Journal articles on the topic 'Unified message systems (UMS)'

To see the other types of publications on this topic, follow the link: Unified message systems (UMS).

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Unified message systems (UMS).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Rouf, Md A., Abdelmalek Bouazza, Rao M. Singh, Will P. Gates, and R. Kerry Rowe. "Gas flow unified measurement system for sequential measurement of gas diffusion and gas permeability of partially hydrated geosynthetic clay liners." Canadian Geotechnical Journal 53, no. 6 (June 2016): 1000–1012. http://dx.doi.org/10.1139/cgj-2015-0123.

Full text
Abstract:
A gas flow unified measurement system (UMS-G) for sequential measurement of gas diffusion and gas permeability of geosynthetic clay liners (GCLs) under applied stress conditions (2 to 20 kPa) is described. Measurements made with the UMS-G are compared with measurements made with conventional experimental devices and are found to give similar results. The UMS-G removes the need to rely on two separate systems and increases further the reliability of the gas properties’ measurements. This study also shows that the gas diffusion and gas permeability reduce greatly with the increase of both gravimetric water content and apparent degree of saturation. The effect of applied stress on gas diffusion and gas permeability is found to be more pronounced at gravimetric water content greater than 60%. These findings suggest that at a nominal overburden stress of 20 kPa, the GCL used in the present investigation needs to be hydrated to 134% gravimetric water content (65% apparent degree of saturation) before gas diffusion and gas permeability drop to 5.5 × 10−11 m2·s−1 and 8.0 × 10−13 m·s−1, respectively, and to an even higher gravimetric water content (apparent degrees of saturation) at lower stress.
APA, Harvard, Vancouver, ISO, and other styles
2

Guttman, Sharon E., Lee A. Gilroy, and Randolph Blake. "Mixed messengers, unified message: spatial grouping from temporal structure." Vision Research 45, no. 8 (April 2005): 1021–30. http://dx.doi.org/10.1016/j.visres.2004.10.014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lin, Chih-Hsueh, Chia-Wei Ho, Guo-Hsin Hu, Baswanth Sreeramaneni, and Jun-Juh Yan. "Secure Data Transmission Based on Adaptive Chattering-Free Sliding Mode Synchronization of Unified Chaotic Systems." Mathematics 9, no. 21 (October 21, 2021): 2658. http://dx.doi.org/10.3390/math9212658.

Full text
Abstract:
This paper is concerned with a novel secure data transmission design based on adaptive synchronization of master and slave unified chaotic systems. First, by introducing an augmented error state, an adaptive continuous sliding mode control (SMC) is derived to guarantee the synchronization of unified chaotic systems. Then, the secret message embedded in the master chaotic system can be transmitted from transmitter to receiver. Different from previous works using discontinuous SMC, the undesired chattering phenomenon can be fully eliminated, and it becomes possible to precisely recover the embedded secret message at the receiver. Last, an example is given to illustrate the success of secure data transmission with the continuous SMC developed in this paper.
APA, Harvard, Vancouver, ISO, and other styles
4

Nakata, Takuya, Sinan Chen, and Masahide Nakamura. "Uni-Messe: Unified Rule-Based Message Delivery Service for Efficient Context-Aware Service Integration." Energies 15, no. 5 (February 25, 2022): 1729. http://dx.doi.org/10.3390/en15051729.

Full text
Abstract:
Rule-based systems, which are the typical technology used to realize context-aware services, have been independently implemented in various smart services. The challenges of these systems are the versatility of action, looseness, and the coding that is needed to describe the conditional branches. The purpose of this study was to support the realization of service coordination and smart services using context-aware technology by converting rule-based systems into services. In the proposed method, we designed and implemented the architecture of a new service: Unified Rule-Based Message Delivery Service (Uni-messe), which is an application-neutral rule management and evaluation service for rule-based systems. The core part of the Uni-messe proposal is the combination of a Pub/Sub and a rule-based system, and the proposal of a new event–condition–route (ECR) rule-based system. We applied Uni-messe to an audio information presentation system (ALPS) and indoor location sensing technology to construct concrete smart services, and then compared and evaluated the implementation to “if this then that” (IFTTT), which is a typical service coordination technology. Moreover, we analyzed the characteristics of other rule-based systems that have been serviced in previous studies and compared them to Uni-messe. This study shows that Uni-messe can provide services that simultaneously combine versatility, ease of conditional description, looseness, context independence, and user interface (UI), which cannot be achieved using conventional rule-based system services. By using Uni-messe, advanced heterogeneous distributed service coordination using rule-based systems and the construction of context-aware services can be performed easily.
APA, Harvard, Vancouver, ISO, and other styles
5

Sell, Raivo, and Priit Leomar. "Universal Navigation Algorithm Planning Platform for Unmanned Systems." Solid State Phenomena 164 (June 2010): 405–10. http://dx.doi.org/10.4028/www.scientific.net/ssp.164.405.

Full text
Abstract:
The paper deals with route planning and message exchange platform development for unmanned vehicle systems like Unmanned Ground Vehicle (UGV) and Unmanned Aerial Vehicle (UAV). Existing solutions for both types of vehicles are discussed and analyzed. Based on existing solution an unified concept is introduced. In this paper we present the study where the universal navigation algorithm planning platform is developed aiming to provide common platform for different unmanned mobile robotic systems. The platform is independent from the application and the target software. The navigation and action planning activity is brought to the abstract layer and specific interfaces are used to produce the target oriented code, describing two different test platforms are presented and co-operation scenarios.
APA, Harvard, Vancouver, ISO, and other styles
6

Legashev, Leonid, Irina Bolodurina, Lubov Zabrodina, Yuri Ushakov, Alexander Shukhman, Denis Parfenov, Yong Zhou, and Yan Xu. "Message Authentication and Network Anomalies Detection in Vehicular Ad Hoc Networks." Security and Communication Networks 2022 (February 24, 2022): 1–18. http://dx.doi.org/10.1155/2022/9440886.

Full text
Abstract:
Intelligent transport systems are the future in matters of safe roads and comfortable driving. Integration of vehicles into a unified intelligent network leads to all kinds of security issues and cyber threats common to conventional networks. Rapid development of mobile ad hoc networks and machine learning methods allows us to ensure security of intelligent transport systems. In this paper, we design an authentication scheme that can be used to ensure message integrity and preserve conditional privacy for the vehicle user. The proposed authentication scheme is designed with lightweight cryptography methods, so that it only brings little computational and communication overhead. We also conduct experiments on vehicular ad hoc network segment traffic generation in OMNeT++ tool and apply up-to-date machine learning methods to detect malicious behavior in a given simulated environment. The results of the study show high accuracy in distributed denial-of-service attack detection.
APA, Harvard, Vancouver, ISO, and other styles
7

Di Giusto, Cinzia, Davide Ferré, Laetitia Laversa, and Etienne Lozes. "A Partial Order View of Message-Passing Communication Models." Proceedings of the ACM on Programming Languages 7, POPL (January 9, 2023): 1601–27. http://dx.doi.org/10.1145/3571248.

Full text
Abstract:
There is a wide variety of message-passing communication models, ranging from synchronous "rendez-vous" communications to fully asynchronous/out-of-order communications. For large-scale distributed systems, the communication model is determined by the transport layer of the network, and a few classes of orders of message delivery (FIFO, causally ordered) have been identified in the early days of distributed computing. For local-scale message-passing applications, e.g., running on a single machine, the communication model may be determined by the actual implementation of message buffers and by how FIFO queues are used. While large-scale communication models, such as causal ordering, are defined by logical axioms, local-scale models are often defined by an operational semantics. In this work, we connect these two approaches, and we present a unified hierarchy of communication models encompassing both large-scale and local-scale models, based on their concurrent behaviors. We also show that all the communication models we consider can be axiomatized in the monadic second order logic, and may therefore benefit from several bounded verification techniques based on bounded special treewidth.
APA, Harvard, Vancouver, ISO, and other styles
8

Wei, Ying. "The Construction of Colleges and Universities Library Unified Information System Based on Guangxi Regional Features." Applied Mechanics and Materials 543-547 (March 2014): 3151–55. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3151.

Full text
Abstract:
Through the integrated application of Library information system and campus culture of Guangxi colleges as well as the research of Guangxi colleges serving developments of China-ASEAN, and Guangxi Beibu Gulf economic region, this paper provides solution of integrated construction of college campus culture and library information system on informatization condition. In the system of college campus culture construction based on perspective of Gungxi colleges, college library information resource is used as medium to integrate into cultural connotation serving regional economy on the basis of knowledge architecture, with applications of Internet, computer telecom integration technology as well as IVR and TTS technology, communication tools commonly used by college students and teachers are adopted as informatization approaches, concept identification system, activity identification system, visual identification system, subject and specialty service system, environment and culture planning system and other unified information general culture systems are established, and e-mail, voice message, short message, WAP, real time communication, web, VoIP and other campus culture interactive measures are realized. The reconfigurable analysis of aggregate diagnosis flow proves the integrated construction of campus culture and library unified information is feasible.
APA, Harvard, Vancouver, ISO, and other styles
9

Akasiadis, Charilaos, Vassilis Pitsilis, and Constantine D. Spyropoulos. "A Multi-Protocol IoT Platform Based on Open-Source Frameworks." Sensors 19, no. 19 (September 28, 2019): 4217. http://dx.doi.org/10.3390/s19194217.

Full text
Abstract:
Internet of Things (IoT) technologies have evolved rapidly during the last decade, and many architecture types have been proposed for distributed and interconnected systems. However, most systems are implemented following fragmented approaches for specific application domains, introducing difficulties in providing unified solutions. However, the unification of solutions is an important feature from an IoT perspective. In this paper, we present an IoT platform that supports multiple application layer communication protocols (Representational State Transfer (REST)/HyperText Transfer Protocol (HTTP), Message Queuing Telemetry Transport (MQTT), Advanced Message Queuing Protocol (AMQP), Constrained Application Protocol (CoAP), and Websockets) and that is composed of open-source frameworks (RabbitMQ, Ponte, OM2M, and RDF4J). We have explored a back-end system that interoperates with the various frameworks and offers a single approach for user-access control on IoT data streams and micro-services. The proposed platform is evaluated using its containerized version, being easily deployable on the vast majority of modern computing infrastructures. Its design promotes service reusability and follows a marketplace architecture, so that the creation of interoperable IoT ecosystems with active contributors is enabled. All the platform’s features are analyzed, and we discuss the results of experiments, with the multiple communication protocols being tested when used interchangeably for transferring data. Developing unified solutions using such a platform is of interest to users and developers as they can test and evaluate local instances or even complex applications composed of their own IoT resources before releasing a production version to the marketplace.
APA, Harvard, Vancouver, ISO, and other styles
10

Lanese, Ivan, Adrián Palacios, and Germán Vidal. "Causal-Consistent Replay Reversible Semantics for Message Passing Concurrent Programs." Fundamenta Informaticae 178, no. 3 (January 15, 2021): 229–66. http://dx.doi.org/10.3233/fi-2021-2005.

Full text
Abstract:
Causal-consistent reversible debugging is an innovative technique for debugging concurrent systems. It allows one to go back in the execution focusing on the actions that most likely caused a visible misbehavior. When such an action is selected, the debugger undoes it, including all and only its consequences. This operation is called a causal-consistent rollback. In this way, the user can avoid being distracted by the actions of other, unrelated processes. In this work, we introduce its dual notion: causal-consistent replay. We allow the user to record an execution of a running program and, in contrast to traditional replay debuggers, to reproduce a visible misbehavior inside the debugger including all and only its causes. Furthermore, we present a unified framework that combines both causal-consistent replay and causal-consistent rollback. Although most of the ideas that we present are rather general, we focus on a popular functional and concurrent programming language based on message passing: Erlang.
APA, Harvard, Vancouver, ISO, and other styles
11

Shen, Yuan, Dong Cai Liu, Ya Lin Shen, and Chan Gan Zhu. "Research and Design on Universal Framework for Integration CAD / CAE System." Advanced Materials Research 211-212 (February 2011): 595–99. http://dx.doi.org/10.4028/www.scientific.net/amr.211-212.595.

Full text
Abstract:
This paper, which studied the structure of CAD/ CAE system, has proposed a universal CAD / CAE integration framework. This system, with good compatibility and being convenient to be used, can be the basic platform for all CAD / CAE systems. This framework, with a unified structure of command processor, the message processing system, selection mechanism, can transform the development of CAD / CAE integrated system to that of functional command module. With the help of this framework, functional development no longer relies on framework. Therefore, the framework greatly enhances the efficiency of software system development.
APA, Harvard, Vancouver, ISO, and other styles
12

Jin, Hongxia. "Content Recommendation for Attention Management in Unified Social Messaging." Proceedings of the AAAI Conference on Artificial Intelligence 26, no. 1 (September 20, 2021): 627–33. http://dx.doi.org/10.1609/aaai.v26i1.8203.

Full text
Abstract:
With the growing popularity of social networks and collaboration systems, people are increasingly working with or socially connected with each other. Unified messaging system provides a single interface for users to receive and process information from multiple sources. It is highly desirable to design attention management solution that can help users easily navigate and process dozens of unread messages from a unified message system. Moreover, with the proliferation of mobile devices people are now selectively consuming the most important messages on the go between different activities in their daily life. The information overload problem is especially acute for mobile users with small screen to display. In this paper, we present \PAM, an intelligent end-to-end Personalized Attention Management solution that employs analytical techniques that can learn user interests and organize and prioritize incoming messages based on user interests. For a list of unread messages, \PAM generates a concise attention report that allows users to quickly scan the important new messages from his important social connections as well as messages about his most important tasks that the user is involved with. Our solution can also be applied in other applications such as news filtering and alerts on mobile devices. Our evaluation results demonstrate the effectiveness of \PAM.
APA, Harvard, Vancouver, ISO, and other styles
13

Sim, Woongbin, ByungKwen Song, Junho Shin, and Taehun Kim. "Data Distribution Service Converter Based on the Open Platform Communications Unified Architecture Publish–Subscribe Protocol." Electronics 10, no. 20 (October 16, 2021): 2524. http://dx.doi.org/10.3390/electronics10202524.

Full text
Abstract:
The open platform communications unified architecture (OPC UA) is a major industry-standard middleware based on the request–reply pattern, and the data distribution service (DDS) is an industry standard in the publish–subscribe form. The OPC UA cannot replace fieldbuses at the control and field levels. To facilitate real-time connectionless operation, the OPC Foundation added the publish–subscribe model—a new specification that supports broker functions, such as message queuing telemetry transport (MQTT), and advanced message queuing protocol (AMQP)—to the OPC UA Part 14 standard. This paper proposes a protocol converter for incorporation into the application layer of the DDS subscriber to facilitate interoperability among publisher–subscriber pairs. The proposed converter comprises a DDS gateway and bridge. The former exists inside the MQTT and AMQP brokers, which convert OPC UA publisher data into DDS messages prior to passing them on to the DDS subscriber. The DDS bridge passes the messages received from the DDS gateway to the OPC UA subscriber in the corresponding DDS application layer. The results reported in existing studies, and those obtained using the proposed converter, allow all devices supporting the OPC UA and OPC UA PubSub standards to realize DDS publish–subscribe interoperability.
APA, Harvard, Vancouver, ISO, and other styles
14

Alolaiwy, Muhammad, and Mohamed Zohdy. "Multi-Objective Message Routing in Electric and Flying Vehicles Using a Genetics Algorithm." Sensors 23, no. 3 (January 18, 2023): 1100. http://dx.doi.org/10.3390/s23031100.

Full text
Abstract:
With progressive technological advancements, the time for electric vehicles (EVs) and unmanned aerial vehicles (UAVs) has finally arrived for the masses. However, intelligent transportation systems need to develop appropriate protocols that enable swift predictive communication among these battery-powered devices. In this paper, we highlight the challenges in message routing in a unified paradigm of electric and flying vehicles (EnFVs). We innovate over the existing routing scheme by considering multi-objective EnFVs message routing using a novel modified genetics algorithm. The proposed scheme identifies all possible solutions, outlines the Pareto-front, and considers the optimal solution for the best route. Moreover, the reliability, data rate, and residual energy of vehicles are considered to achieve high communication gains. An exhaustive evaluation of the proposed and three existing schemes using a New York City real geographical trace shows that the proposed scheme outperforms existing solutions and achieves a 90%+ packet delivery ratio, longer connectivity time, shortest average hop distance, and efficient energy consumption.
APA, Harvard, Vancouver, ISO, and other styles
15

Nagata, Takashi. "Variable-Gain Constraint Stabilization for General Multibody Systems with Applications." Journal of Vibration and Control 10, no. 9 (September 2004): 1335–57. http://dx.doi.org/10.1177/1077546304042046.

Full text
Abstract:
This paper presents a general and efficient formulation applicable to a vast variety of rigid and flexible multibody systems. It is based on a variable-gain error correction with scaling and adaptive control of the convergence parameter. The methodology has the following distinctive features. (i) All types of holonomic and non-holonomic equality constraints as well as a class of inequalities can be treated in a plain and unified manner. (ii) Stability of the constraints is assured. (iii) The formulation has an order Ncomputational cost in terms of both the constrained and unconstrained degrees of freedom, regardless of the system topology. (iv) Unlike the traditional recursive order Nalgorithms, it is quite amenable to parallel computation. (v) Because virtually no matrix operations are involved, it can be implemented to very simple general-purpose simulation programs. Noting the advantages, the algorithm has been realized as a C++ code supporting distributed processing through the Message-Passing Interface (MPI). Versatility, dynamical validity and efficiency of the approach are demonstrated through numerical studies of several particular systems including a crawler and a flexible space structure.
APA, Harvard, Vancouver, ISO, and other styles
16

Barciś, Michał, Agata Barciś, and Hermann Hellwagner. "Information Distribution in Multi-Robot Systems: Utility-Based Evaluation Model." Sensors 20, no. 3 (January 28, 2020): 710. http://dx.doi.org/10.3390/s20030710.

Full text
Abstract:
This work addresses the problem of information distribution in multi-robot systems, with an emphasis on multi-UAV (unmanned aerial vehicle) applications. We present an analytical model that helps evaluate and compare different information distribution schemes in a robotic mission. It serves as a unified framework to represent the usefulness (utility) of each message exchanged by the robots. It can be used either on its own in order to assess the information distribution efficacy or as a building block of solutions aimed at optimizing information distribution. Moreover, we present multiple examples of instantiating the model for specific missions. They illustrate various approaches to defining the utility of different information types. Finally, we introduce a proof of concept showing the applicability of the model in a robotic system by implementing it in Robot Operating System 2 (ROS 2) and performing a simple simulated mission using a network emulator. We believe the introduced model can serve as a basis for further research on generic solutions for assessing or optimizing information distribution.
APA, Harvard, Vancouver, ISO, and other styles
17

Teh, Je Sen, and Azman Samsudin. "A Chaos-Based Authenticated Cipher with Associated Data." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/9040518.

Full text
Abstract:
In recent years, there has been a rising interest in authenticated encryption with associated data (AEAD) which combines encryption and authentication into a unified scheme. AEAD schemes provide authentication for a message that is divided into two parts: associated data which is not encrypted and the plaintext which is encrypted. However, there is a lack of chaos-based AEAD schemes in recent literature. This paper introduces a new 128-bit chaos-based AEAD scheme based on the single-key Even-Mansour and Type-II generalized Feistel structure. The proposed scheme provides both privacy and authentication in a single-pass using only one 128-bit secret key. The chaotic tent map is used to generate whitening keys for the Even-Mansour construction, round keys, and random s-boxes for the Feistel round function. In addition, the proposed AEAD scheme can be implemented with true random number generators to map a message to multiple possible ciphertexts in a nondeterministic manner. Security and statistical evaluation indicate that the proposed scheme is highly secure for both the ciphertext and the authentication tag. Furthermore, it has multiple advantages over AES-GCM which is the current standard for authenticated encryption.
APA, Harvard, Vancouver, ISO, and other styles
18

Thango, Nqobile Sindiswa, Ronnie E. Baticulon, Elizabeth Ogando, Faith C. Robertson, Laura Lippa, Angelos Kolias, and Ignatius Esene. "The Role of Young Neurosurgeons in Global Surgery: A Unified Voice for Health Care Equity." JOURNAL OF GLOBAL NEUROSURGERY 1, no. 1 (April 23, 2021): 64–67. http://dx.doi.org/10.51437/jgns.v1i1.27.

Full text
Abstract:
Health care equity pursues the elimination of health disparities or inequalities. One of the most significant challenges is the inequalityshaped by policies, for which systemic change is needed. Historically, non-surgical pathologies have received greater political prioritythan surgical pathologies, but we have begun to see a paradigm shift over the past decade. In 2010, Shrime et al. showed that 32.9% ofall global deaths were attributed to surgically related conditions, which equated to three times more deaths than that due to nonsurgical pathologies such as tuberculosis, malaria, and HIV/AIDS combined (1). When the Lancet Commission on Global Surgery waspublished in 2015 (2), a new era in global health emerged. The message was clear: surgical diseases could no longer be neglected. Thereport emphasized the importance of systems-level improvements in service delivery, workforce training, financing, informationmanagement, infrastructure, health policy, and governance
APA, Harvard, Vancouver, ISO, and other styles
19

Krylova, Victoria, Elena Tverytnykova, Oleg Vasylchenkov, and Tatyana Kolisnyk. "PUNCTURED NCC CODES FOR INFORMATION PROTECTION IN INFORMATION AND MEASUREMENT SYSTEMS." Bulletin of the National Technical University «KhPI» Series: New solutions in modern technologies, no. 1(11) (May 18, 2022): 38–43. http://dx.doi.org/10.20998/2413-4295.2022.01.06.

Full text
Abstract:
During development and design of information-measuring systems, enabling to carry out collection, processing and transmission of information, one of the main problems is the choice of effective methods of information protection against defects in noisy communication channels. Effective use of frequency-time resources of information communication channels, as the most valuable part of the information transmission system, is the key to provide reliable delivery of transmitted messages. One of effective directions of reliability increase and information transfer reliability in information-measuring communication networks is implementation of methods and algorithms of noise-resistant coding, providing for detection and coping with errors, arising due to interferences in the communication channel. In this case, the choice in favor of one or another coding method depends on the information characteristics of the data channel. Parameters of the noise coder must be coordinated with the source of the message, the communication channel, as well as the requirements for the reliability of bringing information to the recipient. The problem of obtaining a wide range of codec parameters with simultaneous preservation of the unified macrostructure of the codec in communication systems causes the need for research on the development of adaptive algorithms for error information protection. In the article the research results of the characteristics of variable rate slot convolutional codes for adaptive coding/decoding in information-measuring systems of information transmission are proposed. Consequently, when creating communication networks, there is no need to use a large number of different codecs, even with completely different requirements to the code rate, channel rate and gain due to coding. In addition, there is a real opportunity to create terminal equipment, working on unified algorithms of protection against errors and access.
APA, Harvard, Vancouver, ISO, and other styles
20

Bermous, I., and P. Steinle. "Efficient performance of the Met Office Unified Model v8.2 on Intel Xeon partially used nodes." Geoscientific Model Development 8, no. 3 (March 24, 2015): 769–79. http://dx.doi.org/10.5194/gmd-8-769-2015.

Full text
Abstract:
Abstract. The atmospheric Unified Model (UM) developed at the UK Met Office is used for weather and climate prediction by forecast teams at a number of international meteorological centres and research institutes on a wide variety of hardware and software environments. Over its 25 year history the UM sources have been optimised for better application performance on a number of High Performance Computing (HPC) systems including NEC SX vector architecture systems and recently the IBM Power6/Power7 platforms. Understanding the influence of the compiler flags, Message Passing Interface (MPI) libraries and run configurations is crucial to achieving the shortest elapsed times for a UM application on any particular HPC system. These aspects are very important for applications that must run within operational time frames. Driving the current study is the HPC industry trend since 1980 for processor arithmetic performance to increase at a faster rate than memory bandwidth. This gap has been growing especially fast for multicore processors in the past 10 years and it can have significant implication for the performance and performance scaling of memory bandwidth intensive applications, such as the UM. Analysis of partially used nodes on Intel Xeon clusters is provided in this paper for short- and medium-range weather forecasting systems using global and limited-area configurations. It is shown that on the Intel Xeon-based clusters the fastest elapsed times and the most efficient system usage can be achieved using partially committed nodes.
APA, Harvard, Vancouver, ISO, and other styles
21

Peng, Long, Fei Guan, Luc Perneel, and Martin Timmerman. "EmSBot." International Journal of Advanced Robotic Systems 13, no. 6 (November 28, 2016): 172988141666366. http://dx.doi.org/10.1177/1729881416663662.

Full text
Abstract:
Component-based approaches are prevalent in software development for robotic applications due to their reusability and productivity. In this article, we present an Embedded modular Software framework for a networked ro BoTic system (EmSBoT) targeting resource-constrained devices such as microcontroller-based robots. EmSBoT is primarily built upon μCOS-III with real-time support. However, its operating system abstraction layer makes it available for various operating systems. It employs a unified port-based communication mechanism to achieve message passing while hiding the heterogeneous distributed environment from applications, which also endows the framework with fault-tolerant capabilities. We describe the design and core features of the EmSBoT framework in this article. The implementation and experimental evaluation show its availability with small footprint size, effectiveness, and OS independence.
APA, Harvard, Vancouver, ISO, and other styles
22

Jagodzińska, Natalia. "Requirements of the ISO 14001 environmental management standard and the expected effects of its implementation in transport undertakings." AUTOBUSY – Technika, Eksploatacja, Systemy Transportowe 24, no. 6 (June 30, 2019): 71–74. http://dx.doi.org/10.24136/atest.2019.128.

Full text
Abstract:
The environmental management system according to PN-EN ISO 14001: 2015 [1] is a system whose message is to protect the natural environment. The environmental management system focuses mainly on reducing waste, possibilities and methods of waste disposal, pre-venting pollution, reducing the use of natural resources, and in the context of the transport industry, reducing emissions. The idea of the system is continuous improvement of activities related to the protection of the natural environment - through identification of threats, risk assessment and mobilization of enterprises to comply with the requirements of law in the field of environmental protection. For many years, the transport industry has been governed by its laws. However, with the changing market, where apart from large transport concerns, there are also small and micro companies providing transport services that also have an impact on the environment in individual parts of the transport industry. There are more and more entrepreneurs, both Polish and foreign, specializing in the transport industry, hence legal regulations, EU regulations and industry standards or standards aimed at reducing the impact of transport on the natural environment appear. It seems that as of today, mobilizing enterprises of various sizes to implement unified rules, reduce emissions, oversee waste, implement unified management systems, including environmental management systems, is the most effective method of impacting the improvement of environmental protection in this area.
APA, Harvard, Vancouver, ISO, and other styles
23

Beregi, Richárd, Gianfranco Pedone, Borbála Háy, and József Váncza. "Manufacturing Execution System Integration through the Standardization of a Common Service Model for Cyber-Physical Production Systems." Applied Sciences 11, no. 16 (August 18, 2021): 7581. http://dx.doi.org/10.3390/app11167581.

Full text
Abstract:
Digital transformation and artificial intelligence are creating an opportunity for innovation across all levels of industry and are transforming the world of work by enabling factories to embrace cutting edge Information Technologies (ITs) into their manufacturing processes. Manufacturing Execution Systems (MESs) are abandoning their traditional role of legacy executing middle-ware for embracing the much wider vision of functional interoperability enablers among autonomous, distributed, and collaborative Cyber-Physical Production System (CPPS). In this paper, we propose a basic methodology for universally modeling, digitalizing, and integrating services offered by a variety of isolated workcells into a single, standardized, and augmented production system. The result is a reliable, reconfigurable, and interoperable manufacturing architecture, which privileges Open Platform Communications Unified Architecture (OPC UA) and its rich possibilities for information modeling at a higher level of the common service interoperability, along with Message Queuing Telemetry Transport (MQTT) lightweight protocols at lower levels of data exchange. The proposed MES architecture has been demonstrated and validated in several use-cases at a research manufacturing laboratory of excellence for industrial testbeds.
APA, Harvard, Vancouver, ISO, and other styles
24

Levkulych, Vasyl, Lesya Chervona, Mykola Iehupov, and Oleksandr Mozolev. "Communicative resources of socio-economic development and pedagogical activity in the context of globalization challenges." SHS Web of Conferences 141 (2022): 03012. http://dx.doi.org/10.1051/shsconf/202214103012.

Full text
Abstract:
From the point of view of the theory of social systems, culture is rather a wide field of possibilities that are revealed in human communication. This is our main initial methodological position, which in the future we recommend for use in socio-economic and humanitarian studies not so much in the regime of a rigid method that formats research, but as a cross-cutting value and ideological setting. Communication, as a message, can always give a different meaning to a report, but this is immediately apparent in social relationships. What does not work in such cases is the principle of communication, namely the difference between information and a message, which gives the message itself the character of an event that requires a reaction. It is at the level of intimate social relations, where the fundamental dependence of the realization of social freedom in the external social instance is manifested – even if it is a loved person. While multifunctional itself, morality can limit the scope of a functional specification. In this case, social interpenetration cannot be distinguished without taking into account interhuman relations. In addition, morality imposes its own limitations on the sphere of intimate relationships. After all, it is also impossible to deepen between people if it is associated with public morality. The model of a unified and standardized world (single and uniform) is being replaced by new concepts of globalization, containing the idea of preserving cultural diversity in people’s lives.
APA, Harvard, Vancouver, ISO, and other styles
25

Joshi, Shubham, Shalini Stalin, Prashant Kumar Shukla, Piyush Kumar Shukla, Ruby Bhatt, Rajan Singh Bhadoria, and Basant Tiwari. "Unified Authentication and Access Control for Future Mobile Communication-Based Lightweight IoT Systems Using Blockchain." Wireless Communications and Mobile Computing 2021 (December 17, 2021): 1–12. http://dx.doi.org/10.1155/2021/8621230.

Full text
Abstract:
The Internet of Things (IoT) is a new revolution defined by heterogeneous devices made up of intelligent, omnipresent items that are all hooked up to The internet. These devices are frequently implemented in different areas to offer innovative programs in various industrial applications, including intelligent urban, medicine, and societies. Such Internet of Things (IoT) equipment generates a large volume of private and safety information. Because IoT systems are resource-constrained in terms of operation, memory, and communication capability, safeguarding accessibility to them is a difficult task. In the blockchain concept, the majority, or even all network nodes, check the validity and accuracy of exchanged data before accepting and recording it, whether this data is related to financial transactions, measurements of a sensor, or an authentication message. In evaluating the validity of exchanged data, nodes must reach a consensus in order to perform a special action, in which case the opportunity to enter and record transactions and unreliable interactions with the system is significantly reduced. Recently, in order to share and access management of IoT devices’ information with a distributed attitude, a new authentication protocol based on blockchain has been proposed, and it is claimed that this protocol satisfies user privacy while preserving security. Today’s identification and authentication techniques have substantial shortcomings due to rapidly growing prevalence and implementation. As a result, the protection of such gadgets is critical to guarantee the program’s efficacy and safety. A decentralized authentication and access control method for lightweight IoT systems are proposed in this work and a blockchain-based system that enables identification and secures messaging with IoT nodes. The technique is built on fog information systems and the idea of a blockchain system; when contrasted to something like a blockchain-based verification system, the testing findings show that the suggested mechanism outperforms it. The authentication and verification system undergoes using the blockchain technique. Our method takes advantage of blockchain’s inherent advantages while also associated with development authentication systems. Our suggested blockchain-based approach, structure, and layout, in particular, provide for transparency, consistency, and provenance while also providing tamper-proof records. The article describes the general systems architectural style and the analysis and execution of a real scenario as just a prototype system. The authentication included give as protected prototype that can transmit data with secured protocol and achieves minimum error rate.
APA, Harvard, Vancouver, ISO, and other styles
26

Wang, Hongwei, and Jure Leskovec. "Combining Graph Convolutional Neural Networks and Label Propagation." ACM Transactions on Information Systems 40, no. 4 (October 31, 2022): 1–27. http://dx.doi.org/10.1145/3490478.

Full text
Abstract:
Label Propagation Algorithm (LPA) and Graph Convolutional Neural Networks (GCN) are both message passing algorithms on graphs. Both solve the task of node classification, but LPA propagates node label information across the edges of the graph, while GCN propagates and transforms node feature information. However, while conceptually similar, theoretical relationship between LPA and GCN has not yet been systematically investigated. Moreover, it is unclear how LPA and GCN can be combined under a unified framework to improve the performance. Here we study the relationship between LPA and GCN in terms of feature/label influence , in which we characterize how much the initial feature/label of one node influences the final feature/label of another node in GCN/LPA. Based on our theoretical analysis, we propose an end-to-end model that combines GCN and LPA. In our unified model, edge weights are learnable, and the LPA serves as regularization to assist the GCN in learning proper edge weights that lead to improved performance. Our model can also be seen as learning the weights of edges based on node labels, which is more direct and efficient than existing feature-based attention models or topology-based diffusion models. In a number of experiments for semi-supervised node classification and knowledge-graph-aware recommendation, our model shows superiority over state-of-the-art baselines.
APA, Harvard, Vancouver, ISO, and other styles
27

Nguyen, Lam Tran Thanh, Son Xuan Ha, Trieu Hai Le, Huong Hoang Luong, Khanh Hong Vo, Khoi Huynh Tuan Nguyen, Anh The Nguyen, Tuan Anh Dao, and Hy Vuong Khang Nguyen. "BMDD: a novel approach for IoT platform (broker-less and microservice architecture, decentralized identity, and dynamic transmission messages)." PeerJ Computer Science 8 (April 22, 2022): e950. http://dx.doi.org/10.7717/peerj-cs.950.

Full text
Abstract:
Undeniably, Internet of Things (IoT) devices are gradually getting better over time; and IoT-based systems play a significant role in our lives. The pervasiveness of the new essential service models is expanding, and includes self-driving cars, smart homes, smart cities, as well as promoting the development of some traditional fields such as agriculture, healthcare, and transportation; the development of IoT devices has not shown any sign of cooling down. On the one hand, several studies are coming up with many scenarios for IoT platforms, but some critical issues related to performance, speed, power consumption, availability, security, and scalability are not yet fully resolved. On the other hand, IoT devices are manufactured and developed by different organizations and individuals; hence, there is no unified standard (uniformity of IoT devices), i.e., sending and receiving messages among them and between them and the upper layer (e.g., edge devices). To address these issues, this paper proposes an IoT Platform called BMDD (Broker-less and Microservice architecture, Decentralized identity, and Dynamic transmission messages) that has a combination of two architectural models, including broker-less and microservices, with cutting-edge technologies such as decentralized identity and dynamic message transmission. The main contributions of this article are five-fold, including: (i) proposing broker-less and microservice for the IoT platform which can reduce single failure point of brokering architecture, easy to scale out and improve failover; (ii) providing a decentralized authentication mechanism which is suitable for IoT devices attribute (i.e., mobility, distributed); (iii) applying the Role-Based Access Control (RBAC) model for the authorization process; (iv) exploiting the gRPC protocol combined with the Kafka message queue enhances transmission rates, transmission reliability, and reduces power consumption in comparison with MQTT protocol; and (v) developing a dynamic message transmission mechanism that helps users communicate with any device, regardless of the manufacturer, since it provides very high homogeneity.
APA, Harvard, Vancouver, ISO, and other styles
28

Zou, Deyue, and Shouchuan Ma. "Satellite Navigation and Communication Integration Based on Correlation Domain Indefinite Pulse Position Modulation Signal." Wireless Communications and Mobile Computing 2021 (June 7, 2021): 1–11. http://dx.doi.org/10.1155/2021/5545285.

Full text
Abstract:
Ubiquitous signal coverage is a basic demand of Internet of Things (IoT) communications, which meets the feature of satellite communications. Infinite user number is a basic demand of IoT location-based services, which meets the feature of Global Navigation Satellite System (GNSS). Both of these demands make Satellite Navigation and Communication Integration (SNCI) an important supporting technology for IoT. Inherited from the satellite communications system, GNSS itself has a certain data transmission capacity. Thus, enhancing the communication function of the GNSS is a promising means of achieving SNCI. Considering that a unified signal system cannot currently realize high-precision positioning and high-speed data transmission simultaneously in SNCI, this project proposes a Correlation Domain Indefinite Pulse Position Modulation (CDIPPM). A pilot channel and a data channel are introduced in this technology, which are distinguished by Code Division Multiplexing (CDMA). The synchronization function is provided by the pilot channel, thereby freeing the data channel of this function. The phase of the pseudorandom code can then be used as the carrier of information. In order to transmit more information, the transmitter of the proposed technology superimposes on the data channel multiple sets of spread spectrum sequence, which are generated from one set of spread spectrum sequence by different cyclic shifting operations. The receiver will identify the number and location of the correlation function peaks by a detection algorithm and recover the message. It can be seen by theoretical analysis and simulation verification. The technology can significantly improve satellite data transmission rates and maintain the original positioning function while minimizing change in the original GNSS signal. Therefore, the SNCI system based on this technology has the following advantages: a unified signal system, high positioning accuracy, high data transmission rate, and a backward navigation function, and it is easy to promote.
APA, Harvard, Vancouver, ISO, and other styles
29

Schmitt, Felix, Robert Dietrich, and Guido Juckeland. "Scalable critical-path analysis and optimization guidance for hybrid MPI-CUDA applications." International Journal of High Performance Computing Applications 31, no. 6 (August 1, 2016): 485–98. http://dx.doi.org/10.1177/1094342016661865.

Full text
Abstract:
The use of accelerators in heterogeneous systems is an established approach in designing petascale applications. Today, Compute Unified Device Architecture (CUDA) offers a rich programming interface for GPU accelerators but requires developers to incorporate several layers of parallelism on both the CPU and the GPU. From this increasing program complexity emerges the need for sophisticated performance tools. This work contributes by analyzing hybrid MPI-CUDA programs for properties based on wait states, such as the critical path, a metric proven to identify application bottlenecks effectively. We developed a tool to construct a dependency graph based on an execution trace and the inherent dependencies of the programming models CUDA and Message Passing Interface (MPI). Thereafter, it detects wait states and attributes blame to responsible activities. Together with the property of being on the critical path, we can identify activities that are most viable for optimization. To evaluate the global impact of optimizations to critical activities, we predict the program execution using a graph-based performance projection. The developed approach has been demonstrated with suitable examples to be both scalable and correct. Furthermore, we establish a new categorization of CUDA inefficiency patterns ensuing from the dependencies between CUDA activities.
APA, Harvard, Vancouver, ISO, and other styles
30

Bosse, Stefan. "PSciLab: An Unified Distributed and Parallel Software Framework for Data Analysis, Simulation and Machine Learning—Design Practice, Software Architecture, and User Experience." Applied Sciences 12, no. 6 (March 11, 2022): 2887. http://dx.doi.org/10.3390/app12062887.

Full text
Abstract:
In this paper, a hybrid distributed-parallel cluster software framework for heterogeneous computer networks is introduced that supports simulation, data analysis, and machine learning (ML), using widely available JavaScript virtual machines (VM) and web browsers to accommodate the working load. This work addresses parallelism, primarily on a control-path level and partially on a data-path level, targeting different classes of numerical problems that can be either data-partitioned or replicated. These are composed of a set of interacting worker processes that can be easily parallelized or distributed, e.g., for large-scale multi-element simulation or ML. Their suitability and scalability for static and dynamic problems are experimentally investigated regarding the proposed multi-process and communication architecture, as well as data management using customized SQL databases with network access. The framework consists of a set of tools and libraries, mainly the WorkBook (processed by a web browser) and the WorkShell (processed by node.js). It can be seen that the proposed distributed-parallel multi-process approach, with a dedicated set of inter-process communication methods (message- and shared-memory-based), scales up efficiently according to problem size and the number of processes. Finally, it is demonstrated that this JavaScript-based approach for exploiting parallelism can be used easily by any typical numerical programmer or data analyst and does not require any special knowledge about parallel and distributed systems and their interaction. The study is also focused on VM processing.
APA, Harvard, Vancouver, ISO, and other styles
31

Ahmed, Adel Ali, and Waleed Ali Ahmed. "An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things." Sensors 19, no. 17 (August 23, 2019): 3663. http://dx.doi.org/10.3390/s19173663.

Full text
Abstract:
Internet of Thing (IoT) is the most emerging technology in which all the objects in the real world can use the Internet to communicate with each other as parts of a single unified system. This eventually leads to the development of many smart applications such as smart cities, smart homes, smart healthcare, smart transportation, etc. Due to the fact that the IoT devices have limited resources, the cybersecurity approaches that relied on complex and long processing cryptography are not a good fit for these constrained devices. Moreover, the current IoT systems experience critical security vulnerabilities that include identifying which devices were affected, what data or services were accessed or compromised, and which users were impacted. The cybersecurity challenge in IoT systems is to find a solution for handling the identity of the user, things/objects and devices in a secure manner. This paper proposes an effective multifactor authentication (CMA) solution based on robust combiners of the hash functions implemented in the IoT devices. The proposed CMA solution mitigates the authentication vulnerabilities of IoT and defends against several types of attacks. Also, it achieves multi-property robustness and preserves the collision-resistance, the pseudo-randomness, the message authentication code, and the one-wayness. It also ensures the integrity, authenticity and availability of sensed data for the legitimate IoT devices. The simulation results show that CMA outperforms the TOTP in term of the authentication failure rate. Moreover, the evaluation of CMA shows an acceptable QoS measurement in terms of computation time overhead, throughput, and packet loss ratio.
APA, Harvard, Vancouver, ISO, and other styles
32

M, Ganavi, Prabhudeva S, and Hemanth Kumar N P. "An Efficient Image Steganography Scheme Using Bit-plane Slicing with Elliptic Curve Cryptography and Wavelet Transform." International Journal of Computer Network and Information Security 14, no. 4 (August 8, 2022): 43–59. http://dx.doi.org/10.5815/ijcnis.2022.04.04.

Full text
Abstract:
Information security is indispensable in the transmission of multimedia data. While accumulating and distributing such multimedia data, the access of data from a third person is the real security challenging issue. Information hiding plays an important role. Scramble the data before hiding it in carrier media gives enhanced security level for the data. In this paper, bit plane slicing is used to represent an input image with eight planes at bit-level instead of pixel-level. As the least significant bit contains noisy information, only the most significant bit plane can be used to represent an image. At the first level, an input image is processed through the spatial domain. Transform domain techniques are used to process the image at the middle level. Elliptic curve cryptography is used to scramble and descramble the MSB plane image. A logistic chaotic sequence of the input image is added to the most significant bit plane image to generate the final scrambled image. The discrete wavelet transform is used to embed the scrambled image in its high-frequency sub-bands. At the last level, a least significant bit technique, a spatial domain is used to embed the scrambled image in the carrier image. Message integrity is also verified by finding the hash of an input image. The performance of the proposed method is evaluated through various security measures. It gives good results as number of pixel change rate is closer to 100% and unified average changing intensity is 33.46.
APA, Harvard, Vancouver, ISO, and other styles
33

Matveev, Nikolay, and Andrey Turlikov. "Review of random multiple access methods for massive machine type communication." Information and Control Systems, no. 6 (January 16, 2020): 54–67. http://dx.doi.org/10.31799/1684-8853-2019-6-54-67.

Full text
Abstract:
Introduction: Intensive research is currently underway in the field of data transmission systems for the Internet of Things in relation to various scenarios of Massive Machine Type Communication. The presence of a large number of devices in such systems necessitates the use the methods of random multiple access to a common communication channel. It is proposed in some works to increase the channel utilization efficiency by the use of error correction coding methods for conflict resolution (Coded Random Access). The vast variety of options for using such communication systems has made it impossible to compare algorithms implementing this approach under the same conditions. This is a problem that restrains the development of both the theory and practice of using error correction code methods for conflict resolution. Purpose: Developing a unified approach to the description of random multiple access algorithms; performing, on the base on this approach, a review and comparative analysis of algorithms in which error correction code methods are used for conflict resolution. Results: A model of a random multiple access system is formulated in the form of a set of assumptions that reflect both the features of various scenarios of Massive Machine Type Communication and the main features of random multiple access algorithms, including Coded Random Access approaches. The system models are classified by the following features: 1) a finite or infinite number of subscribers; 2) stable, unstable or metastable systems; 3) systems with retransmissions or without them; 4) systems with losses or without them. For a lossy system, the main characteristics are Throughput (the proportion of successfully delivered messages) and Packet Loss Rate (probability of a message loss). For a lossless system, the basic characteristics are the algorithm speed and the average delay. A systematic review and comparative analysis of Coded Random Access algorithms have been carried out. The result of the comparative analysis is presented in a visual tabular form. Practical relevance: The proposed model of a random multiple access system can be used as a methodological basis for research and development of random multiple access algorithms for both existing and new scenarios of Massive Machine Type Communication. The systematic results of the review allow us to identify the promising areas of research in the field of data transmission systems for the Internet of Things.
APA, Harvard, Vancouver, ISO, and other styles
34

Rahmatulloh, Alam, Andi Nur Rachman, and Fahmi Anwar. "Implementasi Web Push Notification pada Sistem Informasi Manajemen Arsip Menggunakan PUSHJS." Jurnal Teknologi Informasi dan Ilmu Komputer 6, no. 3 (May 9, 2019): 327. http://dx.doi.org/10.25126/jtiik.201963936.

Full text
Abstract:
<p class="Abstrak">Teknologi terus menerus berkembang, berbagai jenis teknologi terus bermunculan seperti sistem informasi manajemen arsip, masalahnya para pekerja kadang melakukan pekerjaan lain di komputer sehingga arsip tidak terkontrol. Penerapan <em>Web Push Notification</em> dapat menampilkan pemberitahuan berbasis <em>website</em> meskipun tidak membuka <em>web browser</em> secara langsung atau dalam kondisi <em>minimize</em>. <em>Web Push Notification</em> merupakan mekanisme pemberitahuan menggunakan <em>Javascript</em> pada <em>web browser</em>. Fitur ini tersedia dalam <em>Push API HTML5</em> dengan menggunakan <em>Push Service</em> atau <em>Messaging server</em> yang mengirim pemberitahuan ke <em>web browser</em> yang telah berlangganan tanpa membuka <em>website</em> sehingga dapat melakukan <em>broadcast message</em> dan <em>Notification API HTML5</em> tidak memerlukan <em>Push Service</em> atau <em>Messaging server</em> tetapi harus membuka <em>website</em>, tetapi belum didukung semua <em>web browser</em> sehingga pada makalah ini dibahas Implementasi <em>Web Push Notification</em> pada sistem informasi manajemen arsip menggunakan <em>PushJS</em>, metode pengembangan yang digunakan adalah <em>Rational Unified Proccess (RUP)</em>. Teknologi pemberitahuan yang cocok untuk sistem informasi manajemen arsip berbasis <em>web</em> yaitu <em>Notification API HTML5</em> karena tidak akan mengirim pemberitahuan yang sama ke semua pengguna. Namun tidak ada proses di belakang layar sehingga tidak akan dijalankan secara otomatis, masalah tersebut diatasi dengan menggunakan <em>AJAX</em> dengan mengambil <em>JSON</em> kemudian dijalankan berulang-ulang pada <em>web browser</em> dan meminimalisir bentrokan antara <em>script web push notification</em> di <em>multi tab window</em> atau <em>window web browser</em> diatasi menggunakan <em>localStorage</em> dari <em>WebStorage API HTML5</em>. Hasil uji menunjukan bahwa penerapan teknologi <em>Web Push Notification</em> pada Sistem Informasi Manajemen Arsip dapat membantu para pengguna dalam mengelola arsip yang banyak serta penggunaan <em>AJAX</em> berpengaruh terhadap kecepatan akses web.</p><p class="Abstrak"> </p><p class="Abstrak"><em><strong>Abstract</strong></em></p><p class="Judul2"><em>Technology continues to evolve, various types of technology continue to emerge such as records management information systems, the problem is that workers sometimes do other work on the computer so that the archive is not controlled. Web Push Notification application can display website-based notifications even if you don't open the web browser directly or in a minimized condition. Web Push Notification is a notification mechanism using Javascript in a web browser. This feature is available in the HTML5 Push API by using a Push Service or Messaging server that sends notifications to subscribed web browsers without opening the website so that it can broadcast and the HTML5 Notification API does not require a Push Service or Messaging server but must open a website, but not supported all web browsers so that this paper discusses Push Notification Web Implementation in archive management information systems using PushJS, the development method used is the Rational Unified Process (RUP). Notification technology that is suitable for web-based archive management information systems namely HTML5 Notification API because it will not send the same notification to all users. But there is no process behind the scenes so that it will not be run automatically, the problem is overcome by using AJAX by retrieving JSON and then running repeatedly on the web browser and minimizing clashes between web push notification scripts on multi tab windows or web browser windows resolved using localStorage from the HTML5 WebStorage API. The test results show that the application of Web Push Notification technology in the Archive Management Information System can help users manage many archives and use AJAX influences the speed of web access.</em></p><p class="Abstrak"><em><strong><br /></strong></em></p>
APA, Harvard, Vancouver, ISO, and other styles
35

Wang, Tun, and Yu Tian. "Design of Embedded Ai Engine Based on the Microkernel Operating System." Wireless Communications and Mobile Computing 2022 (April 21, 2022): 1–9. http://dx.doi.org/10.1155/2022/9304019.

Full text
Abstract:
At present, the application of the embedded microkernel operating system in military and civil fields has begun to take shape, but it has not yet formed a unified method and standard. Due to its high performance, low frequency, and high reliability, dual-core embedded processors are getting the attention of many chip manufacturers. Compatibility has been favored by many telecom equipment manufacturers and embedded high-end application integrators, but the dual-core embedded processor needs a new real-time operating system to support it, so that it can give full play to the high performance of the dual-core. It paves the way for the application of its processor in the embedded field, but the design of embedded AI engine is not transparent to it; so, it needs the support of operating system. The user code is used to be in the operating system processor environment; so, it can be used on dual core processor first. In the real-time operating system that supports dual-core processors, the part that needs to be modified is mainly concentrated in the kernel part; so, the core design is the key point to support dual-core processors. This article is to seize this key point to carry out in-depth research. The difference and influence of hardware architecture between dual-core processor and single-core processor are the primary content of the study. Through the research of the dual-core processor architecture, the general abstraction of the dual-core processor architecture is obtained, which is the starting point of the follow-up research. This paper mainly studies the design of embedded AI engine based on the microkernel operating system, extracts the security requirements of the operating system, designs and implements the operating system from the perspective of formal verification, and considers the verification problem under the background of RTOS development, so as to avoid using too many complex data structures and algorithms in the system design and reduce the difficulty of experimental verification. In this paper, we use the spatiotemporal data model, data sharing security in the cloud environment, symmetric encryption scheme, and Paillier homomorphic encryption method to study the design of embedded AI engine based on the microkernel operating system. According to the idea of microkernel architecture, the kernel is divided into four main modules: task processing, semaphore, message queue, interrupt, and exception processing, and the lock mechanism to prevent reentrancy in software is analyzed separately. Three core function modules, initialization, process grinding, and interrupt processing, are extracted from the microkernel operating system to form the formal verification area of the operating system. At the same time, the system syntax and semantics of related rights are separated, and the main rationalization rules are described. The results show that the core of the microkernel operating system in five states adopts the microkernel architecture in the dual core environment. The microkernel architecture is a compact system kernel with good adjustability. Based on the analysis of the microkernel operating system, the internal structure of each module in the kernel is summarized, and the modules are modified according to the machine characteristics of the dual core processor; it corresponds to adding modules to meet the characteristics of dual core architecture. Kernel design is a systematic theoretical research process. This paper only uncovers the tip of the iceberg of real-time operating system kernel design on dual-core embedded processors. It is necessary to understand the kernel more deeply and master the kernel in the future work and study.
APA, Harvard, Vancouver, ISO, and other styles
36

Uhlig, Steve. "The April 2022 issue." ACM SIGCOMM Computer Communication Review 52, no. 2 (April 30, 2022): 1. http://dx.doi.org/10.1145/3544912.3544913.

Full text
Abstract:
This April 2022 issue contains five technical papers and two editorial notes. The first technical paper, Data-Plane Security Applications in Adversarial Settings , by Liang Wang and colleagues, investigates security issues that may arise when creating and running data-plane applications for programmable switches. This work moves security analysis and design forward in this particular area. This paper also calls for a more thorough rethinking of security for data-plane applications for programmable switches. The second technical paper, One Bad Apple Can Spoil Your IPv6 Privacy , by Said Jawad Saidi and colleagues, leverages IPv6 passive measurements to pinpoint that a non-negligible portion of devices encodes their MAC address in their IPv6 address. This threatens users' privacy, allowing content providers and CDNs to consistently track users and their devices across multiple sessions and locations. Overall, the paper is an excellent contribution toward privacy-by-design solutions and a nicely executed measurements study that clarifies the problem and provides solid suggestions to mitigate the problem. The third technical paper, Hyper-Specific Prefixes: Gotta Enjoy the Little Things in Interdomain Routing , by Khwaja Zubair Sediqi and colleagues, investigates the presence of high-specific prefixes (HSP) on the BGP Internet routing during the last decade. These prefixes are more-specific than /24 (/48) for IPv4 (IPv6) and are commonly filtered by Autonomous Systems operators. Overall this paper offers a nice contribution to the understanding of the BGP universe, with a clear message and a nice quantification of the phenomenon. The authors clearly present and motivate the work, offering also to not experts a nice view of the routing complexity of the nowadays internet. The fourth technical paper, Programming Socket-Independent Network Functions with Nethuns , by Nicola Bonelli and colleagues, proposes a new solution to transparently develop packet-processing programs on top of different network I/O frameworks. The authors design and develop an open-source library, nethuns, serving as a unified programming abstraction for network functions that natively supports multi-core programming. Not only is this work very relevant to our community, but also the code is released open-source through a BSD license, which can be used to foster more research in the area, towards unifying programming mechanisms of end-host networking. The fifth technical paper, Measuring DNS over TCP in the Era of Increasing DNS Response Sizes: A View from the Edge , by Mike Kosek and colleagues, studies one of the foundations of today's Internet: the Domain Name Service (DNS). The original RFC document of DNS instructs to send queries either over UDP (DoUDP) or TCP (DoTCP). This paper presents a measurement study on DoTCP focusing on two perspectives: failure rates and response times. Finally, we have two editorial notes. A Case for an Open Customizable Cloud Network , by Dean H. Lorenz and his colleagues, argues for the desirability of the new ecosystem of managed network solutions to connect to the Cloud, outlines the main requirements and sketches possible solutions. Recommendations for Designing Hybrid Conferences , by Vaibhav Bajpai and colleagues, presents guidelines and considerations-spanning technology, organization and social factors-for organizing successful hybrid conferences. I hope that you will enjoy reading this new issue and welcome comments and suggestions on CCR Online (https://ccronline.sigcomm.org) or by email at ccr-editor at sigcomm.org.
APA, Harvard, Vancouver, ISO, and other styles
37

Nayyar, Anand, Pijush Kanti Dutta Pramankit, and Rajni Mohana. "Introduction to the Special Issue on Evolving IoT and Cyber-Physical Systems: Advancements, Applications, and Solutions." Scalable Computing: Practice and Experience 21, no. 3 (August 1, 2020): 347–48. http://dx.doi.org/10.12694/scpe.v21i3.1568.

Full text
Abstract:
Internet of Things (IoT) is regarded as a next-generation wave of Information Technology (IT) after the widespread emergence of the Internet and mobile communication technologies. IoT supports information exchange and networked interaction of appliances, vehicles and other objects, making sensing and actuation possible in a low-cost and smart manner. On the other hand, cyber-physical systems (CPS) are described as the engineered systems which are built upon the tight integration of the cyber entities (e.g., computation, communication, and control) and the physical things (natural and man-made systems governed by the laws of physics). The IoT and CPS are not isolated technologies. Rather it can be said that IoT is the base or enabling technology for CPS and CPS is considered as the grownup development of IoT, completing the IoT notion and vision. Both are merged into closed-loop, providing mechanisms for conceptualizing, and realizing all aspects of the networked composed systems that are monitored and controlled by computing algorithms and are tightly coupled among users and the Internet. That is, the hardware and the software entities are intertwined, and they typically function on different time and location-based scales. In fact, the linking between the cyber and the physical world is enabled by IoT (through sensors and actuators). CPS that includes traditional embedded and control systems are supposed to be transformed by the evolving and innovative methodologies and engineering of IoT. Several applications areas of IoT and CPS are smart building, smart transport, automated vehicles, smart cities, smart grid, smart manufacturing, smart agriculture, smart healthcare, smart supply chain and logistics, etc. Though CPS and IoT have significant overlaps, they differ in terms of engineering aspects. Engineering IoT systems revolves around the uniquely identifiable and internet-connected devices and embedded systems; whereas engineering CPS requires a strong emphasis on the relationship between computation aspects (complex software) and the physical entities (hardware). Engineering CPS is challenging because there is no defined and fixed boundary and relationship between the cyber and physical worlds. In CPS, diverse constituent parts are composed and collaborated together to create unified systems with global behaviour. These systems need to be ensured in terms of dependability, safety, security, efficiency, and adherence to real‐time constraints. Hence, designing CPS requires knowledge of multidisciplinary areas such as sensing technologies, distributed systems, pervasive and ubiquitous computing, real-time computing, computer networking, control theory, signal processing, embedded systems, etc. CPS, along with the continuous evolving IoT, has posed several challenges. For example, the enormous amount of data collected from the physical things makes it difficult for Big Data management and analytics that includes data normalization, data aggregation, data mining, pattern extraction and information visualization. Similarly, the future IoT and CPS need standardized abstraction and architecture that will allow modular designing and engineering of IoT and CPS in global and synergetic applications. Another challenging concern of IoT and CPS is the security and reliability of the components and systems. Although IoT and CPS have attracted the attention of the research communities and several ideas and solutions are proposed, there are still huge possibilities for innovative propositions to make IoT and CPS vision successful. The major challenges and research scopes include system design and implementation, computing and communication, system architecture and integration, application-based implementations, fault tolerance, designing efficient algorithms and protocols, availability and reliability, security and privacy, energy-efficiency and sustainability, etc. It is our great privilege to present Volume 21, Issue 3 of Scalable Computing: Practice and Experience. We had received 30 research papers and out of which 14 papers are selected for publication. The objective of this special issue is to explore and report recent advances and disseminate state-of-the-art research related to IoT, CPS and the enabling and associated technologies. The special issue will present new dimensions of research to researchers and industry professionals with regard to IoT and CPS. Vivek Kumar Prasad and Madhuri D Bhavsar in the paper titled "Monitoring and Prediction of SLA for IoT based Cloud described the mechanisms for monitoring by using the concept of reinforcement learning and prediction of the cloud resources, which forms the critical parts of cloud expertise in support of controlling and evolution of the IT resources and has been implemented using LSTM. The proper utilization of the resources will generate revenues to the provider and also increases the trust factor of the provider of cloud services. For experimental analysis, four parameters have been used i.e. CPU utilization, disk read/write throughput and memory utilization. Kasture et al. in the paper titled "Comparative Study of Speaker Recognition Techniques in IoT Devices for Text Independent Negative Recognition" compared the performance of features which are used in state of art speaker recognition models and analyse variants of Mel frequency cepstrum coefficients (MFCC) predominantly used in feature extraction which can be further incorporated and used in various smart devices. Mahesh Kumar Singh and Om Prakash Rishi in the paper titled "Event Driven Recommendation System for E-Commerce using Knowledge based Collaborative Filtering Technique" proposed a novel system that uses a knowledge base generated from knowledge graph to identify the domain knowledge of users, items, and relationships among these, knowledge graph is a labelled multidimensional directed graph that represents the relationship among the users and the items. The proposed approach uses about 100 percent of users' participation in the form of activities during navigation of the web site. Thus, the system expects under the users' interest that is beneficial for both seller and buyer. The proposed system is compared with baseline methods in area of recommendation system using three parameters: precision, recall and NDGA through online and offline evaluation studies with user data and it is observed that proposed system is better as compared to other baseline systems. Benbrahim et al. in the paper titled "Deep Convolutional Neural Network with TensorFlow and Keras to Classify Skin Cancer" proposed a novel classification model to classify skin tumours in images using Deep Learning methodology and the proposed system was tested on HAM10000 dataset comprising of 10,015 dermatoscopic images and the results observed that the proposed system is accurate in order of 94.06\% in validation set and 93.93\% in the test set. Devi B et al. in the paper titled "Deadlock Free Resource Management Technique for IoT-Based Post Disaster Recovery Systems" proposed a new class of techniques that do not perform stringent testing before allocating the resources but still ensure that the system is deadlock-free and the overhead is also minimal. The proposed technique suggests reserving a portion of the resources to ensure no deadlock would occur. The correctness of the technique is proved in the form of theorems. The average turnaround time is approximately 18\% lower for the proposed technique over Banker's algorithm and also an optimal overhead of O(m). Deep et al. in the paper titled "Access Management of User and Cyber-Physical Device in DBAAS According to Indian IT Laws Using Blockchain" proposed a novel blockchain solution to track the activities of employees managing cloud. Employee authentication and authorization are managed through the blockchain server. User authentication related data is stored in blockchain. The proposed work assists cloud companies to have better control over their employee's activities, thus help in preventing insider attack on User and Cyber-Physical Devices. Sumit Kumar and Jaspreet Singh in paper titled "Internet of Vehicles (IoV) over VANETS: Smart and Secure Communication using IoT" highlighted a detailed description of Internet of Vehicles (IoV) with current applications, architectures, communication technologies, routing protocols and different issues. The researchers also elaborated research challenges and trade-off between security and privacy in area of IoV. Deore et al. in the paper titled "A New Approach for Navigation and Traffic Signs Indication Using Map Integrated Augmented Reality for Self-Driving Cars" proposed a new approach to supplement the technology used in self-driving cards for perception. The proposed approach uses Augmented Reality to create and augment artificial objects of navigational signs and traffic signals based on vehicles location to reality. This approach help navigate the vehicle even if the road infrastructure does not have very good sign indications and marking. The approach was tested locally by creating a local navigational system and a smartphone based augmented reality app. The approach performed better than the conventional method as the objects were clearer in the frame which made it each for the object detection to detect them. Bhardwaj et al. in the paper titled "A Framework to Systematically Analyse the Trustworthiness of Nodes for Securing IoV Interactions" performed literature on IoV and Trust and proposed a Hybrid Trust model that seperates the malicious and trusted nodes to secure the interaction of vehicle in IoV. To test the model, simulation was conducted on varied threshold values. And results observed that PDR of trusted node is 0.63 which is higher as compared to PDR of malicious node which is 0.15. And on the basis of PDR, number of available hops and Trust Dynamics the malicious nodes are identified and discarded. Saniya Zahoor and Roohie Naaz Mir in the paper titled "A Parallelization Based Data Management Framework for Pervasive IoT Applications" highlighted the recent studies and related information in data management for pervasive IoT applications having limited resources. The paper also proposes a parallelization-based data management framework for resource-constrained pervasive applications of IoT. The comparison of the proposed framework is done with the sequential approach through simulations and empirical data analysis. The results show an improvement in energy, processing, and storage requirements for the processing of data on the IoT device in the proposed framework as compared to the sequential approach. Patel et al. in the paper titled "Performance Analysis of Video ON-Demand and Live Video Streaming Using Cloud Based Services" presented a review of video analysis over the LVS \& VoDS video application. The researchers compared different messaging brokers which helps to deliver each frame in a distributed pipeline to analyze the impact on two message brokers for video analysis to achieve LVS & VoS using AWS elemental services. In addition, the researchers also analysed the Kafka configuration parameter for reliability on full-service-mode. Saniya Zahoor and Roohie Naaz Mir in the paper titled "Design and Modeling of Resource-Constrained IoT Based Body Area Networks" presented the design and modeling of a resource-constrained BAN System and also discussed the various scenarios of BAN in context of resource constraints. The Researchers also proposed an Advanced Edge Clustering (AEC) approach to manage the resources such as energy, storage, and processing of BAN devices while performing real-time data capture of critical health parameters and detection of abnormal patterns. The comparison of the AEC approach is done with the Stable Election Protocol (SEP) through simulations and empirical data analysis. The results show an improvement in energy, processing time and storage requirements for the processing of data on BAN devices in AEC as compared to SEP. Neelam Saleem Khan and Mohammad Ahsan Chishti in the paper titled "Security Challenges in Fog and IoT, Blockchain Technology and Cell Tree Solutions: A Review" outlined major authentication issues in IoT, map their existing solutions and further tabulate Fog and IoT security loopholes. Furthermore, this paper presents Blockchain, a decentralized distributed technology as one of the solutions for authentication issues in IoT. In addition, the researchers discussed the strength of Blockchain technology, work done in this field, its adoption in COVID-19 fight and tabulate various challenges in Blockchain technology. The researchers also proposed Cell Tree architecture as another solution to address some of the security issues in IoT, outlined its advantages over Blockchain technology and tabulated some future course to stir some attempts in this area. Bhadwal et al. in the paper titled "A Machine Translation System from Hindi to Sanskrit Language Using Rule Based Approach" proposed a rule-based machine translation system to bridge the language barrier between Hindi and Sanskrit Language by converting any test in Hindi to Sanskrit. The results are produced in the form of two confusion matrices wherein a total of 50 random sentences and 100 tokens (Hindi words or phrases) were taken for system evaluation. The semantic evaluation of 100 tokens produce an accuracy of 94\% while the pragmatic analysis of 50 sentences produce an accuracy of around 86\%. Hence, the proposed system can be used to understand the whole translation process and can further be employed as a tool for learning as well as teaching. Further, this application can be embedded in local communication based assisting Internet of Things (IoT) devices like Alexa or Google Assistant. Anshu Kumar Dwivedi and A.K. Sharma in the paper titled "NEEF: A Novel Energy Efficient Fuzzy Logic Based Clustering Protocol for Wireless Sensor Network" proposed a a deterministic novel energy efficient fuzzy logic-based clustering protocol (NEEF) which considers primary and secondary factors in fuzzy logic system while selecting cluster heads. After selection of cluster heads, non-cluster head nodes use fuzzy logic for prudent selection of their cluster head for cluster formation. NEEF is simulated and compared with two recent state of the art protocols, namely SCHFTL and DFCR under two scenarios. Simulation results unveil better performance by balancing the load and improvement in terms of stability period, packets forwarded to the base station, improved average energy and extended lifetime.
APA, Harvard, Vancouver, ISO, and other styles
38

Carpenter, Angela. "Responsive Becoming: Moral Formation in Theological, Evolutionary, and Developmental Perspective." Perspectives on Science and Christian Faith 73, no. 4 (December 2021): 235–37. http://dx.doi.org/10.56315/pscf12-21carpenter.

Full text
Abstract:
RESPONSIVE BECOMING: Moral Formation in Theological, Evolutionary, and Developmental Perspective by Angela Carpenter. New York: T&T Clark, 2020. 200 pages. Paperback; $39.95. ISBN: 9780567698162. *Carpenter, in this well-written, methodologically astute, and thought-provoking study on moral formation rubs several unusual sticks together: Reformed theologies of sanctification, extended evolutionary synthesis theories, and current offerings in developmental psychology. The result is a wonderful fire that sheds much light on all these areas. This study is sure to be an important conversation partner for those interested in the ongoing dialogue between theology and the social sciences, as well as those interested in the doctrine of sanctification and its relationship to understandings of moral formation. We are in Carpenter's debt for such stimulating interdisciplinary work. *The subtitle lists Carpenter's three main interlocutors. In her first three chapters, she begins with a theological analysis of the views of sanctification of John Calvin (chap. 1), John Owen (chap. 2), and Horace Bushnell (chap. 3), in which she uncovers several "recurring questions and difficulties" in the Reformed tradition (p. 3). These difficulties include, first, the extent to which sanctification should be dependent upon "a particular cognitive-affective state" (p. 36)--namely that the believer trusts in God as a loving parent such that one's good works flow from this state of "faith." This can prove to be an unstable foundation given the "unreliability of subjective awareness" (p. 152). A second question centers on the extent to which God's trinitarian sanctifying action should be understood to work through, or alternatively totally displace, "intra-human sources of formation" (pp. 37, 152). Calvin's theology is filled with tension in these areas, tensions which are resolved in one direction in John Owen's theology as he reacts against "Pelagian" threats in his day and upholds "the integrity of grace" (p. 3) in a certain way. Owen emphasizes the objective work of God in sanctification, such that human cognitive-affective states do not matter much, nor is sanctification seen to be mediated through any human formative influences. Bushnell, responding against revivalist accounts of sanctification in his day, takes the opposite tack, and emphasizes both the human subjective response to God and formative processes such as the nurture of children by Christian parents, so much so that "the activity of the Spirit cannot be considered apart from the natural means through which it operates" (p. 87). I learned much from Carpenter's appreciative yet incisive exposition and analysis, not least of which are the ways that typical Protestant views of sanctification, such as those of Calvin and especially Owen, can pull one in the opposite direction from much of the recent revival of virtue theory and discussions of formative practices in Christian ethics and practical theology. *The key link between these chapters and the following ones is the importance of the parent-child metaphor for the relationship of the Christian to God. "God as a loving parent and the faithful person as the adopted child of God" (p. 5) is a common and important image for Calvin, and indeed for the Christian tradition as a whole, as attested by the first two words of the Lord's Prayer. This raises questions about the extent to which the divine-human parent-child relationship has dynamics that are analogous to human-human parent-child relationships, and the extent to which natural processes of human moral formation are related to the process of sanctification through the gracious activity of God, our heavenly parent. *She pursues these and other questions through a deep dive into the intricacies of current discussions of evolutionary theory (chap. 4) and developmental psychology (chap. 5). In both these chapters, a recurring motif is that relationships of care, affect, and social acceptance bring about important changes in humans. The "niche construction" of systems of affect, attachment, and "concern for the emotions and welfare of others" (p. 111) plays a key part in our evolutionary history, and "early and affective social acceptance" (p. 129) plays a key part in the moral development of children. One can see how important moral changes that these natural processes create in human beings resonate with descriptions of sanctified human behavior that result from the parental love of God. Could these processes, especially when seen in light of trinitarian accounts of the work of Christ and the Spirit, help us better understand God's sanctifying work, without reducing God's gracious action to simply these natural processes? Could such an account help one move through the tensions within doctrines of sanctification in the Reformed tradition? This is the direction of Carpenter's questioning and answering throughout the text and especially in her constructive account of sanctification in chapter 6, "Sanctification Revisited." *I have so much admiration for this excellent study, and there is so much to respond to in this rich text. One key lesson I gained was that love, here understood primarily as an affective relationship of social acceptance and care, is not some added luxury in human life, but rather is a foundational component for human evolution and moral formation. As a theologian this will change the way I think about "justification," which was interestingly not a word highlighted in the text. Carpenter pushes me to anchor my Protestant understanding of justification deeply within the realm of a relationship of acceptance and care between a human and God, rather than seeing it primarily as a juridical status. Carpenter shows there are important "sanctifying" aspects of this relationship; the two theological concepts are linked in important ways. *I also came away with two primary sets of questions, especially regarding her proposals for a revisited doctrine of sanctification. The first has to do with the description of sanctification itself. What does a sanctified or holy life look like? Carpenter emphasizes aspects of sanctification that are direct results of being adopted as a child of God; in this way one becomes a "new being" in Christ (p. 153). This relationship with God satisfies "affect hunger" (p. 158) and provides a social context in which a "new heart" can develop (p. 158). Instead of focusing on an examination of one's own heart (p. 161), or alternatively on following rules or examples outside of oneself, such as the example of Jesus understood "legalistically" (p. 158), Carpenter emphasizes that the Christian life of sanctification is an ongoing repentance from alienation from the creator (p. 162); vivification occurs when one turns again and again to the loving arms of God (p. 163). My wonder here is whether increasing conformity with clear models of God's holy intentions for human life that go beyond the activity of continual repentance and returning to God should also be emphasized. Carpenter certainly talks about conformity to Christ, but the pattern of Christ is usually talked about in terms of "repeated returning" (p. 161) and "perfect fellowship with the Father" (p. 162). I sense perhaps an overemphasis on Spirit, and not enough on Word or the patterns that sanctified life takes: in Calvin's trinitarian theology, "Word" (related to attributes of form, pattern, or way of life) and "Spirit" (related to the energy by which that form is achieved; see Institutes 1.13.18) must go together. While the law and prophets hang on the command to love God and neighbor, such love is fleshed out in a variety of holy ways of life that God intends for humanity. Carpenter's wariness about virtue ethics seems to go hand in hand with this reticence to name behaviors, virtues, or practices other than repentance, acceptance, and positive affectivity. It is unclear to me whether this is simply a matter of scope and focus--"focus on the relationship with God, rather than on one's inner life or outer behaviors" is a clear and salutary message throughout the text--or is a feature of her total understanding of sanctification. *I also wonder whether Carpenter's description of God's activity in sanctification could be improved by considering different ways that God relates to the world. Both Karl Barth and especially David Kelsey (in Eccentric Existence) have taught me to consider that God's activity toward all that is not God takes three primary shapes or "trinitarian taxes" in God's work of creation, reconciliation, and in drawing all that is not God to eschatological consummation. Carpenter's important insights about the foundational nature of affective relationships might find greater sharpness through a distinction between (1) God's creational work (which would be mediated generally through evolutionary processes which include human parent-child relationships), (2) God's reconciling work (which many would claim is mediated primarily and more particularly through the people of God), and (3) God's "kingdom" work (mediated through Spirit-inspired renewed ways of life). This might create greater space for talk of justice and vocation, as well as greater distinctions between God's activity in Christian communities and elsewhere. All three avenues of God's activity and human response to it involve the intertwined, yet unified, sanctifying work of God that is based upon affective acceptance; however, by noting these distinctions, greater space might be created both for greater specifications of holy living and for distinctions between God's more particular and more general work in the world. *None of these wonderings should detract from the seminal nature of Carpenter's work. Her emphasis on the importance of intra-human and divine-human affective relationships in moral formation and sanctification provides an important foundational structure to discussions of sanctification. Carpenter's methodologically careful, insightful, and thought-provoking work will surely be a voice of continuing importance in ongoing discussions of sanctification within theology and in the needed intra-disciplinary dialogue between theology and the social sciences. *Reviewed by David Stubbs, Professor of Ethics and Theology, Western Theological Seminary, Holland, MI 49423.
APA, Harvard, Vancouver, ISO, and other styles
39

Bonney, Wilfred, Sandy F. Price, Swapna Abhyankar, Riki Merrick, Varsha Hampole, Tanya A. Halse, Charles DiDonato, et al. "Towards Unified Data Exchange Formats for Reporting Molecular Drug Susceptibility Testing." Online Journal of Public Health Informatics 12, no. 2 (December 8, 2020). http://dx.doi.org/10.5210/ojphi.v12i2.10644.

Full text
Abstract:
Background: With the rapid development of new advanced molecular detection methods, identification of new genetic mutations conferring pathogen resistance to an ever-growing variety of antimicrobial substances will generate massive genomic datasets for public health and clinical laboratories. Keeping up with specialized standard coding for these immense datasets will be extremely challenging. This challenge prompted our effort to create a common molecular resistance Logical Observation Identifiers Names and Codes (LOINC) panel that can be used to report any identified antimicrobial resistance pattern. Objective: To develop and utilize a common molecular resistance LOINC panel for molecular drug susceptibility testing (DST) data exchange in the U.S. National Tuberculosis Surveillance System using California Department of Public Health (CDPH) and New York State Department of Health as pilot sites. Methods: We developed an interface and mapped incoming molecular DST data to the common molecular resistance LOINC panel using Health Level Seven (HL7) v2.5.1 Electronic Laboratory Reporting (ELR) message specifications through the Orion Health™ Rhapsody Integration Engine v6.3.1. Results: Both pilot sites were able to process and upload/import the standardized HL7 v2.5.1 ELR messages into their respective systems; albeit CDPH identified areas for system improvements and has focused efforts to streamline the message importation process. Discussion: The common molecular resistance LOINC panel is designed to be generalizable across other resistance genes and ideally also applicable to other disease domains. Conclusion: The study demonstrates that it is possible to exchange molecular DST data across the continuum of disparate healthcare information systems in integrated public health environments using the common molecular resistance LOINC panel. Keywords: Data Exchange Formats, Electronic Laboratory Reporting, Health Information Exchange, LOINC, Health Level Seven, Public Health Surveillance.
APA, Harvard, Vancouver, ISO, and other styles
40

Xie, Xingfeng, Zaijun Wu, Qinran Hu, Xiangjun Quan, Xiaobo Dou, and Xiaoyong Cao. "A Unified Modeling Scheme of Modular Multilevel Converter for Hybrid AC/DC Power Grids." Frontiers in Energy Research 10 (April 13, 2022). http://dx.doi.org/10.3389/fenrg.2022.844713.

Full text
Abstract:
Modular multilevel converters (MMCs), as one of the core components of hybrid AC/DC power grids, become the preferred converter topology and show good developments. Urgently, a general MMC modeling scheme with good model accuracy needs to be developed to realize small-signal analyses and designs for the large-scale AC/DC power grids easily. This paper proposes a unified modeling scheme (UMS) for MMC systems in a synchronous rotating (dq) reference frame. Based on the dynamic phasor theory and with the proposed modular decouple modeling (MDM), the nonlinear state-space model of the overall MMC system can be obtained by configuring and connecting the input and output of the state-space model of each subsystem. Besides, the unified controller, modeling different control modes, normalizes the MMC systems modeling. Simultaneously, with the proposal of UMS, linearization and splicing could be uesd to develop a small-signal model of the overall MMC system directly. Therefore, the proposed model is suitable for simulating the large-scale hybrid AC/DC power grids and analyzing the stability of small-signal. Finally, the simulation results verify the accuracy and effectiveness of the proposed modeling method.
APA, Harvard, Vancouver, ISO, and other styles
41

Kuzmenko, Olha, Hanna Yarovenko, and Vitaliia Koibichuk. "DEVELOPMENT OF THE USER INTERFACE FOR THE AUTOMATED INTERNAL FINANCIAL MONITORING MODULE BASED ON UML-METHODOLOGY." Scientific opinion: Economics and Management, no. 6(76) (2021). http://dx.doi.org/10.32836/2521-666x/2021-76-16.

Full text
Abstract:
The rapid development of object-oriented programming languages in the late twentieth century contributed to the development of unified modeling languages for graphical description of software development, system design, mapping organizational structures, and modeling business processes of the financial and economic environment. In today's conditions, such broad-profile languages are notations IDEF0, IDEF3 (Integrated Definition for Function Modeling), DFD (Data Flow Diagram), UML (Unified Modeling Language), which allow the effective definition, visualization, design, documentation of automated software modules and systems. The article develops communication models between the main users of the system and the module of automated internal financial monitoring to identify the quality of financial transactions and prevent the legalization of criminal proceeds based on UML charts. The proposed diagrams visualize all stages of verification of the financial transaction, determine the direction of the exchange of messages between the involved modules (services) of internal financial monitoring and the services of the State Financial Monitoring (National Bank of Ukraine, Security Service of Ukraine). Their logic is based on the following actions: the implementation of a financial transaction by the user through a mobile or web application or the Client-Bank system; request of the automated banking system to the financial monitoring module regarding the need for financial monitoring; start of verification by a responsible employee of the bank who communicates with the monitoring module, receives information based on the relevant verification criteria for approving or rejecting a financial transaction, or using a module containing built-in artificial intelligence, business logic and audits financial transactions; receiving inspection results, sending them to the user, responsible employees of the bank; sending letters to the authorized bodies of the state financial monitoring services for those transactions that have not been verified or have risky signs of legalization of criminal proceeds.
APA, Harvard, Vancouver, ISO, and other styles
42

Zhang, Wenzhao, Yuxuan Zhang, Hongchang Fan, Yi Gao, and Wei Dong. "A Low-Code Development Framework for Cloud-Native Edge Systems." ACM Transactions on Internet Technology, September 15, 2022. http://dx.doi.org/10.1145/3563215.

Full text
Abstract:
Customizing and deploying an edge system are time-consuming and complex tasks because of hardware heterogeneity, third-party software compatibility, diverse performance requirements, etc. In this paper, we present TinyEdge, a holistic framework for the low-code development of edge systems. The key idea of TinyEdge is to use a top-down approach for designing edge systems. Developers select and configure TinyEdge modules to specify their interaction logic without dealing with the specific hardware or software. Taking the configuration as input, TinyEdge automatically generates the deployment package and estimates the performance with sufficient profiling. TinyEdge provides a unified development toolkit to specify module dependencies, functionalities, interactions, and configurations. We implement TinyEdge and evaluate its performance using real-world edge systems. Results show that: 1) TinyEdge achieves rapid customization of edge systems, reducing 44.15% of development time and 67.79% of lines of code on average compared with the state-of-the-art edge computing platforms; 2) TinyEdge builds compact modules and optimizes the latent circular dependency detection and message routing efficiency; 3) TinyEdge performance estimation has low absolute errors in various settings.
APA, Harvard, Vancouver, ISO, and other styles
43

Armour, Marcel, and Bertram Poettering. "Algorithm substitution attacks against receivers." International Journal of Information Security, June 21, 2022. http://dx.doi.org/10.1007/s10207-022-00596-5.

Full text
Abstract:
AbstractThis work describes a class of Algorithm Substitution Attack (ASA) generically targeting the receiver of a communication between two parties. Our work provides a unified framework that applies to any scheme where a secret key is held by the receiver; in particular, message authentication schemes (MACs), authenticated encryption (AEAD) and public key encryption (PKE). Our unified framework brings together prior work targeting MAC schemes (FSE’19) and AEAD schemes (IMACC’19); we extend prior work by showing that public key encryption may also be targeted. ASAs were initially introduced by Bellare, Paterson and Rogaway in light of revelations concerning mass surveillance, as a novel attack class against the confidentiality of encryption schemes. Such an attack replaces one or more of the regular scheme algorithms with a subverted version that aims to reveal information to an adversary (engaged in mass surveillance), while remaining undetected by users. Previous work looking at ASAs against encryption schemes can be divided into two groups. ASAs against PKE schemes target key generation by creating subverted public keys that allow an adversary to recover the secret key. ASAs against symmetric encryption target the encryption algorithm and leak information through a subliminal channel in the ciphertexts. We present a new class of attack that targets the decryption algorithm of an encryption scheme for symmetric encryption and public key encryption, or the verification algorithm for an authentication scheme. We present a generic framework for subverting a cryptographic scheme between a sender and receiver, and show how a decryption oracle allows a subverter to create a subliminal channel which can be used to leak secret keys. We then show that the generic framework can be applied to authenticated encryption with associated data, message authentication schemes, public key encryption and KEM/DEM constructions. We consider practical considerations and specific conditions that apply for particular schemes, strengthening the generic approach. Furthermore, we show how the hybrid subversion of key generation and decryption algorithms can be used to amplify the effectiveness of our decryption attack. We argue that this attack represents an attractive opportunity for a mass surveillance adversary. Our work serves to refine the ASA model and contributes to a series of papers that raises awareness and understanding about what is possible with ASAs.
APA, Harvard, Vancouver, ISO, and other styles
44

Karimoddini, Ali, Abel Hailemichael, and Mo Jamshidi. "FLC-ROS: A generic and configurable ROS package for developing fuzzy logic controllers1." Journal of Intelligent & Fuzzy Systems, February 27, 2022, 1–16. http://dx.doi.org/10.3233/jifs-210341.

Full text
Abstract:
Fuzzy logic controllers can handle complex systems by incorporating expert’s knowledge in the absence of formal mathematical models. Further, fuzzy logic controllers can effectively capture and accommodate uncertainties that are inherent in real-world controlled systems. On the other hand, Robot Operating System (ROS) has been widely used for many robotic applications due to its modular structure and efficient message-passing mechanisms for the integration of system’s components. For this reason, Robot Operating System is an ideal tool for developing software stacks for robotic applications. This paper develops a generic and configurable Robot Operating System package for the implementation of fuzzy logic controllers, particularly type-1 and interval type-2, which are based on either Mamdani or Takagi-Sugeno-Kang fuzzy inference mechanisms. This is achieved by employing a systematic object-oriented approach using the Unified Model Language (UML) to implement the fuzzy inference system as a single class that is composed of fuzzifier, inference, and defuzzifier classes. The deployment of the developed Robot Operating System package is demonstrated by implementing an interval type-2 fuzzy logic control of an Unmanned Aerial Vehicle (UAV).
APA, Harvard, Vancouver, ISO, and other styles
45

Dua, Mohit, Arun Suthar, Arpit Garg, and Vaibhav Garg. "An ILM-cosine transform-based improved approach to image encryption." Complex & Intelligent Systems, October 10, 2020. http://dx.doi.org/10.1007/s40747-020-00201-z.

Full text
Abstract:
Abstract The chaos-based cryptography techniques are used widely to protect digital information from intruders. The chaotic systems have some of special features that make them suitable for the purpose of encryption. These systems are highly unpredictable and are highly sensitive or responsive to the initial conditions, also known as butterfly effect. This sensitive dependence on initial conditions make these systems to exhibit an intricate dynamical behaviour. However, this dynamical behaviour is not much complex in simple one-dimensional chaotic maps. Hence, it becomes easy for an intruder to predict the contents of the message being sent. The proposed work in this paper introduces an improved method for encrypting images, which uses cosine transformation of 3-D Intertwining Logistic Map (ILM). The proposed approach has been split into three major parts. In the first part, Secure Hash Function-256 (SHA-256) is used with cosine transformed ILM (CT-ILM) to generate the chaotic sequence. This chaotic sequence is used by high-efficiency scrambling to reduce the correlations between the adjacent pixels of the image. In the second part, the image is rotated to move all the pixels away from their original position. In the third part, random order substitution is applied to change the value of image pixels. The effectiveness of the proposed method has been tested on a number of standard parameters such as correlation coefficient, Entropy and Unified average change in intensity. The proposed approach has also been tested for decryption parameters like mean square error and peak signal to noise ratio. It can easily be observed from the obtained results that the proposed method of image encryption is more secure and time efficient than some earlier proposed techniques. The approach works for both color and grey scale images.
APA, Harvard, Vancouver, ISO, and other styles
46

Zheng, Pengyi, and Yuan Rao. "NetDDS:a real-time interactive platform based on publish-subscribe mechanism." Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering) 15 (March 4, 2022). http://dx.doi.org/10.2174/2352096515666220304105301.

Full text
Abstract:
Background: With the continuous development of big data, artificial intelligence, Internet of things and blockchain technology, distributed interactive systems have gradually become the mainstream of computing technologies and applications with the help of real-time interaction platforms. real-Rime interaction platforms provide a data communication bridge for distributed applications, not only meeting the timeliness and correctness of data interaction, but also providing a unified interface for application development. It realizes the plug and play of different functional modules in the distributed system and improves development efficiency for system developers. Objective: According to the characteristics of large scale, wide range and complex running environment of distributed interaction systems, this paper analyzes the function and performance requirements of the distributed interactive platform and designs and implements a real-time interactive platform named NetDDS based on a publish-subscribe mechanism. Methods: Taking the idea of a layered design, the real-time interactive platform is constructed from three aspects: distribution service layer, QoS guarantee layer, and data transmission layer. The platform provides a data synchronization function based on publish/subscribe mechanism, configurable QoS guarantee mechanism and multi-protocol data transmission mechanism based on Ethernet, ensuring the real-time correctness and reliability of data transmission. Results: Experimental results show that the interactive platform achieves a low message update delay. Conclusion: This paper proposes a hierarchical architecture, designs and implements a real-time interaction platform based on publish/subscribe mechanism, and provides a topic based publish/subscribe model to the application layer. The publisher and subscriber directly publish and subscribe with data as the center to meet the real-time requirements of distributed real-time applications.
APA, Harvard, Vancouver, ISO, and other styles
47

Safron, Adam. "An Integrated World Modeling Theory (IWMT) of Consciousness: Combining Integrated Information and Global Neuronal Workspace Theories With the Free Energy Principle and Active Inference Framework; Toward Solving the Hard Problem and Characterizing Agentic Causation." Frontiers in Artificial Intelligence 3 (June 9, 2020). http://dx.doi.org/10.3389/frai.2020.00030.

Full text
Abstract:
The Free Energy Principle and Active Inference Framework (FEP-AI) begins with the understanding that persisting systems must regulate environmental exchanges and prevent entropic accumulation. In FEP-AI, minds and brains are predictive controllers for autonomous systems, where action-driven perception is realized as probabilistic inference. Integrated Information Theory (IIT) begins with considering the preconditions for a system to intrinsically exist, as well as axioms regarding the nature of consciousness. IIT has produced controversy because of its surprising entailments: quasi-panpsychism; subjectivity without referents or dynamics; and the possibility of fully-intelligent-yet-unconscious brain simulations. Here, I describe how these controversies might be resolved by integrating IIT with FEP-AI, where integrated information only entails consciousness for systems with perspectival reference frames capable of generating models with spatial, temporal, and causal coherence for self and world. Without that connection with external reality, systems could have arbitrarily high amounts of integrated information, but nonetheless would not entail subjective experience. I further describe how an integration of these frameworks may contribute to their evolution as unified systems theories and models of emergent causation. Then, inspired by both Global Neuronal Workspace Theory (GNWT) and the Harmonic Brain Modes framework, I describe how streams of consciousness may emerge as an evolving generation of sensorimotor predictions, with the precise composition of experiences depending on the integration abilities of synchronous complexes as self-organizing harmonic modes (SOHMs). These integrating dynamics may be particularly likely to occur via richly connected subnetworks affording body-centric sources of phenomenal binding and executive control. Along these connectivity backbones, SOHMs are proposed to implement turbo coding via loopy message-passing over predictive (autoencoding) networks, thus generating maximum a posteriori estimates as coherent vectors governing neural evolution, with alpha frequencies generating basic awareness, and cross-frequency phase-coupling within theta frequencies for access consciousness and volitional control. These dynamic cores of integrated information also function as global workspaces, centered on posterior cortices, but capable of being entrained with frontal cortices and interoceptive hierarchies, thus affording agentic causation. Integrated World Modeling Theory (IWMT) represents a synthetic approach to understanding minds that reveals compatibility between leading theories of consciousness, thus enabling inferential synergy.
APA, Harvard, Vancouver, ISO, and other styles
48

Ballard, Su. "Information, Noise and et al." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2704.

Full text
Abstract:
The two companions scurry off when they hear a noise at the door. It was only a noise, but it was also a message, a bit of information producing panic: an interruption, a corruption, a rupture of communication. Was the noise really a message? Wasn’t it, rather, static, a parasite? Michael Serres, 1982. Since, ordinarily, channels have a certain amount of noise, and therefore a finite capacity, exact transmission is impossible. Claude Shannon, 1948. Reading Information At their most simplistic, there are two means for shifting information around – analogue and digital. Analogue movement depends on analogy to perform computations; it is continuous and the relationships between numbers are keyed as a continuous ordinal set. The digital set is discrete; moving one finger at a time results in a one-to-one correspondence. Nevertheless, analogue and digital are like the two companions in Serres’ tale. Each suffers the relationship of noise to information as internal rupture and external interference. In their examination of historical constructions of information, Hobart and Schiffman locate the noise of the analogue within its physical materials; they write, “All analogue machines harbour a certain amount of vagueness, known technically as ‘noise’. Which describes the disturbing influences of the machine’s physical materials on its calculations” (208). These “certain amounts of vagueness” are essential to Claude Shannon’s articulation of a theory for information transfer that forms the basis for this paper. In transforming the structures and materials through which it travels, information has left its traces in digital art installation. These traces are located in installation’s systems, structures and materials. The usefulness of information theory as a tool to understand these relationships has until recently been overlooked by a tradition of media art history that has grouped artworks according to the properties of the artwork and/or tied them into the histories of representation and perception in art theory. Throughout this essay I use the productive dual positioning of noise and information to address the errors and impurity inherent within the viewing experiences of digital installation. Information and Noise It is not hard to see why the fractured spaces of digital installation are haunted by histories of information science. In his 1948 essay “The Mathematical Theory of Communication” Claude Shannon developed a new model for communications technologies that articulated informational feedback processes. Discussions of information transmission through phone lines were occurring alongside the development of technology capable of computing multiple discrete and variable packets of information: that is, the digital computer. And, like art, information science remains concerned with the material spaces of transmission – whether conceptual, social or critical. In the context of art something is made to be seen, understood, viewed, or presented as a series of relationships that might be established between individuals, groups, environments, and sensations. Understood this way art is an aesthetic relationship between differing material bodies, images, representations, and spaces. It is an event. Shannon was adamant that information must not be confused with meaning. To increase efficiency he insisted that the message be separated from its components; in particular, those aspects that were predictable were not to be considered information (Hansen 79). The problem that Shannon had to contend with was noise. Unwanted and disruptive, noise became symbolic of the struggle to control the growth of systems. The more complex the system, the more noise needed to be addressed. Noise is both the material from which information is constructed, as well as being the matter which information resists. Weaver (Shannon’s first commentator) writes: In the process of being transmitted, it is unfortunately characteristic that certain things are added to the signal which were not intended by the information source. These unwanted additions may be distortions of sound (in telephony, for example) or static (in radio), or distortions in shape or shading of picture (television), or errors in transmission (telegraphy or facsimile), etc. All of these changes in the transmitted signal are called noise. (4). To enable more efficient message transmission, Shannon designed systems that repressed as much noise as possible, while also acknowledging that without some noise information could not be transmitted. Shannon’s conception of information meant that information would not change if the context changed. This was crucial if a general theory of information transmission was to be plausible and meant that a methodology for noise management could be foregrounded (Pask 123). Without meaning, information became a quantity, a yes or no decision, that Shannon called a “bit” (1). Shannon’s emphasis on separating signal or message from both predicability and external noise appeared to give information an identity where it could float free of a material substance and be treated independently of context. However, for this to occur information would have to become fixed and understood as an entity. Shannon went to pains to demonstrate that the separation of meaning and information was actually to enable the reverse. A fluidity of information and the possibilities for encoding it would mean that information, although measurable, did not have a finite form. Tied into the paradox of this equation is the crucial role of noise or error. In Shannon’s communication model information is not only complicit with noise; it is totally dependant upon it for understanding. Without noise, either encoded within the original message or present from sources outside the channel, information cannot get through. The model of sender-encoder-channel-signal (message)-decoder-receiver that Shannon constructed has an arrow inserting noise. Visually and schematically this noise is a disruption pointing up and inserting itself in the nice clean lines of the message. This does not mean that noise was a last minute consideration; rather noise was the very thing Shannon was working with (and against). It is present in every image we have of information. A source, message, transmitter, receiver and their attendant noises are all material infrastructures that serve to contextualise the information they transmit, receive, and disrupt. Figure 1. Claude Shannon “The Mathematical Theory of Communication” 1948. In his analytical discussion of the diagram, Shannon actually locates noise in two crucial places. The first position accorded noise is external, marked by the arrow that demonstrates how noise is introduced to the message channel whilst in transit. External noise confuses the purity of the message whilst equivocally adding new information. External noise has a particular materiality and enters the equation as unexplained variation and random error. This is disruptive presence rather than entropic coded pattern. Shannon offers this equivocal definition of noise to be everything that is outside the linear model of sender-channel-receiver; hence, anything can be noise if it enters a channel where it is unwelcome. Secondly, noise was defined as unpredictability or entropy found and encoded within the message itself. This for Shannon was an essential and, in some ways, positive role. Entropic forces invited continual reorganisation and (when engaging the laws of redundancy) assisted with the removal of repetition enabling faster message transmission (Shannon 48). Weaver calls this shifting relationship between entropy and message “equivocation” (11). Weaver identified equivocation as central to the manner in which noise and information operated. A process of equivocation identified the receiver’s knowledge. For Shannon, a process of equivocation mediated between useful information and noise, as both were “measured in the same units” (Hayles, Chaos 55). To eliminate noise completely is to sacrifice information. Information understood in this way is also about relationships between differing material bodies, representations, and spaces, connected together for the purposes of transmission. It, like the artwork, is an event. This would appear to suggest a correlation between information transmission and viewing in galleries. Far from it. Although, the contemporary information channel is essentially a tube with fixed walls, (it is still constrained by physical properties, bandwidth and so on) and despite the implicit spatialisation of information models, I am not proposing a direct correlation between information channels and installation spaces. This is because I am not interested in ‘reading’ the information of either environment. What I am suggesting is that both environments share this material of noise. Noise is present in four places. Firstly noise is within the media errors of transmission, and secondly, it is within the media of the installation, (neither of which are one way flows). Thirdly, the viewer or listener introduces noise as interference, and lastly, it is present in the very materials thorough which it travels. Noise layered on noise. Redundancy and Modulation So far in this paper I have discussed the relationship of information to noise. For the remainder, I want to address some particular processes or manifestations of noise in New Zealand artists’ collective, et al.’s maintenance of social solidarity–instance 5 (2006, exhibited as part of the SCAPE Biennal of Art in Public Space, Christchurch Art Gallery). The installation occupies a small alcove that is partially blocked by a military-style portable table stacked with newspapers. Inside the space are three grey wooden chairs, some headphones, and a modified data projection of Google Earth. It is not immediately clear if the viewer is allowed within the spaces of the alcove to listen to the headphones as monotonous voices fill the whole space intoning political, social, and religious platitudes. The headphones might be a tool to block out the noise. In the installation it is as if multiple messages have been sent but their source, channel, and transmitter are unintelligible to the receiver. All that is left is information divorced from meaning. As other works by et al. have demonstrated, social solidarity is not a fundamentalism with directed positions and singular leaders. For example, in rapture (2004) noise disrupts all presence as a portable shed quivers in response to underground nuclear explosions 40,000km away. In the fundamental practice (2005) the viewer is left attempting to decode the un-encoded, as again sound and large steel barriers control and determine only certain movements (see http://www.etal.name/ for some documentation of these projects) . maintenance of social solidarity–instance 5 is a development of the fundamental practice. To enter its spaces viewers slip around the table and find themselves extremely close to the projection screen. Despite the provision of copious media the viewer cannot control any aspect of the environment. On screen, and apparently integral to the Google Earth imagery, are five animated and imposing dark grey monolith forms. Because of their connection to the monotonous voices in the headphones, the monoliths seem to map the imposition of narrative, power, and force in various disputed territories. Like their sudden arrival in Kubrick’s 2001: A Space Odyssey (1968) it is the contradiction of the visibility and improbability of the monoliths that renders them believable. On the video landscape the five monoliths apparently house the dispassionate voices of many different media and political authorities. Their presence is both redundant and essential as they modulate the layering of media forces – and in between, error slips in. In a broad discussion of information Gilles Deleuze and Felix Guattari highlight the necessary role of redundancy commenting that: redundancy has two forms, frequency and resonance; the first concerns the significance of information, the second (I=I) concerns the subjectivity of communication. It becomes apparent that information and communication, and even significance and subjectification, are subordinate to redundancy (79). In maintenance of social solidarity–instance 5 patterns of frequency highlight the necessary role of entropy where it is coded into gaps in the vocal transmission. Frequency is a structuring of information tied to meaningful communication. Resonance, like the stack of un-decodable newspapers on the portable table, is the carrier of redundancy. It is in the gaps between the recorded voices that connections between the monoliths and the texts are made, and these two forms of redundancy emerge. As Shannon says, redundancy is a problem of language. This is because redundancy and modulation do not equate with relationship of signal to noise. Signal to noise is a representational relationship; frequency and resonance are not representational but relational. This means that an image that might be “real-time” interrupts our understanding that the real comes first with representation always trailing second (Virilio 65). In maintenance of social solidarity–instance 5 the monoliths occupy a fixed spatial ground, imposed over the shifting navigation of Google Earth (this is not to mistake Google Earth with the ‘real’ earth). Together they form a visual counterpoint to the texts reciting in the viewer’s ears, which themselves might present as real but again, they aren’t. As Shannon contended, information cannot be tied to meaning. Instead, in the race for authority and thus authenticity we find interlopers, noisy digital images that suggest the presence of real-time perception. The spaces of maintenance of social solidarity–instance 5 meld representation and information together through the materiality of noise. And across all the different modalities employed, the appearance of noise is not through formation, but through error, accident, or surprise. This is the last step in a movement away from the mimetic obedience of information and its adherence to meaning-making or representational systems. In maintenance of social solidarity–instance 5 we are forced to align real time with virtual spaces and suspend our disbelief in the temporal truths that we see on the screen before us. This brief introduction to the work has returned us to the relationship between analogue and digital materials. Signal to noise is an analogue relationship of presence and absence. No signal equals a break in transmission. On the other hand, a digital system, due to its basis in discrete bits, transmits through probability (that is, the transmission occurs through pattern and randomness, rather than presence and absence (Hayles, How We Became 25). In his use of Shannon’s theory for the study of information transmission, Schwartz comments that the shift in information theory from analogue to digital is a shift from an analogue relationship of signal to noise to one of the probability of error (318). As I have argued in this paper, if it is measured as a quantity, noise is productive; it adds information. In both digital and analogue systems it is predictability and repetition that do not contribute information. Von Neumann makes the distinction clear saying that to some extent the “precision” of the digital machine “is absolute.” Even though, error as a matter of normal operation and not solely … as an accident attributable to some definite breakdown, nevertheless creeps in (294). Error creeps in. In maintenance of social solidarity–instance 5, et al. disrupts signal transmission by layering ambiguities into the installation. Gaps are left for viewers to introduce misreadings of scale, space, and apprehension. Rather than selecting meaning out of information within nontechnical contexts, a viewer finds herself in the same sphere as information. Noise imbricates both information and viewer within a larger open system. When asked about the relationship with the viewer in her work, et al. collaborator p.mule writes: To answer the 1st question, communication is important, clarity of concept. To answer the 2nd question, we are all receivers of information, how we process is individual. To answer the 3rd question, the work is accessible if you receive the information. But the question remains: how do we receive the information? In maintenance of social solidarity–instance 5 the system dominates. Despite the use of sound engineering and sophisticated Google Earth mapping technologies, the work appears to be constructed from discarded technologies both analogue and digital. The ominous hovering monoliths suggest answers: that somewhere within this work are methodologies to confront the materialising forces of digital error. To don the headphones is to invite a position that operates as a filtering of power. The parameters for this power are in a constant state of flux. This means that whilst mapping these forces the work does not locate them. Sound is encountered and constructed. Furthermore, the work does not oppose digital and analogue, for as von Neumann comments “the real importance of the digital procedure lies in its ability to reduce the computational noise level to an extent which is completely unobtainable by any other (analogy) procedure” (295). maintenance of social solidarity–instance 5 shows how digital and analogue come together through the productive errors of modulation and redundancy. et al.’s research constantly turns to representational and meaning making systems. As one instance, maintenance of social solidarity–instance 5 demonstrates how the digital has challenged the logics of the binary in the traditions of information theory. Digital logics are modulated by redundancies and accidents. In maintenance of social solidarity–instance 5 it is not possible to have information without noise. If, as I have argued here, digital installation operates between noise and information, then, in a constant disruption of the legacies of representation, immersion, and interaction, it is possible to open up material languages for the digital. Furthermore, an engagement with noise and error results in a blurring of the structures of information, generating a position from which we can discuss the viewer as immersed within the system – not as receiver or meaning making actant, but as an essential material within the open system of the artwork. References Barr, Jim, and Mary Barr. “L. Budd et al.” Toi Toi Toi: Three Generations of Artists from New Zealand. Ed. Rene Block. Kassel: Museum Fridericianum, 1999. 123. Burke, Gregory, and Natasha Conland, eds. et al. the fundamental practice. Wellington: Creative New Zealand, 2005. Burke, Gregory, and Natasha Conland, eds. Venice Document. et al. the fundamental practice. Wellington: Creative New Zealand, 2006. Daly-Peoples, John. Urban Myths and the et al. Legend. 21 Aug. 2004. The Big Idea (reprint) http://www.thebigidea.co.nz/print.php?sid=2234>. Deleuze, Gilles, and Felix Guattari. A Thousand Plateaus: Capitalism and Schizophrenia. Trans. Brian Massumi. London: The Athlone Press, 1996. Hansen, Mark. New Philosophy for New Media. Cambridge, MA and London: MIT Press, 2004. Hayles, N. Katherine. How We Became Posthuman: Virtual Bodies in Cybernetics, Literature and Informatics. Chicago and London: U of Chicago P, 1999. Hayles, N. Katherine. Chaos Bound: Orderly Disorder in Contemporary Literature and Science. Ithaca and London: Cornell University, 1990. Hobart, Michael, and Zachary Schiffman. Information Ages: Literacy, Numeracy, and the Computer Revolution. Baltimore: Johns Hopkins UP, 1998. p.mule, et al. 2007. 2 Jul. 2007 http://www.etal.name/index.htm>. Pask, Gordon. An Approach to Cybernetics. London: Hutchinson, 1961. Paulson, William. The Noise of Culture: Literary Texts in a World of Information. Ithaca and London: Cornell University, 1988. Schwartz, Mischa. Information Transmission, Modulation, and Noise: A Unified Approach to Communication Systems. 3rd ed. New York: McGraw-Hill, 1980. Serres, Michel. The Parasite. Trans. Lawrence R. Schehr. Baltimore: John Hopkins UP, 1982. Shannon, Claude. A Mathematical Theory of Communication. July, October 1948. Online PDF. 27: 379-423, 623-656 (reprinted with corrections). 13 Jul. 2004 http://cm.bell-labs.com/cm/ms/what/shannonday/paper.html>. Virilio, Paul. The Vision Machine. Trans. Julie Rose. Bloomington and Indianapolis: Indiana UP, British Film Institute, 1994. Von Neumann, John. “The General and Logical Theory of Automata.” Collected Works. Ed. A. H. Taub. Vol. 5. Oxford: Pergamon Press, 1963. Weaver, Warren. “Recent Contributions to the Mathematical Theory of Communication.” The Mathematical Theory of Commnunication. Eds. Claude Shannon and Warren Weaver. paperback, 1963 ed. Urbana and Chicago: U of Illinois P, 1949. 1-16. Work Discussed et al. maintenance of social solidarity–instance 5 2006. Installation, Google Earth feed, newspapers, sound. Exhibited in SCAPE 2006 Biennial of Art in Public Space Christchurch Art Gallery, Christchurch, September 30-November 12. Images reproduced with the permission of et al. Photographs by Lee Cunliffe. Acknowledgments Research for this paper was conducted with the support of an Otago Polytechnic Resaerch Grant. Photographs of et al. maintenance of social solidarity–instance 5 by Lee Cunliffe. Citation reference for this article MLA Style Ballard, Su. "Information, Noise and et al." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/02-ballard.php>. APA Style Ballard, S. (Oct. 2007) "Information, Noise and et al.," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/02-ballard.php>.
APA, Harvard, Vancouver, ISO, and other styles
49

Cham, Karen, and Jeffrey Johnson. "Complexity Theory." M/C Journal 10, no. 3 (June 1, 2007). http://dx.doi.org/10.5204/mcj.2672.

Full text
Abstract:
Complex systems are an invention of the universe. It is not at all clear that science has an a priori primacy claim to the study of complex systems. (Galanter 5) Introduction In popular dialogues, describing a system as “complex” is often the point of resignation, inferring that the system cannot be sufficiently described, predicted nor managed. Transport networks, management infrastructure and supply chain logistics are all often described in this way. In socio-cultural terms “complex” is used to describe those humanistic systems that are “intricate, involved, complicated, dynamic, multi-dimensional, interconnected systems [such as] transnational citizenship, communities, identities, multiple belongings, overlapping geographies and competing histories” (Cahir & James). Academic dialogues have begun to explore the collective behaviors of complex systems to define a complex system specifically as an adaptive one; i.e. a system that demonstrates ‘self organising’ principles and ‘emergent’ properties. Based upon the key principles of interaction and emergence in relation to adaptive and self organising systems in cultural artifacts and processes, this paper will argue that complex systems are cultural systems. By introducing generic principles of complex systems, and looking at the exploration of such principles in art, design and media research, this paper argues that a science of cultural systems as part of complex systems theory is the post modern science for the digital age. Furthermore, that such a science was predicated by post structuralism and has been manifest in art, design and media practice since the late 1960s. Complex Systems Theory Complexity theory grew out of systems theory, an holistic approach to analysis that views whole systems based upon the links and interactions between the component parts and their relationship to each other and the environment within they exists. This stands in stark contrast to conventional science which is based upon Descartes’s reductionism, where the aim is to analyse systems by reducing something to its component parts (Wilson 3). As systems thinking is concerned with relationships more than elements, it proposes that in complex systems, small catalysts can cause large changes and that a change in one area of a system can adversely affect another area of the system. As is apparent, systems theory is a way of thinking rather than a specific set of rules, and similarly there is no single unified Theory of Complexity, but several different theories have arisen from the natural sciences, mathematics and computing. As such, the study of complex systems is very interdisciplinary and encompasses more than one theoretical framework. Whilst key ideas of complexity theory developed through artificial intelligence and robotics research, other important contributions came from thermodynamics, biology, sociology, physics, economics and law. In her volume for the Elsevier Advanced Management Series, “Complex Systems and Evolutionary Perspectives on Organisations”, Eve Mitleton-Kelly describes a comprehensive overview of this evolution as five main areas of research: complex adaptive systems dissipative structures autopoiesis (non-equilibrium) social systems chaos theory path dependence Here, Mitleton-Kelly points out that relatively little work has been done on developing a specific theory of complex social systems, despite much interest in complexity and its application to management (Mitleton-Kelly 4). To this end, she goes on to define the term “complex evolving system” as more appropriate to the field than ‘complex adaptive system’ and suggests that the term “complex behaviour” is thus more useful in social contexts (Mitleton-Kelly). For our purpose here, “complex systems” will be the general term used to describe those systems that are diverse and made up of multiple interdependent elements, that are often ‘adaptive’, in that they have the capacity to change and learn from events. This is in itself both ‘evolutionary’ and ‘behavioural’ and can be understood as emerging from the interaction of autonomous agents – especially people. Some generic principles of complex systems defined by Mitleton Kelly that are of concern here are: self-organisation emergence interdependence feedback space of possibilities co-evolving creation of new order Whilst the behaviours of complex systems clearly do not fall into our conventional top down perception of management and production, anticipating such behaviours is becoming more and more essential for products, processes and policies. For example, compare the traditional top down model of news generation, distribution and consumption to the “emerging media eco-system” (Bowman and Willis 14). Figure 1 (Bowman & Willis 10) Figure 2 (Bowman & Willis 12) To the traditional news organisations, such a “democratization of production” (McLuhan 230) has been a huge cause for concern. The agencies once solely responsible for the representation of reality are now lost in a global miasma of competing perspectives. Can we anticipate and account for complex behaviours? Eve Mitleton Kelly states that “if organisations are understood as complex evolving systems co-evolving as part of a social ‘ecosystem’, then that changed perspective changes ways of acting and relating which lead to a different way of working. Thus, management strategy changes, and our organizational design paradigms evolve as new types of relationships and ways of working provide the conditions for the emergence of new organisational forms” (Mitleton-Kelly 6). Complexity in Design It is thus through design practice and processes that discovering methods for anticipating complex systems behaviours seem most possible. The Embracing Complexity in Design (ECiD) research programme, is a contemporary interdisciplinary research cluster consisting of academics and designers from architectural engineering, robotics, geography, digital media, sustainable design, and computing aiming to explore the possibility of trans disciplinary principles of complexity in design. Over arching this work is the conviction that design can be seen as model for complex systems researchers motivated by applying complexity science in particular domains. Key areas in which design and complexity interact have been established by this research cluster. Most immediately, many designed products and systems are inherently complex to design in the ordinary sense. For example, when designing vehicles, architecture, microchips designers need to understand complex dynamic processes used to fabricate and manufacture products and systems. The social and economic context of design is also complex, from market economics and legal regulation to social trends and mass culture. The process of designing can also involve complex social dynamics, with many people processing and exchanging complex heterogeneous information over complex human and communication networks, in the context of many changing constraints. Current key research questions are: how can the methods of complex systems science inform designers? how can design inform research into complex systems? Whilst ECiD acknowledges that to answer such questions effectively the theoretical and methodological relations between complexity science and design need further exploration and enquiry, there are no reliable precedents for such an activity across the sciences and the arts in general. Indeed, even in areas where a convergence of humanities methodology with scientific practice might seem to be most pertinent, most examples are few and far between. In his paper “Post Structuralism, Hypertext & the World Wide Web”, Luke Tredennick states that “despite the concentration of post-structuralism on text and texts, the study of information has largely failed to exploit post-structuralist theory” (Tredennick 5). Yet it is surely in the convergence of art and design with computation and the media that a search for practical trans-metadisciplinary methodologies might be most fruitful. It is in design for interactive media, where algorithms meet graphics, where the user can interact, adapt and amend, that self-organisation, emergence, interdependence, feedback, the space of possibilities, co-evolution and the creation of new order are embraced on a day to day basis by designers. A digitally interactive environment such as the World Wide Web, clearly demonstrates all the key aspects of a complex system. Indeed, it has already been described as a ‘complexity machine’ (Qvortup 9). It is important to remember that this ‘complexity machine’ has been designed. It is an intentional facility. It may display all the characteristics of complexity but, whilst some of its attributes are most demonstrative of self organisation and emergence, the Internet itself has not emerged spontaneously. For example, Tredinnick details the evolution of the World Wide Web through the Memex machine of Vannevar Bush, through Ted Nelsons hypertext system Xanadu to Tim Berners-Lee’s Enquire (Tredennick 3). The Internet was engineered. So, whilst we may not be able to entirely predict complex behavior, we can, and do, quite clearly design for it. When designing digitally interactive artifacts we design parameters or co ordinates to define the space within which a conceptual process will take place. We can never begin to predict precisely what those processes might become through interaction, emergence and self organisation, but we can establish conceptual parameters that guide and delineate the space of possibilities. Indeed this fact is so transparently obvious that many commentators in the humanities have been pushed to remark that interaction is merely interpretation, and so called new media is not new at all; that one interacts with a book in much the same way as a digital artifact. After all, post-structuralist theory had established the “death of the author” in the 1970s – the a priori that all cultural artifacts are open to interpretation, where all meanings must be completed by the reader. The concept of the “open work” (Eco 6) has been an established post modern concept for over 30 years and is commonly recognised as a feature of surrealist montage, poetry, the writings of James Joyce, even advertising design, where a purposive space for engagement and interpretation of a message is designated, without which the communication does not “work”. However, this concept is also most successfully employed in relation to installation art and, more recently, interactive art as a reflection of the artist’s conscious decision to leave part of a work open to interpretation and/or interaction. Art & Complex Systems One of the key projects of Embracing Complexity in Design has been to look at the relationship between art and complex systems. There is a relatively well established history of exploring art objects as complex systems in themselves that finds its origins in the systems art movement of the 1970s. In his paper “Observing ‘Systems Art’ from a Systems-Theroretical Perspective”, Francis Halsall defines systems art as “emerging in the 1960s and 1970s as a new paradigm in artistic practice … displaying an interest in the aesthetics of networks, the exploitation of new technology and New Media, unstable or de-materialised physicality, the prioritising of non-visual aspects, and an engagement (often politicised) with the institutional systems of support (such as the gallery, discourse, or the market) within which it occurs” (Halsall 7). More contemporarily, “Open Systems: Rethinking Art c.1970”, at Tate Modern, London, focuses upon systems artists “rejection of art’s traditional focus on the object, to wide-ranging experiments al focus on the object, to wide-ranging experiments with media that included dance, performance and…film & video” (De Salvo 3). Artists include Andy Warhol, Richard Long, Gilbert & George, Sol Lewitt, Eva Hesse and Bruce Nauman. In 2002, the Samuel Dorsky Museum of Art, New York, held an international exhibition entitled “Complexity; Art & Complex Systems”, that was concerned with “art as a distinct discipline offer[ing] its own unique approache[s] and epistemic standards in the consideration of complexity” (Galanter and Levy 5), and the organisers go on to describe four ways in which artists engage the realm of complexity: presentations of natural complex phenomena that transcend conventional scientific visualisation descriptive systems which describe complex systems in an innovative and often idiosyncratic way commentary on complexity science itself technical applications of genetic algorithms, neural networks and a-life ECiD artist Julian Burton makes work that visualises how companies operate in specific relation to their approach to change and innovation. He is a strategic artist and facilitator who makes “pictures of problems to help people talk about them” (Burton). Clients include public and private sector organisations such as Barclays, Shell, Prudential, KPMG and the NHS. He is quoted as saying “Pictures are a powerful way to engage and focus a group’s attention on crucial issues and challenges, and enable them to grasp complex situations quickly. I try and create visual catalysts that capture the major themes of a workshop, meeting or strategy and re-present them in an engaging way to provoke lively conversations” (Burton). This is a simple and direct method of using art as a knowledge elicitation tool that falls into the first and second categories above. The third category is demonstrated by the ground breaking TechnoSphere, that was specifically inspired by complexity theory, landscape and artificial life. Launched in 1995 as an Arts Council funded online digital environment it was created by Jane Prophet and Gordon Selley. TechnoSphere is a virtual world, populated by artificial life forms created by users of the World Wide Web. The digital ecology of the 3D world, housed on a server, depends on the participation of an on-line public who accesses the world via the Internet. At the time of writing it has attracted over a 100,000 users who have created over a million creatures. The artistic exploration of technical applications is by default a key field for researching the convergence of trans-metadisciplinary methodologies. Troy Innocent’s lifeSigns evolves multiple digital media languages “expressed as a virtual world – through form, structure, colour, sound, motion, surface and behaviour” (Innocent). The work explores the idea of “emergent language through play – the idea that new meanings may be generated through interaction between human and digital agents”. Thus this artwork combines three areas of converging research – artificial life; computational semiotics and digital games. In his paper “What Is Generative Art? Complexity Theory as a Context for Art Theory”, Philip Galanter describes all art as generative on the basis that it is created from the application of rules. Yet, as demonstrated above, what is significantly different and important about digital interactivity, as opposed to its predecessor, interpretation, is its provision of a graphical user interface (GUI) to component parts of a text such as symbol, metaphor, narrative, etc for the multiple “authors” and the multiple “readers” in a digitally interactive space of possibility. This offers us tangible, instantaneous reproduction and dissemination of interpretations of an artwork. Conclusion: Digital Interactivity – A Complex Medium Digital interaction of any sort is thus a graphic model of the complex process of communication. Here, complexity does not need deconstructing, representing nor modelling, as the aesthetics (as in apprehended by the senses) of the graphical user interface conveniently come first. Design for digital interactive media is thus design for complex adaptive systems. The theoretical and methodological relations between complexity science and design can clearly be expounded especially well through post-structuralism. The work of Barthes, Derrida & Foucault offers us the notion of all cultural artefacts as texts or systems of signs, whose meanings are not fixed but rather sustained by networks of relationships. Implemented in a digital environment post-structuralist theory is tangible complexity. Strangely, whilst Philip Galanter states that science has no necessary over reaching claim to the study of complexity, he then argues conversely that “contemporary art theory rooted in skeptical continental philosophy [reduces] art to social construction [as] postmodernism, deconstruction and critical theory [are] notoriously elusive, slippery, and overlapping terms and ideas…that in fact [are] in the business of destabilising apparently clear and universal propositions” (4). This seems to imply that for Galanter, post modern rejections of grand narratives necessarily will exclude the “new scientific paradigm” of complexity, a paradigm that he himself is looking to be universal. Whilst he cites Lyotard (6) describing both political and linguistic reasons why postmodern art celebrates plurality, denying any progress towards singular totalising views, he fails to appreciate what happens if that singular totalising view incorporates interactivity? Surely complexity is pluralistic by its very nature? In the same vein, if language for Derrida is “an unfixed system of traces and differences … regardless of the intent of the authored texts … with multiple equally legitimate meanings” (Galanter 7) then I have heard no better description of the signifiers, signifieds, connotations and denotations of digital culture. Complexity in its entirety can also be conversely understood as the impact of digital interactivity upon culture per se which has a complex causal relation in itself; Qvortups notion of a “communications event” (9) such as the Danish publication of the Mohammed cartoons falls into this category. Yet a complex causality could be traced further into cultural processes enlightening media theory; from the relationship between advertising campaigns and brand development; to the exposure and trajectory of the celebrity; describing the evolution of visual language in media cultures and informing the relationship between exposure to representation and behaviour. In digital interaction the terms art, design and media converge into a process driven, performative event that demonstrates emergence through autopoietic processes within a designated space of possibility. By insisting that all artwork is generative Galanter, like many other writers, negates the medium entirely which allows him to insist that generative art is “ideologically neutral” (Galanter 10). Generative art, like all digitally interactive artifacts are not neutral but rather ideologically plural. Thus, if one integrates Qvortups (8) delineation of medium theory and complexity theory we may have what we need; a first theory of a complex medium. Through interactive media complexity theory is the first post modern science; the first science of culture. References Bowman, Shane, and Chris Willis. We Media. 21 Sep. 2003. 9 March 2007 http://www.hypergene.net/wemedia/weblog.php>. Burton, Julian. “Hedron People.” 9 March 2007 http://www.hedron.com/network/assoc.php4?associate_id=14>. Cahir, Jayde, and Sarah James. “Complex: Call for Papers.” M/C Journal 9 Sep. 2006. 7 March 2007 http://journal.media-culture.org.au/journal/upcoming.php>. De Salvo, Donna, ed. Open Systems: Rethinking Art c. 1970. London: Tate Gallery Press, 2005. Eco, Umberto. The Open Work. Cambridge, Mass.: Harvard UP, 1989. Galanter, Phillip, and Ellen K. Levy. Complexity: Art & Complex Systems. SDMA Gallery Guide, 2002. Galanter, Phillip. “Against Reductionism: Science, Complexity, Art & Complexity Studies.” 2003. 9 March 2007 http://isce.edu/ISCE_Group_Site/web-content/ISCE_Events/ Norwood_2002/Norwood_2002_Papers/Galanter.pdf>. Halsall, Francis. “Observing ‘Systems-Art’ from a Systems-Theoretical Perspective”. CHArt 2005. 9 March 2007 http://www.chart.ac.uk/chart2005/abstracts/halsall.htm>. Innocent, Troy. “Life Signs.” 9 March 2007 http://www.iconica.org/main.htm>. Johnson, Jeffrey. “Embracing Complexity in Design (ECiD).” 2007. 9 March 2007 http://www.complexityanddesign.net/>. Lyotard, Jean-Francois. The Postmodern Condition. Manchester: Manchester UP, 1984. McLuhan, Marshall. The Gutenberg Galaxy: The Making of Typographic Man. Toronto: U of Toronto P, 1962. Mitleton-Kelly, Eve, ed. Complex Systems and Evolutionary Perspectives on Organisations. Elsevier Advanced Management Series, 2003. Prophet, Jane. “Jane Prophet.” 9 March 2007 http://www.janeprophet.co.uk/>. Qvortup, Lars. “Understanding New Digital Media.” European Journal of Communication 21.3 (2006): 345-356. Tedinnick, Luke. “Post Structuralism, Hypertext & the World Wide Web.” Aslib 59.2 (2007): 169-186. Wilson, Edward Osborne. Consilience: The Unity of Knowledge. New York: A.A. Knoff, 1998. Citation reference for this article MLA Style Cham, Karen, and Jeffrey Johnson. "Complexity Theory: A Science of Cultural Systems?." M/C Journal 10.3 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0706/08-cham-johnson.php>. APA Style Cham, K., and J. Johnson. (Jun. 2007) "Complexity Theory: A Science of Cultural Systems?," M/C Journal, 10(3). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0706/08-cham-johnson.php>.
APA, Harvard, Vancouver, ISO, and other styles
50

Williams, Deborah Kay. "Hostile Hashtag Takeover: An Analysis of the Battle for Februdairy." M/C Journal 22, no. 2 (April 24, 2019). http://dx.doi.org/10.5204/mcj.1503.

Full text
Abstract:
We need a clear, unified, and consistent voice to effect the complete dismantling, the abolition, of the mechanisms of animal exploitation.And that will only come from what we say and do, no matter who we are.— Gary L. Francione, animal rights theoristThe history of hashtags is relatively short but littered with the remnants of corporate hashtags which may have seemed a good idea at the time within the confines of the boardroom. It is difficult to understand the rationale behind the use of hashtags as an effective communications tactic in 2019 by corporations when a quick stroll through their recent past leaves behind the much-derided #qantasluxury (Glance), #McDstories (Hill), and #myNYPD (Tran).While hashtags have an obvious purpose in bringing together like-minded publics and facilitating conversation (Kwye et al. 1), they have also regularly been the subject of “hashtag takeovers” by activists and other interested parties, and even by trolls, as the Ecological Society of Australia found in 2015 when their seemingly innocuous #ESA15 hashtag was taken over with pornographic images (news.com.au). Hashtag takeovers have also been used as a dubious marketing tactic, where smaller and less well-known brands tag their products with trending hashtags such as #iphone in order to boost their audience (Social Garden). Hashtags are increasingly used as a way for activists or other interested parties to disrupt a message. It is, I argue, predictable that any hashtag related to an even slightly controversial topic will be subject to some form of activist hashtag takeover, with varying degrees of success.That veganism and the dairy industry should attract such conflict is unsurprising given that the two are natural enemies, with vegans in particular seeming to anticipate and actively engage in the battle for the opposing hashtag.Using a comparative analysis of the #Veganuary and #Februdairy hashtags and how they have been used by both pro-vegan and pro-dairy social media users, this article illustrates that the enthusiastic and well-meaning social media efforts of farmers and dairy supporters have so far been unable to counteract those of well-organised and equally passionate vegan activists. This analysis compares tweets in the first week of the respective campaigns, concluding that organisations, industries and their representatives should be extremely wary of engaging said activists who are not only highly-skilled but are also highly-motivated. Grassroots, ideology-driven activism is a formidable opponent in any public space, let alone when it takes place on the outspoken and unstructured landscape of social media which is sometimes described as the “wild West” (Fitch 5) where anything goes and authenticity and plain-speaking is key (Macnamara 12).I Say Hashtag, You Say Bashtag#Februdairy was launched in 2018 to promote the benefits of dairy. The idea was first mooted on Twitter in 2018 by academic Dr Jude Capper, a livestock sustainability consultant, who called for “28 days, 28 positive dairy posts” (@Bovidiva; Howell). It was a response to the popular Veganuary campaign which aimed to “inspire people to try vegan for January and throughout the rest of the year”, a campaign which had gained significant traction both online and in the traditional media since its inception in 2014 (Veganuary). Hopes were high: “#Februdairy will be one month of dairy people posting, liking and retweeting examples of what we do and why we do it” (Yates). However, the #Februdairy hashtag has been effectively disrupted and has now entered the realm of a bashtag, a hashtag appropriated by activists for their own purpose (Austin and Jin 341).The Dairy Industry (Look Out the Vegans Are Coming)It would appear that the dairy industry is experiencing difficulties in public perception. While milk consumption is declining, sales of plant-based milks are increasing (Kaiserman) and a growing body of health research has questioned whether dairy products and milk in particular do in fact “do a body good” (Saccaro; Harvard Milk Study). In the 2019 review of Canada’s food guide, its first revision since 2007, for instance, the focus is now on eating plant-based foods with dairy’s former place significantly downgraded. Dairy products no longer have their own distinct section and are instead placed alongside other proteins including lentils (Pippus).Nevertheless, the industry has persevered with its traditional marketing and public relations activities, choosing to largely avoid addressing animal welfare concerns brought to light by activists. They have instead focused their message towards countering concerns about the health benefits of milk. In the US, the Milk Processing Education Program’s long-running celebrity-driven Got Milk campaign has been updated with Milk Life, a health focused campaign, featuring images of children and young people living an active lifestyle and taking part in activities such as skateboarding, running, and playing basketball (Milk Life). Interestingly, and somewhat inexplicably, Milk Life’s home page features the prominent headline, “How Milk Can Bring You Closer to Your Loved Ones”.It is somewhat reflective of the current trend towards veganism that tennis aces Serena and Venus Williams, both former Got Milk ambassadors, are now proponents for the plant-based lifestyle, with Venus crediting her newly-adopted vegan diet as instrumental in her recovery from an auto-immune disease (Mango).The dairy industry’s health focus continues in Australia, as well as the use of the word love, with former AFL footballer Shane Crawford—the face of the 2017 campaign Milk Loves You Back, from Lion Dairy and Drinks—focusing on reminding Australians of the reputed nutritional benefits of milk (Dawson).Dairy Australia meanwhile launched their Legendairy campaign with a somewhat different focus, promoting and lauding Australia’s dairy families, and with a message that stated, in a nod to the current issues, that “Australia’s dairy farmers and farming communities are proud, resilient and innovative” (Dairy Australia). This campaign could be perceived as a morale-boosting exercise, featuring a nation-wide search to find Australia’s most legendairy farming community (Dairy Australia). That this was also an attempt to humanise the industry seems obvious, drawing on established goodwill felt towards farmers (University of Cambridge). Again, however, this strategy did not address activists’ messages of suffering animals, factory farms, and newborn calves being isolated from their grieving mothers, and it can be argued that consumers are being forced to make the choice between who (or what) they care about more: animals or the people making their livelihoods from them.Large-scale campaigns like Legendairy which use traditional channels are of course still vitally important in shaping public opinion, with statistics from 2016 showing 85.1% of Australians continue to watch free-to-air television (Roy Morgan, “1 in 7”). However, a focus and, arguably, an over-reliance on traditional platforms means vegans and animal activists are often unchallenged when spreading their message via social media. Indeed, when we consider the breakdown in age groups inherent in these statistics, with 18.8% of 14-24 year-olds not watching any commercial television at all, an increase from 7% in 2008 (Roy Morgan, “1 in 7”), it is a brave and arguably short-sighted organisation or industry that relies primarily on traditional channels to spread their message in 2019. That these large-scale campaigns do little to address the issues raised by vegans concerning animal welfare leaves these claims largely unanswered and momentum to grow.This growth in momentum is fuelled by activist groups such as the People for the Ethical Treatment of Animals (PETA) who are well-known in this space, with 5,494,545 Facebook followers, 1.06 million Twitter followers, 973,000 Instagram followers, and 453,729 You Tube subscribers (People for the Ethical Treatment of Animals). They are also active on Pinterest, a visual-based platform suited to the kinds of images and memes particularly detrimental to the dairy industry. Although widely derided, PETA’s reach is large. A graphic video posted to Facebook on February 13 2019 and showing a suffering cow, captioned “your cheese is not worth this” was shared 1,244 times, and had 4.6 million views in just over 24 hours (People for the Ethical Treatment of Animals). With 95% of 12-24 year olds in Australia now using social networking sites (Statista), it is little wonder veganism is rapidly growing within this demographic (Bradbury), with The Guardian labelling the rise of veganism unstoppable (Hancox).Activist organisations are joined by prominent and charismatic vegan activists such as James Aspey (182,000 Facebook followers) and Earthling Ed (205,000 Facebook followers) in distributing information and images that are influential and often highly graphic or disturbing. Meanwhile Instagram influencers and You Tube lifestyle vloggers such as Ellen Fisher and FreeLee share information promoting vegan food and the vegan lifestyle (with 650,320 and 785,903 subscribers respectively). YouTube video Dairy Is Scary has over 5 million views (Janus) and What the Health, a follow-up documentary to Cowspiracy: The Sustainability Secret, promoting veganism, is now available on Netflix, which itself has 9.8 million Australian subscribers (Roy Morgan, “Netflix”). BOSH’s plant-based vegan cookbook was the fastest selling cookbook of 2018 (Chiorando).Additionally, the considerable influence of celebrities such as Miley Cyrus, Beyonce, Alicia Silverstone, Zac Efron, and Jessica Chastain, to name just a few, speaking publicly about their vegan lifestyle, encourages veganism to become mainstream and increases its widespread acceptance.However not all the dairy industry’s ills can be blamed on vegans. Rising costs, cheap imports, and other pressures (Lockhart, Donaghy and Gow) have all placed pressure on the industry. Nonetheless, in the battle for hearts and minds on social media, the vegans are leading the way.Qualitative research interviewing new vegans found converting to veganism was relatively easy, yet some respondents reported having to consult multiple resources and required additional support and education on how to be vegan (McDonald 17).Enter VeganuaryUsing a month, week or day to promote an idea or campaign, is a common public relations and marketing strategy, particularly in health communications. Dry July and Ocsober both promote alcohol abstinence, Frocktober raises funds for ovarian cancer, and Movember is an annual campaign raising awareness and funds for men’s health (Parnell). Vegans Matthew Glover and Jane Land were discussing the success of Movember when they raised the idea of creating a vegan version. Their initiative, Veganuary, urging people to try vegan for the month of January, launched in 2014 and since then 500,000 people have taken the Veganuary pledge (Veganuary).The Veganuary website is the largest of its kind on the internet. With vegan recipes, expert advice and information, it provides all the answers to Why go vegan, but it is the support offered to answer How to go vegan that truly sets Veganuary apart. (Veganuary)That Veganuary participants would use social media to discuss and share their experiences was a foregone conclusion. Twitter, Facebook, and Instagram are all utilised by participants, with the official Veganuary pages currently followed/liked by 159,000 Instagram followers, receiving 242,038 Facebook likes, and 45,600 Twitter followers (Veganuary). Both the Twitter and Instagram sites make effective use of hashtags to spread their reach, not only using #Veganuary but also other relevant hashtags such as #TryVegan, #VeganRecipes, and the more common #Vegan, #Farm, and #SaveAnimals.Februdairy Follows Veganuary, But Only on the CalendarCalling on farmers and dairy producers to create counter content and their own hashtag may have seemed like an idea that would achieve an overall positive response.Agricultural news sites and bloggers spread the word and even the BBC reported on the industry’s “fight back” against Veganuary (BBC). However the hashtag was quickly overwhelmed with anti-dairy activists mobilising online. Vegans issued a call to arms across social media. The Vegans in Australia Facebook group featured a number of posts urging its 58,949 members to “thunderclap” the Februdairy hashtag while the Project Calf anti-dairy campaign declared that Februdairy offered an “easy” way to spread their information (Sandhu).Februdairy farmers and dairy supporters were encouraged to tell their stories, sharing positive photographs and videos, and they did. However this content was limited. In this tweet (fig. 1) the issue of a lack of diverse content was succinctly addressed by an anti-Februdairy activist.Fig. 1: Content challenges. (#Februdairy, 2 Feb. 2019)MethodUtilising Twitter’s advanced search capability, I was able to search for #Veganuary tweets from 1 to 7 January 2019 and #Februdairy tweets from 1 to 7 February 2019. I analysed the top tweets provided by Twitter in terms of content, assessed whether the tweet was pro or anti Veganuary and Februdairy, and also categorised its content in terms of subject matter.Tweets were analysed to assess whether they were on message and aligned with the values of their associated hashtag. Veganuary tweets were considered to be on message if they promoted veganism or possessed an anti-dairy, anti-meat, or pro-animal sentiment. Februdairy tweets were assessed as on message if they promoted the consumption of dairy products, expressed sympathy or empathy towards the dairy industry, or possessed an anti-vegan sentiment. Tweets were also evaluated according to their clarity, emotional impact and coherence. The overall effectiveness of the hashtag was then evaluated based on the above criteria as well as whether they had been hijacked.Results and FindingsOverwhelmingly, the 213 #Veganuary tweets were on message. That is they were pro-Veganuary, supportive of veganism, and positive. The topics were varied and included humorous memes, environmental facts, information about the health benefits of veganism, as well as a strong focus on animals. The number of non-graphic tweets (12) concerning animals was double that of tweets featuring graphic or shocking imagery (6). Predominantly the tweets were focused on food and the sharing of recipes, with 44% of all pro #Veganuary tweets featuring recipes or images of food. Interestingly, a number of well-known corporations tweeted to promote their vegan food products, including Tesco, Aldi, Iceland, and M&S. The diversity of veganism is reflected in the tweets. Organisations used the hashtag to promote their products, including beauty and shoe products, social media influencers promoted their vegan podcasts and blogs, and, interestingly, the Ethiopian Embassy of the United Kingdom tweeted their support.There were 23 (11%) anti-Veganuary tweets. Of these, one was from Dr. Jude Capper, the founder of Februdairy. The others expressed support for farming and farmers, and a number were photographs of meat products, including sausages and fry-ups. One Australian journalist tweeted in favour of meat, stating it was yummy murder. These tweets could be described as entertaining and may perhaps serve as a means of preaching to the converted, but their ability to influence and persuade is negligible.Twitter’s search tool provided access to 141 top #Februdairy tweets. Of these 82 (52%) were a hijack of the hashtag and overtly anti-Februdairy. Vegan activists used the #Februdairy hashtag to their advantage with most of their tweets (33%) featuring non-graphic images of animals. They also tweeted about other subject matters, including environmental concerns, vegan food and products, and health issues related to dairy consumption.As noted by the activists (see fig. 1 above), most of the pro-Februdairy tweets were images of milk or dairy products (41%). Images of farms and farmers were the next most used (26%), followed by images of cows (17%) (see fig. 2). Fig. 2: An activist makes their anti-Februdairy point with a clear, engaging image and effective use of hashtags. (#Februdairy, 6 Feb. 2019)The juxtaposition between many of the tweets was also often glaring, with one contrasting message following another (see fig. 3). Fig. 3: An example of contrasting #Februdairy tweets with an image used by the activists to good effect, making their point known. (#Februdairy, 2 Feb. 2019)Storytelling is a powerful tool in public relations and marketing efforts. Yet, to be effective, high-quality content is required. That many of the Februdairy proponents had limited social media training was evident; images were blurred, film quality was poor, or they failed to make their meaning clear (see fig. 4). Fig. 4: A blurred photograph, reflective of some of the low-quality content provided by Februdairy supporters. (#Februdairy, 3 Feb. 2019)This image was tweeted in support of Februdairy. However the image and phrasing could also be used to argue against Februdairy. We can surmise that the tweeter was suggesting the cow was well looked after and seemingly content, but overall the message is as unclear as the image.While some pro-Februdairy supporters recognised the need for relevant hashtags, often their images were of a low-quality and not particularly engaging, a requirement for social media success. This requirement seems to be better understood by anti-Februdairy activists who used high-quality images and memes to create interest and gain the audience’s attention (see figs. 5 and 6). Fig. 5: An uninspiring image used to promote Februdairy. (#Februdairy, 6 Feb. 2019) Fig. 6: Anti-Februdairy activists made good use of memes, recognising the need for diverse content. (#Februdairy, 3 Feb. 2019)DiscussionWhat the #Februdairy case makes clear, then, is that in continuing its focus on traditional media, the dairy industry has left the battle online to largely untrained, non-social media savvy supporters.From a purely public relations perspective, one of the first things we ask our students to do in issues and crisis communication is to assess the risk. “What can hurt your organisation?” we ask. “What potential issues are on the horizon and what can you do to prevent them?” This is PR101 and it is difficult to understand why environmental scanning and resulting action has not been on the radar of the dairy industry long before now. It seems they have not fully anticipated or have significantly underestimated the emerging issue that public perception, animal cruelty, health concerns, and, ultimately, veganism has had on their industry and this is to their detriment. In Australia in 2015–16 the dairy industry was responsible for 8 per cent (A$4.3 billion) of the gross value of agricultural production and 7 per cent (A$3 billion) of agricultural export income (Department of Agriculture and Water Resources). When such large figures are involved and with so much at stake, it is hard to rationalise the decision not to engage in a more proactive online strategy, seeking to engage their publics, including, whether they like it or not, activists.Instead there are current attempts to address these issues with a legislative approach, lobbying for the introduction of ag-gag laws (Potter), and the limitation of terms such as milk and cheese (Worthington). However, these measures are undertaken while there is little attempt to engage with activists or to effectively counter their claims with a widespread authentic public relations campaign, and reflects a failure to understand the nature of the current online environment, momentum, and mood.That is not to say that the dairy industry is not operating in the online environment, but it does not appear to be a priority, and this is reflected in their low engagement and numbers of followers. For instance, Dairy Australia, the industry’s national service body, has a following of only 8,281 on Facebook, 6,981 on Twitter, and, crucially, they are not on Instagram. Their Twitter posts do not include hashtags and unsurprisingly they have little engagement on this platform with most tweets attracting no more than two likes. Surprisingly they have 21,013 subscribers on YouTube which featured professional and well-presented videos. This demonstrates some understanding of the importance of effective storytelling but not, as yet, trans-media storytelling.ConclusionSocial media activism is becoming more important and recognised as a legitimate voice in the public sphere. Many organisations, perhaps in recognition of this as well as a growing focus on responsible corporate behaviour, particularly in the treatment of animals, have adjusted their behaviour. From Unilever abandoning animal testing practices to ensure Dove products are certified cruelty free (Nussbaum), to Domino’s introducing vegan options, companies who are aware of emerging trends and values are changing the way they do business and are reaping the benefits of engaging with, and catering to, vegans. Domino’s sold out of vegan cheese within the first week and vegans were asked to phone ahead to their local store, so great was the demand. From their website:We knew the response was going to be big after the demand we saw for the product on social media but we had no idea it was going to be this big. (Domino’s Newsroom)As a public relations professional, I am baffled by the dairy industry’s failure to adopt a crisis-based strategy rather than largely rely on the traditional one-way communication that has served them well in the previous (golden?) pre-social media age. However, as a vegan, persuaded by the unravelling of the happy cow argument, I cannot help but hope this realisation continues to elude them.References@bovidiva. “Let’s Make #Februdairy Happen This Year. 28 Days, 28 Positive #dairy Posts. From Cute Calves and #cheese on Crumpets, to Belligerent Bulls and Juicy #beef #burgers – Who’s In?” Twitter post. 15 Jan. 2018. 1 Feb. 2019 <https://twitter.com/bovidiva/status/952910641840447488?lang=en>.Austin, Lucinda L., and Yan Jin. Social Media and Crisis Communication. New York: Routledge, 2018.Bradbury, Tod. “Data Shows Major Rise in Veganism among Young People.” Plant Based News 12 Oct. 2018. 10 Feb. 2019 <https://www.plantbasednews.org>.BBC. “Februdairy: The Dairy Industry Fights Back against Veganuary.” BBC.com 8 Feb. 2018. 1 Feb. 2019 <https://www.bbc.com/news/newsbeat-42990941>.Campaign Brief. “Shane Crawford Stars in ‘Milk Loves You Back’ Work for Lion Dairy & Drinks via AJF Partnership.” Campaign Brief Australia 1 Jun. 2017. 12 Feb. 2019 <http://www.campaignbrief.com/2017/06/shane-crawford-stars-in-milk-l.html>.Chiorando, Maria. “BOSH!’s Vegan Cookbook Is Fastest Selling Cookery Title of 2018.” Plant Based News 26 April 2018. 18 Feb. 2019 <https://www.plantbasednews.org/post/bosh-s-vegan-cookbook-is-fastest-selling-cookery-title-of-2018>.Cowspiracy: The Sustainability Secret. Dir. Kip Anderson, and Keegan Kuhn. Appian Way, A.U.M. Films, First Spark Media, 2014.Dairy Australia. “About Legendairy Capital.” Legendairy.com.au, 2019. 12 Feb. 2019 <http://www.legendairy.com.au/dairy-talk/capital-2017/about-us>.Dawson, Abigail. “Lion Dairy & Drinks Launches Campaign to Make Milk Matter Again.” Mumbrella 1 Jun. 2017. 10 Feb 2019 <https://mumbrella.com.au/lion-dairy-drinks-launches-campaign-make-milk-matter-448581>.Department of Agriculture and Water Resources. “Dairy Industry.” Australian Government. 21 Sep. 2018. 20 Feb. 2019 <http://www.agriculture.gov.au/abares/research-topics/surveys/dairy>.Domino’s Newsroom. “Meltdown! Domino’s Set to Run Out of Vegan Cheese!” Domino’s Australia 18 Jan. 2018. 10 Feb. 2019 <https://newsroom.dominos.com.au/home/2018/1/17/meltdown-dominos-set-to-run-out-of-vegan-cheese>.Fitch, Kate. “Making Friends in the Wild West: Singaporean Public Relations Practitioners’ Perceptions of Working in Social Media.” PRism 6.2 (2009). 10 Feb. 2019 <http://www.prismjournal.org/fileadmin/Praxis/Files/globalPR/FITCH.pdf>.Francione, Gary L. “Animal Rights: The Abolitionist Approach.” Animal Rights: The Abolitionist Approach 10 Feb. 2019. <https://www.abolitionistapproach.com/quotes/>.Glance, David. “#QantasLuxury: A Qantas Social Media Disaster in Pyjamas.” The Conversation 23 Nov. 2011. 10 Feb. 2019 <http://theconversation.com/qantasluxury-a-qantas-social-media-disaster-in-pyjamas-4421>.Hancox, Dan. “The Unstoppable Rise of Veganism: How a Fringe Movement Went Mainstream.” The Guardian 1 Apr. 2018. 10 Feb. 2019 <https://www.theguardian.com/lifeandstyle/2018/apr/01/vegans-are-coming-millennials-health-climate-change-animal-welfare>.“Harvard Milk Study: It Doesn’t Do a Body Good.” HuffPost Canada 25 Jul. 2013. 12 Feb. 2019 <https://www.huffingtonpost.ca/2013/07/05/harvard-milk-study_n_3550063.html>.Hill, Kashmir. “#McDStories: When a Hashtag Becomes a Bashtag.” Forbes.com 24 Jan. 2012. 10 Feb. 2019 <https://www.forbes.com/sites/kashmirhill/2012/01/24/mcdstories-when-a-hashtag-becomes-a-bashtag/#1541ef39ed25>.Howell, Madeleine. “Goodbye Veganuary, Hello Februdairy: How the Dairy Industry Is Taking the Fight to Its Vegan Critics.” The Telegraph 9 Feb. 2018. 10 Feb. 2019 <https://www.telegraph.co.uk/food-and-drink/features/goodbye-veganuary-hello-februdairy-dairy-industry-taking-fight/>.Janus, Erin. “DAIRY IS SCARY! The Industry Explained in 5 Minutes.” Video. 27 Dec. 2015. 12 Feb. 2019 <https://www.youtube.com/watch?v=UcN7SGGoCNI&t=192s>.Kaiserman, Beth. “Dairy Industry Struggles in a Sea of Plant-Based Milks.” Forbes.com 31 Jan. 2019. 20 Feb. 2019 <https://www.forbes.com/sites/bethkaiserman/2019/01/31/dairy-industry-plant-based-milks/#7cde005d1c9e>.Kwye, Su Mon, et al. “On Recommending Hashtags in Twitter Networks.” Proceedings of the Social Informatics: 4th International Conference, SocInfo. 5-7 Dec. 2012. Lausanne: Research Collection School of Information Systems. 337-50. 12 Feb. 2019 <https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=2696&context=sis_research>.Lockhart, James, Danny Donaghy, and Hamish Gow. “Milk Price Cuts Reflect the Reality of Sweeping Changes in Global Dairy Market.” The Conversation 12 May 2016. 12 Feb. 2019 <https://theconversation.com/milk-price-cuts-reflect-the-reality-of-sweeping-changes-in-global-dairy-market-59251>.Macnamara, Jim. “‘Emergent’ Media and Public Communication: Understanding the Changing Mediascape.” Public Communication Review 1.2 (2010): 3–17.Mango, Alison. “This Drastic Diet Change Helped Venus Williams Fight Her Autoimmune Condition.” Health.com 12 Jan. 2017. 10 Feb. 2019 <https://www.health.com/nutrition/venus-williams-raw-vegan-diet>.McDonald, Barbara. “Once You Know Something, You Can’t Not Know It. An Empirical Look at Becoming Vegan.” Foodethics.univie.ac.at, 2000. 12 Feb. 2019 <https://foodethics.univie.ac.at/fileadmin/user_upload/inst_ethik_wiss_dialog/McDonald__B._2000._Vegan_...__An_Empirical_Look_at_Becoming_Vegan..pdf>.Milk Life. “What Is Milk Life?” 20 Feb. 2019 <https://milklife.com/what-is-milk-life>.News.com.au. “Twitter Trolls Take over Conference Hashtag with Porn.” News.com.au 30 Nov. 2015. 12 Feb. 2019 <https://www.news.com.au/national/twitter-trolls-take-over-ecology-conference-hashtag-with-porn/news-story/06a76d7ab53ec181776bdb11d735e422>.Nussbaum, Rachel. “Tons of Your Favorite Drugstore Products Are Officially Cruelty-Free Now.” Glamour.com 9 Oct. 2018. 21 Feb. 2019 <https://www.glamour.com/story/dove-cruelty-free-peta>.Parnell, Kerry. “Charity Theme Months Have Taken over the Calendar.” Daily Telegraph.com 26 Sep. 2015. 18 Feb. 2019 <https://www.dailytelegraph.com.au/rendezview/charity-theme-months-have-taken-over-the-calendar/news-story/1f444a360ee04b5ec01154ddf4763932>.People for the Ethical Treatment of Animals. “This Cow Was Suffering on Dairy Farm and the Owner Refused to Help Her.” Facebook post. 13 Feb. 2019. 15 Feb. 2019 <https://www.facebook.com/official.peta>.Pippus, Anna. “Progress! Canada’s New Draft Food Guide Favors Plant-Based Protein and Eliminates Dairy as a Food Group.” Huffington Post 7 Dec. 2017. 10 Feb. 2019 <https://www.huffingtonpost.com/entry/progress-canadas-new-food-guide-will-favor-plant_us_5966eb4ce4b07b5e1d96ed5e>.Potter, Will. “Ag-Gag Laws: Corporate Attempts to Keep Consumers in the Dark.” Griffith Journal of Law and Human Dignity (2017): 1–32.Roy Morgan. “Netflix Set to Surge beyond 10 Million Users.” Roy Morgan 3 Aug. 2018. 20 Feb. 2019 <http://www.roymorgan.com/findings/7681-netflix-stan-foxtel-fetch-youtube-amazon-pay-tv-june-2018-201808020452>.———. “1 in 7 Australians Now Watch No Commercial TV, Nearly Half of All Broadcasting Reaches People 50+, and Those with SVOD Watch 30 Minutes Less a Day.” Roy Morgan 1 Feb. 2016. 10 Feb. 2019 <http://www.roymorgan.com/findings/6646-decline-and-change-commercial-television-viewing-audiences-december-2015-201601290251>.Saccaro, Matt. “Milk Does Not Do a Body Good, Says New Study.” Mic.com 29 Oct. 2014. 12 Feb. 2019 <https://mic.com/articles/102698/milk-does-not-do-a-body-good#.o7MuLnZgV>.Sandhu, Serina. “A Group of Vegan Activists Is Trying to Hijack the ‘Februdairy’ Month by Encouraging People to Protest at Dairy Farms.” inews.co.uk 5 Feb. 2019. 18 Feb. 2019 <https://inews.co.uk/news/uk/vegan-activists-hijack-februdairy-protest-dairy-farms-farmers/>.Social Garden. “Hashtag Blunders That Hurt Your Social Media Marketing Efforts.” Socialgarden.com.au 30 May 2014. 10 Feb. 2019 <https://socialgarden.com.au/social-media-marketing/hashtag-blunders-that-hurt-your-social-media-marketing-efforts/>.Statista: The Statista Portal. Use of Social Networking Sites in Australia as of March 2017 by Age. 2019. 10 Feb. 2019 <https://www.statista.com/statistics/729928/australia-social-media-usage-by-age/>.Tran, Mark. “#myNYPD Twitter Callout Backfires for New York Police Department.” The Guardian 23 Apr. 2014. 10 Feb. 2019 <https://www.theguardian.com/world/2014/apr/23/mynypd-twitter-call-out-new-york-police-backfires>.University of Cambridge. “Farming Loved But Misunderstood, Survey Shows.” Cam.uc.uk 23 Aug. 2012. 10 Feb. 2019 <https://www.cam.ac.uk/research/news/farming-loved-but-misunderstood-survey-shows>.Veganuary. “About Veganuary.” 2019. 21 Feb. 2019 <https://veganuary.com/about/>.———. “Veganuary: Inspiring People to Try Vegan!” 2019. 10 Feb. 2019 <https://veganuary.com/>.What the Health. Dir. Kip Anderson, and Keegan Kuhn. A.U.M. Films, 2017.Worthington, Brett. “Federal Government Pushes to Stop Plant-Based Products Labelled as ‘Meat’ or ‘Milk’.” ABC News 11 Oct. 2018. 20 Feb. 2019 <https://www.abc.net.au/news/2018-10-11/federal-government-wants-food-standards-reviewed/10360200>.Yates, Jack. “Farmers Plan to Make #Februdairy Month of Dairy Celebration.” Farmers Weekly 20 Jan. 2018. 10 Feb. 2019 <https://www.fwi.co.uk/business/farmers-plan-make-februdairy-month-dairy-celebration>.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography