Статті в журналах з теми "Red Hand Commando"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Red Hand Commando.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Red Hand Commando".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Minnig, Michel. "The Lima hostage crisis Some comments on the ICRC's role as a “neutral intermediary”." International Review of the Red Cross 38, no. 323 (June 1998): 293–303. http://dx.doi.org/10.1017/s0020860400091038.

Повний текст джерела
Анотація:
On 17 December 1996, the delegate of the International Committee of the Red Cross was one of the 600 guests at a reception hosted by the Japanese ambassador in Lima. When the commando unit of the Túpac Amaru Revolutionary Movement (Movimiento Revolucionario Túpac Amaru — MRTA)carried out its spectacular hostage-taking operation and the ICRC delegate made himself known to the commando unit, wondering whether in so doing he was acting as an intermediary was hardly at the forefront of his mind: he was content to take action because the situation so demanded and because the physical integrity of hundreds of people was under threat. I was that delegate. In doing what I did at that moment, I was merely repeating the humanitarian act performed by hundreds of ICRC delegates throughout the world, that of Henry Dunant at Solferino and of many others elsewhere — that is, helping the victims of violence. This is what being a neutral intermediary is all about: placing oneself voluntarily in the midst of a confrontation and lending a helping hand. In that sense, the term “intermediary” is perfectly suited for defining the action of the ICRC per se and its humanitarian base. Within the organization, the term means something more specific, as distinguished from protection and assistance, and designates a function which involves serving as a messenger between conflicting parties, for humanitarian reasons and in the absence of any other intermediary. This is where a certain amount of confusion and a number of difficulties arise, some inherent in the very role of intermediary and others arising from the circumstances themselves.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Setiawan, Mitodius Nicho Swacaesar, Nurul Hidayati, and Rachmad Saptono. "Quality of Service Analysis in Hand Gesture Identification Application Based on Convex Hull Algorithm to Control a Learning Media." Jurnal Jartel Jurnal Jaringan Telekomunikasi 13, no. 2 (April 10, 2023): 103–10. http://dx.doi.org/10.33795/jartel.v13i2.459.

Повний текст джерела
Анотація:
The technique of human interaction with computers has developed very rapidly. Body movement is the easiest and most expressive way and hand movements are flexible. We can use gestures as a simple identification command. This research discusses the application of hand gesture reading as a remote control for learning media and analyzes its quality of service using Wireshark software. This system uses a Raspberry Pi as a computing center. Raspberry Pi reads hand gestures using the Convex Hull algorithm, which can read the number of fingers raised on the hand by taking the outermost point in the contour scan of the hand. Each gesture in the form of the number of fingers was allocated to the keyboard commands used to select answers on the learning media. On the learning media side, a quiz system was created that uses keyboard commands to select the answers. Then the Raspberry Pi is connected to the laptop using a third-party application called VNC. Based on QoS measurement results, the throughput result is 62 kbps, which is included in the very good category. Packet Loss of 0%, which is also included in the very good category. The delay of 52.2 ms, which is included in the very good category. Thus, the overall quality of the network can be categorized as very good.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Radziwiłłowicz, Dariusz. "Armia Czerwona w 1920 roku. Organizacja, stany osobowe, działalność propagandowa ze szczególnym uwzględnieniem frontu polskiego w świetle wybranych źródeł i polskich opracowań wywiadowczych." Przegląd Wschodnioeuropejski 12, no. 2 (December 31, 2021): 47–62. http://dx.doi.org/10.31648/pw.6861.

Повний текст джерела
Анотація:
The Polish-Soviet War, which took place between 1919 and 1920, remains one of the most dramatic, yet also one of the brightest pages in the history of the Polish military. Not only did the Polish army achieve a spectacular victory that ensured Poland’s sovereignty and unrestrained development, but also, according to many historians and politicians, saved Europe from the flood of communism. Apart from the famous Battle of Warsaw, the warfare that lasted from February 1919 to October 1920 included the Kiev Offensive, the Battle of Komarów and the Battle of the Niemen River. The war with the Bolshevists was not just a conflict over the borders, but also concerned the preservation of national sovereignty, threatened by the Bolshevists' attempts to spread the communist revolution throughout Europe. The intention of the Polish side, on the other hand, was to separate the nations occupying the regions to the west and south of Russia and to connect them with Poland through close federal ties. The fate of the war was finally decided in August 1920 at the gates of Warsaw. The Polish Army, following the operational plans of the High Command approved by Józef Piłsudski, the Commander-in-Chief of the Polish Army, pushed the Red Army east past the Neman River line with a surprising counter-attack. This battle saved Poland's independence and forced the Bolshevists to cancel their plans to spread the communist revolution to the countries of Central and Western Europe.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Van Kan, Peter L. E., and Martha L. McCurdy. "Contribution of Primate Magnocellular Red Nucleus to Timing of Hand Preshaping During Reaching to Grasp." Journal of Neurophysiology 87, no. 3 (March 1, 2002): 1473–87. http://dx.doi.org/10.1152/jn.00038.2001.

Повний текст джерела
Анотація:
Magnocellular red nucleus (RNm) is involved in controlling goal-directed limb movements such as reaching to grasp. We tested two hypotheses related to RNm's role in controlling reach-to-grasp movements. One hypothesis is that forelimb RNm neurons are grasp specific, and the other is that they specify the timing of metacarpi-phalangeal (MCP) extension to preshape the hand during the appropriate phase of the reach. We recorded single-unit discharge while monkeys performed two behavioral tasks that elicited similar reaches but differed in grasp. One task consisted of a reach with a precision grasp that elicited independent use of thumb and forefinger; the other included a whole-hand grasp that elicited concerted use of the four fingers. Most RNm neurons tested were engaged strongly during both the whole-hand and precision tasks, and the magnitude of discharge modulation did not differ between tasks. Thus most RNm neurons are not grasp specific but, instead, may contribute to behavioral features common to the two tasks. Two methods were used to investigate relations between single-unit discharge and kinematic data from the same individual trials of the whole-hand and precision tasks for a subset of forelimb RNm neurons. One method focused on correlations between parameters of RNm discharge and the duration, amplitude, and velocity of rotation of forelimb joints for each of the tasks. The second method compared between-task differences in times of peak neuronal discharge to between-task differences in times of rotations of forelimb joints. Parameters of reach-related RNm discharge were more frequently correlated with parameters of MCP extension than with parameters of rotation of wrist, elbow, and shoulder joints. Analyses of temporal relations between discharge and kinematic data during both the whole-hand and precision tasks indicate that discharge was time locked most frequently to MCP extension and, to a lesser extent, elbow extension during both tasks. We conclude that RNm may command muscle synergies that provide a basic preshape of the hand at the appropriate phase of limb transport. In addition, the timing of RNm's contribution to hand preshaping varies with the behavioral requirements of the task.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Putro, Nur Achmad Sulistyo, Andi Dharmawan, and Tri Kuntoro Priyambodo. "Quadrotor Control System with Hand Movement Sign as an Alternative Remote Control." IAES International Journal of Robotics and Automation (IJRA) 6, no. 2 (June 1, 2017): 131. http://dx.doi.org/10.11591/ijra.v6i2.pp131-140.

Повний текст джерела
Анотація:
Quadrotor is an unmanned aerial vehicle which is controlled by remote control. Unfortunately, not all of the remote control are easy to use, especially for people who have lacking abilities in piloting. This study aims to design a prototype system to control quadrotor using hand movements, as an alternative to the conventional remote control that more simple. This system is consists of 2 parts, quadrotor and handheld. Both systems can communicate wirelessly using radio frequency 2.4 GHz. The handheld system will read the orientation angle of the hand by IMU sensor and it will be converted into a command to determine the direction motion of the quadrotor. To get the orientation angle from the IMU sensor data, we used DCM sensor fusion method. Quadrotor needs a control system that can make its respond runs optimally. In this study, the method of the control system that used is PID controller. The PID gain obtained using Ziegler-Nichols oscillation method and then fixed again by fine-tuned method.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Petrović, Srećko. "Slavica Popović Filipović, The Great Women in the Great War." Nicholai Studies: International Journal for Research of Theological and Ecclesiastical Contribution of Nicholai Velimirovich I, no. 1 (January 5, 2021): 209–14. http://dx.doi.org/10.46825/nicholaistudies/ns.2021.1.1.209-214.

Повний текст джерела
Анотація:
This research project was an undertaking involving reviewing extensive archived materials, original documents, correspondence, hand-written texts, and photographs in various archives in different parts of the world, as well as in private family storage. The work in front of us is dedicated to some exceptional women who command exalted positions, women who sacrificed their personal lives by sharing wartime suffering with the Serbian people and armies during the traumatic war years: the typhoid epidemics, the exodus through the Albanian mountain ranges, the exile on the island of Corfu, Corsica, North Africa, on the Russian Front, and in Dobruja. Thus, this book is a remarkable evidence of the dedicated affection and strenuous work of over 2000 women doctors, medical sisters, and nurses who served in the hospitals of the Serbian Red Cross Society, the Scottish Women’s Hospitals, the hospitals of the Serbian Relief Fund (SRF) and other voluntary and humanitarian organizations, in Serbia itself, and in the exile — both during the Great War and afterwards.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Rajesh, Neve Sujal, Khairnar Megha Himmat, Gamane Amrisha Gokul, and Prof Sangale Sunil Hiraman. "Blind People Helping Hand." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (April 30, 2023): 3536–51. http://dx.doi.org/10.22214/ijraset.2023.51014.

Повний текст джерела
Анотація:
Abstract: Blind people are facing many problems in their day-to-day life. They find it very difficult to read books as well as to recognize the object in front of them. From the survey of WHO,30 million peoples are permanently blind and 285 billion peoples with vision impairment. if you notice them, you can very well know about it they can’t walk without the help of other. one has to ask guidance to reach their destination. they have to face more struggles in their life daily life. Visually impaired people find difficulties detecting obstacles in front of them, during walking in the street, which makes it dangerous. A lots of blind people suffer in their own lives because of their vision loss. Vision is one of the five important senses in the human body. People with Vision loss have their own disability. Many countries around the world provide special assistance to these needed people to improve their life quality as good as possible. They provide them with special equipment for their disability to improve their daily life like voice message service, electronic stick that guide them while moving around and other specialized equipment. Blind people can't even walk without any aid. Many times they rely on others for help. Several technologies for the assistance of visually impaired people have been developed. This paper proposes a system for blind people. The proposed system aims to create a wearable visual aid for visually impaired people in which speech commands are accepted by the user. Its functionality addresses the identification of objects .This will help the visually impaired person to manage day-to-day activities through his/her surroundings. To help the blind people the visual world has to be transformed into the audio world with the potential to inform them about objects. Therefore, we propose to aid the visually impaired by introducing a system that is most feasible, compact, and cost effective. So, we implied a system that makes use of Raspberry Pi. Raspberry Pi is used to implement artificial vision using python language on the Open CV platform. The system consists of a webcam interfaced with raspberry pi. Pi Camera detects and find the type of object with the help of ultrasonic sensor. Ultrasonic sensor to detect the real time hurdles while walking on the roads. The ultrasonic sensor used in this project plays a vital role. It detects the object in front of this. When object is detected a indication sound is given to the user via earphone. While they hear this sound they can know an obstacle in front of them. The system is intended to provide Raspberry Pi. The proposed system detects an object around them and sends feedback in the form of speech, warning messages via earphone. This new system may solve some of major problems of blind persons that are still existing. The aim of all these systems is to help the user to detect object without the help of a second person. This system is to provide a low cost and efficient obstacle detection aid for blind which gives a sense of artificial vision by providing information about the environmental scenario of static and dynamic object around them, so that they can walk independently. This paper combines the functionality of Object detection. The objective is to develop user friendly application
Стилі APA, Harvard, Vancouver, ISO та ін.
8

S, Brindha. "IOT Based Paraplegia Patient Communication Device Using Smart Glove." Bioscience Biotechnology Research Communications 16, no. 1 (March 25, 2023): 64–67. http://dx.doi.org/10.21786/bbrc/16.1.11.

Повний текст джерела
Анотація:
Paraplegia is a paralysis that affects the legs and often seriously affects the lower half of a human body. Paraplegia happens whilst there may be damage underneath the neck. The maximum common motive is trauma, such as sports injury or vehicle accident. other causes are stroke, spine tumors, together with cancers. This paper provides a novel design to enhance the conversation of paralysis sufferers. The device is a clever glove that is used to seize hand gestures and convert them into verbal commands. The glove is geared up with sensors and processors that discover the hand gestures and convert them into indicators. The tool is designed to be simple and user-friendly, allowing patients to quickly adapt to its use. The tool is likewise designed to be low-cost and handy, permitting more paralysis patients to use it. The device is tested and evaluated for its performance, and the outcomes display that it may accurately capture and interpret the hand gestures of the sufferers. In most cases paralyzed affected person (like Monoplegia, Hemiplegia, Paraplegia) aren’t capable of interact or communicate with others or their caretaker. This net of factors primarily based clever glove facilitates the affected person to convey their needs to the caretakers. It measures pulse, temperature, blood pressure and gyro. In gyroscope sensor there is a message, based at the route or motion in which it can be conveyed thru show and audio. it is able to screen thru internet and smart telephones. but it can not be used for tetraplegia patient. It is concluded that in quadriplegia as patients can not move their body, if in future we can able to read the neuron signals of the patients through sensor or any device and then we can able to understand what they need or what they want. Consequently the system can be able to display or hear through audio which can be used according to the need, updating into neuro reading sensors which are economically viable.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Zakia, Umme, and Carlo Menon. "Estimating Exerted Hand Force via Force Myography to Interact with a Biaxial Stage in Real-Time by Learning Human Intentions: A Preliminary Investigation." Sensors 20, no. 7 (April 8, 2020): 2104. http://dx.doi.org/10.3390/s20072104.

Повний текст джерела
Анотація:
Force myography (FMG) signals can read volumetric changes of muscle movements, while a human participant interacts with the environment. For collaborative activities, FMG signals could potentially provide a viable solution to controlling manipulators. In this paper, a novel method to interact with a two-degree-of-freedom (DoF) system consisting of two perpendicular linear stages using FMG is investigated. The method consists in estimating exerted hand forces in dynamic arm motions of a participant using FMG signals to provide velocity commands to the biaxial stage during interactions. Five different arm motion patterns with increasing complexities, i.e., “x-direction”, “y-direction”, “diagonal”, “square”, and “diamond”, were considered as human intentions to manipulate the stage within its planar workspace. FMG-based force estimation was implemented and evaluated with a support vector regressor (SVR) and a kernel ridge regressor (KRR). Real-time assessments, where 10 healthy participants were asked to interact with the biaxial stage by exerted hand forces in the five intended arm motions mentioned above, were conducted. Both the SVR and the KRR obtained higher estimation accuracies of 90–94% during interactions with simple arm motions (x-direction and y-direction), while for complex arm motions (diagonal, square, and diamond) the notable accuracies of 82–89% supported the viability of the FMG-based interactive control.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Blanchard, Walter. "Interference to GPS." Journal of Navigation 51, no. 1 (January 1998): 132–40. http://dx.doi.org/10.1017/s0373463397217558.

Повний текст джерела
Анотація:
I read Captain Gyldeń's account of failure of his GPS set (Vol. 50, 328, May 1997) with some interest. A few days earlier we had had a few thunderstorms while I had my personal hand-held GPS running, using its own built-in antenna and a 12 volt battery. It was lying on a bench inside a wooden hut where I keep some of my amateur radio equipment. After one particularly close flash and bang, which produced a one-inch spark from my transceiver antenna, the transceiver locked up and stopped responding to keyboard commands. Then I noticed the GPS set had also stopped working, showing only random symbols on its readout. I feared the worst but, after switching them both off, leaving them for a few minutes, and then back on again, they worked perfectly.Microprocessors locking up in strong local electrostatic fields, perhaps? Maybe if I had simply left them alone they would have started working again after the charge had leaked away. Next time I nearly get hit by lightning I'll try it.
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Troshina, Tatyana I. "February 1920 in the Arkhangelsk Gubernia: Chain Reaction of the “Bloodless Revolution” in Arkhangelsk." Herald of an archivist, no. 1 (2021): 259–74. http://dx.doi.org/10.28995/2073-0101-2021-1-259-274.

Повний текст джерела
Анотація:
The article analyses the situation in Arkhangelsk when the Armed Forces of the Northern Region were preparing to leave the region, after the majority of the population of the gubernia (via delegates of the Zemstvo-city assembly) had expressed their desire to make peace with Soviet Russia. All garrisons and front-line units received an order to leave warehouses with weapons and food in the hands of local authorities and those of military servicemen who wished to stay; those who wished to leave were to move in an orderly manner towards railway for evacuation. The original plan was violated, since most military units reacted negatively to the order to retreat. Uprising began in order to prevent the departure of the main forces. In these circumstances, the command announced dissolution of the disciplined units, offering them to leave voluntarily for the West (to Murmansk, and from there to Norway). Thus, the servicemen were disorganized and fell prey to the “military revolutionary committees” that were springing up on the ground. The goals of these organizations were to “restore the Soviet power” and to disarm those few volunteer units that did not want to capitulate before the arrival of the Red Army. Military revolutionary committees co-opted most authoritative local figures into their memberships and transformed into “revolutionary committees,” which were to maintain order and to prepare grand welcome for the Red units. Before decisions were made at the command level, fraternization began at the front and later delegations exchange between military units on opposite sides of the front. Scanty and scattered sources, on the basis of which the described events have been reconstructed, show that the role of garrisons in the "change of power" was less significant in the uezd centers located far from the front line. The local community sought to create loyal new government as it had happened several times in 1917 and in 1918: by peacefully transferring their power to the “Soviets of deputies” in a manner similar to the transfer of power to the “Zemstvo bodies” in August 1918. The material of the article and its main conclusions provide an opportunity to take a fresh look at the seemingly well-known events of the Civil War, namely, “the liberation of the Soviet North from the White Guards.”
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Setiawan, Joga Dharma, Mochammad Ariyanto, M. Munadi, Muhammad Mutoha, Adam Glowacz, and Wahyu Caesarendra. "Grasp Posture Control of Wearable Extra Robotic Fingers with Flex Sensors Based on Neural Network." Electronics 9, no. 6 (May 29, 2020): 905. http://dx.doi.org/10.3390/electronics9060905.

Повний текст джерела
Анотація:
This study proposes a data-driven control method of extra robotic fingers to assist a user in bimanual object manipulation that requires two hands. The robotic system comprises two main parts, i.e., robotic thumb (RT) and robotic fingers (RF). The RT is attached next to the user’s thumb, while the RF is located next to the user’s little finger. The grasp postures of the RT and RF are driven by bending angle inputs of flex sensors, attached to the thumb and other fingers of the user. A modified glove sensor is developed by attaching three flex sensors to the thumb, index, and middle fingers of a wearer. Various hand gestures are then mapped using a neural network. The input data of the robotic system are the bending angles of thumb and index, read by flex sensors, and the outputs are commanded servo angles for the RF and RT. The third flex sensor is attached to the middle finger to hold the extra robotic finger’s posture. Two force-sensitive resistors (FSRs) are attached to the RF and RT for the haptic feedback when the robot is worn to take and grasp a fragile object, such as an egg. The trained neural network is embedded into the wearable extra robotic fingers to control the robotic motion and assist the human fingers in bimanual object manipulation tasks. The developed extra fingers are tested for their capacity to assist the human fingers and perform 10 different bimanual tasks, such as holding a large object, lifting and operate an eight-inch tablet, and lifting a bottle, and opening a bottle cap at the same time.
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Jati, Agung Nugroho, Randy Erfa Saputra, M. Ghozy Nurcahyadi, and Nasy'an Taufiq Al Ghifary. "A Multi-robot System Coordination Design and Analysis on Wall Follower Robot Group." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (December 1, 2018): 5098. http://dx.doi.org/10.11591/ijece.v8i6.pp5098-5106.

Повний текст джерела
Анотація:
In this research, multi-robot formation can be established according to the environment or workspace. Group of robots will move sequently if there is no space for robots to stand side by side. Leader robot will be on the front of all robots and follow the right wall. On the other hand, robots will move side by side if there is a large space between them. Leader robot will be tracked the wall on its right side and follow on it while every follower moves side by side. The leader robot have to broadcast the information to all robots in the group in radius 9 meters. Nevertheless, every robot should be received information from leader robot to define their movements in the area. The error provided by fuzzy output process which is caused by read data from ultrasound sensor will drive to more time process. More sampling can reduce the error but it will drive more execution time. Furthermore, coordination time will need longer time and delay. Formation will not be establisehed if packet error happened in the communication process because robot will execute wrong command.
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Chun, Seok-Ju, Yunju Jo, and Seungmee Lee. "The Effect of Programming Classes with Tangible Scratch Blocks on the Programming Interest of 6th Grade Elementary School Students." International Journal of Information and Education Technology 11, no. 9 (2021): 405–9. http://dx.doi.org/10.18178/ijiet.2021.11.9.1542.

Повний текст джерела
Анотація:
In this paper, we introduce an original, classroom-based approach for teaching Scratch programming to 6th grade elementary school students. Scratch is a programming language that involves assembling icon-based command blocks. It was designed to avoid the complex syntax errors seen in other programming languages, making it especially accessible for younger learners. While Scratch does provide a visual programming environment in which potentially just about anyone can learn to read and write programming code, there can still be a reduced overall interest in learning programming, because younger learners in particular can find it difficult to intuitively understand or be stimulated by abstract concepts of programming such as sequences, conditions, and repetition, which are present in Scratch. Our research involves the development of a tangible, electronic block system that allows students to manipulate physical objects with their hands to perform programming tasks. The system consists of a Scratch simulator and physical, Scratch electronic blocks embodying Scratch user interface shapes. We devised and delivered a programming course to 6th grade Korean elementary school students using our block system. The results are encouraging.
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Nisa, Akhtar Un, Saifullah Samo, Raheel Ahmed Nizamani, Areesha Irfan, Zuha Anjum, and Laveet Kumar. "Design and Implementation of Force Sensation and Feedback Systems for Telepresence Robotic Arm." Journal of Robotics and Control (JRC) 3, no. 5 (September 1, 2022): 710–15. http://dx.doi.org/10.18196/jrc.v3i5.15959.

Повний текст джерела
Анотація:
Humans put their own lives aside to save other human’s life and perform risky and dangerous activities. The risk can be reduced by using new technologies. This research study focuses on telepresence and teleoperation systems with motion and force control systems that replace humans in hazardous workspaces. In telepresence, the system helps humans to visualize the environment in real-time. In teleoperation, the system provides sensation to assist human beings in performing out-of-reach and dangerous operations safely as in real, providing a shadow hand to the operator. In this study, a system is developed that consists of a slave robotic arm and a master wearable device with bidirectional communication between the robotic arm and operator (master wearable device). It also presents a gesture-controlled robotic arm that uses sensors to read and translate human arm movements as commands. The slave robotic arm, senses applied force on an object and a master wearable device develops the force according to sensed force, in a result operator senses/feels the same object in the control room at distance. The slave robotic arm also mimics the operator arm to reach the proper position of an object. Several experiments were conducted with untrained personnel and satisfactory results were yielded, which showed that the motion and force replication is 90-95% accurate.
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Kaasik, Peeter. "Hävituspataljonidest Eestis 1941. aasta sõjasuvel [Abstract: The Destruction Battalions in Estonia in the Summer War of 1941]." Ajalooline Ajakiri. The Estonian Historical Journal 167, no. 1 (December 31, 2019): 3–36. http://dx.doi.org/10.12697/aa.2019.1.01.

Повний текст джерела
Анотація:
Abstract: The Destruction Battalions in Estonia in the Summer War of 1941 A state of war was declared in the western regions of the Soviet Union on 22 June 1941. This did not in any case mean only purely military operations. The safeguarding of security in the rear was considered extremely important. On 25 June 1941, the Union-wide Communist Party (CPSU) Central Committee Politburo adopted the decision ‘On the tasks in the rear of front-line forces’, which placed all agencies and units of the People’s Commissariat for Internal Affairs and State Security (NKVD and NKGB) under the command of the commanders of rear defence of the front lines. The following was prescribed as the more general tasks of rear defence: maintenance of law and order in the rear and on roads; the capture of deserters and ‘disorganisers of the rear’; protection of communications; the organisation of evacuations and the transportation of supplies; the destruction of saboteurs. Since rebellion against Soviet rule also began in parallel with combat action in many regions (primarily in regions that the Soviet Union occupied and annexed in 1939/1940), then combat against the so-called internal enemy became the primary task of rear defence units in the vicinity of the front in many areas. Thirdly, rear defence units were assigned the task of destroying all property of any value that could not be removed from the region of the front in the event of possible retreat. At the same time, all communications of military importance were to be destroyed in the course of retreat. NKVD internal forces and border guard forces on the one hand, and irregular people’s defence units (destruction battalions, workers’ regiments, people’s defence divisions, etc.) formed locally in the summer of 1941 on the other hand were to bear the brunt of this action. The various irregular people’s defence units were on the one hand supposed to be manifestations of ‘nationwide struggle’ deriving from ideology; on the other hand, the need for an improvised territorial defence force was due to pragmatic needs that made it possible to skip many of the formalities associated with mobilisation, transport, formation and supply. At the same time, the possibilities for utilising these units were also considerably more flexible. The formation and utilisation of the ‘people’s defence force’ varied from region to region. The destruction battalions that were formed in the Estonian SSR are considered illustratively in this article. As elsewhere in areas in the vicinity of the front, the formation of destruction battalions began in the Estonian SSR at the end of June, 1941. The ‘Estonian SSR operative group of destruction battalions’ was established for their formation and command at the NKVD Baltic Border Guard District headquarters. At the start of July, this operative group was placed under the command of the assistant responsible for rear area defence of the commander of the 8th Army, which had retreated into Estonia. The destruction battalions did not have any definite composition of personnel. Although the self-evidence of patriotism was stressed, in reality the battalions were manned in Estonia by way of ‘Party mobilisation’. If a person was a member or candidate member of the CPSU or the communist youth organisation and did not have any other administrative duties, joining the destruction battalions was in essence mandatory. Generally speaking, this obligation also applied to the employees of other Soviet institutions as well. The operations of destruction battalions in Estonia can conditionally be divided into three periods: 1) combat against the armed resistance movement before the arrival of German forces; 2) the direct employment of destruction battalions in military assignments alongside securing the rear area; 3) the deployment of destruction battalions and regiments formed out of them at the front in combat against regular Wehrmacht units. This periodisation is nevertheless conditional. It is rather difficult to present temporal frames of reference more precisely because the actions and composition of different units varied depending on the situation at the front and they also do not match temporally. While battalions were initially formed in the counties and in the cities of Tallinn and Narva, later on units were disbanded and combined, and new additional units were also formed. In total, over 20 such units operated in Estonia (in addition to several more Latvian destruction units that had retreated into Estonia) in the summer war of 1941. Over 6,000 fighters were entered in the lists of the Estonian SSR militia companies, destruction battalions and workers’ regiments. These in turn were divided up according to specific assignments: some went on raids and later fought at the front line as part of the Red Army; others were part of the armed units guarding certain industrial enterprises or Soviet institutions, or provided security for communications of military importance (railroads, bridges, communications lines, and other such sites). Third, there was a large group that was formally connected to destruction battalions because they were tied mainly to other military-administrative duties (the organisation of evacuation, fortification works, mobilisation of horses and motor vehicles, future partisan warfare, and other such duties). As the name ‘destruction battalion’ already says, these units were initially supposed to be used mainly in combatting saboteurs, spies and local ‘bandits’, and in carrying out ‘scorched earth tactics’. Yet as we can already see from the previous periodization, the role of destruction battalions in Estonia already became blurred at the start of July, 1941. Since the front was breached in many places, some units that were completely unprepared for it were quickly sent to the front to plug the holes. The Southern Estonian destruction battalions that had retreated in the direction of Narva fell apart, disintegrating into isolated troops that retreated together with civilians who wanted to evacuate. Other units were incorporated into the Red Army in Northern Tartu County in the latter half of July, and most of them were cut off there in a pocket. In August, two companies were formed in Harju County and Narva out of the remnants of the destruction battalions, and were already utilised directly as front-line units. In conclusion it can be said that while the destruction battalions that operated in Estonia initially were indeed a rather effective force for a short time in the fight against armed resistance, their utilisation in front-line combat not only had negligible effect, it was also rather short-sighted in terms of Soviet rule because it resulted in the destruction of a large proportion of the cadre that was trustworthy in the eyes of the Soviet regime, and this cadre was already quite modest in numbers to begin with. A large proportion of the fighters of the destruction battalions left behind in the rear met their end in the course of vigilante justice in the summer war of 1941. And secondly, since the Germans did not count the members of the destruction battalions as soldiers, the status of prisoners of war did not extend to them, and many of them who were taken prisoner were shot on the spot or were executed at a later time as ‘active communists’.
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Vinokurov, V. I. "The initiative of A. A. Ignatiev in the scorched war of 1943." Diplomaticheskaja sluzhba (Diplomatic Service), no. 11 (November 15, 2023): 524–29. http://dx.doi.org/10.33920/vne-01-2306-08.

Повний текст джерела
Анотація:
The article is devoted to the bright memory of the outstanding Russian (Soviet) military diplomat, Lieutenant General Count A. A. Ignatiev, who is now rightfully considered the founder of Suvorov, Nakhimov and cadet education in modern Russia. It was he who, in his letter to the People's Commissar of Defense, Supreme Commander-in-Chief I. V. Stalin, dated April 17, 1943, took the initiative to create a network of secondary military schools in our country on the type of cadet corps. The head of the Soviet state reacted positively to this initiative, and on August 21 of the same year, the Resolution of the Council of People's Commissars No. 901 "On urgent measures to restore housing in areas liberated from German occupation" was issued, which provided "… for the establishment, education and upbringing of children of the Red Army soldiers, partisans of the Patriotic War, as well as children of Soviet and party workers, workers and collective farmers who died at the hands of the German occupiers, to organize in the Krasnodar, Stavropol Territories, Rostov, Stalingrad, Voroshilovgrad, Voronezh, Kharkov, Kursk, Orel, Smolensk and Kalinin regions: nine Suvorov military schools, like the old cadet corps, 500 people in each, a total of 4,500 people with a training period of 7 years, with a closed pansy-on for pupils".
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Harper, G. Geoffrey. ""Do Not Eat the Owl"." HIPHIL Novum 6, no. 1 (March 5, 2020): 20–32. http://dx.doi.org/10.7146/hn.v6i1.142751.

Повний текст джерела
Анотація:
Christian appropriation of OT legal material is a perennial crux interpretum. Evident, is a spectrum of approaches, from Marcion-like dismissal on the one hand through to theonomist appeals for re-enactment on the other. Within Western Christianity, the Reformation served to enshrine one approach in particular: a threefold division of the Law that distinguished between civil, ceremonial, and moral commands. However, while undoubtedly neat, such compartmentalization is highly problematic and has resulted in a myopic view of OT legal material. Leviticus 11 is a case in point. While regulations regarding the eating and touching of (un)clean animals remain determinedly central to Judaism, Christian tradition since the early church has sidelined the pericope with equal determination. Even though the Reformation sparked a renewed interest in the reading of Scripture, the designation (and, arguably, dismissal) of Leviticus 11 as “ceremonial” merely served to perpetuate a lacuna regarding the enduring relevance of this text as Christian Scripture. In this article I tease out how Leviticus 11 might be better appropriated by employing tools derived from the fields of speech act theory and intertextuality. These tools allow for greater precision in describing what Leviticus 11 as a text is doing. It becomes apparent that while some illocutions performed by Leviticus 11 are supervened when read in light of the NT, other illocutions persist. These illocutions may be legitimately appropriated by Christian readers of the text with benefits for both faith and practice.
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Luchkanyn, Serhii. "Romanian historical realities in the “Alps” (The “Guide-on Bearers” trilogy) by Oles Honchar (from a modern perspective): Reality and Tribute to the Epoch." European Historical Studies, no. 17 (2020): 38–49. http://dx.doi.org/10.17721/2524-048x.2020.17.3.

Повний текст джерела
Анотація:
Oles Honchar, who is a classic of Ukrainian literature, has created a well-known novel “The Alps” (the first part of the “The Standard Bearers” trilogy). There, we discover about how soldiers and officers (many Ukrainians are among them) of the Second Ukrainian Front passed their way through Romania from spring to autumn of 1944. Due to this, we see many Romanian realities, starting with historical-political ones and ending with locally linguistic ones, the research and explanation of which have become the purpose of this article. The author of the novel was well aware of the military-political realities of the epoch. Those realities were ongoing battle for the Romanian city of Târgu Frumos and The Jassy-Kishinev Operation (August 1944). He also knew about Rodion Malinovskyi (who was its participant and commander of the Second Ukrainian Front) and the August uprising in Bucharest in 1944. The realities also included the overthrow of the dictatorship of Antonescu by the patriotic Romanian forces led by Romanian king Michael I and a common struggle between Red and Romanian armies for the liberation of Northern Transylvania from the Hungarian occupation (Hungarian occupation was one of the Second Vienna Award conditions). The interpretations of some of the military-political realities of that time have not undergone any significant changes in the novel (The Jassy-Kishinev Operation, the Northern Transylvania liberation). At the same time, the other interpretations have negative references about the Romanian king Michael I and his so-called “collaboration”, although he learned about Romania’s entry into the war against the USSR and the Anti-Hitler-Koalition from the BBC radio message. In the novel, loanwords from Romanian language are appropriately used. Among them, we should point out “nu știu” (“I do not know”), “nu ști rusește” “Not to know Russian”, “nu-i bun război” (“War is a bad thing”), Moldavian dialect “boon diva” (“good day”) and some other words of Romanian origin. The novel states that the Red Army staff officer interrogated Romanian captives with a Moldovian translator, which inadvertently testifies to Oles Honchar’s recognition of the identity of Romanian and so-called “Moldovian” languages, which was denied for political reasons in Soviet times. On one hand, the article points out that Oles Honchar, as a distinguished master of the artistic word, successfully reproduced Romanian historical-military and locally linguistic realities of 1944. On the other hand, it tells that he was forced to follow the Soviet officialdom of that time when it was about the “bourgeois Romania” describing. He was told to demonize Antonescu, although Oles noted the reluctance of Romanians to fight under Stalingrad and the Caucasus on the side of Germany in 1942-1943. The article also tells that the novel was translated into Romanian with the name “Stegarii” (“Standard Bearers”).
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Sarakaeva, Elina A. "The Beauty, the Beast and the Red Hare. The 'Chain Scheme' in Chinese Literature and Cinematography. Part 1." Corpus Mundi 3, no. 2 (December 22, 2022): 52–80. http://dx.doi.org/10.46539/cmj.v3i2.71.

Повний текст джерела
Анотація:
The Chinese historical chronicle “The Annals of the Three kingdoms” relates the last years of Han dynasty before the country fell into chaos. According to the Chronicle, a frontier general Dong Zhuo marched with his troops to the capital and took control over the boy emperor. He wanted to get rid of his rival general Ding Yuan, so he bribed his officers with gifts and promises. A young junior officer Lü Bu killed general Ding and presented his head to Dong Zhuo. The daring and unscrupulous officer enjoyed the favours of the usurper, he became his adopted son and was placed at the head of cavalry. To his misfortune, Dong Zhuo’s uncontrolled temper threatened the very life of his closest henchmen. Besides, Lü Bu’s regiments didn’t enjoy benefits they expected and that annoyed the soldiers and their new commander. Finally, Lü Bu started a secret affair with a court lady and was afraid to be exposed. So, when minister Wang Yun asked him to kill the tyrant, Lü Bu agreed. Following Wan Yun’s plan, he killed Dong Zhuo with his own hands. This story was masterfully re-worked in Luo Guangzhong’s great epic “The Three Kingdoms”. The writer dramatized the plot and turned the nameless court lady into a renowned beauty Diao Chan who plays the key role in the conspiracy. According to the novel, Diao Chan seduced Lü Bu and later married Dong Zhuo to set the tyrant and his powerful bodyguard against each other. This scheme was called “The Chain Scheme”, for the idea was to break the chain between the male characters with the help of female charms. The Chain Scheme is the most stylistically strong and textually rich episode; in the course of Chinese history it served as a plot to masterful works of fiction and in 20th-21st centuries got numerous TV adaptations. In the present paper I analyse artistic devices and narrative tropes in literature versions of Chain Scheme plot, paying attention to the visual images of the characters, especially their bodily representations as well as the psychological interpretations of their actions. In the Part II of the work I hope to do the same for the screen versions of the Chain Scheme story.
Стилі APA, Harvard, Vancouver, ISO та ін.
21

ДІЛАЙ, Ірина. "КЛЮЧОВІСТЬ У ХУДОЖНЬОМУ ТЕКСТІ (НА МАТЕРІАЛІ РОМАНУ М. ЕТВУД «ОПОВІДЬ СЛУЖНИЦІ»)". Актуальні питання іноземної філології, № 18 (29 серпня 2023): 12–18. http://dx.doi.org/10.32782/2410-0927-2023-18-2.

Повний текст джерела
Анотація:
Стаття присвячена автоматизованому виявленню з метою подальшої інтерпретації ключових лексичних одиниць у романі «Оповідь служниці» відомої канадської письменниці-постмодерністки Маргарет Етвуд. Мета дослідження – апробувати оптимальну методологію корпусокерованого виокремлення ключових слів та словосполук з художнього тексту. Методологія. Аналіз ключовості є важливою складовою контент-аналізу художніх творів, оскільки це дає уявлення про основні теми, мотиви, ідеї, які намагається донести автор, а також про особливості ідіостилю автора. Матеріалом аналізу є текст роману М. Етвуд, який, як і інші твори письменниці, раніше не досліджувався на предмет ключовості. Проведене дослідження складалося із кількох етапів відповідно до поставлених завдань: 1) створено анотований електронний корпус тексту роману; 2) підібрану порівнюваний референтний корпус для виявлення ключових лексичних одиниць; 3) автоматизовано встановлено ключові лексичні одиниці у тексті роману та здійснено інтерпретацію даних. Для цього застосовано корпусний інструментарій Sketch Engine, в основі якого закладена проста статистична міра для встановлення ключовості. В ході здійсненого аналізу визначено такі ключові лексичні одиниці: авторські неологізми, створені М. Етвуд для опису суспільного ладу в дистопії під назвою Джилід (Gilead, Aunt, Commander, Handmaid, Econowife, Unwomen, Mayday, Prayvaganza, Salvagings, Birthmobile тощо), опису інтер'єру (sitting room, white curtain, sitting room door, kitchen table, white cloth, birthing stool, window seat, double door, back door, folding wooden chair), опису побуту та обов'язків служниць (nightgown, rustle (of a dress), bedsheet, dishtowel, hand lotion, paper napkin; to kneel, to outspread, to unbutton), кольори (red, white). За частиномовною належністю найбільший коефіцієнт ключовості спостерігаємо у займенників (2,7), за якими слідують прислівники (1,5) і дієслова (1,3). Методологія автоматизованого визначення ключовості апробована в цьому дослідженні може бути застосована до аналізу текстів різного типу. Результати здійсненого дослідження встановлені на основі об’єктивних статистичних критеріїв, слугують попереднім етапом контент-аналізу та дискурс-аналізу, тому ще потребують більш детальної інтерпретації.
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Sawaguchi, T., I. Yamane, and K. Kubota. "Application of the GABA antagonist bicuculline to the premotor cortex reduces the ability to withhold reaching movements by well-trained monkeys in visually guided reaching task." Journal of Neurophysiology 75, no. 5 (May 1, 1996): 2150–56. http://dx.doi.org/10.1152/jn.1996.75.5.2150.

Повний текст джерела
Анотація:
1. A gamma-aminobutyric acid (GABA) antagonist, bicuculline methiodide (BMI, 10 micrograms/microliters, 1 microliter), was locally injected into a total of 32 sites in the right premotor cortex (PM) of two rhesus monkeys that had been well-trained in a visually guided reaching task (VR) for approximately 3 yr. The monkey initiated the task by pressing a central hold lever with its left hand, and this was followed by waiting (1 s), warning (central green square on a computer monitor, 0.5 s), cue (right, upper, or left square), delay (2-5 s), and go (central green square changes to red, < 1.2 s) periods. In the go period, the monkey released the hold lever and reached out to one of three target levers (left, upper, or right) that had been indicated 2-5 s previously in the cue period. 2. At three sites in the dorsal part of the PM, after the local application of BMI, reaching movements of the left forelimb, which were not part of the trained-reaching, occurred 200-300 ms after the onset of a burst of neuronal activity at the BMI injection site. This induced-reaching, which was designated a "forced-reaching" movement, occurred while the monkeys were pressing the hold lever before the cue appeared-i.e., during the waiting or waiting period. No reaching occurred when the burst did not appear. Furthermore, trajectories and electromyograms of the forelimbs during the forced-reaching movements were similar to those in the trained-reaching movements in the VR task. 3. These results suggest that restricted sites in the dorsal PM of monkeys are involved in the initiation and/or execution of trained-reaching movements and that GABAergic inhibition at these sites normally suppresses this initiation/execution unless it is required. By relaxing GABAergic suppression, the dorsal PM might send a command to a neuronal system that is associated with trained reaching to recruit the system, thereby initiating and/or executing the trained reaching.
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Morozova, Olga M., and Tatyana I. Troshina. "Bodies of Transitional Power at the Final Stage of the Civil War." Vestnik of Saint Petersburg University. History 66, no. 3 (2021): 771–96. http://dx.doi.org/10.21638/11701/spbu02.2021.306.

Повний текст джерела
Анотація:
The article is grounded on the research based on a large set of documents stored in the central and regional archives of the Russian Federation and neighboring countries. The authors have formulated a research question concerning identification of the common features in the process of restoration of the Soviet power on the outskirts of the country during the last stage of the Civil War. The article draws on the material spanning a short period between the retreat of the whites (in the territory of Arkhangelsk province, the Don and Tersk regions, Kuban, Dagestan) and liquidation of governing bodies of the Azerbaijan Democratic Republic and entrance of the Red Army units. If before January-February 1920, the “whites” retreated with battles, then a preventive retreat ensued, and a regime of interstate power was established in the territory they left behind. The article reveals two scenarios on the eve of the reunification of the peripheral territories with the central Bolshevik power. It was quite rare that the area was abandoned without power and order. Usually, the consolidated democratic society either intercepted power from the weakened hands of the white administration or took over the reins of power from the command of the withdrawing White army in an organized manner. Temporary transitional authorities usually included representatives of socialist parties, non-partisan public, and trade unions. But in practice, this process had a distinct regional specificity influenced by the local palette of political forces, in the configuration that had developed before the Civil War. This phenomenon was very poorly reflected in the synchronous historical sources, so along with such miraculously preserved separate documents, personal evidence collected during the early Soviet memorial campaigns formed the basis for the study.
Стилі APA, Harvard, Vancouver, ISO та ін.
24

da Costa Moraes, Anderson Antunes, Manuela Brito Duarte, Eduardo Veloso Ferreira, Gizele Cristina da Silva Almeida, Enzo Gabriel da Rocha Santos, Gustavo Henrique Lima Pinto, Paulo Rui de Oliveira, et al. "Validity and Reliability of Smartphone App for Evaluating Postural Adjustments during Step Initiation." Sensors 22, no. 8 (April 12, 2022): 2935. http://dx.doi.org/10.3390/s22082935.

Повний текст джерела
Анотація:
The evaluation of anticipatory postural adjustments (APAs) requires high-cost and complex handling systems, only available at research laboratories. New alternative methods are being developed in this field, on the other hand, to solve this issue and allow applicability in clinic, sport and hospital environments. The objective of this study was to validate an app for mobile devices to measure the APAs during gait initiation by comparing the signals obtained from cell phones using the Momentum app with measurements made by a kinematic system. The center-of-mass accelerations of a total of 20 healthy subjects were measured by the above app, which read the inertial sensors of the smartphones, and by kinematics, with a reflective marker positioned on their lumbar spine. The subjects took a step forward after hearing a command from an experimenter. The variables of the anticipatory phase, prior to the heel-off and the step phase, were measured. In the anticipatory phase, the linear correlation of all variables measured by the two measurement techniques was significant and indicated a high correlation between the devices (APAonset: r = 0.95, p < 0.0001; APAamp: r = 0.71, p = 0.003, and PEAKtime: r = 0.95, p < 0.0001). The linear correlation between the two measurement techniques for the step phase variables measured by ques was also significant (STEPinterval: r = 0.56, p = 0.008; STEPpeak1: r = 0.79, p < 0.0001; and STEPpeak2: r = 0.64, p < 0.0001). The Bland–Altman graphs indicated agreement between instruments with similar behavior as well as subjects within confidence limits and low dispersion. Thus, using the Momentum cell phone application is valid for the assessment of APAs during gait initiation compared to the gold standard instrument (kinematics), proving to be a useful, less complex, and less costly alternative for the assessment of healthy individuals.
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Hridina, Anastasia, and Nadiya Temirova. "The Problem of Building the Armed Forces in the Memoirs of Contemporaries of the Ukrainian Revolution in 1917-1921." Scientific Papers of the Vinnytsia Mykhailo Kotsiubynskyi State Pedagogical University. Series: History, no. 40 (June 2022): 131–38. http://dx.doi.org/10.31652/2411-2143-2022-40-131-138.

Повний текст джерела
Анотація:
The aim of the article is to analyze the memoirs of contemporaries and direct participants in the revolutionary events in 1917-1921. Attention is focused on the process of formation of the Ukrainian Armed Forces - the mainstay of the Ukrainian Central Council. The memoirs of active participants of the national Ukrainian movement - V. Vynnychenko, M. Hrushevsky, D. Doroshenko are taken as a basis. Memoirs of representatives of other camps of revolutionary competitions - the white movement of I. Mazepa, A. Denikin, the Bolshevik camp - E. Bosch, V. Atonov-Ovsienko were studied for a more objective coverage of the research topic. Memoirs are presented as book publications, thematic collections, author's biographies, magazine and newspaper publications. Materials of the State Archives of Donetsk region are also involved, which allow to present the peculiarities of the course of events in Donetsk region. The methodological basis of the study were general scientific methods of comparison and analysis. In preparation for publication, the leading methods were historical-comparative, synchronous and retrospective. The use of the mentioned scientific methods allowed to analyze the sources and draw conclusions about the scientific problem. The scientific novelty of the study is that the researcher attempted to analyze available memoirs on the formation of the Ukrainian armed forces - the mainstay of the Ukrainian Central Council. Conclusions. Memoirs show that, on the one hand, from the first days of the revolution, a spontaneous movement began among Ukrainian servicemen - the creation of Ukrainian committees, communities, clubs, tendencies to create Ukrainian military units, even the idea of ​​creating a united Ukrainian front. On the other hand, the leaders of the Ukrainian revolution did not have a more or less clear idea of ​​the attitude to the army, the prospect of creating their own armed forces. The Central Council could not determine its position on this issue for fear of spoiling relations with the Provisional Government. Disputes within the Ukrainian movement, in particular between M. Hrushevsky and M. Mikhnovsky, and distrust of representatives of the military command, in particular P. Skoropadsky, also affected this solution. The latter in his memoirs describes in detail the vicissitudes of the creation of the Ukrainian corps in the Russian army. In general, according to the authors of the memoirs, the Ukrainian government has failed to organize a real military force in Ukraine that could resist the enemy. All contemporaries assess the armed forces of Ukraine as weak, disorganized, chaotic. Most saw this as the fault of the Central Council, which failed to coordinate its actions properly and began an open conflict with the Russian government. Memoirs of the Bolsheviks reflect the process of formation on the ground (mostly in cities and workers' settlements of eastern and southern Ukraine) units of the Red Guard from local workers.
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Wirawan Pamuji. "THE APPLICATION OF LEADERSHIP MOTIVATION FOR STUDENT OF LAW IN TRANSLATING LOCAL TO ENGLISH LANGUAGE WITH ASSISTANT LECTURE SYSTEM." Jurnal Pendidikan dan Sastra Inggris 2, no. 1 (April 1, 2022): 15–24. http://dx.doi.org/10.55606/jupensi.v2i1.112.

Повний текст джерела
Анотація:
An attempt of diminishing final disability, many students of University have resembled a step of less spirit of Leadership, it is because likely that the goal is to master students in understanding subject according to the meaning, not to the functions. Furthermore, since communication is a process, it is insufficient for students to simply knowledge of target language forms, meaning and function to teach in easy way is still being puzzled as the creator of Class Explanatory is only a Lecturer and the potential student is not yet immersed to be right hand of Lecturer himself as a second speaker. Classical methods are very often because of meaningful learning or contextualized teaching learning consideration, in this term we would like to analyze about law students English material which needs an urgency to read a case text for court proceeding as it requires intensive understanding inferential reading to deepen the meaning, therefore it is inevitable to translate local language to English contextually to face moot Court or Simulation Court as The Translated Document could be authentically or Contextually delivered in speech before court officials as a Court Sentence to Inform Foreign Court Officials about Justice Decision. That in this case, lecturer commands students to collect difficult words of Indonesian then they would translate them all in English then Lecture orders them to create an article from collected translates words and changes the words into sentence in the article then Lecture opens election who can lead the classroom as potentially find Indonesian Court Difficult Words Translated in English with Lecture assistant to translate it, the assistant lecture is not mere in duty to collect difficult words from students but also translate it into English as he could before noting it Assistant Lecture felt that he was positioned as a Guidance of the class as he felt motivated to increase his Leadership in maintaining Difficult Words and explained then he was proud for that.
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Veselinović, Ivana. "The role of the despotess Irene Kantakouzene in the political life of the Serbian Despotate." Zbornik radova Filozofskog fakulteta u Pristini 52, no. 2 (2022): 177–90. http://dx.doi.org/10.5937/zrffp52-36443.

Повний текст джерела
Анотація:
Despotess Irene was considered the second person of the Serbian despotate in Serbian historiography. Owing to Serbian and Byzantine sources that mention her actions, this paper attempts to answer the question of her joint rule with despot Đurađ Branković in Serbian state, as an independent political factor. The first example of this is Efsigmen Charter from 1429, which the despot issued together with his wife. In addition, the miniature on Irene's charter shows her with a sceptre in her hand, a royal sign, although her and Đurađ's son had already been nominated for the heir to the throne, as indicated by the red shoes. Her activity is seen in the presence of a large number of Byzantines in Serbia, and then in the administration of the Serbian state. Of the Byzantines who lived in Serbia, the brother of the despotess Irene, Toma Kantakouzene was very important. He became the commander of the Serbian army, which was very unusual for the Middle Ages in Serbia. In 1435, during Đurađ's visit to Požun, Irene ruled the country as we know, based on the Dubrovnik mission she received. In addition, the despotess was a member of the state council, and most likely the court council. Mavro Orbini left a note on Irene's role in the diplomatic marriage between Mara Branković and Sultan Murad II, which Serbia used as means of preventing the Ottoman attack on the country. The fact that most points to Irene's active political role is the question of the successor of the despot Đurađ. Mavro Orbini and Michael Kritovoulos wrote that Đurađ Branković appointed his wife to rule after his death, which was certainly related to the division in the family due to the deprivation of the throne of the blinded Grgur. Thus, Irene would be a person around whom the family would gather and reconcile, and who would rule the country. Her sudden death and the transfer of part of the ruling family to the Ottoman territory subsequently confirmed her right to power and the division that existed between the Branković family over the ruler and the country's foreign policy.
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Kasmawati, Kasmawati, and Harisal Harisal. "Konstruksi Kalimat Imperatif Ajakan Dalam Bahasa Jepang Dan Bahasa Indonesia." KIRYOKU 5, no. 2 (December 11, 2021): 257–64. http://dx.doi.org/10.14710/kiryoku.v5i2.257-264.

Повний текст джерела
Анотація:
Imperative sentences are sentences that contain imperative intonation and generally contain the meaning of commands or prohibitions; in writing is marked by (.) and (!). The construction of imperative sentences of invitation in Japanese and Indonesian is done by using a constructive research. Contrastive research prioritizes concrete facts regarding the search for differences one by one which has the specificity of language so that it is more inclined towards differences. This study aims to describe the construction of imperative sentences of invitation in Japanese and Indonesian. The approach taken in this study uses a qualitative descriptive approach using the referential method. The data collection in this study used the deep listening method related to the use of written language, because the data in the form of invitation as a modality were taken from written data sources in the form of novels. The written data obtained by the read method was captured by a note-taking technique by being recorded on a data card. The data in the form of sentences containing imperatives, both in terms of structure and markers and their contents are classified into several types of imperative sentences. Furthermore, the basic analysis technique used is a technique for direct elements, namely dividing the elements in the form of imperative sentences. The results showed that the construction of the imperative form of solicitation sentences in Japanese consisted of the invitation form shiyou with the construction variants 'affirmative form of desire verb -masu + shiyou' and 'isshoni + affirmative form of desire verb -masu + shiyou'; shiyouka invitation form with the construction of 'isshoni + affirmative form of desire verb –masu + shiyou ka'; and, the form of shinaika's invitation with construction variants 'Interrogative form + Shinaika' and 'Particle mo + KK wishes in the form of a dictionary + Interrogative form + Shinaika'. On the other hand, in Indonesian, the construction of the imperative form of an invitation sentence in Indonesian consists of the form of an invitation form ‘Mari’ with the construction variants of 'Mari + active verb' and 'Mari + causative verb'; the form of ‘Marilah’ with the construction of 'Marilah + Active Verb'; the form of an invitation ‘Ayo’ with the construction variants of 'Ayo + Active Verb' and 'Ayo + Causative Verb'; and, form ‘Ayolah’ with the construction 'Ayolah + Active verb'.
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Roider, Karl A. "The Habsburg Foreign Ministry and Political Reform, 1801–1805." Central European History 22, no. 2 (June 1989): 160–82. http://dx.doi.org/10.1017/s0008938900011481.

Повний текст джерела
Анотація:
On 6 December 1800, a courier galloped through the gates of Vienna, rushed to the Hofburg, the winter palace of the Habsburgs, and presented to Emperor Francis II a bitter message from Archduke John, the emperor's brother and commander of the Austrian armed forces in Germany. The message read that three days earlier the archduke's troops had engaged the French army under Jean Moreau at Hohenlinden, had suffered serious losses, and were falling back to Salzburg with the officers struggling to maintain order in the ranks while they did so. The news was a crushing blow to Francis. In 1799 the Austrians had begun the War of the Second Coalition with high hopes of reversing the years of defeat at the hands of Revolutionary France. Russia and Britain had agreed to cooperate closely with Austria; France seemed weaker than ever domestically; and Napoleon Bonaparte, who had caused Vienna such grief in 1797, was far away in Egypt trying to inflict damage upon the British Empire. But these hopes turned to ashes. Russia abandoned the Coalition after its army suffered serious losses in Switzerland—indeed, in their wake the Russian ruler, Tsar Paul, had thundered so vehemently against what he saw as Austrian treachery that he had broken relations with Vienna—; Britain had been able to provide much needed funds but not more-needed soldiers; and Bonaparte had returned to work his magic on both the French army and the French people. The result was Hohenlinden, Austrian defeat, and in February 1800 the Treaty of Lunéville that ceded to France primary influence in Germany and Italy.
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Butman, Boris S. "Soviet Shipbuilding: Productivity improvement Efforts." Journal of Ship Production 2, no. 04 (November 1, 1986): 225–37. http://dx.doi.org/10.5957/jsp.1986.2.4.225.

Повний текст джерела
Анотація:
Constant demand for new naval and commercial vessels has created special conditions for the Government-owned Soviet shipbuilding industry, which practically has not been affected by the world shipbuilding crisis. On the other hand, such chronic diseases of the centralized economy as lack of incentive, material shortage and poor workmanship cause specific problems for ship construction. Being technically and financially unable to rapidly improve the overall technology level and performance of the entire industry, the Soviets concentrate their efforts on certain important areas and have achieved significant results, especially in welding and cutting titanium and aluminum alloys, modular production methods, standardization, etc. All productivity improvement efforts are supported by an army of highly educated engineers and scientists at shipyards, in multiple scientific, research and design institutions. Discussion Edwin J. Petersen, Todd Pacific Shipyards Three years ago I addressed the Ship Production Symposium as chairman of the Ship Production Committee and outlined some major factors which had contributed to the U.S. shipbuilding industry's remarkable achievements in building and maintaining the world's largest naval and merchant fleets during the five-year period starting just before World War II. The factors were as follows:There was a national commitment to get the job done. The shipbuilding industry was recognized as a needed national resource. There was a dependable workload. Standardization was extensively and effectively utilized. Shipbuilding work was effectively organized. Although these lessons appear to have been lost by our Government since World War II, the paper indicates that the Soviet Union has picked up these principles and has applied them very well to its current shipbuilding program. The paper also gives testimony to the observation that the Soviet Government recognizes the strategic and economic importance of a strong merchant fleet as well as a powerful naval fleet. In reviewing the paper, I found great similarity between the Soviet shipbuilding productivity improvement efforts and our own efforts or goals under the National Shipbuilding Research Program in the following areas:welding technology, flexible automation (robotics), application of group technology, standardization, facilities development, and education and training. In some areas, the Soviet Union appears to be well ahead of the United States in improving the shipbuilding process. Most noteworthy among these is the stable long-and medium-range planning that is possible by virtue of the use and adherence to the "Table of Vessel Classes." It will be obvious to most who hear and read these comments what a vast and significant improvement in shipbuilding costs and schedules could be achieved with a relatively dependable 15year master ship procurement plan for the U.S. naval and merchant fleets. Another area where the Soviet Union appears to lead the United States is in the integration of ship component suppliers into the shipbuilding process. This has been recognized as a vital step by the National Shipbuilding Research Program, but so far we have not made significant progress. A necessary prerequisite for this "supplier integration" is extensive standardization of ship components, yet another area in which the Soviets have achieved significantly greater progress than we have. Additional areas of Soviet advantage are the presence of a multilevel research and development infrastructure well supported by highly educated scientists, engineering and technical personnel; and better integration of formally educated engineering and technical personnel into the ship production process. In his conclusion, the author lists a number of problems facing the Soviet economy that adversely affect shipbuilding productivity. Perhaps behind this listing we can delve out some potential U.S. shipbuilding advantages. First, production systems in U.S. shipyards (with the possible exception of naval shipyards) are probably more flexible and adjustable to meet new circumstances as a consequence of not being constrained by a burdensome centralized bureaucracy, as is the case with Soviet shipyards. Next, such initiatives as the Ship Production Committee's "Human Resources Innovation" projects stand a better chance of achieving product-oriented "production team" relationship among labor, management, and technical personnel than the more rigid Soviet system, especially in view of the ability of U.S. shipyard management to offer meaningful financial incentives without the kind of bureaucratic constraints imposed in the Soviet system. Finally, the current U.S. Navy/shipbuilding industry cooperative effort to develop a common engineering database should lead to a highly integrated and disciplined ship design, construction, operation, and maintenance system for naval ships (and subsequently for commercial ships) that will ultimately restore the U.S. shipbuilding process to a leadership position in the world marketplace (additional references [16] and [17]).On that tentatively positive note, it seems fitting to close this discussion with a question: Is the author aware of any similar Soviet effort to develop an integrated computer-aided design, production and logistics support system? The author is to be congratulated on an excellent, comprehensive insight into the Soviet shipbuilding process and productivity improvement efforts that should give us all adequate cause not to be complacent in our own efforts. Peter M. Palermo, Naval Sea Systems Command The author presents an interesting paper that unfortunately leaves this reader with a number of unanswered questions. The paper is a paradox. It depicts a system consisting of a highly educated work force, advanced fabrication processes including the use of standardized hull modules, sophisticated materials and welding processes, and yet in the author's words they suffer from "low productivity, poor product quality, . . . and the rigid production systems which resists the introduction of new ideas." Is it possible that incentive, motivation, and morale play an equally significant role in achieving quality and producibility advances? Can the author discuss underlying reasons for quality problems in particular—or can we assume that the learning curves of Figs. 5 and Fig. 6 are representative of quality improvement curves? It has been my general impression that quality will improve with application of high-tech fabrication procedures, enclosed fabrication ways, availability of highly educated welding engineers on the building ways, and that productivity would improve with the implementation of modular or zone outfitting techniques coupled with the quality improvements. Can the author give his impressions of the impact of these innovations in the U.S. shipbuilding industry vis-a-vis the Soviet industry? Many of the welding processes cited in the paper are also familiar to the free world, with certain notable exceptions concerning application in Navy shipbuilding. For example, (1) electroslag welding is generally confined to single-pass welding of heavy plates; application to thinner plates—l1/4 in. and less when certified—would permit its use in more applications than heretofore. (2) Electron beam welding is generally restricted to high-technology machinery parts; vacuum chamber size restricts its use for larger components (thus it must be assumed that the Soviets have solved the vacuum chamber problem or have much larger chambers). (3) Likewise, laser welding has had limited use in U.S. shipbuilding. An interesting theme that runs throughout the paper, but is not explicitly addressed, is the quality of Soviet ship fitting. The use of high-tech welding processes and the mention of "remote controlled tooling for welding and X-ray testing the butt, and for following painting" imply significant ship fitting capabilities for fitting and positioning. This is particularly true if modules are built in one facility, outfitted and assembled elsewhere depending on the type of ship required. Any comments concerning Soviet ship fitting capabilities would be appreciated. The discussion on modular construction seems to indicate that the Soviets have a "standard hull module" that is used for different types of vessels, and if the use of these hull modules permit increasing hull length without changes to the fore and aft ends, it can be assumed that they are based on a standard structural design. That being the case, the midship structure will be overdesigned for many applications and optimally designed for very few. Recognizing that the initial additional cost for such a piece of hull structure is relatively minimal, it cannot be forgotten that the lifecycle costs for transporting unnecessary hull weight around can have significant fuel cost impacts. If I perceived the modular construction approach correctly, then I am truly intrigued concerning the methods for handling the distributive systems. In particular, during conversion when the ship is lengthened, how are the electrical, fluid, communications, and other distributive systems broken down, reassembled and tested? "Quick connect couplings" for these type systems at the module breaks is one particular area where economies can be achieved when zone construction methods become the order of the day in U.S. Navy ships. The author's comments in this regard would be most welcome. The design process as presented is somewhat different than U.S. Navy practice. In U.S. practice, Preliminary and Contract design are developed by the Navy. Detail design, the development of the working drawings, is conducted by the lead shipbuilder. While the detail design drawings can be used by follow shipbuilders, flexibility is permitted to facilitate unique shipbuilding or outfitting procedures. Even the contract drawings supplied by the Navy can be modified— upon Navy approval—to permit application of unique shipbuilder capabilities. The large number of college-trained personnel entering the Soviet shipbuilding and allied fields annually is mind-boggling. According to the author's estimation, a minimum of about 6500 college graduates—5000 of which have M.S. degrees—enter these fields each year. It would be most interesting to see a breakdown of these figures—in particular, how many naval architects and welding engineers are included in these figures? These are disciplines with relatively few personnel entering the Navy design and shipbuilding field today. For example, in 1985 in all U.S. colleges and universities, there were only 928 graduates (B.S., M.S. and Ph.D.) in marine, naval architecture and ocean engineering and only 1872 graduates in materials and metallurgy. The number of these graduates that entered the U.S. shipbuilding field is unknown. Again, the author is to be congratulated for providing a very thought-provoking paper. Frank J. Long, Win/Win Strategies This paper serves not only as a chronicle of some of the productivity improvement efforts in Soviet shipbuilding but also as an important reminder of the fruits of those efforts. While most Americans have an appreciation of the strengths of the Russian Navy, this paper serves to bring into clearer focus the Russians' entire maritime might in its naval, commercial, and fishing fleets. Indeed, no other nation on earth has a greater maritime capability. It is generally acknowledged that the Soviet Navy is the largest in the world. When considering the fact that the commercial and fishing fleets are, in many military respects, arms of the naval fleet, we can more fully appreciate how awesome Soviet maritime power truly is. The expansion of its maritime capabilities is simply another but highly significant aspect of Soviet worldwide ambitions. The development and updating of "Setka Typov Su dov" (Table of Vessel Classes), which the author describes is a classic example of the Soviet planning process. As the author states, "A mighty fishing and commercial fleet was built in accordance with a 'Setka' which was originally developed in the 1960's. And an even more impressive example is the rapid expansion of the Soviet Navy." In my opinion it is not mere coincidence that the Russians embarked on this course in the 1960's. That was the beginning of the coldest of cold war periods—Francis Gary Power's U-2 plane was downed by the Russians on May 1, 1960; the mid-May 1960 Four Power Geneva Summit was a bust; the Berlin Wall was erected in 1961 and, in 1962, we had the Cuban Missile Crisis. The United States maritime embargo capability in that crisis undoubtedly influenced the Soviet's planning process. It is a natural and normal function of a state-controlled economy with its state-controlled industries to act to bring about the controlled productivity improvement developments in exactly the key areas discussed in the author's paper. As the author states, "All innovations at Soviet shipyards have originated at two main sources:domestic development andadaptation of new ideas introduced by leading foreign yards, or most likely a combination of both. Soviet shipbuilders are very fast learners; moreover, their own experience is quite substantial." The Ship Production Committee of SNAME has organized its panels to conduct research in many of these same areas for productivity improvement purposes. For example, addressing the areas of technology and equipment are Panels SP-1 and 3, Shipbuilding Facilities and Environmental Effects, and Panel SP-7, Shipbuilding Welding. Shipbuilding methods are the province of SP-2; outfitting and production aids and engineering and scientific support are the province of SP-4, Design Production Integration. As I read through the descriptions of the processes that led to the productivity improvements, I was hoping to learn more about the organizational structure of Soviet shipyards, the managerial hierarchy and how work is organized by function or by craft in the shipyard. (I would assume that for all intents and purposes, all Russian yards are organized in the same way.) American shipyard management is wedded to the notion that American shipbuilding suffers immeasurably from a productivity standpoint because of limitations on management's ability to assign workers across craft lines. It is unlikely that this limitation exists in Soviet shipyards. If it does not, how is the unfettered right of assignment optimized? What are the tangible, measurable results? I believe it would have been helpful, also, for the author to have dedicated some of the paper to one of the most important factors in improvement in the labor-intensive shipbuilding industry—the shipyard worker. There are several references to worker problems—absenteeism, labor shortage, poor workmanship, and labor discipline. The reader is left with the impression that the Russians believe that either those are unsolvable problems or have a priority ranking significantly inferior to the organizational, technical, and design efforts discussed. As a case in point, the author devotes a complete section to engineering education and professional training but makes no mention of education or training programs for blue-collar workers. It would seem that a paper on productivity improvement efforts in Soviet shipbuilding would address this most important element. My guess is that the Russians have considerable such efforts underway and it would be beneficial for us to learn of them.
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Jain, Aman, Anirudh Reddy Kondapally, Kentaro Yamada, and Hitomi Yanaka. "Neuro-Symbolic Reasoning for Multimodal Referring Expression Comprehension in HMI Systems." New Generation Computing, February 15, 2024. http://dx.doi.org/10.1007/s00354-024-00243-8.

Повний текст джерела
Анотація:
AbstractConventional Human–Machine Interaction (HMI) interfaces have predominantly relied on GUI and voice commands. However, natural human communication also consists of non-verbal communication, including hand gestures like pointing. Thus, recent works in HMI systems have tried to incorporate pointing gestures as an input, making significant progress in recognizing and integrating them with voice commands. However, existing approaches often treat these input modalities independently, limiting their capacity to handle complex multimodal instructions requiring intricate reasoning of language and gestures. On the other hand, multimodal tasks requiring complex reasoning are being challenged in the language and vision domain, but these typically do not include gestures like pointing. To bridge this gap, we explore one of the challenging multimodal tasks, called Referring Expression Comprehension (REC), within multimodal HMI systems incorporating pointing gestures. We present a virtual setup in which a robot shares an environment with a user and is tasked with identifying objects based on the user’s language and gestural instructions. Furthermore, to address this challenge, we propose a hybrid neuro-symbolic model combining deep learning’s versatility with symbolic reasoning’s interpretability. Our contributions include a challenging multimodal REC dataset for HMI systems, an interpretable neuro-symbolic model, and an assessment of its ability to generalize the reasoning to unseen environments, complemented by an in-depth qualitative analysis of the model’s inner workings.
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Wittig, Sabine. "Zur propositionalen Realisierung der Aufforderungsintention in der Indirekten Rede am Beispiel des modernen Arabischen." STUF - Language Typology and Universals 42, no. 6 (January 1, 1989). http://dx.doi.org/10.1515/stuf-1989-0619.

Повний текст джерела
Анотація:
SummaryThis article is intended to be a contribution to the problem of reported speech in Arabic. A command can be presented as a locutionary or illocutionary act of utterance. The reporter’s interpretation of the speaker’s intention can only be described if one distinguishes the grammatically determined meaning from the utterance meaning and the communicative sense. This paper examines linguistic and semantic changes due to reported speech depending on the different structures of the original sentences. It becomes evident in which way reported speech is related on the one hand to the propositional content of the original utterance and on the other to the phrases indicating its illocutionary force. A special aim is to explain how focussing the locutionary reap, illocutionary act results in certain verbs and related that-clauses being used.
Стилі APA, Harvard, Vancouver, ISO та ін.
33

M-Kiss, Hedy. "Iconografia Sfantului Florian pe medalioanele steagurilor istorice. Studiu comparativ / The Iconography of Saint Florian on the Medallions of Historical Flags. Comparative study. Comparative study." Analele Banatului XXVI 2018, January 1, 2018. http://dx.doi.org/10.55201/pqgk1833.

Повний текст джерела
Анотація:
In this paper, the author presents a comparative study on the medallions of 9 historical !ags of "re-"ghters, wheelwrights and farriers from di#erent towns in Timiș County. %e iconographic study of the medallions, exclusively those dedicated to the spiritual patron, Saint Florian, contains data about the morphological structure of composition, the symbolic elements represented, chromatic, execution technique and the current state of conservation according to age, functional wear and way of preservation. Saint Florian is associated, in the Central and Eastern Europe, with the extinction of "re. %e Saint is depicted in clothing of a Roman centurion commander (company), holding a red !ag in a hand and with the other one pouring water from a wash tub on a building in !ames. Only in three localities from Banat is found the statue representing Saint Florian: Jimbolia, Aradul Nou and Zădăreni. %e civil volunteer "re-"ghters brigade (Önkéntes Polgári Tűzoltókar) from Arad, the "rst one of its kind in Banat, established in 1861 among its rules, that the "re-"ghter !ag must depict Saint Florian as well as the text „Egy Mindnyájunkrt, Mindnyájant Egyért” (One for All, All for One).
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Alekseev, Evgeny. "A Personal History of the Civil War in Alexander Valevsky’s Drawings." Quaestio Rossica 11, no. 1 (April 3, 2023). http://dx.doi.org/10.15826/qr.2023.1.777.

Повний текст джерела
Анотація:
The analysis of graphic works by the amateur artist A. N. Valevsky (1896–1938) from the collection of the Ulyanovsk Regional Art Museum makes it possible to get a subjective view of the events of the Civil War in Russia. An officer of Kolchak’s army and later a commander of the Red Army, in his drawings, Valevsky recorded not only the everyday realities of the era but also his own experiences and feelings. The famous Soviet painters of the 1920s‑1930s (M. B. Grekov, A. A. Deineka, K. S. Petrov-Vodkin, B. V. Johanson, etc.) avoided any personal interpretation of the events and independent assessments of the revolutionary cataclysms in their epic paintings dedicated to the Civil War. Such a thing is rare in the works of White émigré artists. On the other hand, amateur artists, for whom the documentation of events happening around and internal experiences was a vital need, more often allowed themselves to interpret the history of the “Russian troubles”. Valevsky created his drawings between 1921 and 1925, after the artist’s return to peaceful life and, thus, they can be perceived as memories of what he had experienced. The manner of his graphic works is diverse; they combine grotesque techniques with an attempt to capture reality, and tragic episodes go hand in hand with romantic and comical. In many compositions, the author includes examples of urban and military folklore, lines from poems, romances, and ditties popular among ordinary people. This technique gives the plots both the “spirit of the times” and metaphoricism important for a work of art – the meaningfulness of images. According to the article, the examination of the material also gives a feeling of the autobiographical nature of the entire graphic cycle.
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Herring, Eric Z., Emily L. Graczyk, William D. Memberg, Robert Adams, Gaudalupe Fernandez Baca-Vaca, Brianna C. Hutchison, John T. Krall, et al. "Reconnecting the Hand and Arm to the Brain: Efficacy of Neural Interfaces for Sensorimotor Restoration After Tetraplegia." Neurosurgery, November 20, 2023. http://dx.doi.org/10.1227/neu.0000000000002769.

Повний текст джерела
Анотація:
BACKGROUND AND OBJECTIVES: Paralysis after spinal cord injury involves damage to pathways that connect neurons in the brain to peripheral nerves in the limbs. Re-establishing this communication using neural interfaces has the potential to bridge the gap and restore upper extremity function to people with high tetraplegia. We report a novel approach for restoring upper extremity function using selective peripheral nerve stimulation controlled by intracortical microelectrode recordings from sensorimotor networks, along with restoration of tactile sensation of the hand using intracortical microstimulation. METHODS: A 27-year-old right-handed man with AIS-B (motor-complete, sensory-incomplete) C3–C4 tetraplegia was enrolled into the clinical trial. Six 64-channel intracortical microelectrode arrays were implanted into left hemisphere regions involved in upper extremity function, including primary motor and sensory cortices, inferior frontal gyrus, and anterior intraparietal area. Nine 16-channel extraneural peripheral nerve electrodes were implanted to allow targeted stimulation of right median, ulnar (2), radial, axillary, musculocutaneous, suprascapular, lateral pectoral, and long thoracic nerves, to produce selective muscle contractions on demand. Proof-of-concept studies were performed to demonstrate feasibility of using a brain-machine interface to read from and write to the brain for restoring motor and sensory functions of the participant's own arm and hand. RESULTS: Multiunit neural activity that correlated with intended motor action was successfully recorded from intracortical arrays. Microstimulation of electrodes in somatosensory cortex produced repeatable sensory percepts of individual fingers for restoration of touch sensation. Selective electrical activation of peripheral nerves produced antigravity muscle contractions, resulting in functional movements that the participant was able to command under brain control to perform virtual and actual arm and hand movements. The system was well tolerated with no operative complications. CONCLUSION: The combination of implanted cortical electrodes and nerve cuff electrodes has the potential to create bidirectional restoration of motor and sensory functions of the arm and hand after neurological injury.
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Kouega, Jean-Paul, and Sama Alexandre Sihna. "The Bilingual Competence of Local Council Staffers in the Centre and Littoral Regions of Cameroon." Journal of Linguistics and Education Research 2, no. 1 (July 12, 2019). http://dx.doi.org/10.30564/jler.v2i1.748.

Повний текст джерела
Анотація:
This work sets out to appraise the state of individual bilingualism in francophone local councils in Cameroon. The work checks the use of English by francophone local council workers and of French by their anglophone mates with the focus on the four communicative language skills, i.e., speaking, reading, writing and listening. The ethnographic approach to data collection was adopted, and self-rating through a questionnaire was the major tool used. The eight-item questionnaire was administered to 192 local council staffers. They were 177 (91.14% of 192) francophone workers selected out of a pool of over 500 workers in six local councils situated in two big francophone towns i.e., Douala and Yaounde on the one hand, and 15 (8.85% of 192) out of a total of 16 anglophone workers in these same localities. The analysis of the data collected revealed that very low percentages of francophone workers could perform the following tasks using English: discuss office issues with their bosses (10.16% of 177 subjects), read out a speech (8.47%), write a letter to their collaborators (4.51%), and listen to someone with understanding (20.33%). Conversely, a high proportion of anglophone workers were able to perform these same tasks using French i.e., discuss office issues with their bosses (73.33% of 15 subjects), read out a speech (20%), write a letter to a collaborator (33.33%), and listen to someone with understanding (80%). In short, 63.28% of 177 francophone workers reported having a low performance in receptive skills in English as opposed to 20% of 15 anglophone workers who said the same for French; similarly, 7.34% of 177 francophones claimed to have a good command of productive skills in English as opposed to 53.33% of 15 anglophones who claimed to have a command of French. The implications for the study are that official French-English bilingualism in Cameroon is a mere political wish which is not a reality on the field.
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Ryder, Paul, and Daniel Binns. "The Semiotics of Strategy: A Preliminary Structuralist Assessment of the Battle-Map in Patton (1970) and Midway (1976)." M/C Journal 20, no. 4 (August 16, 2017). http://dx.doi.org/10.5204/mcj.1256.

Повний текст джерела
Анотація:
The general who wins a battle makes many calculations in his temple ere the battle is fought. — Sun TzuWorld War II saw a proliferation of maps. From command posts to the pages of National Geographic to the pages of daily newspapers, they were everywhere (Schulten). The era also saw substantive developments in cartography, especially with respect to the topographical maps that feature in our selected films. This essay offers a preliminary examination of the battle-map as depicted in two films about the Second World War: Franklin J. Shaffner’s biopic Patton (1970) and Jack Smight’s epic Midway (1976). In these films, maps, charts, or tableaux (the three-dimensional models upon which are plotted the movements of battalions, fleets, and so on) emerge as an expression of both martial and cinematic strategy. As a rear-view representation of the relative movements of personnel and materiel in particular battle arenas, the map and its accessories (pins, tape, markers, and so forth) trace the broad military dispositions of Patton’s 2nd Corp (Africa), Seventh Army (Italy) and Third Army (Western Europe) and the relative position of American and Japanese fleets in the Pacific. In both Patton and Midway, the map also emerges as a simple mode of narrative plotting: as the various encounters in the two texts play out, the battle-map more or less contemporaneously traces the progress of forces. It also serves as a foreshadowing device, not just narratively, but cinematically: that which is plotted in advance comes to pass (even if as preliminary movements before catastrophe), but the audience is also cued for the cinematic chaos and disjuncture that almost inevitably ensues in the battle scenes proper.On one hand, then, this essay proposes that at the fundamental level of fabula (seen through either the lens of historical hindsight or through the eyes of the novice who knows nothing of World War II), the annotated map is engaged both strategically and cinematically: as a stage upon which commanders attempt to act out (either in anticipation, or retrospectively) the intricate, but grotesque, ballet of warfare — and as a reflection of the broad, sequential, sweeps of conflict. While, in War and Cinema, Paul Virilio offers the phrase ‘the logistics of perception’ (1), in this this essay we, on the other hand, consider that, for those in command, the battle-map is a representation of the perception of logistics: the big picture of war finds rough indexical representation on a map, but (as Clausewitz tells us) chance, the creative agency of individual commanders, and the fog of battle make it far less probable (than is the case in more specific mappings, such as, say, the wedding rehearsal) that what is planned will play out with any degree of close correspondence (On War 19, 21, 77-81). Such mapping is, of course, further problematised by the processes of abstraction themselves: indexicality is necessarily a reduction; a de-realisation or déterritorialisation. ‘For the military commander,’ writes Virilio, ‘every dimension is unstable and presents itself in isolation from its original context’ (War and Cinema 32). Yet rehearsal (on maps, charts, or tableaux) is a keying activity that seeks to presage particular real world patterns (Goffman 45). As suggested above, far from being a rhizomatic activity, the heavily plotted (as opposed to thematic) business of mapping is always out of joint: either a practice of imperfect anticipation or an equally imperfect (pared back and behind-the-times) rendition of activity in the field. As is argued by Tolstoj in War and Peace, the map then presents to the responder a series of tensions and ironies often lost on the masters of conflict themselves. War, as Tostoj proposes, is a stochastic phenomenon while the map is a relatively static, and naive, attempt to impose order upon it. Tolstoj, then, pillories Phull (in the novel, Pfuhl), the aptly-named Prussian general whose lock-stepped obedience to the science of war (of which the map is part) results in the abject humiliation of 1806:Pfuhl was one of those theoreticians who are so fond of their theory that they lose sight of the object of that theory - its application in practice. (Vol. 2, Part 1, Ch. 10, 53)In both Patton and Midway, then, the map unfolds not only as an epistemological tool (read, ‘battle plan’) or reflection (read, the near contemporaneous plotting of real world affray) of the war narrative, but as a device of foreshadowing and as an allegory of command and its profound limitations. So, in Deleuzian terms, while emerging as an image of both time and perception, for commanders and filmgoers alike, the map is also something of a seduction: a ‘crystal-image’ situated in the interstices between the virtual and the actual (Deleuze 95). To put it another way, in our films the map emerges as an isomorphism: a studied plotting in which inheres a counter-text (Goffman 26). As a simple device of narrative, and in the conventional terms of latitude and longitude, in both Patton and Midway, the map, chart, or tableau facilitate the plotting of the resources of war in relation to relief (including island land masses), roads, railways, settlements, rivers, and seas. On this syntagmatic plane, in Greimasian terms, the map is likewise received as a canonical sign of command: where there are maps, there are, after all, commanders (Culler 13). On the other hand, as suggested above, the battle-map (hereafter, we use the term to signify the conventional paper map, the maritime chart, or tableau) materialises as a sanitised image of the unknown and the grotesque: as apodictic object that reduces complexity and that incidentally banishes horror and affect. Thus, the map evolves, in the viewer’s perception, as an ironic sign of all that may not be commanded. This is because, as an emblem of the rational order, in Patton and Midway the map belies the ubiquity of battle’s friction: that defined by Clausewitz as ‘the only concept which...distinguishes real war from war on paper’ (73). ‘Friction’ writes Clausewitz, ‘makes that which appears easy in War difficult in reality’ (81).Our work here cannot ignore or side-step the work of others in identifying the core cycles, characteristics of the war film genre. Jeanine Basinger, for instance, offers nothing less than an annotated checklist of sixteen key characteristics for the World War II combat film. Beyond this taxonomy, though, Basinger identifies the crucial role this sub-type of film plays in the corpus of war cinema more broadly. The World War II combat film’s ‘position in the evolutionary process is established, as well as its overall relationship to history and reality. It demonstrates how a primary set of concepts solidifies into a story – and how they can be interpreted for a changing ideology’ (78). Stuart Bender builds on Basinger’s taxonomy and discussion of narrative tropes with a substantial quantitative analysis of the very building blocks of battle sequences. This is due to Bender’s contention that ‘when a critic’s focus [is] on the narrative or ideological components of a combat film [this may] lead them to make assumptions about the style which are untenable’ (8). We seek with this research to add to a rich and detailed body of knowledge by redressing a surprising omission therein: a conscious and focussed analysis of the use of battle-maps in war cinema. In Patton and in Midway — as in War and Peace — the map emerges as an emblem of an intergeneric dialogue: as a simple storytelling device and as a paradigmatic engine of understanding. To put it another way, as viewer-responders with a synoptic perspective we perceive what might be considered a ‘double exposure’: in the map we see what is obviously before us (the collision of represented forces), but an Archimedean positioning facilitates the production of far more revelatory textual isotopies along what Roman Jakobson calls the ‘axis of combination’ (Linguistics and Poetics 358). Here, otherwise unconnected signs (in our case various manifestations and configurations of the battle-map) are brought together in relation to particular settings, situations, and figures. Through this palimpsest of perspective, a crucial binary emerges: via the battle-map we see ‘command’ and the sequence of engagement — and, through Greimasian processes of axiological combination (belonging more to syuzhet than fabula), elucidated for us are the wrenching ironies of warfare (Culler 228). Thus, through the profound and bound motif of the map (Tomashevsky 69), are we empowered to pass judgement on the map bearers who, in both films, present as the larger-than-life heroes of old. Figure 1.While we have scope only to deal with the African theatre, Patton opens with a dramatic wide-shot of the American flag: a ‘map’, if you will, of a national history forged in war (Fig. 1). Against this potent sign of American hegemony, as he slowly climbs up to the stage before it, the general appears a diminutive figure -- until, via a series of matched cuts that culminate in extreme close-ups, he manifests as a giant about to play his part in a great American story (Fig. 2).Figure 2.Some nineteen minutes into a film, having surveyed the carnage of Kasserine Pass (in which, in February 1943, the Germans inflicted a humiliating defeat on the Americans) General Omar Bradley is reunited with his old friend and newly-nominated three-star general, George S. Patton Jr.. Against a backdrop of an indistinct topographical map (that nonetheless appears to show the front line) and the American flag that together denote the men’s authority, the two discuss the Kasserine catastrophe. Bradley’s response to Patton’s question ‘What happened at Kasserine?’ clearly illustrates the tension between strategy and real-world engagement. While the battle-plan was solid, the Americans were outgunned, their tanks were outclassed, and (most importantly) their troops were out-disciplined. Patton’s concludes that Rommel can only be beaten if the American soldiers are fearless and fight as a cohesive unit. Now that he is in command of the American 2nd Corp, the tide of American martial fortune is about to turn.The next time Patton appears in relation to the map is around half an hour into the two-and-three-quarter-hour feature. Here, in the American HQ, the map once more appears as a simple, canonical sign of command. Somewhat carelessly, the map of Europe seems to show post-1945 national divisions and so is ostensibly offered as a straightforward prop. In terms of martial specifics, screenplay writer Francis Ford Coppola apparently did not envisage much close scrutiny of the film’s maps. Highlighted, instead, are the tensions between strategy as a general principle and action on the ground. As British General Sir Arthur Coningham waxes lyrical about allied air supremacy, a German bomber drops its payload on the HQ, causing the map of Europe to (emblematically) collapse forward into the room. Following a few passes by the attacking aircraft, the film then cuts to a one second medium shot as a hail of bullets from a Heinkel He 111 strike a North African battle map (Fig. 3). Still prone, Patton remarks: ‘You were discussing air supremacy, Sir Arthur.’ Dramatising a scene that did take place (although Coningham was not present), Schaffner’s intention is to allow Patton to shoot holes in the British strategy (of which he is contemptuous) but a broader objective is the director’s exposé of the more general disjuncture between strategy and action. As the film progresses, and the battle-map’s allegorical significance is increasingly foregrounded, this critique becomes definitively sharper.Figure 3.Immediately following a scene in which an introspective Patton walks through a cemetery in which are interred the remains of those killed at Kasserine, to further the critique of Allied strategy the camera cuts to Berlin’s high command and a high-tech ensemble of tableaux, projected maps, and walls featuring lights, counters, and clocks. Tasked to research the newly appointed Patton, Captain Steiger walks through the bunker HQ with Hitler’s Chief of Staff, General Jodl, to meet with Rommel — who, suffering nasal diphtheria, is away from the African theatre. In a memorable exchange, Steiger reveals that Patton permanently attacks and never retreats. Rommel, who, following his easy victory at Kasserine, is on the verge of total tactical victory, in turn declares that he will ‘attack and annihilate’ Patton — before the poet-warrior does the same to him. As Clausewitz has argued, and as Schaffner is at pains to point out, it seems that, in part, the outcome of warfare has more to do with the individual consciousness of competing warriors than it does with even the most exquisite of battle-plans.Figure 4.So, even this early in the film’s runtime, as viewer-responders we start to reassess various manifestations of the battle-map. To put it as Michelle Langford does in her assessment of Schroeter’s cinema, ‘fragments of the familiar world [in our case, battle-maps] … become radically unfamiliar’ (Allegorical Images 57). Among the revelations is that from the flag (in the context of close battle, all sense of ‘the national’ dissolves), to the wall map, to the most detailed of tableau, the battle-plan is enveloped in the fog of war: thus, the extended deeply-focussed scenes of the Battle of El Guettar take us from strategic overview (Patton’s field glass perspectives over what will soon become a Valley of Death) to what Boris Eichenbaum has called ‘Stendhalian’ scale (The Young Tolstoi 105) in which, (in Patton) through more closely situated perspectives, we almost palpably experience the Germans’ disarray under heavy fire. As the camera pivots between the general and the particular (and between the omniscient and the nescient) the cinematographer highlights the tension between the strategic and the actual. Inasmuch as it works out (and, as Schaffner shows us, it never works out completely as planned) this is the outcome of modern martial strategy: chaos and unimaginable carnage on the ground that no cartographic representation might capture. As Patton observes the destruction unfold in the valley below and before him, he declares: ‘Hell of a waste of fine infantry.’ Figure 5.An important inclusion, then, is that following the protracted El Guettar battle scenes, Schaffner has the (symbolically flag-draped) casket of Patton’s aide, Captain Richard N. “Dick” Jenson, wheeled away on a horse-drawn cart — with the lonely figure of the mourning general marching behind, his ironic interior monologue audible to the audience: ‘I can't see the reason such fine young men get killed. There are so many battles yet to fight.’ Finally, in terms of this brief and partial assessment of the battle-map in Patton, less than an hour in, we may observe that the map is emerging as something far more than a casual prop; as something more than a plotting of battlelines; as something more than an emblem of command. Along a new and unexpected axis of semantic combination, it is now manifesting as a sign of that which cannot be represented nor commanded.Midway presents the lead-up to the eponymous naval battle of 1942. Smight’s work is of interest primarily because the battle itself plays a relatively small role in the film; what is most important is the prolonged strategising that comprises most of the film’s run time. In Midway, battle-tables and fleet markers become key players in the cinematic action, second almost to the commanders themselves. Two key sequences are discussed here: the moment in which Yamamoto outlines his strategy for the attack on Midway (by way of a decoy attack on the Aleutian Islands), and the scene some moments later where Admiral Nimitz and his assembled fleet commanders (Spruance, Blake, and company) survey their own plan to defend the atoll. In Midway, as is represented by the notion of a fleet-in-being, the oceanic battlefield is presented as a speculative plane on which commanders can test ideas. Here, a fleet in a certain position projects a radius of influence that will deter an enemy fleet from attacking: i.e. ‘a fleet which is able and willing to attack an enemy proposing a descent upon territory which that force has it in charge to protect’ (Colomb viii). The fleet-in-being, it is worth noting, is one that never leaves port and, while it is certainly true that the latter half of Midway is concerned with the execution of strategy, the first half is a prolonged cinematic game of chess, with neither player wanting to move lest the other has thought three moves ahead. Virilio opines that the fleet-in-being is ‘a new idea of violence that no longer comes from direct confrontation and bloodshed, but rather from the unequal properties of bodies, evaluation of the number of movements allowed them in a chosen element, permanent verification of their dynamic efficiency’ (Speed and Politics 62). Here, as in Patton, we begin to read the map as a sign of the subjective as well as the objective. This ‘game of chess’ (or, if you prefer, ‘Battleships’) is presented cinematically through the interaction of command teams with their battle-tables and fleet markers. To be sure, this is to show strategy being developed — but it is also to prepare viewers for the defamiliarised representation of the battle itself.The first sequence opens with a close-up of Admiral Yamamoto declaring: ‘This is how I expect the battle to develop.’ The plan to decoy the Americans with an attack on the Aleutians is shown via close-ups of the conveniently-labelled ‘Northern Force’ (Fig. 6). It is then explained that, twenty-four hours later, a second force will break off and strike south, on the Midway atoll. There is a cut from closeups of the pointer on the map to the wider shot of the Japanese commanders around their battle table (Fig. 7). Interestingly, apart from the opening of the film in the Japanese garden, and the later parts of the film in the operations room, the Japanese commanders are only ever shown in this battle-table area. This canonically positions the Japanese as pure strategists, little concerned with the enmeshing of war with political or social considerations. The sequence ends with Commander Yasimasa showing a photograph of Vice Admiral Halsey, who the Japanese mistakenly believe will be leading the carrier fleet. Despite some bickering among the commanders earlier in the film, this sequence shows the absolute confidence of the Japanese strategists in their plan. The shots are suitably languorous — averaging three to four seconds between cuts — and the body language of the commanders shows a calm determination. The battle-map here is presented as an index of perfect command and inevitable victory: each part of the plan is presented with narration suggesting the Japanese expect to encounter little resistance. While Yasimasa and his clique are confident, the other commanders suggest a reconnaissance flight over Pearl Harbor to ascertain the position of the American fleet; the fear of fleet-in-being is shown here firsthand and on the map, where the reconnaissance planes are placed alongside the ship markers. The battle-map is never shown in full: only sections of the naval landscape are presented. We suggest that this is done in order to prepare the audience for the later stages of the film: as in Patton (from time to time) the battle-map here is filmed abstractly, to prime the audience for the abstract montage of the battle itself in the film’s second half.Figure 6.Figure 7.Having established in the intervening running time that Halsey is out of action, his replacement, Rear Admiral Spruance, is introduced to the rest of the command team. As with all the important American command and strategy meetings in the film, this is done in the operations room. A transparent coordinates board is shown in the foreground as Nimitz, Spruance and Rear Admiral Fletcher move through to the battle table. Behind the men, as they lean over the table, is an enormous map of the world (Fig. 8). In this sequence, Nimitz freely admits that while he knows each Japanese battle group’s origin and heading, he is unsure of their target. He asks Spruance for his advice:‘Ray, assuming what you see here isn’t just an elaborate ruse — Washington thinks it is, but assuming they’re wrong — what kind of move do you suggest?’This querying is followed by Spruance glancing to a particular point on the map (Fig. 9), then a cut to a shot of models representing the aircraft carriers Hornet, Enterprise & Yorktown (Fig. 10). This is one of the few model/map shots unaccompanied by dialogue or exposition. In effect, this shot shows Spruance’s thought process before he responds: strategic thought presented via cinematography. Spruance then suggests situating the American carrier group just northeast of Midway, in case the Japanese target is actually the West Coast of the United States. It is, in effect, a hedging of bets. Spruance’s positioning of the carrier group also projects that group’s sphere of influence around Midway atoll and north to essentially cut off Japanese access to the US. The fleet-in-being is presented graphically — on the map — in order to, once again, cue the audience to match the later (edited) images of the battle to these strategic musings.In summary, in Midway, the map is an element of production design that works alongside cinematography, editing, and performance to present the notion of strategic thought to the audience. In addition, and crucially, it functions as an abstraction of strategy that prepares the audience for the cinematic disorientation that will occur through montage as the actual battle rages later in the film. Figure 8.Figure 9.Figure 10.This essay has argued that the battle-map is a simulacrum of the weakest kind: what Baudrillard would call ‘simulacra of simulation, founded on information, the model’ (121). Just as cinema itself offers a distorted view of history (the war film, in particular, tends to hagiography), the battle-map is an over-simplification that fails to capture the physical and psychological realities of conflict. We have also argued that in both Patton and Midway, the map is not a ‘free’ motif (Tomashevsky 69). Rather, it is bound: a central thematic device. In the two films, the battle-map emerges as a crucial isomorphic element. On the one hand, it features as a prop to signify command and to relay otherwise complex strategic plottings. At this syntagmatic level, it functions alongside cinematography, editing, and performance to give audiences a glimpse into how military strategy is formed and tested: a traditional ‘reading’ of the map. But on the flip side of what emerges as a classic structuralist binary, is the map as a device of foreshadowing (especially in Midway) and as a depiction of command’s profound limitations. Here, at a paradigmatic level, along a new axis of combination, a new reading of the map in war cinema is proposed: the battle-map is as much a sign of the subjective as it is the objective.ReferencesBasinger, Jeanine. The World War II Combat Film: Anatomy of a Genre. Middletown, CT: Columbia UP, 1986.Baudrillard, Jean. Simulacra and Simulation. Ann Arbour: U of Michigan Press, 1994.Bender, Stuart. Film Style and the World War II Combat Genre. Newcastle upon Tyne: Cambridge Scholars Publishing, 2013.Clausewitz, Carl. On War. Vol. 1. London: Kegan Paul, 1908.Colomb, Philip Howard. Naval Warfare: Its Ruling Principles and Practice Historically Treated. 3rd ed. London: W.H. Allen & Co, 1899.Culler, Jonathan. Structuralist Poetics. London: Routledge & Kegan Paul, 1975.Deleuze, Gilles. Cinema 2: The Time-Image. London: Continuum, 2005.Eichenbaum, Boris. The Young Tolstoi. Ann Arbor: Ardis, 1972.Goffman, Erving. Frame Analysis. Cambridge, MA: Harvard UP, 1976.Jakobson, Roman. "Linguistics and Poetics." Style in Language. Ed. T. Sebebeok. Cambridge, MA: MIT, 1960. 350—77.Langford, Michelle. Allegorical Images: Tableau, Time and Gesture in the Cinema of Werner Schroeter. Bristol: Intellect, 2006.Midway. Jack Smight. Universal Pictures, 1976. Film.Patton. Franklin J. Schaffner. 20th Century Fox, 1970. Film.Schulten, Susan. World War II Led to a Revolution in Cartography. New Republic 21 May 2014. 16 June 2017 <https://newrepublic.com/article/117835/richard-edes-harrison-reinvented-mapmaking-world-war-2-americans>.Tolstoy, Leo. War and Peace. Vol. 2. London: Folio, 1997.Tomashevsky, Boris. "Thematics." Russian Formalist Criticism: Four Essays. Eds. L. Lemon and M. Reis, Lincoln: U. Nebraska Press, 2012. 61—95.Tzu, Sun. The Art of War. San Diego: Canterbury Classics, 2014.Virilio, Paul. Speed and Politics. Paris: Semiotext(e), 2006.Virilio, Paul. War and Cinema: The Logistics of Perception. London: Verso, 1989.
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Paterson, Amy. "The Melancholic Mermaid by K. George." Deakin Review of Children's Literature 1, no. 4 (April 16, 2012). http://dx.doi.org/10.20361/g2759z.

Повний текст джерела
Анотація:
George, Kallie. The Melancholic Mermaid. Illus. Abigail Halpin. Vancouver: Simply Read Books, 2010. Print. Upon reading a plot summary of Kallie George’s The Melancholic Mermaid, you might first wonder if you’ve read the book before. Humans befriending mermaids, outsiders uniting, and children learning that their differences make them special are all plots that have been told and retold in a variety of mediums. It will be no surprise to readers that, though Maude the two-tailed mermaid has twice the speed, twice the strength, and twice the grace, these same qualities isolate her from the other mer-children. Similarly, when two-legged Tony’s webbed hands are revealed, an unlikely friendship with Maude is inevitable. However, while the plot and themes rarely venture outside established cliché, there are two aspects of The Melancholic Mermaid that not only make it well worth the read but push it over and above similar fare. Firstly, George’s poetic rhythms perfectly capture the lulling melancholy of the seashore. At times, she dances the line between poetry and prose, evoking the rolling tides of a calm day at the beach. Of particular note is her command of alliteration, which when well-executed, rarely fails to captivate children and draw them into a fairy tale world. Secondly, Abigail Halpin’s illustrations are positively breathtaking. Her use of colour, space, and contrast are all wonderful to behold and do a remarkable job of highlighting the settings and mood of George’s story. While the scenes on land are depicted in vibrant purples and reds, the seashore is dominated by calm and subtle shades of blue and green. If you are the type to choose a book by its cover, The Melancholic Mermaid should most certainly be a popular choice. The high quality of the illustrations make The Melancholic Mermaid a great book for beginning readers to grow into, and it will be ideally suited for children transitioning from picture books into shorter chapter books. While the story features both male and female protagonists, it will most likely hold a broader appeal for girls than for boys. Recommended: 3 out of 4 starsReviewer: Amy Paterson Amy Paterson is a Public Services Librarian at the University of Alberta’s H. T. Coutts Education Library. She was previously the Editor of the Dalhousie Journal of Interdisciplinary Management and is very happy to be involved in the Deakin Review and the delightful world of children’s literature.
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Cerratto, Teresa. "Chatting to Learn and Learning to Chat." M/C Journal 3, no. 4 (August 1, 2000). http://dx.doi.org/10.5204/mcj.1866.

Повний текст джерела
Анотація:
If we consider learning as a meaning-making process where people construct shared knowledge, it becomes a social dialogical activity in which knowledge is the result of an active process of articulation and reflection within a context (Jonassen et al.). An important element of this belief is that conversation is at the core of learning because knowledge is language-mediated. Within this context, what makes a conversation worthwhile and meaningful is how it is structured, how it is managed by the participants, and most importantly, how it is understood. In particular, conversation is essential in learning situations where the main goal is to generate a new understanding of the world (Bruner). Thus, if conversations can be seen as support for learning processes, the question then becomes how synchronous textual spaces mediate conversation and how chat affects learning. Experienced Teachers Learning in a Collaborative Virtual Environment We studied two different groups of experienced teachers from Kindergarten to Grade 12 (K-12) attending a Master of Education course entitled "Curriculum and Instruction". They communicated through a collaborative virtual environment (CVE) designed to enhance teachers' professional development: TAPPED IN™ (TI). We recorded their on-line conversations over six weeks. The teachers met twice a week for a two hour session and the data collected consisted of approximately 350-400 pages of text from transcripts. The following concerns, gleaned from an ongoing analysis of on-line conversations are of interest for this paper: The first concern has to do with the ability of teachers to concentrate on a task while managing multiple simultaneous conversations. The question is how to maintain the focus on the purpose of the goal oriented task. The second concern is related to the technical characteristics of a CVE and the teachers' feelings of being lost, too slow, or not understanding the point of the discussion. The question is how to deal with this confusion when the aim is to construct meanings from online discussion? The third concern is related the preceding points. It is concerned with the importance of a leader coaching and guiding experienced teachers online. We examined these three concerns, using TI during the teachers' on line discussions. Our primary goal in the analysis was to determine i) whether the teachers could conduct their learning activities through TI and ii) how goal-oriented conversations might be affected by the constraints of TI. The following examples come from a personal recorder. Messages are numbered in order to show their position in the session and to show the distance between the messages sent. Implications of Multitasking in Learning Sessions In CVEs, participants have the possibility of performing several tasks simultaneously (Holmevik). This is especially true when participants hold more than one conversation at a time. Participants can talk to one person or to the whole group while also chatting privately with people in the same CVE's room, in the same CVE or even in other CVEs. But the possibility of being able to participate in multiple conversations becomes potentially confusing and disorienting for teachers wanting to achieve a specific task. Let us give an example of how a main task (e.g. to share notes of pedagogical projects -- task 1) fragments into different tasks (e.g. learning a command -- how to create a note -- task 2; and socialise, express feelings and play with cows -- task 3). (Note that the students are in fact experienced teachers and a teacher is leading the session. The goal of the on-line session is to read and discuss the different educational projects that the students should have written in virtual notes.) The goal of the task became difficult to accomplish for teachers who were suddenly involved in more than one task at a time. In order to understand what is going on in this situation, participants had to accomplish extra work. They needed to filter messages and rank them to make the main objective of the session clear. In a goal-oriented session such as this, it is extremely important to keep track of the task as well as to concentrate on one activity at time. This entails a necessity to understand current threads in order to contribute to the object of interest for them as individuals and as a group member. Implications of Multi Threads and Floor-Taking in Goal-Oriented Conversations Perseverance with each message creates a parallelism that can become extremely disorienting to participants who intend to produce new understandings and not just maintain an awareness during on-line conversations. The larger the number of participants in a conversation, the more likely it is for fragmentation to occur. The jumbled and quickly scrolling screen can be quite disconcerting. Yet as mentioned by Mynatt et al., even between two participants, multi-threading is common due to the overlapping composition of conversational turns. Participants write simultaneously and the host computer sends the messages out sequentially. Under these conditions, competing conversational threads emerge continuously. It becomes difficult to know who actually holds the floor at the time. Here is an example showing a teacher -- student 2 -- looking for attention and trying to read and understand others' answers to his questions: Student 2 did not read message 26 sent from the teacher with care. In fact, the teacher did explain that there is a part in the assignment where students have to meet in order to exchange ideas about individual projects. Yet although S2's question was answered, S2 still did not understand. A possible reason is that S2 could have been focussed on writing the next question. Again, the teacher answered the question asked in message 29. However, S2 still did not understand in spite of S15 and S6 confirming that the teacher had already covered the question. Student 2 finally understood when the teacher addressed him directly and repeated what the other students had said before. In order to be heard, the students repeated their questions until they had the answer from the teacher. With more than a handful of participants, this attention seeking strategy may make on-line conversations confusing. Goal-oriented conversations then easily degenerate, as mentioned by Colomb and Simutis. These authors point out that one of the most common problems in using CMC is keeping students on task. Even experienced teachers do not escape from the possibility of converting from an instrumental discussion to a social one due to different misunderstanding between interlocutors. To be able to 'send' a message is not equivalent to claiming the 'floor'. An important extra task that teachers have to do in CVEs before sending a message is to think about how it meets the goal of the discussion. Looking for coherence and understanding is a must in learning situations and this becomes a great challenge in online learning sessions. On the other hand, different modalities of communication in CVEs may add richness and depth to online conversations when participants can anticipate constraints. Consider another group of teachers. They are discussing readings, and make great use of multiple modalities, such as gestures, to reframe misunderstandings. These gestures provide back channel information and other visual signs. Here is one example of what a group of teachers does in order to avoid embarrassing situations. As Mynatt et al. express, "the availability of multiple modalities gives complexity to the interactional rhythm, because people have choices about what modality to use at any particular moment and for any set of conversation partners" (138). Given these pros and cons of CVEs, the challenge of holding an on-line educational discussion requires the teachers to reestablish the context and control the underlying the sense of the conversation. This challenge could be also regarded as an exigency of the medium that 'invites' teachers to structure their conversations in order to encourage meaningful discussions. Importance of a Teacher of Teachers The problems mentioned earlier may be solved more easily when there is a leader at hand. Since these difficulties mainly arise at the start of learning the communication environment, it might be proposed that a leader is most critical in this phase. A comparison of two groups' interactions with and without a leader supports the intuition that a leader is crucial for keeping the learning on track even though the participants are experienced teachers. In this example, the task that the group performed was the same: "learning to attach an icon to their ellipses representing their presence in the system". Table 1. Data related to groups with and without a teacher Groups Learners Icons attached Messages produced Time employed 1. Without leader 12 0 549 56 min 8 sec 2. With leader 9 4 644 1h 27min 52 sec Fig. 1 Comparing flow and categories of the messages sent by the groups These frequencies confirm that teachers without a leader have more problems than the group with a leader. The number of successful icons attached by the groups (0 and 4 icons) demonstrates this claim. What happens is that the number of messages related to 'Task' decrease and those related to 'Relation' increase when there is no leader present -- a result which would be unsurprising among most people who have worked in 'real' classrooms. Messages produced and coded as 'Playing' and 'Feedback' also show a considerable difference between groups. Finally, categories such as 'Whisper' and 'Artifact' present in comparison to the others minimal differences between groups. A leader is a must for the smooth development of on-line conversation. The leader is a sort of mediator between the pedagogical task of the on-line conversation and what appears on the screen. The leader's task is to show which threads are important to follow or not and how messages should be read on the screen. Like an orchestra conductor, the leader coordinates tasks and makes sense of individual actions which are part of a common product and the quality of the on-going conversation. Discussion This ongoing research has demonstrated three important concerns surrounding experienced teachers' professional use of CVE. First, teachers chatting online have to anticipate the lack of assurance "that what gets sent gets read" and that gaining the floor in a CVE is "that one's message draws a response and in some way affect the direction of a current thread" (Colomb and Simutis). Teachers have to learn to negotiate turn-taking sequences behind the screen. When chatting, a person's intention to speak is not signalled. Overlapping and interruptions do not exist and non-verbal communication requires knowledge of gesture commands. Negotiating turns in online conversations is concerned with how people express information and what they express. In educational discussion, turns are generally taken when messages either present a good formulation of ideas, express controversial thinking, raise an issue that allows someone else to participate, or provide knowledge on the topic at hand. Second, teachers should learn to collaborate in online conversations. It is essential to be aware that people are writing a text while they discuss. The quality of the conversation will depend on one hand, how teachers manage the discussion and, on the other hand, the opinions they elaborate together. Third, teachers need leaders in online discussions. A leader has to be able to anticipate the text that the participants are writing. The leader has the responsibility of meeting pedagogical goals with a participant's messages. The leader has to show the coherence or incoherence of the discussion and raise issues that improve the level of the written interaction. These issues are extremely important in a context where people learn through conversations. As Laurillard has mentioned, "academic knowledge relies heavily on symbolic representation as the medium through which it is known. ... Students have to learn to handle the representations system as well as the ideas they represent" (27). Therefore, it is necessary that learners know and think about the rules of online discussion in order to adapt technical commands and effects to their needs. But these rules are in contrast to what participants expect from online conversations. Teachers want to perform their tasks with support of a computer program; they do not want to learn the computer program per se. CMC in learning activities must be based, not on visionary claims about technology as an all-purpose tool for automatic teaching/learning, but on specific accounts of how and why the technology affects the user's achievement of specific goals. Acknowledgements This study has been supported by a grant from the Swedish Transport & Communication Research Board. We wish to express our gratitude to Judi Fusco, who, in several ways, has been a bridge between the TI community and us. We also want to thank the teachers, CharlesE and FlorenceE, for having the courage of letting Tessy 'sit in' on the sessions. The 'expert' session was lead by TerryG, whom we also want to thank for her generosity. Susan Wildermuth came to us in the final spurt, and we owe her much for the reliability check, structuring of ideas, and hints about related research. Finally, all students struggling with TI are thanked for their willingness to participate in this study. References Cherny, L. Conversation and Community. Chat in a Virtual World. California: CSCLI Ed, 1999. Colomb, and Simutis. "Visible Conversations and Academic Inquiry: CMC in a Culturally Diverse Classroom." Computer-Mediated Communication: Linguistic, Social and Cross-Cultural Perspectives. Ed. Susan Herring. Philadelphia: John Benjamins, 1996. 203-24. Bruner, Jerome. Acts of Meanings. Cambridge, MA: Harvard UP, 1990. Holmevik, J., and C. Haynes. MOOniversity. A Student's Guide to Online Learning Environments. Boston: Allyn and Bacon, 2000. Jonassen, D., et al. "Constructivism and Computer-Mediated Communication." Distance Education 9.2 (1992): 7-25. Laurrillard, Diana. Rethinking University Teaching: A Framework for the Effective Use of Educational Technology. London: Routledge, 1994. Mynatt, E. D., et al. "Network Communities: Something Old, Something New, Something Borrowed." Computer Supported Cooperative Work: The Journal of Collaborative Computing 7.1-2 (1998): 123-56. Schlager, M., J. Fusco, and P. Schank. "Evolution of an On-line Education Community of Practice." Building Virtual Communities: Learning and Change in Cyberspace. Ed. K. Ann Renninger and W. Shumar. NY: Cambridge UP, 2000. Wærn, Yvonne. "Absent Minds -- On Teacher Professional Development." Journal of Courseware Studies 22 (1999): 441-55. Citation reference for this article MLA style: Teresa Cerratto, Yvonne Wærn. "Chatting to Learn and Learning to Chat in Collaborative Virtual Environments." M/C: A Journal of Media and Culture 3.4 (2000). [your date of access] <http://www.api-network.com/mc/0008/learning.php>. Chicago style: Teresa Cerratto, Yvonne Wærn, "Chatting to Learn and Learning to Chat in Collaborative Virtual Environments," M/C: A Journal of Media and Culture 3, no. 4 (2000), <http://www.api-network.com/mc/0008/learning.php> ([your date of access]). APA style: Teresa Cerratto, Yvonne Wærn. (2000) Chatting to learn and learning to chat in collaborative virtual environments. M/C: A Journal of Media and Culture 3(4). <http://www.api-network.com/mc/0008/learning.php> ([your date of access]).
Стилі APA, Harvard, Vancouver, ISO та ін.
40

"A Study on Choi Chi-won's <Seocheon-naseongdogi(西川羅城圖記)>". Daedong Hanmun Association 79 (30 червня 2024): 267–311. http://dx.doi.org/10.21794/ddhm.2024.79.267.

Повний текст джерела
Анотація:
Along with <Boannamrok-idogi(補安南錄異圖記)>, Choi Chi-won's <Seocheon-naseongdogi(西川羅城圖記)>, is the oldest recording documents in existence and the only clue to examine the characteristics of the recording documents written during his stay in Tang Dynasty, and in this regard, a precise analysis for each of Choi Chi-won's works is required. Not only this, but the significance of <Seocheon-naseongdogi> is not small in that it can enhance the historical understanding of the Seocheon Naseong(西川羅城), which does not remain today. This paper started from the problematic awareness that despite the fact that <Seocheon-naseongdogi> hold an important position in literature as well as recording documents, its aesthetic value has not been fully explored. This paper clarifies the background of the construction of Seocheon Naseong and discusses deeply the narrative characteristics of <Seocheon-naseongdogi> that are differentiated from other fortress wall construction recording documents. Gobyeon(高騈, 821~887) built a larger fortress wall outside the old fortress to prevent Chengdu from the invasion of Namjo Kingdom, in the third year of the reign of Emperor Geonbu (876), the next year after his appointment as governor in military forces in Seocheon. When Gobyeon reported the completion of the construction of fortress by dedicating the <Seocheon-Naseongdo> depicting the image of fortress wall, Emperor Heejong of Tang Dynasty was very impressed and had Wanghui (王徽), an chief officer in Hallim Academy (818~891) write a writing commending his merits and engrave the words on the monument for his achievements. On the other hand, Choi Chi-won was the local governor in Yulsoo county, Seonjoo in the third year of the reign of Emperor Gyeonbu (876) and entered under the wing of Gobyeon in the first year of the reign of Emperor Gwangmyeong (880). So he was not under the command of Gobyeon at the time of the construction of Seocheon Naseong. In the third year of the reign of Emperor Chunghwa (883), Choi Chi-won read the <Seocheon-naseongdo> and wrote the inscription on his <Seocheon-Naseongdogi>, to record the historical site. The narrative characteristics of <Seocheon-naseongdogi> can be divided into the following three categories. The first is to focus on the description object, the second is to expand the scene by delaying the development of the narrative, and the third is to secure narrative completeness through detailed description. Through this, the narrative focuses on the event of 'Naseong Construction' and focuses on the process and outcome, but delays the pace of the narrative in the scene that he wants to emphasize and expresses it visually as if showing a video. In terms of the connection between the scenes, the probability of the incident was secured by mentioning the construction of the fortress in advance, and by presenting specific information such as proper names in the text through the self footnote without directly exposing them, it had both literary charm and the documentary qualities of the inscription. In addition, by describing in detail the process from the dedication of <Seocheon-naseongdo> to the erection of the monument, it enhanced the narrative completeness and performed the function of filling in the historical gaps. In short, <Seocheon-naseongdogi> focuses on the record of facts, but it also leaves room for it to be savored as a literary work.
Стилі APA, Harvard, Vancouver, ISO та ін.
41

El-Nimr, Nessrin A., and Iman Wahdan. "Identifying children with Special Health Care Needs in Alexandria, Egypt." Online Journal of Public Health Informatics 11, no. 1 (May 30, 2019). http://dx.doi.org/10.5210/ojphi.v11i1.9793.

Повний текст джерела
Анотація:
ObjectiveTo test the feasibility of using an Arabic version of CSHCN Screener in identifying CSHCN in the Egyptian setup and to estimate the prevalence of CSHCN among children aged 6-14 years in Alexandria, Egypt using the Arabic version of the CSHCN Screener.IntroductionChildren with special health care needs (CSHCN) are defined as: “those who have or are at increased risk for a chronic physical, developmental, behavioural, or emotional condition and who also require health and related services of a type or amount beyond that required by children generally.” (1) The care of CSHCN is a significant public health issue. These children are medically complex, require services and supports well beyond those that typically developing children require, and command a considerable proportion of the pediatric health care budget. (2)Different tools were used to identify CSHCN. (3, 4) One of them is the CSHCN screener (5) which uses a non-condition specific approach that identifies children across a range and diversity of childhood chronic conditions and special needs. (6) It identifies children with elevated or unusual needs for health care or educational services due to a chronic health condition. It focuses on health consequences a child experiences as a result of having an ongoing health condition rather than on the presence of a specific diagnosis or type of disability. It allows a more comprehensive assessment of the performance of the health care system than is attainable by focusing on a single diagnosis. (7) The CSHCN screener is only available in English and Spanish. (8)In developing countries, obtaining reliable prevalence rates for CSHCN is challenging. Sophisticated datasets associated with governmental services and high quality research studies are less common due to fewer resources. Egypt has no screening or surveillance systems for identifying CSHCN. (9)MethodsA community based survey was conducted among a representative sample of children aged 6-14 years from the 8 health districts of Alexandria, Egypt using a multistage cluster sampling technique. The final sample amounted to 501 children from 405 families. Data about the children and their families were collected by interviewing the mothers of the selected children using a pre-designed interviewing questionnaire. The questionnaire included their personal and family characteristics in addition to the Arabic translation of CSHCN screener. Permission to translate the questionnaire into the Arabic language was obtained from the Child and Adolescent Health Measurement Initiative. Validation and cultural adaptation of the translated CSHCN screener were done. The survey questions were generally understandable by Arabic speakers. As for the screener questions, the Arabic translation was straightforward and clear. The difference between the Arabic translation for the words “health conditions” and “medical conditions” in the 1st follow up questions was not clear for the respondents and the interviewers had to give an explanation for the two terms to help the respondents. So, it was easier for the respondents to answer the screener questions than the follow up questions.ResultsOut of the 501 children included in the study, 61 were identified by the screener to be CSHCN, making a prevalence of CSHCN of 12.2%. The prevalence of children with dependency on prescription medicine was 11.8%, while the prevalence of children with service use above that considered usual or routine was 11.8%. The prevalence of children with functional limitations was 12%. Among these domains, in almost all children, the reason was a medical, behavioral or health condition (98.3%) and the condition has continued or is expected to continue for at least 12 months in all children. Among CSHCN, the majority (91.8%) had these three domains combined.Sensory impairments ranked first among the most prevalent conditions requiring special health care with a prevalence of 2.8% which represented 23% of the conditions, followed by cognitive impairments with a prevalence of 2% representing 16.4% of all conditions requiring special health care. Impaired mobility was the third most common condition requiring special care with a prevalence of 1.8%.The table shows that CSHCN were more likely to be in the younger age group (6-<10 years), to be males, to be the first in order among their siblings and to have an illiterate or just read and write father. On the other hand, CSHCN were less likely to have a university educated mother, to be living with both parents and to be from a family without an enough income. The only significant factor was the type of family (cOR=0.88, 95% CI = 0.85-0.91).ConclusionsThe study showed the feasibility to use the CSHCN screener in the Egyptian National health care services to easily identify the majority of children that need to be the focus of the National health care services. It could also be an easy tool to assess the quality of the ongoing school health programs in responding to the overall needs of school children.With the present Egyptian policy of reform giving special attention to people in need particularly sensitive groups such as school children, it is therefore recommended that the school health services, in addition to the ongoing diagnostic, preventive and curative services add an additional measure, namely the screener for CSHCN, which is a simple easily administered screening tool which will also assist to depict existing gaps in the health care system to ensure being comprehensive.ReferencesMcPherson M, Arango P, Fox C, et al. A new definition of children with special health care needs. Pediatrics 1998;102:137-40.Goldson E, Louch G, Washington K, et al. Guidelines for the care of the child with special health care needs. Adv Pediatr 2006;53:165-82.Newacheck PW, Strickland B, Shonkoff JP, et al. An epidemiologic profile of children with special health care needs. Pediatrics 1998;102:117-23.Stein REK, Silver EJ. Operationalizing a conceptually based noncategorical definition. A first look at U.S. children with chronic conditions. Arch Pediatr Adolesc Med 1999;153:68-74.Child and Adolescent Health Measurement Initiative. The children with special health care needs (CSHCN) screener. Baltimore: CAHMI; 1998. 10p.Child and adolescent initiative. Who are children with special health care needs (CSHCN). Baltimore: CAHMI; 2012. 2p.Bethell CD, Read D, Neff J, et al. Comparison of the children with special health care needs screener to the questionnaire for identifying children with chronic conditions–revised. Ambul Pediatr 2002;2:49-57.Read D, Bethell C, Blumberg SJ, et al. An evaluation of the linguistic and cultural validity of the Spanish language version of the children with special health care needs screener. Matern Child Health J 2007;11(6):568-85.Kennedy P, editor. The Oxford Handbook of Rehabilitation Psychology. Oxford, New York: Oxford University Press; 2012.
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Ribas-Segura, Catalina. "Pigs and Desire in Lillian Ng´s "Swallowing Clouds"." M/C Journal 13, no. 5 (October 17, 2010). http://dx.doi.org/10.5204/mcj.292.

Повний текст джерела
Анотація:
Introduction Lillian Ng was born in Singapore and lived in Hong Kong and the United Kingdom before migrating to Australia with her daughter and Ah Mah Yin Jie (“Ah Mahs are a special group of people who took a vow to remain unmarried … [so they] could stick together as a group and make a living together” (Yu 118)). Ng studied classical Chinese at home, then went to an English school and later on studied Medicine. Her first book, Silver Sister (1994), was short-listed for the inaugural Angus & Robertson/Bookworld Prize in 1993 and won the Human Rights Award in 1995. Ng defines herself as a “Chinese living in Australia” (Yu 115). Food, flesh and meat are recurrent topics in Lillian Ng´s second novel Swallowing Clouds, published in 1997. These topics are related to desire and can be used as a synecdoche (a metaphor that describes part/whole relations) of the human body: food is needed to survive and pleasure can be obtained from other people´s bodies. This paper focuses on one type of meat and animal, pork and the pig, and on the relation between the two main characters, Syn and Zhu Zhiyee. Syn, the main character in the novel, is a Shanghainese student studying English in Sydney who becomes stranded after the Tiananmen Square massacre of June 1989. As she stops receiving money from her mother and fears repression if she goes back to China, she begins to work in a Chinese butcher shop, owned by Zhu Zhiyee, which brings her English lessons to a standstill. Syn and Zhu Zhiyee soon begin a two-year love affair, despite the fact that Zhu Zhiyee is married to KarLeng and has three daughters. The novel is structured as a prologue and four days, each of which has a different setting and temporal location. The prologue introduces the story of an adulterous woman who was punished to be drowned in a pig´s basket in the HuanPu River in the summer of 1918. As learnt later on, Syn is the reincarnation of this woman, whose purpose in life is to take revenge on men by taking their money. The four days, from the 4th to the 7th of June 1994, mark the duration of a trip to Beijing and Shanghai that Syn takes as member of an Australian expedition in order to visit her mother with the security of an Australian passport. During these four days, the reader learns about different Chinese landmarks, such as the Forbidden City, the Great Wall, the Ming Tomb and the Summer Palace, as well as some cultural events, such as a Chinese opera and eating typical foods like Peking duck. However, the bulk of the plot of the book deals with the sexual relationship, erotic games and fantasies of Syn and Zhu Zhiyee in the period between 1989 and 1992, as well as Syn´s final revenge in January 1993. Pigs The fact that Zhu Zhiyee is a butcher allows Lillian Ng to include references to pigs and pork throughout the novel. Some of them refer to the everyday work of a butcher shop, as the following examples illustrate: “Come in and help me with the carcass,” he [Zhu Zhiyee] pointed to a small suckling pig hung on a peg. Syn hesitated, not knowing how to handle the situation. “Take the whole pig with the peg,” he commanded (11).Under dazzling fluorescent tubes and bright spotlights, trays of red meat, pork chops and lamb cutlets sparkled like jewels … The trays edged with red cellophane frills and green underlay breathed vitality and colour into the slabs of pork ribs and fillets (15).Buckets of pig´s blood with a skim of froth took their place on the floor; gelled ones, like sliced cubes of large agate, sat in tin trays labelled in Chinese. More discreetly hidden were the gonads and penises of goats, bulls and pigs. (16)These examples are representative of Syn and Zhu Zhiyee´s relationship. The first quotation deals with their interaction: most of the time Zhu Zhiyee orders Syn how to act, either in the shop or in bed. The second extract describes the meat’s “vitality” and this is the quality of Syn's skin that mesmerised Zhu when he met her: “he was excited, electrified by the sight of her unblemished, translucent skin, unlined, smooth as silk. The glow of the warmth of human skin” (13). Moreover, the lights seem to completely illuminate the pieces of meat and this is the way Zhu Zhiyee leers at Syn´s body, as it can be read in the following extract: “he turned again to fix his gaze on Syn, which pierced and penetrated her head, her brain, eyes, permeated her whole body, seeped into her secret places and crevices” (14). The third excerpt introduces the sexual organs of some of the animals, which are sold to some customers for a high price. Meat is also sexualised by Zhu Zhiyee´s actions, such as his pinching the bottoms of chickens and comparing them with “sacrificial virgins”: “chickens, shamelessly stripped and trussed, hung by their necks, naked in their pimply white skin, seemed like sacrificial virgins. Syn often caught Zhu pinching their fleshy bottoms, while wrapping and serving them to the housewives” (15-16). Zhu also makes comments relating food with sex while he is having lunch next to Syn, which could be considered sexual harassment. All these extracts exemplify the relationship between Syn and Zhu Zhiyee: the orders, the looks and the implicit sexuality in the quotidian activities in the butcher´s shop. There are also a range of other expressions that include similes with the word `pig´ in Ng´s novel. One of the most recurrent is comparing the left arm and hand of Zhu Zhiyee´s mother with a “pig´s trotter”. Zhu Zhiyee´s mother is known as ZhuMa and Syn is very fond of her, as ZhuMa accepts her and likes her more than her own daughter-in-law. The comparison of ZhuMa´s arm and hand with a trotter may be explained by the fact that ZhuMa´s arm is swollen but also by the loving representation of pigs in Chinese culture. As Seung-Og Kim explains in his article “Burials, Pigs, and Political Prestige in Neolithic China”: In both Melanesia and Asia, pigs are viewed as a symbolic representation of human beings (Allen 1976: 42; Healey 1985; Rappaport 1967: 58; Roscoe 1989: 223-26). Piglets are treated as pets and receive a great deal of loving attention, and they in turn express affection for their human “parents.” They also share some physiological features with human beings, being omnivorous and highly reproductive (though humans do not usually have multiple litters) and similar internal anatomy (Roscoe 1989: 225). In short, pigs not only have a symbiotic relationship with humans biologically but also are of great importance symbolically (121). Consequently, pigs are held in high esteem, taken care of and loved. Therefore, comparing a part of a human´s body, such as an arm or a hand, for example, to a part of a pig´s body such as a pig´s trotter is not negative, but has positive connotations. Some descriptions of ZhuMa´s arm and hand can be read in the following excerpts: “As ZhuMa handed her the plate of cookies Syn saw her left arm, swollen like a pig´s trotter” (97); “Syn was horrified, and yet somewhat intrigued by this woman without a breast, with a pig´s trotter arm and a tummy like a chessboard” (99), “mimicking the act of writing with her pig-trotter hand” (99), and ZhuMa was praising the excellence of the opera, the singing, acting, the costumes, and the elaborate props, waving excitedly with her pig trotter arm and pointing with her stubby fingers while she talked. (170) Moreover, the expression “pig´s trotters” is also used as an example of the erotic fetishism with bound feet, as it can be seen in the following passage, which will be discussed below: I [Zhu Zhiyee] adore feet which are slender… they seem so soft, like pig´s trotters, so cute and loving, they play tricks on your mind. Imagine feeling them in bed under your blankets—soft cottonwool lumps, plump and cuddly, makes you want to stroke them like your lover´s hands … this was how the bound feet appealed to men, the erotic sensation when balanced on shoulders, clutched in palms, strung to the seat of a garden swing … no matter how ugly a woman is, her tiny elegant feet would win her many admirers (224).Besides writing about pigs and pork as part of the daily work of the butcher shop and using the expression “pig´s trotter”, “pig” is also linked to money in two sentences in the book. On the one hand, it is used to calculate a price and draw attention to the large amount it represents: “The blouse was very expensive—three hundred dollars, the total takings from selling a pig. Two pigs if he purchased two blouses” (197). On the other, it works as an adjective in the expression “piggy-bank”, the money box in the form of a pig, an animal that represents abundance and happiness in the Chinese culture: “She borrowed money from her neighbours, who emptied pieces of silver from their piggy-banks, their life savings”(54). Finally, the most frequent porcine expression in Ng´s Swallowing Clouds makes reference to being drowned in a pig´s basket, which represents 19 of the 33 references to pigs or pork that appear in the novel. The first three references appear in the prologue (ix, x, xii), where the reader learns the story of the last woman who was killed by drowning in a pig´s basket as a punishment for her adultery. After this, two references recount a soothsayer´s explanation to Syn about her nightmares and the fact that she is the reincarnation of that lady (67, 155); three references are made by Syn when she explains this story to Zhu Zhiyee and to her companion on the trip to Beijing and Shanghai (28, 154, 248); one refers to a feeling Syn has during sexual intercourse with Zhu Zhiyee (94); and one when the pig basket is compared to a cricket box, a wicker or wooden box used to carry or keep crickets in a house and listen to them singing (73). Furthermore, Syn reflects on the fact of drowning (65, 114, 115, 171, 172, 173, 197, 296) and compares her previous death with that of Concubine Pearl, the favourite of Emperor Guanxu, who was killed by order of his aunt, the Empress Dowager Cixi (76-77). The punishment of drowning in a pig´s basket can thus be understood as retribution for a transgression: a woman having an extra-marital relationship, going against the establishment and the boundaries of the authorised. Both the woman who is drowned in a pig´s basket in 1918 and Syn have extra-marital affairs and break society’s rules. However, the consequences are different: the concubine dies and Syn, her reincarnation, takes revenge. Desire, Transgression and Eroticism Xavier Pons writes about desire, repression, freedom and transgression in his book Messengers of Eros: Representations of Sex in Australian Writing (2009). In this text, he explains that desire can be understood as a positive or as a negative feeling. On the one hand, by experiencing desire, a person feels alive and has joy de vivre, and if that person is desired in return, then, the feelings of being accepted and happiness are also involved (13). On the other hand, desire is often repressed, as it may be considered evil, anarchic, an enemy of reason and an alienation from consciousness (14). According to Pons: Sometimes repression, in the form of censorship, comes from the outside—from society at large, or from particular social groups—because of desire´s subversive nature, because it is a force which, given a free rein, would threaten the higher purpose which a given society assigns to other (and usually ideological) forces … Repression may also come from the inside, via the internalization of censorship … desire is sometimes feared by the individual as a force alien to his/her true self which would leave him/her vulnerable to rejection or domination, and would result in loss of freedom (14).Consequently, when talking about sexual desire, the two main concepts to be dealt with are freedom and transgression. As Pons makes clear, “the desiring subject can be taken advantage of, manipulated like a puppet [as h]is or her freedom is in this sense limited by the experience of desire” (15). While some practices may be considered abusive, such as bondage or sado-masochism, they may be deliberately and freely chosen by the partners involved. In this case, these practices represent “an encounter between equals: dominance is no more than make-believe, and a certain amount of freedom (as much as is compatible with giving oneself up to one´s fantasies) is maintained throughout” (24). Consequently, the perception of freedom changes with each person and situation. What is transgressive depends on the norms in every culture and, as these evolve, so do the forms of transgression (Pons 43). Examples of transgressions can be: firstly, the separation of sex from love, adultery or female and male homosexuality, which happen with the free will of the partners; or, secondly, paedophilia, incest or bestiality, which imply abuse. Going against society’s norms involves taking risks, such as being discovered and exiled from society or feeling isolated as a result of a feeling of difference. As the norms change according to culture, time and person, an individual may transgress the rules and feel liberated, but later on do the same thing and feel alienated. As Pons declares, “transgressing the rules does not always lead to liberation or happiness—transgression can turn into a trap and turn out to be simply another kind of alienation” (46). In Swallowing Clouds, Zhu Zhiyee transgresses the social norms of his time by having an affair with Syn: firstly, because it is extra-marital, he and his wife, KarLeng, are Catholic and fidelity is one of the promises made when getting married; and, secondly, because he is Syn´s boss and his comments and ways of flirting with her could be considered sexual harassment. For two years, the affair is an escape from Zhu Zhiyee´s daily worries and stress and a liberation and fulfillment of his sexual desires. However, he introduces Syn to his mother and his sisters, who accept her and like her more than his wife. He feels trapped, though, when KarLeng guesses and threatens him with divorce. He cannot accept this as it would mean loss of face in their neighbourhood and society, and so he decides to abandon Syn. Syn´s transgression becomes a trap for her as Zhu, his mother and his sisters have become her only connection with the outside world in Australia and this alienates her from both the country she lives in and the people she knows. However, Syn´s transgression also turns into a trap for Zhu Zhiyee because she will not sign the documents to give him the house back and every month she sends proof of their affair to KarLeng in order to cause disruption in their household. This exposure could be compared with the humiliation suffered by the concubine when she was paraded in a pig´s basket before she was drowned in the HuangPu River. Furthermore, the reader does not know whether KarLeng finally divorces Zhu Zhiyee, which would be his drowning and loss of face and dishonour in front of society, but can imagine the humiliation, shame and disgrace KarLeng makes him feel every month. Pons also depicts eroticism as a form of transgression. In fact, erotic relations are a power game, and seduction can be a very effective weapon. As such, women can use seduction to obtain power and threaten the patriarchal order, which imposes on them patterns of behaviour, language and codes to follow. However, men also use seduction to get their own benefits, especially in political and social contexts. “Power has often been described as the ultimate aphrodisiac” (Pons 32) and this can be seen in many of the sexual games between Syn and Zhu Zhiyee in Swallowing Clouds, where Zhu Zhiyee is the active partner and Syn becomes little more than an object that gives pleasure. A clear reference to erotic fetishism is embedded in the above-mentioned quote on bound feet, which are compared to pig´s trotters. In fact, bound feet were so important in China in the millennia between the Song Dynasty (960-1276) and the early 20th century that “it was impossible to find a husband” (Holman) without them: “As women’s bound feet and shoes became the essence of feminine beauty, a fanatical aesthetic and sexual mystique developed around them. The bound foot was understood to be the most intimate and erotic part of the female anatomy, and wives, consorts and prostitutes were chosen solely on the size and shape of their feet” (Holman). Bound feet are associated in Ng’s novel with pig´s trotters and are described as “cute and loving … soft cottonwool lumps, plump and cuddly, [that] makes you want to stroke them like your lover´s hands” (224). This approach towards bound feet and, by extension, towards pig´s trotters, can be related to the fond feelings Melanesian and Asian cultures have towards piglets, which “are treated as pets and receive a great deal of loving attention” (Kim 121). Consequently, the bound feet can be considered a synecdoche for the fond feelings piglets inspire. Food and Sex The fact that Zhu Zhiyee is a butcher and works with different types of meat, including pork, that he chops it, sells it and gives cooking advice, is not gratuitous in the novel. He is used to being in close proximity to meat and death and seeing Syn’s pale skin through which he can trace her veins excites him. Her flesh is alive and represents, therefore, the opposite of meat. He wants to seduce her, which is human hunting, and he wants to study her, to enjoy her body, which can be compared to animals looking at their prey and deciding where to start eating from. Zhu´s desire for Syn seems destructive and dangerous. In the novel, bodies have a price: dead animals are paid for and eaten and their role is the satiation of human hunger. But humans, who are also animals, have a price as well: flesh is paid for, in the form of prostitution or being a mistress, and its aim is satiation of human sex. Generally speaking, sex in the novel is compared to food either in a direct or an indirect way, and making love is constantly compared to cooking, the preparation of food and eating (as in Pons 303). Many passages in Swallowing Clouds have cannibalistic connotations, all of these being used as metaphors for Zhu Zhiyee’s desire for Syn. As mentioned before, desire can be positive (as it makes a person feel alive) or negative (as a form of internal or social censorship). For Zhu Zhiyee, desire is positive and similar to a drug he is addicted to. For example, when Zhu and Syn make delivery rounds in an old Mazda van, he plays the recordings he made the previous night when they were having sex and tries to guess when each moan happened. Sex and Literature Pons explains that “to write about sex … is to address a host of issues—social, psychological and literary—which together pretty much define a culture” (6). Lillian Ng´s Swallowing Clouds addresses a series of issues. The first of these could be termed ‘the social’: Syn´s situation after the Tiananmen Massacre; her adulterous relationship with her boss and being treated and considered his mistress; the rapes in Inner Mongolia; different reasons for having an abortion; various forms of abuse, even by a mother of her mentally handicapped daughter; the loss of face; betrayal; and revenge. The second issue is the ‘psychological’, with the power relations and strategies used between different characters, psychological abuse, physical abuse, humiliation, and dependency. The third is the ‘literary’, as when the constant use of metaphors with Chinese cultural references becomes farcical, as Tseen Khoo notes in her article “Selling Sexotica” (2000: 164). Khoo explains that, “in the push for Swallowing Clouds to be many types of novels at once: [that is, erotica, touristic narrative and popular], it fails to be any one particularly successfully” (171). Swallowing Clouds is disturbing, full of stereotypes, and with repeated metaphors, and does not have a clear readership and, as Khoo states: “The explicit and implicit strategies behind the novel embody the enduring perceptions of what exotic, multicultural writing involves—sensationalism, voyeuristic pleasures, and a seemingly deliberate lack of rooted-ness in the Australian socioscape (172). Furthermore, Swallowing Clouds has also been defined as “oriental grunge, mostly because of the progression throughout the narrative from one gritty, exoticised sexual encounter to another” (Khoo 169-70).Other novels which have been described as “grunge” are Edward Berridge´s Lives of the Saints (1995), Justine Ettler´s The River Ophelia (1995), Linda Jaivin´s Eat Me (1995), Andrew McGahan´s Praise (1992) and 1988 (1995), Claire Mendes´ Drift Street (1995) or Christos Tsiolkas´ Loaded (1995) (Michael C). The word “grunge” has clear connotations with “dirtiness”—a further use of pig, but one that is not common in the novel. The vocabulary used during the sexual intercourse and games between Syn and Zhu Zhiyee is, however, coarse, and “the association of sex with coarseness is extremely common” (Pons 344). Pons states that “writing about sex is an attempt to overcome [the barriers of being ashamed of some human bodily functions], regarded as unnecessarily constrictive, and this is what makes it by nature transgressive, controversial” (344-45). Ng´s use of vocabulary in this novel is definitely controversial, indeed, so much so that it has been defined as banal or even farcical (Khoo 169-70).ConclusionThis paper has analysed the use of the words and expressions: “pig”, “pork” and “drowning in a pig’s basket” in Lillian Ng´s Swallowing Clouds. Moreover, the punishment of drowning in a pig’s basket has served as a means to study the topics of desire, transgression and eroticism, in relation to an analysis of the characters of Syn and Zhu Zhiyee, and their relationship. This discussion of various terminology relating to “pig” has also led to the study of the relationship between food and sex, and sex and literature, in this novel. Consequently, this paper has analysed the use of the term “pig” and has used it as a springboard for the analysis of some aspects of the novel together with different theoretical definitions and concepts. Acknowledgements A version of this paper was given at the International Congress Food for Thought, hosted by the Australian Studies Centre at the University of Barcelona in February 2010. References Allen, Bryan J. Information Flow and Innovation Diffusion in the East Sepic District, Papua New Guinea. PhD diss. Australian National University, Australia. 1976. Berridge, Edward. Lives of the Saints. St Lucia: U of Queensland P, 1995. C., Michael. “Toward a sound theory of Australian Grunge fiction.” [Weblog entry] Eurhythmania. 5 Mar. 2008. 4 Oct. 2010 http://eurhythmania.blogspot.com/2008/03/toward-sound-theory-of-australian.html. Ettler, Justine. The River Ophelia. Sydney: Picador, 1995. Healey, Christopher J. “Pigs, Cassowaries, and the Gift of the Flesh: A Symbolic Triad in Maring Cosmology.” Ethnology 24 (1985): 153-65. Holman, Jeanine. “Bound Feet.” Bound Feet: The History of a Curious, Erotic Custom. Ed. Joseph Rupp 2010. 11 Aug. 2010. http://www.josephrupp.com/history.html. Jaivin, Linda. Eat Me. Melbourne: The Text Publishing Company, 1995. Khoo, Tseen. “Selling Sexotica: Oriental Grunge and Suburbia in Lillian Ngs’ Swallowing Clouds.” Diaspora: Negotiating Asian-Australian. Ed. Helen Gilbert, Tseen Khoo, and Jaqueline Lo. St Lucia: U of Queensland P, 2000. 164-72. Khoo, Tseen; Danau Tanu, and Tien. "Re: Of pigs and porks” 5-9 Aug. 1997. Asian- Australian Discussion List Digest numbers 1447-1450. Apr. 2010 . Kim, Seung-Og. “Burials, Pigs, and Political Prestige in Neolithic China.” Current Anthopology 35.2 (Apr. 1994): 119-141. McGahan, Andrew. Praise. Sydney: Allen & Unwin, 1992. McGahan, Andrew. 1988. Sydney: Allen & Unwin, 1995. Mendes, Clare. Drift Street. Pymble: HarperCollins, 1995. Ng, Lillian. Swallowing Clouds. Ringwood: Penguin Books Australia,1997. Pons, Xavier. Messengers of Eros. Representations of Sex in Australian Writing. Newcastle upon Tyne: Cambridge Scholars Publishing, 2009. Rappaport, Roy. Pigs for the Ancestors. New Have: Yale UP, 1967. Roscoe, Paul B. “The Pig and the Long Yam: The Expansion of the Sepik Cultural Complex”. Ethnology 28 (1989): 219-31. Tsiolkas, Christos. Loaded. Sydney: Vintage, 1995. Yu, Ouyang. “An Interview with Lillian Ng.” Otherland Literary Journal 7, Bastard Moon. Essays on Chinese-Australian Writing (July 2001): 111-24.
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Losh, Elizabeth. "Artificial Intelligence." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2710.

Повний текст джерела
Анотація:
On the morning of Thursday, 4 May 2006, the United States House Permanent Select Committee on Intelligence held an open hearing entitled “Terrorist Use of the Internet.” The Intelligence committee meeting was scheduled to take place in Room 1302 of the Longworth Office Building, a Depression-era structure with a neoclassical façade. Because of a dysfunctional elevator, some of the congressional representatives were late to the meeting. During the testimony about the newest political applications for cutting-edge digital technology, the microphones periodically malfunctioned, and witnesses complained of “technical problems” several times. By the end of the day it seemed that what was to be remembered about the hearing was the shocking revelation that terrorists were using videogames to recruit young jihadists. The Associated Press wrote a short, restrained article about the hearing that only mentioned “computer games and recruitment videos” in passing. Eager to have their version of the news item picked up, Reuters made videogames the focus of their coverage with a headline that announced, “Islamists Using US Videogames in Youth Appeal.” Like a game of telephone, as the Reuters videogame story was quickly re-run by several Internet news services, each iteration of the title seemed less true to the exact language of the original. One Internet news service changed the headline to “Islamic militants recruit using U.S. video games.” Fox News re-titled the story again to emphasise that this alert about technological manipulation was coming from recognised specialists in the anti-terrorism surveillance field: “Experts: Islamic Militants Customizing Violent Video Games.” As the story circulated, the body of the article remained largely unchanged, in which the Reuters reporter described the digital materials from Islamic extremists that were shown at the congressional hearing. During the segment that apparently most captured the attention of the wire service reporters, eerie music played as an English-speaking narrator condemned the “infidel” and declared that he had “put a jihad” on them, as aerial shots moved over 3D computer-generated images of flaming oil facilities and mosques covered with geometric designs. Suddenly, this menacing voice-over was interrupted by an explosion, as a virtual rocket was launched into a simulated military helicopter. The Reuters reporter shared this dystopian vision from cyberspace with Western audiences by quoting directly from the chilling commentary and describing a dissonant montage of images and remixed sound. “I was just a boy when the infidels came to my village in Blackhawk helicopters,” a narrator’s voice said as the screen flashed between images of street-level gunfights, explosions and helicopter assaults. Then came a recording of President George W. Bush’s September 16, 2001, statement: “This crusade, this war on terrorism, is going to take a while.” It was edited to repeat the word “crusade,” which Muslims often define as an attack on Islam by Christianity. According to the news reports, the key piece of evidence before Congress seemed to be a film by “SonicJihad” of recorded videogame play, which – according to the experts – was widely distributed online. Much of the clip takes place from the point of view of a first-person shooter, seen as if through the eyes of an armed insurgent, but the viewer also periodically sees third-person action in which the player appears as a running figure wearing a red-and-white checked keffiyeh, who dashes toward the screen with a rocket launcher balanced on his shoulder. Significantly, another of the player’s hand-held weapons is a detonator that triggers remote blasts. As jaunty music plays, helicopters, tanks, and armoured vehicles burst into smoke and flame. Finally, at the triumphant ending of the video, a green and white flag bearing a crescent is hoisted aloft into the sky to signify victory by Islamic forces. To explain the existence of this digital alternative history in which jihadists could be conquerors, the Reuters story described the deviousness of the country’s terrorist opponents, who were now apparently modifying popular videogames through their wizardry and inserting anti-American, pro-insurgency content into U.S.-made consumer technology. One of the latest video games modified by militants is the popular “Battlefield 2” from leading video game publisher, Electronic Arts Inc of Redwood City, California. Jeff Brown, a spokesman for Electronic Arts, said enthusiasts often write software modifications, known as “mods,” to video games. “Millions of people create mods on games around the world,” he said. “We have absolutely no control over them. It’s like drawing a mustache on a picture.” Although the Electronic Arts executive dismissed the activities of modders as a “mustache on a picture” that could only be considered little more than childish vandalism of their off-the-shelf corporate product, others saw a more serious form of criminality at work. Testifying experts and the legislators listening on the committee used the video to call for greater Internet surveillance efforts and electronic counter-measures. Within twenty-four hours of the sensationalistic news breaking, however, a group of Battlefield 2 fans was crowing about the idiocy of reporters. The game play footage wasn’t from a high-tech modification of the software by Islamic extremists; it had been posted on a Planet Battlefield forum the previous December of 2005 by a game fan who had cut together regular game play with a Bush remix and a parody snippet of the soundtrack from the 2004 hit comedy film Team America. The voice describing the Black Hawk helicopters was the voice of Trey Parker of South Park cartoon fame, and – much to Parker’s amusement – even the mention of “goats screaming” did not clue spectators in to the fact of a comic source. Ironically, the moment in the movie from which the sound clip is excerpted is one about intelligence gathering. As an agent of Team America, a fictional elite U.S. commando squad, the hero of the film’s all-puppet cast, Gary Johnston, is impersonating a jihadist radical inside a hostile Egyptian tavern that is modelled on the cantina scene from Star Wars. Additional laughs come from the fact that agent Johnston is accepted by the menacing terrorist cell as “Hakmed,” despite the fact that he utters a series of improbable clichés made up of incoherent stereotypes about life in the Middle East while dressed up in a disguise made up of shoe polish and a turban from a bathroom towel. The man behind the “SonicJihad” pseudonym turned out to be a twenty-five-year-old hospital administrator named Samir, and what reporters and representatives saw was nothing more exotic than game play from an add-on expansion pack of Battlefield 2, which – like other versions of the game – allows first-person shooter play from the position of the opponent as a standard feature. While SonicJihad initially joined his fellow gamers in ridiculing the mainstream media, he also expressed astonishment and outrage about a larger politics of reception. In one interview he argued that the media illiteracy of Reuters potentially enabled a whole series of category errors, in which harmless gamers could be demonised as terrorists. It wasn’t intended for the purpose what it was portrayed to be by the media. So no I don’t regret making a funny video . . . why should I? The only thing I regret is thinking that news from Reuters was objective and always right. The least they could do is some online research before publishing this. If they label me al-Qaeda just for making this silly video, that makes you think, what is this al-Qaeda? And is everything al-Qaeda? Although Sonic Jihad dismissed his own work as “silly” or “funny,” he expected considerably more from a credible news agency like Reuters: “objective” reporting, “online research,” and fact-checking before “publishing.” Within the week, almost all of the salient details in the Reuters story were revealed to be incorrect. SonicJihad’s film was not made by terrorists or for terrorists: it was not created by “Islamic militants” for “Muslim youths.” The videogame it depicted had not been modified by a “tech-savvy militant” with advanced programming skills. Of course, what is most extraordinary about this story isn’t just that Reuters merely got its facts wrong; it is that a self-identified “parody” video was shown to the august House Intelligence Committee by a team of well-paid “experts” from the Science Applications International Corporation (SAIC), a major contractor with the federal government, as key evidence of terrorist recruitment techniques and abuse of digital networks. Moreover, this story of media illiteracy unfolded in the context of a fundamental Constitutional debate about domestic surveillance via communications technology and the further regulation of digital content by lawmakers. Furthermore, the transcripts of the actual hearing showed that much more than simple gullibility or technological ignorance was in play. Based on their exchanges in the public record, elected representatives and government experts appear to be keenly aware that the digital discourses of an emerging information culture might be challenging their authority and that of the longstanding institutions of knowledge and power with which they are affiliated. These hearings can be seen as representative of a larger historical moment in which emphatic declarations about prohibiting specific practices in digital culture have come to occupy a prominent place at the podium, news desk, or official Web portal. This environment of cultural reaction can be used to explain why policy makers’ reaction to terrorists’ use of networked communication and digital media actually tells us more about our own American ideologies about technology and rhetoric in a contemporary information environment. When the experts come forward at the Sonic Jihad hearing to “walk us through the media and some of the products,” they present digital artefacts of an information economy that mirrors many of the features of our own consumption of objects of electronic discourse, which seem dangerously easy to copy and distribute and thus also create confusion about their intended meanings, audiences, and purposes. From this one hearing we can see how the reception of many new digital genres plays out in the public sphere of legislative discourse. Web pages, videogames, and Weblogs are mentioned specifically in the transcript. The main architecture of the witnesses’ presentation to the committee is organised according to the rhetorical conventions of a PowerPoint presentation. Moreover, the arguments made by expert witnesses about the relationship of orality to literacy or of public to private communications in new media are highly relevant to how we might understand other important digital genres, such as electronic mail or text messaging. The hearing also invites consideration of privacy, intellectual property, and digital “rights,” because moral values about freedom and ownership are alluded to by many of the elected representatives present, albeit often through the looking glass of user behaviours imagined as radically Other. For example, terrorists are described as “modders” and “hackers” who subvert those who properly create, own, legitimate, and regulate intellectual property. To explain embarrassing leaks of infinitely replicable digital files, witness Ron Roughead says, “We’re not even sure that they don’t even hack into the kinds of spaces that hold photographs in order to get pictures that our forces have taken.” Another witness, Undersecretary of Defense for Policy and International Affairs, Peter Rodman claims that “any video game that comes out, as soon as the code is released, they will modify it and change the game for their needs.” Thus, the implication of these witnesses’ testimony is that the release of code into the public domain can contribute to political subversion, much as covert intrusion into computer networks by stealthy hackers can. However, the witnesses from the Pentagon and from the government contractor SAIC often present a contradictory image of the supposed terrorists in the hearing transcripts. Sometimes the enemy is depicted as an organisation of technological masterminds, capable of manipulating the computer code of unwitting Americans and snatching their rightful intellectual property away; sometimes those from the opposing forces are depicted as pre-modern and even sub-literate political innocents. In contrast, the congressional representatives seem to focus on similarities when comparing the work of “terrorists” to the everyday digital practices of their constituents and even of themselves. According to the transcripts of this open hearing, legislators on both sides of the aisle express anxiety about domestic patterns of Internet reception. Even the legislators’ own Web pages are potentially disruptive electronic artefacts, particularly when the demands of digital labour interfere with their duties as lawmakers. Although the subject of the hearing is ostensibly terrorist Websites, Representative Anna Eshoo (D-California) bemoans the difficulty of maintaining her own official congressional site. As she observes, “So we are – as members, I think we’re very sensitive about what’s on our Website, and if I retained what I had on my Website three years ago, I’d be out of business. So we know that they have to be renewed. They go up, they go down, they’re rebuilt, they’re – you know, the message is targeted to the future.” In their questions, lawmakers identify Weblogs (blogs) as a particular area of concern as a destabilising alternative to authoritative print sources of information from established institutions. Representative Alcee Hastings (D-Florida) compares the polluting power of insurgent bloggers to that of influential online muckrakers from the American political Right. Hastings complains of “garbage on our regular mainstream news that comes from blog sites.” Representative Heather Wilson (R-New Mexico) attempts to project a media-savvy persona by bringing up the “phenomenon of blogging” in conjunction with her questions about jihadist Websites in which she notes how Internet traffic can be magnified by cooperative ventures among groups of ideologically like-minded content-providers: “These Websites, and particularly the most active ones, are they cross-linked? And do they have kind of hot links to your other favorite sites on them?” At one point Representative Wilson asks witness Rodman if he knows “of your 100 hottest sites where the Webmasters are educated? What nationality they are? Where they’re getting their money from?” In her questions, Wilson implicitly acknowledges that Web work reflects influences from pedagogical communities, economic networks of the exchange of capital, and even potentially the specific ideologies of nation-states. It is perhaps indicative of the government contractors’ anachronistic worldview that the witness is unable to answer Wilson’s question. He explains that his agency focuses on the physical location of the server or ISP rather than the social backgrounds of the individuals who might be manufacturing objectionable digital texts. The premise behind the contractors’ working method – surveilling the technical apparatus not the social network – may be related to other beliefs expressed by government witnesses, such as the supposition that jihadist Websites are collectively produced and spontaneously emerge from the indigenous, traditional, tribal culture, instead of assuming that Iraqi insurgents have analogous beliefs, practices, and technological awareness to those in first-world countries. The residual subtexts in the witnesses’ conjectures about competing cultures of orality and literacy may tell us something about a reactionary rhetoric around videogames and digital culture more generally. According to the experts before Congress, the Middle Eastern audience for these videogames and Websites is limited by its membership in a pre-literate society that is only capable of abortive cultural production without access to knowledge that is archived in printed codices. Sometimes the witnesses before Congress seem to be unintentionally channelling the ideas of the late literacy theorist Walter Ong about the “secondary orality” associated with talky electronic media such as television, radio, audio recording, or telephone communication. Later followers of Ong extend this concept of secondary orality to hypertext, hypermedia, e-mail, and blogs, because they similarly share features of both speech and written discourse. Although Ong’s disciples celebrate this vibrant reconnection to a mythic, communal past of what Kathleen Welch calls “electric rhetoric,” the defence industry consultants express their profound state of alarm at the potentially dangerous and subversive character of this hybrid form of communication. The concept of an “oral tradition” is first introduced by the expert witnesses in the context of modern marketing and product distribution: “The Internet is used for a variety of things – command and control,” one witness states. “One of the things that’s missed frequently is how and – how effective the adversary is at using the Internet to distribute product. They’re using that distribution network as a modern form of oral tradition, if you will.” Thus, although the Internet can be deployed for hierarchical “command and control” activities, it also functions as a highly efficient peer-to-peer distributed network for disseminating the commodity of information. Throughout the hearings, the witnesses imply that unregulated lateral communication among social actors who are not authorised to speak for nation-states or to produce legitimated expert discourses is potentially destabilising to political order. Witness Eric Michael describes the “oral tradition” and the conventions of communal life in the Middle East to emphasise the primacy of speech in the collective discursive practices of this alien population: “I’d like to point your attention to the media types and the fact that the oral tradition is listed as most important. The other media listed support that. And the significance of the oral tradition is more than just – it’s the medium by which, once it comes off the Internet, it is transferred.” The experts go on to claim that this “oral tradition” can contaminate other media because it functions as “rumor,” the traditional bane of the stately discourse of military leaders since the classical era. The oral tradition now also has an aspect of rumor. A[n] event takes place. There is an explosion in a city. Rumor is that the United States Air Force dropped a bomb and is doing indiscriminate killing. This ends up being discussed on the street. It ends up showing up in a Friday sermon in a mosque or in another religious institution. It then gets recycled into written materials. Media picks up the story and broadcasts it, at which point it’s now a fact. In this particular case that we were telling you about, it showed up on a network television, and their propaganda continues to go back to this false initial report on network television and continue to reiterate that it’s a fact, even though the United States government has proven that it was not a fact, even though the network has since recanted the broadcast. In this example, many-to-many discussion on the “street” is formalised into a one-to many “sermon” and then further stylised using technology in a one-to-many broadcast on “network television” in which “propaganda” that is “false” can no longer be disputed. This “oral tradition” is like digital media, because elements of discourse can be infinitely copied or “recycled,” and it is designed to “reiterate” content. In this hearing, the word “rhetoric” is associated with destructive counter-cultural forces by the witnesses who reiterate cultural truisms dating back to Plato and the Gorgias. For example, witness Eric Michael initially presents “rhetoric” as the use of culturally specific and hence untranslatable figures of speech, but he quickly moves to an outright castigation of the entire communicative mode. “Rhetoric,” he tells us, is designed to “distort the truth,” because it is a “selective” assembly or a “distortion.” Rhetoric is also at odds with reason, because it appeals to “emotion” and a romanticised Weltanschauung oriented around discourses of “struggle.” The film by SonicJihad is chosen as the final clip by the witnesses before Congress, because it allegedly combines many different types of emotional appeal, and thus it conveniently ties together all of the themes that the witnesses present to the legislators about unreliable oral or rhetorical sources in the Middle East: And there you see how all these products are linked together. And you can see where the games are set to psychologically condition you to go kill coalition forces. You can see how they use humor. You can see how the entire campaign is carefully crafted to first evoke an emotion and then to evoke a response and to direct that response in the direction that they want. Jihadist digital products, especially videogames, are effective means of manipulation, the witnesses argue, because they employ multiple channels of persuasion and carefully sequenced and integrated subliminal messages. To understand the larger cultural conversation of the hearing, it is important to keep in mind that the related argument that “games” can “psychologically condition” players to be predisposed to violence is one that was important in other congressional hearings of the period, as well one that played a role in bills and resolutions that were passed by the full body of the legislative branch. In the witness’s testimony an appeal to anti-game sympathies at home is combined with a critique of a closed anti-democratic system abroad in which the circuits of rhetorical production and their composite metonymic chains are described as those that command specific, unvarying, robotic responses. This sharp criticism of the artful use of a presentation style that is “crafted” is ironic, given that the witnesses’ “compilation” of jihadist digital material is staged in the form of a carefully structured PowerPoint presentation, one that is paced to a well-rehearsed rhythm of “slide, please” or “next slide” in the transcript. The transcript also reveals that the members of the House Intelligence Committee were not the original audience for the witnesses’ PowerPoint presentation. Rather, when it was first created by SAIC, this “expert” presentation was designed for training purposes for the troops on the ground, who would be facing the challenges of deployment in hostile terrain. According to the witnesses, having the slide show showcased before Congress was something of an afterthought. Nonetheless, Congressman Tiahrt (R-KN) is so impressed with the rhetorical mastery of the consultants that he tries to appropriate it. As Tiarht puts it, “I’d like to get a copy of that slide sometime.” From the hearing we also learn that the terrorists’ Websites are threatening precisely because they manifest a polymorphously perverse geometry of expansion. For example, one SAIC witness before the House Committee compares the replication and elaboration of digital material online to a “spiderweb.” Like Representative Eshoo’s site, he also notes that the terrorists’ sites go “up” and “down,” but the consultant is left to speculate about whether or not there is any “central coordination” to serve as an organising principle and to explain the persistence and consistency of messages despite the apparent lack of a single authorial ethos to offer a stable, humanised, point of reference. In the hearing, the oft-cited solution to the problem created by the hybridity and iterability of digital rhetoric appears to be “public diplomacy.” Both consultants and lawmakers seem to agree that the damaging messages of the insurgents must be countered with U.S. sanctioned information, and thus the phrase “public diplomacy” appears in the hearing seven times. However, witness Roughhead complains that the protean “oral tradition” and what Henry Jenkins has called the “transmedia” character of digital culture, which often crosses several platforms of traditional print, projection, or broadcast media, stymies their best rhetorical efforts: “I think the point that we’ve tried to make in the briefing is that wherever there’s Internet availability at all, they can then download these – these programs and put them onto compact discs, DVDs, or post them into posters, and provide them to a greater range of people in the oral tradition that they’ve grown up in. And so they only need a few Internet sites in order to distribute and disseminate the message.” Of course, to maintain their share of the government market, the Science Applications International Corporation also employs practices of publicity and promotion through the Internet and digital media. They use HTML Web pages for these purposes, as well as PowerPoint presentations and online video. The rhetoric of the Website of SAIC emphasises their motto “From Science to Solutions.” After a short Flash film about how SAIC scientists and engineers solve “complex technical problems,” the visitor is taken to the home page of the firm that re-emphasises their central message about expertise. The maps, uniforms, and specialised tools and equipment that are depicted in these opening Web pages reinforce an ethos of professional specialisation that is able to respond to multiple threats posed by the “global war on terror.” By 26 June 2006, the incident finally was being described as a “Pentagon Snafu” by ABC News. From the opening of reporter Jake Tapper’s investigative Webcast, established government institutions were put on the spot: “So, how much does the Pentagon know about videogames? Well, when it came to a recent appearance before Congress, apparently not enough.” Indeed, the very language about “experts” that was highlighted in the earlier coverage is repeated by Tapper in mockery, with the significant exception of “independent expert” Ian Bogost of the Georgia Institute of Technology. If the Pentagon and SAIC deride the legitimacy of rhetoric as a cultural practice, Bogost occupies himself with its defence. In his recent book Persuasive Games: The Expressive Power of Videogames, Bogost draws upon the authority of the “2,500 year history of rhetoric” to argue that videogames represent a significant development in that cultural narrative. Given that Bogost and his Watercooler Games Weblog co-editor Gonzalo Frasca were actively involved in the detective work that exposed the depth of professional incompetence involved in the government’s line-up of witnesses, it is appropriate that Bogost is given the final words in the ABC exposé. As Bogost says, “We should be deeply bothered by this. We should really be questioning the kind of advice that Congress is getting.” Bogost may be right that Congress received terrible counsel on that day, but a close reading of the transcript reveals that elected officials were much more than passive listeners: in fact they were lively participants in a cultural conversation about regulating digital media. After looking at the actual language of these exchanges, it seems that the persuasiveness of the misinformation from the Pentagon and SAIC had as much to do with lawmakers’ preconceived anxieties about practices of computer-mediated communication close to home as it did with the contradictory stereotypes that were presented to them about Internet practices abroad. In other words, lawmakers found themselves looking into a fun house mirror that distorted what should have been familiar artefacts of American popular culture because it was precisely what they wanted to see. References ABC News. “Terrorist Videogame?” Nightline Online. 21 June 2006. 22 June 2006 http://abcnews.go.com/Video/playerIndex?id=2105341>. Bogost, Ian. Persuasive Games: Videogames and Procedural Rhetoric. Cambridge, MA: MIT Press, 2007. Game Politics. “Was Congress Misled by ‘Terrorist’ Game Video? We Talk to Gamer Who Created the Footage.” 11 May 2006. http://gamepolitics.livejournal.com/285129.html#cutid1>. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. julieb. “David Morgan Is a Horrible Writer and Should Be Fired.” Online posting. 5 May 2006. Dvorak Uncensored Cage Match Forums. http://cagematch.dvorak.org/index.php/topic,130.0.html>. Mahmood. “Terrorists Don’t Recruit with Battlefield 2.” GGL Global Gaming. 16 May 2006 http://www.ggl.com/news.php?NewsId=3090>. Morgan, David. “Islamists Using U.S. Video Games in Youth Appeal.” Reuters online news service. 4 May 2006 http://today.reuters.com/news/ArticleNews.aspx?type=topNews &storyID=2006-05-04T215543Z_01_N04305973_RTRUKOC_0_US-SECURITY- VIDEOGAMES.xml&pageNumber=0&imageid=&cap=&sz=13&WTModLoc= NewsArt-C1-ArticlePage2>. Ong, Walter J. Orality and Literacy: The Technologizing of the Word. London/New York: Methuen, 1982. Parker, Trey. Online posting. 7 May 2006. 9 May 2006 http://www.treyparker.com>. Plato. “Gorgias.” Plato: Collected Dialogues. Princeton: Princeton UP, 1961. Shrader, Katherine. “Pentagon Surfing Thousands of Jihad Sites.” Associated Press 4 May 2006. SonicJihad. “SonicJihad: A Day in the Life of a Resistance Fighter.” Online posting. 26 Dec. 2005. Planet Battlefield Forums. 9 May 2006 http://www.forumplanet.com/planetbattlefield/topic.asp?fid=13670&tid=1806909&p=1>. Tapper, Jake, and Audery Taylor. “Terrorist Video Game or Pentagon Snafu?” ABC News Nightline 21 June 2006. 30 June 2006 http://abcnews.go.com/Nightline/Technology/story?id=2105128&page=1>. U.S. Congressional Record. Panel I of the Hearing of the House Select Intelligence Committee, Subject: “Terrorist Use of the Internet for Communications.” Federal News Service. 4 May 2006. Welch, Kathleen E. Electric Rhetoric: Classical Rhetoric, Oralism, and the New Literacy. Cambridge, MA: MIT Press, 1999. Citation reference for this article MLA Style Losh, Elizabeth. "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/08-losh.php>. APA Style Losh, E. (Oct. 2007) "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/08-losh.php>.
Стилі APA, Harvard, Vancouver, ISO та ін.
44

"Buchbesprechungen." Militaergeschichtliche Zeitschrift 72, no. 1 (June 1, 2013): 107–240. http://dx.doi.org/10.1515/mgzs-2013-0005.

Повний текст джерела
Анотація:
Allgemeines Das ist Militärgeschichte! Probleme - Projekte - Perspektiven. Hrsg. mit Unterstützung des MGFA von Christian Th. Müller und Matthias Rogg Dieter Langewiesche Lohn der Gewalt. Beutepraktiken von der Antike bis zur Neuzeit. Hrsg. von Horst Carl und Hans-Jürgen Bömelburg Birte Kundrus Piraterie von der Antike bis zur Gegenwart. Hrsg. von Volker Grieb und Sabine Todt. Unter Mitarb. von Sünje Prühlen Martin Rink Robert C. Doyle, The Enemy in Our Hands. America's Treatment of Enemy Prisoners of War from the Revolution to the War on Terror Rüdiger Overmans Maritime Wirtschaft in Deutschland. Schifffahrt - Werften - Handel - Seemacht im 19. und 20. Jahrhundert. Hrsg. von Jürgen Elvert, Sigurd Hess und Heinrich Walle Dieter Hartwig Guntram Schulze-Wegener, Das Eiserne Kreuz in der deutschen Geschichte Harald Potempa Michael Peters, Geschichte Frankens. Von der Zeit Napoleons bis zur Gegenwart Helmut R. Hammerich Johannes Leicht, Heinrich Claß 1868-1953. Die politische Biographie eines Alldeutschen Michael Epkenhans Altertum und Mittelalter Anne Curry, Der Hundertjährige Krieg (1337-1453) Martin Clauss Das Elbinger Kriegsbuch (1383-1409). Rechnungen für städtische Aufgebote. Bearb. von Dieter Heckmann unter Mitarb. von Krzysztof Kwiatkowski Hiram Kümper Sascha Möbius, Das Gedächtnis der Reichsstadt. Unruhen und Kriege in der lübeckischen Chronistik und Erinnerungskultur des späten Mittelalters und der frühen Neuzeit Hiram Kümper Frühe Neuzeit Mark Hengerer, Kaiser Ferdinand III. (1608-1657). Eine Biographie Steffen Leins Christian Kunath, Kursachsen im Dreißigjährigen Krieg Marcus von Salisch Robert Winter, Friedrich August Graf von Rutowski. Ein Sohn Augusts des Starken geht seinen Weg Alexander Querengässer Die Schlacht bei Minden. Weltpolitik und Lokalgeschichte. Hrsg. von Martin Steffen Daniel Hohrath 1789-1870 Riccardo Papi, Eugène und Adam - Der Prinz und sein Maler. Der Leuchtenberg-Zyklus und die Napoleonischen Feldzüge 1809 und 1812 Alexander Querengässer Eckart Kleßmann, Die Verlorenen. Die Soldaten in Napoleons Rußlandfeldzug Daniel Furrer, Soldatenleben. Napoleons Russlandfeldzug 1812 Heinz Stübig Hans-Dieter Otto, Für Einigkeit und Recht und Freiheit. Die deutschen Befreiungskriege gegen Napoleon 1806-1815 Heinz Stübig 1871-1918 Des Kaisers Knechte. Erinnerungen an die Rekrutenzeit im k.(u.)k. Heer 1868 bis 1914. Hrsg., bearb. und erl. von Christa Hämmerle Tamara Scheer Kaiser Friedrich III. Tagebücher 1866-1888. Hrsg. und bearb. von Winfried Baumgart Michael Epkenhans Tanja Bührer, Die Kaiserliche Schutztruppe für Deutsch-Ostafrika. Koloniale Sicherheitspolitik und transkulturelle Kriegführung 1885 bis 1918 Thomas Morlang Krisenwahrnehmungen in Deutschland um 1900. Zeitschriften als Foren der Umbruchszeit im wilhelminischen Reich = Perceptions de la crise en Allemagne au début du XXe siècle. Les périodiques et la mutation de la société allemande à l'époque wilhelmienne. Hrsg. von/ed. par Michel Grunewald und/et Uwe Puschner Bruno Thoß Peter Winzen, Im Schatten Wilhelms II. Bülows und Eulenburgs Poker um die Macht im Kaiserreich Michael Epkenhans Alexander Will, Kein Griff nach der Weltmacht. Geheime Dienste und Propaganda im deutsch-österreichisch-türkischen Bündnis 1914-1918 Rolf Steininger Maria Hermes, Krankheit: Krieg. Psychiatrische Deutungen des Ersten Weltkrieges Thomas Beddies Ross J. Wilson, Landscapes of the Western Front. Materiality during the Great War Bernd Jürgen Wendt Jonathan Boff, Winning and Losing on the Western Front. The British Third Army and the Defeat of Germany in 1918 Christian Stachelbeck Glenn E. Torrey, The Romanian Battlefront in World War I Gundula Gahlen Uwe Schulte-Varendorff, Krieg in Kamerun. Die deutsche Kolonie im Ersten Weltkrieg Thomas Morlang 1919-1945 »Und sie werden nicht mehr frei sein ihr ganzes Leben«. Funktion und Stellenwert der NSDAP, ihrer Gliederungen und angeschlossenen Verbände im »Dritten Reich«. Hrsg. von Stephanie Becker und Christoph Studt Armin Nolzen Robert Gerwarth, Reinhard Heydrich. Biographie Martin Moll Christian Adam, Lesen unter Hitler. Autoren, Bestseller, Leser im Dritten Reich Gabriele Bosch Alexander Vatlin, »Was für ein Teufelspack«. Die Deutsche Operation des NKWD in Moskau und im Moskauer Gebiet 1936 bis 1941 Helmut Müller-Enbergs Rolf-Dieter Müller, Hitlers Wehrmacht 1935 bis 1945 Armin Nolzen Felix Römer, Kameraden. Die Wehrmacht von innen Martin Moll Johann Christoph Allmayer-Beck, »Herr Oberleitnant, det lohnt doch nicht!« Kriegserinnerungen an die Jahre 1938 bis 1945 Othmar Hackl Stuart D. Goldman, Nomonhan, 1939. The Red Army's Victory that shaped World War II Gerhard Krebs Francis M. Carroll, Athenia torpedoed. The U-boat attack that ignited the Battle of the Atlantic Axel Niestlé Robin Higham, Unflinching zeal. The air battles over France and Britain, May-October 1940 Michael Peters Anna Reid, Blokada. Die Belagerung von Leningrad 1941-1944 Birgit Beck-Heppner Jack Radey and Charles Sharp, The Defense of Moscow. The Northern Flank Detlef Vogel Jochen Hellbeck, Die Stalingrad-Protokolle. Sowjetische Augenzeugen berichten aus der Schlacht Christian Streit Robert M. Citino, The Wehrmacht retreats. Fighting a lost war, 1943 Martin Moll Carlo Gentile, Wehrmacht und Waffen-SS im Partisanenkrieg: Italien 1943-1945 Kerstin von Lingen Tim Saunders, Commandos & Rangers. D-Day Operations Detlef Vogel Frederik Müllers, Elite des »Führers«? Mentalitäten im subalternen Führungspersonal von Waffen-SS und Fallschirmjägertruppe 1944/45 Sebastian Groß, Gefangen im Krieg. Frontsoldaten der Wehrmacht und ihre Weltsicht John Zimmermann Tobias Seidl, Führerpersönlichkeiten. Deutungen und Interpretationen deutscher Wehrmachtgeneräle in britischer Kriegsgefangenschaft Alaric Searle Nach 1945 Wolfgang Benz, Deutschland unter alliierter Besatzung 1945-1949. Michael F. Scholz, Die DDR 1949-1990 Denis Strohmeier Bastiaan Robert von Benda-Beckmann, A German Catastrophe? German historians and the Allied bombings, 1945-2010 Horst Boog Hans Günter Hockerts, Der deutsche Sozialstaat. Entfaltung und Gefährdung seit 1945 Ursula Hüllbüsch Korea - ein vergessener Krieg? Der militärische Konflikt auf der koreanischen Halbinsel 1950-1953 im internationalen Kontext. Hrsg. von Bernd Bonwetsch und Matthias Uhl Gerhard Krebs Andreas Eichmüller, Keine Generalamnestie. Die strafrechtliche Verfolgung von NS-Verbrechen in der frühen Bundesrepublik Clemens Vollnhals Horst-Eberhard Friedrichs, Bremerhaven und die Amerikaner. Stationierung der U.S. Army 1945-1993 - eine Bilddokumentation Heiner Bröckermann Russlandheimkehrer. Die sowjetische Kriegsgefangenschaft im Gedächtnis der Deutschen. Hrsg. von Elke Scherstjanoi Georg Wurzer Klaus Naumann, Generale in der Demokratie. Generationsgeschichtliche Studien zur Bundeswehrelite Rudolf J. Schlaffer John Zimmermann, Ulrich de Maizière. General der Bonner Republik 1912 bis 2006 Klaus Naumann Nils Aschenbeck, Agent wider Willen. Frank Lynder, Axel Springer und die Eichmann-Akten Rolf Steininger »Entrüstet Euch!«. Nuklearkrise, NATO-Doppelbeschluss und Friedensbewegung. Hrsg. von Christoph Becker-Schaum [u.a.] Winfried Heinemann Volker Koop, Besetzt. Sowjetische Besatzungspolitik in Deutschland Silke Satjukow, Besatzer. »Die Russen« in Deutschland 1945-1994 Heiner Bröckermann Marco Metzler, Nationale Volksarmee. Militärpolitik und politisches Militär in sozialistischer Verteidigungskoalition 1955/56 bis 1989/90 Klaus Storkmann Rüdiger Wenzke, Ab nach Schwedt! Die Geschichte des DDR-Militärstrafvollzugs Silke Satjukow Militärs der DDR im Auslandsstudium. Erlebnisberichte, Fakten und Dokumente. Hrsg. von Bernd Biedermann und Hans-Georg Löffler Rüdiger Wenzke Marianna Dudley, An Environmental History of the UK Defence Estate, 1945 to the Present Michael Peters
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Payne, Robert. "Grid: On Being-as-Transmission and Normativity." M/C Journal 9, no. 1 (March 1, 2006). http://dx.doi.org/10.5204/mcj.2587.

Повний текст джерела
Анотація:
Images of grids are employed in a number of areas of contemporary critical and cultural theory. One usage features throughout the fields of gender and sexuality studies, especially as inspired by the work of Judith Butler. Following Foucault’s formulation that disciplinary power operates as a “grid of intelligibility of the social order” (93), Butler theorises that normative modes of gender and sexuality constitute a regulatory structure through which subjectivity is rendered intelligible or not. Being off the grid – beyond its normalising mechanism – fundamentally challenges the social subject’s viability: The norm governs intelligibility, allows for certain kinds of practices and action to become recognizable as such, imposing a grid of legibility on the social and defining the parameters of what will and will not appear within the domain of the social. The question of what it is to be outside the norm poses a paradox for thinking, for if the norm renders the social field intelligible and normalizes that field for us, then being outside the norm is in some sense being defined still in relation to it. (Butler 42) During a similar period in a quite different theoretical field, media and cyberstudies scholars have reminded us of the electronic basis of contemporary media forms by referring to grids through which information and texts are transmitted. In the case of the pervasive computational matrix of the Internet, the ease, instantaneity and virtuality of transmission have often been taken to produce not rigid structure but flow – a revolutionary fluidity of global interaction but also of personal identity. The performativity of gender, sexuality and race is emphasised by the effective absence of bodies in material form from online social interaction. But as more recent cyberstudies work has shown, a disembodied inscription of identity may still operate normatively, that is with necessary recourse to the normative conceptions that make bodies legible as such. Butler’s work has not often been closely applied to cyberstudies, despite what appear to be a number of productive possibilities, such as those roughly sketched above. In this essay, I do not aim to elaborate on those possibilities in any comprehensive sense. Rather, I want to take some first steps towards seeing whether the two broad images of grid summarised above can usefully be read alongside one another. If transmission is a condition of existence in the contemporary mediascape where online interactions and connections are not supplemental to the social but are the social, is transmission possible off the grid? If the regulatory structure of the grid determines recognisability of being, can the non-normative be recognised? In thinking through the possibilities of being-as-transmission, I want to avoid the simple conclusion that digital identities are causally defined by the structural actuality of electronic grids. While the grid makes online identities possible in this literal, computational sense, I’m more interested in the figurative: are electronic grids themselves normatively produced, therefore allowing only normative conceptions of identity, despite their apparent generation of categorically fluid modes of identity? Peter Lunenfeld considers the figurative implications of the grid as it is conceived by new media. He adopts the digital design command “snap to grid” as “a metaphor for how we manipulate and think through the electronic culture that enfolds us” (Lunenfeld xvi). “Snap to grid” commands the computer to map hand-drawn images to the precise standards of digital geometry, as Lunenfeld explains: Snap a freehand sketch of a rectangular shape to a grid and it immediately becomes a flawless, Euclidean rectangle. Artists regularly disable the snap to grid function the moment they open an application because the gains in predictability and accuracy are balanced against the losses of ambiguity and expressiveness. (xvi-xvii) The question for me remains, in this metaphor, whether the freehand sketch purposely not snapped to grid is still legible within the application, itself designed by grid logic. If we unpack the metaphor in terms of online identity, which cybertheoretical orthodoxy has claimed to be ambiguous and expressive (the self as freehand sketch), a Butlerian perspective would remind us of the omnipresence of the normative frame against which non-normative identity must partly be measured. To sketch oneself as an “I” and to be recognised socially as such requires some sense of acquiescence to what has been established as within the possibility of being an “I”, even if this frame works to exclude or attempts to erase the lines of one’s sketch. Butler argues: To say that the desire to persist in one’s own being depends on norms of recognition is to say that the basis of one’s autonomy, one’s persistence as an “I” through time, depends fundamentally on a social norm that exceeds that “I”… In effect, our lives, our very persistence, depend upon such norms or, at least, on the possibility that we will be able to negotiate within them, derive our agency from the field of their operation. (32) It needs to be acknowledged here that many cybertheorists (from Haraway to Stone and Turkle, among others) have argued digital spaces including the Internet have reconceived the very ontological terms of being an “I” – of subjectivity, autonomy and agency.. In particular, questions of interactivity, collaborative practice and disembodiment force rethinking of exactly who or what the “I” might claim to include and on whose ideological terms the concept of “I” has been received. Some key aspects of the Internet do allow me to be who or what I want to be, but perhaps especially if I already act from a sociocultural and/or economic position that entails prior privilege. With this point in mind, Lisa Nakamura’s work on race destabilises “utopian” claims for the potential of Internet identity. She argues that many cyberspace practices re-establish stereotypes and normative representations of race exactly because they are conceived in a realm that seems to dispense with familiar privileges: “Bodies get tricky in cyberspace; that sense of disembodiment that is both freeing and disorienting creates a profound malaise in the user that stable images of race work to fix in place” (Nakamura 6). Similar counter-arguments can be made of the supposed liberation of the online “I” from material constraints of gender and sexuality, as if all genders and sexualities may be discursively performed online with equal facility, as if chosen from a menu. While the convincing role play of identities in online gaming and chat spaces, for instance, may be celebrated for confirming the postmodern fragmentation of the unitary subject, a significant proportion of everyday online interactions are more practically linked to the often mundane materialities of knowable selves. Moreover, invoking Butlerian performativity in relation to online gender and sexual identity must still take into account the regulatory frameworks that structure and constrain the identity discourses that iteration brings into being. In their discussion of participation in a queer female online forum, Sally Munt et al. identify ways in which new users achieve “membership” of the forum and by extension of lesbian communities offline through the peer-mentored rehearsal of what amount to normative sexuality codes. They conclude that at the same time as promising a “utopic” space for identity experimentation, the forum is also “dystopic” in that its interactions work to “compact desire into identity categories that impose disciplinary formations antithetical to liberatory ideals” (Munt et al. 136). Here the double-edged sword of queer recognition is clear. As Rob Cover puts it, “in fulfilling both the imperative of coherent sexual subjectivity and the practical needs of sexual minority community ritual and contact, the citation of the stereotype is the more intelligible process” (87). So we must ask, how can one’s various freehand sketches of gender and sexuality be recognised as a coherent “I” unless they have already been snapped to grid, that is already rendered recognisable? How can that “I” be transmitted effectively unless via a grid of legibility that regulates what is transmissible? Rather than concluding with gridlock, a successful marriage of the two broad conceptions of grid this essay is working with must move towards the productive and freeing potential of each. Just as Butler’s understanding of heteronormative social structures emphasises the emergence of “improvisational possibility [from] within a field of constraints” (15), so too digital identities must not merely relocate old norms to new media and squander the opportunities that being-as-transmission permits. As Mark Hansen proposes, our guiding question must henceforth be: can and how can we use the new media and the internet to move beyond interpellation, or more exactly, to liberate the body from its socially-imposed dependence on interpellation through preconstituted social categories of identity, subjectivity, and particularity? (114) If online identity transmission can fulfil its promise of fluidity in this ethical sense, it might serve to erase its believed distinction from the offline and guide us towards the productive uncertainty of being off the grid. We might learn “to encounter the difference that calls our grids of intelligibility into question without trying to foreclose the challenge that the difference delivers” (Butler 35). References Butler, Judith. Undoing Gender. New York: Routledge, 2004. Cover, Rob. “Bodies, Movements and Desires: Lesbian/Gay Subjectivity and the Stereotype.” Continuum 18.1 (2004): 81-97. Foucault, Michel. The History of Sexuality: Volume One. Trans. Robert Hurley. Harmondsworth: Penguin, 1978. Hansen, Mark B. N. “Digitizing the Racialized Body or The Politics of Universal Address.” SubStance 33.2 (2004): 107-133. Lunenfeld, Peter. Snap to Grid: A User’s Guide to Digital Arts, Media and Cultures. Cambridge: MIT Press, 2000. Munt, Sally R. et al. “Virtually Belonging: Risk, Connectivity, and Coming Out On-Line.” International Journal of Sexuality and Gender Studies 7.2/3 (2002): 125-137. Nakamura, Lisa. Cybertypes: Race, Ethnicity and Identity on the Internet. New York: Routledge, 2002. Citation reference for this article MLA Style Payne, Robert. "Grid: On Being-as-Transmission and Normativity." M/C Journal 9.1 (2006). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0603/06-payne.php>. APA Style Payne, R. (Mar. 2006) "Grid: On Being-as-Transmission and Normativity," M/C Journal, 9(1). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0603/06-payne.php>.
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Lord, Catherine M. "Serial Nuns: Michelle Williams Gamaker’s The Fruit Is There to Be Eaten as Serial and Trans-Serial." M/C Journal 21, no. 1 (March 14, 2018). http://dx.doi.org/10.5204/mcj.1370.

Повний текст джерела
Анотація:
Introduction: Serial Space“It feels …like the edge of the world; far more remote than it actually is, perhaps because it looks at such immensity” (Godden “Black,” 38). This is the priest’s warning to Sister Clodagh in Rumer Godden’s 1939 novel Black Narcissus. The young, inexperienced Clodagh leads a group of British nuns through the Indian Himalayas and onto a remote mountain top above Mopu. Michael Powell and Emeric Pressburger adapted Godden’s novel into the celebrated feature film, Black Narcissus (1947). Following the novel, the film narrates the nuns’ mission to establish a convent, school, and hospital for the local population. Yet, immensity moves in mysterious ways. Sister Clodagh (Deborah Kerr) loses her managerial grip. Sister Philippa (Flora Robson) cultivates wild flowers instead of vegetables. Sister Ruth (Kathleen Byron) sheds nun’s attire for red lipstick and a Parisian dress. The young Indian woman Kanchi (Jean Simmons) becomes a force of libidinous disturbance. At the twilight of the British Empire, white, western nuns experience the psychical effects of colonialism at the precipice. Taking such cues from Pressburger and Powell’s film, Michelle Williams Gamaker, an artist, filmmaker, and scholar, responds to Black Narcissus, both film and novel. She does so through a radical interpretation of her own. Gamaker William’s 24-minute film, The Fruit Is There to Be Eaten (forthcoming, London 2018) is a longer “short,” which breaks the mould of what scholar Linda Hutcheon would term an “adaptation” (2006). For Hutcheon, there is a double “mode of engagement” between an original work and its adapted form (22). On the one hand, there is a “transcoding” (22). This involves “transporting” characters from a precedent work to its adapted form (11). On the other, there is an act of “creative interpretation” (22). The Fruit Is There to Be Eaten transports yet recreates the Indian “beggar girl” Kanchi, played by a “blacked up” white Hollywood actor Jean Simmons (Black Narcissus), into Williams Gamaker’s contemporary Kanchi, played by Krishna Istha. In this 2018 instalment, Kanchi is an Asian and transgender protagonist of political articulacy. Hence, Williams Gamaker’s film engages a double tactic of both transporting yet transforming Kanchi, as well as Sisters Clodagh and Philippa, from the feature film into The Fruit Is There to Be Eaten. To analyse Williams Gamaker’s film, I will make a theoretical jump off the precipice, stepping from Hutcheon’s malleable concept of adaptation into a space of “trans-serial” narrative.In what follows, I shall read The Fruit Is There to Be Eaten as an “episode” in a serial. The prior episodes, Williams Gamaker’s House of Women (London 2017, Berlin 2018) is a short, fictional, and surreal documentary about casting the role of Kanchi. It can be read as the next episode in Kanchi’s many incarnations. The relationship between Sister Clodagh (Kelly Hunter as voiceover) and Kanchi in House of Women develops from one of confrontation to a transgender kiss in the climatic beat of The Fruit Is There to Be Eaten. Williams Gamaker’s film can be read as one of a series which is itself inflected with the elements of a “trans-serial.” Henry Jenkins argues that “transmedia storytelling represents a process where integral elements of a fiction get dispersed systematically across multiple delivery channels” (emphasis in original, “Transmedia”). I use the word “trans” to define the gap between novelistic texts and film. Throughout Williams Gamaker’s series, she uses many textual citations from Godden’s novel, and dialogue from Pressburger and Powell’s film. In other words, verbal elements as well as filmic images are adapted in Hutcheon’s sense and transmediated in Jenkins’s sense. To build the “serial” concept for my analysis requires re-working concepts from television studies. Jason Mittell introduces “narrative complexity” as the “redefinition of episodic forms under serial narration” (“Narrative,” 32). In serial TV, characters and narratives develop over a sequence of episodes and seasons. In serial TV, missing one episode can thwart the viewer’s reception of later ones. Mittell’s examples reveal the plasticity of the narrative complexity concept. He mentions TV series that play games with the audience’s expectations. As Mittell points out, Seinfeld has reflexive qualities (“Narrative,” 35) and Twin Peaks mixes genres (“Narrative,” 33). I would add that Lynch’s creative liberties offered characters who could appear and disappear while leaving their arcs hanging intriguingly unresolved. The creative possibilities of reflexivity via seriality, of characters who appear and disappear or return in different guises, are strategies that underpin William’s Gamaker’s short film serial. The third in her trilogy, The Eternal Return (in post-production 2018) fictionalises the life of Sabu, the actor who played the General’s son in Black Narcissus. Once again, the protagonist, this time male, is played by Krishna Istha, a non-binary transgender actor who, by taking all the lead roles in William’s Gamaker’s trilogy, grows over the serial as a malleable ethnic and transgender subject. Importantly, The Eternal Return carries residues of the characters from The Fruit Is There to Be Eaten by casting the same team of actors again (Charlotte Gallagher and myself Catherine Lord), and switching their genders. Istha played Kanchi in the previous two episodes. The General’s son, played by Sabu, courted Kanchi in Black Narcissus. In The Eternal Return, Istha crosses the character and gender boundary by playing Sabu. Such casting tactics subvert the gender and colonial hegemonies inherent in Pressburger and Powell’s film.The reflexive and experimental approach of Williams Gamaker’s filmmaking deploys serial narrative tactics for its political goals. Yet, the use of “serial” needs to be nuanced. Glen Creeber sets out three terms: “episodic,” “series” and “serial.” For Creeber, a series provides continuous storylines in which the connection between episodes is strong. In the serial format, the connection between the episodes is less foregrounded. While it is not possible to enjoy stand-alone episodes in a serial, at the same time, serials produce inviting gaps between episodes. Final resolutions are discouraged so that there are greater narrative possibilities for later seasons and the audience’s own game of speculative storytelling (11).The emerging “serial” gaps between Williams Gamaker’s episodes offer opportunities for political interpretation. From House of Women and The Fruit Is There to Be Eaten, Kanchi develops an even stronger political voice. Kanchi’s character arc moves from the wordless obedience of Pressburger and Powell’s feature to the transgender voice of post-colonial discourse in House of Women. In the next episode, The Fruit Is There to Be Eaten, Kanchi becomes Clodagh’s guide both politically, spiritually, and erotically.I will read The Fruit Is There to Be Eaten as both my primary case-study and as the third episode in what I shall theorise to be a four-part serial. The first is the feature film Black Narcissus. After this is Williams Gamaker’s House of Women, which is then followed by The Fruit Is There to Be Eaten, my central case study here. There may be immediate objections to my argument that Williams Gamaker’s series can be read by treating Pressburger and Powell’s feature as the first in the series. After all, Godden’s novel could be theorised as the camouflaged pilot. Yet, a series or serial is defined as such when it is in the same medium. Game of Thrones (2011-) is a TV series that adapts George R.R. Martin’s novel cycle, but the novels are not episodes. In this regard, I follow Hutcheon’s emphasis on theorising adapted works as forged between different media, most commonly novels to films. The adaptive “deliveries” scatter through The Fruit Is There to Be Eaten with an ecological precision.Eco SeriesEcological descriptions from Godden’s novel and Pressburger and Powell’s mise-en-scene are performed in The Fruit Is There to Be Eaten through Kelly Hunter’s velvety voiceover as it enjoys a painterly language: butterflies daub the ferns with “spots of ochre, scarlet, and lemon sherbet.” Hutcheon’s term transcoding usefully describes the channelling of particles from the novelist’s text into an intensified, ecological language and cinematic mise-en-scene. The intensification involves an ingestion of Godden’s descriptive prose, which both mimics and adds an adjectival and alliterative density. The opening descriptions of the nuns’ arrival in Mopu is a case in point. In the novel, the grooms joke about the nuns’ habits appearing as “snows, tall and white” (Godden “Black,” 1). One man remarks that they look like “a row of teeth” (Godden “Black,” 2). Williams Gamaker resists shots of nuns as Godden described them, namely on Bhotiya ponies. Rather, projected onto a white screen is an image of white and red flowers slowly coming into focus. Kelly Hunter’s voiceover describes the white habits as a set of “pearly whites” which are “hungry for knowledge” and “eat into the landscape.” White, western nuns in white habits are metaphorically implied to be like a consuming mouth, eating into Indian territories and Indian people.This metaphor of colonial consumption finds its corollary in Godden’s memoirs where she describes the Pressburger, Powell, and Simons representation of Kanchi as “a basket of fruit, piled high and luscious and ready to eat” (“A House,” 24-5; 52). The nun’s quest colonially consumes Mopu’s natural environment. Presumably, nuns who colonially eat consume the colonised Other like fruit. The Kanchi of the feature film Black Narcissus is a supporting character, performed by Simmons as mute, feral and objectified. If Kanchi is to release herself from the “fruity” projections of sexism and racism, it will be through the filmmaker’s aesthetic and feminist tactic of ensuring that planets, trees, fruits and flowers become members of the film cast. If in episode 1 (Black Narcissus), plants and Asian subalterns are colonised, in episode 2, House of Women, these fruits and flowers turn up as smart, young Asian women actors with degrees in law and photography, ready to hold their own in the face of a faceless interviewer. In episode 3, The Fruit Is There to Be Eaten, it is important that Krishna Istha’s Kanchi, turning up like a magical character from another time and space (transformed from episode 1), commands the film set amidst an excess of flowers, plants and fruits. The visual overflow correlates with Kanchi’s assertiveness. Flowers and Kanchi know how to “answer back.”Like Black Narcissus the feature, The Fruit Is There to Be Eaten relies heavily on a mise-en-scene of horticultural and mountain ecology. Just as Michael Powell filmed at Pinewood and Leonardslee Gardens in East Sussex, Williams Gamaker used Rotherhithe’s Brunel Museum roof Gardens and Sands Film Studios. The lusciousness of Leonardslee is film-intertextually echoed in the floral exuberance of the 2018 shots of Rotherhithe. After the crew have set up the classroom, interwoven with Kelly Hunter’s voiceover, there is a hard cut to a full, cinematic shot of the Leonardslee garden (fig. 1).Then cutting back to the classroom, we see Kanchi calmly surveying the set, of which she is the protagonist, with a projection of an encyclopaedic display of the flowers behind her. The soundtrack plays the voices of young women students intoning the names of flowers from delphinium to lupens.These meta-filmic moments are supported by the film’s sharp juxtaposition between classroom and outdoor scenes. In Pressburger and Powell’s school scenes, Sister Ruth attempts to teach the young General how to conjugate the French verb “recevoir.” But the lesson is not successfully received. The young General becomes aphasic, Kanchi is predictably mute and the children remain demure. Will colonialism let the Other speak? One way to answer back in episode 3 is through that transgressive discourse, the language of flowers.In The Fruit Is There to Be Eaten, the young women study under Sister Clodagh and Sister Philippa (myself, Catherine Lord). The nuns teach botanical lists and their ecological contexts through rote learning. The young women learn unenthusiastically. What is highlighted is the ludicrous activity of repetition and abstractions. When knowledge becomes so objectified, so do natural environments, territories and people. Clodagh aligns floral species to British locations. The young women are relatively more engaged in the garden with Sister Philippa. They study their environment through sketching and painting a diverse range of flowers that could grow in non-British territory. Philippa is the now the one who becomes feral and silent, stroking stalks and petals, eschewing for the time being, the game of naming (fig. 2).However, lessons with colonial lexicons will be back. The young women look at screen projections of flowers. Sister Philippa takes the class through an alphabet: “D is for Dogbright … L is for Ladies’ Fingers.” Clodagh whirls through a list of long, Latin names for wild flowers in British Woodlands. Kanchi halts Clodagh’s act of associating the flowers with the British location, which colonizes them. Kanchi asks: “How many of us will actually travel, and which immigration border will test our botanical knowledge?” Kanchi then presents a radically different alphabet, including “Anne is African … Ian is Intersex … Lucy loves Lucy.” These are British names attributed to Africans, Arabs, and Asians, many of their identities revealed to be LGBQT-POC, non-binary, transgender, and on the move. Clodagh’s riposte is “How do you know you are not travelling already?” The flowers cannot be pinned down to one location. They cannot be owned by one nation.Like characters who travel between episodes, the travelling flowers represent a collision of spaces that undermine the hegemonies of race, gender and sexuality. In episode 1, Black Narcissus the feature film, the western nuns face the immensities of mountain atmosphere, ecology and an unfamiliar ethnic group. In episode 2, House of Women, the subalterns have transformed their role, achieving educational and career status. Such political and dramatic stakes are raised in episode 3, The Fruit Is There to Be Eaten. There is a strong focus on the overlapping oppressions of racial, colonial and ecological exploitation. Just as Kanchi has a character arc and serial development, so do plants, fauna, fruits, flowers and trees. ‘Post’-Space and Its AtmosphereThe British Empire colonised India’s ecological space. “Remember you and your God aren't on British Territory anymore” declares the auditioning Krishna Istha in House of Women. Kanchi’s calm, civil disobedience continues its migration into The Fruit is There to be Eaten between two simultaneously existing spaces, Mopu and Rotherhithe, London. According to literature scholar Brian McHale, postmodern worlds raise ontological questions about the dramatic space into which we are drawn. “Which” worlds are we in? Postmodern worlds can overlap between separate spaces and different temporalities (McHale 34-35). As McHale notes, “If entities can migrate across the semipermeable membrane that divides a fictional world from the real, they can also migrate between two different fictional worlds” (35).In The Fruit Is There to Be Eaten, the semipermeable membrane between it and Black Narcissus folds together the temporalities of 1947 and 2018, and the terrains of India and London. Sister Philippa tells a Kanchi seeking Mopu, that “My dear, you are already here.” This would seem odd as Sister Philippa describes the death of a young man close to Saint Mary’s Church, London. The British capital and woodlands and the Himalayas co-exist as intensified, inter-crossing universes that disrupt the membranes between both colonial and ecological space-time, or what I term “post-space.”Williams Gamaker’s post-spaces further develop Pressburger and Powell’s latent critique of post-colonialism. As film scholar Sarah Street has observed, Black Narcissus the film performs a “post-colonial” exploration of the waning British Empire: “Out of the persistence of the colonial past the present is inflected with a haunting resonance, creating gaps and fissures” (31). This occurs in Powell’s film in the initial Calcutta scenes. The designer Alfred Junge made “God shots” of the nuns at dinner, creating from them the iconic shape of a cross. This image produces a sense of over-exactness. Once in the mountains, it is the spirit of exactitude that deteriorates. In contrast, Williams Gamaker prefers to reveal the relative chaos of setting up her world. We watch as the crew dress the school room. Un-ceremoniously, Kanchi arrives in shorts before she picks up a floral dress bearing the label “Kanchi.” There is then a shot in which Kanchi purveys the organised set, as though she is its organiser (fig. 3).Post-spaces are rich in atmosphere. The British agent Dean tells Clodagh in Black Narcissus the film that the mountain “is no place to put a nunnery” due its “atmosphere.” In the climactic scene of The Fruit Is There to Be Eaten, Kanchi and Clodagh face two screens revealing the atmospheric projection of the high mountains, the black cut between them visible, like some shadowy membrane. Such aesthetic strategies continue Powell’s use of technical artifice. Street details the extensive labour of technical and craft work involved in creating the artificial world of Black Narcissus, its mountains, artificial colours, and hence atmosphere, all constructed at Pinewood studios. There was a vast amount of matte painting and painting on glass for special effects (19).William Gamaker’s screens (projection work by Sophie Bramley and Nick Jaffe) reflexively emphasise atmosphere as artifices. The atmosphere intensifies with the soundscape of mountain air and Wayne Urquhart’s original and haunting music. In Powell and Pressburger’s feature, Brian Easdale’s music also invokes a sense of mystery and vastness. Just as TV series and serials maintain musical and mise-scene-scene signatures from one episode to another, so too does Williams Gamaker reframe her precursor’s cinematic aesthetics with that of her own episode. Thus, serial as stylistic consistency is maintained between episodes and their post-spaces.At the edge of such spaces, Kanchi will scare Clodagh by miming a tight-rope walk across the mountain: it is both real and pretend, dramatic, but reflexively so. Kanchi walks a membrane between colliding worlds, between colonialism and its transgression. In this episode of extreme spirituality and eroticism, Kanchi reaches greater heights than in previous episodes, discoursing on the poetics of atmosphere: “… in the midst of such peaks, one can draw near what is truly placeless … the really divine.” Here, the membrane between the political and cultural regions and the mountains that eschew even the human, is about to be breached. Kanchi relates the legend of those who go naked in the snow. These “Abominable Men” are creatures who become phantoms when they merge with the mountain. If the fractures between locations are too spacious, as Kanchi warns, one can go mad. In this episode 3, Kanchi and Clodagh may have completed their journeys. In Powell and Pressburger’s interpretation, Sister Ruth discards nun’s attire for a Parisian, seductive dress and red lipstick. Yet, she does so for a man, Dean. However, the Sister Clodagh of 2018 is filmed in a very long take as she puts on an elegant dress and does her make-up. In a scene of philosophical intimacy with Kanchi, the newly dressed Clodagh confesses her experience of “immensity.” As they break through the erotic membrane separating their identities, both immersed in their full, queer, transgender kiss, all racial hierarchies melt into atmosphere (fig. 4).Conclusion: For a Pitch By making a film as one episode in a series, Williams Gamaker’s accomplishment is to enhance the meeting of narrative and political aims. As an arthouse film serial, The Fruit Is There to Be Eaten has enabled definitions of “serial” to migrate from the field of television studies. Between Hutcheon’s “adaptation” and Mittell and Creeber’s articulations of “narrative complexity,” a malleable concept for arthouse seriality has emerged. It has stretched the theoretical limits of what can be meant by a serial in an arthouse context. By allowing the notion of works “adapted” to occur between different media, Henry Jenkins’ broader term of “transmedia storytelling” (Convergence) can describe how particles of Godden’s work transmigrate through episodes 1, 2, and 3, where the citational richness emerges most in episodes 3, The Fruit Is There to Be Eaten.Because one novel informs all the episodes while each has entirely different narratives and genres, The Fruit Is There to Be Eaten is not a serial adaptation, as is Game of Thrones. It is an experimental serial inflected with trans-serial properties. Kanchi evolves into a postcolonial, transgender, ecological protagonist who can traverse postmodern worlds. Perhaps the witty producer in a pitch meeting might say that in its serial context, The Fruit Is There to Be Eaten is like a cross between two fantasy TV serials, still to be written: Transgender Peaks meets Kanchi Is the New Black. The “new black” is multifaceted and occupies multi-worlds in a post-space environment. ReferencesCreeber, Glen. Serial Television: Big Drama on the Small Screen. London: BFI, 2004.Godden, Rumer. 1939. Black Narcissus: A Virago Modern Classic. London: Hatchette Digital, 2013.———. A House with Four Rooms. New York: William Morrow, 1989. Hutcheon, Linda. A Theory of Adaptation. 2nd ed. New York: New York University Press, 2012.Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York University Press, 2006.———. “Transmedia, 202: Further Reflections.” Confessions of an Aca-Fan 1 Aug. 2011. 1 May 2012 <http://henryjenkins.org/blog/2011/08/defining_transmedia_further_re.html>.McHale, Brian. Postmodernist Fiction. London: Routledge, 1987.Powell, Michael. A Life in Movies: An Autobiography. London: Heinemann, 1986.Mittell, Jason. “Narrative Complexity in Contemporary American Television.” The Velvet Light Trap 58 (Fall 2006): 29-40. Street, Sarah. Black Narcissus. London: I.B. Tauris, 2005.FilmographyBlack Narcissus. Dirs. Michael Powell and Emeric Pressburger. Pinewood Studios, 1947.House of Women. Dir. Michelle Williams Gamaker. Cinema Suitcase, 2017.The Fruit Is There to Be Eaten. Dir. Michelle Williams Gamaker. Cinema Suitcase, 2018.The Eternal Return. Dir. Michelle Williams Gamaker. Cinema Suitcase, 2018-2019.
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Timur, Sebnem, and Melike Turkan Bagli. "A Bodily Sign of “Doing Nothing”: Loitering or the Silence before the Storm." M/C Journal 9, no. 3 (July 1, 2006). http://dx.doi.org/10.5204/mcj.2634.

Повний текст джерела
Анотація:
One of the writers of this paper visited America at the end of the ‘90s and came across a curious translation dilemma as a foreigner. In some of the seemingly inauspicious districts of the city, there were signs saying “No Loitering” on the displays of shops or walls of residencies. These signs were causing anxiety for her, because she did not know the actual meaning of the phrase of “No Loitering”. (Her dictionary was still packed away.) Apart from being curious about the meaning of the phrase, she was rather afraid of performing “the act of loitering” since she had no idea what it meant. When she was settled she looked up to the meaning of the term “loitering”: “waiting, hanging around, lingering, dallying, etc…” (Oxford Encyclopedia). The Oxford Advanced Learner’s Dictionary of Current English defined “to loiter” as “to stand in a public place, usually with no particular or obvious purpose.” Based on this, if a person spends time hanging around or dallying in a public place with no purpose, the act of this person is called “loitering”. In the eyes of the newcomer, we suggest that “loitering” might be equal to more or less “doing nothing”. A person who is acting in the way described is almost inactive. When we view the issue from this framework, the person does not seem to be doing anything dangerous or precarious. In essence, what right or reason does someone have to command another “do not stand here”? Actually, a person who comes across such a warning can comfortably (if ironically) say that they are doing “nothing”. Loitering as a Sign of “Doing Nothing” From a semiological point of view, loitering can be seen as an honest act that reveals its intent of doing nothing by itself, because by definition loitering indicates to a lack of purpose and inactivity. On the other hand, loitering does not conjure up innocence associated with a natural state of inactivity. In fact, it conjures up possible danger, threat and crime. It does not signify doing nothing, but on the contrary it points to the possibility of being able to do “a very bad thing”. Closest to its definition, loitering might seem like an honest act; it can also be considered as the interval between inactivity and possible negative action. In this respect, loitering can be seen as the double-layered mythological sign of Barthes: namely, loitering at a denotative level is coded as innocent and honest – doing nothing signifies doing nothing. However, ideologically at a connotative level, loitering reveals itself as an action by which doing nothing is turned into doing something. Within this setting, if we accept that the subject does loiter with a “bad intention”, we can observe that the seemingly innocent acts of “lingering” and “dallying” can easily turn into proper camouflage instruments that conceal these “bad intentions”. Doing nothing can be considered to function as a curtain that briefly conceals the act of doing something or the possibility of doing something. Within this scope, loitering can also be a direct representation of a slippery possibility. We recall a specific type of postcards which was once quite fashionable. The characteristic of these postcards is to allow us to see two different images on the same surface. When those postcards are viewed from a definite angle you can see a picture of, for example, New York which is taken in daylight, and when viewed from another angle, this time the night vision of the same setting can be observed. When loitering is in question, there is a similar mechanism at work. The idea that we want to point out is that, due to the slippery nature of the category of the term loitering, neither of these pictures – each one depicting one side of the term – can be absolute. This is because of the permeable nature of these pictures. In fact, what is “real” is the very act of changing the angle while viewing the pictures: to be able to see the two pictures/definitions simultaneously. Loitering is a real conjunction point, a transformation point that we can not grasp between the two pictures/definitions: an interval point of innocent acts of dallying, lingering, and a threatening act of crime. In other words, between being a mythological and a denotative sign, loitering is the sign of possibility itself. The dominant paradigm of modern urban life defines “non-functionality” as inauspicious, immobile and therefore risky. Loitering can also be coupled with non-functionality, and this association would have two consequences: firstly the perception of the term alters toward a negative tone; secondly it opens up an area where we can discuss the body, the city and the concept of movement respectively: The loitering human body which is alive but non-functional in the public space brings to mind a series of possibilities that originate from a potential energy which is not in use. This is usually taken to be something “bad”. Namely, a person who loiters is not expected to give money to a beggar, but is often seen as likely to seize money from another person by violence. A city is a system depending on flow. In other words, it is a system depending on the flow of vehicles, people, goods, money and waste. For such a system depending on movement there is no place for stability. Thus, individuals should either take part in this flow or they should not act as a point of resistance that would be an obstacle to the movement. The late capitalist period has a “psychic” effect on urban life and individuals. Recently, this effect has been discussed with other approaches within discussions around the concept of Risk Society. Risk Society starts where the systems of security norms do not function against the threats (Beck). It is located in a new definition of modernity in which risks that are related to economic initiatives, security of employment, health and environment have increased intensively. Abundance of possibilities and uncertainties, and polysemy in Risk Society, create an intensive agenda. Concerning the psychological implications of Risk Society on individuals and their acts, Beck argues that our horizon also darkens due to risks. Hence, risks say what should not be done, but not what should be done. Risk management demands that precaution is taken through avoidance. A person who designs the world as a risk loses their ability to act in the end. The remarkable aspect of this development is that the increase in the intention of control turns this intention into its opposite (Beck). In this context, loitering can be considered as one of the risks in everyday life due to its ambiguous definition and perception. Returning to the earlier quote from Beck, the visuality of the “No Loitering” sign which tells what should be avoided or what should not be done in a commanding tone identifies a “risk zone”. In fact, while this sign functions to warn people concerning the area that the act of loitering can take place, it also embodies, constructs and strengthens the possibility of risk. Is Loitering a Crime? The prejudice supposing that loitering is dangerous reveals itself strikingly in legal matters. The “Chicago Anti-Gang Loitering” law, which was approved in 1992, allowed police to arrest persons who “remain in any one place with no apparent purpose” (“High Court Rejects Chicago Anti-Gang Loitering Law”) in the presence of a suspected gang member and who then fail to disperse satisfactorily when warned by police. Thus, it is possible for perceived loiterers to be arrested under the same law, although it is not proven that these people had been previously convicted of a crime, had committed a crime before their arrest, or were planning to commit an offence. “Before lower courts found the law unconstitutional in 1995, Chicago police issued 89,000 dispersal orders under the ordinance and made 42,000 arrests. The majority of people arrested were black or Latino” (“High Court Rejects Chicago Anti-Gang Loitering Law”). A group of justices considers the freedom to loiter a part of constitutional right. For example, Justice John Paul Stevens said, ‘the freedom to loiter for innocent purposes is part of the liberty’ protected by the U.S. Constitution. People in Chicago who stop to ‘engage in idle conversation or simply enjoy a cool breeze on a warm evening’ should not be subject to police commands. (“High Court Rejects Chicago Anti-Gang Loitering Law”) The second group claims that “Chicago Anti-Gang Loitering” law did not focus on specific criminal conduct and suggests that Chicago city lawyers redrafted this law to make it illegal to loiter, to “establish control over identifiable areas or to intimidate others from entering those areas” (“High Court Rejects Chicago Anti-Gang Loitering Law”). They argue that the lawyers are obliged to bring onto the agenda a better definition of the conduct for it to be accepted as a criminal act. A U.S. Constitutional Court abolished the “Chicago Anti-Gang Loitering” law in 1999, with ongoing discussions over the complicated nature of the issue. The legal uncertainty in the concept of loitering proves that the foreigner who had difficulties in understanding the notion was right in her concerns. All these things strikingly point to the possibility that somebody who is hanging around, chatting or lingering on a beautiful day can be arrested at any moment. The main reason the term “loiter” is obscure to the foreigner is not only because of the definitive meaning of loitering, but because the ambiguity of the term is still preserved after that. Thus, the person still has some hesitations about whether her behavior belongs to this category. The reason for her hesitation is based on the suspicion she has: she only intended to relax, dally and hang around (loiter); however, all those behaviors could be read (perceived) to suggest that she is about to engage in a criminal “bad” act. While the concept of social perception, which refers to the initial stage of evaluating the intentions of others using their body movements, hand gestures, facial expressions, and other biological motion cues (Allison, Puce and McCarthy), would explain the reason behind this reading, it is also possible to suggest that this kind of reading is conveyed by broader social norms. So, the problem which the foreigner experienced is the difficulty to create signs of doing nothing differentiating from the behaviors which are perceived as socially unacceptable. Last Word Nothing is the definition of a void. The aim of this essay is to discuss how loitering makes this void visible and representable. As defined earlier, a sign is a surface of meaning, an interface. Doing nothing, which is an intellectual or philosophical category, is represented in different ways in different cultures by some acts which form interfaces, and sometimes it is made visible. When signs of doing nothing are being discussed, one of the most important problems is related to defining and naming the acts. As congruent with the purpose of doing nothing, loitering would be the best representation of doing nothing. However, even if loitering does not include an intention to harm, it is considered that the state of danger continues since it is rather difficult to make this visible and comprehensible through bodily signs. Loitering is a state of inactivity, incapable of creating the signs that will make its intention obvious. Yet it signifies the storm itself by being perceived as the silence before the storm. References Allison, Truett, Aina Puce, and Gregory McCarthy. “Social Perception from Visual Cues: Roles of the STS region”. Trends in Cognitive Science 4 (2000): 267-278. Barthes, Roland. “Myth Today.” Mythologies. Trans. Annette Lavers. London: Vintage, 1990. Beck, Ulrich. The Reinvention of Politics: Rethinking Modernity in the Global Social Order. Trans. M. Ritter. Cambridge: Polity Press, 1997. “High Court Rejects Chicago Anti-Gang Loitering Law” 17 July 2006. http://www.ndsn.org/summer99/courts3.html>. Oxford Advanced Learner’s Dictionary of Current English. Ed. J. Crowther. Oxford: Oxford University Press, 1995. Oxford Encyclopedia English-Turkish Dictionary. Ä°stanbul: Sabah, 1990. Citation reference for this article MLA Style Timur, Sebnem, and Melike Turkan Bagli. "A Bodily Sign of “Doing Nothing”: Loitering or the Silence before the Storm." M/C Journal 9.3 (2006). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0607/05-timur-bagli.php>. APA Style Timur, S., and M. Bagli. (Jul. 2006) "A Bodily Sign of “Doing Nothing”: Loitering or the Silence before the Storm," M/C Journal, 9(3). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0607/05-timur-bagli.php>.
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Jethani, Suneel. "Lists, Spatial Practice and Assistive Technologies for the Blind." M/C Journal 15, no. 5 (October 12, 2012). http://dx.doi.org/10.5204/mcj.558.

Повний текст джерела
Анотація:
IntroductionSupermarkets are functionally challenging environments for people with vision impairments. A supermarket is likely to house an average of 45,000 products in a median floor-space of 4,529 square meters and many visually impaired people are unable to shop without assistance, which greatly impedes personal independence (Nicholson et al.). The task of selecting goods in a supermarket is an “activity that is expressive of agency, identity and creativity” (Sutherland) from which many vision-impaired persons are excluded. In response to this, a number of proof of concept (demonstrating feasibility) and prototype assistive technologies are being developed which aim to use smart phones as potential sensorial aides for vision impaired persons. In this paper, I discuss two such prototypic technologies, Shop Talk and BlindShopping. I engage with this issue’s list theme by suggesting that, on the one hand, list making is a uniquely human activity that demonstrates our need for order, reliance on memory, reveals our idiosyncrasies, and provides insights into our private lives (Keaggy 12). On the other hand, lists feature in the creation of spatial inventories that represent physical environments (Perec 3-4, 9-10). The use of lists in the architecture of assistive technologies for shopping illuminates the interaction between these two modalities of list use where items contained in a list are not only textual but also cartographic elements that link the material and immaterial in space and time (Haber 63). I argue that despite the emancipatory potential of assistive shopping technologies, their efficacy in practical situations is highly dependent on the extent to which they can integrate a number of lists to produce representations of space that are meaningful for vision impaired users. I suggest that the extent to which these prototypes may translate to becoming commercially viable, widely adopted technologies is heavily reliant upon commercial and institutional infrastructures, data sources, and regulation. Thus, their design, manufacture and adoption-potential are shaped by the extent to which certain data inventories are accessible and made interoperable. To overcome such constraints, it is important to better understand the “spatial syntax” associated with the shopping task for a vision impaired person; that is, the connected ordering of real and virtual spatial elements that result in a supermarket as a knowable space within which an assisted “spatial practice” of shopping can occur (Kellerman 148, Lefebvre 16).In what follows, I use the concept of lists to discuss the production of supermarket-space in relation to the enabling and disabling potentials of assistive technologies. First, I discuss mobile digital technologies relative to disability and impairment and describe how the shopping task produces a disabling spatial practice. Second, I present a case study showing how assistive technologies function in aiding vision impaired users in completing the task of supermarket shopping. Third, I discuss various factors that may inhibit the liberating potential of technology assisted shopping by vision-impaired people. Addressing Shopping as a Disabling Spatial Practice Consider how a shopping list might inform one’s experience of supermarket space. The way shopping lists are written demonstrate the variability in the logic that governs list writing. As Bill Keaggy demonstrates in his found shopping list Web project and subsequent book, Milk, Eggs, Vodka, a shopping list may be written on a variety of materials, be arranged in a number of orientations, and the writer may use differing textual attributes, such as size or underlining to show emphasis. The writer may use longhand, abbreviate, write neatly, scribble, and use an array of alternate spelling and naming conventions. For example, items may be listed based on knowledge of the location of products, they may be arranged on a list as a result of an inventory of a pantry or fridge, or they may be copied in the order they appear in a recipe. Whilst shopping, some may follow strictly the order of their list, crossing back and forth between aisles. Some may work through their list item-by-item, perhaps forward scanning to achieve greater economies of time and space. As a person shops, their memory may be stimulated by visual cues reminding them of products they need that may not be included on their list. For the vision impaired, this task is near impossible to complete without the assistance of a relative, friend, agency volunteer, or store employee. Such forms of assistance are often unsatisfactory, as delays may be caused due to the unavailability of an assistant, or the assistant having limited literacy, knowledge, or patience to adequately meet the shopper’s needs. Home delivery services, though readily available, impede personal independence (Nicholson et al.). Katie Ellis and Mike Kent argue that “an impairment becomes a disability due to the impact of prevailing ableist social structures” (3). It can be said, then, that supermarkets function as a disability producing space for the vision impaired shopper. For the vision impaired, a supermarket is a “hegemonic modern visual infrastructure” where, for example, merchandisers may reposition items regularly to induce customers to explore areas of the shop that they wouldn’t usually, a move which adds to the difficulty faced by those customers with impaired vision who work on the assumption that items remain as they usually are (Schillmeier 161).In addressing this issue, much emphasis has been placed on the potential of mobile communications technologies in affording vision impaired users greater mobility and flexibility (Jolley 27). However, as Gerard Goggin argues, the adoption of mobile communication technologies has not necessarily “gone hand in hand with new personal and collective possibilities” given the limited access to standard features, even if the device is text-to-speech enabled (98). Issues with Digital Rights Management (DRM) limit the way a device accesses and reproduces information, and confusion over whether audio rights are needed to convert text-to-speech, impede the accessibility of mobile communications technologies for vision impaired users (Ellis and Kent 136). Accessibility and functionality issues like these arise out of the needs, desires, and expectations of the visually impaired as a user group being considered as an afterthought as opposed to a significant factor in the early phases of design and prototyping (Goggin 89). Thus, the development of assistive technologies for the vision impaired has been left to third parties who must adopt their solutions to fit within certain technical parameters. It is valuable to consider what is involved in the task of shopping in order to appreciate the considerations that must be made in the design of shopping intended assistive technologies. Shopping generally consists of five sub-tasks: travelling to the store; finding items in-store; paying for and bagging items at the register; exiting the store and getting home; and, the often overlooked task of putting items away once at home. In this process supermarkets exhibit a “trichotomous spatial ontology” consisting of locomotor space that a shopper moves around the store, haptic space in the immediate vicinity of the shopper, and search space where individual products are located (Nicholson et al.). In completing these tasks, a shopper will constantly be moving through and switching between all three of these spaces. In the next section I examine how assistive technologies function in producing supermarkets as both enabling and disabling spaces for the vision impaired. Assistive Technologies for Vision Impaired ShoppersJason Farman (43) and Adriana de Douza e Silva both argue that in many ways spaces have always acted as information interfaces where data of all types can reside. Global Positioning System (GPS), Radio Frequency Identification (RFID), and Quick Response (QR) codes all allow for practically every spatial encounter to be an encounter with information. Site-specific and location-aware technologies address the desire for meaningful representations of space for use in everyday situations by the vision impaired. Further, the possibility of an “always-on” connection to spatial information via a mobile phone with WiFi or 3G connections transforms spatial experience by “enfolding remote [and latent] contexts inside the present context” (de Souza e Silva). A range of GPS navigation systems adapted for vision-impaired users are currently on the market. Typically, these systems convert GPS information into text-to-speech instructions and are either standalone devices, such as the Trekker Breeze, or they use the compass, accelerometer, and 3G or WiFi functions found on most smart phones, such as Loadstone. Whilst both these products are adequate in guiding a vision-impaired user from their home to a supermarket, there are significant differences in their interfaces and data architectures. Trekker Breeze is a standalone hardware device that produces talking menus, maps, and GPS information. While its navigation functionality relies on a worldwide radio-navigation system that uses a constellation of 24 satellites to triangulate one’s position (May and LaPierre 263-64), its map and text-to-speech functionality relies on data on a DVD provided with the unit. Loadstone is an open source software system for Nokia devices that has been developed within the vision-impaired community. Loadstone is built on GNU General Public License (GPL) software and is developed from private and user based funding; this overcomes the issue of Trekker Breeze’s reliance on trading policies and pricing models of the few global vendors of satellite navigation data. Both products have significant shortcomings if viewed in the broader context of the five sub-tasks involved in shopping described above. Trekker Breeze and Loadstone require that additional devices be connected to it. In the case of Trekker Breeze it is a tactile keypad, and with Loadstone it is an aftermarket screen reader. To function optimally, Trekker Breeze requires that routes be pre-recorded and, according to a review conducted by the American Foundation for the Blind, it requires a 30-minute warm up time to properly orient itself. Both Trekker Breeze and Loadstone allow users to create and share Points of Interest (POI) databases showing the location of various places along a given route. Non-standard or duplicated user generated content in POI databases may, however, have a negative effect on usability (Ellis and Kent 2). Furthermore, GPS-based navigation systems are accurate to approximately ten metres, which means that users must rely on their own mobility skills when they are required to change direction or stop for traffic. This issue with GPS accuracy is more pronounced when a vision-impaired user is approaching a supermarket where they are likely to encounter environmental hazards with greater frequency and both pedestrian and vehicular traffic in greater density. Here the relations between space defined and spaces poorly defined or undefined by the GPS device interact to produce the supermarket surrounds as a disabling space (Galloway). Prototype Systems for Supermarket Navigation and Product SelectionIn the discussion to follow, I look at two prototype systems using QR codes and RFID that are designed to be used in-store by vision-impaired shoppers. Shop Talk is a proof of concept system developed by researchers at Utah State University that uses synthetic verbal route directions to assist vision impaired shoppers with supermarket navigation, product search, and selection (Nicholson et al.). Its hardware consists of a portable computational unit, a numeric keypad, a wireless barcode scanner and base station, headphones for the user to receive the synthetic speech instructions, a USB hub to connect all the components, and a backpack to carry them (with the exception of the barcode scanner) which has been slightly modified with a plastic stabiliser to assist in correct positioning. Shop Talk represents the supermarket environment using two data structures. The first is comprised of two elements: a topological map of locomotor space that allows for directional labels of “left,” “right,” and “forward,” to be added to the supermarket floor plan; and, for navigation of haptic space, the supermarket inventory management system, which is used to create verbal descriptions of product information. The second data structure is a Barcode Connectivity Matrix (BCM), which associates each shelf barcode with several pieces of information such as aisle, aisle side, section, shelf, position, Universal Product Code (UPC) barcode, product description, and price. Nicholson et al. suggest that one of their “most immediate objectives for future work is to migrate the system to a more conventional mobile platform” such as a smart phone (see Mobile Shopping). The Personalisable Interactions with Resources on AMI-Enabled Mobile Dynamic Environments (PRIAmIDE) research group at the University of Deusto is also approaching Ambient Assisted Living (AAL) by exploring the smart phone’s sensing, communication, computing, and storage potential. As part of their work, the prototype system, BlindShopping, was developed to address the issue of assisted shopping using entirely off-the-shelf technology with minimal environmental adjustments to navigate the store and search, browse and select products (López-de-Ipiña et al. 34). Blind Shopping’s architecture is based on three components. Firstly, a navigation system provides the user with synthetic verbal instructions to users via headphones connected to the smart phone device being used in order to guide them around the store. This requires a RFID reader to be attached to the tip of the user’s white cane and road-marking-like RFID tag lines to be distributed throughout the aisles. A smartphone application processes the RFID data that is received by the smart phone via Bluetooth generating the verbal navigation commands as a result. Products are recognised by pointing a QR code reader enabled smart phone at an embossed code located on a shelf. The system is managed by a Rich Internet Application (RIA) interface, which operates by Web browser, and is used to register the RFID tags situated in the aisles and the QR codes located on shelves (López-de-Ipiña and 37-38). A typical use-scenario for Blind Shopping involves a user activating the system by tracing an “L” on the screen or issuing the “Location” voice command, which activates the supermarket navigation system which then asks the user to either touch an RFID floor marking with their cane or scan a QR code on a nearby shelf to orient the system. The application then asks the user to dictate the product or category of product that they wish to locate. The smart phone maintains a continuous Bluetooth connection with the RFID reader to keep track of user location at all times. By drawing a “P” or issuing the “Product” voice command, a user can switch the device into product recognition mode where the smart phone camera is pointed at an embossed QR code on a shelf to retrieve information about a product such as manufacturer, name, weight, and price, via synthetic speech (López-de-Ipiña et al. 38-39). Despite both systems aiming to operate with as little environmental adjustment as possible, as well as minimise the extent to which a supermarket would need to allocate infrastructural, administrative, and human resources to implementing assistive technologies for vision impaired shoppers, there will undoubtedly be significant establishment and maintenance costs associated with the adoption of production versions of systems resembling either prototype described in this paper. As both systems rely on data obtained from a server by invoking Web services, supermarkets would need to provide in-store WiFi. Further, both systems’ dependence on store inventory data would mean that commercial versions of either of these systems are likely to be supermarket specific or exclusive given that there will be policies in place that forbid access to inventory systems, which contain pricing information to third parties. Secondly, an assumption in the design of both prototypes is that the shopping task ends with the user arriving at home; this overlooks the important task of being able to recognise products in order to put them away or to use at a later time.The BCM and QR product recognition components of both respective prototypic systems associates information to products in order to assist users in the product search and selection sub-tasks. However, information such as use-by dates, discount offers, country of manufacture, country of manufacturer’s origin, nutritional information, and the labelling of products as Halal, Kosher, containing alcohol, nuts, gluten, lactose, phenylalanine, and so on, create further challenges in how different data sources are managed within the devices’ software architecture. The reliance of both systems on existing smartphone technology is also problematic. Changes in the production and uptake of mobile communication devices, and the software that they operate on, occurs rapidly. Once the fit-out of a retail space with the necessary instrumentation in order to accommodate a particular system has occurred, this system is unlikely to be able to cater to the requirement for frequent upgrades, as built environments are less flexible in the upgrading of their technological infrastructure (Kellerman 148). This sets up a scenario where the supermarket may persist as a disabling space due to a gap between the functional capacities of applications designed for mobile communication devices and the environments in which they are to be used. Lists and Disabling Spatial PracticeThe development and provision of access to assistive technologies and the data they rely upon is a commercial issue (Ellis and Kent 7). The use of assistive technologies in supermarket-spaces that rely on the inter-functional coordination of multiple inventories may have the unintended effect of excluding people with disabilities from access to legitimate content (Ellis and Kent 7). With de Certeau, we can ask of supermarket-space “What spatial practices correspond, in the area where discipline is manipulated, to these apparatuses that produce a disciplinary space?" (96).In designing assistive technologies, such as those discussed in this paper, developers must strive to achieve integration across multiple data inventories. Software architectures must be optimised to overcome issues relating to intellectual property, cross platform access, standardisation, fidelity, potential duplication, and mass-storage. This need for “cross sectioning,” however, “merely adds to the muddle” (Lefebvre 8). This is a predicament that only intensifies as space and objects in space become increasingly “representable” (Galloway), and as the impetus for the project of spatial politics for the vision impaired moves beyond representation to centre on access and meaning-making.ConclusionSupermarkets act as sites of hegemony, resistance, difference, and transformation, where the vision impaired and their allies resist the “repressive socialization of impaired bodies” through their own social movements relating to environmental accessibility and the technology assisted spatial practice of shopping (Gleeson 129). It is undeniable that the prototype technologies described in this paper, and those like it, indeed do have a great deal of emancipatory potential. However, it should be understood that these devices produce representations of supermarket-space as a simulation within a framework that attempts to mimic the real, and these representations are pre-determined by the industrial, technological, and regulatory forces that govern their production (Lefebvre 8). Thus, the potential of assistive technologies is dependent upon a range of constraints relating to data accessibility, and the interaction of various kinds of lists across the geographic area that surrounds the supermarket, locomotor, haptic, and search spaces of the supermarket, the home-space, and the internal spaces of a shopper’s imaginary. These interactions are important in contributing to the reproduction of disability in supermarkets through the use of assistive shopping technologies. The ways by which people make and read shopping lists complicate the relations between supermarket-space as location data and product inventories versus that which is intuited and experienced by a shopper (Sutherland). Not only should we be creating inventories of supermarket locomotor, haptic, and search spaces, the attention of developers working in this area of assistive technologies should look beyond the challenges of spatial representation and move towards a focus on issues of interoperability and expanded access of spatial inventory databases and data within and beyond supermarket-space.ReferencesDe Certeau, Michel. The Practice of Everyday Life. Berkeley: University of California Press, 1984. Print.De Souza e Silva, A. “From Cyber to Hybrid: Mobile Technologies As Interfaces of Hybrid Spaces.” Space and Culture 9.3 (2006): 261-78.Ellis, Katie, and Mike Kent. Disability and New Media. New York: Routledge, 2011.Farman, Jason. Mobile Interface Theory: Embodied Space and Locative Media. New York: Routledge, 2012.Galloway, Alexander. “Are Some Things Unrepresentable?” Theory, Culture and Society 28 (2011): 85-102.Gleeson, Brendan. Geographies of Disability. London: Routledge, 1999.Goggin, Gerard. Cell Phone Culture: Mobile Technology in Everyday Life. London: Routledge, 2006.Haber, Alex. “Mapping the Void in Perec’s Species of Spaces.” Tattered Fragments of the Map. Ed. Adam Katz and Brian Rosa. S.l.: Thelimitsoffun.org, 2009.Jolley, William M. When the Tide Comes in: Towards Accessible Telecommunications for People with Disabilities in Australia. Sydney: Human Rights and Equal Opportunity Commission, 2003.Keaggy, Bill. Milk Eggs Vodka: Grocery Lists Lost and Found. Cincinnati, Ohio: HOW Books, 2007.Kellerman, Aharon. Personal Mobilities. London: Routledge, 2006.Kleege, Georgia. “Blindness and Visual Culture: An Eyewitness Account.” The Disability Studies Reader. 2nd edition. Ed. Lennard J. Davis. New York: Routledge, 2006. 391-98.Lefebvre, Henri. The Production of Space. Oxford, UK: Blackwell, 1991.López-de-Ipiña, Diego, Tania Lorido, and Unai López. “Indoor Navigation and Product Recognition for Blind People Assisted Shopping.” Ambient Assisted Living. Ed. J. Bravo, R. Hervás, and V. Villarreal. Berlin: Springer-Verlag, 2011. 25-32. May, Michael, and Charles LaPierre. “Accessible Global Position System (GPS) and Related Orientation Technologies.” Assistive Technology for Visually Impaired and Blind People. Ed. Marion A. Hersh, and Michael A. Johnson. London: Springer-Verlag, 2008. 261-88. Nicholson, John, Vladimir Kulyukin, and Daniel Coster. “Shoptalk: Independent Blind Shopping Through Verbal Route Directions and Barcode Scans.” The Open Rehabilitation Journal 2.1 (2009): 11-23.Perec, Georges. Species of Spaces and Other Pieces. Trans. and Ed. John Sturrock. London: Penguin Books, 1997.Schillmeier, Michael W. J. Rethinking Disability: Bodies, Senses, and Things. New York: Routledge, 2010.Sutherland, I. “Mobile Media and the Socio-Technical Protocols of the Supermarket.” Australian Journal of Communication. 36.1 (2009): 73-84.
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Ellis, Katie, and Mike Kent. "iTunes Is Pretty (Useless) When You’re Blind: Digital Design Is Triggering Disability When It Could Be a Solution." M/C Journal 11, no. 3 (July 2, 2008). http://dx.doi.org/10.5204/mcj.55.

Повний текст джерела
Анотація:
Introduction This year, 2008, marks the tenth anniversary of the portable MP3 player. MPMan F10, the first such device to utilise the MP3-encoding format, was launched in March 1998 (Smith). However it was not until April 2003 when Apple Inc launched the iPod that the market began the massive growth that has made the devices almost ubiquitous in everyday life. In 2006 iPods were rated as more popular than beer amongst college students in the United States, according to Student Monitor. Beer had only previously surpassed in popularity once before, in 1997, by the Internet (Zeff). This year will also see the launch in Australia of the latest offering in this line of products – the iPhone – which incorporates the popular MP3 player in an advanced mobile phone. The iPhone features a touch-sensitive flat screen that serves as the interface for its operating system. While the design is striking, it also generates accessibility problems. There are obvious implications for those with vision impairments when there are no physical markers to point towards the phone’s functions (Crichton). This article critically examines the promise of Internet-based digital technology to open up the world to people with disabilities, and the parallel danger that the social construction of disability in the digital environment will simply come to mirror pre-existing analogue discrimination. This paper explores how technologies and innovations designed to improve access by the disabled actually enhance access for all users. The first part of the paper focuses on ‘Web 2.0’ and digital access for people with disability, particularly those with vision impairment. The online software that drives the iPod and iPhone and exclusively delivers content to these devices is iTunes. While iTunes seems on the surface to provide enormous opportunity for the vision impaired to access a broad selection of audio content, its design actually works to inhibit access to the platform for this group. Apple promotes the use of iTunes in educational settings through the iTunes U channel, and this potentially excludes those who have difficulty with access to the technology. Critically, it is these excluded people who, potentially, could benefit the most from the new technology. We consider the difficulty experienced by users of screen readers and braille tablets in relation to iTunes and highlight the potential problems for universities who seek to utilise iTunes U. In the second part of the paper we reframe disability accessibility as a principle of universal access and design and outline how changes made to assist users with disability can enhance the learning experience of all students using the Lectopia lecture recording and distribution system as an example. The third section of the paper situates these digital developments within the continuum of disability theory deploying Finkelstein’s three stages of disability development. The focus then shifts to the potential of online virtual worlds such as Second Life to act as a place where the promise of technology to mediate for disability might be realised. Goggin and Newell suggest that the Internet will not be fully accessible until disability is considered a cultural identity in the same way that class, gender and sexuality are. This article argues that accessibility must be addressed through the context of design and shared open standards for digital platforms. Web 2.0 and Accessibility The World Wide Web based its successful development on a set of common standards that worked across different software and operating systems. This interoperability held out great opportunity for the implementation of enabling software for those with disability, particularly sight and hearing impairments. The increasing sophistication and diversification of online content has confounded this initial promise. Websites have become more complex, particularly with the rise of ‘Web 2.0’ and the associated trends in coding and website design. This has aggravated attempts to mediate this content for a disabled audience through software (Zajicek). As Wood notes, ‘these days many computers are used principally to access the Internet – and there is no telling what a blind person will encounter there’. As the content requiring translation – either from text into audio or onto a braille tablet, or from audio into text captions – become less standardised and more complex, it becomes both harder for software to act as a translator, and harder to navigate this media once translated. This is particularly the case when links are generated ‘on the fly’ for each view of a website and where images replace words as hyperlinks. These problems can trace their origin to before the development of the World Wide Web. Reihing, addressing another Apple product in 1987 notes: The Apple Macintosh is particularly hard to use because it depends heavily on graphics. Some word processors ‘paint’ pictures of letters on the screen instead of using standard computer codes, and speech or braille devices can’t cope (in Goggin and Newell). Web 2.0 sites loaded with Ajax and other forms of Java scripting present a particular challenge for translation software (Zajicek). iTunes, an iconic Web 2.0 application, is a further step away from easily translated content as proprietary software that while operating though the Internet, does not conform to Web standards. Many translation software packages are unable to read the iTunes software at all or are limited and only able to read part of the page, but not enough of it to use the program (Furendal). As websites utilising ‘Web 2.0’ technology increase in popularity they become less attractive to users who are visually impaired, particularly because the dynamic elements can not be accessed using screen readers provided with the operating system (Bigham, Prince and Ladner). While at one level this presents an inability for a user with a disability to engage with the popular software, it also meant that universities seeking to use iTunes U to deliver content were excluding these students. To Apple’s credit they have taken some of these access concerns on board with the recent release of both the Apple operating system and iTunes, to better enable Apple’s own access software to translate the iTunes screen for blind users. However this also illustrates the problems with this type of software operating outside of nominated standards as there are still serious problems with access to iTunes on Microsoft’s dominant Windows operating system (Furendal). While Widows provides its own integrated screen reading software, the company acknowledges that this is not sufficiently powerful for regular use by disabled users who will need to use more specialised programs (Wood). The recent upgrade of the standard Windows operating system from XP to Vista seems to have abandoned the previous stipulation that there was a keyboard shortcut for each operation the system performed – a key requirement for those unable to use a visual interface on the screen to ‘point and click’ with a mouse (Wood). Other factors, such as the push towards iTunes U, explored in the next section, explain the importance of digital accessibility for everyone, not just the disabled as this technology becomes ubiquitous. The use of Lectopia in higher education demonstrates the value of flexibility of delivery to the whole student population, inclusive of the disabled. iPods and Higher Education iTunes is the enabling software supporting the iPod and iPhone. As well as commercial content, iTunes also acts as a distribution medium for other content that is free to use. It allows individuals or organisations to record and publish audio and video files – podcasts and vodcasts – that can be automatically downloaded from the Internet and onto individual computers and iPods as they become available. Significantly this technology has provided opportunities for educational use. iTunes U has been developed by Apple to facilitate the delivery of content from universities through the service. While Apple has acknowledged that this is, in part, a deliberate effort to drive the uptake of iTunes (Udell), there are particular opportunities for the distribution of information through this channel afforded by the technology. Duke University in the United States was an early adopter, distributing iPods to each of its first-year students for educational use as early as 2004 (Dean). A recent study of students at The University of Western Australia (UWA) by Williams and Fardon found that students who listen to lectures through portable media players such as iPods (the ‘Pod’ in iPod stands for ‘portable on demand’) have a higher attendance rate at lectures than those who do not. In 1998, the same year that the first portable MP3 player was being launched, the Lectopia (or iLecture) lecture recording and distribution system was introduced in Australia at UWA to enable students with disabilities better access to lecture materials. While there have been significant criticisms of this platform (Brabazon), the broad uptake and popularity of this technology, both at UWA and at many universities across Australia, demonstrates how changes made to assist disability can potentially help the broader community. This underpins the concept of ‘universal design’ where consideration given to people with disability also improves the lives of people without disability. A report by the Australian Human Rights and Equal Opportunity Commission, examined the accessibility of digital technology. Disability issues, such as access to digital content, were reframed as universal design issues: Disability accessibility issues are more accurately perceived in many cases as universal access issues, such that appropriate design for access by people with disabilities will improve accessibility and usability for … the community more generally. The idea of universal access was integral to Tim Berners-Lee’s original conception of the Web – however the platform has developed into a more complex and less ordered environment that can stray from agreed standards (Edwards, "Stop"). iTunes comes with its own accessibility issues. Furendal demonstrated that its design has added utility for some impairments notably dyslexia and colour blindness. However, as noted above, iTunes is highly problematic for those with other vision impairment particularly the blind. It is an example of the condition noted by Regan: There exists a false perception among designers that accessibility represents a restriction on creativity. There are few examples that exist in the world that can dissuade designers of this notion. While there are no technical reasons for this division between accessibility and design, the notion exists just the same. The invisibility of this issue confirms that while an awareness of differing abilities can assist all users, this blinkered approach to diverse visual acuities is not only blocking social justice imperatives but future marketing opportunities. The iPhone is notable for problems associated with use by people with disabilities, particularly people with hearing (Keizer) and vision impairments (Crichton). In colder climates the fact that the screen would not be activated by a gloved hand has also been a problem, its design reflects bias against not just the physically impaired. Design decisions reflect the socially constructed nature of disability where disability is related to how humans have chosen to construct the world (Finkelstein ,"To Deny"). Disability Theory and Technology Nora Groce conducted an anthropological study of Martha’s Vineyard in the United States. During the nineteenth century the island had an unusually high incidence of deafness. In response to this everyone on the island was able to communicate in sign language, regardless of the hearing capability, as a standard mode of communication. As a result the impairment of deafness did not become a disability in relation to communication. Society on the island was constructed to be inclusive without regard to a person’s hearing ability. Finkelstein (Attitudes) identified three stages of disability ‘creation’ to suggest disability (as it is defined socially) can be eradicated through technology. He is confident that the third phase, which he argues has been occurring in conjunction with the information age, will offset many of the prejudicial attitudes established during the second phase that he characterised as the industrial era. Digital technologies are often presented as a way to eradicate disability as it is socially constructed. Discussions around the Web and the benefits for people with disability usually centre on accessibility and social interaction. Digital documents on the Internet enable people with disability greater access than physical spaces, such as libraries, especially for the visually impaired who are able to make use of screen readers. There are more than 38 million blind people who utilise screen reading technology to access the Web (Bigham, Prince and Ladner). A visually impaired person is able to access digital texts whereas traditional, analogue, books remain inaccessible. The Web also allows people with disability to interact with others in a way that is not usually possible in general society. In a similar fashion to arguments that the Web is both gender and race neutral, people with disability need not identify as disabled in online spaces and can instead be judged on their personality first. In this way disability is not always a factor in the social encounter. These arguments however fail to address several factors integral to the social construction of disability. While the idea that a visually impaired person can access books electronically, in conjunction with a screen reader, sounds like a disability-free utopia, this is not always the case as ‘digital’ does not always mean ‘accessible’. Often digital documents will be in an image format that cannot be read by the user’s screen reader and will need to be converted and corrected by a sighted person. Sapey found that people with disabilities are excluded from informational occupations. Computer programming positions were fourth least likely of the 58 occupations examined to employ disabled people. As Rehing observed in 1987, it is a fantasy to think that accessibility for blind people simply means turning on a computer (Rehing in Goggin and Newell). Although it may sound empowering for people with disability to interact in an environment where they can live out an identity different from the rhythm of their daily patterns, the reality serves to decrease the visibility of disability in society. Further, the Internet may not be accessible for people with disability as a social environment in the first place. AbilityNet’s State of the eNation Web Accessibility Report: Social Networking Sites found a number of social networking sites including the popular MySpace and Facebook are inaccessible to users with a number of different disabilities, particularly those with a visual impairment such as blindness or a cognitive disability like dyslexia. This study noted the use of ‘Captcha’ – ‘Completely Automated Public Turing test to tell Computers and Humans Apart’ – technology designed to differentiate between a person signing up for an account and an automated computer process. This system presents an image of a word deliberately blurred and disfigured so that it cannot be readily identified by a computer, which can only be translated by a human user. This presents an obstacle to people with a visual impairment, particularly those relying on transcription software that will, by design, not be able to read the image, as well as those with dyslexia who may also have trouble translating the image on the screen. Virtual Worlds and New Possibilities The development of complex online virtual worlds such as Second Life presents their own set of challenges for access, for example, the use of Captcha. However they also afford opportunity. With over a million residents, there is a diversity of creativity. People are using Second Life to try on different identities or campaign for causes relevant in the real world. For example, Simon Stevens (Simon Walsh in SL), runs the nightclub Wheelies in the virtual world and continues to use a wheelchair and helmet in SL – similar to his real-life self: I personally changed Second Life’s attitude toward disability when I set up ‘Wheelies’, its first disability nightclub. This was one of those daft ideas which grew and grew and… has remained a central point for disability issues within Second Life. Many new Disabled users make contact with me for advice and wheelies has helped some of them ‘come out’ and use a wheelchair (Carter). Able-bodied people are also becoming involved in raising disability awareness through Second Life, for example Fez Richardson is developing applications for use in Second Life so that the non-disabled can experience the effects of impairment in this virtual realm (Cassidy) Tertiary Institutions are embracing the potential of Second Life, utilising the world as a virtual classroom. Bates argues that Second Life provides a learning environment free of physical barriers that has the potential to provide an enriched learning experience for all students regardless of whether they have a disability. While Second Life might be a good environment for those with mobility impairment there are still potential access problems for the vision and hearing impaired. However, Second Life has recently become open source and is actively making changes to aid accessibility for the visually impaired including an audible system where leaves rustle to denote a tree is nearby, and text to speech software (Sierra). Conclusion Goggin and Newell observe that new technology is a prominent component of social, cultural and political changes with the potential to mitigate for disability. The uneven interface of the virtual and the analogue, as demonstrated by the implementation and operation of iTunes, indicates that this mitigation is far from an inevitable consequence of this development. However James Edwards, author of the Brothercake blog, is optimistic that technology does have an important role in decreasing disability in wider society, in line with Finkelstein’s third phase: Technology is the last, best hope for accessibility. It's not like the physical world, where there are good, tangible reasons why some things can never be accessible. A person who's blind will never be able to drive a car manually; someone in a wheelchair will never be able to climb the steps of an ancient stone cathedral. Technology is not like the physical world – technology can take any shape. Technology is our slave, and we can make it do what we want. With technology there are no good reasons, only excuses (Edwards, "Technology"). Internet-based technologies have the potential to open up the world to people with disabilities, and are often presented as a way to eradicate disability as it is socially constructed. While Finkelstein believes new technologies characteristic of the information age will offset many of the prejudicial attitudes established during the industrial revolution, where technology was established around able-bodied norms, the examples of the iPhone and Captcha illustrate that digital technology is often constructed in the same social world that people with disability are routinely disabled by. The Lectopia system on the other hand enables students with disabilities to access lecture materials and highlights the concept of universal access, the original ideology underpinning design of the Web. Lectopia has been widely utilised by many different types of students, not just the disabled, who are seeking flexibility. While we should be optimistic, we must also be aware as noted by Goggin and Newell the Internet cannot be fully accessible until disability is considered a cultural identity in the same way that class, gender and sexuality are. Accessibility is a universal design issue that potentially benefits both those with a disability and the wider community. References AbilityNet Web Accessibility Team. State of the eNation Web Accessibility Reports: Social Networking Sites. AbilityNet. January 2008. 12 Apr. 2008 ‹http://www.abilitynet.org.uk/docs/enation/2008SocialNetworkingSites.pdf›. Bates, Jacqueline. "Disability and Access in Virtual Worlds." Paper presented at Alternative Format Conference, LaTrobe University, Melbourne, 21–23 Jan. 2008. Bigham, Jeffrey P., Craig M. Prince, and Richard E. Ladner . "WebAnywhere: A Screen Reader On-the-Go." Paper presented at 17th International World Wide Web Conference, Beijing, 21–22 April 2008. 29 Apr. 2008 ‹http://webinsight.cs.washington.edu/papers/webanywhere-html/›. Brabazon, Tara. "Socrates in Earpods: The iPodification of Education." Fast Capitalism 2.1, (July 2006). 8 June 2008 ‹http://www.uta.edu/huma/agger/fastcapitalism/2_1/brabazon.htm›. Carter, Paul. "Virtually the Same." Disability Now (May 2007). Cassidy, Margaret. "Flying with Disability in Second Life." Eureka Street 18.1 (10 Jan. 2008): 22-24. 15 June 2007 ‹http://www.eurekastreet.com.au/article.aspx?aeid=4849›. Crichton, Paul. "More on the iPhone…" Access 2.0. BBC.co.uk 22 Jan. 2007. 12 Apr. 2008 ‹http://www.bbc.co.uk/blogs/access20/2007/01/more_on_the_iphone.shtml›. Dean, Katie. "Duke Gives iPods to Freshmen." Wired Magazine (20 July 2004). 29 Apr. 2008 ‹http://www.wired.com/entertainment/music/news/2004/07/64282›. Edwards, James. "Stop Using Ajax!" Brothercake (24 April 2008). 1 May 2008 ‹http://dev.opera.com/articles/view/stop-using-ajax›. –––. "Technology Is the Last, Best Hope for Accessibility." Brothercake 13 Mar. 2007. 1 May 2008 ‹http://www.brothercake.com/site/resources/reference/hope›. Finkelstein, Victor. "To Deny or Not to Deny Disability." Magic Carpet 27.1 (1975): 31-38. 1 May 2008 ‹http://www.independentliving.org/docs1/finkelstein.html›. –––. Attitudes and Disabled People: Issues for Discussion. Geneva: World Rehabilitation Fund, 1980. 1 May 2008 ‹http://www.leeds.ac.uk/disability-studies/archiveuk/finkelstein/attitudes.pdf›. Furendal, David. "Downloading Music and Videos from the Internet: A Study of the Accessibility of The Pirate Bay and iTunes store." Presentation at Uneå University, 24 Jan. 2007. 13 Apr. 2008 ‹http://www.david.furendal.com/Accessibility.aspx›. Groce, Nora E. Everyone Here Spoke Sign Language: Hereditary Deafness on Martha's Vineyard. Cambridge, MA: Harvard University, 1985. Goggin, Gerard, and Christopher Newell. Digital Disability: The Social Construction of Disability in New Media. Oxford: Rowman & Littlefield, 2003. Human Rights and Equal Opportunities Commission. Accessibility of Electronic Commerce and New Service and Information Technologies for Older Australians and People with a Disability. 31 March 2000. 30 Apr. 2008 ‹http://www.hreoc.gov.au/disability_rights/inquiries/ecom/ecomrep.htm#BM2_1›. Keizer, Gregg. "Hearing Loss Group Complains to FCC about iPhone." Computerworld (20 Sep. 2007). 12 Apr. 2008 ‹http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9037999›. Regan, Bob. "Accessibility and Design: A Failure of the Imagination." ACM International Conference Proceedings Series 63: Proceedings of The 2004 International Cross-disciplinary Workshop on Web Accessibility (W4A). 29–37. Sapey, Bob. "Disablement in the Information Age." Disability and Society 15.4 (June 2000): 619–637. Sierra. "IBM Project: Second Life Accessible for Blind People." Techpin (24 Sep. 2007). 3 May 2008 ‹http://www.techpin.com/ibm-project-second-life-accessible-for-blind-people/›. Smith, Tony. "Ten Years Old: The World’s First MP3 Player." Register Hardware (10 Mar. 2008). 12 Apr. 2008 ‹http://www.reghardware.co.uk/2008/03/10/ft_first_mp3_player/›. Udell, Jon. "The iTunes U Agenda." InfoWorld (22 Feb. 2006). 13 Apr. 2008 ‹http://weblog.infoworld.com/udell/2006/02/22.html›. Williams, Jocasta, and Michael Fardon. "Perpetual Connectivity: Lecture Recordings and Portable Media Players." Proceedings from Ascilite, Singapore, 2–5 Dec. 2007. 1084–1092. Wood, Lamont. "Blind Users Still Struggle with 'Maddening' Computing Obstacles." Computerworld (16 Apr. 2008). 27 Apr. 2008 ‹http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9077118&source=NLT_AM&nlid=1›. Zajicek, Mary. "Web 2.0: Hype or Happiness?" Paper presented at International Cross-Disciplinary Conference on Web Accessibility, Banff, Canada, 2–9 May 2007. 12 Apr. 2008 ‹http://www.w4a.info/2007/prog/k2-zajicek.pdf›. Zeff, Robbin. "Universal Design across the Curriculum." New Directions for Higher Education 137 (Spring 2007): 27–44.
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Wilken, Rowan. "Walkie-Talkies, Wandering, and Sonic Intimacy." M/C Journal 22, no. 4 (August 14, 2019). http://dx.doi.org/10.5204/mcj.1581.

Повний текст джерела
Анотація:
IntroductionThis short article examines contemporary artistic use of walkie-talkies across two projects: Saturday (2002) by Sabrina Raaf and Walk That Sound (2014) by Lukatoyboy. Drawing on Dominic Pettman’s notion of sonic intimacy, I argue that both artists incorporate walkie-talkies as part of their explorations of mediated wandering, and in ways that seek to capture sonic ambiances and intimacies. One thing that is striking about both these works is that they rethink what’s possible with walkie-talkies; both artists use them not just as low-tech, portable devices for one-to-one communication over distance, but also—and more strikingly—as (covert) recording equipment for capturing, while wandering, snippets of intimate conversation between passers-by and the “voice” of the surrounding environment. Both artworks strive to make the familiar strange. They prompt us to question our preconceived perceptions of, and affective engagements with, the people and places around us, to listen more attentively to the voices of others (and the “Other”), and to aurally inhabit in new ways the spaces and places we find ourselves in and routinely pass through.The walkie-talkie is an established, simple communication device, consisting of a two-way radio transceiver with a speaker and microphone (in some cases, the speaker is also used as the microphone) and an antenna (Wikipedia). Walkie-talkies are half-duplex communication devices, meaning that they use a single radio channel: only one radio on the channel can transmit at a time, but many can listen; when a user wishes to talk, they must turn off the receiver and turn on the transmitter by pressing a push-to-talk button (Wikipedia). In some models, static—known as squelch—is produced each time the push-to-talk button is depressed. The push-to-talk button is a feature of both projects: in Saturday, it transforms the walkie-talkie into a cheap, portable recorder-transmitter. In Walk That Sound, rapid fire exchanges of conversation using the push-to-talk button feature strongly.Interestingly, walkie-talkies were developed during World War Two. While they continue to be used within certain industrial settings, they are perhaps best known as a “quaint” household toy and “fun tool” (Smith). Early print ads for walkie-talkie toys marketed them as a form of both spyware for kids (with the Gabriel Toy Co. releasing a 007-themed walkie-talkie set) and as a teletechnology for communication over distance—“how thrilling to ‘speak through space!’”, states one ad (Statuv “New!”). What is noteworthy about these early ads is that they actively promote experimental use of walkie-talkies. For instance, a 1953 ad for Vibro-Matic “Space Commander” walkie-talkies casts them as media transmission devices, suggesting that, with them, one can send and receive “voice – songs – music” (Statuv “New!”). In addition, a 1962 ad for the Knight-Kit walkie-talkie imagines “you’ll find new uses for this exciting walkie-talkie every day” (Statuv “Details”). Resurgent interest in walkie-talkies has seen them also promoted more recently as intimate tools “for communication without asking permission to communicate” (“Nextel”); this is to say that they have been marketed as devices for synchronous or immediate communication that overcome the limits of asynchronous communication, such as texting, where there might be substantial delays between the sending of a message and receipt of a response. Within this context, it is not surprising that Snapchat and Instagram have also since added “walkie-talkie” features to their messaging services. The Nextel byline, emphasising “without asking permission”, also speaks to the possibilities of using walkie-talkies as rudimentary forms of spyware.Within art practice that explores mediated forms of wandering—that is, walking while using media and various “remote transmission technologies” (Duclos 233)—walkie-talkies hold appeal for a number of reasons, including their particular aesthetic qualities, such as the crackling or static sound (squelch) that one encounters when using them; their portability; their affordability; and, the fact that, while they can be operated on multiple channels, they tend to be regarded primarily as devices that permit two-way, one-to-one (and therefore intimate, if not secure) remote communication. As we will see below, however, contemporary artists, such as the aforementioned earlier advertisers, have also been very attentive to the device’s experimental possibilities. Perhaps the best known (if possibly apocryphal) example of artistic use of walkie-talkies is by the Situationist International as part of their explorations in urban wandering (a revolutionary strategy called dérive). In the Situationist text from 1960, Die Welt als Labyrinth (Anon.), there is a detailed account of how walkie-talkies were to form part of a planned dérive, which was organised by the Dutch section of the Situationist International, through the city of Amsterdam, but which never went ahead:Two groups, each containing three situationists, would dérive for three days, on foot or eventually by boat (sleeping in hotels along the way) without leaving the center of Amsterdam. By means of the walkie-talkies with which they would be equipped, these groups would remain in contact, with each other, if possible, and in any case with the radio-truck of the cartographic team, from where the director of the dérive—in this case Constant [Nieuwenhuys]—moving around so as to maintain contact, would define their routes and sometimes give instructions (it was also the director of the dérive’s responsibility to prepare experiments at certain locations and secretly arranged events.) (Anon.) This proposed dérive formed part of Situationist experiments in unitary urbanism, a process that consisted of “making different parts of the city communicate with one another.” Their ambition was to create new situations informed by, among other things, encounters and atmospheres that were registered through dérive in order to reconnect parts of the city that were separated spatially (Lefebvre quoted in Lefebvre and Ross 73). In an interview with Kristin Ross, Henri Lefebvre insists that the Situationists “did have their experiments; I didn’t participate. They used all kinds of means of communication—I don’t know when exactly they were using walkie-talkies. But I know they were used in Amsterdam and in Strasbourg” (Lefebvre quoted in Lefebvre and Ross 73). However, as Rebecca Duclos points out, such use “is, in fact, not well documented”, and “none of the more well-known reports on situationist activity […] specifically mentions the use of walkie-talkies within their descriptive narratives” (Duclos 233). In the early 2000s, walkie-talkies also figured prominently, alongside other media devices, in at least two location-based gaming projects by renowned British art collective Blast Theory, Can You See Me Now? (2001) and You Get Me (2008). In the first of these projects, participants in the game (“online players”) competed against members of Blast Theory (“runners”), tracking them through city streets via a GPS-enabled handheld computer that runners carried with them. The goal for online players was to move an avatar they created through a virtual map of the city as multiple runners “pursued their avatar’s geographical coordinates in real-time” (Leorke). As Dale Leorke explains, “Players could see the locations of the runners and other players and exchange text messages with other players” (Leorke 27), and runners could “read players’ messages and communicate directly with each other through a walkie-talkie” (28). An audio stream from these walkie-talkie conversations allowed players to eavesdrop on their pursuers (Blast Theory, Can You See Me Now?).You Get Me was similarly structured, with online players and “runners” (eight teenagers who worked with Blast Theory on the game). Remotely situated online players began the game by listening to the “personal geography” of the runners over a walkie-talkie stream (Blast Theory, You Get Me). They then selected one runner, and tracked them down by navigating their own avatar, without being caught, through a virtual version of Mile End Park in London, in pursuit of their chosen runner who was moving about the actual Mile End Park. Once their chosen runner was contacted, the player had to respond to a question that the runner posed to them. If the runner was satisfied with the player’s answer, conversation switched to “the privacy of a mobile phone” in order to converse further; if not, the player was thrown back into the game (Blast Theory, You Get Me). A key aim of Blast Theory’s work, as I have argued elsewhere (Wilken), is the fostering of interactions and fleeting intimacies between relative and complete strangers. The walkie-talkie is a key tool in both the aforementioned Blast Theory projects for facilitating these interactions and intimacies.Beyond these well-known examples, walkie-talkies have been employed in productive and exploratory ways by other artists. The focus in this article is on two specific projects: the first by US-based sound artist Sabrina Raaf, called Saturday (2002) and the second by Serbian sound designer Lukatoyboy (Luka Ivanović), titled Walk That Sound (2014). Sonic IntimaciesThe concept that gives shape and direction to the analysis of the art projects by Raaf and Lukatoyboy and their use of walkie-talkies is that of sonic intimacy. This is a concept of emerging critical interest across media and sound studies and geography (see, for example, James; Pettman; Gallagher and Prior). Sonic intimacy, as Dominic Pettman explains, is composed of two simultaneous yet opposing orientations. On the one hand, sonic intimacy involves a “turning inward, away from the wider world, to more private and personal experiences and relationships” (79). While, on the other hand, it also involves a turning outward, to seek and heed “the voice of the world” (79)—or what Pettman refers to as the “vox mundi” (66). Pettman conceives of the “vox mundi” as an “ecological voice”, whereby “all manner of creatures, agents, entities, objects, and phenomena” (79) have the opportunity to speak to us, if only we were prepared to listen to our surroundings in new and different ways. In a later passage, he also refers to the “vox mundi” as a “carrier or potentially enlightening alterity” (83). Voices, Pettman writes, “transgress the neat divisions we make between ‘us’ and ‘them’, at all scales and junctures” (6). Thus, Pettman’s suggestion is that “by listening to the ‘voices’ that lie dormant in the surrounding world […] we may in turn foster a more sustainable relationship with [the] local matrix of specific existences” (85), be they human or otherwise.This formulation of sonic intimacy provides a productive conceptual frame for thinking through Raaf’s and Lukatoyboy’s use of walkie-talkies. The contention in this article is that these two projects are striking for the way that they both use walkie-talkies to explore, simultaneously, this double articulation or dual orientation of sonic intimacy—a turning inwards to capture more private and personal experiences and conversations, and a turning outwards to capture the vox mundi. Employing Pettman’s notion of sonic intimacy as a conceptual frame, I trace below the different ways that these two projects incorporate walkie-talkies in order to develop mediated forms of wandering that seek to capture place-based sonic ambiances and sonic intimacies.Sabrina Raaf, Saturday (2002)US sound artist Sabrina Raaf’s Saturday (2002) is a sound-based art installation based on recordings of “stolen conversations” that Raaf gathered over many Saturdays in Humboldt Park, Chicago. Raaf’s work harks back to the early marketing of walkie-talkie toys as spyware. In Raaf’s hands, this device is used not for engaging in intimate one-to-one conversation, but for listening in on, and capturing, the intimate conversations of others. In other words, she uses this device, as the Nextel slogan goes, for “communication without permission to communicate” (“Nextel”). Raaf’s inspiration for the piece was twofold. First, she has noted that “with the overuse of radio frequency bands for wireless communications, there comes the increased occurrence of crossed lines where a private conversation becomes accidentally shared” (Raaf). Reminiscent of Francis Ford Coppola’s film The Conversation (1974), in which surveillance expert Harry Caul (Gene Hackman) records the conversation of a couple as they walk through crowded Union Square in San Francisco, Raaf used a combination of walkie-talkies, CB radios, and “various other forms of consumer spy […] technology in order to actively harvest such communication leaks” (Raaf). The second source of inspiration was noticing the “sheer quantity of non-phone, low tech, radio transmissions that were constantly being sent around [the] neighbourhood”, transmissions that were easily intercepted. These conversations were eclectic in composition and character:The transmissions included communications between gang members on street corners nearby and group conversations between friends talking about changes in the neighbourhood and their families. There were raw, intimate conversations and often even late night sex talk between potential lovers. (Raaf)What struck Raaf about these conversations, these transmissions, was that there was “a furtive quality” to most of them, and “a particular daringness to their tone”.During her Saturday wanderings, Raaf complemented her recordings of stolen snippets of conversation with recordings of the “voice” of the surrounding neighbourhood—“the women singing out their windows to their radios, the young men in their low rider cars circling the block, the children, the ice cream carts, etc. These are the sounds that are mixed into the piece” (Raaf).Audience engagement with Saturday involves a kind of austere intimacy of its own that seems befitting of a surveillance-inspired sonic portrait of urban and private life. The piece is accessed via an interactive glove. This glove is white in colour and about the size of a large gardening glove, with a Velcro strap that fastens across the hand, like a cycling glove. The glove, which only has coverings for thumb and first two fingers (it is missing the ring and little fingers) is wired into and rests on top of a roughly A4-sized white rectangular box. This box, which is mounted onto the wall of an all-white gallery space at the short end, serves as a small shelf. The displayed glove is illuminated by a discrete, bent-arm desk lamp, that protrudes from the shelf near the gallery wall. Above the shelf are a series of wall-mounted colour images that relate to the project. In order to hear the soundtrack of Saturday, gallery visitors approach the shelf, put on the glove, and “magically just press their fingertips to their forehead [to] hear the sound without the use of their ears” (Raaf). The glove, Raaf explains, “is outfitted with leading edge audio electronic devices called ‘bone transducers’ […]. These transducers transmit sound in a very unusual fashion. They translate sound into vibration patterns which resonate through bone” (Raaf).Employing this technique, Raaf explains, “permits a new way of listening”:The user places their fingers to their forehead—in a gesture akin to Rodin’s The Thinker or of a clairvoyant—in order to tap into the lives of strangers. Pressing different combinations of fingers to the temple yield plural viewpoints and group conversations. These sounds are literally mixed in the bones of the listener. (Raaf) The result is a (literally and figuratively) touching sonic portrait of Humboldt Park, its residents, and the “voice” of its surrounding neighbourhoods. Through the unique technosomatic (Richardson) apparatus—combinations of gestures that convey the soundscape directly through the bones and body—those engaging with Saturday get to hear voices in/of/around Humboldt Park. It is a portrait that combines sonic intimacy in the two forms described earlier in this article. In its inward-focused form, the gallery visitor-listener is positioned as a voyeur of sorts, listening into stolen snippets of private and personal relationships, experiences, and interactions. And, in its outward-focused form, the gallery visitor-listener encounters a soundscape in which an array of agents, entities, and objects are also given a voice. Additional work performed by this piece, it seems to me, is to be found in the intermingling of these two form of sonic intimacy—the personal and the environmental—and the way that they prompt reflection on mediation, place, urban life, others, and intimacy. That is to say that, beyond its particular sonic portrait of Humboldt Park, Saturday works in “clearing some conceptual space” in the mind of the departing gallery visitor such that they might “listen for, if not precisely to, the collective, polyphonic ‘voice of the world’” (Pettman 6) as they go about their day-to-day lives.Lukatoyboy, Walk That Sound (2014)The second project, Walk That Sound, by Serbian sound artist Lukatoyboy was completed for the 2014 CTM festival. CTM is an annual festival event that is staged in Berlin and dedicated to “adventurous music and art” (CTM Festival, “About”). A key project within the festival is CTM Radio Lab. The Lab supports works, commissioned by CTM Festival and Deutschlandradio Kultur – Hörspiel/Klangkunst (among other partnering organisations), that seek to pair and explore the “specific artistic possibilities of radio with the potentials of live performance or installation” (CTM Festival, “Projects”). Lukatoyboy’s Walk That Sound was one of two commissioned pieces for the 2014 CTM Radio Lab. The project used the “commonplace yet often forgotten walkie-talkie” (CTM Festival, “Projects”) to create a moving urban sound portrait in the area around the Kottbusser Tor U-Bahn station in Berlin-Kreuzberg. Walk That Sound recruited participants—“mobile scouts”—to rove around the Kottbusser Tor area (CTM Festival, “Projects”). Armed with walkie-talkies, and playing with “the array of available and free frequencies, and the almost unlimited amount of users that can interact over these different channels”, the project captured the dispatches via walkie-talkie of each participant (CTM Festival, “Projects”). The resultant recording of Walk That Sound—which was aired on Deutschlandradio (see Lukatoyboy), part of a long tradition of transmitting experimental music and sound art on German radio (Cory)—forms an eclectic soundscape.The work juxtaposes snippets of dialogue shared between the mobile scouts, overheard mobile phone conversations, and moments of relative quietude, where the subdued soundtrack is formed by the ambient sounds—the “voice”—of the Kottbusser Tor area. This voice includes distant traffic, the distinctive auditory ticking of pedestrian lights, and moments of tumult and agitation, such as the sounds of construction work, car horns, emergency services vehicle sirens, a bottle bouncing on the pavement, and various other repetitive yet difficult to identify industrial sounds. This voice trails off towards the end of the recording into extended walkie-talkie produced static or squelch. The topics covered within the “crackling dialogues” (CTM Festival, “Projects”) of the mobile scouts ranged widely. There were banal observations (“I just stepped on a used tissue”; “people are crossing the street”; “there are 150 trains”)—wonderings that bear strong similarities with French writer Georges Perec’s well-known experimental descriptions of everyday Parisian life in the 1970s (Perec “An Attempt”). There were also intimate, confiding, flirtatious remarks (“Do you want to come to Turkey with me?”), as well as a number of playfully paranoid observations and quips (“I like to lie”; “I can see you”; “do you feel like you are being recorded?”; “I’m being followed”) that seem to speak to the fraught history of Berlin in particular as well as the complicated character of urban life in general—as Pettman asks, “what does ‘together’ signify in a socioeconomic system so efficient in producing alienation and isolation?” (92).In sum, Walk That Sound is a strangely moving exploration of sonic intimacy, one that shifts between many different registers and points of focus—much like urban wandering itself. As a work, it is variously funny, smart, paranoid, intimate, expansive, difficult to decipher, and, at times, even difficult to listen to. Pettman argues that, “thanks in large part to the industrialization of the human ear […], we have lost the capacity to hear the vox mundi, which is […] the sum total of cacophonous, heterogeneous, incommensurate, and unsynthesizable sounds of the postnatural world” (8). Walk That Sound functions almost like a response to this dilemma. One comes away from listening to it with a heightened awareness of, appreciation for, and aural connection to the rich messiness of the polyphonic contemporary urban vox mundi. ConclusionThe argument of this article is that Sabrina Raaf’s Saturday and Lukatoyboy’s Walk That Sound are two projects that both incorporate walkie-talkies in order to develop mediated forms of wandering that seek to capture place-based sonic ambiances and sonic intimacies. Drawing on Pettman’s notion of “sonic intimacy”, examination of these projects has opened consideration around voice, analogue technology, and what Nick Couldry refers to as “an obligation to listen” (Couldry 580). In order to be heard, Pettman remarks, and “in order to be considered a voice at all”, and therefore as “something worth heeding”, the vox mundi “must arrive intimately, or else it is experienced as noise or static” (Pettman 83). In both the projects discussed here—Saturday and Walk That Sound—the walkie-talkie provides this means of “intimate arrival”. As half-duplex communication devices, walkie-talkies have always fulfilled a double function: communicating and listening. This dual functionality is exploited in new ways by Raaf and Lukatoyboy. In their projects, both artists turn the microphone outwards, such that the walkie-talkie becomes not just a device for communicating while in the field, but also—and more strikingly—it becomes a field recording device. The result of which is that this simple, “playful” communication device is utilised in these two projects in two ways: on the one hand, as a “carrier of potentially enlightening alterity” (Pettman 83), a means of encouraging “potential encounters” (89) with strangers who have been thrown together and who cross paths, and, on the other hand, as a means of fostering “an environmental awareness” (89) of the world around us. In developing these prompts, Raaf and Lukatoyboy build potential bridges between Pettman’s work on sonic intimacy, their own work, and the work of other experimental artists. For instance, in relation to potential encounters, there are clear points of connection with Blast Theory, a group who, as noted earlier, have utilised walkie-talkies and sound-based and other media technologies to explore issues around urban encounters with strangers that promote reflection on ideas and experiences of otherness and difference (see Wilken)—issues that are also implicit in the two works examined. In relation to environmental awareness, their work—as well as Pettman’s calls for greater sonic intimacy—brings renewed urgency to Georges Perec’s encouragement to “question the habitual” and to account for, and listen carefully to, “the common, the ordinary, the infraordinary, the background noise” (Perec “Approaches” 210).Walkie-talkies, for Raaf and Lukatoyboy, when reimagined as field recording devices as much as remote transmission technologies, thus “allow new forms of listening, which in turn afford new forms of being together” (Pettman 92), new forms of being in the world, and new forms of sonic intimacy. Both these artworks engage with, and explore, what’s at stake in a politics and ethics of listening. Pettman prompts us, as urban dweller-wanderers, to think about how we might “attend to the act of listening itself, rather than to a specific sound” (Pettman 1). His questioning, as this article has explored, is answered by the works from Raaf and Lukatoyboy in effective style and technique, setting up opportunities for aural attentiveness and experiential learning. However, it is up to us whether we are prepared to listen carefully and to open ourselves to such intimate sonic contact with others and with the environments in which we live.ReferencesAnon. “Die Welt als Labyrinth.” Internationale Situationiste 4 (Jan. 1960). International Situationist Online, 19 June 2019 <https://www.cddc.vt.edu/sionline/si/diewelt.html>Blast Theory. “Can You See Me Now?” Blast Theory, 19 June 2019 <https://www.blasttheory.co.uk/projects/can-you-see-me-now/>.———. “You Get Me.” Blast Theory, 19 June 2019 <https://wwww.blasttheory.co.uk/projects/you-get-me/>.Cory, Mark E. “Soundplay: The Polyphonous Tradition of German Radio Art.” Wireless Imagination: Sound, Radio, and the Avant-garde. Eds. Douglas Kahn and Gregory Whitehead. Cambridge, MA: MIT P, 1992. 331–371.Couldry, Nick. “Rethinking the Politics of Voice.” Continuum 23.4 (2009): 579–582.CTM Festival. “About.” CTM Festival, 2019. 19 June 2019 <https://www.ctm-festival.de/about/ctm-festival/>.———. “Projects – CTM Radio Lab.” CTM Festival, 2019. 19 June 2019 <https://www.ctm-festival.de/projects/ctm-radio-lab/>.Duclos, Rebecca. “Reconnaissance/Méconnaissance: The Work of Janet Cardiff and George Bures Miller.” Articulate Objects: Voice, Sculpture and Performance. Eds. Aura Satz and Jon Wood. Bern: Peter Lang, 2009. 221–246. Gallagher, Michael, and Jonathan Prior. “Sonic Geographies: Exploring Phonographic Methods.” Progress in Human Geography 38.2 (2014): 267–284.James, Malcom. Sonic Intimacy: The Study of Sound. London: Bloomsbury, forthcoming.Lefebvre, Henri, and Kristin Ross. “Lefebvre on the Situationists: An Interview.” October 79 (Winter 1997): 69–83. Leorke, Dale. Location-Based Gaming: Play in Public Space. Singapore: Palgrave Macmillan, 2019.Lukatoyboy. “Walk That Sound – Deutschlandradiokultur Klangkunst Broadcast 14.02.2014.” SoundCloud. 19 June 2019 <https://soundcloud.com/lukatoyboy/walk-that-sound-deutschlandradiokultur-broadcast-14022014>.“Nextel: Couple. Walkie Talkies Are Good for Something More.” AdAge. 6 June 2012. 18 July 2019 <https://adage.com/creativity/work/couple/27993>.Perec, Georges. An Attempt at Exhausting a Place in Paris. Trans. Marc Lowenthal. Cambridge, MA: Wakefield Press, 2010.———. “Approaches to What?” Species of Spaces and Other Pieces. Rev. ed. Ed. and trans. John Sturrock. Harmondsworth, Middlesex: Penguin, 1999. 209–211.Pettman, Dominic. Sonic Intimacy: Voice, Species, Technics (Or, How to Listen to the World). Stanford, CA: Stanford UP, 2017.Raaf, Sabrina. “Saturday.” Sabrina Raaf :: New Media Artist, 2002. 19 June 2019 <http://raaf.org/projects.php?pcat=2&proj=10>.Richardson, Ingrid. “Mobile Technosoma: Some Phenomenological Reflections on Itinerant Media Devices.” The Fibreculture Journal 6 (2005). <http://six.fibreculturejournal.org/fcj-032-mobile-technosoma-some-phenomenological-reflections-on-itinerant-media-devices/>. Smith, Ernie. “Roger That: A Short History of the Walkie Talkie.” Vice, 23 Sep. 2017. 19 June 2019 <https://www.vice.com/en_us/article/vb7vk4/roger-that-a-short-history-of-the-walkie-talkie>. Statuv. “Details about Allied Radio Knight-Kit C-100 Walkie Talkie CB Radio Vtg Print Ad.” Statuv, 4 Jan. 2016. 18 July 2019 <https://statuv.com/media/74802043788985511>.———. “New! 1953 ‘Space Commander’ Vibro-Matic Walkie-Talkies.” Statuv, 4 Jan. 2016. 18 July 2019 <https://statuv.com/media/74802043788985539>.Wikipedia. “Walkie-Talkie”. Wikipedia, 3 July 2019. 18 July 2019 <https://en.wikipedia.org/wiki/Walkie-talkie>.Wilken, Rowan. “Proximity and Alienation: Narratives of City, Self, and Other in the Locative Games of Blast Theory.” The Mobile Story: Narrative Practices with Locative Technologies. Ed. Jason Farman. New York: Routledge, 2014. 175–191.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії