Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Multi-layered coverages.

Статті в журналах з теми "Multi-layered coverages"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-23 статей у журналах для дослідження на тему "Multi-layered coverages".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Zheng, Jieyun, Hao Zheng, Rui Wang, Liubin Ben, Wei Lu, Liwei Chen, Liquan Chen, and Hong Li. "3D visualization of inhomogeneous multi-layered structure and Young's modulus of the solid electrolyte interphase (SEI) on silicon anodes for lithium ion batteries." Phys. Chem. Chem. Phys. 16, no. 26 (2014): 13229–38. http://dx.doi.org/10.1039/c4cp01968g.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Khedr, Ahmed M., Zaher Al Aghbari, and Banafsj E. Khalifa. "Fuzzy-Based Multi-Layered Clustering and ACO-Based Multiple Mobile Sinks Path Planning for Optimal Coverage in WSNs." IEEE Sensors Journal 22, no. 7 (April 1, 2022): 7277–87. http://dx.doi.org/10.1109/jsen.2022.3150065.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

He, Boyong, Jing Cao, Qingrui Zhou, and Jianguo Wang. "Multi-objective optimization of earth cooperative observation hybrid satellite constellation." Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 39, no. 1 (February 2021): 224–32. http://dx.doi.org/10.1051/jnwpu/20213910224.

Повний текст джерела
Анотація:
As the demand for comprehensiveness, accuracy, and data fast return of satellite remote sensing information grows, a hybrid constellation with permanent inter-satellite link becomes an inevitable choice for earth cooperative observation. The models for the objective function for global coverage, regional revisit detained survey duration, spatial resolution, inter-satellite links, and the cost of constellation deployment are established firstly, and the constraints like the ground trace repeating are dealt skillfully. The layered multi-objective optimization frame is designed for solving this problem. The example explains that present models distribute the multiple objective functions and constraints, and the result Pareto solution set can show several performance features of the hybrid satellite constellation, it may support the satellite constellation engineering argumentation and selection on merit.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Luk, Sabrina Ching Yuen. "Universal Health Insurance Reform in China." International Journal of Public and Private Perspectives on Healthcare, Culture, and the Environment 2, no. 2 (July 2018): 1–24. http://dx.doi.org/10.4018/ijppphce.2018070101.

Повний текст джерела
Анотація:
This article uses a refined version of historical institutionalism to critically examine the complex interplay of forces that shape the health insurance reform trajectory in China since the mid-1980s, problems that plague the current multi-layered social medical insurance system and solutions to these problems. It shows that achieving universal health coverage (UHC) requires the government to ensure financing equity between urban and rural insured participants, access to affordable health care and the financial sustainability of medical insurance funds. Facing the challenges of rapidly aging population, the government implements a pilot scheme that integrates medical and nursing care for the elderly and a pilot long-term care insurance scheme for disabled elderly. It is expected that these two pilot schemes can provide better financial protection and quality of medical services for the elderly.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Nagireddy, Seshadri Reddy, Karnati Kumar Sai Charan, Rishabh Bhooshan Mishra, and Aftab M. Hussain. "Modelling of Multilayer Perforated Electrodes for Dielectric Elastomer Actuator Applications." MRS Advances 5, no. 14-15 (2020): 765–71. http://dx.doi.org/10.1557/adv.2020.210.

Повний текст джерела
Анотація:
AbstractDielectric elastomer actuators (DEAs), which are inherently complaint capacitors, are emerging as pseudo-muscular actuators with a wide range of applications. In order to achieve high stretchability for large DEA actuation, carbon nanotube (CNT) and other 1D materials-based electrodes are used to maintain conductance at large strains. These electrodes are typically fabricated using spray coating or filter transfer method and resemble a perforated electrode under high magnification. Hence, there can be a loss of field and stray capacitance when multiple layers of carbon nanotubes (CNTs)-based electrodes are used. This study investigates the effect of microscopic perforations on the nature of electric fields and on the capacitance of multi-layered CNT-based DEA structures with various dimensions and geometric properties of the electrodes. It has been found that the capacitance decreases with increase in the perforations however its effect is limited for a reasonable coverage. The change in normalized is found to be negligible (∼5%) for an electrode coverage area of over 90%, however, the maximum output work reduces by 18.2%. This analysis is important to develop robust and reliable CNT-based DEA structures, without using excessive CNTs which can lead to increased mechanical stiffness of the electrodes.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Jiang, Yanqing, Ye Li, Yumin Su, Ziye Zhou, Teng Ma, Li An, and Jiayu He. "Route optimizing and following for autonomous underwater vehicle ladder surveys." International Journal of Advanced Robotic Systems 15, no. 6 (November 1, 2018): 172988141881327. http://dx.doi.org/10.1177/1729881418813271.

Повний текст джерела
Анотація:
An autonomous underwater vehicle is able to conduct coverage detections, such as sea terrain mapping and submerged objects detection, using sonar. This work addresses the task of both optimizing and following routes that present a ladder shape. First, a planning method to determine a nearly optimal coverage route is designed. The track spacing is optimized considering the seabed type and the sonar range for the purpose of increasing detection probability. It also adds adaptability to confined water, such as harbors, by decomposing the geometrically concave mission region during the processing of the environmental data. Next, a decoupled and two-layered structure is adopted to design the following controller. The route is followed in the form of sequenced-lines tracking. A proportion–integral–derivative algorithm with fuzzy parameters adjustment is employed to calculate a reference heading angle according to the transverse position deviation in designing the guidance controller. An adaptive nonlinear S-surface law is adopted to design the yaw control. The route following the method is demonstrated with sonar (including side scanning sonar and multi-beam echo sounder) imagery collected in terrain mapping and object detection through sea trials.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Bidkar, Vijay G., and Vaibhav Chavan. "An external auditory canal swelling: a pseudo meningocele." International Journal of Otorhinolaryngology and Head and Neck Surgery 6, no. 6 (May 22, 2020): 1209. http://dx.doi.org/10.18203/issn.2454-5929.ijohns20202229.

Повний текст джерела
Анотація:
<p class="abstract">The author presents a case of an external auditory canal swelling. A pseudo meningocele, delayed complication of mastoidectomy. Differential diagnosis of swelling in the ear canal includes various conditions. The study aims to discuss management and review the literature of this uncommon condition. A 34-year lady presented with right ear canal swelling, reduced hearing and occasional watery ear discharge. Patient had undergone ear surgery 14 years back. Radiological studies including computed tomography and magnetic resonance imaging were suggestive of defect in the tegmen and posterior canal wall and presence of swelling containing cerebrospinal fluid (CSF) in mastoid cavity. Post aural trans mastoid approach was planned and multi layered closure of the defect was done under adequate antibiotic coverage. Pseudo meningocele may manifest as delayed complication of mastoid surgery and risk of meningitis is higher as CSF containment to its space is failed. Trans mastoid resection of swelling and reconstruction of the skull base is preferred modality of treatment considering size of the defect.</p>
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Wang, Yujie, and Christian Frankenberg. "On the impact of canopy model complexity on simulated carbon, water, and solar-induced chlorophyll fluorescence fluxes." Biogeosciences 19, no. 1 (January 3, 2022): 29–45. http://dx.doi.org/10.5194/bg-19-29-2022.

Повний текст джерела
Анотація:
Abstract. Lack of direct carbon, water, and energy flux observations at global scales makes it difficult to calibrate land surface models (LSMs). The increasing number of remote-sensing-based products provide an alternative way to verify or constrain land models given their global coverage and satisfactory spatial and temporal resolutions. However, these products and LSMs often differ in their assumptions and model setups, for example, the canopy model complexity. The disagreements hamper the fusion of global-scale datasets with LSMs. To evaluate how much the canopy complexity affects predicted canopy fluxes, we simulated and compared the carbon, water, and solar-induced chlorophyll fluorescence (SIF) fluxes using five different canopy complexity setups from a one-layered canopy to a multi-layered canopy with leaf angular distributions. We modeled the canopy fluxes using the recently developed land model by the Climate Modeling Alliance, CliMA Land. Our model results suggested that (1) when using the same model inputs, model-predicted carbon, water, and SIF fluxes were all higher for simpler canopy setups; (2) when accounting for vertical photosynthetic capacity heterogeneity, differences between canopy complexity levels increased compared to the scenario of a uniform canopy; and (3) SIF fluxes modeled with different canopy complexity levels changed with sun-sensor geometry. Given the different modeled canopy fluxes with different canopy complexities, we recommend (1) not misusing parameters inverted with different canopy complexities or assumptions to avoid biases in model outputs and (2) using a complex canopy model with angular distribution and a hyperspectral radiation transfer scheme when linking land processes to remotely sensed spectra.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Cantarero Navarro, Rubén, Ana Rubio Ruiz, Javier Dorado Chaparro, Felix J. Villanueva Molina, Maria J. Santofimia Romero, David Villa Alises, and Juan C. Lopez Lopez. "A Proposal for Modeling Indoor–Outdoor Spaces through IndoorGML, Open Location Code and OpenStreetMap." ISPRS International Journal of Geo-Information 9, no. 3 (March 12, 2020): 169. http://dx.doi.org/10.3390/ijgi9030169.

Повний текст джерела
Анотація:
Traditionally, the standards of spatial modeling are oriented to represent the quantitative information of space. However, in recent years an increasingly common challenge is appearing: flexibly and appropriately integrating quantitative information that goes beyond the purely geometric. This problem has been aggravated due to the success of new paradigms such as the Internet of Things. This adds an additional challenge to the representation of this information due to the need to represent characteristic information of the space from different points of view in a model, such as WiFi coverage, dangerous surroundings, etc. While this problem has already been addressed in indoor spaces with the IndoorGML standard, it remains to be solved in outdoor and indoor–outdoor spaces. We propose to take the advantages proposed in IndoorGML, such as cellular space or multi-layered space model representation, to outdoor spaces in order to create indoor–outdoor models that enable the integration of heterogeneous information that represents different aspects of space. We also propose an approach that gives more flexibility in spatial representation through the integration of standards such as OpenLocationCode for the division of space. Further, we suggest a procedure to enrich the resulting model through the information available in OpenStreetMap.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Deng, Xianzheng, Xin Bian, and Mingqi Li. "LDM-Ex-FDM: A Novel Multi-Service Transmission Scheme for the ATSC 3.0 System." Applied Sciences 11, no. 7 (April 2, 2021): 3178. http://dx.doi.org/10.3390/app11073178.

Повний текст джерела
Анотація:
In order to improve system coverage performance, in this paper, a multi-service transmission scheme on the basis of the puncturing technique, namely layered division multiplexing extension frequency-division multiplexing (LDM-Ex-FDM), is proposed. The key idea of the proposed scheme is that the symbols punctured from the enhanced layer (EL) of fixed services will be independently transmitted on a certain number of subcarriers orthogonal to the LDM signal of the core layer (CL) and most of the EL. By doing so, the punctured symbols will be demodulated with a higher signal-to-noise ratio (SNR) on the receiver side and can be recovered well, thus improving the reception performance of the EL fixed services. Moreover, two puncturing strategies based on bit-interleaved coded modulation (BICM) symbols of the LDM-Ex-FDM scheme, namely equal interval symbol puncturing (EISP) and non-equal interval symbol puncturing (NEISP), are developed to improve the performance of the EL services. Simulation results are given to show that, when the puncturing rate in the LDM-Ex-FDM scheme is configured as 1/12, the performance of the fixed service can be improved by 1.8 dB, meanwhile the bit error rate (BER) performance of the mobile service is not affected. Thus, the overall system coverage performance can be improved. Furthermore, to reduce the computational complexity and the demodulation delay of fixed service carried in the EL, at the receiver, a direct interference cancellation (DIC) detector is proposed as well. Simulation results are given to show that, under high injection level and high modulation order, the proposed DIC scheme is able to achieve almost the same BER performance as that of the traditional successive interference cancellation (SIC) scheme while with lower computational complexity.
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Calnan, Martin, and Alon Rozen. "ING’s Agile Transformation—Teaching an Elephant to Race." Journal of Creating Value 5, no. 2 (November 2019): 190–209. http://dx.doi.org/10.1177/2394964319875601.

Повний текст джерела
Анотація:
The present article is a practitioner case study of an ongoing event for the period from 2010 to 2018. It examines a key period during which ING Bank has attempted to transform itself from a traditional bank to a ‘platform bank’ with the help of both benchmarked and ad hoc agile methods and mindset. The research is extensively based on a review of the agile methods and creating value literature, semi-structured interviews of the key ING Group and ING Netherlands stakeholders, a documentary review of existing literature on ING’s transformation, ING public information (annual reports, special reports, marketing materials) as well as ING internal documents (presentations, internal documents, training materials, etc.). To ensure multi-layered coverage of the full story, interviewees were chosen to capture the points of view of key participants in the transformation journey and who represent the full range of major internal stakeholders, namely representatives from IT, Business, HR and Corporate. The aim of this case study is to gain a more granular understanding of the key factors, people, processes and insights that helped drive ING’s profound transformation of its operations, management, strategy and vision and how this ongoing ‘agile transformation’ is value accretive (or not) for ING and its stakeholders. The article identifies the three stages of a successful agile transformation as well as the underlying paradox for an organization to remain agile over time and at scale.
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Yulianis, N., Sarastuti, Risfaheri, and B. Rachman. "The implementation and synergy of Indonesian national food reserves." IOP Conference Series: Earth and Environmental Science 892, no. 1 (November 1, 2021): 012054. http://dx.doi.org/10.1088/1755-1315/892/1/012054.

Повний текст джерела
Анотація:
Abstract In aggregate, Indonesia’s national food reserves (rice) in early 2021 are adequate, as indicated by the stock to use ratio (SUR) reaching 25.16% above the FAO recommendation of 17‒18%, with the end of 2020 rice stock reaching 7.9 million tons from 29.3 million tons rice consumption needs. As mandated by Food Law 18/2012, Indonesia has established a multi-layered mechanism of national food reserves, consist of a central government food reserve, regional government food reserves (provincial, district/city, and village level), and community food reserves. This paper aims to examine the various implementation of Indonesia’s national rice reserves along with synergy recommendations to strengthen government, regional governments, and community’s food reserves. The approach used is descriptive qualitative analysis, by exploring information and secondary data across institutions with national and regional coverage. The results of the study show: (1) the need for an increase in Central Government Rice Reserves (CGRR) in the range of 1.5‒2 million tons accompanied by strengthening the mechanism to absorb farmers production of unhulled rice/rice to stabilize rice prices especially at the peak harvest time; (2) strengthening the intensity of advocacy and coordination amongst key-stakeholders in provincial and district/city to optimize the implementation of government food reserves area; and (3) strengthening and developing village-based community food barns through cooperation with the Strategic Command for Rice Mill Development (Kostraling) and Village Owned Enterprise (BUM Desa and BUM Desma).
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Deng, Xianzheng, Xin Bian, and Mingqi Li. "Enhanced LDM for Next-Generation Digital Broadcasting Transmission." Sensors 21, no. 5 (March 2, 2021): 1716. http://dx.doi.org/10.3390/s21051716.

Повний текст джерела
Анотація:
In the traditional layered division multiplexing (LDM) system, by simply adjusting the injection level, the reception performance of the core layer (CL) mobile services will be decreased significantly, resulting in the deterioration of system coverage performance. Thus, it is necessary to improve the performance of the enhanced layer (EL) service reception without affecting the reception threshold of CL service. To achieve this, in this paper, an enhanced LDM (En-LDM) scheme that supports multi-service transmission is proposed for the next-generation broadcasting network. In this scheme, at the transmitter end, part of the low-density parity-check (LDPC) coded data stream of fixed service conveyed in the EL will be extracted out through puncturing, and then, it will be transmitted over the CL of the LDM signal along with the original CL data in a frequency domain multiplexing (FDM) manner. At the receiving end, the punctured data of the EL fixed service will be recovered with a higher signal-to-noise ratio (SNR). Compared to the traditional LDM scheme, the proposed En-LDM scheme can significantly improve the reception performance of fixed services without decreasing the SNR threshold of mobile services. Moreover, the En-LDM can achieve a higher channel capacity than that of the traditional LDM for both the fixed services and the overall services. The superiority of the proposed En-LDM scheme over the traditional LDM scheme is validated by the simulation under the additive white Gaussian noise (AWGN) and fading channels.
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Honcharenko, Nadiia. "The Deportation of 1944 in the Cultural Memory of Crimean Tatar People (the Case of Literary Works of Ervin Umerov and Shamil Aladin)." Culturology Ideas, no. 17 (1'2020) (2020): 139–48. http://dx.doi.org/10.37627/2311-9489-17-2020-1.139-148.

Повний текст джерела
Анотація:
The article deals with the coverage in works of literature of the forceful deportation of Crimean Tatar people in May, 1944. Here, literary works are seen as functioning elements of cultural memory of the people. The works in question are Ervin Umerov’s short stories Loneliness, The Black Trains, The Permit, and Shamil Aladin’s novels Invitation to Devil’s Banquet and I’m Your King and God, recently published in Ukrainian translations. The importance of Ukrainian publications of works of Crimean Tatar literature, telling i. a. about the deportation of 1944, is determined by the persistence of negative stereotypes and anti-Crimean Tatar bias cultivated for decades. In the XXI century, much has been accomplished by scholars and journalists in order to deconstruct historic myths, i. a. the Stalinist black legend about Crimean Tatars’ “treachery” during the 2nd World War. True facts about the deportation of 1944 were publicized as well. Back in Soviet times, when telling the truth about tragic past directly was impossible, Crimean Tatar writers saw their mission in preserving at least some of the people’s memories in their works of fiction. The emotional and aesthetic power of historic fiction is of key importance in bringing images of the past to contemporary readers. Memories of the deportation of May, 1944 were parts of their life experiences both for Umerov (1938–2007) and Aladin (1912–1996). In their works written mostly during Soviet period, they transformed into fictional accounts both their own experience and tragic memories of their compatriots, using multi-layered plots, subtext and Aesopian language so as to bypass Soviet censorship.
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Lips, Urmas, Villu Kikas, Taavi Liblik, and Inga Lips. "Multi-sensor in situ observations to resolve the sub-mesoscale features in the stratified Gulf of Finland, Baltic Sea." Ocean Science 12, no. 3 (May 27, 2016): 715–32. http://dx.doi.org/10.5194/os-12-715-2016.

Повний текст джерела
Анотація:
Abstract. High-resolution numerical modeling, remote sensing, and in situ data have revealed significant role of sub-mesoscale features in shaping the distribution pattern of tracers in the ocean's upper layer. However, in situ measurements are difficult to conduct with the required resolution and coverage in time and space to resolve the sub-mesoscale, especially in such relatively shallow basins as the Gulf of Finland, where the typical baroclinic Rossby radius is 2–5 km. To map the multi-scale spatiotemporal variability in the gulf, we initiated continuous measurements with autonomous devices, including a moored profiler and Ferrybox system, which were complemented by dedicated research-vessel-based surveys. The analysis of collected high-resolution data in the summers of 2009–2012 revealed pronounced variability at the sub-mesoscale in the presence of mesoscale upwelling/downwelling, fronts, and eddies. The horizontal wavenumber spectra of temperature variance in the surface layer had slopes close to −2 between the lateral scales from 10 to 0.5 km. Similar tendency towards the −2 slopes of horizontal wavenumber spectra of temperature variance was found in the seasonal thermocline between the lateral scales from 10 to 1 km. It suggests that the ageostrophic sub-mesoscale processes could contribute considerably to the energy cascade in such a stratified sea basin. We showed that the intrusions of water with different salinity, which indicate the occurrence of a layered flow structure, could appear in the process of upwelling/downwelling development and relaxation in response to variable wind forcing. We suggest that the sub-mesoscale processes play a major role in feeding surface blooms in the conditions of coupled coastal upwelling and downwelling events in the Gulf of Finland.
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Sutherland, Clint, Beverly S. Chittoo, and Chintanapalli Venkobachar. "Application of ANN Predictive Model for the Design of Batch Adsorbers - Equilibrium Simulation of Cr(VI) Adsorption onto Activated Carbon." Open Civil Engineering Journal 13, no. 1 (June 30, 2019): 69–81. http://dx.doi.org/10.2174/1874149501913010069.

Повний текст джерела
Анотація:
Background: Escalation of industrial processes continues to increase the concentrations of Cr(VI) in wastewater above permissible discharge limits. Persistent exposure to Cr(VI)may result in deleterious effects on human health, aquatic life, and the environment. Laboratory-scale adsorption studies have proven effective in achieving the low treatment levels demanded by statutory authorities. The eventual design of the pilot and full-scale systems hinges on the ability to predict adsorption behavior mathematically. Objective: The objective of this study is to elucidate the mechanism of Cr(VI) adsorption and to develop an Artificial Neural Network (ANN) model capable of accurately simulating complex multi-layered adsorption processes. Methods: Batch equilibrium experiments were conducted for the removal of Cr(VI) by activated carbon. Conventional two and three-parameter equilibrium models such as the Langmuir, Freundlich, Sips, original BET and modified BET were used to simulate the data and expound the mechanism of adsorption. An ANN model was constructed with the built-in effect of the residual Cr(VI) concentration for the prediction of the equilibrium sorption capacity. Results: The modified BET model was most successful at predicting the monolayer coverage. However, the model failed to capture the complex shape of the isotherm at higher initial concentrations. The highest correlation to the equilibrium data was revealed by the ANN model (R2 = 0.9984). Conclusion: A batch adsorber was successfully designed using mass balance, and incorporating the predictive ability of the ANN model. In spite of the ANN’s ability to simulate the adsorption process, it provides little insight into the mechanism of adsorption. However, its ability to accurately predict Cr(VI) removal enables the up-scaling of the adsorption processes to pilot and full-scale design.
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Tsiledakis, Georgios, Alain Delbart, Daniel Desforge, Ioanis Giomataris, Thomas Papaevangelou, Richard Hall-Wilton, Carina Höglund, et al. "Large High-Efficiency Thermal Neutron Detectors Based on the Micromegas Technology." Universe 4, no. 12 (November 28, 2018): 134. http://dx.doi.org/10.3390/universe4120134.

Повний текст джерела
Анотація:
Due to the so-called 3He shortage crisis, many detection techniques for thermal neutrons are currently based on alternative converters. There are several possible ways of increasing the detection efficiency for thermal neutrons using the solid neutron-to-charge converters 10B or 10B4C. Here, we present an investigation of the Micromegas technology. The micro-pattern gaseous detector Micromegas was developed in the past years at Saclay and is now used in a wide variety of neutron experiments due to its combination of high accuracy, high rate capability, excellent timing properties, and robustness. A large high-efficiency Micromegas-based neutron detector is proposed for thermal neutron detection, containing several layers of 10B4C coatings that are mounted inside the gas volume. The principle and the fabrication of a single detector unit prototype with overall dimension of ~15 × 15 cm2 and its possibility to modify the number of 10B4C neutron converter layers are described. We also report results from measurements that are verified by simulations, demonstrating that typically five 10B4C layers of 1–2 μm thickness would lead to a detection efficiency of 20% for thermal neutrons and a spatial resolution of sub-mm. The high potential of this novel technique is given by the design being easily adapted to large sizes by constructing a mosaic of several such detector units, resulting in a large area coverage and high detection efficiencies. An alternative way of achieving this is to use a multi-layered Micromegas that is equipped with two-side 10B4C-coated gas electron multiplier (GEM)-type meshes, resulting in a robust and large surface detector. Another innovative and very promising concept for cost-effective, high-efficiency, large-scale neutron detectors is by stacking 10B4C-coated microbulk Micromegas. A prototype was designed and built, and the tests so far look very encouraging.
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Inami, H., R. Bacon, J. Brinchmann, J. Richard, T. Contini, S. Conseil, S. Hamer, et al. "The MUSE Hubble Ultra Deep Field Survey." Astronomy & Astrophysics 608 (November 29, 2017): A2. http://dx.doi.org/10.1051/0004-6361/201731195.

Повний текст джерела
Анотація:
We have conducted a two-layered spectroscopic survey (1′ × 1′ ultra deep and 3′ × 3′ deep regions) in the Hubble Ultra Deep Field (HUDF) with the Multi Unit Spectroscopic Explorer (MUSE). The combination of a large field of view, high sensitivity, and wide wavelength coverage provides an order of magnitude improvement in spectroscopically confirmed redshifts in the HUDF; i.e., 1206 secure spectroscopic redshifts for Hubble Space Telescope (HST) continuum selected objects, which corresponds to 15% of the total (7904). The redshift distribution extends well beyond z> 3 and to HST/F775W magnitudes as faint as ≈ 30 mag (AB, 1σ). In addition, 132 secure redshifts were obtained for sources with no HST counterparts that were discovered in the MUSE data cubes by a blind search for emission-line features. In total, we present 1338 high quality redshifts, which is a factor of eight increase compared with the previously known spectroscopic redshifts in the same field. We assessed redshifts mainly with the spectral features [O ii] at z< 1.5 (473 objects) and Lyα at 2.9 <z< 6.7 (692 objects). With respect to F775W magnitude, a 50% completeness is reached at 26.5 mag for ultra deep and 25.5 mag for deep fields, and the completeness remains ≳ 20% up to 28–29 mag and ≈ 27 mag, respectively. We used the determined redshifts to test continuum color selection (dropout) diagrams of high-z galaxies. The selection condition for F336W dropouts successfully captures ≈ 80% of the targeted z ~ 2.7 galaxies. However, for higher redshift selections (F435W, F606W, and F775W dropouts), the success rates decrease to ≈ 20–40%. We empirically redefine the selection boundaries to make an attempt to improve them to ≈ 60%. The revised boundaries allow bluer colors that capture Lyα emitters with high Lyα equivalent widths falling in the broadbands used for the color-color selection. Along with this paper, we release the redshift and line flux catalog.
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Shao, Rui, Rentuo Tao, Youda Liu, Yuhao Yang, Dasheng Li, and Jianjun Chen. "UAV cooperative search in dynamic environment based on hybrid-layered APF." EURASIP Journal on Advances in Signal Processing 2021, no. 1 (October 23, 2021). http://dx.doi.org/10.1186/s13634-021-00807-6.

Повний текст джерела
Анотація:
AbstractUnmanned aerial vehicle (UAV) detection has the advantages of flexible deployment and no casualties. It has become a force that cannot be ignored in the battlefield. Scientific and efficient mission planning can help improving the survival rate and mission completion rate of the UAV search in dynamic environments. Towards the mission planning problem of UAV collaborative search for multi-types of time-sensitive moving targets, a search algorithm based on hybrid layered artificial potential fields algorithm (HL-APF) was proposed. This method consists of two parts, a distributed artificial field algorithm and a centralized layered algorithm. In the improved artificial potential field (IAPF), this paper utilized a new target attraction field function which was segmented by the search distance to quickly search for dynamic targets. Moreover, in order to solve the problem of repeated search by the UAV in a short time interval, a search repulsion field generated by the UAV search path was proposed. Besides, in order to solve the unknown target search and improve the area coverage, a centralized layered scheduling algorithm controlled by the cloud server (CS) was added. CS divides the mission area into several sub-areas, and allocates UAV according to the priority function based on the search map. The CS activation mechanism can make full use of prior information, and the UAV assignment cool-down mechanism can avoid the repeated assignment of the same UAV. The simulation results show that compared with the hybrid artificial potential field and ant colony optimization and IAPF, HL-APF can significantly improve the number of targets and mission area coverage. Moreover, comparative experiment results of CS mechanism proved the necessity of setting CS activation and cool-down for improving the search performance. Finally, it also verified the robustness of the method under the failure of some UAVs.
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Batista e Silva, Filipe, Sérgio Freire, Marcello Schiavina, Konštantín Rosina, Mario Alberto Marín-Herrera, Lukasz Ziemba, Massimo Craglia, Eric Koomen, and Carlo Lavalle. "Uncovering temporal changes in Europe’s population density patterns using a data fusion approach." Nature Communications 11, no. 1 (September 15, 2020). http://dx.doi.org/10.1038/s41467-020-18344-5.

Повний текст джерела
Анотація:
Abstract The knowledge of the spatial and temporal distribution of human population is vital for the study of cities, disaster risk management or planning of infrastructure. However, information on the distribution of population is often based on place-of-residence statistics from official sources, thus ignoring the changing population densities resulting from human mobility. Existing assessments of spatio-temporal population are limited in their detail and geographical coverage, and the promising mobile-phone records are hindered by issues concerning availability and consistency. Here, we present a multi-layered dasymetric approach that combines official statistics with geospatial data from emerging sources to produce and validate a European Union-wide dataset of population grids taking into account intraday and monthly population variations at 1 km2 resolution. The results reproduce and systematically quantify known insights concerning the spatio-temporal population density structure of large European cities, whose daytime population we estimate to be, on average, 1.9 times higher than night time in city centers.
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Ogola, Henry Joseph Oduor, Ramganesh Selvarajan, and Memory Tekere. "Local Geomorphological Gradients and Land Use Patterns Play Key Role on the Soil Bacterial Community Diversity and Dynamics in the Highly Endemic Indigenous Afrotemperate Coastal Scarp Forest Biome." Frontiers in Microbiology 12 (February 24, 2021). http://dx.doi.org/10.3389/fmicb.2021.592725.

Повний текст джерела
Анотація:
Southern Afrotemperate forests are small multi-layered and highly fragmented biodiversity rich biomes that support unique flora and fauna endemism. However, little is known about the microbial community and their contribution to these ecosystems. In this study, high throughput sequencing analysis was used to investigate the soil bacterial community structure and function, and understand the effect of local topography/geomorphological formations and land use patterns on a coastal scarp forest. Soil samples were collected from three forest topography sites: upper (steeper gradients, 30–55°; open canopy cover, &lt;30%), mid (less steep, 15–30°; continuous forest canopy, &gt;80%), and lower (flatter gradient, &lt;15°; open canopy cover, 20–65%), and from the adjacent sugarcane farms. Results indicated that forest soils were dominated by members of phyla Proteobacteria (mainly members of α-proteobacteria), Actinobacteria, Acidobacteria, Firmicutes, and Planctomycetes, while Actinobacteria and to a lesser extent β-proteobacteria and γ-proteobacteria dominated SC soils. The core bacterial community clustered by habitat (forest vs. sugarcane farm) and differed significantly between the forest topography sites. The Rhizobiales (genera Variibacter, Bradyrhizobium, and unclassified Rhizobiales) and Rhodospirallales (unclassified Rhodospirillum DA111) were more abundant in forest mid and lower topographies. Steeper forest topography (forest_upper) characterized by the highly leached sandy/stony acidic soils, low in organic nutrients (C and N) and plant densities correlated to significant reduction of bacterial diversity and richness, associating significantly with members of order Burkholderiales (Burkholderia-Paraburkholderia, Delftia, and Massilia) as the key indicator taxa. In contrast, changes in the total nitrogen (TN), soil organic matter (SOM), and high acidity (low pH) significantly influenced bacterial community structure in sugarcane farm soils, with genus Acidothermus (Frankiales) and uncultured Solirubrobacterales YNFP111 were the most abundant indicator taxa. Availability of soil nutrients (TN and SOM) was the strongest driver of metabolic functions related to C fixation and metabolism, N and S cycling; these processes being significantly abundant in forest than sugarcane farm soils. Overall, these results revealed that the local topographical/geomorphological gradients and sugarcane farming affect both soil characteristics and forest vegetation (canopy coverage), that indirectly drives the structure and composition of bacterial communities in scarp forest soils.
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Harley, Ross. "Light-Air-Portals: Visual Notes on Differential Mobility." M/C Journal 12, no. 1 (February 27, 2009). http://dx.doi.org/10.5204/mcj.132.

Повний текст джерела
Анотація:
0. IntroductionIf we follow the line of much literature surrounding airports and urban mobility, the emphasis often falls on the fact that these spaces are designed to handle the mega-scale and super-human pace of mass transit. Airports have rightly been associated with velocity, as zones of rapid movement managed by enormous processing systems that guide bodies and things in transit (Pascoe; Pearman; Koolhaas; Gordon; Fuller & Harley). Yet this emphasis tends to ignore the spectrum of tempos and flows that are at play in airport terminals — from stillness to the much exalted hyper-rapidity of mobilized publics in the go-go world of commercial aviation.In this photo essay I'd like to pull a different thread and ask whether it's possible to think of aeromobility in terms of “uneven, differential mobility” (Bissell 280). What would it mean to consider waiting and stillness as forms of bodily engagement operating over a number of different scales and temporalities of movement and anticipation, without privileging speed over stillness? Instead of thinking mobility and stillness as diametrically opposed, can we instead conceive of them as occupying a number of different spatio-temporal registers in a dynamic range of mobility? The following is a provisional "visual ethnography" constructed from photographs of air terminal light boxes I have taken over the last five years (in Amsterdam, London, Chicago, Frankfurt, and Miami). Arranged into a "taxonomy of differentiality", each of these images comes from a slightly different angle, mode or directionality. Each view of these still images displayed in billboard-scale light-emitting devices suggests that there are multiple dimensions of visuality and bodily experience at play in these image-objects. The airport is characterized by an abundance of what appears to be empty space. This may be due to the sheer scale of mass transport, but it also arises from a system of active and non-active zones located throughout contemporary terminals. This photo series emphasises the "emptiness" of these overlooked left-over spaces that result from demands of circulation and construction.1. We Move the WorldTo many travellers, airport gate lounges and their surrounding facilities are loaded with a variety of contradictory associations and affects. Their open warehouse banality and hard industrial sterility tune our bodies to the vast technical and commercial systems that are imbricated through almost every aspect of contemporary everyday life.Here at the departure gate the traveller's body comes to a moment's rest. They are granted a short respite from the anxious routines of check in, body scans, security, information processing, passport scanning, itineraries, boarding procedures and wayfaring the terminal. The landside processing system deposits them at this penultimate point before final propulsion into the invisible airways that pipe them into their destination. We hear the broadcasting of boarding times, check-in times, name's of people that break them away from stillness, forcing people to move, to re-arrange themselves, or to hurry up. Along the way the passenger encounters a variety of techno-spatial experiences that sit at odds with the overriding discourse of velocity, speed and efficiency that lie at the centre of our social understanding of air travel. The airline's phantasmagorical projections of itself as guarantor and enabler of mass mobilities coincides uncomfortably with the passenger's own wish-fulfilment of escape and freedom.In this we can agree with the designer Bruce Mau when he suggests that these projection systems, comprised of "openings of every sort — in schedules, in urban space, on clothes, in events, on objects, in sightlines — are all inscribed with the logic of the market” (Mau 7). The advertising slogans and images everywhere communicate the dual concept that the aviation industry can deliver the world to us on time while simultaneously porting us to any part of the world still willing to accept Diners, VISA or American Express. At each point along the way these openings exhort us to stop, to wait in line, to sit still or to be patient. The weird geographies depicted by the light boxes appear like interpenetrating holes in space and time. These travel portals are strangely still, and only activated by the impending promise of movement.Be still and relax. Your destination is on its way. 2. Attentive AttentionAlongside the panoramic widescreen windows that frame the choreography of the tarmac and flight paths outside, appear luminous advertising light boxes. Snapped tightly to grid and locked into strategic sightlines and thoroughfares, these wall pieces are filled with a rotating menu of contemporary airport haiku and ersatz Swiss graphic design.Mechanically conditioned air pumped out of massive tubes creates the atmosphere for a very particular amalgam of daylight, tungsten, and fluorescent light waves. Low-oxygen-emitting indoor plants are no match for the diesel-powered plant rooms that maintain the constant flow of air to every nook and cranny of this massive processing machine. As Rem Koolhaas puts it, "air conditioning has launched the endless building. If architecture separates buildings, air conditioning unites them" (Koolhaas). In Koolhaas's lingo, these are complex "junkspaces" unifying, colliding and coalescing a number of different circulatory systems, temporalities and mobilities.Gillian Fuller reminds us there is a lot of stopping and going and stopping in the global circulatory system typified by air-terminal-space.From the packing of clothes in fixed containers to strapping your belt – tight and low – stillness and all its requisite activities, technologies and behaviours are fundamental to the ‘flow’ architectures that organize the motion of the globalizing multitudes of today (Fuller, "Store" 63). It is precisely this functional stillness organised around the protocols of store and forward that typifies digital systems, the packet switching of network cultures and the junkspace of airports alike.In these zones of transparency where everything is on view, the illuminated windows so proudly brought to us by J C Decaux flash forward to some idealized moment in the future. In this anticipatory moment, the passenger's every fantasy of in-flight service is attended to. The ultimate in attentiveness (think dimmed lights, soft pillows and comfy blankets), this still image is captured from an improbable future suspended behind the plywood and steel seating available in the moment —more reminiscent of park benches in public parks than the silver-service imagined for the discerning traveller.3. We Know ChicagoSelf-motion is itself a demonstration against the earth-binding weight of gravity. If we climb or fly, our defiance is greater (Appleyard 180).The commercial universe of phones, cameras, computer network software, financial instruments, and an array of fancy new gadgets floating in the middle of semi-forgotten transit spaces constitutes a singular interconnected commercial organism. The immense singularity of these claims to knowledge and power loom solemnly before us asserting their rights in the Esperanto of "exclusive rollover minutes", "nationwide long distance", "no roaming charges" and insider local knowledge. The connective tissue that joins one part of the terminal to a commercial centre in downtown Chicago is peeled away, revealing techno-veins and tendrils reaching to the sky. It's a graphic view that offers none of the spectacular openness and flights of fancy associated with the transit lounges located on the departure piers and satellites. Along these circulatory ribbons we experience the still photography and the designer's arrangement of type to attract the eye and lure the body. The blobby diagonals of the telco's logo blend seamlessly with the skyscraper's ribbons of steel, structural exoskeleton and wireless telecommunication cloud.In this plastinated anatomy, the various layers of commercially available techno-space stretch out before the traveller. Here we have no access to the two-way vistas made possible by the gigantic transparent tube structures of the contemporary air terminal. Waiting within the less travelled zones of the circulatory system we find ourselves suspended within the animating system itself. In these arteries and capillaries the flow is spread out and comes close to a halt in the figure of the graphic logo. We know Chicago is connected to us.In the digital logic of packet switching and network effects, there is no reason to privilege the go over the stop, the moving over the waiting. These light box portals do not mirror our bodies, almost at a complete standstill now. Instead they echo the commercial product world that they seek to transfuse us into. What emerges is a new kind of relational aesthetics that speaks to the complex corporeal, temporal, and architectural dimensions of stillness and movement in transit zones: like "a game, whose forms, patterns and functions develop and evolve according to periods and social contexts” (Bourriaud 11). 4. Machine in the CaféIs there a possible line of investigation suggested by the fact that sound waves become visible on the fuselage of jet planes just before they break the sound barrier? Does this suggest that the various human senses are translatable one into the other at various intensities (McLuhan 180)?Here, the technological imaginary contrasts itself with the techno alfresco dining area enclosed safely behind plate glass. Inside the cafes and bars, the best businesses in the world roll out their biggest guns to demonstrate the power, speed and scale of their network coverage (Remmele). The glass windows and light boxes "have the power to arrest a crowd around a commodity, corralling them in chic bars overlooking the runway as they wait for their call, but also guiding them where to go next" (Fuller, "Welcome" 164). The big bulbous plane sits plump in its hangar — no sound barriers broken here. It reassures us that our vehicle is somewhere there in the network, resting at its STOP before its GO. Peeking through the glass wall and sharing a meal with us, this interpenetrative transparency simultaneously joins and separates two planar dimensions — machinic perfection on one hand, organic growth and death on the other (Rowe and Slutsky; Fuller, "Welcome").Bruce Mau is typical in suggesting that the commanding problem of the twentieth century was speed, represented by the infamous image of a US Navy Hornet fighter breaking the sound barrier in a puff of smoke and cloud. It has worked its way into every aspect of the design experience, manufacturing, computation and transport.But speed masks more than it reveals. The most pressing problem facing designers and citizens alike is growth — from the unsustainable logic of infinite growth in GDP to the relentless application of Moore's Law to the digital networks and devices that define contemporary society in the first world. The shift of emphasis from speed to growth as a time-based event with breaking points and moments of rupture has generated new possibilities. "Growth is nonlinear and unpredictable ... Few of us are ready to admit that growth is constantly shadowed by its constitutive opposite, that is equal partners with death” (Mau 497).If speed in part represents a flight from death (Virilio), growth invokes its biological necessity. In his classic study of the persistence of the pastoral imagination in technological America, The Machine in the Garden, Leo Marx charted the urge to idealize rural environments at the advent of an urban industrialised America. The very idea of "the flight from the city" can be understood as a response to the onslaught of technological society and it's deathly shadow. Against the murderous capacity of technological society stood the pastoral ideal, "incorporated in a powerful metaphor of contradiction — a way of ordering meaning and value that clarifies our situation today" (Marx 4). 5. Windows at 35,000 FeetIf waiting and stillness are active forms of bodily engagement, we need to consider the different layers of motion and anticipation embedded in the apprehension of these luminous black-box windows. In The Virtual Window, Anne Friedberg notes that the Old Norse derivation of the word window “emphasizes the etymological root of the eye, open to the wind. The window aperture provides ventilation for the eye” (103).The virtual windows we are considering here evoke notions of view and shelter, open air and sealed protection, both separation from and connection to the outside. These windows to nowhere allow two distinct visual/spatial dimensions to interface, immediately making the visual field more complex and fragmented. Always simultaneously operating on at least two distinct fields, windows-within-windows provide a specialized mode of spatial and temporal navigation. As Gyorgy Kepes suggested in the 1940s, the transparency of windows "implies more than an optical characteristic; it implies a broader spatial order. Transparency means a simultaneous perception of different spatial locations" (Kepes 77).The first windows in the world were openings in walls, without glass and designed to allow air and light to fill the architectural structure. Shutters were fitted to control air flow, moderate light and to enclose the space completely. It was not until the emergence of glass technologies (especially in Holland, home of plate glass for the display of commercial products) that shielding and protection also allowed for unhindered views (by way of transparent glass). This gives rise to the thesis that windows are part of a longstanding architectural/technological system that moderates the dual functions of transparency and separation. With windows, multi-dimensional planes and temporalities can exist in the same time and space — hence a singular point of experience is layered with many other dimensions. Transparency and luminosity "ceases to be that which is perfectly clear and becomes instead that which is clearly ambiguous" (Rowe and Slutsky 45). The light box air-portals necessitate a constant fluctuation and remediation that is at once multi-planar, transparent and "hard to read". They are informatic.From holes in the wall to power lunch at 35,000 feet, windows shape the manner in which light, information, sights, smells, temperature and so on are modulated in society. "By allowing the outside in and the inside out, [they] enable cosmos and construction to innocently, transparently, converge" (Fuller, "Welcome" 163). Laptop, phone, PDA and light box point to the differential mobilities within a matrix that traverses multiple modes of transparency and separation, rest and flight, stillness and speed.6. Can You Feel It?Increasingly the whole world has come to smell alike: gasoline, detergents, plumbing, and junk foods coalesce into the catholic smog of our age (Illich 47).In these forlorn corners of mobile consumption, the dynamic of circulation simultaneously slows and opens out. The surfaces of inscription implore us to see them at precisely the moment we feel unseen, unguided and off-camera. Can you see it, can you feel it, can you imagine the unimaginable, all available to us on demand? Expectation and anticipation give us something to look forward to, but we're not sure we want what's on offer.Air travel radicalizes the separation of the air traveller from ground at one instance and from the atmosphere at another. Air, light, temperature and smell are all screened out or technologically created by the terminal plant and infrastructure. The closer the traveller moves towards stillness, the greater the engagement with senses that may have been ignored by the primacy of the visual in so much of this circulatory space. Smell, hunger, tiredness, cold and hardness cannot be screened out.In this sense, the airplanes we board are terminal extensions, flying air-conditioned towers or groundscrapers jet-propelled into highways of the air. Floating above the horizon, immersed in a set of logistically ordained trajectories and pressurized bubbles, we look out the window and don't see much at all. Whatever we do see, it's probably on the screen in front of us which disconnects us from one space-time-velocity at the same time that it plugs us into another set of relations. As Koolhaas says, junkspace is "held together not by structure, but by skin, like a bubble" (Koolhaas). In these distended bubbles, the traveler momentarily occupies an uncommon transit space where stillness is privileged and velocity is minimized. The traveler's body itself is "engaged in and enacting a whole kaleidoscope of different everyday practices and forms" during the course of this less-harried navigation (Bissell 282).7. Elevator MusicsThe imaginary wheel of the kaleidoscope spins to reveal a waiting body-double occupying the projected territory of what appears to be a fashionable Miami. She's just beyond our reach, but beside her lies a portal to another dimension of the terminal's vascular system.Elevators and the networks of shafts and vents that house them, are to our buildings like veins and arteries to the body — conduits that permeate and structure the spaces of our lives while still remaining separate from the fixity of the happenings around them (Garfinkel 175). The terminal space contains a number of apparent cul-de-sacs and escape routes. Though there's no background music piped in here, another soundtrack can be heard. The Muzak corporation may douse the interior of the elevator with its own proprietary aural cologne, but at this juncture the soundscape is more "open". This functional shifting of sound from figure to ground encourages peripheral hearing, providing "an illusion of distended time", sonically separated from the continuous hum of "generators, ventilation systems and low-frequency electrical lighting" (Lanza 43).There is another dimension to this acoustic realm: “The mobile ecouteur contracts the flows of information that are supposed to keep bodies usefully and efficiently moving around ... and that turn them into functions of information flows — the speedy courier, the networking executive on a mobile phone, the scanning eyes of the consumer” (Munster 18).An elevator is a grave says an old inspector's maxim, and according to others, a mechanism to cross from one world to another. Even the quintessential near death experience with its movement down a long illuminated tunnel, Garfinkel reminds us, “is not unlike the sensation of movement we experience, or imagine, in a long swift elevator ride” (Garfinkel 191).8. States of SuspensionThe suspended figure on the screen occupies an impossible pose in an impossible space: half falling, half resting, an anti-angel for today's weary air traveller. But it's the same impossible space revealed by the airport and bundled up in the experience of flight. After all, the dimension this figures exists in — witness the amount of activity in his suspension — is almost like a black hole with the surrounding universe collapsing into it. The figure is crammed into the light box uncomfortably like passengers in the plane, and yet occupies a position that does not exist in the Cartesian universe.We return to the glossy language of advertising, its promise of the external world of places and products delivered to us by the image and the network of travel. (Remmele) Here we can go beyond Virilio's vanishing point, that radical reversibility where inside and outside coincide. Since everybody has already reached their destination, for Virilio it has become completely pointless to leave: "the inertia that undermines your corporeity also undermines the GLOBAL and the LOCAL; but also, just as much, the MOBILE and the IMMOBILE” (Virilio 123; emphasis in original).In this clinical corner of stainless steel, glass bricks and exit signs hangs an animated suspension that articulates the convergence of a multitude of differentials in one image. Fallen into the weirdest geometry in the world, it's as if the passenger exists in a non-place free of all traces. Flows and conglomerates follow one another, accumulating in the edges, awaiting their moment to be sent off on another trajectory, occupying so many spatio-temporal registers in a dynamic range of mobility.ReferencesAppleyard, Donald. "Motion, Sequence and the City." The Nature and Art of Motion. Ed. Gyorgy Kepes. New York: George Braziller, 1965. Adey, Peter. "If Mobility Is Everything Then It Is Nothing: Towards a Relational Politics of (Im)mobilities." Mobilities 1.1 (2006): 75–95. Bissell, David. “Animating Suspension: Waiting for Mobilities.” Mobilities 2.2 (2007): 277-298.Bourriaud, Nicolas. Relational Aesthetics. Trans. Simon Pleasance and Fronza Woods. Paris: Les Presses du Reel, 2002. Classen, Constance. “The Deodorized City: Battling Urban Stench in the Nineteenth Century.” Sense of the City: An Alternate Approach to Urbanism. Ed. Mirko Zardini. Baden: Lars Muller Publishers, 2005. 292-322. Friedberg, Anne. The Virtual Window: From Alberti to Microsoft. Cambridge: MIT P, 2006. Fuller, Gillian, and Ross Harley. Aviopolis: A Book about Airports. London: Black Dog Publishing, 2005. Fuller, Gillian. "Welcome to Windows: Motion Aesthetics at the Airport." Ed. Mark Salter. Politics at the Airport. Minnesota: U of Minnesota P, 2008. –––. "Store Forward: Architectures of a Future Tense". Ed. John Urry, Saolo Cwerner, Sven Kesselring. Air Time Spaces: Theory and Method in Aeromobilities Research. London: Routledge, 2008. 63-75.Garfinkel, Susan. “Elevator Stories: Vertical Imagination and the Spaces of Possibility.” Up Down Across: Elevators, Escalators, and Moving Sidewalks. Ed. Alisa Goetz. London: Merrell, 2003. 173-196. Gordon, Alastair. Naked Airport: A Cultural History of the World's Most Revolutionary Structure. New York: Metropolitan, 2004.Illich, Ivan. H2O and the Waters of Forgetfulness: Reflections on the Historicity of Stuff. Dallas: Dallas Institute of Humanities and Culture, 1985. Kepes, Gyorgy. Language of Vision. New York: Dover Publications, 1995 (1944). Koolhass, Rem. "Junkspace." Content. 6 Mar. 2009 ‹http://www.btgjapan.org/catalysts/rem.html›.Lanza, Joseph. "The Sound of Cottage Cheese (Why Background Music Is the Real World Beat!)." Performing Arts Journal 13.3 (Sep. 1991): 42-53. McLuhan, Marshall. “Is It Natural That One Medium Should Appropriate and Exploit Another.” McLuhan: Hot and Cool. Ed. Gerald Emanuel Stearn. Middlesex: Penguin, 1967. 172-182. Marx, Leo. The Machine in the Garden: Technology and the Pastoral Ideal in America. London: Oxford U P, 1964. Mau, Bruce. Life Style. Ed. Kyo Maclear with Bart Testa. London: Phaidon, 2000. Munster, Anna. Materializing New Media: Embodiment in Information Aesthetics. New England: Dartmouth, 2006. Pascoe, David. Airspaces. London: Reaktion, 2001. Pearman, Hugh. Airports: A Century of Architecture. New York: Abrams, 2004. Remmele, Mathias. “An Invitation to Fly: Poster Art in the Service of Civilian Air Travel.” Airworld: Design and Architecture for Air Travel. Ed. Alexander von Vegesack and Jochen Eisenbrand. Weil am Rhein: Vitra Design Museum, 2004. 230-262. Rowe, Colin, and Robert Slutsky. Transparency: Literal and Phenomenal. Perspecta 8 (1963): 45-54. Virilio, Paul. City of Panic. Trans. Julie Rose. Oxford: Berg, 2005.
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Moll, Ellen. "What’s in a Nym? Gender, Race, Pseudonymity, and the Imagining of the Online Persona." M/C Journal 17, no. 3 (June 11, 2014). http://dx.doi.org/10.5204/mcj.816.

Повний текст джерела
Анотація:
The Internet has long been a venue for individuals to craft their online personas on their own terms, and many have embraced the opportunity to take on a persona that is not associated with a legally recognised name. The rise of social networking has continued to spur proliferation of online personas, but often in ways that intensify corporate mediation of these personas. Debates about online pseudonymity exemplify these tensions, especially when social media corporations attempt to implement “real name policies” that require users to use one, legally recognised name in their online interactions. These debates, however, have broader stakes: they are negotiations over who has the right to control the individual presentation of self, and thus part of a larger conversation about information control and the future of Internet culture. While there was some coverage of these debates in traditional news media, blogs were a key site for examining how real name policies affect oppressed or marginalised groups. To explore these issues, this essay analyses the rhetoric of feminist and anti-racist blog posts that argue for protecting online pseudonymity practices. In general, these sites construct pseudonymity as a technology of resistance and as a vital tool in ensuring that the Internet remains (or becomes) a democratising force. The essay will first provide an overview of the issue and of blog posts about real name policies and gender and/or race, which were selected by the depth and interest of their commentary, and found by search engine or Twitter hashtag using search terms such as “pseudonymity” and “real name policy.” The essay will then explore how these blog posts theorise how real name policies contribute to the broader move toward a surveillance society. Through these arguments, these bloggers reveal that various online communities have vastly different ways of understanding what it means to construct an online persona, and that these varied understandings in turn shape how communities inscribe value (or danger) in pseudonymous Internet practices. Feminist and Anti-Racist Blogger Responses to Real Name Policies While online pseudonymity has long been hotly debated, the conversation intensified following moves by Google-plus to implement “real name policies” in July 2011. Officially these real name policies were intended to improve the experience of users by making it easy to be found online and ensuring that online conversations remained civil. Critics of real name policies often object to the term “real name” and its implication that a pseudonym is a “fake” name. Moreover, proponents of pseudonymity tend to distinguish between pseudonymity and anonymity; a pseudonym is a public persona with relationships, a reputation to uphold, and often years of use. A pseudonym is thus not a way of escaping the responsibilities of having one’s online actions associated with one’s public persona—it is quite the opposite. Nevertheless, defenders of pseudonymity generally argue that both pseudonymity and anonymity must be permitted. Supporters argue that real name policies will enhance the experience of users, and particularly that they will help stop the widespread incivility of many internet comments, on the presumption that using one’s real name will ensure accountability for one’s behavior online. On the other side, many bloggers have argued that the use of real names will not solve these problems and will instead be a threat to the safety and privacy of users, as well as stymieing debate about important or controversial issues. Moreover, many of these bloggers theorise about gender, politics, technology, and identity in ways that resonate well with broader feminist and critical race theory, as well as current conversations about technology and surveillance society. Feminist and other defenses of pseudonymity have used a variety of tactics. One has been to portray pseudonymity as a standard part of Internet culture, and legal names or “wallet names” as an arbitrary way of governing production of public personas. Underlying this framing of pseudonymity as a fundamental part of Internet culture is a long tradition of defining the Internet as a free, open, and democratic space. Internet enthusiasts have long described and prescribed an Internet in which anyone is free to explore and exchange ideas without the ordinary limits imposed by the flesh world, arguing that the Internet encourages more open debate, decentralises networks of knowledge, allows users to try on new identities, and challenges the rigidity of categories and hierarchies that shape knowledge and conversations in the non-virtual world (Rheingold, Plant). Traditionally, pseudonymity and anonymity have been key ways for users to pursue these ends. Thus, the ability to create one or more online personas has, in this conversation, a direct relationship to questions of democracy and about whose practices count as legitimate or valuable in the online world. Additionally, many feminist bloggers frame real name policies as an attempt at corporate control; these policies thus are symbolic to some bloggers of the shift from what they imagine was once a free and open Internet to a corporate-controlled, highly commercialised realm. s.e. smith, for example, writes that “This is what the nymwars are about; a collision between capitalism and the rest of us, where identities are bargaining chips and tools,” with “nym” being the term for the name and persona that one employs online (“The Google+ Nymwars”). Pseudonymity is thus understood by these bloggers as a necessary practice in a democratic Internet, in which one has the right to define one’s own persona online, rather than allowing one’s persona to be defined by a corporation. This framing of pseudonymity as a normalised and valuable part of Internet communication also seems to be an attempt to pre-empt the question of why someone needs a pseudonym if they are not doing anything wrong, but many of the arguments in favor of pseudonyms in fact address this question directly by producing long lists, such as those at geekfeminism and techdirt. In particular, feminist and anti-racist arguments for protecting pseudonymity emphasise that this practice is especially important for women and other marginalised groups, especially since using a real name may expose them to harassment, discrimination, or social consequences. Women who discuss feminism, for example, are sometimes subject to death and rape threats (Hess; Sarkeesian; s.e. smith “On Blogging, Threats, and Silence”). While many feminist bloggers choose to use their real names anyway, most still suggest that pseudonymity must remain a choice anywhere where one seeks to have conversations about issues of import. Moreover, these arguments are a reversal of the claim that real name requirements will stop harassment—while real name policies are purportedly instated to protect the safety of online conversations, many bloggers, pseudonymous and otherwise, suggest that real name policies make women and minorities of all kinds less safe, both online and off-line, and have other negative effects on these groups as well. For instance, Elusis writes that: For minorities, often their name and reputation doesn’t just affect them, it affects their family, and it affects other members of their minority group. Stories of not just outing but of harassment, abuse, and death threats that escalated to the point of being taken seriously by law enforcement (which takes rather a lot). […] Men who get in arguments with other people online don’t get threatened with rape on a regular basis. Unsurprisingly, trans people get abused in this way too. People of color get driven from online spaces** for daring to speak out. (Hyperlinks in original) Likewise, Sarah Stokely writes: As a woman who’s written about feminism online and received anonymous hatemail and death threats for doing so, I would like to preserve my right to post under a pseudonym to keep myself safe in the real world and if I choose, so I’m not identified as a woman online in places where it might not be safe to do so. […] I don’t believe that getting rid of anonymity online will stop bad behaviour like the abuse and death threats I’ve received. I do think that getting rid of anonymity and pseudonymity online will make it easier for people like myself to become targets of abuse and potentially put us in danger. Note that these comments suggest that simply being a woman or member of any kind of minority may make one a target of harassment. Also notice that these comments tend to frame real name policies as an expression of the privileged—real name policies only appear innocuous because of the assumption that the experiences of financially privileged English-speaking white men are universal, and that knowledge of the experiences of marginalised groups is not necessary to design safe and effective policies for consumers of technology. According to feminist blogger critiques of real name policies, it is this privilege that assumes that those using pseudonyms are the “Others” that decent people must be protected from, instead of examining the possibility that those using the pseudonyms might be the ones in danger. A quotation from Geek Feminism, a site whose lengthy discussions of pseudonymity are often cited by bloggers, further illustrates the centrality of privilege to this debate: the writer notes that a proponents of real name policies has dismissed critique by saying, “Don’t say anything in a comment thread that you wouldn’t say in person,” and Geek Feminism responds, “but that sounds like the voice of someone who’s never received abuse or harassment in person” (“Hacker News and Pseudonymity”). The many bloggers who critique the privilege they find responsible for real name policies suggest that beneath conflicts over pseudonymity and accountability online is not the question of how the online world relates to the flesh world, but instead a fundamental disagreement about the nature of accountability and free expression in the flesh world. In this light, attempts to make the online world mimic the accountabilities and social norms of the offline world operate under the assumption that oppression and abuse are not the norm in the flesh world, and that it is Internet technology and Internet culture that has made conversations uncivil or unsafe, and that these should be converted to be more like the flesh world. In this set of assumptions, the flesh world is characterised by respectful and safe interactions, categories of identity are natural as opposed to something that society imposes on individuals, and the existing ways of holding people accountable for their words and actions is very effective at protecting people. Clearly, however, it takes a degree of privilege to characterise the flesh world this way. Thus, the pseudonymity debate is largely about deeper-seated questions on the nature of identity and power in online and offline settings, while appearing to be about the differences between the real world and the online world. Other bloggers have also countered the assumption that real name policies make the Internet safer, often by pointing out that sites that have mandated the use of real names still see a great deal of harassment. s.e. smith, for instance, argues, “If Google really cares about safety, it needs strong, effective, and enforceable site policies. It needs to create a culture of safety, because, well, if your website’s full of assholes, it’s your fault. Real names policies don’t work. Good site policies and the cultivation of a culture of mutual respect do” (“The Google+ Nymwars,” hyperlinks in original). Pseudonyms allow users to participate in important debates online while maintaining a public persona that allows for continued conversations and interactions, which is vital for sustained activism. In this light, policies that take away users’ abilities to control or shape their online personas may force users to choose silence for their own safety. Individual control over online personas is thus both a safety issue and a free speech issue; in direct contradiction to claims that real name policies make users safer and more able to participate in civil discussions. Other pro-pseudonymity bloggers also celebrate the way that a “robust culture of pseudonymity” focuses discussion on ideas rather than the privilege of the speaker, “which, I often think, is why authoritarians and those with authoritarian tendencies hate it” (Paolucci). boyd notes that: the issue of reputation must be turned on its head when thinking about marginalised people. Folks point to the issue of people using pseudonyms to obscure their identity and, in theory, ‘protect’ their reputation. The assumption baked into this is that the observer is qualified to actually assess someone’s reputation. All too often, and especially with marginalised people, the observer takes someone out of context and judges them inappropriately. boyd is one of many bloggers who note that if one’s name is coded as white, Anglo, and male, using one’s real name may often enhance one’s credibility and authority, but if one’s name is coded otherwise, a pseudonym may be helpful; again, assuming that the white male experience is universal allows one to assume that using a real name is a harmless request. In general, these bloggers’ tactics all serve to denaturalise the assumption that a real name is the normal, desirable, and traditional mode of presenting one’s persona, and highlight the ways that real name policies claim to reflect universal concerns but primarily reflect wealthy white men’s experiences with online personas. Information, Power, and Control over Online Personas Additionally, defenders of pseudonymity associate real name policies with the move to a surveillance society, with particular emphasis on corporate surveillance of consumer behavior, also known as the “personal information economy.” Many feminist blogger discussions of pseudonymity note that while real name policies are purportedly intended for safety and protection, they actually allow corporations to amass huge swaths of data about individuals and to keep nearly all the online activities of one person attached to their name. For example blogger much_a_luck writes that: This is exactly the source of trying to pin down who users ‘really’ are. The advertising economy is super-creepy to me, everybody trying to make money by telling people about something someone else is doing, as efficiently as possible. Maybe I'm naive, but I feel like the internet's advertising-driven economy, with it’s [sic] ability to track and target activity, has just blown this whole sector completely out of control. (Paolucci) And indeed the practice of gathering and storing as much information as possible, simply on the chance that an institution might one day use this information, is becoming a more common fear, whether with regard to corporate data mining or recent news stories about privacy and government surveillance. In the larger conversation about surveillance, in fact, it is often the case that while one side argues that information gathering makes everyone safer, an opposition will claim that such measures actually make people vulnerable to abuses of this information. Blogger Space_dinosaur_blue has called real name policies a “security placebo” that claims to stop harassment while actually doing nothing but invading privacy (comment to Paolucci). s.e. smith has argued: What this is really about, of course, is capitalism. […] For the owners of […] sites like Google+ and Facebook, there’s also a big potential to make a profit through the direct commodification of user identities. […] The standards that Google+ sets revolve around the purchase, sale, and exchange of identity, a multibillion dollar industry worldwide. This is what people should be talking about. (“The Google+ Nymwars”) Clearly, the pseudonymity debate resonates in many ways with broader discussions of surveillance, corporate and otherwise. First, scholars have often noted that surveillances practices tend to be more harmful to those in marginalised or oppressed groups, and feminist arguments for pseudonymity reinforce this finding. Additionally, many defenders of pseudonymity point out the dissembling found in companies’ claims that real name policies are there to protect the safety of users and create a civil and decent space for people to interact while actually using the data for marketing research purposes. Framing pseudonymity as anti-social, uncivil, and dangerous, assumes a criminality so to speak, or at the very least, an illegitimacy, on the part of pseudonym users. The rhetorical move here is worth noting: implicitly suggesting that a real name is an inherent part of civility and safety is also suggesting that you have an ethical obligation to those who would compile information about you. In other words, the rules of civility demand that you participate in the corporatisation and commodification of your identity and personal information. Shaping an online persona—or multiple personas—is not an act of creativity or political resistance or freedom; it is assumed to be an act of aggression toward others. We see here a new form of the “good citizenship” argument that characterises the surveillance society. In debates about national security, for instance, acceptance of extensive surveillance of all citizens is framed as a contribution to national security. Here, however, it is not national security but corporate interests that have been inserted as the epitome of the “common good.” In this framework, an anti-corporate approach to personal information appears to be anti-social and even unethical. Commodification of identity is not only the norm but also an obligation of citizenship. Furthermore, as scholars of surveillance have noted (Gilliom and Monahan for instance), social networking creates an environment in which most individuals are participating in creating a surveillance society simply through the level of documentation they voluntarily provide. Again, more and more, willing participation in surveillance practices—making it easy to be surveilled—is becoming part of one’s civic duty. Thus, the debate over pseudonymity is also a debate about the extent to which corporations can expect compliance to the increasingly normalised demands of a surveillance society. And so, for all of these reasons, debates over pseudonymity reveal a host of complex and multi-layered tensions about technology’s influence on the construction of personas, and how these personas are shaped by encroaching forms of surveillance and the marketing of identities. Proponents of pseudonymity use numerous strategies to challenge, subvert, or reconceptualise privileged assumptions about the complex relationships among names, personas, and identities. In doing so, they contribute to an important shift, from the classic question of “What’s in a name?” to “Who wants to know, and why?” References boyd, danah. “‘Real Names’ Policies Are an Abuse of Power.” Zephoria 4 Aug. 2011. 18 Oct. 2013 ‹http://www.zephoria.org/thoughts/archives/2011/08/04/real-names.html›. Coffeeandink. “RaceFail: Once More, with Misdirection.” Coffeeandink 2 Mar. 2009. 18 Oct. 2013 ‹http://coffeeandink.livejournal.com/901816.html›. Elusis. “Don’t Try to Teach Your Internet Grandmother to Suck Eggs: On Anonymity/Pseudonymity.” Elusis 5 Mar. 2009. 18 Oct. 2013 ‹http://elusis.livejournal.com/1891498.html›. Geek Feminism. “Hacker News and Pseudonymity.” Geek Feminism Wiki n.d. 15 Jan. 2014 ‹http://geekfeminism.org/2010/06/10/hacker-news-and-pseudonymity/›. Gilliom, John, and Torin Monahan. SuperVision: An Introduction to the Surveillance Society. Chicago: University of Chicago Press, 2012. Hess, Amanda. “Why Women Aren’t Welcome on the Internet.” Pacific Standard 6 Jan. 2014. 15 Apr. 2014 ‹http://www.psmag.com/navigation/health-and-behavior/women-arent-welcome-internet-72170/›. Masnick, Mike. “What’s in a Name: The Importance of Pseudonymity and the Dangers of Requiring ‘Real Names.’” TechDirt 5 Aug. 2011. 29 Apr. 2014 ‹https://www.techdirt.com/articles/20110805/14103715409/whats-name-importance-pseudonymity-dangers-requiring-real-names.shtml›. Paolucci, Denise. “Real Name Policies: They Just Don’t Work.” Dreamwidth 3 Aug. 2011. 15 Oct. 2013 ‹http://denise.dreamwidth.org/60359.html›. Plant, Sadie. Zeros + Ones: Digital Women and the New Technoculture. New York: Doubleday, 1997. Rheingold, Howard. Smart Mobs: The Next Social Revolution. Cambridge, MA: Basic Books, 2002. Sarkeesian, Anita. “Harassment, Misogyny and Silencing on YouTube.” Feminist Frequency 7 June 2012. 17 Apr. 2014 ‹http://www.feministfrequency.com/2012/06/harassment-misogyny-and-silencing-on-youtube/›. smith, s.e. “The Google+ Nymwars: Where Identity and Capitalism Collide.” Tiger Beatdown 3 Aug. 2011. 18 Oct. 2013 ‹http://tigerbeatdown.com/2011/08/03/the-google-nymwars-where-identity-and-capitalism-collide/›. smith, s.e. “On Blogging, Threats, and Silence.” Tiger Beatdown 11 Oct. 2011. 17 Apr. 2014 ‹http://tigerbeatdown.com/2011/10/11/on-blogging-threats-and-silence/›. Stokely, Sarah. “Why Google Should Allow Anonymous/Pseudonymous Names on Google+.” Sarah Stokely: On Teaching and Participating in Online Media 8 July 2011. 15 Oct. 2013 ‹http://www.sarahstokely.com/blog/2011/07/why-google-should-allow-anonymouspseudonymous-names-on-google/›. “Who Is Harmed by a Real Names Policy?” Geek Feminism Wiki n.d. 15 Oct. 2013 ‹http://geekfeminism.wikia.com/wiki/Who_is_harmed_by_a_%22Real_Names%22_policy%3F›.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії