rural Studies 26.1 (2010): 12–20. Clark, N. “Todd and Brant Show PM Beaconsfield's Cage of Hell.” The Mercury, 6 Nov. 2008. Duff, E., C. Caris, A. Bonchis, K. Taylor, C. Gunn, and M. Adcock. “The Development of a Telerobotic Rock Breaker.” CSIRO 2009: 1–10. Fisher, B.S. and S. Schnittger. Autonomous and Remote Operation Technologies in the Mining Industry: Benefits and Costs. BAE Report 12.1 (2012). Goggin, G. Global Mobile Media. London: Routledge, 2010. Gregg, M. Work’s Intimacy. Cambridge: Polity, 2011. Guattari, F. Chaosmosis: An Ethico-Aesthetic Paradigm. Trans. Paul Bains and Julian Pefanis. Bloomington: Indiana UP, 1992. Hjorth, L. Mobile Media in the Asia-Pacific: Gender and the Art of Being Mobile. Taylor & Francis, 2008. Kirschenbaum, M.G. Mechanisms: New Media and the Forensic Imagination. Campridge, Mass.: MIT Press, 2008. Latimer, Cole. “Fair Work Appeal May Change Drug Testing on Site.” Mining Australia 2012. 3 May 2013 ‹http://www.miningaustralia.com.au/news/fair-work-appeal-may-change-drug-testing-on-site›. Latour, B. Reassembling the Social: An Introduction to Actor-Network-Theory. Oxford: Oxford University Press, 2007. Maher, J. The Future Was Here: The Commodore Amiga. Cambridge, Mass.: MIT Press, 2012. Manovich, Lev. The Language of New Media. Cambridge, Mass.: MIT Press, 2001. McDonald, P., R. Mayes, and B. Pini. “Mining Work, Family and Community: A Spatially-Oriented Approach to the Impact of the Ravensthorpe Nickel Mine Closure in Remote Australia.” Journal of Industrial Relations 2012. Middelbeek, E. “Australia Mining Tax Set to Slam Iron Ore Profits.” Metal Bulletin Weekly 2012. Montfort, N., and I. Bogost. Racing the Beam: The Atari Video Computer System. Cambridge, Mass.: MIT Press, 2009. Parikka, J. What Is Media Archaeology? London: Polity Press, 2012. Parreira, J., and J. Meech. “Autonomous vs Manual Haulage Trucks — How Mine Simulation Contributes to Future Haulage System Developments.” Paper presented at the CIM Meeting, Vancouver, 2010. 3 May 2013 ‹http://www.infomine.com/library/publications/docs/parreira2010.pdf›. Storey, K. “Fly-In/Fly-Out and Fly-Over: Mining and Regional Development in Western Australia.” Australian Geographer 32.2 (2010): 133–148. Storey, K. “Fly-In/Fly-Out: Implications for Community Sustainability.” Sustainability 2.5 (2010): 1161–1181. 3 May 2013 ‹http://www.mdpi.com/2071-1050/2/5/1161›. Takayama, L., W. Ju, and C. Nas. “Beyond Dirty, Dangerous and Dull: What Everyday People Think Robots Should Do.” Paper presented at HRI '08, Amsterdam, 2008. 3 May 2013 ‹http://www-cdr.stanford.edu/~wendyju/publications/hri114-takayama.pdf›. Tonts, M. “Labour Market Dynamics in Resource Dependent Regions: An Examination of the Western Australian Goldfields.” Geographical Research 48.2 (2010): 148-165. 3 May 2013 ‹http://onlinelibrary.wiley.com/doi/10.1111/j.1745-5871.2009.00624.x/abstract›. US Federal News Service, Including US State News. “USPTO Issues Trademark: Mine of the Future.” 31 Aug. 2011. Wu, S., H. Han, X. Liu, H. Wang, F. Xue. “Highly Effective Use of Australian Pilbara Blend Lump Ore in a Blast Furnace.” Revue de Métallurgie 107.5 (2010): 187-193. doi:10.1051/metal/2010021. Zuboff, S. In the Age of the Smart Machine: The Future of Work and Power. Heinemann Professional, 1988.
APA, Harvard, Vancouver, ISO, and other styles
33

Mules, Warwick. "Virtual Culture, Time and Images." M/C Journal 3, no. 2 (May 1, 2000). http://dx.doi.org/10.5204/mcj.1839.

Full text
Abstract:
Introduction The proliferation of electronic images and audiovisual forms, together with the recent expansion of Internet communication makes me wonder about the adequacy of present theoretical apparatus within the humanities and communication disciplines to explain these new phenomena and their effects on human life. As someone working roughly within a cultural and media studies framework, I have long harboured suspicions about the ability of concepts such as text, discourse and representation to give an account of the new media which does not simply reduce them to another version of earlier media forms. Many of these concepts were established during the 1970s and 80s, in the development of poststructuralism and its linguistic bias towards the analysis of literary and print media text. The application of these concepts to an electronic medium based on the visual image rather than the printed word seems somewhat perverse, and needs to be replaced by the application of other concepts drawn from a paradigm more suited for the purpose. In this brief essay, I want to explore some of the issues involved in thinking about a new cultural paradigm based on the photovisual/electronic image, to describe and critique the transformation of culture currently taking place through the accelerated uptake of new televisual, audiovisual and computer technologies. I am reminded here of the existential philosopher Heidegger's words about technology: 'the essence of technology is by no means anything technological' (Heidegger 4). For Heidegger, technology is part of the 'enframing' of the beingness which humans inhabit in various ways (Dasein). But technology itself does not constitute this beingness. This is good news for those of us (like myself) who have only a general and non-technical knowledge of the new technologies currently sweeping the globe, but who sense their profound effects on the human condition. Indeed, it suggests that technical knowledge in itself is insufficient and even inadequate to formulate appropriate questions about the relationship between technology and human being, and to the capacities of humans to respond to, and transform their technologically mediated situations. We need a new way of understanding human being as mediated by technologies, which takes into account the specific technological form in which mediation occurs today. To do this, we need new ways of conceptualising culture, and the specific kind of human subjectivity made possible within a culture conditioned by electronic media. From Material to Virtual Culture The concept of culture, as it has been predominantly understood in the humanities and associated disciplines, is based on the idea of physical presence. That is to say, culture is understood in terms of the various representations and practices that people experience within social and historical contexts defined by the living presence of one human being to another. The paradigm case here is speech-based linguistics in which all forms of communication are understood in terms of an innate subjectivity, expressed in the act of communicating something to someone else. Although privileging the site and moment of co-presence, this model does not require the speakers to be immediately present to each other in face-to-face situations, but asks only that co-presence be the ideal upon which successful acts of communication take place. As French philosopher Jacques Derrida has consistently argued over the last thirty years, all forms of western discourse, in one way or another, have been based on this kind of understanding of the way meanings and expressions of subject identity take place (Derrida 27ff.). A good case in point is the introductory essay by John Frow and Meaghan Morris to their edited text book Australian Cultural Studies: A Reader, where culture is defined as "a contested and conflictual set of practices of representation bound up with the processes of formation and re-formation of social groups" (xx). If culture is defined in terms of the agonistic formation of social groups through practices of representation, then there can be no way of thinking about culture outside the social as the privileged domain of human interaction. Culture is reduced to the social as a kind of paradigm limit, which is, in turn, characterised by the formation of social groups fixed in time and space. Even when an effort is made to indicate that social groups are themselves culturally constituted, as Frow and Morris go on to say, the social is nevertheless invoked again as an underlying presumption: "the social processes by which the categories of the real and of group existence are formed" (xx). In this model, social groups are formed by social processes. The task of representation and signification (the task of culture) is to draw the group together, no matter how widespread or dispersed, to make it coherent and identifiably different from other groups. Under these terms, the task of cultural analysis is to describe how this process takes place. This 'material' approach to culture normalises the social at the expense of the cultural, underpinned by a 'metaphysics of presence' whereby meaning and identity are established within a system of differential values (difference) by fixing human subjectivity in space and time. I argue that the uptake of new communication technologies makes this concept of culture obsolete. Culture now has to be understood in terms of 'virtual presence' in which the physical context of human existence is simultaneously 'doubled' and indeed proliferated into a virtual reality, with effective force in the 'real' world. From this perspective, we need to rethink culture so that it is no longer understood in terms of differential meanings, identities, texts, discourses and representational forms, but rather as a new kind of ontology involving the 'being' of human subjects and their relations to each other in deterritorialised fields of mediated co-presence, where the real and the virtual enmesh and interact. In this case, the laws governing physical presence no longer apply since it is possible to be 'here' and 'there' at the same time. We need a new approach and a new set of analytical terms to account for this new phenomenon. Virtual Culture and the Time of Human Presence In his well known critique of modern culture, Walter Benjamin invents the concept of the 'dialectical image' to define the visual concreteness of the everyday world and its effect on human consciousness. Dialectical images operate through an instantaneous flash of vision which breaks through everyday reality, allowing an influx of otherness to flood present awareness in a transformation of the past into the present: "the past can be seized only as an image which flashes up at the instant when it can be recognized and is never seen again" (Benjamin, Theses 255). Bypassing discourse, language and meaning, dialectical images invoke the eternal return -- the affirmation of the present as an ever-constant repetition of temporality -- as the 'ground' of history, progress and the future. Modern technology and its infinite power of reproduction has created the condition under which the image separates from its object, thereby releasing materiality from its moribund state in the past (Benjamin, The Work of Art). The ground of temporality is thus rendered virtual and evanescent, involving a 'deterritorialisation' of human experience from its ego-attachment to the present; an experience which Benjamin understands in repressed mythical terms. For Benjamin, the exemplary modern technology is photography. A photograph 'destroys' the originariness of the object, by robbing it of aura, or "the unique phenomenon of a distance, however close it may be" (Benjamin, The Work of Art 222). The photographic image is thus dialectical because it collapses the distance between the object and its image, thereby undermining the ontological space between the past and the present which might otherwise grant to the object a unique being in the presence of the viewer. But all 'things' also have their images, which can be separated and dispersed through space and time. Benjamin's approach to culture, where time surpasses space, and where the reproduced image takes priority over the real, now appears strangely prophetic. By suggesting that images are somehow directly and concretely affective in the constitution of human temporality, Benjamin has anticipated the current 'postmodern' condition in which the electronic image has become enmeshed in everyday life. As Paul Virilio argues, new communication technologies accelerate the transmission of images to such a rate that the past is collapsed into the present, creating an overpowering sense of immediacy: the speed of new optoelectronic and electroacoustic milieu becomes a final void (the void of the quick), a vacuum that no longer depends on the interval between places or things and so on the world's very extension, but on the interface of an instantaneous transmission of remote appearances, on a geographic and geometric retention in which all volume, all relief vanish. (33) Distance is now experienced in terms of its virtual proximity to the perceiving subject, in which space is no longer understood in terms of Newtonian extension, but as collapsed or compressed temporality, defined by the speed of light. In this Einsteinian world, human interaction is no longer governed by the law of non-contradiction which demands that one thing cannot be something else or somewhere else at the same time, and instead becomes 'interfacial', where the image-double enmeshes with its originary being as a co-extensive ontology based on "trans-appearance", or the effective appearance on a single horizon of two things from different space and time zones: "the direct transparence of space that enables each of us to perceive our immediate neighbours is completed by the indirect transparence of the speed-time of the electromagnetic waves that transmit our images and our voices" (Virilio 37). Like the light from some distant star which reaches earth millions of years after its explosive death, we now live in a world of remote and immediately past events, whose effects are constantly felt in real time. In this case the present is haunted by its past, creating a doppelgänger effect in which human being is doubled with its image in a co-extensive existence across space and time. Body Doubles Here we can no longer speak of the image as a representation, or even a signification, since the image is no longer secondary to the thing from which it is separated, nor is it a sign of anything else. Rather, we need to think of the possibility of a kind of 'image-event', incorporating both the physical reality of the human body and its image, stretched through time and space. French theorists Gilles Deleuze and Félix Guattari have developed an entire theoretical scheme to define and describe this kind of phenomenon. At one point in their magnum opus, A Thousand Plateaus: Capitalism and Schizophrenia, they introduce the concept of haecceity: a body is not defined by the form that determines it nor as a determinate substance or subject nor by the organs it possesses or the function it fulfils. On the plane of consistency, a body is defined by a longitude and a latitude: in other words the sum total of the material elements belonging to it under given relations of movement and rest, speed and slowness (longitude); the sum total of the intensive affects it is capable of at a given power or degree of potential (latitude). (260) This haecceity of the human body, as "trajectory", or "interassemblage" (262) denies the priority of an originating event or substance from which its constitutive elements could be derived. For instance photographs cease to be 'indexes' of things, and become instead part of an assemblage which includes living bodies and other forms of human presence (speech, writing, expressive signs), linked contingently into assemblages through space and time. A photographic image is just as much part of the 'beingness' of something as the thing itself; things and images are part of a perpetual process of becoming; a contingent linking of bricolage with different and diverging material expressions and effects. Thinking along these lines will get us around the problem of non-contradiction (that something cannot be both 'here' and 'there' at the same time), by extending the concept of 'thing' to include all the elements of its dispersal in time and space. Here we move from the idea of a thing as unique to itself (for instance the body as human presence) and hence subject to a logic of exchange based on scarcity and lack, to the idea of a thing as 'becoming', and subject to a logic of proliferation and excess. In this case, the unique phenomenon of human presence anchored in speech can no longer be used as a focal point to fix human subjectivity, its meanings and forms of expression, since there will be many different kinds of 'presencing' of human being, through the myriad trajectories traced out in all the practices and assemblages through time and space. A Practical Approach By thinking of culture in terms of virtual presence, we can no longer assume the existence of a bedrock foundation for human interaction based on the physical proximity of individuals to each other in time and space. Rather we need to think of culture in terms the emergence of new kinds of 'beingness', which deterritorialises human presence in different ways through the mediating power of photovisual and electronic imagery. These new kinds of beingness are not really new. Recent writers and cultural theorists have already described in detail the emergence of a virtual culture in the nineteenth century with the invention of photography and film, as well as various viewing devices such as the stereoscope and other staging apparatuses including the panorama and diorama (Friedberg, Batchen, Crary). Analysis of virtual culture needs to identify the various trajectories along which elements are assembled into an incessant and contingent 'becoming'. In terms of photovisual and electronic media, this can take place in different ways. By tracing the effective history of an image, it is possible to locate points at which transformations from one form to another occur, indicating different effects in different contexts through time. For instance by scanning through old magazines, you might be able to trace the 'destiny' of a particular type of image, and the kinds of meanings associated with it. Keeping in mind that an image is not a representation, but a form of affect, it might be possible to identify critical points where the image turns into its other (in fashion imagery we are now confronted with images of thin bodies suddenly becoming too thin, and hence dangerously subversive). Another approach concerns the phenomenon known as the media event, in which electronic images outstrip and overdetermine physical events in real time to which they are attached. In this case an analysis of a media event would involve the description of the interaction between events and their mediated presence, as mutually effective in real time. Recent examples here include the Gulf War and other international emergencies and conflicts in the Balkans and the 1986 coup in the Philippines, where media presence enabled images to have a direct effect on the decisions and deployment of troops and strategic activities. In certain circumstances, the conduct of warfare might now take place entirely in virtual reality (Kellner). But these 'peak events' don't really exhaust the ways in which the phenomenon of the media event inhabits and affects our everyday lives. Indeed, it might be better to characterise our entire lives as conditioned to various degrees by media eventness, as we become more and more attached and dependent on electronic imagery and communication to gain our sense of place in the world. An analysis of this kind of everyday interaction is long overdue. We can learn about the virtual through our own everyday experiences. Here I am not so much thinking of experiences to be had in futuristic apparatuses such as the virtual reality body suit and other computer generated digital environments, but the kinds of experiences of the virtual described by Benjamin in his wanderings through the streets of Berlin and Paris in the 1920s (Benjamin, One Way Street). A casual walk down the main street of any town, and a perfunctory gaze in the shop windows will trigger many interesting connections between specific elements and the assemblages through which their effects are made known. On a recent trip to Bundaberg, a country town in Queensland, I came across a mechanised doll in a jewellery store display, made up in the likeness of a watchmaker working at a miniature workbench. The constant motion of the doll's arm as it moved up and down on the bench in a simulation of work repeated the electromechanical movements of the dozens of clocks and watches displayed elsewhere in the store window, suggesting a link between the human and the machine. Here I was presented not only with a pleasant shop display, but also with the commodification of time itself, as an endless repetition of an interval between successive actions, acted out by the doll and its perpetual movement. My pleasure at the display was channelled through the doll and his work, as a fetishised enchantment or "fairy scene" of industrialised productivity, in which the idea of time is visualised in a specific image-material form. I can imagine many other such displays in other windows in other towns and cities, all working to reproduce this particular kind of assemblage, which constantly 'pushes' the idea-image of time as commodity into the future, so long as the displays and their associated apparatuses of marketing continue in this way rather than some other way. So my suggestion then, is to open our eyes to the virtual not as a futuristic technology, but as it already shapes and defines the world around us through time. By taking the visual appearance of things as immaterial forms with material affectivity, we allow ourselves to move beyond the limitations of physical presence, which demands that one thing cannot be something else, or somewhere else at the same time. The reduction of culture to the social should be replaced by an inquiry into the proliferation of the social through the cultural, as so many experiences of the virtual in time and space. References Bataille, Georges. Visions of Excess: Selected Writings, 1927-1939.Trans. Allan Stoekl. Minneapolis: Minnesota UP, 1985. Batchen, Geoffrey. "Spectres of Cyberspace." Afterimage 23.3. Benjamin, Walter. "Theses on the Philosophy of History." Illuminations: Essays and Reflections. Trans. Hannah Arendt. New York: Schocken, 1968. 253-64. ---. "The Work of Art in the Age of Electronic Reproduction." Illuminations: Essays and Reflections. Trans. Hannah Arendt. New York: Schocken, 1968. 217-51. ---. One Way Street and Other Writings. Trans. Edmund Jephcott and Kingsley Shorter. London: Verso, 1979. Buck-Morss, Susan. The Dialectics of Seeing: Walter Benjamin and the Arcades Project. Cambridge, Mass.: MIT P, 1997. Crary, Jonathan. Techniques of the Observer: On Vision and Modernity in the Nineteenth Century. Chicago: MIT P, 1992. Derrida, Jacques. Of Grammatology. Trans. Gayatri Spivak. Baltimore: Johns Hopkins UP, 1974. Friedberg, Anne. Window Shopping: Cinema and the Postmodern. Berkeley: U of California P, 1993. Frow, John. Time & Commodity Culture: Essays in Cultural Theory and Postmodernity. Oxford: Clarendon, 1997. Frow, John, and Meaghan Morris, eds. Australian Cultural Studies: A Reader. St. Leonards, NSW: Allen and Unwin, 1993. Heidegger, Martin. "The Question Concerning Technology." The Question Concerning Technology. Trans. William Lovitt. New York: Harper. 3-35. Kellner, Douglas. "Virilio, War and Technology." Theory, Culture & Society 16.5-6 (1999): 103-25. Sean Aylward Smith. "Where Does the Body End?" M/C: A Journal of Media and Culture 2.3 (1999). 30 Apr. 2000 <http://www.uq.edu.au/mc/9905/end.php>. Virilio, Paul. Open Sky. Trans. Julie Rose. London: Verso, 1997. Zimnik, Nina. "'Give Me a Body': Deleuze's Time Image and the Taxonomy of the Body in the Work of Gabriele Leidloff." Enculturation 2.1 (1998). <http://www.uta.edu/huma/enculturation/>. Citation reference for this article MLA style: Warwick Mules. "Virtual Culture, Time and Images: Beyond Representation." M/C: A Journal of Media and Culture 3.2 (2000). [your date of access] <http://www.api-network.com/mc/0005/images.php>. Chicago style: Warwick Mules, "Virtual Culture, Time and Images: Beyond Representation," M/C: A Journal of Media and Culture 3, no. 2 (2000), <http://www.api-network.com/mc/0005/images.php> ([your date of access]). APA style: Warwick Mules. (2000) Virtual culture, time and images: beyond representation. M/C: A Journal of Media and Culture 3(2). <http://www.api-network.com/mc/0005/images.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography