Academic literature on the topic 'Wise Electric Cooperatives, inc'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Wise Electric Cooperatives, inc.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Wise Electric Cooperatives, inc"

1

Jan, Ahmed Zubair, Krzysztof Kedzia, and Muhammad Jamshed Abbass. "Fractional-Order PID Controller (FOPID)-Based Iterative Learning Control for a Nonlinear Boiler System." Energies 16, no. 3 (January 17, 2023): 1045. http://dx.doi.org/10.3390/en16031045.

Full text
Abstract:
For the boiler-turbine unit in power systems, a coordinated control structure plays a crucial role in maintaining the balance in supply and demand of energy, reducing pollutant emissions and optimizing energy efficiency. The matching requirements of the turbine and boiler, the wide range of load changes, and the cooperative operation of many devices in the power system pose many challenges to designing a coordinated control system for the boiler turbine system, thus making the control design a difficult task. In this paper, iterative learning control (ILC) is used to maintain the throttle pressure and megawatt output power of a boiler turbine at the desired set points by controlling the hybrid pattern design structure. Simulation results show that the proposed approach can maintain the desired set points, and the desired response can also be obtained faster by using the proposed approach compared to the ones available in the literature.
APA, Harvard, Vancouver, ISO, and other styles
2

Collins, Steve. "Recovering Fair Use." M/C Journal 11, no. 6 (November 28, 2008). http://dx.doi.org/10.5204/mcj.105.

Full text
Abstract:
IntroductionThe Internet (especially in the so-called Web 2.0 phase), digital media and file-sharing networks have thrust copyright law under public scrutiny, provoking discourses questioning what is fair in the digital age. Accessible hardware and software has led to prosumerism – creativity blending media consumption with media production to create new works that are freely disseminated online via popular video-sharing Web sites such as YouTube or genre specific music sites like GYBO (“Get Your Bootleg On”) amongst many others. The term “prosumer” is older than the Web, and the conceptual convergence of producer and consumer roles is certainly not new, for “at electric speeds the consumer becomes producer as the public becomes participant role player” (McLuhan 4). Similarly, Toffler’s “Third Wave” challenges “old power relationships” and promises to “heal the historic breach between producer and consumer, giving rise to the ‘prosumer’ economics” (27). Prosumption blurs the traditionally separate consumer and producer creating a new creative era of mass customisation of artefacts culled from the (copyrighted) media landscape (Tapscott 62-3). Simultaneously, corporate interests dependent upon the protections provided by copyright law lobby for augmented rights and actively defend their intellectual property through law suits, takedown notices and technological reinforcement. Despite a lack demonstrable economic harm in many cases, the propertarian approach is winning and frequently leading to absurd results (Collins).The balance between private and public interests in creative works is facilitated by the doctrine of fair use (as codified in the United States Copyright Act 1976, section 107). The majority of copyright laws contain “fair” exceptions to claims of infringement, but fair use is characterised by a flexible, open-ended approach that allows the law to flex with the times. Until recently the defence was unique to the U.S., but on 2 January Israel amended its copyright laws to include a fair use defence. (For an overview of the new Israeli fair use exception, see Efroni.) Despite its flexibility, fair use has been systematically eroded by ever encroaching copyrights. This paper argues that copyright enforcement has spun out of control and the raison d’être of the law has shifted from being “an engine of free expression” (Harper & Row, Publishers, Inc. v. Nation Enterprises 471 U.S. 539, 558 (1985)) towards a “legal regime for intellectual property that increasingly looks like the law of real property, or more properly an idealized construct of that law, one in which courts seeks out and punish virtually any use of an intellectual property right by another” (Lemley 1032). Although the copyright landscape appears bleak, two recent cases suggest that fair use has not fallen by the wayside and may well recover. This paper situates fair use as an essential legal and cultural mechanism for optimising creative expression.A Brief History of CopyrightThe law of copyright extends back to eighteenth century England when the Statute of Anne (1710) was enacted. Whilst the length of this paper precludes an in depth analysis of the law and its export to the U.S., it is important to stress the goals of copyright. “Copyright in the American tradition was not meant to be a “property right” as the public generally understands property. It was originally a narrow federal policy that granted a limited trade monopoly in exchange for universal use and access” (Vaidhyanathan 11). Copyright was designed as a right limited in scope and duration to ensure that culturally important creative works were not the victims of monopolies and were free (as later mandated in the U.S. Constitution) “to promote the progress.” During the 18th century English copyright discourse Lord Camden warned against propertarian approaches lest “all our learning will be locked up in the hands of the Tonsons and the Lintons of the age, who will set what price upon it their avarice chooses to demand, till the public become as much their slaves, as their own hackney compilers are” (Donaldson v. Becket 17 Cobbett Parliamentary History, col. 1000). Camden’s sentiments found favour in subsequent years with members of the North American judiciary reiterating that copyright was a limited right in the interests of society—the law’s primary beneficiary (see for example, Wheaton v. Peters 33 US 591 [1834]; Fox Film Corporation v. Doyal 286 US 123 [1932]; US v. Paramount Pictures 334 US 131 [1948]; Mazer v. Stein 347 US 201, 219 [1954]; Twentieth Century Music Corp. v. Aitken 422 U.S. 151 [1975]; Aronson v. Quick Point Pencil Co. 440 US 257 [1979]; Dowling v. United States 473 US 207 [1985]; Harper & Row, Publishers, Inc. v. Nation Enterprises 471 U.S. 539 [1985]; Luther R. Campbell a.k.a. Luke Skyywalker, et al. v. Acuff-Rose Music, Inc. 510 U.S 569 [1994]). Putting the “Fair” in Fair UseIn Folsom v. Marsh 9 F. Cas. 342 (C.C.D. Mass. 1841) (No. 4,901) Justice Storey formulated the modern shape of fair use from a wealth of case law extending back to 1740 and across the Atlantic. Over the course of one hundred years the English judiciary developed a relatively cohesive set of principles governing the use of a first author’s work by a subsequent author without consent. Storey’s synthesis of these principles proved so comprehensive that later English courts would look to his decision for guidance (Scott v. Stanford L.R. 3 Eq. 718, 722 (1867)). Patry explains fair use as integral to the social utility of copyright to “encourage. . . learned men to compose and write useful books” by allowing a second author to use, under certain circumstances, a portion of a prior author’s work, where the second author would himself produce a work promoting the goals of copyright (Patry 4-5).Fair use is a safety valve on copyright law to prevent oppressive monopolies, but some scholars suggest that fair use is less a defence and more a right that subordinates copyrights. Lange and Lange Anderson argue that the doctrine is not fundamentally about copyright or a system of property, but is rather concerned with the recognition of the public domain and its preservation from the ever encroaching advances of copyright (2001). Fair use should not be understood as subordinate to the exclusive rights of copyright owners. Rather, as Lange and Lange Anderson claim, the doctrine should stand in the superior position: the complete spectrum of ownership through copyright can only be determined pursuant to a consideration of what is required by fair use (Lange and Lange Anderson 19). The language of section 107 suggests that fair use is not subordinate to the bundle of rights enjoyed by copyright ownership: “Notwithstanding the provisions of sections 106 and 106A, the fair use of a copyrighted work . . . is not an infringement of copyright” (Copyright Act 1976, s.107). Fair use is not merely about the marketplace for copyright works; it is concerned with what Weinreb refers to as “a community’s established practices and understandings” (1151-2). This argument boldly suggests that judicial application of fair use has consistently erred through subordinating the doctrine to copyright and considering simply the effect of the appropriation on the market place for the original work.The emphasis on economic factors has led courts to sympathise with copyright owners leading to a propertarian or Blackstonian approach to copyright (Collins; Travis) propagating the myth that any use of copyrighted materials must be licensed. Law and media reports alike are potted with examples. For example, in Bridgeport Music, Inc., et al v. Dimension Films et al 383 F. 3d 400 (6th Cir. 2004) a Sixth Circuit Court of Appeals held that the transformative use of a three-note guitar sample infringed copyrights and that musicians must obtain licence from copyright owners for every appropriated audio fragment regardless of duration or recognisability. Similarly, in 2006 Christopher Knight self-produced a one-minute television advertisement to support his campaign to be elected to the board of education for Rockingham County, North Carolina. As a fan of Star Wars, Knight used a makeshift Death Star and lightsaber in his clip, capitalising on the imagery of the Jedi Knight opposing the oppressive regime of the Empire to protect the people. According to an interview in The Register the advertisement was well received by local audiences prompting Knight to upload it to his YouTube channel. Several months later, Knight’s clip appeared on Web Junk 2.0, a cable show broadcast by VH1, a channel owned by media conglomerate Viacom. Although his permission was not sought, Knight was pleased with the exposure, after all “how often does a local school board ad wind up on VH1?” (Metz). Uploading the segment of Web Junk 2.0 featuring the advertisement to YouTube, however, led Viacom to quickly issue a take-down notice citing copyright infringement. Knight expressed his confusion at the apparent unfairness of the situation: “Viacom says that I can’t use my clip showing my commercial, claiming copy infringement? As we say in the South, that’s ass-backwards” (Metz).The current state of copyright law is, as Patry says, “depressing”:We are well past the healthy dose stage and into the serious illness stage ... things are getting worse, not better. Copyright law has abandoned its reason for being: to encourage learning and the creation of new works. Instead, its principal functions now are to preserve existing failed business models, to suppress new business models and technologies, and to obtain, if possible, enormous windfall profits from activity that not only causes no harm, but which is beneficial to copyright owners. Like Humpty-Dumpty, the copyright law we used to know can never be put back together.The erosion of fair use by encroaching private interests represented by copyrights has led to strong critiques leveled at the judiciary and legislators by Lessig, McLeod and Vaidhyanathan. “Free culture” proponents warn that an overly strict copyright regime unbalanced by an equally prevalent fair use doctrine is dangerous to creativity, innovation, culture and democracy. After all, “few, if any, things ... are strictly original throughout. Every book in literature, science and art, borrows, and must necessarily borrow, and use much which was well known and used before. No man creates a new language for himself, at least if he be a wise man, in writing a book. He contents himself with the use of language already known and used and understood by others” (Emerson v. Davis, 8 F. Cas. 615, 619 (No. 4,436) (CCD Mass. 1845), qted in Campbell v. Acuff-Rose, 62 U.S.L.W. at 4171 (1994)). The rise of the Web 2.0 phase with its emphasis on end-user created content has led to an unrelenting wave of creativity, and much of it incorporates or “mashes up” copyright material. As Negativland observes, free appropriation is “inevitable when a population bombarded with electronic media meets the hardware [and software] that encourages them to capture it” and creatively express themselves through appropriated media forms (251). The current state of copyright and fair use is bleak, but not beyond recovery. Two recent cases suggest a resurgence of the ideology underpinning the doctrine of fair use and the role played by copyright.Let’s Go CrazyIn “Let’s Go Crazy #1” on YouTube, Holden Lenz (then eighteen months old) is caught bopping to a barely recognizable recording of Prince’s “Let’s Go Crazy” in his mother’s Pennsylvanian kitchen. The twenty-nine second long video was viewed a mere twenty-eight times by family and friends before Stephanie Lenz received an email from YouTube informing her of its compliance with a Digital Millennium Copyright Act (DMCA) take-down notice issued by Universal, copyright owners of Prince’s recording (McDonald). Lenz has since filed a counterclaim against Universal and YouTube has reinstated the video. Ironically, the media exposure surrounding Lenz’s situation has led to the video being viewed 633,560 times at the time of writing. Comments associated with the video indicate a less than reverential opinion of Prince and Universal and support the fairness of using the song. On 8 Aug. 2008 a Californian District Court denied Universal’s motion to dismiss Lenz’s counterclaim. The question at the centre of the court judgment was whether copyright owners should consider “the fair use doctrine in formulating a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner, its agent, or the law.” The court ultimately found in favour of Lenz and also reaffirmed the position of fair use in relation to copyright. Universal rested its argument on two key points. First, that copyright owners cannot be expected to consider fair use prior to issuing takedown notices because fair use is a defence, invoked after the act rather than a use authorized by the copyright owner or the law. Second, because the DMCA does not mention fair use, then there should be no requirement to consider it, or at the very least, it should not be considered until it is raised in legal defence.In rejecting both arguments the court accepted Lenz’s argument that fair use is an authorised use of copyrighted materials because the doctrine of fair use is embedded into the Copyright Act 1976. The court substantiated the point by emphasising the language of section 107. Although fair use is absent from the DMCA, the court reiterated that it is part of the Copyright Act and that “notwithstanding the provisions of sections 106 and 106A” a fair use “is not an infringement of copyright” (s.107, Copyright Act 1976). Overzealous rights holders frequently abuse the DMCA as a means to quash all use of copyrighted materials without considering fair use. This decision reaffirms that fair use “should not be considered a bizarre, occasionally tolerated departure from the grand conception of the copyright design” but something that it is integral to the constitution of copyright law and essential in ensuring that copyright’s goals can be fulfilled (Leval 1100). Unlicensed musical sampling has never fared well in the courtroom. Three decades of rejection and admonishment by judges culminated in Bridgeport Music, Inc., et al v. Dimension Films et al 383 F. 3d 400 (6th Cir. 2004): “Get a license or do not sample. We do not see this stifling creativity in any significant way” was the ruling on an action brought against an unlicensed use of a three-note guitar sample under section 114, an audio piracy provision. The Bridgeport decision sounded a death knell for unlicensed sampling, ensuring that only artists with sufficient capital to pay the piper could legitimately be creative with the wealth of recorded music available. The cost of licensing samples can often outweigh the creative merit of the act itself as discussed by McLeod (86) and Beaujon (25). In August 2008 the Supreme Court of New York heard EMI v. Premise Media in which EMI sought an injunction against an unlicensed fifteen second excerpt of John Lennon’s “Imagine” featured in Expelled: No Intelligence Allowed, a controversial documentary canvassing alleged chilling of intelligent design proponents in academic circles. (The family of John Lennon and EMI had previously failed to persuade a Manhattan federal court in a similar action.) The court upheld Premise Media’s arguments for fair use and rejected the Bridgeport approach on which EMI had rested its entire complaint. Justice Lowe criticised the Bridgeport court for its failure to examine the legislative intent of section 114 suggesting that courts should look to the black letter of the law rather than blindly accept propertarian arguments. This decision is of particular importance because it establishes that fair use applies to unlicensed use of sound recordings and re-establishes de minimis use.ConclusionThis paper was partly inspired by the final entry on eminent copyright scholar William Patry’s personal copyright law blog (1 Aug. 2008). A copyright lawyer for over 25 years, Patry articulated his belief that copyright law has swung too far away from its initial objectives and that balance could never be restored. The two cases presented in this paper demonstrate that fair use – and therefore balance – can be recovered in copyright. The federal Supreme Court and lower courts have stressed that copyright was intended to promote creativity and have upheld the fair doctrine, but in order for the balance to exist in copyright law, cases must come before the courts; copyright myth must be challenged. As McLeod states, “the real-world problems occur when institutions that actually have the resources to defend themselves against unwarranted or frivolous lawsuits choose to take the safe route, thus eroding fair use”(146-7). ReferencesBeaujon, Andrew. “It’s Not the Beat, It’s the Mocean.” CMJ New Music Monthly. April 1999.Collins, Steve. “Good Copy, Bad Copy: Covers, Sampling and Copyright.” M/C Journal 8.3 (2005). 26 Aug. 2008 ‹http://journal.media-culture.org.au/0507/02-collins.php›.———. “‘Property Talk’ and the Revival of Blackstonian Copyright.” M/C Journal 9.4 (2006). 26 Aug. 2008 ‹http://journal.media-culture.org.au/0609/5-collins.php›.Donaldson v. Becket 17 Cobbett Parliamentary History, col. 953.Efroni, Zohar. “Israel’s Fair Use.” The Center for Internet and Society (2008). 26 Aug. 2008 ‹http://cyberlaw.stanford.edu/node/5670›.Lange, David, and Jennifer Lange Anderson. “Copyright, Fair Use and Transformative Critical Appropriation.” Conference on the Public Domain, Duke Law School. 2001. 26 Aug. 2008 ‹http://www.law.duke.edu/pd/papers/langeand.pdf›.Lemley, Mark. “Property, Intellectual Property, and Free Riding.” Texas Law Review 83 (2005): 1031.Lessig, Lawrence. The Future of Ideas. New York: Random House, 2001.———. Free Culture. New York: Penguin, 2004.Leval, Pierre. “Toward a Fair Use Standard.” Harvard Law Review 103 (1990): 1105.McDonald, Heather. “Holden Lenz, 18 Months, versus Prince and Universal Music Group.” About.com: Music Careers 2007. 26 Aug. 2008 ‹http://musicians.about.com/b/2007/10/27/holden-lenz-18-months-versus-prince-and-universal-music-group.htm›.McLeod, Kembrew. “How Copyright Law Changed Hip Hop: An interview with Public Enemy’s Chuck D and Hank Shocklee.” Stay Free 2002. 26 Aug. 2008 ‹http://www.stayfreemagazine.org/archives/20/public_enemy.html›.———. Freedom of Expression: Overzealous Copyright Bozos and Other Enemies of Creativity. United States: Doubleday, 2005.McLuhan, Marshall, and Barrington Nevitt. Take Today: The Executive as Dropout. Ontario: Longman Canada, 1972.Metz, Cade. “Viacom Slaps YouTuber for Behaving like Viacom.” The Register 2007. 26 Aug. 2008 ‹http://www.theregister.co.uk/2007/08/30/viacom_slaps_pol/›.Negativland, ed. Fair Use: The Story of the Letter U and the Numeral 2. Concord: Seeland, 1995.Patry, William. The Fair Use Privilege in Copyright Law. Washington DC: Bureau of National Affairs, 1985.———. “End of the Blog.” The Patry Copyright Blog. 1 Aug. 2008. 27 Aug. 2008 ‹http://williampatry.blogspot.com/2008/08/end-of-blog.html›.Tapscott, Don. The Digital Economy: Promise and Peril in the Age of Networked Intelligence. New York: McGraw Hill, 1996.Toffler, Alvin. The Third Wave. London, Glasgow, Sydney, Auckland. Toronto, Johannesburg: William Collins, 1980.Travis, Hannibal. “Pirates of the Information Infrastructure: Blackstonian Copyright and the First Amendment.” Berkeley Technology Law Journal, Vol. 15 (2000), No. 777.Vaidhyanathan, Siva. Copyrights and Copywrongs: The Rise of Intellectual Property and How It Threatens Creativity. New York; London: New York UP, 2003.
APA, Harvard, Vancouver, ISO, and other styles
3

Losh, Elizabeth. "Artificial Intelligence." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2710.

Full text
Abstract:
On the morning of Thursday, 4 May 2006, the United States House Permanent Select Committee on Intelligence held an open hearing entitled “Terrorist Use of the Internet.” The Intelligence committee meeting was scheduled to take place in Room 1302 of the Longworth Office Building, a Depression-era structure with a neoclassical façade. Because of a dysfunctional elevator, some of the congressional representatives were late to the meeting. During the testimony about the newest political applications for cutting-edge digital technology, the microphones periodically malfunctioned, and witnesses complained of “technical problems” several times. By the end of the day it seemed that what was to be remembered about the hearing was the shocking revelation that terrorists were using videogames to recruit young jihadists. The Associated Press wrote a short, restrained article about the hearing that only mentioned “computer games and recruitment videos” in passing. Eager to have their version of the news item picked up, Reuters made videogames the focus of their coverage with a headline that announced, “Islamists Using US Videogames in Youth Appeal.” Like a game of telephone, as the Reuters videogame story was quickly re-run by several Internet news services, each iteration of the title seemed less true to the exact language of the original. One Internet news service changed the headline to “Islamic militants recruit using U.S. video games.” Fox News re-titled the story again to emphasise that this alert about technological manipulation was coming from recognised specialists in the anti-terrorism surveillance field: “Experts: Islamic Militants Customizing Violent Video Games.” As the story circulated, the body of the article remained largely unchanged, in which the Reuters reporter described the digital materials from Islamic extremists that were shown at the congressional hearing. During the segment that apparently most captured the attention of the wire service reporters, eerie music played as an English-speaking narrator condemned the “infidel” and declared that he had “put a jihad” on them, as aerial shots moved over 3D computer-generated images of flaming oil facilities and mosques covered with geometric designs. Suddenly, this menacing voice-over was interrupted by an explosion, as a virtual rocket was launched into a simulated military helicopter. The Reuters reporter shared this dystopian vision from cyberspace with Western audiences by quoting directly from the chilling commentary and describing a dissonant montage of images and remixed sound. “I was just a boy when the infidels came to my village in Blackhawk helicopters,” a narrator’s voice said as the screen flashed between images of street-level gunfights, explosions and helicopter assaults. Then came a recording of President George W. Bush’s September 16, 2001, statement: “This crusade, this war on terrorism, is going to take a while.” It was edited to repeat the word “crusade,” which Muslims often define as an attack on Islam by Christianity. According to the news reports, the key piece of evidence before Congress seemed to be a film by “SonicJihad” of recorded videogame play, which – according to the experts – was widely distributed online. Much of the clip takes place from the point of view of a first-person shooter, seen as if through the eyes of an armed insurgent, but the viewer also periodically sees third-person action in which the player appears as a running figure wearing a red-and-white checked keffiyeh, who dashes toward the screen with a rocket launcher balanced on his shoulder. Significantly, another of the player’s hand-held weapons is a detonator that triggers remote blasts. As jaunty music plays, helicopters, tanks, and armoured vehicles burst into smoke and flame. Finally, at the triumphant ending of the video, a green and white flag bearing a crescent is hoisted aloft into the sky to signify victory by Islamic forces. To explain the existence of this digital alternative history in which jihadists could be conquerors, the Reuters story described the deviousness of the country’s terrorist opponents, who were now apparently modifying popular videogames through their wizardry and inserting anti-American, pro-insurgency content into U.S.-made consumer technology. One of the latest video games modified by militants is the popular “Battlefield 2” from leading video game publisher, Electronic Arts Inc of Redwood City, California. Jeff Brown, a spokesman for Electronic Arts, said enthusiasts often write software modifications, known as “mods,” to video games. “Millions of people create mods on games around the world,” he said. “We have absolutely no control over them. It’s like drawing a mustache on a picture.” Although the Electronic Arts executive dismissed the activities of modders as a “mustache on a picture” that could only be considered little more than childish vandalism of their off-the-shelf corporate product, others saw a more serious form of criminality at work. Testifying experts and the legislators listening on the committee used the video to call for greater Internet surveillance efforts and electronic counter-measures. Within twenty-four hours of the sensationalistic news breaking, however, a group of Battlefield 2 fans was crowing about the idiocy of reporters. The game play footage wasn’t from a high-tech modification of the software by Islamic extremists; it had been posted on a Planet Battlefield forum the previous December of 2005 by a game fan who had cut together regular game play with a Bush remix and a parody snippet of the soundtrack from the 2004 hit comedy film Team America. The voice describing the Black Hawk helicopters was the voice of Trey Parker of South Park cartoon fame, and – much to Parker’s amusement – even the mention of “goats screaming” did not clue spectators in to the fact of a comic source. Ironically, the moment in the movie from which the sound clip is excerpted is one about intelligence gathering. As an agent of Team America, a fictional elite U.S. commando squad, the hero of the film’s all-puppet cast, Gary Johnston, is impersonating a jihadist radical inside a hostile Egyptian tavern that is modelled on the cantina scene from Star Wars. Additional laughs come from the fact that agent Johnston is accepted by the menacing terrorist cell as “Hakmed,” despite the fact that he utters a series of improbable clichés made up of incoherent stereotypes about life in the Middle East while dressed up in a disguise made up of shoe polish and a turban from a bathroom towel. The man behind the “SonicJihad” pseudonym turned out to be a twenty-five-year-old hospital administrator named Samir, and what reporters and representatives saw was nothing more exotic than game play from an add-on expansion pack of Battlefield 2, which – like other versions of the game – allows first-person shooter play from the position of the opponent as a standard feature. While SonicJihad initially joined his fellow gamers in ridiculing the mainstream media, he also expressed astonishment and outrage about a larger politics of reception. In one interview he argued that the media illiteracy of Reuters potentially enabled a whole series of category errors, in which harmless gamers could be demonised as terrorists. It wasn’t intended for the purpose what it was portrayed to be by the media. So no I don’t regret making a funny video . . . why should I? The only thing I regret is thinking that news from Reuters was objective and always right. The least they could do is some online research before publishing this. If they label me al-Qaeda just for making this silly video, that makes you think, what is this al-Qaeda? And is everything al-Qaeda? Although Sonic Jihad dismissed his own work as “silly” or “funny,” he expected considerably more from a credible news agency like Reuters: “objective” reporting, “online research,” and fact-checking before “publishing.” Within the week, almost all of the salient details in the Reuters story were revealed to be incorrect. SonicJihad’s film was not made by terrorists or for terrorists: it was not created by “Islamic militants” for “Muslim youths.” The videogame it depicted had not been modified by a “tech-savvy militant” with advanced programming skills. Of course, what is most extraordinary about this story isn’t just that Reuters merely got its facts wrong; it is that a self-identified “parody” video was shown to the august House Intelligence Committee by a team of well-paid “experts” from the Science Applications International Corporation (SAIC), a major contractor with the federal government, as key evidence of terrorist recruitment techniques and abuse of digital networks. Moreover, this story of media illiteracy unfolded in the context of a fundamental Constitutional debate about domestic surveillance via communications technology and the further regulation of digital content by lawmakers. Furthermore, the transcripts of the actual hearing showed that much more than simple gullibility or technological ignorance was in play. Based on their exchanges in the public record, elected representatives and government experts appear to be keenly aware that the digital discourses of an emerging information culture might be challenging their authority and that of the longstanding institutions of knowledge and power with which they are affiliated. These hearings can be seen as representative of a larger historical moment in which emphatic declarations about prohibiting specific practices in digital culture have come to occupy a prominent place at the podium, news desk, or official Web portal. This environment of cultural reaction can be used to explain why policy makers’ reaction to terrorists’ use of networked communication and digital media actually tells us more about our own American ideologies about technology and rhetoric in a contemporary information environment. When the experts come forward at the Sonic Jihad hearing to “walk us through the media and some of the products,” they present digital artefacts of an information economy that mirrors many of the features of our own consumption of objects of electronic discourse, which seem dangerously easy to copy and distribute and thus also create confusion about their intended meanings, audiences, and purposes. From this one hearing we can see how the reception of many new digital genres plays out in the public sphere of legislative discourse. Web pages, videogames, and Weblogs are mentioned specifically in the transcript. The main architecture of the witnesses’ presentation to the committee is organised according to the rhetorical conventions of a PowerPoint presentation. Moreover, the arguments made by expert witnesses about the relationship of orality to literacy or of public to private communications in new media are highly relevant to how we might understand other important digital genres, such as electronic mail or text messaging. The hearing also invites consideration of privacy, intellectual property, and digital “rights,” because moral values about freedom and ownership are alluded to by many of the elected representatives present, albeit often through the looking glass of user behaviours imagined as radically Other. For example, terrorists are described as “modders” and “hackers” who subvert those who properly create, own, legitimate, and regulate intellectual property. To explain embarrassing leaks of infinitely replicable digital files, witness Ron Roughead says, “We’re not even sure that they don’t even hack into the kinds of spaces that hold photographs in order to get pictures that our forces have taken.” Another witness, Undersecretary of Defense for Policy and International Affairs, Peter Rodman claims that “any video game that comes out, as soon as the code is released, they will modify it and change the game for their needs.” Thus, the implication of these witnesses’ testimony is that the release of code into the public domain can contribute to political subversion, much as covert intrusion into computer networks by stealthy hackers can. However, the witnesses from the Pentagon and from the government contractor SAIC often present a contradictory image of the supposed terrorists in the hearing transcripts. Sometimes the enemy is depicted as an organisation of technological masterminds, capable of manipulating the computer code of unwitting Americans and snatching their rightful intellectual property away; sometimes those from the opposing forces are depicted as pre-modern and even sub-literate political innocents. In contrast, the congressional representatives seem to focus on similarities when comparing the work of “terrorists” to the everyday digital practices of their constituents and even of themselves. According to the transcripts of this open hearing, legislators on both sides of the aisle express anxiety about domestic patterns of Internet reception. Even the legislators’ own Web pages are potentially disruptive electronic artefacts, particularly when the demands of digital labour interfere with their duties as lawmakers. Although the subject of the hearing is ostensibly terrorist Websites, Representative Anna Eshoo (D-California) bemoans the difficulty of maintaining her own official congressional site. As she observes, “So we are – as members, I think we’re very sensitive about what’s on our Website, and if I retained what I had on my Website three years ago, I’d be out of business. So we know that they have to be renewed. They go up, they go down, they’re rebuilt, they’re – you know, the message is targeted to the future.” In their questions, lawmakers identify Weblogs (blogs) as a particular area of concern as a destabilising alternative to authoritative print sources of information from established institutions. Representative Alcee Hastings (D-Florida) compares the polluting power of insurgent bloggers to that of influential online muckrakers from the American political Right. Hastings complains of “garbage on our regular mainstream news that comes from blog sites.” Representative Heather Wilson (R-New Mexico) attempts to project a media-savvy persona by bringing up the “phenomenon of blogging” in conjunction with her questions about jihadist Websites in which she notes how Internet traffic can be magnified by cooperative ventures among groups of ideologically like-minded content-providers: “These Websites, and particularly the most active ones, are they cross-linked? And do they have kind of hot links to your other favorite sites on them?” At one point Representative Wilson asks witness Rodman if he knows “of your 100 hottest sites where the Webmasters are educated? What nationality they are? Where they’re getting their money from?” In her questions, Wilson implicitly acknowledges that Web work reflects influences from pedagogical communities, economic networks of the exchange of capital, and even potentially the specific ideologies of nation-states. It is perhaps indicative of the government contractors’ anachronistic worldview that the witness is unable to answer Wilson’s question. He explains that his agency focuses on the physical location of the server or ISP rather than the social backgrounds of the individuals who might be manufacturing objectionable digital texts. The premise behind the contractors’ working method – surveilling the technical apparatus not the social network – may be related to other beliefs expressed by government witnesses, such as the supposition that jihadist Websites are collectively produced and spontaneously emerge from the indigenous, traditional, tribal culture, instead of assuming that Iraqi insurgents have analogous beliefs, practices, and technological awareness to those in first-world countries. The residual subtexts in the witnesses’ conjectures about competing cultures of orality and literacy may tell us something about a reactionary rhetoric around videogames and digital culture more generally. According to the experts before Congress, the Middle Eastern audience for these videogames and Websites is limited by its membership in a pre-literate society that is only capable of abortive cultural production without access to knowledge that is archived in printed codices. Sometimes the witnesses before Congress seem to be unintentionally channelling the ideas of the late literacy theorist Walter Ong about the “secondary orality” associated with talky electronic media such as television, radio, audio recording, or telephone communication. Later followers of Ong extend this concept of secondary orality to hypertext, hypermedia, e-mail, and blogs, because they similarly share features of both speech and written discourse. Although Ong’s disciples celebrate this vibrant reconnection to a mythic, communal past of what Kathleen Welch calls “electric rhetoric,” the defence industry consultants express their profound state of alarm at the potentially dangerous and subversive character of this hybrid form of communication. The concept of an “oral tradition” is first introduced by the expert witnesses in the context of modern marketing and product distribution: “The Internet is used for a variety of things – command and control,” one witness states. “One of the things that’s missed frequently is how and – how effective the adversary is at using the Internet to distribute product. They’re using that distribution network as a modern form of oral tradition, if you will.” Thus, although the Internet can be deployed for hierarchical “command and control” activities, it also functions as a highly efficient peer-to-peer distributed network for disseminating the commodity of information. Throughout the hearings, the witnesses imply that unregulated lateral communication among social actors who are not authorised to speak for nation-states or to produce legitimated expert discourses is potentially destabilising to political order. Witness Eric Michael describes the “oral tradition” and the conventions of communal life in the Middle East to emphasise the primacy of speech in the collective discursive practices of this alien population: “I’d like to point your attention to the media types and the fact that the oral tradition is listed as most important. The other media listed support that. And the significance of the oral tradition is more than just – it’s the medium by which, once it comes off the Internet, it is transferred.” The experts go on to claim that this “oral tradition” can contaminate other media because it functions as “rumor,” the traditional bane of the stately discourse of military leaders since the classical era. The oral tradition now also has an aspect of rumor. A[n] event takes place. There is an explosion in a city. Rumor is that the United States Air Force dropped a bomb and is doing indiscriminate killing. This ends up being discussed on the street. It ends up showing up in a Friday sermon in a mosque or in another religious institution. It then gets recycled into written materials. Media picks up the story and broadcasts it, at which point it’s now a fact. In this particular case that we were telling you about, it showed up on a network television, and their propaganda continues to go back to this false initial report on network television and continue to reiterate that it’s a fact, even though the United States government has proven that it was not a fact, even though the network has since recanted the broadcast. In this example, many-to-many discussion on the “street” is formalised into a one-to many “sermon” and then further stylised using technology in a one-to-many broadcast on “network television” in which “propaganda” that is “false” can no longer be disputed. This “oral tradition” is like digital media, because elements of discourse can be infinitely copied or “recycled,” and it is designed to “reiterate” content. In this hearing, the word “rhetoric” is associated with destructive counter-cultural forces by the witnesses who reiterate cultural truisms dating back to Plato and the Gorgias. For example, witness Eric Michael initially presents “rhetoric” as the use of culturally specific and hence untranslatable figures of speech, but he quickly moves to an outright castigation of the entire communicative mode. “Rhetoric,” he tells us, is designed to “distort the truth,” because it is a “selective” assembly or a “distortion.” Rhetoric is also at odds with reason, because it appeals to “emotion” and a romanticised Weltanschauung oriented around discourses of “struggle.” The film by SonicJihad is chosen as the final clip by the witnesses before Congress, because it allegedly combines many different types of emotional appeal, and thus it conveniently ties together all of the themes that the witnesses present to the legislators about unreliable oral or rhetorical sources in the Middle East: And there you see how all these products are linked together. And you can see where the games are set to psychologically condition you to go kill coalition forces. You can see how they use humor. You can see how the entire campaign is carefully crafted to first evoke an emotion and then to evoke a response and to direct that response in the direction that they want. Jihadist digital products, especially videogames, are effective means of manipulation, the witnesses argue, because they employ multiple channels of persuasion and carefully sequenced and integrated subliminal messages. To understand the larger cultural conversation of the hearing, it is important to keep in mind that the related argument that “games” can “psychologically condition” players to be predisposed to violence is one that was important in other congressional hearings of the period, as well one that played a role in bills and resolutions that were passed by the full body of the legislative branch. In the witness’s testimony an appeal to anti-game sympathies at home is combined with a critique of a closed anti-democratic system abroad in which the circuits of rhetorical production and their composite metonymic chains are described as those that command specific, unvarying, robotic responses. This sharp criticism of the artful use of a presentation style that is “crafted” is ironic, given that the witnesses’ “compilation” of jihadist digital material is staged in the form of a carefully structured PowerPoint presentation, one that is paced to a well-rehearsed rhythm of “slide, please” or “next slide” in the transcript. The transcript also reveals that the members of the House Intelligence Committee were not the original audience for the witnesses’ PowerPoint presentation. Rather, when it was first created by SAIC, this “expert” presentation was designed for training purposes for the troops on the ground, who would be facing the challenges of deployment in hostile terrain. According to the witnesses, having the slide show showcased before Congress was something of an afterthought. Nonetheless, Congressman Tiahrt (R-KN) is so impressed with the rhetorical mastery of the consultants that he tries to appropriate it. As Tiarht puts it, “I’d like to get a copy of that slide sometime.” From the hearing we also learn that the terrorists’ Websites are threatening precisely because they manifest a polymorphously perverse geometry of expansion. For example, one SAIC witness before the House Committee compares the replication and elaboration of digital material online to a “spiderweb.” Like Representative Eshoo’s site, he also notes that the terrorists’ sites go “up” and “down,” but the consultant is left to speculate about whether or not there is any “central coordination” to serve as an organising principle and to explain the persistence and consistency of messages despite the apparent lack of a single authorial ethos to offer a stable, humanised, point of reference. In the hearing, the oft-cited solution to the problem created by the hybridity and iterability of digital rhetoric appears to be “public diplomacy.” Both consultants and lawmakers seem to agree that the damaging messages of the insurgents must be countered with U.S. sanctioned information, and thus the phrase “public diplomacy” appears in the hearing seven times. However, witness Roughhead complains that the protean “oral tradition” and what Henry Jenkins has called the “transmedia” character of digital culture, which often crosses several platforms of traditional print, projection, or broadcast media, stymies their best rhetorical efforts: “I think the point that we’ve tried to make in the briefing is that wherever there’s Internet availability at all, they can then download these – these programs and put them onto compact discs, DVDs, or post them into posters, and provide them to a greater range of people in the oral tradition that they’ve grown up in. And so they only need a few Internet sites in order to distribute and disseminate the message.” Of course, to maintain their share of the government market, the Science Applications International Corporation also employs practices of publicity and promotion through the Internet and digital media. They use HTML Web pages for these purposes, as well as PowerPoint presentations and online video. The rhetoric of the Website of SAIC emphasises their motto “From Science to Solutions.” After a short Flash film about how SAIC scientists and engineers solve “complex technical problems,” the visitor is taken to the home page of the firm that re-emphasises their central message about expertise. The maps, uniforms, and specialised tools and equipment that are depicted in these opening Web pages reinforce an ethos of professional specialisation that is able to respond to multiple threats posed by the “global war on terror.” By 26 June 2006, the incident finally was being described as a “Pentagon Snafu” by ABC News. From the opening of reporter Jake Tapper’s investigative Webcast, established government institutions were put on the spot: “So, how much does the Pentagon know about videogames? Well, when it came to a recent appearance before Congress, apparently not enough.” Indeed, the very language about “experts” that was highlighted in the earlier coverage is repeated by Tapper in mockery, with the significant exception of “independent expert” Ian Bogost of the Georgia Institute of Technology. If the Pentagon and SAIC deride the legitimacy of rhetoric as a cultural practice, Bogost occupies himself with its defence. In his recent book Persuasive Games: The Expressive Power of Videogames, Bogost draws upon the authority of the “2,500 year history of rhetoric” to argue that videogames represent a significant development in that cultural narrative. Given that Bogost and his Watercooler Games Weblog co-editor Gonzalo Frasca were actively involved in the detective work that exposed the depth of professional incompetence involved in the government’s line-up of witnesses, it is appropriate that Bogost is given the final words in the ABC exposé. As Bogost says, “We should be deeply bothered by this. We should really be questioning the kind of advice that Congress is getting.” Bogost may be right that Congress received terrible counsel on that day, but a close reading of the transcript reveals that elected officials were much more than passive listeners: in fact they were lively participants in a cultural conversation about regulating digital media. After looking at the actual language of these exchanges, it seems that the persuasiveness of the misinformation from the Pentagon and SAIC had as much to do with lawmakers’ preconceived anxieties about practices of computer-mediated communication close to home as it did with the contradictory stereotypes that were presented to them about Internet practices abroad. In other words, lawmakers found themselves looking into a fun house mirror that distorted what should have been familiar artefacts of American popular culture because it was precisely what they wanted to see. References ABC News. “Terrorist Videogame?” Nightline Online. 21 June 2006. 22 June 2006 http://abcnews.go.com/Video/playerIndex?id=2105341>. Bogost, Ian. Persuasive Games: Videogames and Procedural Rhetoric. Cambridge, MA: MIT Press, 2007. Game Politics. “Was Congress Misled by ‘Terrorist’ Game Video? We Talk to Gamer Who Created the Footage.” 11 May 2006. http://gamepolitics.livejournal.com/285129.html#cutid1>. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. julieb. “David Morgan Is a Horrible Writer and Should Be Fired.” Online posting. 5 May 2006. Dvorak Uncensored Cage Match Forums. http://cagematch.dvorak.org/index.php/topic,130.0.html>. Mahmood. “Terrorists Don’t Recruit with Battlefield 2.” GGL Global Gaming. 16 May 2006 http://www.ggl.com/news.php?NewsId=3090>. Morgan, David. “Islamists Using U.S. Video Games in Youth Appeal.” Reuters online news service. 4 May 2006 http://today.reuters.com/news/ArticleNews.aspx?type=topNews &storyID=2006-05-04T215543Z_01_N04305973_RTRUKOC_0_US-SECURITY- VIDEOGAMES.xml&pageNumber=0&imageid=&cap=&sz=13&WTModLoc= NewsArt-C1-ArticlePage2>. Ong, Walter J. Orality and Literacy: The Technologizing of the Word. London/New York: Methuen, 1982. Parker, Trey. Online posting. 7 May 2006. 9 May 2006 http://www.treyparker.com>. Plato. “Gorgias.” Plato: Collected Dialogues. Princeton: Princeton UP, 1961. Shrader, Katherine. “Pentagon Surfing Thousands of Jihad Sites.” Associated Press 4 May 2006. SonicJihad. “SonicJihad: A Day in the Life of a Resistance Fighter.” Online posting. 26 Dec. 2005. Planet Battlefield Forums. 9 May 2006 http://www.forumplanet.com/planetbattlefield/topic.asp?fid=13670&tid=1806909&p=1>. Tapper, Jake, and Audery Taylor. “Terrorist Video Game or Pentagon Snafu?” ABC News Nightline 21 June 2006. 30 June 2006 http://abcnews.go.com/Nightline/Technology/story?id=2105128&page=1>. U.S. Congressional Record. Panel I of the Hearing of the House Select Intelligence Committee, Subject: “Terrorist Use of the Internet for Communications.” Federal News Service. 4 May 2006. Welch, Kathleen E. Electric Rhetoric: Classical Rhetoric, Oralism, and the New Literacy. Cambridge, MA: MIT Press, 1999. Citation reference for this article MLA Style Losh, Elizabeth. "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/08-losh.php>. APA Style Losh, E. (Oct. 2007) "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/08-losh.php>.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Wise Electric Cooperatives, inc"

1

Marsh, Brittany. Victoria Electric Cooperative, Inc: Celebrating 75 years. Virginia Beach, VA: Donning Company Publishers, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Swinger, Patricia. Shedding light on the Willamette Valley: The history of Consumers Power Inc. Virginia Beach, VA: Donning Company Publishers, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Barton, John D. A history of Moon Lake Electric Association, Inc. 1938-2013: A remarkable past and a bright future. Virginia Beach, VA: The Donning Company Publishers, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hecker, Gaylon Finklea. Bandera Electric Cooperative Inc: Enhancing quality of life for 75 years. Virginia Beach, VA: The Donning Company Publishers, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Publishers, Donning Company. The power of community: Celebrating 75 years of service. Virginia Beach, VA: The Donning Company Publishers, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Wise Electric Cooperatives, inc"

1

Bu, Yunong, Qingxi Chi, and Mingrui Hao. "Design of Cooperative Combat Task Architecture for Unknown Wide Area Cluster Reconnaissance and Strike." In Lecture Notes in Electrical Engineering, 2549–62. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8155-7_214.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

La Bella, Alessio. "Optimization-Based Control of Microgrids for Ancillary Services Provision and Islanded Operation." In Special Topics in Information Technology, 129–38. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-62476-7_12.

Full text
Abstract:
AbstractThe ongoing environmental crisis is pushing the electrical sector towards a radical transformation, as the wide diffusion of renewable sources requires the power system to be more distributed, cooperative, and flexible, being each portion of the grid now able to produce and absorb power. This poses much more coordination challenges with respect to the traditional centralized system, largely sustained by fully controllable fossil-based power plants. In this context, microgrids, i.e. intelligent small-scale grids equipped with distributed energy resources and smart loads, are considered as the fundamental bricks of this future paradigm. This is due to the opportunity of coordinating co-located sources and loads, and to the microgrids extreme flexibility, as they can be operated either connected to the main grid or in islanded mode. The contribution of this doctoral research consists in the design of dedicated control architectures for ensuring the efficient and secure operation of microgrids in these two modes, characterized by different challenges and opportunities.
APA, Harvard, Vancouver, ISO, and other styles
3

Nazir, Tawfeeq. "Special Library Consortia." In Advances in Library and Information Science, 78–111. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-9542-9.ch004.

Full text
Abstract:
Due to increase in costs, proliferation of electronic resources and dwindling library budgets, cooperative e-acquisition has become a compelling proposition in a library consortium environment. The user community also has been greatly influenced by newer technologies facilitating seamless access to information. Users demand to have a wide array of electronic information services. As such, the current library scenario has reached a critical mass both in terms of e-products as well as increased number of virtual users. Due to journal crisis, and cuts in library budgets, the special library professionals are forced to come together in forming a consortium for subscription of e-journals. This chapter provides an outlook of special library consortia in India and the rest of the world.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Wise Electric Cooperatives, inc"

1

Daly, John, R. M. Loughlin, Mario DeCorso, David Moen, and Lee Davis. "CAES: Reduced to Practice." In ASME Turbo Expo 2001: Power for Land, Sea, and Air. American Society of Mechanical Engineers, 2001. http://dx.doi.org/10.1115/2001-gt-0397.

Full text
Abstract:
With the deregulation of the power industry, the use of peaking power solutions such as Compressed Air Energy Storage (CAES) is receiving increasing attention. The CAES plant located in McIntosh, Alabama, owned and operated by Alabama Electric Cooperative, Inc. (AEC) is the subject of this paper. It is the only such plant in the USA and one of two in the world. In off-peak hours the plant pressurizes a cavern with compressed air. During peak hours the stored cavern air is then valved through the combustion turbines to produce any level of peaking power required between 10 and 110 megawatts. This prototype plant began operating in May 1991 and its reliability has been steadily improved. This paper describes the learning process and plant-wide equipment modifications that were made to bring the plant to its present state of reliable operation. Because the CAES operating conditions and operating modes differ from conventional gas turbines, anticipated and unanticipated problems arose. The plant is made up of “combustion turbine” type components, but because of the way the plant operates (- valving of air input - relatively high pressure and air flows at startup - abrupt air flow shutoff at shutdown), certain operating experiences are unique to a CAES plant and not seen on standard gas turbine plants. Among the areas discussed are: controls, stand-by combustor, low-pressure (LP) expander, cavern well liner, lube oil, exhaust flow damper, high-pressure (HP) combustors, LP combustors, fuel injectors, fuel handling, and hot gas path instrumentation. These topics are discussed in the problem, solution, recommendation format. The learning process described in the paper will serve as an invaluable guide to plant designers as future CAES plants are built.
APA, Harvard, Vancouver, ISO, and other styles
2

Ghosh, Subha, Debashis De, and Priti Deb. "E2Beam: Energy Efficient Beam Allocation in 5G HetNet using Cooperative Game." In 2020 IEEE International Women in Engineering (WIE) Conference on Electrical and Computer Engineering (WIECON-ECE). IEEE, 2020. http://dx.doi.org/10.1109/wiecon-ece52138.2020.9397978.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Wise Electric Cooperatives, inc"

1

Desai, Jairaj, Jijo K. Mathew, Howell Li, Rahul Sakhare, Deborah Horton, and Darcy M. Bullock. National Mobility Analysis for All Interstate Routes in the United States. Purdue University, 2023. http://dx.doi.org/10.5703/1288284317585.

Full text
Abstract:
In November 2022, Wejo Data Services Inc. provided Purdue with a national data set comprised of approximately 470 billion connected vehicle records covering all 50 states for the month of August 2022. The goal of the evaluation data set was to create a series of summary graphics to evaluate the scalability of work zone analytics graphics and electric/hybrid vehicle counts at a national level. This report illustrates several performance measures developed using this dataset for all interstate routes, both state wise and cross-country. State wise graphics are organized with 50 subdirectories containing graphics for each interstate in the 50 states. There are also a series of multi-state graphics for I-5, I-10, I-15, I-35, I-55, I-65, I-75, I-80, I-90, and I-95. Performance measures include absolute and normalized trip counts classified by type of trip (electric vehicle or hybrid vehicle or internal combustion engine vehicle), weekly heatmaps based on vehicle speed overlaid with hard-braking events and finally, speed profiles by interstate mile markers. Additional details on the directories and how to interpret these performance measures can found inside the document (after extracting the .zip file) titled “National_Mobility_Analysis_README.pdf”.
APA, Harvard, Vancouver, ISO, and other styles
2

Desai, Jairaj, Jijo K. Mathew, Howell Li, Rahul Suryakant Sakhare, Deborah Horton, and Darcy M. Bullock. National Mobility Report for All Interstates–December 2022. Purdue University, 2023. http://dx.doi.org/10.5703/1288284317591.

Full text
Abstract:
In January 2023, Wejo Data Services Inc. provided Purdue with a national data set comprised of approximately 503 billion connected vehicle records covering all 50 states for the month of December 2022. The goal of the evaluation data set was to create a series of summary graphics to evaluate the scalability of work zone/winter weather analytics graphics and electric/hybrid vehicle counts at a national level as well as visualize the mobility impacts of winter weather activity on the national interstate network. This report illustrates several performance measures developed using this dataset for all interstate routes, both state wise and cross-country. Statewide graphics are presented for each interstate in the 50 states. There are also a series of multi-state graphics for I-5, I-10, I-15, I-35, I-55, I-65, I-75, I-80, I-90, and I-95 and selected other routes that witnessed winter storm impacts. Performance measures include absolute and normalized trip counts classified by type of trip (electric vehicle or hybrid vehicle or internal combustion engine vehicle), weekly heatmaps based on vehicle speed (for the two-week period from December 12-25, 2022) and finally, speed profiles by interstate mile markers. Traffic tickers depicting miles of congestion as well as mile-hours of congestion for the national interstate network and selected multi-state routes are also included to provide a unified visual of nationwide mobility impact of recurring congestion as well as non-recurring congestion caused by winter weather. The generated performance measures can be found in the supplemental files.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography