To see the other types of publications on this topic, follow the link: Environment and development databank (Computer file).

Journal articles on the topic 'Environment and development databank (Computer file)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Environment and development databank (Computer file).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Monteiro, Carlos, and José Leal. "Managing experiments on cognitive processes in writing with HandSpy." Computer Science and Information Systems 10, no. 4 (2013): 1747–73. http://dx.doi.org/10.2298/csis121130061m.

Full text
Abstract:
Experiments on cognitive processes require a detailed analysis of the contribution of many participants. In the case of cognitive processes in writing, these experiments require special software tools to collect gestures performed with a pen or a stylus, and recorded with special hardware. These tools produce different kinds of data files in binary and proprietary formats that need to be managed on a workstation file system for further processing with generic tools, such as spreadsheets and statistical analysis software. The lack of common formats and open repositories hinders the possibility of distributing the workload among researchers within the research group, of re-processing the collected data with software developed by other research groups, and of sharing results with the rest of the cognitive processes research community. This paper describes the development of HandSpy, a collaborative environment for managing experiments in the cognitive processes in writing. This environment was designed to cover all the stages of the experiment, from the definition of tasks to be performed by participants, to the synthesis of results. Collaboration in HandSpy is enabled by a rich web interface. To decouple the environment from existing hardware devices for collecting written production, namely digitizing tablets and smart pens, HandSpy is based on the InkML standard, an XML data format for representing digital ink. This design choice shaped many of the features in HandSpy, such as the use of an XML database for managing application data and the use of XML transformations. XML transformations convert between persistent data representations used for storage and transient data representations required by the widgets on the user interface. Despite being a system independent from a specific collecting device, for the system validation, a framework for data collection was created. This framework has also been highlighted in the paper due to the important role it took in a data collection process, of a scientific project to study the cognitive processes involved in writing.
APA, Harvard, Vancouver, ISO, and other styles
2

Vilas Boas, José Luiz, Fabio Takeshi Matsunaga, Neyva Maria Lopes Romeiro, and Jacques Duílio Brancher. "Client-server architecture for pre and post-processing of real problems involving two-dimensional generalized coordinates." International Journal of Web Information Systems 11, no. 2 (June 15, 2015): 226–45. http://dx.doi.org/10.1108/ijwis-12-2014-0044.

Full text
Abstract:
Purpose – The aim of this paper is to propose a Web environment for pre-processing and post-processing for 2D problems in generalized coordinate systems. Design/methodology/approach – The system consists of a Web service for client-server communication, a database for user information, simulation requests and results storage, a module of (for) calculation processing (front-end) and a graphical interface for visualization of discretized mesh (back-end). Findings – The Web system was able to model real problems and situations, where the user can describe the problem or upload a geometry file descriptor, generated from computer graphics software. The Web system, programmed for finite difference solutions, was able to generate a mesh from other complex methods, such as finite elements method, adapting it to the proposed Web system, respecting the finite difference mesh structure. Research limitations/implications – The proposed Web system is limited to solve partial differential equations by finite difference discretization. We need to study about refinement and parameters adaptations to solve partial differential equations simulated with other methods. Practical implications – The Web system includes implications for the development of a powerful real problems simulator, which is useful for computational physics researchers and engineers. The Web system uses several technologies, such as Primefaces, JavaScript, JQuery and HTML, to provide an interactive user interface. Originality/value – The main contribution of this work is the availability of a generic Web architecture for including other types of coordinate systems and to solve others partial differential equations. Moreover, this paper presents an extended version of the work presented in ICCSA 2014.
APA, Harvard, Vancouver, ISO, and other styles
3

Villordon*, Arthur, Jason Franklin, and Don LaBonte. "Using Personal Digital Assistants and Electronic Forms to Collect and Rapidly Summarize Field Data." HortScience 39, no. 4 (July 2004): 875D—875. http://dx.doi.org/10.21273/hortsci.39.4.875d.

Full text
Abstract:
The use of handheld computers such as personal digital assistants (PDAs) represents a feasible method of automating the transfer of files to computers for archiving and statistical analysis. Data collected using the PDA can be transferred directly to a database program on a desktop computer, virtually eliminating errors associated with the reentry of manually collected data. These devices are highly portable and can be housed in protective cases, enabling data collection even in inclement environments. The availability of handheld database programs that permit the development of electronic forms further makes the PDA a viable data collection platform for scientific research. These database applications not only allow novice users to develop customized forms that facilitate the recording of alphanumeric data; these applications also synchronize directly with current desktop-based database and spread-sheet applications. We used Microsoft Access database tables, along with Visual CE, a PocketPC database application, to generate electronic forms for collecting data from research trials conducted in 2003. To facilitate comparison with manual data collection, we also recorded observations using “pen and paper” methods. We found no differences between both methods in the length of time required to enter observations. However, the PDA transferred the data to a computer 600% faster relative to the manual reentry method. Using the handheld computer, field data was immediately available for compilation and statistical analysis within minutes of completing the data gathering process, at the same time ensuring the integrity and continuity of the files.
APA, Harvard, Vancouver, ISO, and other styles
4

Carrasco Viera, Jesús Alejandro, and José Ignacio Cruz Moreira. "Modelado del sistema automático de descargas e implementación del módulo de descargas automáticas." Sociedad & Tecnología 2, no. 2 (January 8, 2021): 14–21. http://dx.doi.org/10.51247/st.v2i2.9.

Full text
Abstract:
La presente investigación se llevó a cabo en la Universidad de Cienfuegos con el fin de diseñar un sistema informático e implementar el módulo de Descargas Automáticas para el control, seguimiento y procesamiento automático de las solicitudes de descargas hechas por parte de los usuarios de la red de dicho centro. Para el desarrollo de la aplicación informática se utilizó la arquitectura cliente-servidor y el patrón Modelo Vista Controlador; se usó Python como lenguaje de programación del lado del servidor y el framework Django. El Sistema de Gesión de Base de Datos usado fue PostgresSQL, el Proceso Unificado de Desarrollo de Software como metodología de desarrollo de software, Visual Paradigm para UML como herramienta CASE y PyCharm como Entorno de Desarrollo Integrado. El sistema desarrollado mantiene un control del flujo de información que hasta ahora ocurría de forma manual y gestiona todas las solicitudes de descargas de los usuarios. Además, el módulo de Descargas Automáticas se encarga de procesar las descargas, informar a cada usuario el estado de su descarga y a cada administrador cualquier error que ocurra al procesar las solicitudes. También elimina cada archivo descargado luego que pase un determinado tiempo en los servidores. De esta forma se logró mejorar el proceso de solicitud de descarga en todos sus aspectos. Palabras clave: descarga, sistema automático de descarga, tareas programadas. ABSTRACT This research was carried out at the University of Cienfuegos in order to design a computer system and implement the Automatic Downloads module for the automatic control, monitoring and processing of download requests made by users of the Internet. said center. For the development of the computer application, the client-server architecture and the Model View Controller pattern were used; Python was used as the server-side programming language and the Django framework. The Database Management System used was PostgresSQL, the Unified Software Development Process as a software development methodology, Visual Paradigm for UML as a CASE tool and PyCharm as an Integrated Development Environment. The developed system maintains a control of the information flow that until now occurred manually and manages all the users' download requests. In addition, the Automatic Downloads module is responsible for processing downloads, informing each user of the status of their download and each administrator of any error that occurs when processing requests. It also deletes each downloaded file after it spends a certain time on the servers. In this way, the download request process was improved in all its aspects. Keywords: download, automatic download system, scheduled tasks.
APA, Harvard, Vancouver, ISO, and other styles
5

M.S. Tg Sulaiman, T., S. B. Mohamed, M. Minhat, A. S. Mohamed, and A. R. Mohamed. "Integrated Interface Development Environment using STEP Universal Data Structure." International Journal of Engineering & Technology 7, no. 2.15 (April 6, 2018): 27. http://dx.doi.org/10.14419/ijet.v7i2.15.11194.

Full text
Abstract:
Nowadays modern manufacturing demands advanced computer controller, having higher input language and less proprietary vendor dependencies. STEP stands for Standard for the Exchange of Product model data is the next generation of data model between CAD/CAM and CNC system. STEP is still under research and development all around the world. This paper describes the design, development and testing of an integrated Interface development environment for STEP file using Universal Data Structure, which aims to provide support for machining operation. The system also aims to provide function of reading and extracting the relevant information associated with the machining data and to write the G-Code file. The sample of machined block is designed from 3D CAD modeler which consisted of features need to be machined from a blank workpiece and saved in the STEP file format. The validation process will be done using the simulation in the Mach3 software.
APA, Harvard, Vancouver, ISO, and other styles
6

Korsak, Victor Vladislavovich, Alexey Vladimirovich Kravchuk, Roman Viktorovich Prokopets, Olga Nikolaevna Mityureva, and Yuri Alekseevich Shorikov. "Information support for forecasting the flooding of Left bank territories of the Saratov region." Agrarian Scientific Journal, no. 6 (June 30, 2021): 80–85. http://dx.doi.org/10.28983/asj.y2021i6pp80-85.

Full text
Abstract:
The article presents the results of research on the creation of information support for predicting flooding of the territories of the Saratov Left Bank region, which includes a database of data necessary for calculations, consisting of 14 relational files, including reference books, normative files and files of source data; algorithms and computer programs forecasting. Flooding boundaries vectorization is carried out in the QGIS environment based on the exported forecast results and digital elevation model. Development and implementation of the proposed information support will provide a improvement in the quality of forecasts and will pay off in 4 years of operation.
APA, Harvard, Vancouver, ISO, and other styles
7

Kar, A. R., and O. P. Sha. "Computer-Aided Materials Management and Control for a Shipbuilding Yard." Journal of Ship Production 9, no. 04 (November 1, 1993): 254–59. http://dx.doi.org/10.5957/jsp.1993.9.4.254.

Full text
Abstract:
This paper deals with the development of a computerized information system for materials management and control for shipbuilding yards. It begins by critically examining the manual and semi-manual data processing methods used in medium and small-sized shipyards and highlighting their drawbacks. Based on this and with the knowledge of the ready availability of desktop computers in small/medium-sized shipyards, a computerized materials management and control system is proposed. The schema of the proposed database system is then presented by the help of block diagrams. A number of application programs have been developed to manage, control, and update the various database files under the "Network," "Purchase," "Inventory," and "Drawing" modules. The system has been tested in a simulated production environment by entering the production, planning, materials, and drawing information of two different vessels during construction. The range of information that can be obtained and the results from the proposed system are shown briefly. It is felt that a computerized information-based materials management system has a major role to play in the smooth and profitable running of a shipyard. It is very effective in a quick appraisal of complex queries relating to materials procurement, production and drawing status, and the cause of delays.
APA, Harvard, Vancouver, ISO, and other styles
8

González-Aguilera, Diego, Susana del Pozo, Alberto Holgado, and Gemma López. "Spatial Information System for Management and Control of Electrical Substations." Advanced Materials Research 463-464 (February 2012): 1686–92. http://dx.doi.org/10.4028/www.scientific.net/amr.463-464.1686.

Full text
Abstract:
This article proposes the development of a simple, flexible and portable system that will allow carrying out management, maintenance and inventory tasks in electrical substations. The Spatial Information System (SIS) permits to incorporate, through an immersive virtual environment, information about electrical substations, as well as progress in automation CAD/CAE design (Computer Aided Design/Engineering). The SIS provides an immediate knowledge of the substation spatial distribution through an interactive navigation, facilitating any type of technical question as consulting planes (sections, elevations, plants), database (files, queries) and the dimensional analysis of any object. To this end, the SIS developed can be applied to the management and complete control of a substation at the same time as a platform that encourages collaborative engineering or CAE engineering.
APA, Harvard, Vancouver, ISO, and other styles
9

Harrison, Reginald Langford, Stefan Bilbao, James Perry, and Trevor Wishart. "An Environment for Physical Modeling of Articulated Brass Instruments." Computer Music Journal 39, no. 4 (December 2015): 80–95. http://dx.doi.org/10.1162/comj_a_00332.

Full text
Abstract:
This article presents a synthesis environment for physical modeling of valved brass instrument sounds. Synthesis is performed using finite-difference time-domain methods that allow for flexible simulation of time-varying systems. Users have control over the instrument configuration as well as player parameters, such as mouth pressure, lip dynamics, and valve depressions, which can be varied over the duration of a gesture. This article introduces the model used in the environment, the development of code from prototyping in MATLAB and optimization in C, and the incorporation of the executable file in the Sound Loom interface of the Composers Desktop Project. Planned additions to the environment are then discussed. The environment binaries are available to download online along with example sounds and input files.
APA, Harvard, Vancouver, ISO, and other styles
10

Cui, Huan Yong, Na Tian, Rui Chuan Li, and Xiu Hua Men. "A Method of Parametric Design of Automobile Synchronizer Ring Based on UG Secondary Development Tools." Applied Mechanics and Materials 716-717 (December 2014): 635–38. http://dx.doi.org/10.4028/www.scientific.net/amm.716-717.635.

Full text
Abstract:
To realized the parametric design of automobile synchronizer ring spline tooth efficiently, a method is presented in this article, which is realized based on the UG secondary development tools. The user environment settings and the establishment of the menu file and the human-computer interaction window are introduced in detail. The programming language is written to realize the parametric design of the spline tooth of synchronous ring. Application result shows that the method simplifies the synchronous ring modeling process and improves the working efficiency.
APA, Harvard, Vancouver, ISO, and other styles
11

MARCOPOULOS, ELIAS, and YUANLIN ZHANG. "onlineSPARC: A Programming Environment for Answer Set Programming." Theory and Practice of Logic Programming 19, no. 2 (November 14, 2018): 262–89. http://dx.doi.org/10.1017/s1471068418000509.

Full text
Abstract:
AbstractRecent progress in logic programming (e.g. the development of the answer set programming (ASP) paradigm) has made it possible to teach it to general undergraduate and even middle/high school students. Given the limited exposure of these students to computer science, the complexity of downloading, installing, and using tools for writing logic programs could be a major barrier for logic programming to reach a much wider audience. We developed onlineSPARC, an online ASP environment with a self-contained file system and a simple interface. It allows users to type/edit logic programs and perform several tasks over programs, including asking a query to a program, getting the answer sets of a program, and producing a drawing/animation based on the answer sets of a program.
APA, Harvard, Vancouver, ISO, and other styles
12

Karpova, Nadegda, Alexsander Baranov, Alina Emelina, and Alexsander Konovalov. "Research of abnormal user actions in the information environment." Transaction of Scientific Papers of the Novosibirsk State Technical University, no. 1-2 (August 26, 2020): 26–39. http://dx.doi.org/10.17212/2307-6879-2020-1-2-26-39.

Full text
Abstract:
The article is devoted to the analysis of user actions in a computer system and the development of a system for monitoring abnormal user actions in the information environment. We used the mathematical apparatus of fuzzy logic for system development. The main advantages of information environment monitoring systems based on fuzzy set theory are the ability to represent arbitrary parameter values in the form of analytics of given values, the ability to take more development scenarios into account, the ability to use this system when making decisions, when describing flow analysis schemes for the information environment, and track a large number of computer parameters. During the research, it was found that the actions of hackers differ from the behavior of ordinary users. As a result, the authors propose a developed system for monitoring abnormal user actions in the information environment, which is based on the analysis of event logs. The operation of the system requires the accumulation of information (audit files, log-in time and session duration data on file deletion, etc.), based on which a standard (template) of normal user behavior is created. Then, the user’s behavior is compared with the standard, and when anomalies are detected, the system signals about deviations. This algorithm allows you to track a large number of user parameters to determine unauthorized access.
APA, Harvard, Vancouver, ISO, and other styles
13

Jeong, Junho, Yangsun Lee, Uduakobong George Offong, and Yunsik Son. "A Type Information Reconstruction Scheme Based on Long Short-Term Memory for Weakness Analysis in Binary File." International Journal of Software Engineering and Knowledge Engineering 28, no. 09 (September 2018): 1267–86. http://dx.doi.org/10.1142/s0218194018400156.

Full text
Abstract:
Due to increasing use of third-party libraries because of the increasing complexity of software development, the lack of management of legacy code and the nature of embedded software, the use of third-party libraries which have no source code is increasing. Without the source code, it is difficult to analyze these libraries for vulnerabilities. Therefore, to analyze weaknesses inherent in binary code, various studies have been conducted to perform static analysis using intermediate code. The conversion from binary code to intermediate language differs depending on the execution environment. In this paper, we propose a deep learning-based analysis method to reconstruct missing data types during the compilation process from binary code to intermediate language, and propose a method to generate supervised learning data for deep learning.
APA, Harvard, Vancouver, ISO, and other styles
14

Dewi, Renny Sari, Trias Widha Andari, Maulidan Bagus A. Rasyid, and Ramadhany Candra A.P. "Ekstraksi Faktor Kompleksitas Game Menggunakan Metode Function Points." Jurnal Teknologi dan Sistem Informasi 4, no. 3 (December 31, 2018): 115–22. http://dx.doi.org/10.25077/teknosi.v4i3.2018.122.

Full text
Abstract:
After the President of the Republic of Indonesia established a Creative Economy Agency (Bekraf) by Presidential Regulation (Perpres) No. 6 the Year 2015, Bekraf initiated to push the creative business actors to collaborate with government to improve the nation's reconstruction of this entertainment business. The game today has become a means of education that can be accepted by all circles of communities. Therefore, the researcher aims to assist the business of digital creative field to estimate computer game development effort based on Function Points (FP) method which is better known as cost calculation of application software development project. The results of this study are the need to modify the understanding of computer game parameters ranging from the input, output, inquiry, logic file intern, and logic file extern. After that, the complexity factor needs to be redefined and synchronized with eight items of LeBlanc taxonomies. Then, it collaboration namely Game Complexity Factors (GCF). GCF has 22 items of complex factors that consist of 8 LeBlanc taxonomies for environment difficulties and 14 items of technical complexity.
APA, Harvard, Vancouver, ISO, and other styles
15

Telagam, Nagarjuna, Nehru Kandasamy, Menakadevi Nanjundan, and Arulanandth TS. "Smart Sensor Network based Industrial Parameters Monitoring in IOT Environment using Virtual Instrumentation Server." International Journal of Online Engineering (iJOE) 13, no. 11 (November 22, 2017): 111. http://dx.doi.org/10.3991/ijoe.v13i11.7630.

Full text
Abstract:
A remote monitoring and control are one of the most important criteria for maximizing the production in any industry. With the development of modern industry the requirement for industrial monitoring system is getting higher. This project explains the real time scenario of monitoring temperature and humidity in industries. National Instruments my RIO is used and results are observed on Lab VIEW and VI Server. The server VI program and client VI program is developed in block diagram for the two sensor data. This proposed system develops a sensor interface device essential for sensor data acquisition of industrial Wireless Sensor Networks (WSN) in Internet of Things (IOT) environment. By detecting the values of sensors like temperature, humidity present in the industrial area. The results are displayed on the web page. The data can be accessed with admin name and password. After logging into the web page the index of files is displayed. After restarting the mine RIO kit and initiate the deploying process the nations will display log.csv file. By double clicking the file the excel sheet will appear on the computer. This VI server is tested for its working, using a data acquisition web application using a standard web browser. The critical situation can be avoided and preventive measures are successfully implemented.
APA, Harvard, Vancouver, ISO, and other styles
16

Al-Qora'n, Lamis F. "Social RE-PBL: An Approach for Teaching Requirements Engineering Using PBL, SNSs, and Cloud Storages and File-Sharing Services." International Journal of Information and Education Technology 11, no. 7 (2021): 342–47. http://dx.doi.org/10.18178/ijiet.2021.11.7.1533.

Full text
Abstract:
Requirements engineering process showed that it has the potential to affect software development process and consequently cause unexpected problems in the produced software. Reducing the likelihood of such issues requires proper preparation for software engineering students during their undergraduate studies to reduce the gap between theory and practice. Students must develop the soft skills that are needed to practice software engineering activities, especially requirements engineering. Accordingly, encouraging students to learn and practice requirements engineering concepts and activities are required. Students undertake the requirements engineering course in one semester, where the lecturer focuses on delivering the theoretical concepts to students which creates teacher-centred learning. It is difficult for students to develop the required critical thinking and communication skills that enable them to solve real-world problems in such a teacher-centred environment. This study uses Project-Based Learning (PBL), Social Networking Sites (SNSs) and cloud enhanced communication to design a non-traditional teaching approach to improve students’ learning and to achieve a learner-centred learning environment in a requirements engineering course. The developed approach was applied to a requirements engineering course at our university to investigate its effectiveness and its impact on students’ learning ability. The students in the investigational group learned with the new method; however, the students in the control group learned with the traditional learning method. The results of our experiment show that the proposed approach significantly improved the achievement, motivation and attitude of our students as well as
APA, Harvard, Vancouver, ISO, and other styles
17

Peregudov, Maksim, and Ivan Semchenko. "Evaluation of Efficiency of Random Multiple Access to ALOHA Type Environment with Voice Connections, Transfer of Service Commands, Text Messages and Multimedia Files in Destructive Impact Conditions." SPIIRAS Proceedings 18, no. 4 (July 18, 2019): 887–911. http://dx.doi.org/10.15622/sp.2019.18.4.887-911.

Full text
Abstract:
Assessing the security of digital radio networks in destructive impact conditions is an important task. However, such an assessment for random multiple access to the ALOHA-type environment in digital radio networks was not carried out. The paper presents an analytical model of random multiple access for the environment of digital radio networks of the ALOHA type in destructive impact conditions. In this model, acomplex measure, including the probability of a successful voice connection, the transfer of a service command, a text message or a multimedia file, the degree of filling and the degree of overflow of digital radio network data packets, serves as the resultant indicator for evaluating the effectiveness of random multiple media access. The new complex indicator of the probability of a successful voice connection, the transfer of a service command, a text message or a multimedia file takes into account the known probabilities of successful delivery of data packets, creation of a collision and a free channel, as well as new average transmission times for a sequence of data packets and a collision formed during such transmission. New indicators are the degree of filling and the degree of overflow of digital radio communications network data packets. They determine in saturated and supersaturated data networks of such a network how close (far) to maximum is the probability value of a successful voice connection, transmission of a service command, test message or multimedia file. The model takes into account the potential destructive effects of the attacker by refining the analytical expressions for the known probabilistic and new temporal characteristics. First, a quantitative relationship between the probability of a successful voice connection, the transfer of a service command, a text message or a multimedia file and the average duration of a data channel collisions is established./ Secondly, for guaranteed disabling a digital radio network with random multiple access to the medium ALOHA type attacker must constantly carry out a destructive impact. The results are applied in design of digital radio communications networks operating under destructive impacts, as well as in development of automatic systems for optimizing the operation of digital radio communications networks and protecting them from such impacts.
APA, Harvard, Vancouver, ISO, and other styles
18

Wu, Jiang Jiang, Yong Cheng, Song Zhu Mei, Jiang Chun Ren, Zhi Ying Wang, Jie Zhou, and Jun Ma. "SSR-CDPS: A Novel Continuous Data Protection System Supporting Service Recovery." Advanced Materials Research 601 (December 2012): 318–24. http://dx.doi.org/10.4028/www.scientific.net/amr.601.318.

Full text
Abstract:
With the rapid development of computer networks, invasion and attack becomes more and more frequent in network environment. Therefore, insuring the information system continuously and correctly working has become an urgent problem in the information security field. And continuous data protection (CDP) supporting service recovery provides us a good idea to resolve it. In this article, we have designed and implemented a continuous data protection system supporting service recovery, which is named SSR-CDPS. The basic design idea of the SSR-CDPS architecture is dividing the whole protection process into three stages: monitoring, protecting and recovery. Meanwhile, we propose a multi versioning data backup mechanism for the protecting process and a novel file failure recovery mechanism. Especially, we transfer the full copy operation of file contents into the merely slight modification operation on the FAT table, MFT table or other similar data structures; so that we achieve the aim of greatly reducing the direct disks read and write overhead. The test toward the SSR-CDPS prototype system shows that the system can significantly improve the efficiency of data protection within limited change to the existing file system; thus, it can meet the high real-time and the continuity requirements of the information system recovery applications.
APA, Harvard, Vancouver, ISO, and other styles
19

Shakirov, Marat Khaidarovich. "Process Approach and Construction of the Database for Non-Core Asset Management in Credit Organizations." Russian Digital Libraries Journal 24, no. 4 (September 12, 2021): 710–53. http://dx.doi.org/10.26907/1562-5419-2021-24-4-710-753.

Full text
Abstract:
A method for building end-to-end management accounting in a division of the Bank’s subdevision specializing in working with non-core assets is proposed. Has been proposed the process approach, an algorithm for building a database for the formation of key performance and control indicators. Has been described the key stages of the department's work, the attribute composition of entities (set) arriving, enriched and transmitted at each stage of the department's work. By modeling the process has been built a role model, access and editing rights for employees. Data sources (reference books) for optimization and unification of the process of filling the database (tuple) are proposed. A method of accessing the database in the Power Query Microsoft Excel add-in is proposed, which allows you to collect data from files of all basic data types, process and refine the received data. In the interactive programming environment Jupyter Notebook, mathematical and financial models for data analysis (logistic regression, decision tree and discounted cash flow method) were built based on data in order to predict costs, the timing of asset exposure and make a decision on the optimal cost of putting property on the Bank's balance sheet and selling price. Based on ready-made libraries (matpotlib, seaborn, plotly), options for data visualization for management are proposed. Using the example of the Bank's division, the author describes the positive effects and opportunities that open up to the management of different levels in solving day-to-day tasks and planning the activities of the division. A technical task was proposed for the development of a showcase for the sale of non-core assets on the Bank's website as an environment for the accumulation of external data for making flexible management decisions.
APA, Harvard, Vancouver, ISO, and other styles
20

Liu, H., P. van Oosterom, M. Meijers, and E. Verbree. "MANAGEMENT OF LARGE INDOOR POINT CLOUDS: AN INITIAL EXPLORATION." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLII-4 (September 19, 2018): 365–72. http://dx.doi.org/10.5194/isprs-archives-xlii-4-365-2018.

Full text
Abstract:
<p><strong>Abstract.</strong> Indoor navigation and visualization become increasingly important nowadays. Meanwhile, the proliferation of new sensors as well as the advancement of data processing provide massive point clouds to model the indoor environment in high accuracy. However, current state-of-the-art solutions fail to manage such large datasets efficiently. File based solutions often require substantial development work while database solutions are still faced with issues such as inefficient data loading and indexing. In this research, through a case study which aims to solve the problem of intermittent rendering of massive points in the context of indoor navigation, we devised and implemented an algorithm to compute the continuous Level of Detail (cLoD) where geometric and classification information are considered. Benchmarks are developed and different approaches in Oracle are tested to learn the pros and cons. Surprisingly, the flat table approach could be very efficient compared with other schemes. The crucial point lies in how to address priority of different dimensions including cLoD, classification and spatial dimensions, and avoid unnecessary scanning of the table. Writing results either to the memory or the disk constitutes major part of the time cost when large output is concerned. Conventional solutions based on spatial data objects present poor performance due to cumbersome indexing structure, inaccurate selection and additional decoding process. Besides, approximate selection in the unit of physical object is proposed and the performance is satisfactory when large amount of data is requested. The knowledge acquired could prompt the development of a novel data management of high dimensional point clouds where the classification information is involved.</p>
APA, Harvard, Vancouver, ISO, and other styles
21

Massel, L. V., V. L. Arshinsky, and A. G. Massel. "Intelligent Computing on the Basis of Cognitive and Event Modeling, and Its Application in Energy Security Research." International Journal of Energy Optimization and Engineering 3, no. 1 (January 2014): 83–91. http://dx.doi.org/10.4018/ijeoe.2014010105.

Full text
Abstract:
The paper considers the issues of implementation and application of intelligent computing on the basis of cognitive and event modeling in research on energy security. The authors suggest a two-level information technology for the research. The first level suggests a situation analysis using the intelligent computing techniques. The analysis results are then used to choose rational variants of energy development in Russia (or its regions). At the second level these variants are computed with the multi-agent software INTEC-M. Transition from the first to the second level is automated by the tools of deductive program synthesis, that are based on declarative descriptions, i.e. formulae of restricted predicate calculus, and representation of input data by XML files. Cognitive and event modeling is considered in more detail. The examples of cognitive and event models are presented. The structure of a knowledge space is developed to support the intelligent computations. The knowledge space includes ontological models, databases of cognitive and event models, and the database on the cases of energy emergency situations. The authors developed the CogMap and EventMap tools to support cognitive and event modeling on the basis of common graphical environment GirModeling, and the expert system “Emergency”. The tools and expert system that support the knowledge base on energy emergencies are integrated within the intelligent IT environment. The research presented in the paper was partially supported by the grant of Presidium of RAS No. 2.2-2012 and grants of Russian Foundation of Basic Research No. 10-07-00264, No. 11-07-00192, No. 11-07-00245, and No. 12-07-00359.
APA, Harvard, Vancouver, ISO, and other styles
22

Hou, Yongzhu, Jihong Liu, and Gaofeng Yue. "3D Interpreted Model: A Novel Product Definition Model by Integrating and Fusing a 3D Annotated Model and Design Knowledge." Applied Sciences 11, no. 16 (August 4, 2021): 7192. http://dx.doi.org/10.3390/app11167192.

Full text
Abstract:
Model based definition (MBD) is the core of product digital research and development. The extension of the scope and content of the product model is an important way to improve the application ability of MBD methodology. In view of the demand of the development of the product definition method and the lack of systematic theoretical methods to support the further improvement of product model quality and ability, this paper proposes the concept of a 3D interpreted model as a new product definition model by integrating and fusing design knowledge on the basis of the MBD model. Firstly, the concept, characteristics and representation method of the 3D interpreted model are elaborated. Then, the construction method of the 3D interpreted model is proposed, which includes two steps. The first step is design knowledge annotation, which is used to integrate design knowledge with the MBD model and form the 3D interpreted model in a CAD environment. The second step is information extraction and knowledge fusion, which is used to construct a 3D interpreted model network by processing the product information and design knowledge stored in a STEP file and knowledge index file, respectively. Finally, a prototype system is developed, and the construction process of a 3D interpreted model is demonstrated and verified through an example. The results show that as a new product definition model, a 3D interpreted model realizes the comprehensive integration of a MBD model and design knowledge, so as to realize the inheritance and development of the product definition method, and supports business activities and saves more social resources.
APA, Harvard, Vancouver, ISO, and other styles
23

Weingart, Troy, Douglas C. Sicker, and Dirk Grunwald. "Identifying Opportunities for Exploiting Cross-Layer Interactions in Adaptive Wireless Systems." Advances in Multimedia 2007 (2007): 1–11. http://dx.doi.org/10.1155/2007/49604.

Full text
Abstract:
The flexibility of cognitive and software-defined radio heralds an opportunity for researchers to reexamine how network protocol layers operate with respect to providing quality of service aware transmission among wireless nodes. This opportunity is enhanced by the continued development of spectrally responsive devices—ones that can detect and respond to changes in the radio frequency environment. Present wireless network protocols define reliability and other performance-related tasks narrowly within layers. For example, the frame size employed on 802.11 can substantially influence the throughput, delay, and jitter experienced by an application, but there is no simple way to adapt this parameter. Furthermore, while the data link layer of 802.11 provides error detection capabilities across a link, it does not specify additional features, such as forward error correction schemes, nor does it provide a means for throttling retransmissions at the transport layer (currently, the data link and transport layer can function counterproductively with respect to reliability). This paper presents an analysis of the interaction of physical, data link, and network layer parameters with respect to throughput, bit error rate, delay, and jitter. The goal of this analysis is to identify opportunities where system designers might exploit cross-layer interactions to improve the performance of Voice over IP (VoIP), instant messaging (IM), and file transfer applications.
APA, Harvard, Vancouver, ISO, and other styles
24

Cavalieri, Adriane, João Reis, and Marlene Amorim. "Circular Economy and Internet of Things: Mapping Science of Case Studies in Manufacturing Industry." Sustainability 13, no. 6 (March 17, 2021): 3299. http://dx.doi.org/10.3390/su13063299.

Full text
Abstract:
This study investigates the “Internet of things” (IoT) and “Circular Economy” (CE) relationship in the current scientific literature focused on case studies or use cases on manufacturing context. To the best of our knowledge, this study is the first to map the science centered on “case studies” with respect to the “IoT” and “CE” connection, contributing to fill the gap of the subject that is already relevant to the scientific community and practitioners. The research methodology consists of developing a bibliometric study, employing PRISMA process, whose data is obtained from the Web of Science database. The VOSviewer was the computer program selected for the bibliometric analysis. The Web of Science (WoS) analysis tool supports VOSviewer. The papers were analyzed according to network analysis principles. The qualitative content analysis complements these results. The results show the high-frequency keywords and topics associated with the theme “IoT and CE”; the most cited papers; the intellectual structure of “IoT and CE”; the new emerging themes in scientific research; and social networks among the researchers. The paper’s contribution is the results of the bibliometric analysis and a better understanding of the relationship of “IoT” and “CE” by the “case studies” addressed in the empirical investigations.
APA, Harvard, Vancouver, ISO, and other styles
25

Masni, Harbeng, and Zuhri Saputra Hutabarat. "Pengembangan Multimedia Pembelajaran Berbasis Lash Animation With Swish Max Siswa Kelas XI SMA Negeri 8 Kota Jambi." Jurnal Ilmiah Dikdaya 9, no. 2 (September 28, 2019): 257. http://dx.doi.org/10.33087/dikdaya.v9i2.147.

Full text
Abstract:
There are several factors that influence learning, including teacher factors, student factors, facilities, tools and media, and the environment. Educators should pay attention to factors that influence learning. The task of the teacher in the learning process, in addition to conveying information, also diagnoses learning difficulties students select teaching materials, supervise learning activities, stimulate student learning activities, provide learning guidance using media, strategies, and methods. Teachers and students are required to master the science and information technology of communication continuously. Teachers need to keep abreast of the development of communication information and science so that they can deliver the latest learning material that is useful for the lives of students in the present and future. The thing that stands out in Swishmax is that the work can be exported into the SWF file format, which is the file format used by Macromedia Flash. Therefore, swishmax animations can be played on any personal computer that has a flash player installed. Swishmax animations can be inserted into web pages, or imported into macromedia flash documents or even in Microsoft Power Point documents. When compared to adobe flash, Swishmax is easier to learn and use for beginners, because the tools available are more user friendly. From the description above it can be concluded that Swishmax is not only multimedia software that is only capable of creating dynamic multimedia, but more than that, it is capable of displaying multimedia that is very interactive.
APA, Harvard, Vancouver, ISO, and other styles
26

Al-Mousa, Amjed, Belal H. Sababha, Nailah Al-Madi, Amro Barghouthi, and Remah Younisse. "UTSim: A framework and simulator for UAV air traffic integration, control, and communication." International Journal of Advanced Robotic Systems 16, no. 5 (September 1, 2019): 172988141987093. http://dx.doi.org/10.1177/1729881419870937.

Full text
Abstract:
The interest in unmanned systems especially unmanned aerial vehicle is continuously increasing. Unmanned aerial vehicles started to become of great benefit in many different fields. It is anticipated that unmanned aerial vehicles will soon become a main component of the future urban air traffic. The integration of unmanned aerial vehicles within existing air traffic environments has started getting the attention of researchers. Integrating unmanned systems in the real-world urban air traffic requires the development of tools and simulators to enable researchers in their ongoing efforts. In this article, a simulator called UTSim is introduced. The proposed simulator is built using the Unity platform. UTSim is capable of simulating unmanned aerial vehicle physical specification, navigation, control, communication, sensing and avoidance in environments with static and moving objects. The simulator enables studying and exploring several unmanned aerial vehicle air traffic integration issues like sense and avoid, communication protocols, navigation algorithms, and much more. UTSim is designed and developed to be easily used. The user can specify the properties of the environment, the number and types of unmanned aerial vehicles in the environment, and specify the algorithm to be used for path planning and collision avoidance. The simulator outputs a log file with a lot of useful information such as the number of sent and received messages, the number of detected objects and collided unmanned aerial vehicles. Three scenarios have been implemented in this article to present the capabilities of UTSim and to illustrate how it can benefit researchers in the field of integrating unmanned aerial vehicles in urban air traffic.
APA, Harvard, Vancouver, ISO, and other styles
27

Hou, Yumin, Hu He, Xu Yang, Deyuan Guo, Xu Wang, Jiawei Fu, and Keni Qiu. "FuMicro: A Fused Microarchitecture Design Integrating In-Order Superscalar and VLIW." VLSI Design 2016 (December 15, 2016): 1–12. http://dx.doi.org/10.1155/2016/8787919.

Full text
Abstract:
This paper proposes FuMicro, a fused microarchitecture integrating both in-order superscalar and Very Long Instruction Word (VLIW) in a single core. A processor with FuMicro microarchitecture can work under alternative in-order superscalar and VLIW mode, using the same pipeline and the same Instruction Set Architecture (ISA). Small modification to the compiler is made to expand the register file in VLIW mode. The decision of mode switch is made by software, and this does not need extra hardware. VLIW code can be exploited in the form of library function and the users will be exposed under only superscalar mode; by this means, we can provide the users with a convenient development environment. FuMicro could serve as a universal microarchitecture for it can be applied to different ISAs. In this paper, we focus on the implementation of FuMicro with ARM ISA. This architecture is evaluated on gem5, which is a cycle accurate microarchitecture simulation platform. By adopting FuMicro microarchitecture, the performance can be improved on an average of 10%, with the best performance improvement being 47.3%, compared with that under pure in-order superscalar mode. The result shows that FuMicro microarchitecture can improve Instruction Level Parallelism (ILP) significantly, making it promising to expand digital signal processing capability on a General Purpose Processor.
APA, Harvard, Vancouver, ISO, and other styles
28

Zu, Chenhua. "Hadoop-Based Painting Resource Storage and Retrieval Platform Construction and Testing." Complexity 2021 (May 7, 2021): 1–11. http://dx.doi.org/10.1155/2021/9933330.

Full text
Abstract:
This paper adopts Hadoop to build and test the storage and retrieval platform for painting resources. This paper adopts Hadoop as the platform and MapReduce as the computing framework and uses Hadoop Distributed Filesystem (HDFS) distributed file system to store massive log data, which solves the storage problem of massive data. According to the business requirements of the system, this paper designs the system according to the process of web text mining, mainly divided into log data preprocessing module, log data storage module, log data analysis module, and log data visualization module. The core part of the system is the log data analysis module. The analysis of search keywords ranking, Uniform Resource Locator (URL), and user click relationship, URL ranking, and other dimensions are realized through data statistical analysis, and Canopy coarse clustering is performed first according to search keywords, and then K-means clustering is used for the results after Canopy clustering, and the calculation of cosine similarity is adopted to realize the grouping of users and build user portrait. The Hadoop development environment is installed and deployed, and functional and performance tests are conducted on the contents implemented in this system. The constructed private cloud platform for remote sensing image data can realize online retrieval of remote sensing image metadata and fast download of remote sensing image data and solve the problems in storage, data sharing, and management of remote sensing image data to a certain extent.
APA, Harvard, Vancouver, ISO, and other styles
29

Bishop, I. D., and H. R. Gimblett. "Management of Recreational Areas: GIS, Autonomous Agents, and Virtual Reality." Environment and Planning B: Planning and Design 27, no. 3 (June 2000): 423–35. http://dx.doi.org/10.1068/b2637.

Full text
Abstract:
Management of recreational activity in areas that are culturally or ecologically sensitive requires knowledge, and effective management, of recreationists' behaviour. In this paper we explore the role of spatial information systems, spatial modelling, and virtual reality in the analysis and prediction of visitor location and movement patterns. The quantitative modelling of the time spent by visitors on various aspects of the site attractions and of visitor conflict has not been widely attempted, having only recently become possible because of greater computer power, better spatial data storage options, and new modelling paradigms. Rule-driven autonomous agents can be used as surrogates for human visitors. Behavioural rules can be derived and calibrated from visitor surveys. This is, however, an expensive and time-consuming process and testing of people's decisions in a virtual environment may provide sufficient information for rule definition. Once a rule-set is determined, the autonomous agents move over a GIS-based model of the landscape. Rendering algorithms determine what an individual agent is able to “see”. Based on the established rules, this and other factors (such as tiredness) determine behavioural choice. Recording of model runs to file allows managers to undertake additional analysis to quantify and explore the influence of alternative management options on recreationist movement, congestion, and crowding. Through the GIS, impacts such as erosion can also be modelled. In the longer term the combined models can become part of a decision support system for sustainable tourism in fragile environments.
APA, Harvard, Vancouver, ISO, and other styles
30

Wolfe, Saul, Donald Fredric Weaver, and Kiyull Yang. "MMPEP: Development and evaluation of peptide parameters for Allinger's MMP2(85) programme, including calculations on crambin and insulin." Canadian Journal of Chemistry 66, no. 11 (November 1, 1988): 2687–702. http://dx.doi.org/10.1139/v88-421.

Full text
Abstract:
Allinger's MMP2(85) program has been converted to an IBM environment, and the dimensions expanded to a current maximum of 999 atoms. Substantial additional expansion will be possible. An all-atom set of parameters, which permit Allinger's comprehensive force field to be applied to the molecular mechanics treatment of peptides, has been determined. These parameters, termed MMPEP, contain 21 atom types: 5 for carbon, 6 for hydrogen, 5 for nitrogen, 4 for oxygen, and 1 for sulfur, and are based on crystallographic heavy atom bond lengths and bond angles, vibrational and microwave spectra, and ab initio calculations. To minimize the conformational energy of a peptide from an initial starting geometry, all internally stored parameters are released, and replaced by PEPCON, a 360-line external file containing the MMPEP parameters.The ability of the MMPEP parameterization of MM85 to reproduce experimental crystal structures has been tested on several peptides and polypeptides, and the use of a dielectric constant ε = 78.5 D leads to the following results: Ala-Ala-Gly (rms = 0.261); Gly-Gly-Val (rms = 0.349); glutathione (rms = 0.417); crambin (327 heavy atoms; rms = 0.310 for all heavy atoms); insulin (389 heavy atoms; rms = 0.646 for all heavy atoms); the origins of deviations can be interpreted. No problems have been encountered in the application of the Newton–Raphson minimization procedure to such large molecules as crambin and insulin, even though all possible nonbonded interactions have been retained. On the IBM 3081 computer, real time minimization of trip)eptides requires 1–2 min, crambin requires 250 min, and insulin 200 min. Since hydrogen bonding in Allinger's force field is a natural result of electrostatic and van der Waals interactions, in MMPEP hydrogen bonding is taken into account through the large number of hydrogen atom types and their different bond moments and van der Waals radii.
APA, Harvard, Vancouver, ISO, and other styles
31

Liu, Yan-Lin, Cheng-Ting Shih, Yuan-Jen Chang, Shu-Jun Chang, and Jay Wu. "Performance Enhancement of a Web-Based Picture Archiving and Communication System Using Commercial Off-the-Shelf Server Clusters." BioMed Research International 2014 (2014): 1–9. http://dx.doi.org/10.1155/2014/657417.

Full text
Abstract:
The rapid development of picture archiving and communication systems (PACSs) thoroughly changes the way of medical informatics communication and management. However, as the scale of a hospital’s operations increases, the large amount of digital images transferred in the network inevitably decreases system efficiency. In this study, a server cluster consisting of two server nodes was constructed. Network load balancing (NLB), distributed file system (DFS), and structured query language (SQL) duplication services were installed. A total of 1 to 16 workstations were used to transfer computed radiography (CR), computed tomography (CT), and magnetic resonance (MR) images simultaneously to simulate the clinical situation. The average transmission rate (ATR) was analyzed between the cluster and noncluster servers. In the download scenario, the ATRs of CR, CT, and MR images increased by 44.3%, 56.6%, and 100.9%, respectively, when using the server cluster, whereas the ATRs increased by 23.0%, 39.2%, and 24.9% in the upload scenario. In the mix scenario, the transmission performance increased by 45.2% when using eight computer units. The fault tolerance mechanisms of the server cluster maintained the system availability and image integrity. The server cluster can improve the transmission efficiency while maintaining high reliability and continuous availability in a healthcare environment.
APA, Harvard, Vancouver, ISO, and other styles
32

Jungo, Aidan, Mengmeng Zhang, Jan B. Vos, and Arthur Rizzi. "Benchmarking New CEASIOM with CPACS adoption for aerodynamic analysis and flight simulation." Aircraft Engineering and Aerospace Technology 90, no. 4 (May 8, 2018): 613–26. http://dx.doi.org/10.1108/aeat-11-2016-0204.

Full text
Abstract:
Purpose The purpose of this paper is to present the status of the on-going development of the new computerized environment for aircraft synthesis and integrated optimization methods (CEASIOM) and to compare results of different aerodynamic tools. The concurrent design of aircraft is an extremely interdisciplinary activity incorporating simultaneous consideration of complex, tightly coupled systems, functions and requirements. The design task is to achieve an optimal integration of all components into an efficient, robust and reliable aircraft with high performance that can be manufactured with low technical and financial risks, and has an affordable life-cycle cost. Design/methodology/approach CEASIOM (www.ceasiom.com) is a framework that integrates discipline-specific tools like computer-aided design, mesh generation, computational fluid dynamics (CFD), stability and control analysis and structural analysis, all for the purpose of aircraft conceptual design. Findings A new CEASIOM version is under development within EU Project AGILE (www.agile-project.eu), by adopting the CPACS XML data-format for representation of all design data pertaining to the aircraft under development. Research limitations/implications Results obtained from different methods have been compared and analyzed. Some differences have been observed; however, they are mainly due to the different physical modelizations that are used by each of these methods. Originality/value This paper summarizes the current status of the development of the new CEASIOM software, in particular for the following modules: CPACS file visualizer and editor CPACSupdater (Matlab) Automatic unstructured (Euler) & hybrid (RANS) mesh generation by sumo Multi-fidelity CFD solvers: Digital Datcom (Empirical), Tornado (VLM), Edge-Euler & SU2-Euler, Edge-RANS & SU2-RANS Data fusion tool: aerodynamic coefficients fusion from variable fidelity CFD tools above to compile complete aero-table for flight analysis and simulation.
APA, Harvard, Vancouver, ISO, and other styles
33

Ceylan Dadakoğlu, Sevda, and Şeniz Aksoy. "Features of Second Life virtual environment and evaluation within the scope of art education." Journal of Human Sciences 17, no. 2 (May 2, 2020): 485–512. http://dx.doi.org/10.14687/jhs.v17i2.5769.

Full text
Abstract:
Depending on the rapid development of technology, many environments, tools and methods are being developed in the field of education and training. These innovations include education in virtual worlds and three-dimensional education technologies that we have encountered frequently in recent years. With the improvement of three-dimensional education technologies, it is known that learning is used in "3D virtual worlds". Accordingly, it is mentioned that virtual environments are used in all levels of education, learning and teaching process.In this study, the virtual world of Second Life, which is a three-dimensional online life simulation and can be defined as an alternative teaching environment, was examined. The aim of this article; Introducing Second Life, a virtual environment that can be used in art and design education, to provide a theoretical perspective, to contribute to researchers and teachers who want to use 3D virtual worlds for educational purposes and to create a theoretical basis for the researches in this environment.Therefore, first of all, 3D virtual worlds are examined from a general perspective. Then, the Second Life application from 3D virtual environments was examined in detail and its general characteristics were defined.In addition, the use of Second Life in education, construction and content creation within the application, art and design making and art education were discussed. For this reason, examples of the artists using the Second Life application were given and some of the educational practices related to how Second Life was used in art and design education were included. In the conclusion part, with the development of technology and the use of virtual worlds in education, the gains that can be achieved in art classes were also included. In this context, the importance of the use of technology, various computer applications (VR, augmented reality applications, etc.) and 3D virtual worlds was mentioned in terms of today's art education gains. It was also stated that the ways of incorporating technology into art education should be questioned. ​Extended English summary is in the end of Full Text PDF (TURKISH) file. Özet Teknolojinin hızla ilerlemesine bağlı olarak eğitim ve öğretim alanında birçok ortam, araç ve yöntem geliştirilmektedir. Bu yeniliklerin içerisinde son yıllarda sıkça karşılaştığımız sanal dünyalarda eğitim ve üç boyutlu eğitim teknolojileri de yer almaktadır. Üç boyutlu eğitim teknolojilerinin iyileştirilmesiyle beraber “3B sanal dünyalarda öğrenme”nin ön plana çıktığı bilinmektedir. Buna bağlı olarak eğitimin tüm kademelerinde, öğrenme ve öğretme sürecinde sanal ortamların işe koşulduğundan söz edilmektedir. Bu araştırmada üç boyutlu, çevrimiçi bir yaşam simülasyonu olan ve alternatif bir öğretim ortamı olarak tanımlanabilen Second Life sanal dünyası incelenmiştir. Bu makalenin amacı; sanat ve tasarım eğitiminde kullanılabilecek sanal ortamlardan Second Life’ı tanıtmak, bu konuda teorik bir perspektif kazandırmak, 3B sanal dünyaları eğitim amaçlı kullanmak isteyen araştırmacı ve öğretmenlere katkı sağlamak ve bu ortamda yapılacak araştırmalar için kuramsal zemin oluşturmaktır. Bu nedenle öncelikle 3B sanal dünyalara genel bir çerçeveden bakılmıştır. Ardından 3B sanal ortamlardan Second Life uygulaması detaylı bir biçimde incelenerek genel özellikleri tanımlanmıştır. Second Life uygulamasının eğitimde kullanılması, uygulama dâhilinde inşa ve içerik oluşturma, sanat ve tasarım yapma ve sanat eğitimi konusu tartışılmıştır. Daha sonra Second Life uygulamasını kullanan sanatçılara örnekler verilmiş ve Second Life’ın sanat ve tasarım eğitiminde nasıl kullanıldığına ilişkin eğitim uygulamalarından bazılarına yer verilmiştir. Sonuç kısmında teknolojinin gelişmesi ve sanal dünyaların eğitimde kullanımıyla beraber sanat derslerinde elde edilebilecek kazanımlar yer almıştır. Buna bağlı olarak teknolojinin, çeşitli bilgisayar uygulamalarının (VR, artırılmış gerçeklik uygulamaları, vb.) 3B sanal dünyaların eğitimde kullanılmasının günümüz sanat eğitimi kazanımları açısından önemine değinilmiştir. Ayrıca sanat eğitimine teknolojinin dâhil edilme biçimlerinin sorgulanması gerektiği ifade edilmiştir.
APA, Harvard, Vancouver, ISO, and other styles
34

Robinson, Jeffrey, and Annica Wayman. "4172 Introduction to R Programming and GitHub: Developing Automated Analysis of Complete Blood Count Data as a Translational Science Undergraduate Project." Journal of Clinical and Translational Science 4, s1 (June 2020): 63. http://dx.doi.org/10.1017/cts.2020.215.

Full text
Abstract:
OBJECTIVES/GOALS: Introduce students to programming and software development practices in the life sciences by analyzing standard clinical diagnostic bloodwork for differential immune responses. Including lectures and a semester project with the goal of enhancing undergraduate students’ education to prepare them for careers in translational science. METHODS/STUDY POPULATION: The educational content was taught for the first time as a component of the newly developed course BTEC 330 “Software Applications in the Life Sciences” in UMBC’s Translational Life Science Technology (TLST) Bachelor’s degree program at the Universities at Shady Grove campus. Eleven students took the course. All were beginners with no programming background. Lectures provided background on the diagnostic components of the CBC, criteria for differential diagnosis in the clinical setting, and introduction to hematology and flow cytometry, forming underpinnings for interpretation of the CBC results. Weekly computer lab practical sessions provided training fundamentals of R programming language, the R-studio integrated development environment (IDE), and the GitHub.com open-source software development platform. RESULTS/ANTICIPATED RESULTS: The graded assignment consisted of a coding project in which students were each assigned an individual parameter from the CBC results. These include, for example, relative lymphocyte count or hemoglobin readouts. Students each created their own R-language script using R-studio, with functional code which: 1) Read in data from a file provided, 2) Performed statistical testing, 3) Read out statistical results as text, and charts as image files, 4) “Diagnosed” individuals in the dataset as being inside or outside the clinical normal range for that parameter. Each student also registered their own GitHub account and published their open-source code. Grading was performed on code functionality by downloading each student repository and running the code with the instructor as an outside developer using the resource. DISCUSSION/SIGNIFICANCE OF IMPACT: In this curriculum, students with no background in programming learned to code a basic R-language script and use GitHub to automate interpretation of CBC results. With advanced automation now becoming commonplace in translational science, such course content can provide introductory level of literacy in development of clinical informatics software.
APA, Harvard, Vancouver, ISO, and other styles
35

Kukharska, N. "PROGRAM IMPLEMENTATION OF ALGORITHMS OF HIDING OF INFORMATION BY METHODS OF A RANDOM INTERVAL." Bulletin of Lviv State University of Life Safety, no. 18 (December 31, 2018): 41–48. http://dx.doi.org/10.32447/20784643.18.2018.03.

Full text
Abstract:
At the current stage of the development of information systems and technologies, global computer systems and multimedia tools, as never before, there is an urgent need to ensure the reliability, security of storage of digital data and their transmission through open channels of information communications. One of the most promising and popular approaches to solving this problem is based on the applying of computer steganography methods. The purpose of the article is systematizing information about methods of textual steganography, namely methods of arbitrary intervals, carrying out a comparative bandwidth analysis. Methods of research - methods of textual steganography: the method of double spaces between words, the method of changing the space code, the method of changing the number of spaces at the end of text strings, the method of changing the number of spaces between words aligned to the width of the text. Methods of arbitrary interval are used to hide the data in the free space in the text. They use intervals between sentences, spaces at the end of text strings, intervals between words in the text, including those, which are aligned in width, manipulate symbols of spaces, which have different ASCII codes. They are used to organize secret transmission of confidential information through open communication channels. In the article, on the basis of the software complexes developed in the environment of the computer algebra MathCAD, the steganographic transformations, which consistent with the algorithms of the methods, are sequentially tracked. The question of the bandwidth of the constructed steganosystems was considered. Bandwidth is the maximum amount of additional information that can be embedded in one element (symbol) of the text container. So, the bandwidth of the double-space method between words and the method of changing the space code in the case of the Ukrainian-language text container is 1.75%. The method of changing the number of spaces between aligned by the width of the text of the words has a lower bandwidth of 0.4%. The bandwidth of the method of changing the number of spaces at the end of the text strings depends on the difference between the number of symbols in the longest line and all other lines. The article also outlines the advantages and disadvantages of each method. Conclusions. The arbitrary interval methods are effective provided that the text is presented in ASCII format. In general, text files are "inconvenient" containers. They lack redundancy in comparison, for example, with graphic or audio files. For such arbitrary interval methods as a method of changing the space code, the method of changing the number of spaces at the end of the text strings is characterized by the fact that the hidden data can not be obtained from a hard copy of the text file. Despite the drawbacks, arbitrary interval methods have reason to be applied because of the prevalence of text file files. Users of computer networks are constantly exchanging text messages. This is a routine everyday action, so text files, even those, which contain hidden confidential information, should not cause unnecessary interest among outsiders.
APA, Harvard, Vancouver, ISO, and other styles
36

Barsi, M., and A. Barsi. "BUILDING OPENDRIVE MODEL FROM MOBILE MAPPING DATA." International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLIII-B4-2021 (June 30, 2021): 9–14. http://dx.doi.org/10.5194/isprs-archives-xliii-b4-2021-9-2021.

Full text
Abstract:
Abstract. The development of self-driving vehicles has been efficiently accelerated by applying computer simulations. These environments can achieve the best result only if reality has been digitized: highly accurate and detailed maps are required. The high-definition (HD) maps aim to fulfill these requests. Companies and academia are seeking adequate technology, where OpenDRIVE standard seems to win this race.A software was developed to create high-definition road models for self-driving car testing purposes, which can also be used in driving simulators, for example, for testing vehicle prototypes.The data of a sample area was received located in northern Budapest, which included inconsistent information about the lanes of the road network. The top-priority task was to build a highly structured, consistent model satisfying this open standard, an increasingly popular modeling format to describe the environment for various simulating software. In order to do that, the relevant information had to be extracted from an AutoCAD file. The result was a collection of points that was added to a software module written in C++. The code has built a structure from those points, including determining connections between lanes, building roads from the lanes, determining connections between roads, adding road marks, and building the final OpenDRIVE model.Two different sets of data have been used thus far in the software: a circa 8 km long road section and a separate junction – meaning about 20,000 points to process. Two independent models were created; both were tested in various automotive simulators – including IPG CarMaker, probably the most well-known simulating tool used in car manufacturing – which showed that both are indeed correct. The overall time required to build those models from simple text files to well-structured OpenDRIVE models is no more than two minutes, while before the software development – when all of those aforementioned processes were done by humans – it required several weeks, if not months.The software is already capable of building basic road models but is nowhere near finished. Numerous other features can be added to it as well, for instance, traffic signs and signals and environmental elements such as roadside objects, trees, and buildings.
APA, Harvard, Vancouver, ISO, and other styles
37

Sizov, V. A., D. M. Malinichev, and V. V. Mochalov. "Improvement of the Regulatory Framework of Information Security for Terminal Access Devices of the State Information System." Open Education 24, no. 2 (April 22, 2020): 73–79. http://dx.doi.org/10.21686/1818-4243-2020-2-73-79.

Full text
Abstract:
The aim of the study is to increase the effectiveness of information security management for state information systems (SIS) with terminal access devices by improving regulatory legal acts that should be logically interconnected and not contradict each other, as well as use a single professional thesaurus that allows understanding and describe information security processes.Currently, state information systems with terminal access devices are used to ensure the realization of the legitimate interests of citizens in information interaction with public authorities [1].One of the types of such systems are public systems [2]. They are designed to provide electronic services to citizens, such as paying taxes, obtaining certificates, filing of applications and other information. The processed personal data may belong to special, biometric, publicly available and other categories [3]. Various categories of personal data, concentrated in a large volume about a large number of citizens, can lead to significant damage as a result of their leakage, which means that this creates information risks.There are several basic types of architectures of state information systems: systems based on the “thin clientpeer-to-peer network systems; file server systems; data processing centers; systems with remote user access; the use of different types of operating systems (heterogeneity of the environment); use of applications independent of operating systems; use of dedicated communication channels [4]. Such diversity and heterogeneity of state information systems, on the one hand, and the need for high-quality state regulation in the field of information security in these systems, on the other hand, require the study and development of legal acts that take into account primarily the features of systems that have a typical modern architecture of “thin customer". Materials and research methods. The protection of the state information system is regulated by a large number of legal acts that are constantly being improved with changes and additions to the content. At the substantive level, it includes many stages, such as the formation of SIS requirements, the development of a security system, its implementation, and certification. The protected information is processed in order to enforce the law and ensure the functioning of the authorities. The need to protect confidential information is determined by the legislation of the Russian Federation [5, 6]. Therefore, to assess the quality of the regulatory framework of information security for terminal access devices of the state information system, the analysis of the main regulatory legal acts is carried out and on the basis of it, proposals are developed by analogy to improve existing regulatory documents in the field of information security.Results. The paper has developed proposals for improving the regulatory framework of information security for terminal access devices of the state information system- for uniformity and unification, the terms with corresponding definitions are justified for their establishment in the documents of the Federal Service for Technical and Export Control (FSTEC) or Rosstandart;- rules for the formation of requirements for terminals, which should be equivalent requirements for computer equipment in the “Concept for the protection of computer equipment and automated systems from unauthorized access to information ".Conclusion. General recommendations on information protection in state information systems using the “thin client" architecture are proposed, specific threats that are absent in the FSTEC threat bank are justified, and directions for further information security for the class of state information systems under consideration are identified. Due to the large number of stakeholders involved in the coordination and development of unified solutions, a more specific consideration of the problems and issues raised is possible only with the participation of representatives of authorized federal executive bodies and business representatives for discussion.
APA, Harvard, Vancouver, ISO, and other styles
38

Farmer, Kristine, Jeff Allen, Malak Khader, Tara Zimmerman, and Peter Johnstone. "Paralegal Students’ and Paralegal Instructors’ Perceptions of Synchronous and Asynchronous Online Paralegal Course Effectiveness: A Comparative Study." International Journal for Educational and Vocational Studies 3, no. 1 (March 30, 2021): 1. http://dx.doi.org/10.29103/ijevs.v3i1.3550.

Full text
Abstract:
To improve online learning pedagogy within the field of paralegal education, this study investigated how paralegal students and paralegal instructors perceived the effectiveness of synchronous and asynchronous online paralegal courses. This study intended to inform paralegal instructors and course developers how to better design, deliver, and evaluate effective online course instruction in the field of paralegal studies.Survey results were analyzed using independent samples t-test and correlational analysis, and indicated that overall, paralegal students and paralegal instructors positively perceived synchronous and asynchronous online paralegal courses. Paralegal instructors reported statistically significant higher perceptions than paralegal students: (1) of instructional design and course content in synchronous online paralegal courses; and (2) of technical assistance, communication, and course content in asynchronous online paralegal courses. Instructors also reported higher perceptions of the effectiveness of universal design, online instructional design, and course content in synchronous online paralegal courses than in asynchronous online paralegal courses. Paralegal students reported higher perceptions of asynchronous online paralegal course effectiveness regarding universal design than paralegal instructors. No statistically significant differences existed between paralegal students’ perceptions of the effectiveness of synchronous and asynchronous online paralegal courses. A strong, negative relationship existed between paralegal students’ age and their perceptions of effective synchronous paralegal courses, which were statistically and practically significant. Lastly, this study provided practical applicability and opportunities for future research. Akyol, Z., & Garrison, D. R. (2008). The development of a community of inquiry over time in an online course: Understanding the progression and integration of social, cognitive and teaching presence. Journal of Asynchronous Learning Networks, 12, 3-22. Retrieved from https://files.eric.ed.gov/fulltext/EJ837483.pdf Akyol, Z., Garrison, D. R., & Ozden, M. Y. (2009). Online and blended communities of inquiry: Exploring the developmental and perceptional differences. The International Review of Research in Open and Distributed Learning, 10(6), 65-83. Retrieved from http://www.irrodl.org/index.php/irrodl/article/view/765/1436 Allen, I. E., & Seaman, J. (2014). Grade change: Tracking online education in the United States. Babson Park, MA: Babson Survey Research Group and Quahog Research Group, LLC. Retrieved from https://www.utc.edu/learn/pdfs/online/sloanc-report-2014.pdf Alreck, P. L., & Settle, R. B. (2004). The Survey Research Handbook (3rd ed.) New York, NY: McGraw-Hill Irwin. American Association for Paralegal Education (2013, Oct.). AAfPE core competencies for paralegal programs. Retrieved from https://cdn.ymaws.com/www.aafpe.org/resource/resmgr/Docs/AAfPECoreCompetencies.pdf American Bar Association, Standing Committee on Paralegals. (2017). https://www.americanbar.org/groups/paralegals.html American Bar Association, Standing Committee on Paralegals (2013, September). Guidelines for the approval of paralegal education programs. Retrieved from https://www.americanbar.org/content/dam/aba/administrative/paralegals/ls_prlgs_2013_paralegal_guidelines.authcheckdam.pdf Astani, M., Ready, K. J., & Duplaga, E. A. (2010). Online course experience matters: Investigating students’ perceptions of online learning. Issues in Information Systems, 11(2), 14-21. Retrieved from http://iacis.org/iis/2010/14-21_LV2010_1526.pdf Bailey, C. J., & Card, K. A. (2009). Effective pedagogical practices for online teaching: Perception of experienced instructors. The Internet and Higher Education, 12, 152-155. doi: 10.1016/j.iheduc.2009.08.002 Bernard, R., Abrami, P., Borokhovski, E., Wade, C., Tamim , R., Surkes, M., & Bethel, E. (2009). A meta-analysis of three types of interaction treatments in distance education. Review of Educational Research, 79, 1243-1289. doi: 10.3102/0034654309333844 Cherry, S. J., & Flora, B. H. (2017). Radiography faculty engaged in online education: Perceptions of effectiveness, satisfaction, and technological self-efficacy. Radiologic Technology, 88(3), 249-262. http://www.radiologictechnology.org/ Cohen, J. (1988). Statistical power analysis for the behavioral sciences (2nd ed.). New York: Taylor & Francis Group. Colorado, J. T., & Eberle, J. (2010). Student demographics and success in online learning environments. Emporia State Research Studies, 46(1), 4-10. Retrieved from https://esirc.emporia.edu/bitstream/handle/123456789/380/205.2.pdf?sequence=1 Dutcher, C. W., Epps, K. K., & Cleaveland, M. C. (2015). Comparing business law in online and face to face formats: A difference in student learning perception. Academy of Educational Leadership Journal, 19, 123-134. http://www.abacademies.org/journals/academy-of-educational-leadership-journal-home.html Faul, F., Erdfelder, E., Lang, A.-G., & Buchner, A. (2007). G*Power 3: A flexible statistical power analysis program for the social, behavioral, and biomedical sciences. Behavior Research Methods, 39, 175-191. Retrieved from http://www.gpower.hhu.de/fileadmin/redaktion/Fakultaeten/Mathematisch-Naturwissenschaftliche_Fakultaet/Psychologie/AAP/gpower/GPower3-BRM-Paper.pdf Field, A. (2009). Discovery statistics using SPSS. (3rd ed.). Thousand Oaks, CA: Sage Publications, Inc. Gall M., Borg, W., & Gall, J. (1996). Educational research: An introduction (6th ed.). White Plains, NY: Longman Press. Garrison, D. R., Anderson, T., & Archer, W. (2001). Critical thinking, cognitive presence, and computer conferencing in distance education. American Journal of distance education, 15(1), 7-23. Retrieved from http://cde.athabascau.ca/coi_site/documents/Garrison_Anderson_Archer_CogPres_Final.pdf Green, S. B., & Salkind, N. J. (2005). Using SPSS for Windows and Macintosh: Internal consistency estimates of reliability. Upper Saddle River, NJ: Pearson Prentice Hall. Harrell, I. L. (2008). Increasing the Success of Online Students. Inquiry, 13(1), 36-44. Retrieved from http://files.eric.ed.gov/fulltext/EJ833911.pdf Horspool, A., & Lange, C. (2012). Applying the scholarship of teaching and learning: student perceptions, behaviours and success online and face-to-face. Assessment & Evaluation in Higher Education, 37, 73-88. doi: 10.1080/02602938.2010.496532 Inman, E., Kerwin, M., & Mayes, L. (1999). Instructor and student attitudes toward distance learning. Community College Journal of Research & Practice, 23, 581-591. doi:10.1080/106689299264594 Institute of Legal Executives (ILEX). https://www.cilexcareers.org.uk/ Johnson, J. & Taggart, G. (1996). Computer assisted instruction in paralegal education: Does it help? Journal of Paralegal Education and Practice, 12, 1-21. Johnstone, Q. & Flood, J. (1982). Paralegals in English and American law offices. Windsor YB Access to Justice 2, 152. Jones, S. J. (2012). Reading between the lines of online course evaluations: Identifiable actions that improve student perceptions of teaching effectiveness and course value. Journal of Asynchronous Learning Networks, 16(1), 49-58. doi:http://dx.doi.org/10.24059/olj.v16i1.227 Krejcie, R. V., & Morgan, D. W. (1970). Determining sample size for research activities. Educational and psychological measurement, 30, 607-610. http://journals.sagepub.com/home/epm Liu, S., Gomez, J., Khan, B., & Yen, C. J. (2007). Toward a learner-oriented community college online course dropout framework. International Journal on ELearning, 6(4), 519-542. https://www.learntechlib.org/j/IJEL/ Lloyd, S. A., Byrne, M. M., & McCoy, T. S. (2012). Faculty-perceived barriers of online education. Journal of online learning and teaching, 8(1), 1-12. Retrieved from http://jolt.merlot.org/vol8no1/lloyd_0312.pdf Lockee, B., Burton, J., & Potter, K. (2010, March). Organizational perspectives on quality in distance learning. In D. Gibson & B. Dodge (Eds.), Proceedings of SITE 2010—Society for Information Technology & Teacher Education International Conference (pp. 659-664). San Diego, CA: Association for the Advancement of Computing in Education (AACE). https://www.learntechlib.org/p/33419/ Lowerison, G., Sclater, J., Schmid, R. F., & Abrami, P. C. (2006). Student perceived effectiveness of computer technology use in post-secondary classrooms. Computers & Education, 47(4), 465-489. doi:10.1016/j.compedu.2004.10.014 Retrieved from https://pdfs.semanticscholar.org/fc9c/13f0187d3967217aa82cc96c188427e29ec9.pdf Martins, L. L., & Kellermanns, F. W. (2004). A model of business school students' acceptance of a web-based course management system. Academy of Management Learning & Education, 3(1), 7-26. doi: 10.5465/AMLE.2004.12436815 Mayes, J. T. (2001). Quality in an e-University. Assessment & Evaluation in Higher Education, 26, 465-473. doi:10.1080/02602930120082032 McCabe, S. (2007). A brief history of the paralegal profession. Michigan Bar Journal, 86(7), 18-21. Retrieved from https://www.michbar.org/file/barjournal/article/documents/pdf4article1177.pdf McMillan, J. H. (2008). Educational Research: Fundamentals for the customer. Boston, MA: Pearson Education, Inc. Myers, C. B., Bennett, D., Brown, G., & Henderson, T. (2004). Emerging online learning environments and student learning: An analysis of faculty perceptions. Educational Technology & Society, 7(1), 78-86. Retrieved from http://www.ifets.info/journals/7_1/9.pdf Myers, K. (2002). Distance education: A primer. Journal of Paralegal Education & Practice, 18, 57-64. Nunnaly, J. (1978). Psychometric theory. New York: McGraw-Hill. Otter, R. R., Seipel, S., Graeff, T., Alexander, B., Boraiko, C., Gray, J., Petersen, K., & Sadler, K. (2013). Comparing student and faculty perceptions of online and traditional courses. The Internet and Higher Education, 19, 27-35. doi:10.1016/j.iheduc.2013.08.001 Popham, W. J. (2000). Modern educational measurement: Practical guidelines for educational leaders. Boston, MA: Allyn & Bacon. Rich, A. J., & Dereshiwsky, M. I. (2011). Assessing the comparative effectiveness of teaching undergraduate intermediate accounting in the online classroom format. Journal of College Teaching and Learning, 8(9), 19. https://www.cluteinstitute.com/ojs/index.php/TLC/ Robinson, C., & Hullinger, H. (2008). New benchmarks in higher education: Student engagement in online learning. The Journal of Education for Business, 84(2), 101-109. Retrieved from http://anitacrawley.net/Resources/Articles/New%20Benchmarks%20in%20Higher%20Education.pdf Salkind, N. J. (2008). Statistics for people who think they hate statistics. Los Angeles, CA: Sage Publications. Santos, J. (1999, April). Cronbach's Alpha: A tool for assessing the reliability of scales. Journal of Extension, 37, 2. Retrieved from https://www.joe.org/joe/1999april/tt3.php Seok, S., DaCosta, B., Kinsell, C., & Tung, C. K. (2010). Comparison of instructors' and students' perceptions of the effectiveness of online courses. Quarterly Review of Distance Education, 11(1), 25. Retrieved from http://online.nuc.edu/ctl_en/wp-content/uploads/2015/08/Online-education-effectiviness.pdf Sheridan, K., & Kelly, M. A. (2010). The indicators of instructor presence that are important to students in online courses. Journal of Online Learning and Teaching, 6(4), 767-779. Retrieved from http://jolt.merlot.org/vol6no4/sheridan_1210.pdf Shook, B. L., Greer, M. J., & Campbell, S. (2013). Student perceptions of online instruction. International Journal of Arts & Sciences, 6(4), 337. Retrieved from https://s3.amazonaws.com/academia.edu.documents/34496977/Ophoff.pdf?AWSAccessKeyId=AKIAIWOWYYGZ2Y53UL3A&Expires=1508119686&Signature=J1lJ8VO0xardd%2FwH35pGj14UeBg%3D&response-content-disposition=inline%3B%20filename%3DStudent_Perceptions_of_Online_Learning.pdf Song, L., Singleton, E. S., Hill, J. R., & Koh, M. H. (2004). Improving online learning: Student perceptions of useful and challenging characteristics. The Internet and Higher Education, 7, 59-70. doi:10.1016/j.iheduc.2003.11.003 Steiner, S. D., & Hyman, M. R. (2010). Improving the student experience: Allowing students enrolled in a required course to select online or face-to-face instruction. Marketing Education Review, 20, 29-34. doi:10.2753/MER1052-8008200105 Stoel, L., & Hye Lee, K. (2003). Modeling the effect of experience on student acceptance of web-based courseware. Internet Research, 13(5), 364-374. http://www.emeraldinsight.com/loi/intr Taggart, G., & Bodle, J. H. (2003). Example of assessment of student outcomes data from on-line paralegal courses: Lessons learned. Journal of Paralegal Education & Practice, 19, 29-36. Tanner, J. R., Noser, T. C., & Totaro, M. W. (2009). Business faculty and undergraduate students' perceptions of online learning: A comparative study. Journal of Information Systems Education, 20, 29-40. http://jise.org/ Tung, C.K. (2007). Perceptions of students and instructors of online and web-enhanced course effectiveness in community colleges (Doctoral dissertation). Retrieved from ProQuest Dissertations and Theses database (Publication No. AAT 3284232). Vodanovich, S. J. & Piotrowski, C., & (2000). Are the reported barriers to Internet-based instruction warranted? A synthesis of recent research. Education, 121(1), 48-53. http://www.projectinnovation.com/education.html Ward, M. E., Peters, G., & Shelley, K. (2010). Student and faculty perceptions of the quality of online learning experiences. The International Review of Research in Open and Distributed Learning, 11, 57-77. Retrieved from http://www.irrodl.org/index.php/irrodl/article/view/867/1610? Wilkes, R. B., Simon, J. C., & Brooks, L. D. (2006). A comparison of faculty and undergraduate students' perceptions of online courses and degree programs. Journal of Information Systems Education, 17, 131-140. http://jise.org/
APA, Harvard, Vancouver, ISO, and other styles
39

Rogers, Michelle, Janice Masud-Paul, and Rania El Desoki. "Understanding the use of health information technology for maternal and child health practitioner training in low and middle income countries." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 63, no. 1 (November 2019): 743–46. http://dx.doi.org/10.1177/1071181319631521.

Full text
Abstract:
Objectives: To assess the evidence of information communication technology (ICT) use in the training of maternal and child health (MCH) workers, discuss methodological issues present in the identified studies, and identify future work areas. Introduction: The explosive growth of cellphone usage in low and middle-income countries (LMIC) has made mobile technology an increasingly attractive form of information communication technology (ICT) to be used to meet healthcare needs that go unmet, rising due to the paucity of trained clinical workers (O’Donovan, Bersin, & O’Donovan, 2015). The portability and relative low cost of cellphones have made them ubiquitous and efficient to use. For example, subscriptions in Africa have risen from 12.4 per hundred inhabitants in 2005 to per hundred inhabitants in 2015 (ITU, 2017). ICT is an umbrella term that encompasses the hardware, software and networks that provide its users with data and information resources. As far as healthcare is concerned, these resources include access to varied tools and services such as electronic health records, point-of-care databases, decision support systems, clinical guidelines or training modules for continuing education (Machingura et al., 2014). This technology has made healthcare more efficient in affluent countries where funding and infrastructure to build, support and maintain ICT is readily available. However, ICT development is critical to LMIC’s which have the greatest barriers to effective and efficient healthcare systems and fewer resources to overcome challenges. The aims of this paper are to (1) summarize the literature on ICT use in the training of MCH workers, (2) discuss methodological issues present in the identified studies, and (3) identify future work areas. Our specific research questions are: Which ICT tools have been used in developing countries for training the MCH workforce? How successful are the tools for instructing health care workers? A major impediment to health care improvements in underdeveloped countries is the low ratio of health professionals to patients. A developed workforce is critical for sustaining healthcare infrastructure. Because there is an insufficient number of professional practitioners, many MCH health needs are met by community workers with limited or no formal training (Chipps et al., 2015). Since the level of services range from general check-ups to life-saving interventions, training must address a variety of educational requirements. (Agarwal et al., 2015). In addition to primary professional education, health workers require training for re-licensure and continuous professional development (CPD). Training, particularly in remote areas, requires travel, time away from work as well as funding for food and lodging (Chipps et al., 2015). This exacerbates uneven healthcare coverage with the majority of MCH health care workers concentrated in urban centers, leaving rural residents with inadequate services (Middleberg et al., 2013; Modi et al., 2015). ICT reduces costs by enabling personnel to remain in their communities while providing digital access to educational content, mentors, guidelines and decision support systems (Saronga et al., 2015). It is commonly recognized that underdeveloped countries have occasional brown-outs in their urban centers and the power grid may not reach rural or remote areas. Even if seed money is acquired for start-up costs, funding for technology maintenance and technical manpower beyond the pilot stage can be tentative (Achampong, 2012). Secondly, while cell phone use across LMICs has exploded in recent years, its use for advancing training has not grown in comparison. A limited number of reports have been published, reporting the use of ICT for communication (Andreatta et al., 2011), tracking health worker behavior (Awoonor-Williams et al., 2013), attitudes towards using ICT (Sukums et al., 2014; Zakane et al., 2014), and the impact of the design of ICT (Valez et. al., 2014). This paucity of studies understanding the impact of ICT on measurable training outcomes leaves a troubling gap in the literature if progress is to be made in addressing the training needs. Finally, government entities, educators and administrators may be reluctant to adopt ICT into health training for practical, fiscal and political reasons. Because health personnel may not have exposure to technology in their daily lives, staff may require basic computer training on operating systems, file management, word processing and databases in conjunction with ICT projects (Sukums, 2014). In addition to a lack of knowledge about computers in general, use of ICT also comes with associated monetary costs. Both of these issues are also exacerbated by resulting government policy changes. We endeavored to fill this gap by completing a literature review to bring the disparate work together, but to our surprise, it did not really exist. This paper reports on (1) what studies have been conducted on the use of ICT in training; (2) what common methods are used and how they are evaluated and (3) what outcomes have been reported. Methods: Medline (OVID), CINAHL and Web of Science were searched for relevant articles published between January 1, 2007 and February 28, 2017. Studies were included if they included training and education in low and middle-income countries using ICT for maternal child health workers. Results: 111 unique articles from electronic searches with seven additional articles discovered through hand-searching reference lists were identified. After review, 15 articles aligned with the necessities to analyze the current environment of the ICT tools. The study designs in the reviewed articles were usually pre- and post-evaluations (n=7). There were also a small number of single cross-sectional studies (n=3) measuring the use of the tool. Two studies also evaluated the use of electronic clinical decision support systems (CDSS) applications or algorithms. The remainder of the studies (n=3) used ICT to provide resources for meeting information needs, as well as repositories of protocols and best practice documents. The outcomes reported ranged from access to medical resources (n=3), accuracy in clinical documentation (n=2), need for remedial computer training (n=2) and an increase in clinical knowledge and proper use of protocols (n=4) Discussion and conclusion: The current evidence-base does not show a clear indication that there were particular initiatives using ICT for the training of health workers. While the majority of projects identified were shown to improve outcomes, there were limited results reported. This lack of documented evidence hinders decisions about the content and methods that should be used to support training. We are missing an opportunity for advancement. The World Health Organization identified community health worker training as a lever to move the improvement of health care in low and middle-income countries (LMICs). An understanding of barriers and facilitators to using ICTs to meet this need, provides key directions for policy makers and non-governmental organizations as they apply limited resources to these issues.
APA, Harvard, Vancouver, ISO, and other styles
40

Kirkpatrick, Helen Beryl, Jennifer Brasch, Jacky Chan, and Shaminderjot Singh Kang. "A Narrative Web-Based Study of Reasons To Go On Living after a Suicide Attempt: Positive Impacts of the Mental Health System." Journal of Mental Health and Addiction Nursing 1, no. 1 (February 15, 2017): e3-e9. http://dx.doi.org/10.22374/jmhan.v1i1.10.

Full text
Abstract:
Background and Objective: Suicide attempts are 10-20X more common than completed suicide and an important risk factor for death by suicide, yet most people who attempt suicide do not die by suicide. The process of recovering after a suicide attempt has not been well studied. The Reasons to go on Living (RTGOL) Project, a narrative web-based study, focuses on experiences of people who have attempted suicide and made the decision to go on living, a process not well studied. Narrative research is ideally suited to understanding personal experiences critical to recovery following a suicide attempt, including the transition to a state of hopefulness. Voices from people with lived experience can help us plan and conceptualize this work. This paper reports on a secondary research question of the larger study: what stories do participants tell of the positive role/impact of the mental health system. Material and Methods: A website created for The RTGOL Project (www.thereasons.ca) enabled participants to anonymously submit a story about their suicide attempt and recovery, a process which enabled participation from a large and diverse group of participants. The only direction given was “if you have made a suicide attempt or seriously considered suicide and now want to go on living, we want to hear from you.” The unstructured narrative format allowed participants to describe their experiences in their own words, to include and emphasize what they considered important. Over 5 years, data analysis occurred in several phases over the course of the study, resulting in the identification of data that were inputted into an Excel file. This analysis used stories where participants described positive involvement with the mental health system (50 stories). Results: Several participants reflected on experiences many years previous, providing the privilege of learning how their life unfolded, what made a difference. Over a five-year period, 50 of 226 stories identified positive experiences with mental health care with sufficient details to allow analysis, and are the focus of this paper. There were a range of suicidal behaviours in these 50 stories, from suicidal ideation only to medically severe suicide attempts. Most described one or more suicide attempts. Three themes identified included: 1) trust and relationship with a health care professional, 2) the role of friends and family and friends, and 3) a wide range of services. Conclusion: Stories open a window into the experiences of the period after a suicide attempt. This study allowed for an understanding of how mental health professionals might help individuals who have attempted suicide write a different story, a life-affirming story. The stories that participants shared offer some understanding of “how” to provide support at a most-needed critical juncture for people as they interact with health care providers, including immediately after a suicide attempt. Results of this study reinforce that just one caring professional can make a tremendous difference to a person who has survived a suicide attempt. Key Words: web-based; suicide; suicide attempt; mental health system; narrative research Word Count: 478 Introduction My Third (or fourth) Suicide AttemptI laid in the back of the ambulance, the snow of too many doses of ativan dissolving on my tongue.They hadn't even cared enough about meto put someone in the back with me,and so, frustrated,I'd swallowed all the pills I had with me— not enough to do what I wanted it to right then,but more than enough to knock me out for a good 14 hours.I remember very little after that;benzodiazepines like ativan commonly cause pre- and post-amnesia, says Google helpfullyI wake up in a locked rooma woman manically drawing on the windows with crayonsthe colors of light through the glassdiffused into rainbows of joy scattered about the roomas if she were coloring on us all,all of the tattered remnants of humanity in a psych wardmade into a brittle mosaic, a quilt of many hues, a Technicolor dreamcoatand I thoughtI am so glad to be able to see this. (Story 187)The nurse opening that door will have a lasting impact on how this story unfolds and on this person’s life. Each year, almost one million people die from suicide, approximately one death every 40 seconds. Suicide attempts are much more frequent, with up to an estimated 20 attempts for every death by suicide.1 Suicide-related behaviours range from suicidal ideation and self-injury to death by suicide. We are unable to directly study those who die by suicide, but effective intervention after a suicide attempt could reduce the risk of subsequent death by suicide. Near-fatal suicide attempts have been used to explore the boundary with completed suicides. Findings indicated that violent suicide attempters and serious attempters (seriousness of the medical consequences to define near-fatal attempts) were more likely to make repeated, and higher lethality suicide attempts.2 In a case-control study, the medically severe suicide attempts group (78 participants), epidemiologically very similar to those who complete suicide, had significantly higher communication difficulties; the risk for death by suicide multiplied if accompanied by feelings of isolation and alienation.3 Most research in suicidology has been quantitative, focusing almost exclusively on identifying factors that may be predictive of suicidal behaviours, and on explanation rather than understanding.4 Qualitative research, focusing on the lived experiences of individuals who have attempted suicide, may provide a better understanding of how to respond in empathic and helpful ways to prevent future attempts and death by suicide.4,5 Fitzpatrick6 advocates for narrative research as a valuable qualitative method in suicide research, enabling people to construct and make sense of the experiences and their world, and imbue it with meaning. A review of qualitative studies examining the experiences of recovering from or living with suicidal ideation identified 5 interconnected themes: suffering, struggle, connection, turning points, and coping.7 Several additional qualitative studies about attempted suicide have been reported in the literature. Participants have included patients hospitalized for attempting suicide8, and/or suicidal ideation,9 out-patients following a suicide attempt and their caregivers,10 veterans with serious mental illness and at least one hospitalization for a suicide attempt or imminent suicide plan.11 Relationships were a consistent theme in these studies. Interpersonal relationships and an empathic environment were perceived as therapeutic and protective, enabling the expression of thoughts and self-understanding.8 Given the connection to relationship issues, the authors suggested it may be helpful to provide support for the relatives of patients who have attempted suicide. A sheltered, friendly environment and support systems, which included caring by family and friends, and treatment by mental health professionals, helped the suicidal healing process.10 Receiving empathic care led to positive changes and an increased level of insight; just one caring professional could make a tremendous difference.11 Kraft and colleagues9 concluded with the importance of hearing directly from those who are suicidal in order to help them, that only when we understand, “why suicide”, can we help with an alternative, “why life?” In a grounded theory study about help-seeking for self-injury, Long and colleagues12 identified that self-injury was not the problem for their participants, but a panacea, even if temporary, to painful life experiences. Participant narratives reflected a complex journey for those who self-injured: their wish when help-seeking was identified by the theme “to be treated like a person”. There has also been a focus on the role and potential impact of psychiatric/mental health nursing. Through interviews with experienced in-patient nurses, Carlen and Bengtsson13 identified the need to see suicidal patients as subjective human beings with unique experiences. This mirrors research with patients, which concluded that the interaction with personnel who are devoted, hope-mediating and committed may be crucial to a patient’s desire to continue living.14 Interviews with individuals who received mental health care for a suicidal crisis following a serious attempt led to the development of a theory for psychiatric nurses with the central variable, reconnecting the person with humanity across 3 phases: reflecting an image of humanity, guiding the individual back to humanity, and learning to live.15 Other research has identified important roles for nurses working with patients who have attempted suicide by enabling the expression of thoughts and developing self-understanding8, helping to see things differently and reconnecting with others,10 assisting the person in finding meaning from their experience to turn their lives around, and maintain/and develop positive connections with others.16 However, one literature review identified that negative attitudes toward self-harm were common among nurses, with more positive attitudes among mental health nurses than general nurses. The authors concluded that education, both reflective and interactive, could have a positive impact.17 This paper is one part of a larger web-based narrative study, the Reasons to go on Living Project (RTGOL), that seeks to understand the transition from making a suicide attempt to choosing life. When invited to tell their stories anonymously online, what information would people share about their suicide attempts? This paper reports on a secondary research question of the larger study: what stories do participants tell of the positive role/impact of the mental health system. The focus on the positive impact reflects an appreciative inquiry approach which can promote better practice.18 Methods Design and Sample A website created for The RTGOL Project (www.thereasons.ca) enabled participants to anonymously submit a story about their suicide attempt and recovery. Participants were required to read and agree with a consent form before being able to submit their story through a text box or by uploading a file. No demographic information was requested. Text submissions were embedded into an email and sent to an account created for the Project without collecting information about the IP address or other identifying information. The content of the website was reviewed by legal counsel before posting, and the study was approved by the local Research Ethics Board. Stories were collected for 5 years (July 2008-June 2013). The RTGOL Project enabled participation by a large, diverse audience, at their own convenience of time and location, providing they had computer access. The unstructured narrative format allowed participants to describe their experiences in their own words, to include and emphasize what they considered important. Of the 226 submissions to the website, 112 described involvement at some level with the mental health system, and 50 provided sufficient detail about positive experiences with mental health care to permit analysis. There were a range of suicidal behaviours in these 50 stories: 8 described suicidal ideation only; 9 met the criteria of medically severe suicide attempts3; 33 described one or more suicide attempts. For most participants, the last attempt had been some years in the past, even decades, prior to writing. Results Stories of positive experiences with mental health care described the idea of a door opening, a turning point, or helping the person to see their situation differently. Themes identified were: (1) relationship and trust with a Health Care Professional (HCP), (2) the role of family and friends (limited to in-hospital experiences), and (3) the opportunity to access a range of services. The many reflective submissions of experiences told many years after the suicide attempt(s) speaks to the lasting impact of the experience for that individual. Trust and Relationship with a Health Care Professional A trusting relationship with a health professional helped participants to see things in a different way, a more hopeful way and over time. “In that time of crisis, she never talked down to me, kept her promises, didn't panic, didn't give up, and she kept believing in me. I guess I essentially borrowed the hope that she had for me until I found hope for myself.” (Story# 35) My doctor has worked extensively with me. I now realize that this is what will keep me alive. To be able to feel in my heart that my doctor does care about me and truly wants to see me get better.” (Story 34). The writer in Story 150 was a nurse, an honours graduate. The 20 years following graduation included depression, hospitalizations and many suicide attempts. “One day after supper I took an entire bottle of prescription pills, then rode away on my bike. They found me late that night unconscious in a downtown park. My heart threatened to stop in the ICU.” Then later, “I finally found a person who was able to connect with me and help me climb out of the pit I was in. I asked her if anyone as sick as me could get better, and she said, “Yes”, she had seen it happen. Those were the words I had been waiting to hear! I quickly became very motivated to get better. I felt heard and like I had just found a big sister, a guide to help me figure out how to live in the world. This person was a nurse who worked as a trauma therapist.” At the time when the story was submitted, the writer was applying to a graduate program. Role of Family and Friends Several participants described being affected by their family’s response to their suicide attempt. Realizing the impact on their family and friends was, for some, a turning point. The writer in Story 20 told of experiences more than 30 years prior to the writing. She described her family of origin as “truly dysfunctional,” and she suffered from episodes of depression and hospitalization during her teen years. Following the birth of her second child, and many family difficulties, “It was at this point that I became suicidal.” She made a decision to kill herself by jumping off the balcony (6 stories). “At the very last second as I hung onto the railing of the balcony. I did not want to die but it was too late. I landed on the parking lot pavement.” She wrote that the pain was indescribable, due to many broken bones. “The physical pain can be unbearable. Then you get to see the pain and horror in the eyes of someone you love and who loves you. Many people suggested to my husband that he should leave me in the hospital, go on with life and forget about me. During the process of recovery in the hospital, my husband was with me every day…With the help of psychiatrists and a later hospitalization, I was actually diagnosed as bipolar…Since 1983, I have been taking lithium and have never had a recurrence of suicidal thoughts or for that matter any kind of depression.” The writer in Story 62 suffered childhood sexual abuse. When she came forward with it, she felt she was not heard. Self-harm on a regular basis was followed by “numerous overdoses trying to end my life.” Overdoses led to psychiatric hospitalizations that were unhelpful because she was unable to trust staff. “My way of thinking was that ending my life was the only answer. There had been numerous attempts, too many to count. My thoughts were that if I wasn’t alive I wouldn’t have to deal with my problems.” In her final attempt, she plunged over the side of a mountain, dropping 80 feet, resulting in several serious injuries. “I was so angry that I was still alive.” However, “During my hospitalization I began to realize that my family and friends were there by my side continuously, I began to realize that I wasn't only hurting myself. I was hurting all the important people in my life. It was then that I told myself I am going to do whatever it takes.” A turning point is not to say that the difficulties did not continue. The writer of Story 171 tells of a suicide attempt 7 years previous, and the ongoing anguish. She had been depressed for years and had thoughts of suicide on a daily basis. After a serious overdose, she woke up the next day in a hospital bed, her husband and 2 daughters at her bed. “Honestly, I was disappointed to wake up. But, then I saw how scared and hurt they were. Then I was sorry for what I had done to them. Since then I have thought of suicide but know that it is tragic for the family and is a hurt that can never be undone. Today I live with the thought that I am here for a reason and when it is God's time to take me then I will go. I do believe living is harder than dying. I do believe I was born for a purpose and when that is accomplished I will be released. …Until then I try to remind myself of how I am blessed and try to appreciate the wonders of the world and the people in it.” Range of Services The important role of mental health and recovery services was frequently mentioned, including dialectical behavioural therapy (DBT)/cognitive-behavioural therapy (CBT), recovery group, group therapy, Alcoholics Anonymous, accurate diagnosis, and medications. The writer in Story 30 was 83 years old when she submitted her story, reflecting on a life with both good and bad times. She first attempted suicide at age 10 or 12. A serious post-partum depression followed the birth of her second child, and over the years, she experienced periods of suicidal intent: “Consequently, a few years passed and I got to feeling suicidal again. I had pills in one pocket and a clipping for “The Recovery Group” in the other pocket. As I rode on the bus trying to make up my mind, I decided to go to the Recovery Group first. I could always take the pills later. I found the Recovery Group and yoga helpful; going to meetings sometimes twice a day until I got thinking more clearly and learned how to deal with my problems.” Several participants described the value of CBT or DBT in learning to challenge perceptions. “I have tools now to differentiate myself from the illness. I learned I'm not a bad person but bad things did happen to me and I survived.”(Story 3) “The fact is that we have thoughts that are helpful and thoughts that are destructive….. I knew it was up to me if I was to get better once and for all.” (Story 32): “In the hospital I was introduced to DBT. I saw a nurse (Tanya) every day and attended a group session twice a week, learning the techniques. I worked with the people who wanted to work with me this time. Tanya said the same thing my counselor did “there is no study that can prove whether or not suicide solves problems” and I felt as though I understood it then. If I am dead, then all the people that I kept pushing away and refusing their help would be devastated. If I killed myself with my own hand, my family would be so upset. DBT taught me how to ‘ride my emotional wave’. ……….. DBT has changed my life…….. My life is getting back in order now, thanks to DBT, and I have lots of reasons to go on living.”(Story 19) The writer of Story 67 described the importance of group therapy. “Group therapy was the most helpful for me. It gave me something besides myself to focus on. Empathy is such a powerful emotion and a pathway to love. And it was a huge relief to hear others felt the same and had developed tools of their own that I could try for myself! I think I needed to learn to communicate and recognize when I was piling everything up to build my despair. I don’t think I have found the best ways yet, but I am lifetimes away from that teenage girl.” (Story 67) The author of story 212 reflected on suicidal ideation beginning over 20 years earlier, at age 13. Her first attempt was at 28. “I thought everyone would be better off without me, especially my children, I felt like the worst mum ever, I felt like a burden to my family and I felt like I was a failure at life in general.” She had more suicide attempts, experienced the death of her father by suicide, and then finally found her doctor. “Now I’m on meds for a mood disorder and depression, my family watch me closely, and I see my doctor regularly. For the first time in 20 years, I love being a mum, a sister, a daughter, a friend, a cousin etc.” Discussion The 50 stories that describe positive experiences in the health care system constitute a larger group than most other similar studies, and most participants had made one or more suicide attempts. Several writers reflected back many years, telling stories of long ago, as with the 83-year old participant (Story 30) whose story provided the privilege of learning how the author’s life unfolded. In clinical practice, we often do not know – how did the story turn out? The stories that describe receiving health care speak to the impact of the experience, and the importance of the issues identified in the mental health system. We identified 3 themes, but it was often the combination that participants described in their stories that was powerful, as demonstrated in Story 20, the young new mother who had fallen from a balcony 30 years earlier. Voices from people with lived experience can help us plan and conceptualize our clinical work. Results are consistent with, and add to, the previous work on the importance of therapeutic relationships.8,10,11,14–16 It is from the stories in this study that we come to understand the powerful experience of seeing a family members’ reaction following a participant’s suicide attempt, and how that can be a potent turning point as identified by Lakeman and Fitzgerald.7 Ghio and colleagues8 and Lakeman16 identified the important role for staff/nurses in supporting families due to the connection to relationship issues. This research also calls for support for families to recognize the important role they have in helping the person understand how much they mean to them, and to promote the potential impact of a turning point. The importance of the range of services reflect Lakeman and Fitzgerald’s7 theme of coping, associating positive change by increasing the repertoire of coping strategies. These findings have implications for practice, research and education. Working with individuals who are suicidal can help them develop and tell a different story, help them move from a death-oriented to life-oriented position,15 from “why suicide” to “why life.”9 Hospitalization provides a person with the opportunity to reflect, to take time away from “the real world” to consider oneself, the suicide attempt, connections with family and friends and life goals, and to recover physically and emotionally. Hospitalization is also an opening to involve the family in the recovery process. The intensity of the immediate period following a suicide attempt provides a unique opportunity for nurses to support and coach families, to help both patients and family begin to see things differently and begin to create that different story. In this way, family and friends can be both a support to the person who has attempted suicide, and receive help in their own struggles with this experience. It is also important to recognize that this short period of opportunity is not specific to the nurses in psychiatric units, as the nurses caring for a person after a medically severe suicide attempt will frequently be the nurses in the ICU or Emergency departments. Education, both reflective and interactive, could have a positive impact.17 Helping staff develop the attitudes, skills and approach necessary to be helpful to a person post-suicide attempt is beginning to be reported in the literature.21 Further implications relate to nursing curriculum. Given the extent of suicidal ideation, suicide attempts and deaths by suicide, this merits an important focus. This could include specific scenarios, readings by people affected by suicide, both patients themselves and their families or survivors, and discussions with individuals who have made an attempt(s) and made a decision to go on living. All of this is, of course, not specific to nursing. All members of the interprofessional health care team can support the transition to recovery of a person after a suicide attempt using the strategies suggested in this paper, in addition to other evidence-based interventions and treatments. Findings from this study need to be considered in light of some specific limitations. First, the focus was on those who have made a decision to go on living, and we have only the information the participants included in their stories. No follow-up questions were possible. The nature of the research design meant that participants required access to a computer with Internet and the ability to communicate in English. This study does not provide a comprehensive view of in-patient care. However, it offers important inputs to enhance other aspects of care, such as assessing safety as a critical foundation to care. We consider these limitations were more than balanced by the richness of the many stories that a totally anonymous process allowed. Conclusion Stories open a window into the experiences of a person during the period after a suicide attempt. The RTGOL Project allowed for an understanding of how we might help suicidal individuals change the script, write a different story. The stories that participants shared give us some understanding of “how” to provide support at a most-needed critical juncture for people as they interact with health care providers immediately after a suicide attempt. While we cannot know the experiences of those who did not survive a suicide attempt, results of this study reinforce that just one caring professional can make a crucial difference to a person who has survived a suicide attempt. We end with where we began. Who will open the door? References 1. World Health Organization. Suicide prevention and special programmes. http://www.who.int/mental_health/prevention/suicide/suicideprevent/en/index.html Geneva: Author; 2013.2. Giner L, Jaussent I, Olie E, et al. Violent and serious suicide attempters: One step closer to suicide? J Clin Psychiatry 2014:73(3):3191–197.3. Levi-Belz Y, Gvion Y, Horesh N, et al. Mental pain, communication difficulties, and medically serious suicide attempts: A case-control study. Arch Suicide Res 2014:18:74–87.4. Hjelmeland H and Knizek BL. Why we need qualitative research in suicidology? Suicide Life Threat Behav 2010:40(1):74–80.5. Gunnell D. A population health perspective on suicide research and prevention: What we know, what we need to know, and policy priorities. Crisis 2015:36(3):155–60.6. Fitzpatrick S. Looking beyond the qualitative and quantitative divide: Narrative, ethics and representation in suicidology. Suicidol Online 2011:2:29–37.7. Lakeman R and FitzGerald M. How people live with or get over being suicidal: A review of qualitative studies. J Adv Nurs 2008:64(2):114–26.8. Ghio L, Zanelli E, Gotelli S, et al. Involving patients who attempt suicide in suicide prevention: A focus group study. J Psychiatr Ment Health Nurs 2011:18:510–18.9. Kraft TL, Jobes DA, Lineberry TW., Conrad, A., & Kung, S. Brief report: Why suicide? Perceptions of suicidal inpatients and reflections of clinical researchers. Arch Suicide Res 2010:14(4):375-382.10. Sun F, Long A, Tsao L, et al. The healing process following a suicide attempt: Context and intervening conditions. Arch Psychiatr Nurs 2014:28:66–61.11. Montross Thomas L, Palinkas L, et al. Yearning to be heard: What veterans teach us about suicide risk and effective interventions. Crisis 2014:35(3):161–67.12. Long M, Manktelow R, and Tracey A. The healing journey: Help seeking for self-injury among a community population. Qual Health Res 2015:25(7):932–44.13. Carlen P and Bengtsson A. Suicidal patients as experienced by psychiatric nurses in inpatient care. Int J Ment Health Nurs 2007:16:257–65.14. Samuelsson M, Wiklander M, Asberg M, et al. Psychiatric care as seen by the attempted suicide patient. J Adv Nurs 2000:32(3):635–43.15. Cutcliffe JR, Stevenson C, Jackson S, et al. A modified grounded theory study of how psychiatric nurses work with suicidal people. Int J Nurs Studies 2006:43(7):791–802.16. Lakeman, R. What can qualitative research tell us about helping a person who is suicidal? Nurs Times 2010:106(33):23–26.17. Karman P, Kool N, Poslawsky I, et al. Nurses’ attitudes toward self-harm: a literature review. J Psychiatr Ment Health Nurs 2015:22:65–75.18. Carter B. ‘One expertise among many’ – working appreciatively to make miracles instead of finding problems: Using appreciative inquiry as a way of reframing research. J Res Nurs 2006:11(1): 48–63.19. Lieblich A, Tuval-Mashiach R, Zilber T. Narrative research: Reading, analysis, and interpretation. Sage Publications; 1998.20. Braun V and Clarke V. Using thematic analysis in psychology. Qual Res Psychol 2006:3(2):77–101.21. Kishi Y, Otsuka K, Akiyama K, et al. Effects of a training workshop on suicide prevention among emergency room nurses. Crisis 2014:35(5):357–61.
APA, Harvard, Vancouver, ISO, and other styles
41

Ponce, Lucas M., Walter dos Santos, Wagner Meira, Dorgival Guedes, Daniele Lezzi, and Rosa M. Badia. "Upgrading a high performance computing environment for massive data processing." Journal of Internet Services and Applications 10, no. 1 (October 16, 2019). http://dx.doi.org/10.1186/s13174-019-0118-7.

Full text
Abstract:
Abstract High-performance computing (HPC) and massive data processing (Big Data) are two trends that are beginning to converge. In that process, aspects of hardware architectures, systems support and programming paradigms are being revisited from both perspectives. This paper presents our experience on this path of convergence with the proposal of a framework that addresses some of the programming issues derived from such integration. Our contribution is the development of an integrated environment that integretes (i) COMPSs, a programming framework for the development and execution of parallel applications for distributed infrastructures; (ii) Lemonade, a data mining and analysis tool; and (iii) HDFS, the most widely used distributed file system for Big Data systems. To validate our framework, we used Lemonade to create COMPSs applications that access data through HDFS, and compared them with equivalent applications built with Spark, a popular Big Data framework. The results show that the HDFS integration benefits COMPSs by simplifying data access and by rearranging data transfer, reducing execution time. The integration with Lemonade facilitates COMPSs’s use and may help its popularization in the Data Science community, by providing efficient algorithm implementations for experts from the data domain that want to develop applications with a higher level abstraction.
APA, Harvard, Vancouver, ISO, and other styles
42

Chang, Ying, and Qinghua Zhu. "Tracking algorithm of video echo signal based on big data processing." Journal of Intelligent & Fuzzy Systems, March 19, 2021, 1–9. http://dx.doi.org/10.3233/jifs-189831.

Full text
Abstract:
With the rapid development of many storage devices and other science and technology, continuous discussion on the role of video target tracking technology in the practical application of photoelectric weapons, guidance systems and security tracking systems has become the current research direction of computer vision and artificial intelligence. The purpose of this study is to explore the differences and characteristics of different algorithms, and provide theoretical and methodological support for the realization of video echo signal tracking in complex environment. For echo signal tracking algorithm only uses a single feature to track, it is particularly easy to cause tracking failure. Therefore, this study uses a method of multi feature fusion to establish the observation model. From the four aspects of gray, color, shape and texture, these four visual characteristics are very representative. In order to study the tracking accuracy, stability and real-time performance of the algorithm, pedestrian, vehicle and face are used as tracking targets to verify the tracking performance of the algorithm in different environments. Using the technical analysis of big data to find the target data file can improve the search speed of the target data and the operation speed of the tracking algorithm. The experimental results show that, in terms of accuracy, the simplest gray feature is only 0.42, and CN feature is improved by about 14% compared with the gray feature. It takes less time to find the target data file by index file method than by traversing the file name method.
APA, Harvard, Vancouver, ISO, and other styles
43

Xue, Li. "Linked Administrative Data at Statistics Canada – new data resources for horizontal research." International Journal of Population Data Science 4, no. 3 (November 8, 2019). http://dx.doi.org/10.23889/ijpds.v4i3.1209.

Full text
Abstract:
There has been an increasing demand for analytics and research related to cross-cutting and horizontal issues in Canada, such as in the domains of housing, aging and immigration. Very often policy makers and stakeholders are posing a full spectrum of questions around a specific topic, requiring multidisciplinary evidence and data. Statistics Canada has a long history of record linkage. Over the past decade, the number of record linkage projects has increased exponentially. Several established platforms have been developed to facilitate linkage – Canadian Employer and Employer Database which brings together tax and employment records from both employees and employers; the Social Data Linkage Environment created to support linkages at the individuals level across a broad spectrum of social data (health, justice, education, socio-economic); and the Linkable File Environment for business data. The breadth of our data holdings married with record linkage capabilities allows the creation of data sets that crosses disciplines and areas or research. This presentation will showcase the innovative data integration approaches that Statistics Canada has advanced to meet the inter-disciplinary data needs. Statistics Canada are pioneering in some innovative linkages across various domains to help answer cross-cutting questions. For example, Longitudinal Administrative Databank linking longitudinal tax records to numerous other data files including tax records of spouses and children in the household, longitudinal Immigration Database linkage key and health records, is used to study economic impact of hospitalization, as well as better understand health outcomes of immigrants by various dimensions including socio-economic status. Other examples include the pilot projects linking Canadian Financial Capability Survey to tax records, to gauge the relationship between financial literacy and annual retirement savings behavior and Intergenerational Income Database being linked to Census to understand socio-economic factors affecting the intergenerational mobility. Rapid growth in data availability for research also poses new challenges on IM/IT, governance, access, capacity building, etc. As Statistics Canada has moved on a path of modernization, data integration is key to the development of new data sources to fill information gaps as we move forward.
APA, Harvard, Vancouver, ISO, and other styles
44

Maldonado, Emanuel, and Agostinho Antunes. "LMAP_S: Lightweight Multigene Alignment and Phylogeny eStimation." BMC Bioinformatics 20, no. 1 (December 2019). http://dx.doi.org/10.1186/s12859-019-3292-5.

Full text
Abstract:
Abstract Background Recent advances in genome sequencing technologies and the cost drop in high-throughput sequencing continue to give rise to a deluge of data available for downstream analyses. Among others, evolutionary biologists often make use of genomic data to uncover phenotypic diversity and adaptive evolution in protein-coding genes. Therefore, multiple sequence alignments (MSA) and phylogenetic trees (PT) need to be estimated with optimal results. However, the preparation of an initial dataset of multiple sequence file(s) (MSF) and the steps involved can be challenging when considering extensive amount of data. Thus, it becomes necessary the development of a tool that removes the potential source of error and automates the time-consuming steps of a typical workflow with high-throughput and optimal MSA and PT estimations. Results We introduce LMAP_S (Lightweight Multigene Alignment and Phylogeny eStimation), a user-friendly command-line and interactive package, designed to handle an improved alignment and phylogeny estimation workflow: MSF preparation, MSA estimation, outlier detection, refinement, consensus, phylogeny estimation, comparison and editing, among which file and directory organization, execution, manipulation of information are automated, with minimal manual user intervention. LMAP_S was developed for the workstation multi-core environment and provides a unique advantage for processing multiple datasets. Our software, proved to be efficient throughout the workflow, including, the (unlimited) handling of more than 20 datasets. Conclusions We have developed a simple and versatile LMAP_S package enabling researchers to effectively estimate multiple datasets MSAs and PTs in a high-throughput fashion. LMAP_S integrates more than 25 software providing overall more than 65 algorithm choices distributed in five stages. At minimum, one FASTA file is required within a single input directory. To our knowledge, no other software combines MSA and phylogeny estimation with as many alternatives and provides means to find optimal MSAs and phylogenies. Moreover, we used a case study comparing methodologies that highlighted the usefulness of our software. LMAP_S has been developed as an open-source package, allowing its integration into more complex open-source bioinformatics pipelines. LMAP_S package is released under GPLv3 license and is freely available at https://lmap-s.sourceforge.io/.
APA, Harvard, Vancouver, ISO, and other styles
45

Saidi, Hajer, Mariem Turki, Zied Marrakchi, Hela Ben Ahmed, Abdulfattah Obeid, and Mohamed Abid. "Exploration of Word Width and Cluster Size Effects on Tree-Based Embedded FPGA Using an Automation Framework." Journal of Circuits, Systems and Computers, May 4, 2021, 2150241. http://dx.doi.org/10.1142/s0218126621502418.

Full text
Abstract:
This paper introduces a novel framework that automates and accelerates the development of embedded Field Programmable Gate Arrays (eFPGAs). The proposed solution is considered as the first environment for tree-based eFPGA implementation including software, hardware and loader. The developed framework allows users to generate eFPGA architecture in the form of hardware description language using Physical Design Flow (PDF) tool. It is a powerful tool that can produce a wide variety of designs ranging from small eFPGA to complex eFPGA. The bit file description of practical application is done in parallel, simultaneously and rapidly by the suggested Computer Aided Design (CAD) tools. The Loader, called Multi-Level Loader (MLL), is also provided to inject the bits into the corresponding SRAMs. Our framework is widely explored by modifying the data width. This research proves that data width equal to 17 has the best trade-off between performance, area and static power. However, it is penalized for buses having data length greater than 32. The experimentation demonstrates that a data width equal to 12 is the best for a 32-bit bus. Automation and significant acceleration of the eFPGA development cycle are also achieved in this study. A set of bench-marking applications with various multi-use purposes is mapped. The experimental results show the efficiency and flexibility of the proposed framework.
APA, Harvard, Vancouver, ISO, and other styles
46

Hollier, Scott, Katie M. Ellis, and Mike Kent. "User-Generated Captions: From Hackers, to the Disability Digerati, to Fansubbers." M/C Journal 20, no. 3 (June 21, 2017). http://dx.doi.org/10.5204/mcj.1259.

Full text
Abstract:
Writing in the American Annals of the Deaf in 1931, Emil S. Ladner Jr, a Deaf high school student, predicted the invention of words on screen to facilitate access to “talkies”. He anticipated:Perhaps, in time, an invention will be perfected that will enable the deaf to hear the “talkies”, or an invention which will throw the words spoken directly under the screen as well as being spoken at the same time. (Ladner, cited in Downey Closed Captioning)This invention would eventually come to pass and be known as captions. Captions as we know them today have become widely available because of a complex interaction between technological change, volunteer effort, legislative activism, as well as increasing consumer demand. This began in the late 1950s when the technology to develop captions began to emerge. Almost immediately, volunteers began captioning and distributing both film and television in the US via schools for the deaf (Downey, Constructing Closed-Captioning in the Public Interest). Then, between the 1970s and 1990s Deaf activists and their allies began to campaign aggressively for the mandated provision of captions on television, leading eventually to the passing of the Television Decoder Circuitry Act in the US in 1990 (Ellis). This act decreed that any television with a screen greater than 13 inches must be designed/manufactured to be capable of displaying captions. The Act was replicated internationally, with countries such as Australia adopting the same requirements with their Australian standards regarding television sets imported into the country. As other papers in this issue demonstrate, this market ultimately led to the introduction of broadcasting requirements.Captions are also vital to the accessibility of videos in today’s online and streaming environment—captioning is listed as the highest priority in the definitive World Wide Web Consortium (W3C) Web Content Accessibility Guideline’s (WCAG) 2.0 standard (W3C, “Web Content Accessibility Guidelines 2.0”). This recognition of the requirement for captions online is further reflected in legislation, from both the US 21st Century Communications and Video Accessibility Act (CVAA) (2010) and from the Australian Human Rights Commission (2014).Television today is therefore much more freely available to a range of different groups. In addition to broadcast channels, captions are also increasingly available through streaming platforms such as Netflix and other subscription video on demand providers, as well as through user-generated video sites like YouTube. However, a clear discrepancy exists between guidelines, legislation and the industry’s approach. Guidelines such as the W3C are often resisted by industry until compliance is legislated.Historically, captions have been both unavailable (Ellcessor; Ellis) and inadequate (Ellis and Kent), and in many instances, they still are. For example, while the provision of captions in online video is viewed as a priority across international and domestic policies and frameworks, there is a stark contrast between the policy requirements and the practical implementation of these captions. This has led to the active development of a solution as part of an ongoing tradition of user-led development; user-generated captions. However, within disability studies, research around the agency of this activity—and the media savvy users facilitating it—has gone significantly underexplored.Agency of ActivityInformation sharing has featured heavily throughout visions of the Web—from Vannevar Bush’s 1945 notion of the memex (Bush), to the hacker ethic, to Zuckerberg’s motivations for creating Facebook in his dorm room in 2004 (Vogelstein)—resulting in a wide agency of activity on the Web. Running through this development of first the Internet and then the Web as a place for a variety of agents to share information has been the hackers’ ethic that sharing information is a powerful, positive good (Raymond 234), that information should be free (Levey), and that to achieve these goals will often involve working around intended information access protocols, sometimes illegally and normally anonymously. From the hacker culture comes the digerati, the elite of the digital world, web users who stand out by their contributions, success, or status in the development of digital technology. In the context of access to information for people with disabilities, we describe those who find these workarounds—providing access to information through mainstream online platforms that are not immediately apparent—as the disability digerati.An acknowledged mainstream member of the digerati, Tim Berners-Lee, inventor of the World Wide Web, articulated a vision for the Web and its role in information sharing as inclusive of everyone:Worldwide, there are more than 750 million people with disabilities. As we move towards a highly connected world, it is critical that the Web be useable by anyone, regardless of individual capabilities and disabilities … The W3C [World Wide Web Consortium] is committed to removing accessibility barriers for all people with disabilities—including the deaf, blind, physically challenged, and cognitively or visually impaired. We plan to work aggressively with government, industry, and community leaders to establish and attain Web accessibility goals. (Berners-Lee)Berners-Lee’s utopian vision of a connected world where people freely shared information online has subsequently been embraced by many key individuals and groups. His emphasis on people with disabilities, however, is somewhat unique. While maintaining a focus on accessibility, in 2006 he shifted focus to who could actually contribute to this idea of accessibility when he suggested the idea of “community captioning” to video bloggers struggling with the notion of including captions on their videos:The video blogger posts his blog—and the web community provides the captions that help others. (Berners-Lee, cited in Outlaw)Here, Berners-Lee was addressing community captioning in the context of video blogging and user-generated content. However, the concept is equally significant for professionally created videos, and media savvy users can now also offer instructions to audiences about how to access captions and subtitles. This shift—from user-generated to user access—must be situated historically in the context of an evolving Web 2.0 and changing accessibility legislation and policy.In the initial accessibility requirements of the Web, there was little mention of captioning at all, primarily due to video being difficult to stream over a dial-up connection. This was reflected in the initial WCAG 1.0 standard (W3C, “Web Content Accessibility Guidelines 1.0”) in which there was no requirement for videos to be captioned. WCAG 2.0 went some way in addressing this, making captioning online video an essential Level A priority (W3C, “Web Content Accessibility Guidelines 2.0”). However, there were few tools that could actually be used to create captions, and little interest from emerging online video providers in making this a priority.As a result, the possibility of user-generated captions for video content began to be explored by both developers and users. One initial captioning tool that gained popularity was MAGpie, produced by the WGBH National Center for Accessible Media (NCAM) (WGBH). While cumbersome by today’s standards, the arrival of MAGpie 2.0 in 2002 provided an affordable and professional captioning tool that allowed people to create captions for their own videos. However, at that point there was little opportunity to caption videos online, so the focus was more on captioning personal video collections offline. This changed with the launch of YouTube in 2005 and its later purchase by Google (CNET), leading to an explosion of user-generated video content online. However, while the introduction of YouTube closed captioned video support in 2006 ensured that captioned video content could be created (YouTube), the ability for users to create captions, save the output into one of the appropriate captioning file formats, upload the captions, and synchronise the captions to the video remained a difficult task.Improvements to the production and availability of user-generated captions arrived firstly through the launch of YouTube’s automated captions feature in 2009 (Google). This service meant that videos could be uploaded to YouTube and, if the user requested it, Google would caption the video within approximately 24 hours using its speech recognition software. While the introduction of this service was highly beneficial in terms of making captioning videos easier and ensuring that the timing of captions was accurate, the quality of captions ranged significantly. In essence, if the captions were not reviewed and errors not addressed, the automated captions were sometimes inaccurate to the point of hilarity (New Media Rock Stars). These inaccurate YouTube captions are colloquially described as craptions. A #nomorecraptions campaign was launched to address inaccurate YouTube captioning and call on YouTube to make improvements.The ability to create professional user-generated captions across a variety of platforms, including YouTube, arrived in 2010 with the launch of Amara Universal Subtitles (Amara). The Amara subtitle portal provides users with the opportunity to caption online videos, even if they are hosted by another service such as YouTube. The captioned file can be saved after its creation and then uploaded to the relevant video source if the user has access to the location of the video content. The arrival of Amara continues to provide ongoing benefits—it contains a professional captioning editing suite specifically catering for online video, the tool is free, and it can caption videos located on other websites. Furthermore, Amara offers the additional benefit of being able to address the issues of YouTube automated captions—users can benefit from the machine-generated captions of YouTube in relation to its timing, then download the captions for editing in Amara to fix the issues, then return the captions to the original video, saving a significant amount of time when captioning large amounts of video content. In recent years Google have also endeavoured to simplify the captioning process for YouTube users by including its own captioning editors, but these tools are generally considered inferior to Amara (Media Access Australia).Similarly, several crowdsourced caption services such as Viki (https://www.viki.com/community) have emerged to facilitate the provision of captions. However, most of these crowdsourcing captioning services can’t tap into commercial products instead offering a service for people that have a video they’ve created, or one that already exists on YouTube. While Viki was highlighted as a useful platform in protests regarding Netflix’s lack of captions in 2009, commercial entertainment providers still have a responsibility to make improvements to their captioning. As we discuss in the next section, people have resorted extreme measures to hack Netflix to access the captions they need. While the ability for people to publish captions on user-generated content has improved significantly, there is still a notable lack of captions for professionally developed videos, movies, and television shows available online.User-Generated Netflix CaptionsIn recent years there has been a worldwide explosion of subscription video on demand service providers. Netflix epitomises the trend. As such, for people with disabilities, there has been significant focus on the availability of captions on these services (see Ellcessor, Ellis and Kent). Netflix, as the current leading provider of subscription video entertainment in both the US and with a large market shares in other countries, has been at the centre of these discussions. While Netflix offers a comprehensive range of captioned video on its service today, there are still videos that do not have captions, particularly in non-English regions. As a result, users have endeavoured to produce user-generated captions for personal use and to find workarounds to access these through the Netflix system. This has been achieved with some success.There are a number of ways in which captions or subtitles can be added to Netflix video content to improve its accessibility for individual users. An early guide in a 2011 blog post (Emil’s Celebrations) identified that when using the Netflix player using the Silverlight plug-in, it is possible to access a hidden menu which allows a subtitle file in the DFXP format to be uploaded to Netflix for playback. However, this does not appear to provide this file to all Netflix users, and is generally referred to as a “soft upload” just for the individual user. Another method to do this, generally credited as the “easiest” way, is to find a SRT file that already exists for the video title, edit the timing to line up with Netflix, use a third-party tool to convert it to the DFXP format, and then upload it using the hidden menu that requires a specific keyboard command to access. While this may be considered uncomplicated for some, there is still a certain amount of technical knowledge required to complete this action, and it is likely to be too complex for many users.However, constant developments in technology are assisting with making access to captions an easier process. Recently, Cosmin Vasile highlighted that the ability to add captions and subtitle tracks can still be uploaded providing that the older Silverlight plug-in is used for playback instead of the new HTML5 player. Others add that it is technically possible to access the hidden feature in an HTML5 player, but an additional Super Netflix browser plug-in is required (Sommergirl). Further, while the procedure for uploading the file remains similar to the approach discussed earlier, there are some additional tools available online such as Subflicks which can provide a simple online conversion of the more common SRT file format to the DFXP format (Subflicks). However, while the ability to use a personal caption or subtitle file remains, the most common way to watch Netflix videos with alternative caption or subtitle files is through the use of the Smartflix service (Smartflix). Unlike other ad-hoc solutions, this service provides a simplified mechanism to bring alternative caption files to Netflix. The Smartflix website states that the service “automatically downloads and displays subtitles in your language for all titles using the largest online subtitles database.”This automatic download and sharing of captions online—known as fansubbing—facilitates easy access for all. For example, blog posts suggest that technology such as this creates important access opportunities for people who are deaf and hard of hearing. Nevertheless, they can be met with suspicion by copyright holders. For example, a recent case in the Netherlands ruled fansubbers were engaging in illegal activities and were encouraging people to download pirated videos. While the fansubbers, like the hackers discussed earlier, argued they were acting in the greater good, the Dutch antipiracy association (BREIN) maintained that subtitles are mainly used by people downloading pirated media and sought to outlaw the manufacture and distribution of third party captions (Anthony). The fansubbers took the issue to court in order to seek clarity about whether copyright holders can reserve exclusive rights to create and distribute subtitles. However, in a ruling against the fansubbers, the court agreed with BREIN that fansubbing violated copyright and incited piracy. What impact this ruling will have on the practice of user-generated captioning online, particularly around popular sites such as Netflix, is hard to predict; however, for people with disabilities who were relying on fansubbing to access content, it is of significant concern that the contention that the main users of user-generated subtitles (or captions) are engaging in illegal activities was so readily accepted.ConclusionThis article has focused on user-generated captions and the types of platforms available to create these. It has shown that this desire to provide access, to set the information free, has resulted in the disability digerati finding workarounds to allow users to upload their own captions and make content accessible. Indeed, the Internet and then the Web as a place for information sharing is evident throughout this history of user-generated captioning online, from Berner-Lee’s conception of community captioning, to Emil and Vasile’s instructions to a Netflix community of captioners, to finally a group of fansubbers who took BRIEN to court and lost. Therefore, while we have conceived of the disability digerati as a conflation of the hacker and the acknowledged digital influencer, these two positions may again part ways, and the disability digerati may—like the hackers before them—be driven underground.Captioned entertainment content offers a powerful, even vital, mode of inclusion for people who are deaf or hard of hearing. Yet, despite Berners-Lee’s urging that everything online be made accessible to people with all sorts of disabilities, captions were not addressed in the first iteration of the WCAG, perhaps reflecting the limitations of the speed of the medium itself. This continues to be the case today—although it is no longer difficult to stream video online, and Netflix have reached global dominance, audiences who require captions still find themselves fighting for access. Thus, in this sense, user-generated captions remain an important—yet seemingly technologically and legislatively complicated—avenue for inclusion.ReferencesAnthony, Sebastian. “Fan-Made Subtitles for TV Shows and Movies Are Illegal, Court Rules.” Arstechnica UK (2017). 21 May 2017 <https://arstechnica.com/tech-policy/2017/04/fan-made-subtitles-for-tv-shows-and-movies-are-illegal/>.Amara. “Amara Makes Video Globally Accessible.” Amara (2010). 25 Apr. 2017. <https://amara.org/en/ 2010>.Berners-Lee, Tim. “World Wide Web Consortium (W3C) Launches International Web Accessibility Initiative.” Web Accessibility Initiative (WAI) (1997). 19 June 2010. <http://www.w3.org/Press/WAI-Launch.html>.Bush, Vannevar. “As We May Think.” The Atlantic (1945). 26 June 2010 <http://www.theatlantic.com/magazine/print/1969/12/as-we-may-think/3881/>.CNET. “YouTube Turns 10: The Video Site That Went Viral.” CNET (2015). 24 Apr. 2017 <https://www.cnet.com/news/youtube-turns-10-the-video-site-that-went-viral/>.Downey, Greg. Closed Captioning: Subtitling, Stenography, and the Digital Convergence of Text with Television. Baltimore: John Hopkins UP, 2008.———. “Constructing Closed-Captioning in the Public Interest: From Minority Media Accessibility to Mainstream Educational Technology.” Info: The Journal of Policy, Regulation and Strategy for Telecommunications, Information and Media 9.2/3 (2007): 69–82.Ellcessor, Elizabeth. “Captions On, Off on TV, Online: Accessibility and Search Engine Optimization in Online Closed Captioning.” Television & New Media 13.4 (2012): 329-352. <http://tvn.sagepub.com/content/early/2011/10/24/1527476411425251.abstract?patientinform-links=yes&legid=sptvns;51v1>.Ellis, Katie. “Television’s Transition to the Internet: Disability Accessibility and Broadband-Based TV in Australia.” Media International Australia 153 (2014): 53–63.Ellis, Katie, and Mike Kent. “Accessible Television: The New Frontier in Disability Media Studies Brings Together Industry Innovation, Government Legislation and Online Activism.” First Monday 20 (2015). <http://firstmonday.org/ojs/index.php/fm/article/view/6170>.Emil’s Celebrations. “How to Add Subtitles to Movies Streamed in Netflix.” 16 Oct. 2011. 9 Apr. 2017 <https://emladenov.wordpress.com/2011/10/16/how-to-add-subtitles-to-movies-streamed-in-netflix/>.Google. “Automatic Captions in Youtube.” 2009. 24 Apr. 2017 <https://googleblog.blogspot.com.au/2009/11/automatic-captions-in-youtube.html>.Jaeger, Paul. “Disability and the Internet: Confronting a Digital Divide.” Disability in Society. Ed. Ronald Berger. Boulder, London: Lynne Rienner Publishers, 2012.Levey, Steven. Hackers: Heroes of the Computer Revolution. North Sebastopol: O’Teilly Media, 1984.Media Access Australia. “How to Caption a Youtube Video.” 2017. 25 Apr. 2017 <https://mediaaccess.org.au/web/how-to-caption-a-youtube-video>.New Media Rock Stars. “Youtube’s 5 Worst Hilariously Catastrophic Auto Caption Fails.” 2013. 25 Apr. 2017 <http://newmediarockstars.com/2013/05/youtubes-5-worst-hilariously-catastrophic-auto-caption-fails/>.Outlaw. “Berners-Lee Applies Web 2.0 to Improve Accessibility.” Outlaw News (2006). 25 June 2010 <http://www.out-law.com/page-6946>.Raymond, Eric S. The New Hacker’s Dictionary. 3rd ed. Cambridge: MIT P, 1996.Smartflix. “Smartflix: Supercharge Your Netflix.” 2017. 9 Apr. 2017 <https://www.smartflix.io/>.Sommergirl. “[All] Adding Subtitles in a Different Language?” 2016. 9 Apr. 2017 <https://www.reddit.com/r/netflix/comments/32l8ob/all_adding_subtitles_in_a_different_language/>.Subflicks. “Subflicks V2.0.0.” 2017. 9 Apr. 2017 <http://subflicks.com/>.Vasile, Cosmin. “Netflix Has Just Informed Us That Its Movie Streaming Service Is Now Available in Just About Every Country That Matters Financially, Aside from China, of Course.” 2016. 9 Apr. 2017 <http://news.softpedia.com/news/how-to-add-custom-subtitles-to-netflix-498579.shtml>.Vogelstein, Fred. “The Wired Interview: Facebook’s Mark Zuckerberg.” Wired Magazine (2009). 20 Jun. 2010 <http://www.wired.com/epicenter/2009/06/mark-zuckerberg-speaks/>.W3C. “Web Content Accessibility Guidelines 1.0.” W3C Recommendation (1999). 25 Jun. 2010 <http://www.w3.org/TR/WCAG10/>.———. “Web Content Accessibility Guidelines (WCAG) 2.0.” 11 Dec. 2008. 21 Aug. 2013 <http://www.w3.org/TR/WCAG20/>.WGBH. “Magpie 2.0—Free, Do-It-Yourself Access Authoring Tool for Digital Multimedia Released by WGBH.” 2002. 25 Apr. 2017 <http://ncam.wgbh.org/about/news/pr_05072002>.YouTube. “Finally, Caption Video Playback.” 2006. 24 Apr. 2017 <http://googlevideo.blogspot.com.au/2006/09/finally-caption-playback.html>.
APA, Harvard, Vancouver, ISO, and other styles
47

Bradley, Dale A. "Scenes of Transmission: Youth Culture, MP3 File Sharing, and Transferable Strategies of Cultural Practice." M/C Journal 9, no. 1 (March 1, 2006). http://dx.doi.org/10.5204/mcj.2585.

Full text
Abstract:
The significance of computer mediated communication in relation to the transmission and circulation of discourse is not restricted to the ways in which this relatively recent form of communication enables self-identifying and relatively homogeneous groups to articulate, diffuse and circulate meaning. While the Internet has certainly provided a vital medium for such activities, there is another aspect of transmission that is also significant: the transmission of codes and practices between previously unrelated cultural formations through processes of convergence that occur via their engagement in online media. Of interest here are the ways in which the codes and practices constituting various cultural formations may find their way into other such formations through online practices. Online venues which facilitate the formation of virtual communities act as scenes for the interweaving of participants’ varied interests and, in so doing, bring disparate cultural practices together in new and potentially transformative manners. Viewed from this perspective, online communication not only provides a platform for discursive acts, but constitutes a venue wherein the practical usage of the medium offers up new, and transferable, tactics of communication and cultural practice. One of the most obvious examples of this phenomenon of “convergent transmission” is the now famous case of Napster. Beyond the well-discussed implications for, and ongoing adaptive transformation of, the music industry lies a peculiar moment of convergence wherein Internet Relay Chat (IRC) groups provided a scene for the transmission of cultural codes, values, and practices between a hacking subculture built around online communication and a broader youth culture that was beginning to embrace digital media as a means to enjoy music. The lines of transmission between these two groups were therefore borne by practices related to music, gift economies, computer networking and digital media. The community constituted by the early Napster (as well as other music sharing sites and networks) and the IRC-based discussions that informed their development were more than simply the sum of peer-to-peer (P2P) networks and online communication. I would argue that when taken together, Napster and IRC constituted an online scene for the sharing and dissemination of the hacking subculture’s beliefs and practices through the filter of “music-obsessed” youth culture. To understand Napster as a scene is to define it in relation to practices related to both popular and alternative modes for the production and consumption of cultural artifacts. Lee and Peterson (192-194) note that online scenes exhibit many similarities with the geographically-based scenes analyzed by Hebdige: a fair degree of demographic cohesiveness (typically defined such things as age, ethnicity, gender, sexuality, and class), shared cultural codes and worldviews, and a spectrum of participation ranging from the frequent and enduring relationships of a core constituency to the occasional participation of more peripheral members. As a combined P2P/IRC network, Napster is a means to circulate content rather than being, itself, some form content. Napster’s online circulation of cultural artefacts within and among various communities thus makes it a point of articulation between hacking subcultures and a broader youth culture. This articulation involves both the circulation of music files among participants, and the circulation of knowledge related to the technical modalities for engaging in file sharing. With regard to Napster, and perhaps subcultures in general, it is the formation of participatory communities rather than any particular cultural artefact that is paramount: the possibilities that the Internet offers young people for cultural participation now extend far beyond the types of symbolic transformation of products and resources … . Rather, such products and resources can themselves become both the object and product of collective creativity (Bennett 172). Shawn Fanning’s testimony to the judiciary committee investigating Napster notes at the outset that his reason for undertaking the development of the P2P network that would eventually become Napster was not driven by any intentional form of hacking, but was prompted by a friend’s simple desire to solve reliability issues associated with transmitting digital music files via the Internet: The Napster system that I designed combined a real time system for finding MP3s with chat rooms and instant messaging (functionally similar to IRC). The Chat rooms and instant messaging are integral to creating the community experience; I imagined that they would be used similarly to how people use IRC – as a means for people to learn from each other and develop ongoing relationships (Fanning). The notion of community is not only applicable to those who chose to share music over Napster, but to the development of Napster itself. As Andrews notes, Fanning participated in a number of IRC channels devoted to programming (primarily #winprog for the development of Napster) as well as to channels like #mpeg3 which discussed social and technical issues related to MP3s as well as advice on where and how to get them. Spitz and Hunter focus on the role of community in the development of Napster and point out that: the technology emerged gradually from interactions between and within social groups with different degrees of inclusion in multiple overlapping frames, as opposed to there being a single theoretical breakthrough. ... Based on their involvement in other spaces, such as online communities, Fanning and company’s immediate goals were much more personal and utilitarian—to provide a tool to help themselves and other enthusiasts find and access music on the Internet (171-172). Developed with the aid of numerous long-time and occasional participants to both #winprog and #mpeg3, Napster’s technical component was the product of (at least) two scenes constituted via IRC-based online communities. The first, #winprog, consisted of a subculture of “hardcore” Windows programmers (and hackers) freely sharing ideas, advice, expertise, and computer code in an environment of mutual assistance. While the participants on #mpeg3 represented a much wider community, #mpeg3 also demonstrates the qualities of a scene inasmuch as it constituted a virtual community based not only on shared interests in a variety of musical genres, but of sharing media content in the form of MP3s and related software. One obvious commonality among these two scenes is that they both rely upon informal gift economies as a means by which to transmit cultural codes via the circulation of material objects. With Napster, the gift economy that emerges in relation to he “hacker ethic” of sharing both code and expertise (Levy; Himanen; Wark) here combines with the more generalized and abstract gift economies constituted by the tendency within youth culture to engage in the sharing of media products related to particular lifestyles and subcultures. The development of Napster therefore provided a mechanism by which these two gift economies could come together to form a single overlapping scene combining computing and youth cultures. It should be noted, however, that while Napster was (and still is) typically branded as a youth-based phenomenon, its constituency actually encompassed a broader age demographic wherein membership tended to correlate more closely with “online tenure” than age (Spitz & Hunter 173). Nonetheless, the simultaneously rancorous and laudatory discourse surrounding Napster framed it as a phenomenon indicating the emergence of an IT-savvy youth culture. What occurred with Napster was therefore a situation wherein two scenes came together—one based on hacking, the other on MP3s. Their shared propensity toward informal gift economies allowed them to converge upon notions of P2P networking and IRC-based communities, and this produced a new set of cultural practices centred upon the fusion of file transfers and popular music. The activity of music sharing and the creation of networks to carry it out have, needless to say, proved to have a transformative effect on the circulation of these cultural products. The co-mingling of cultural practices between these two online scenes seems so obvious today that it often seems that it was inevitable. It must be remembered, however, that hacking and music did not seem to be so closely related in 1998. The development of Napster is thus a testament of sorts to the potential for computer mediated communication to effect convergent transformations via the transmission of tactical and communal practices among seemingly unrelated arenas of culture. References Andrews, Robert. “Chat Room That Built the World”. Wired News. Nov. 6, 2005. http://www.wired.com/news/technology/1,69394-0.html>. Bennett, Andy. “Virtual Subculture? Youth, Identity and the Internet”. After Subculture: Critical Studies in Contemporary Youth Culture. Eds. Andy Bennett & Keith Kahn-Harris. London: Palgrave Macmillan, 2004. Fanning, Shawn. Testimony before the Senate Judiciary Committee in Provo, Utah. Oct. 9, 2000. http://judiciary.senate.gov/oldsite/1092000_sf.htm>. Hebdige, Dick. Subculture: The Meaning of Style. London: Routledge, 1991. Himanen, Pekka. The Hacker Ethic. New York: Random House Books, 2001. Lee, Steve S., & Richard A. Peterson. “Internet-Based Virtual Music Scenes: The Case of P2 in Alt.Country Music.” Music Scenes: Local, Transnational, and Virtual. Eds. Andy Bennett & Richard A. Peterson. Nashville: Vanderbilt UP, 2004. Levy, Steven. Hackers. New York: Penguin Books, 1984. Spitz, David & Starling D. Hunter. “Contested Codes: The Social Construction of Napster”. The Information Society 21 (2005): 169-80. Wark, McKenzie. A Hacker Manifesto. Cambridge: Harvard UP, 2004. Citation reference for this article MLA Style Bradley, Dale A. "Scenes of Transmission: Youth Culture, MP3 File Sharing, and Transferable Strategies of Cultural Practice." M/C Journal 9.1 (2006). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0603/05-bradley.php>. APA Style Bradley, D. (Mar. 2006) "Scenes of Transmission: Youth Culture, MP3 File Sharing, and Transferable Strategies of Cultural Practice," M/C Journal, 9(1). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0603/05-bradley.php>.
APA, Harvard, Vancouver, ISO, and other styles
48

Bramorska, Beata. "Open Forest Data: Digitalizing and building an online repository." Biodiversity Information Science and Standards 5 (September 27, 2021). http://dx.doi.org/10.3897/biss.5.75783.

Full text
Abstract:
Poland is characterised by a relatively high variety of living organisms attributed to terrestrial and water environments. Currently, close to 57.000 species of living organisms are described that occur in Poland (Symonides 2008), including lowland and mountain species, those attributed to oceanic and continental areas, as well as species from forested and open habitats. Poland comprehensively represents biodiversity of living organisms on a continental scale and thus, is considered to have an important role for biodiversity maintenance. The Mammal Research Institute of Polish Academy of Sciences (MRI PAS), located in Białowieża Forest, a UNESCO Heritage Site, has been collecting biodiversity data for 90 years. However, a great amount of data gathered over the years, especially old data, is gradually being forgotten and hard to access. Old catalogues and databases have never been digitalized or publicly shared, and not many Polish scientists are aware of the existence of such resources, not to mention the rest of the scientific world. Recognizing the need for an online, interoperable platform, following FAIR data principles (findable, accessible, interoperable, reusable), where biodiversity and scientific data can be shared, MRI PAS took a lead in creation of an Open Forest Data (OFD) repository. OpenForestData.pl (Fig. 1) is a newly created (2020) digital repository, designed to provide access to natural sciences data and provide scientists with an infrastructure for storing, sharing and archiving their research outcomes. Creating such a platform is a part of an ongoing development of life sciences in Poland, aiming for an open, modern science, where data are published as free-access. OFD also allows for the consolidation of natural science data, enabling the use and processing of shared data, including API (Application Programming Interface) tools. OFD is indexed by the Directory of Open Repositories (OpenDOAR) and Registry of Research Data Repositories (re3data). The OFD platform is based entirely on reliable, globally recognized open source software: DATAVERSE, an interactive database app which supports sharing, storing, exploration, citation and analysis of scientific data; GEONODE, a content management geospatial system used for storing, publicly sharing and visualising vector and raster layers, GRAFANA, a system meant for storing and analysis of metrics and large scale measurement data, as well as visualisation of historical graphs at any time range and analysis for trends; and external tools for database storage (Orthanc) and data visualisation (Orthanc plugin Osimis Web Viewer and Online 3D Viewer (https://3dviewer.net/), which were integrated with the system mechanism of Dataverse. Furthermore, according to the need for specimen description, Darwin Core (Wieczorek et al. 2012) metadata schema was decided to be the most suitable for specimen and collections description and mapped into a Dataverse additional metadata block. The use of Darwin Core is based on the same file format, the Darwin Core Archive (DwC-A) which allows for sharing data using common terminology and provides the possibility for easy evaluation and comparison of biodiversity datasets. It allows the contributors to OFD to optionally choose Darwin Core for object descriptions making it possible to share biodiversity datasets in a standardized way for users to download, analyse and compare. Currently, OFD stores more than 10.000 datasets and objects from the collections of Mammal Research Institute of Polish Academy of Sciences and Forest Science Institute of Białystok University of Technology. The objects from natural collections were digitalized, described, catalogued and made public in free-access. OFD manages seven types of collection materials: 3D and 2D scans of specimen in Herbarium, Fungarium, Insect and Mammal Collections, images from microscopes (including stereoscopic and scanning electron microscopes), morphometric measurements, computed tomography and microtomography scans in Mammal Collection, mammal telemetry data, satellite imagery, geospatial climatic and environmental data, georeferenced historical maps. 3D and 2D scans of specimen in Herbarium, Fungarium, Insect and Mammal Collections, images from microscopes (including stereoscopic and scanning electron microscopes), morphometric measurements, computed tomography and microtomography scans in Mammal Collection, mammal telemetry data, satellite imagery, geospatial climatic and environmental data, georeferenced historical maps. In the OFD repository, researchers have the possibility to share data in standardized way, which nowadays is often a requirement during the publishing process of a scientific article. Beside scientists, OFD is designed to be open and free for students and specialists in nature protection, but also for officials, foresters and nature enthusiasts. Creation of the OFD repository supports the development of citizen science in Poland, increases visibility and access to published data, improves scientific collaboration, exchange and reuse of data within and across borders.
APA, Harvard, Vancouver, ISO, and other styles
49

Chesher, Chris. "Mining Robotics and Media Change." M/C Journal 16, no. 2 (March 8, 2013). http://dx.doi.org/10.5204/mcj.626.

Full text
Abstract:
Introduction Almost all industries in Australia today have adopted digital media in some way. However, uses in large scale activities such as mining may seem to be different from others. This article looks at mining practices with a media studies approach, and concludes that, just as many other industries, mining and media have converged. Many Australian mine sites are adopting new media for communication and control to manage communication, explore for ore bodies, simulate forces, automate drilling, keep records, and make transport and command robotic. Beyond sharing similar digital devices for communication and computation, new media in mining employ characteristic digital media operations, such as numerical operation, automation and managed variability. This article examines the implications of finding that some of the most material practices have become mediated by new media. Mining has become increasingly mediated through new media technologies similar to GPS, visualisation, game remote operation, similar to those adopted in consumer home and mobile digital media. The growing and diversified adoption of digital media championed by companies like Rio Tinto aims not only ‘improve’ mining, but to change it. Through remediating practices of digital mining, new media have become integral powerful tools in prospective, real time and analytical environments. This paper draws on two well-known case studies of mines in the Pilbara and Western NSW. These have been documented in press releases and media reports as representing changes in media and mining. First, the West Angelas mines in the Pilbara is an open cut iron ore mine introducing automation and remote operation. This mine is located in the remote Pilbara, and is notable for being operated remotely from a control centre 2000km away, near Perth Airport, WA. A growing fleet of Komatsu 930E haul trucks, which can drive autonomously, traverses the site. Fitted with radars, lasers and GPS, these enormous vehicles navigate through the open pit mine with no direct human control. Introducing these innovations to mine sites become more viable after iron ore mining became increasingly profitable in the mid-2000s. A boom in steel building in China drove unprecedented demand. This growing income coincided with a change in public rhetoric from companies like Rio Tinto. They pointed towards substantial investments in research, infrastructure, and accelerated introduction of new media technologies into mining practices. Rio Tinto trademarked the term ‘Mine of the future’ (US Federal News Service 1), and publicised their ambitious project for renewal of mining practice, including digital media. More recently, prices have been more volatile. The second case study site is a copper and gold underground mine at Northparkes in Western NSW. Northparkes uses substantial sensing and control, as well as hybrid autonomous and remote operated vehicles. The use of digital media begins with prospecting, and through to logistics of transportation. Engineers place explosives in optimal positions using computer modelling of the underground rock formations. They make heavy use of software to coordinate layer-by-layer use of explosives in this advanced ‘box cut’ mine. After explosives disrupt the rock layer a kilometre underground, another specialised vehicle collects and carries the ore to the surface. The Sandvik loader-hauler-dumper (LHD) can be driven conventionally by a driver, but it can also travel autonomously in and out of the mine without a direct operator. Once it reaches a collection point, where the broken up ore has accumulated, a user of the surface can change the media mode to telepresence. The human operator then takes control using something like a games controller and multiple screens. The remote operator controls the LHD to fill the scoop with ore. The fully-loaded LHD backs up, and returns autonomously using laser senses to follow a trail to the next drop off point. The LHD has become a powerful mediator, reconfiguring technical, material and social practices throughout the mine. The Meanings of Mining and Media Are Converging Until recently, mining and media typically operated ontologically separately. The media, such as newspapers and television, often tell stories about mining, following regular narrative scripts. There are controversies and conflicts, narratives of ecological crises, and the economics of national benefit. There are heroic and tragic stories such as the Beaconsfield mine collapse (Clark). There are new industry policies (Middelbeek), which are politically fraught because of the lobbying power of miners. Almost completely separately, workers in mines were consumers of media, from news to entertainment. These media practices, while important in their own right, tell nothing of the approaching changes in many other sectors of work and everyday life. It is somewhat unusual for a media studies scholar to study mine sites. Mine sites are most commonly studied by Engineering (Bellamy & Pravica), Business and labour and cultural histories (McDonald, Mayes & Pini). Until recently, media scholarship on mining has related to media institutions, such as newspapers, broadcasters and websites, and their audiences. As digital media have proliferated, the phenomena that can be considered as media phenomena has changed. This article, pointing to the growing roles of media technologies, observes the growing importance that media, in these terms, have in the rapidly changing domain of mining. Another meaning for ‘media’ studies, from cybernetics, is that a medium is any technology that translates perception, makes interpretations, and performs expressions. This meaning is more abstract, operating with a broader definition of media — not only those institutionalised as newspapers or radio stations. It is well known that computer-based media have become ubiquitous in culture. This is true in particular within the mining company’s higher ranks. Rio Tinto’s ambitious 2010 ‘Mine of the Future’ (Fisher & Schnittger, 2) program was premised on an awareness that engineers, middle managers and senior staff were already highly computer literate. It is worth remembering that such competency was relatively uncommon until the late 1980s. The meanings of digital media have been shifting for many years, as computers become experienced more as everyday personal artefacts, and less as remote information systems. Their value has always been held with some ambivalence. Zuboff’s (387-414) picture of loss, intimidation and resistance to new information technologies in the 1980s seems to have dissipated by 2011. More than simply being accepted begrudgingly, the PC platform (and variants) has become a ubiquitous platform, a lingua franca for information workers. It became an intimate companion for many professions, and in many homes. It was an inexpensive, versatile and generalised convergent medium for communication and control. And yet, writers such as Gregg observe, the flexibility of networked digital work imposes upon many workers ‘unlimited work’. The office boundaries of the office wall break down, for better or worse. Emails, utility and other work-related behaviours increasingly encroach onto domestic and public space and time. Its very attractiveness to users has tied them to these artefacts. The trail that leads the media studies discipline down the digital mine shaft has been cleared by recent work in media archaeology (Parikka), platform studies (Middelbeek; Montfort & Bogost; Maher) and new media (Manovich). Each of these redefined Media Studies practices addresses the need to diversify the field’s attention and methods. It must look at more specific, less conventional and more complex media formations. Mobile media and games (both computer-based) have turned out to be quite different from traditional media (Hjorth; Goggin). Kirschenbaum’s literary study of hard drives and digital fiction moves from materiality to aesthetics. In my study of digital mining, I present a reconfigured media studies, after the authors, that reveals heterogeneous media configurations, deserving new attention to materiality. This article also draws from the actor network theory approach and terminology (Latour). The uses of media / control / communications in the mining industry are very complex, and remain under constant development. Media such as robotics, computer modelling, remote operation and so on are bound together into complex practices. Each mine site is different — geologically, politically, and economically. Mines are subject to local and remote disasters. Mine tunnels and global prices can collapse, rendering active sites uneconomical overnight. Many technologies are still under development — including Northparkes and West Angelas. Both these sites are notable for their significant use of autonomous vehicles and remote operated vehicles. There is no doubt that the digital technologies modulate all manner of the mining processes: from rocks and mechanical devices to human actors. Each of these actors present different forms of collusion and opposition. Within a mining operation, the budgets for computerised and even robotic systems are relatively modest for their expected return. Deep in a mine, we can still see media convergence at work. Convergence refers to processes whereby previously diverse practices in media have taken on similar devices and techniques. While high-end PCs in mining, running simulators; control data systems; visualisation; telepresence, and so on may be high performance, ruggedised devices, they still share a common platform to the desktop PC. Conceptual resources developed in Media Ecology, New Media Studies, and the Digital Humanities can now inform readings of mining practices, even if their applications differ dramatically in size, reliability and cost. It is not entirely surprising that some observations by new media theorists about entertainment and media applications can also relate to features of mining technologies. Manovich argues that numerical representation is a distinctive feature of new media. Numbers have always already been key to mining engineering. However, computers visualise numerical fields in simulations that extend out of the minds of the calculators, and into visual and even haptic spaces. Specialists in geology, explosives, mechanical apparatuses, and so on, can use plaftorms that are common to everyday media. As the significance of numbers is extended by computers in the field, more and more diverse sources of data provide apparently consistent and seamless images of multiple fields of knowledge. Another feature that Manovich identifies in new media is the capacity for automation of media operations. Automation of many processes in mechanical domains clearly occurred long before industrial technologies were ported into new media. The difference with new media in mine sites is that robotic systems must vary their performance according to feedback from their extra-system environments. For our purposes, the haul trucks in WA are software-controlled devices that already qualify as robots. They sense, interpret and act in the world based on their surroundings. They evaluate multiple factors, including the sensors, GPS signals, operator instructions and so on. They can repeat the path, by sensing the differences, day after day, even if the weather changes, the track wears away or the instructions from base change. Automation compensates for differences within complex and changing environments. Automation of an open-pit mine haulage system… provides more consistent and efficient operation of mining equipment, it removes workers from potential danger, it reduces fuel consumption significantly reducing greenhouse gas (GHG) emissions, and it can help optimize vehicle repairs and equipment replacement because of more-predictable and better-controlled maintenance. (Parreire and Meech 1-13) Material components in physical mines tend to become modular and variable, as their physical shape lines up with the logic of another of Manovich’s new media themes, variability. Automatic systems also make obsolete human drivers, who previously handled those environmental variations, for better or for worse, through the dangerous, dull and dirty spaces of the mine. Drivers’ capacity to control repeat trips is no longer needed. The Komatsu driverless truck, introduced to the WA iron ore mines from 2008, proved itself to be almost as quick as human drivers at many tasks. But the driverless trucks have deeper advantages: they can run 23 hours each day with no shift breaks; they drive more cautiously and wear the equipment less than human drivers. There is no need to put up workers and their families up in town. The benefit most often mentioned is safety: even the worst accident won’t produce injuries to drivers. The other advantage less mentioned is that autonomous trucks don’t strike. Meanwhile, managers of human labour also need to adopt certain strategies of modulation to support the needs and expectations of their workers. Mobile phones, televisions and radio are popular modes of connecting workers to their loved ones, particularly in the remote and harsh West Angelas site. One solution — regular fly-in-fly out shifts — tends also to be alienating for workers and locals (Cheshire; Storey; Tonts). As with any operations, the cost of maintaining a safe and comfortable environment for workers requires trade-offs. Companies face risks from mobile phones, leaking computer networks, and espionage that expose the site to security risks. Because of such risks, miners tend be subject to disciplinary regimes. It is common to test alcohol and drug levels. There was some resistance from workers, who refused to change to saliva testing from urine testing (Latimer). Contesting these machines places the medium, in a different sense, at the centre of regulation of the workers’ bodies. In Northparkes, the solution of hybrid autonomous and remote operation is also a solution for modulating labour. It is safer and more comfortable, while also being more efficient, as one experienced driver can control three trucks at a time. This more complex mode of mediation is necessary because underground mines are more complex in geology, and working environments to suit full autonomy. These variations provide different relationships between operators and machines. The operator uses a games controller, and watches four video views from the cabin to make the vehicle fill the bucket with ore (Northparkes Mines, 9). Again, media have become a pivotal element in the mining assemblage. This combines the safety and comfort of autonomous operation (helping to retain staff) with the required use of human sensorimotor dexterity. Mine systems deserve attention from media studies because sites are combining large scale physical complexity with increasingly sophisticated computing. The conventional pictures of mining and media rarely address the specificity of subjective and artefactual encounters in and around mine sites. Any research on mining communication is typically within the instrumental frames of engineering (Duff et al.). Some of the developments in mechanical systems have contributed to efficiency and safety of many mines: larger trucks, more rock crushers, and so on. However, the single most powerful influence on mining has been adopting digital media to control, integrate and mining systems. Rio Tinto’s transformative agenda document is outlined in its high profile ‘Mine of the Future’ agenda (US Federal News Service). The media to which I refer are not only those in popular culture, but also those with digital control and communications systems used internally within mines and supply chains. The global mining industry began adopting digital communication automation (somewhat) systematically only in the 1980s. Mining companies hesitated to adopt digital media because the fundamentals of mining are so risky and bound to standard procedures. Large scale material operations, extracting and processing minerals from under the ground: hardly to be an appropriate space for delicate digital electronics. Mining is also exposed to volatile economic conditions, so investing in anything major can be unattractive. High technology perhaps contradicts an industry ethos of risk-taking and masculinity. Digital media became domesticated, and familiar to a new generation of formally educated engineers for whom databases and algorithms (Manovich) were second nature. Digital systems become simultaneously controllers of objects, and mediators of meanings and relationships. They control movements, and express communications. Computers slide from using meanings to invoking direct actions over objects in the world. Even on an everyday scale, computer operations often control physical processes. Anti-lock Braking Systems regulate a vehicle’s braking pressure to avoid the danger when wheels lock-up. Or another example, is the ATM, which involves both symbolic interactions, and also exchange of physical objects. These operations are examples of the ‘asignifying semiotic’ (Guattari), in which meanings and non-meanings interact. There is no operation essential distinction between media- and non-media digital operations. Which are symbolic, attached or non-consequential is not clear. This trend towards using computation for both meanings and actions has accelerated since 2000. Mines of the Future Beyond a relatively standard set of office and communications software, many fields, including mining, have adopted specialised packages for their domains. In 3D design, it is AutoCAD. In hard sciences, it is custom modelling. In audiovisual production, it may be Apple and Adobe products. Some platforms define their subjectivity, professional identity and practices around these platforms. This platform orientation is apparent in areas of mining, so that applications such as the Gemcom, Rockware, Geological Database and Resource Estimation Modelling from Micromine; geology/mine design software from Runge, Minemap; and mine production data management software from Corvus. However, software is only a small proportion of overall costs in the industry. Agents in mining demand solutions to peculiar problems and requirements. They are bound by their enormous scale; physical risks of environments, explosive and moving elements; need to negotiate constant change, as mining literally takes the ground from under itself; the need to incorporate geological patterns; and the importance of logistics. When digital media are the solution, there can be what is perceived as rapid gains, including greater capacities for surveillance and control. Digital media do not provide more force. Instead, they modulate the direction, speed and timing of activities. It is not a complete solution, because too many uncontrolled elements are at play. Instead, there are moment and situations when the degree of control refigures the work that can be done. Conclusions In this article I have proposed a new conception of media change, by reading digital innovations in mining practices themselves as media changes. This involved developing an initial reading of the operations of mining as digital media. With this approach, the array of media components extends far beyond the conventional ‘mass media’ of newspapers and television. It offers a more molecular media environment which is increasingly heterogeneous. It sometimes involves materiality on a huge scale, and is sometimes apparently virtual. The mining media event can be a semiotic, a signal, a material entity and so on. It can be a command to a human. It can be a measurement of location, a rock formation, a pressure or an explosion. The mining media event, as discussed above, is subject to Manovich’s principles of media, being numerical, variable and automated. In the mining media event, these principles move from the aesthetic to the instrumental and physical domains of the mine site. The role of new media operates at many levels — from the bottom of the mine site to the cruising altitude of the fly-in-fly out aeroplanes — has motivated significant changes in the Australian industry. When digital media and robotics come into play, they do not so much introduce change, but reintroduce similarity. This inversion of media is less about meaning, and more about local mastery. Media modulation extends the kinds of influence that can be exerted by the actors in control. In these situations, the degrees of control, and of resistance, are yet to be seen. Acknowledgments Thanks to Mining IQ for a researcher's pass at Mining Automation and Communication Conference, Perth in August 2012. References Bellamy, D., and L. Pravica. “Assessing the Impact of Driverless Haul Trucks in Australian Surface Mining.” Resources Policy 2011. Cheshire, L. “A Corporate Responsibility? The Constitution of Fly-In, Fly-Out Mining Companies as Governance Partners in Remote, Mine-Affected Localities.” Journal of Rural Studies 26.1 (2010): 12–20. Clark, N. “Todd and Brant Show PM Beaconsfield's Cage of Hell.” The Mercury, 6 Nov. 2008. Duff, E., C. Caris, A. Bonchis, K. Taylor, C. Gunn, and M. Adcock. “The Development of a Telerobotic Rock Breaker.” CSIRO 2009: 1–10. Fisher, B.S. and S. Schnittger. Autonomous and Remote Operation Technologies in the Mining Industry: Benefits and Costs. BAE Report 12.1 (2012). Goggin, G. Global Mobile Media. London: Routledge, 2010. Gregg, M. Work’s Intimacy. Cambridge: Polity, 2011. Guattari, F. Chaosmosis: An Ethico-Aesthetic Paradigm. Trans. Paul Bains and Julian Pefanis. Bloomington: Indiana UP, 1992. Hjorth, L. Mobile Media in the Asia-Pacific: Gender and the Art of Being Mobile. Taylor & Francis, 2008. Kirschenbaum, M.G. Mechanisms: New Media and the Forensic Imagination. Campridge, Mass.: MIT Press, 2008. Latimer, Cole. “Fair Work Appeal May Change Drug Testing on Site.” Mining Australia 2012. 3 May 2013 ‹http://www.miningaustralia.com.au/news/fair-work-appeal-may-change-drug-testing-on-site›. Latour, B. Reassembling the Social: An Introduction to Actor-Network-Theory. Oxford: Oxford University Press, 2007. Maher, J. The Future Was Here: The Commodore Amiga. Cambridge, Mass.: MIT Press, 2012. Manovich, Lev. The Language of New Media. Cambridge, Mass.: MIT Press, 2001. McDonald, P., R. Mayes, and B. Pini. “Mining Work, Family and Community: A Spatially-Oriented Approach to the Impact of the Ravensthorpe Nickel Mine Closure in Remote Australia.” Journal of Industrial Relations 2012. Middelbeek, E. “Australia Mining Tax Set to Slam Iron Ore Profits.” Metal Bulletin Weekly 2012. Montfort, N., and I. Bogost. Racing the Beam: The Atari Video Computer System. Cambridge, Mass.: MIT Press, 2009. Parikka, J. What Is Media Archaeology? London: Polity Press, 2012. Parreira, J., and J. Meech. “Autonomous vs Manual Haulage Trucks — How Mine Simulation Contributes to Future Haulage System Developments.” Paper presented at the CIM Meeting, Vancouver, 2010. 3 May 2013 ‹http://www.infomine.com/library/publications/docs/parreira2010.pdf›. Storey, K. “Fly-In/Fly-Out and Fly-Over: Mining and Regional Development in Western Australia.” Australian Geographer 32.2 (2010): 133–148. Storey, K. “Fly-In/Fly-Out: Implications for Community Sustainability.” Sustainability 2.5 (2010): 1161–1181. 3 May 2013 ‹http://www.mdpi.com/2071-1050/2/5/1161›. Takayama, L., W. Ju, and C. Nas. “Beyond Dirty, Dangerous and Dull: What Everyday People Think Robots Should Do.” Paper presented at HRI '08, Amsterdam, 2008. 3 May 2013 ‹http://www-cdr.stanford.edu/~wendyju/publications/hri114-takayama.pdf›. Tonts, M. “Labour Market Dynamics in Resource Dependent Regions: An Examination of the Western Australian Goldfields.” Geographical Research 48.2 (2010): 148-165. 3 May 2013 ‹http://onlinelibrary.wiley.com/doi/10.1111/j.1745-5871.2009.00624.x/abstract›. US Federal News Service, Including US State News. “USPTO Issues Trademark: Mine of the Future.” 31 Aug. 2011. Wu, S., H. Han, X. Liu, H. Wang, F. Xue. “Highly Effective Use of Australian Pilbara Blend Lump Ore in a Blast Furnace.” Revue de Métallurgie 107.5 (2010): 187-193. doi:10.1051/metal/2010021. Zuboff, S. In the Age of the Smart Machine: The Future of Work and Power. Heinemann Professional, 1988.
APA, Harvard, Vancouver, ISO, and other styles
50

Mallan, Kerry Margaret, and Annette Patterson. "Present and Active: Digital Publishing in a Post-print Age." M/C Journal 11, no. 4 (June 24, 2008). http://dx.doi.org/10.5204/mcj.40.

Full text
Abstract:
At one point in Victor Hugo’s novel, The Hunchback of Notre Dame, the archdeacon, Claude Frollo, looked up from a book on his table to the edifice of the gothic cathedral, visible from his canon’s cell in the cloister of Notre Dame: “Alas!” he said, “this will kill that” (146). Frollo’s lament, that the book would destroy the edifice, captures the medieval cleric’s anxiety about the way in which Gutenberg’s print technology would become the new universal means for recording and communicating humanity’s ideas and artistic expression, replacing the grand monuments of architecture, human engineering, and craftsmanship. For Hugo, architecture was “the great handwriting of humankind” (149). The cathedral as the material outcome of human technology was being replaced by the first great machine—the printing press. At this point in the third millennium, some people undoubtedly have similar anxieties to Frollo: is it now the book’s turn to be destroyed by yet another great machine? The inclusion of “post print” in our title is not intended to sound the death knell of the book. Rather, we contend that despite the enduring value of print, digital publishing is “present and active” and is changing the way in which research, particularly in the humanities, is being undertaken. Our approach has three related parts. First, we consider how digital technologies are changing the way in which content is constructed, customised, modified, disseminated, and accessed within a global, distributed network. This section argues that the transition from print to electronic or digital publishing means both losses and gains, particularly with respect to shifts in our approaches to textuality, information, and innovative publishing. Second, we discuss the Children’s Literature Digital Resources (CLDR) project, with which we are involved. This case study of a digitising initiative opens out the transformative possibilities and challenges of digital publishing and e-scholarship for research communities. Third, we reflect on technology’s capacity to bring about major changes in the light of the theoretical and practical issues that have arisen from our discussion. I. Digitising in a “post-print age” We are living in an era that is commonly referred to as “the late age of print” (see Kho) or the “post-print age” (see Gunkel). According to Aarseth, we have reached a point whereby nearly all of our public and personal media have become more or less digital (37). As Kho notes, web newspapers are not only becoming increasingly more popular, but they are also making rather than losing money, and paper-based newspapers are finding it difficult to recruit new readers from the younger generations (37). Not only can such online-only publications update format, content, and structure more economically than print-based publications, but their wide distribution network, speed, and flexibility attract advertising revenue. Hype and hyperbole aside, publishers are not so much discarding their legacy of print, but recognising the folly of not embracing innovative technologies that can add value by presenting information in ways that satisfy users’ needs for content to-go or for edutainment. As Kho notes: “no longer able to satisfy customer demand by producing print-only products, or even by enabling online access to semi-static content, established publishers are embracing new models for publishing, web-style” (42). Advocates of online publishing contend that the major benefits of online publishing over print technology are that it is faster, more economical, and more interactive. However, as Hovav and Gray caution, “e-publishing also involves risks, hidden costs, and trade-offs” (79). The specific focus for these authors is e-journal publishing and they contend that while cost reduction is in editing, production and distribution, if the journal is not open access, then costs relating to storage and bandwith will be transferred to the user. If we put economics aside for the moment, the transition from print to electronic text (e-text), especially with electronic literary works, brings additional considerations, particularly in their ability to make available different reading strategies to print, such as “animation, rollovers, screen design, navigation strategies, and so on” (Hayles 38). Transition from print to e-text In his book, Writing Space, David Bolter follows Victor Hugo’s lead, but does not ask if print technology will be destroyed. Rather, he argues that “the idea and ideal of the book will change: print will no longer define the organization and presentation of knowledge, as it has for the past five centuries” (2). As Hayles noted above, one significant indicator of this change, which is a consequence of the shift from analogue to digital, is the addition of graphical, audio, visual, sonic, and kinetic elements to the written word. A significant consequence of this transition is the reinvention of the book in a networked environment. Unlike the printed book, the networked book is not bound by space and time. Rather, it is an evolving entity within an ecology of readers, authors, and texts. The Web 2.0 platform has enabled more experimentation with blending of digital technology and traditional writing, particularly in the use of blogs, which have spawned blogwriting and the wikinovel. Siva Vaidhyanathan’s The Googlization of Everything: How One Company is Disrupting Culture, Commerce and Community … and Why We Should Worry is a wikinovel or blog book that was produced over a series of weeks with contributions from other bloggers (see: http://www.sivacracy.net/). Penguin Books, in collaboration with a media company, “Six Stories to Start,” have developed six stories—“We Tell Stories,” which involve different forms of interactivity from users through blog entries, Twitter text messages, an interactive google map, and other features. For example, the story titled “Fairy Tales” allows users to customise the story using their own choice of names for characters and descriptions of character traits. Each story is loosely based on a classic story and links take users to synopses of these original stories and their authors and to online purchase of the texts through the Penguin Books sales website. These examples of digital stories are a small part of the digital environment, which exploits computer and online technologies’ capacity to be interactive and immersive. As Janet Murray notes, the interactive qualities of digital environments are characterised by their procedural and participatory abilities, while their immersive qualities are characterised by their spatial and encyclopedic dimensions (71–89). These immersive and interactive qualities highlight different ways of reading texts, which entail different embodied and cognitive functions from those that reading print texts requires. As Hayles argues: the advent of electronic textuality presents us with an unparalleled opportunity to reformulate fundamental ideas about texts and, in the process, to see print as well as electronic texts with fresh eyes (89–90). The transition to e-text also highlights how digitality is changing all aspects of everyday life both inside and outside the academy. Online teaching and e-research Another aspect of the commercial arm of publishing that is impacting on academe and other organisations is the digitising and indexing of print content for niche distribution. Kho offers the example of the Mark Logic Corporation, which uses its XML content platform to repurpose content, create new content, and distribute this content through multiple portals. As the promotional website video for Mark Logic explains, academics can use this service to customise their own textbooks for students by including only articles and book chapters that are relevant to their subject. These are then organised, bound, and distributed by Mark Logic for sale to students at a cost that is generally cheaper than most textbooks. A further example of how print and digital materials can form an integrated, customised source for teachers and students is eFictions (Trimmer, Jennings, & Patterson). eFictions was one of the first print and online short story anthologies that teachers of literature could customise to their own needs. Produced as both a print text collection and a website, eFictions offers popular short stories in English by well-known traditional and contemporary writers from the US, Australia, New Zealand, UK, and Europe, with summaries, notes on literary features, author biographies, and, in one instance, a YouTube movie of the story. In using the eFictions website, teachers can build a customised anthology of traditional and innovative stories to suit their teaching preferences. These examples provide useful indicators of how content is constructed, customised, modified, disseminated, and accessed within a distributed network. However, the question remains as to how to measure their impact and outcomes within teaching and learning communities. As Harley suggests in her study on the use and users of digital resources in the humanities and social sciences, several factors warrant attention, such as personal teaching style, philosophy, and specific disciplinary requirements. However, in terms of understanding the benefits of digital resources for teaching and learning, Harley notes that few providers in her sample had developed any plans to evaluate use and users in a systematic way. In addition to the problems raised in Harley’s study, another relates to how researchers can be supported to take full advantage of digital technologies for e-research. The transformation brought about by information and communication technologies extends and broadens the impact of research, by making its outputs more discoverable and usable by other researchers, and its benefits more available to industry, governments, and the wider community. Traditional repositories of knowledge and information, such as libraries, are juggling the space demands of books and computer hardware alongside increasing reader demand for anywhere, anytime, anyplace access to information. Researchers’ expectations about online access to journals, eprints, bibliographic data, and the views of others through wikis, blogs, and associated social and information networking sites such as YouTube compete with the traditional expectations of the institutions that fund libraries for paper-based archives and book repositories. While university libraries are finding it increasingly difficult to purchase all hardcover books relevant to numerous and varied disciplines, a significant proportion of their budgets goes towards digital repositories (e.g., STORS), indexes, and other resources, such as full-text electronic specialised and multidisciplinary journal databases (e.g., Project Muse and Proquest); electronic serials; e-books; and specialised information sources through fast (online) document delivery services. An area that is becoming increasingly significant for those working in the humanities is the digitising of historical and cultural texts. II. Bringing back the dead: The CLDR project The CLDR project is led by researchers and librarians at the Queensland University of Technology, in collaboration with Deakin University, University of Sydney, and members of the AustLit team at The University of Queensland. The CLDR project is a “Research Community” of the electronic bibliographic database AustLit: The Australian Literature Resource, which is working towards the goal of providing a complete bibliographic record of the nation’s literature. AustLit offers users with a single entry point to enhanced scholarly resources on Australian writers, their works, and other aspects of Australian literary culture and activities. AustLit and its Research Communities are supported by grants from the Australian Research Council and financial and in-kind contributions from a consortium of Australian universities, and by other external funding sources such as the National Collaborative Research Infrastructure Strategy. Like other more extensive digitisation projects, such as Project Gutenberg and the Rosetta Project, the CLDR project aims to provide a centralised access point for digital surrogates of early published works of Australian children’s literature, with access pathways to existing resources. The first stage of the CLDR project is to provide access to digitised, full-text, out-of-copyright Australian children’s literature from European settlement to 1945, with selected digitised critical works relevant to the field. Texts comprise a range of genres, including poetry, drama, and narrative for young readers and picture books, songs, and rhymes for infants. Currently, a selection of 75 e-texts and digital scans of original texts from Project Gutenberg and Internet Archive have been linked to the Children’s Literature Research Community. By the end of 2009, the CLDR will have digitised approximately 1000 literary texts and a significant number of critical works. Stage II and subsequent development will involve digitisation of selected texts from 1945 onwards. A precursor to the CLDR project has been undertaken by Deakin University in collaboration with the State Library of Victoria, whereby a digital bibliographic index comprising Victorian School Readers has been completed with plans for full-text digital surrogates of a selection of these texts. These texts provide valuable insights into citizenship, identity, and values formation from the 1930s onwards. At the time of writing, the CLDR is at an early stage of development. An extensive survey of out-of-copyright texts has been completed and the digitisation of these resources is about to commence. The project plans to make rich content searchable, allowing scholars from children’s literature studies and education to benefit from the many advantages of online scholarship. What digital publishing and associated digital archives, electronic texts, hypermedia, and so forth foreground is the fact that writers, readers, publishers, programmers, designers, critics, booksellers, teachers, and copyright laws operate within a context that is highly mediated by technology. In his article on large-scale digitisation projects carried out by Cornell and University of Michigan with the Making of America collection of 19th-century American serials and monographs, Hirtle notes that when special collections’ materials are available via the Web, with appropriate metadata and software, then they can “increase use of the material, contribute to new forms of research, and attract new users to the material” (44). Furthermore, Hirtle contends that despite the poor ergonomics associated with most electronic displays and e-book readers, “people will, when given the opportunity, consult an electronic text over the print original” (46). If this preference is universally accurate, especially for researchers and students, then it follows that not only will the preference for electronic surrogates of original material increase, but preference for other kinds of electronic texts will also increase. It is with this preference for electronic resources in mind that we approached the field of children’s literature in Australia and asked questions about how future generations of researchers would prefer to work. If electronic texts become the reference of choice for primary as well as secondary sources, then it seems sensible to assume that researchers would prefer to sit at the end of the keyboard than to travel considerable distances at considerable cost to access paper-based print texts in distant libraries and archives. We considered the best means for providing access to digitised primary and secondary, full text material, and digital pathways to existing online resources, particularly an extensive indexing and bibliographic database. Prior to the commencement of the CLDR project, AustLit had already indexed an extensive number of children’s literature. Challenges and dilemmas The CLDR project, even in its early stages of development, has encountered a number of challenges and dilemmas that centre on access, copyright, economic capital, and practical aspects of digitisation, and sustainability. These issues have relevance for digital publishing and e-research. A decision is yet to be made as to whether the digital texts in CLDR will be available on open or closed/tolled access. The preference is for open access. As Hayles argues, copyright is more than a legal basis for intellectual property, as it also entails ideas about authorship, creativity, and the work as an “immaterial mental construct” that goes “beyond the paper, binding, or ink” (144). Seeking copyright permission is therefore only part of the issue. Determining how the item will be accessed is a further matter, particularly as future technologies may impact upon how a digital item is used. In the case of e-journals, the issue of copyright payment structures are evolving towards a collective licensing system, pay-per-view, and other combinations of print and electronic subscription (see Hovav and Gray). For research purposes, digitisation of items for CLDR is not simply a scan and deliver process. Rather it is one that needs to ensure that the best quality is provided and that the item is both accessible and usable by researchers, and sustainable for future researchers. Sustainability is an important consideration and provides a challenge for institutions that host projects such as CLDR. Therefore, items need to be scanned to a high quality and this requires an expensive scanner and personnel costs. Files need to be in a variety of formats for preservation purposes and so that they may be manipulated to be useable in different technologies (for example, Archival Tiff, Tiff, Jpeg, PDF, HTML). Hovav and Gray warn that when technology becomes obsolete, then content becomes unreadable unless backward integration is maintained. The CLDR items will be annotatable given AustLit’s NeAt funded project: Aus-e-Lit. The Aus-e-Lit project will extend and enhance the existing AustLit web portal with data integration and search services, empirical reporting services, collaborative annotation services, and compound object authoring, editing, and publishing services. For users to be able to get the most out of a digital item, it needs to be searchable, either through double keying or OCR (optimal character recognition). The value of CLDR’s contribution The value of the CLDR project lies in its goal to provide a comprehensive, searchable body of texts (fictional and critical) to researchers across the humanities and social sciences. Other projects seem to be intent on putting up as many items as possible to be considered as a first resort for online texts. CLDR is more specific and is not interested in simply generating a presence on the Web. Rather, it is research driven both in its design and implementation, and in its focussed outcomes of assisting academics and students primarily in their e-research endeavours. To this end, we have concentrated on the following: an extensive survey of appropriate texts; best models for file location, distribution, and use; and high standards of digitising protocols. These issues that relate to data storage, digitisation, collections, management, and end-users of data are aligned with the “Development of an Australian Research Data Strategy” outlined in An Australian e-Research Strategy and Implementation Framework (2006). CLDR is not designed to simply replicate resources, as it has a distinct focus, audience, and research potential. In addition, it looks at resources that may be forgotten or are no longer available in reproduction by current publishing companies. Thus, the aim of CLDR is to preserve both the time and a period of Australian history and literary culture. It will also provide users with an accessible repository of rare and early texts written for children. III. Future directions It is now commonplace to recognize that the Web’s role as information provider has changed over the past decade. New forms of “collective intelligence” or “distributed cognition” (Oblinger and Lombardi) are emerging within and outside formal research communities. Technology’s capacity to initiate major cultural, social, educational, economic, political and commercial shifts has conditioned us to expect the “next big thing.” We have learnt to adapt swiftly to the many challenges that online technologies have presented, and we have reaped the benefits. As the examples in this discussion have highlighted, the changes in online publishing and digitisation have provided many material, network, pedagogical, and research possibilities: we teach online units providing students with access to e-journals, e-books, and customized archives of digitised materials; we communicate via various online technologies; we attend virtual conferences; and we participate in e-research through a global, digital network. In other words, technology is deeply engrained in our everyday lives. In returning to Frollo’s concern that the book would destroy architecture, Umberto Eco offers a placatory note: “in the history of culture it has never happened that something has simply killed something else. Something has profoundly changed something else” (n. pag.). Eco’s point has relevance to our discussion of digital publishing. The transition from print to digital necessitates a profound change that impacts on the ways we read, write, and research. As we have illustrated with our case study of the CLDR project, the move to creating digitised texts of print literature needs to be considered within a dynamic network of multiple causalities, emergent technological processes, and complex negotiations through which digital texts are created, stored, disseminated, and used. Technological changes in just the past five years have, in many ways, created an expectation in the minds of people that the future is no longer some distant time from the present. Rather, as our title suggests, the future is both present and active. References Aarseth, Espen. “How we became Postdigital: From Cyberstudies to Game Studies.” Critical Cyber-culture Studies. Ed. David Silver and Adrienne Massanari. New York: New York UP, 2006. 37–46. An Australian e-Research Strategy and Implementation Framework: Final Report of the e-Research Coordinating Committee. Commonwealth of Australia, 2006. Bolter, Jay David. Writing Space: The Computer, Hypertext, and the History of Writing. Hillsdale, NJ: Erlbaum, 1991. Eco, Umberto. “The Future of the Book.” 1994. 3 June 2008 ‹http://www.themodernword.com/eco/eco_future_of_book.html>. Gunkel, David. J. “What's the Matter with Books?” Configurations 11.3 (2003): 277–303. Harley, Diane. “Use and Users of Digital Resources: A Focus on Undergraduate Education in the Humanities and Social Sciences.” Research and Occasional Papers Series. Berkeley: University of California. Centre for Studies in Higher Education. 12 June 2008 ‹http://www.themodernword.com/eco/eco_future_of_book.html>. Hayles, N. Katherine. My Mother was a Computer: Digital Subjects and Literary Texts. Chicago: U of Chicago P, 2005. Hirtle, Peter B. “The Impact of Digitization on Special Collections in Libraries.” Libraries & Culture 37.1 (2002): 42–52. Hovav, Anat and Paul Gray. “Managing Academic E-journals.” Communications of the ACM 47.4 (2004): 79–82. Hugo, Victor. The Hunchback of Notre Dame (Notre-Dame de Paris). Ware, Hertfordshire: Wordsworth editions, 1993. Kho, Nancy D. “The Medium Gets the Message: Post-Print Publishing Models.” EContent 30.6 (2007): 42–48. Oblinger, Diana and Marilyn Lombardi. “Common Knowledge: Openness in Higher Education.” Opening up Education: The Collective Advancement of Education Through Open Technology, Open Content and Open Knowledge. Ed. Toru Liyoshi and M. S. Vijay Kumar. Cambridge, MA: MIT Press, 2007. 389–400. Murray, Janet H. Hamlet on the Holodeck: The Future of Narrative in Cyberspace. Cambridge, MA: MIT Press, 2001. Trimmer, Joseph F., Wade Jennings, and Annette Patterson. eFictions. New York: Harcourt, 2001.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography