To see the other types of publications on this topic, follow the link: Ibrahim time domain.

Journal articles on the topic 'Ibrahim time domain'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 20 journal articles for your research on the topic 'Ibrahim time domain.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Brincker, Rune, Peter Olsen, Sandro Amador, Martin Juul, Abdollah Malekjafarian, and Mohammad Ashory. "Modal participation in multiple input Ibrahim time domain identification." Mathematics and Mechanics of Solids 24, no. 1 (October 14, 2017): 168–80. http://dx.doi.org/10.1177/1081286517733034.

Full text
Abstract:
The Ibrahim time domain (ITD) identification technique was one of the first techniques formulated for multiple output modal analysis based on impulse response functions or general free decays. However, the technique has not been used much in recent decades due to the fact that the technique was originally formulated for single input systems that suffer from well-known problems in case of closely spaced modes. In this paper, a known, but more modern formulation of the ITD technique is discussed. In this formulation the technique becomes multiple input by adding some Toeplitz matrices over a set of free decays. It is shown that a special participation matrix can be defined that cancels out whenever the system matrix is estimated. The participation matrix becomes rank deficient if a mode is missing in the responses, but if any mode is present in one of the considered free decays, the participation matrix has full rank. This secures that all modes will be contained in the estimated system matrix. Finally, it is discussed how correlation functions estimated from the operational responses of structures can be used as free decays for the multiple-input ITD formulation, and the estimation errors of the identification technique are investigated in a simulation study with closely spaced modes. The simulation study shows that the multiple-input formulation provides estimates with significantly smaller errors on both mode shape and natural frequency estimates.
APA, Harvard, Vancouver, ISO, and other styles
2

Mohanty, P., and D. J. Rixen. "A modified Ibrahim time domain algorithm for operational modal analysis including harmonic excitation." Journal of Sound and Vibration 275, no. 1-2 (August 2004): 375–90. http://dx.doi.org/10.1016/j.jsv.2003.06.030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Leuridan, J. M., D. L. Brown, and R. J. Allemang. "Time Domain Parameter Identification Methods for Linear Modal Analysis: A Unifying Approach." Journal of Vibration and Acoustics 108, no. 1 (January 1, 1986): 1–8. http://dx.doi.org/10.1115/1.3269298.

Full text
Abstract:
The paper describes a method that uses a multivariate model in the form of a nonhomogeneous finite difference equation to identify modal parameters of a mechanical structure. The modal parameters of this equation are estimable using a model that involves multiple input, multiple output vibration data. Thus, improved global estimates of modal parameters can be obtained, including the identification of highly coupled and pseudo-repeated modes of vibration. When the data are in the form of impulse or free decay responses, then the parameters of the homogeneous part of the equation can be estimated separately, and the method is then related to the Least Squares Complex Exponential method, the Polyreference Time Domain method and the Ibrahim Time Domain method.
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Peng, Xiaoru Wang, Xiangchao Wang, and James S. Thorp. "Synchronized measurement based estimation of inter-area electromechanical modes using the Ibrahim time domain method." Electric Power Systems Research 111 (June 2014): 85–95. http://dx.doi.org/10.1016/j.epsr.2014.02.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kashani, H., and A. S. Nobari. "Structural Nonlinearity Identification Using Perturbed Eigen Problem and ITD Modal Analysis Method." Applied Mechanics and Materials 232 (November 2012): 949–54. http://dx.doi.org/10.4028/www.scientific.net/amm.232.949.

Full text
Abstract:
Identification of nonlinear behavior in structural dynamics has been considered here, in this paper. Time domain output data of system are directly used to identify system through Ibrahim Time Domain (ITD) modal analysis method and perturbed eigen problem. Cubic stiffness and Jenkins element, as case studies, are employed to qualify the identification method. Results are compared with Harmonic Balance (HB) estimation of nonlinear dynamic stiffness. Results of ITD based identification are in good agreement with the HB estimation, for stiffness parts of nonlinear dynamic stiffness but for damping parts of nonlinear dynamic stiffness, method needs some additional improvements which are under investigation.
APA, Harvard, Vancouver, ISO, and other styles
6

Anuar, M. A., Liyana Roslan, and A. A. Mat Isa. "Dynamic Parameter Identification Using Ambient Response Analysis and Ibrahim Time Domain Approach: A Case Study on a Steel Plate Structure." Applied Mechanics and Materials 110-116 (October 2011): 2395–99. http://dx.doi.org/10.4028/www.scientific.net/amm.110-116.2395.

Full text
Abstract:
Since the level of vibration always depends on the natural frequencies of the system, it is important to know the modal parameters of such system to control failure and provide prevention actions. However, for many mechanical engineering machines or structures, there is a demand and necessity to determine real-life modal parameters using actual operating condition. This type of testing condition cannot be done in lab environment because most of the mechanical structure is big in size and heavy. Thus, the purpose of this paper is to study the natural frequencies of a steel plate by using Operational Modal Analysis (OMA) and Ibrahim Time Domain (ITD). Comparison of results between both approaches will be shown.
APA, Harvard, Vancouver, ISO, and other styles
7

Jiang, Hao, Guang Wei Meng, and Bao Wei Xiong. "Modal Parameters Identification of Bridge Structure Based on Excitation of Wind Load." Applied Mechanics and Materials 405-408 (September 2013): 1660–63. http://dx.doi.org/10.4028/www.scientific.net/amm.405-408.1660.

Full text
Abstract:
Applying the combination of the natural excitation technique and the Eigen system realization algorithm, a finite element numerical simulation was performed for the dynamic behavior identification of a pre-stressed concrete continuous beam bridge under simulating wind load excitation. The results were validated comparatively using the combined algorithm of random decrement technique and Ibrahim time domain technique as well as the finite element modal analysis. The simulation results show that the wind load as the most common environmental excitation can be used effectively to identify the modal parameters of the concrete bridge.
APA, Harvard, Vancouver, ISO, and other styles
8

Sun, Jinghai, Hui Li, and Wenbai Zhu. "Practical Damping Identification of FAST Cable Suspension." Advances in Mechanical Engineering 6 (January 1, 2014): 813752. http://dx.doi.org/10.1155/2014/813752.

Full text
Abstract:
FAST focus cabin is suspended and driven by 6 parallel large span cables. Low stiffness of cables makes the cabin sensitive to disturbance and difficult to control. Structural damping then becomes a key factor that can improve control ability. Therefore, a reasonable damping estimation is important for system design. In this paper, a practical damping identification method is developed based on Ibrahim-time-domain algorithm. The method shows satisfied performance on accuracy and reliability in simulation test and is utilized in vibration experiments to identify damping ratios of both single cable model and FAST 3 m scale cable suspension model. Finally, a preliminary analysis of the damping properties is given out based on the results of identification.
APA, Harvard, Vancouver, ISO, and other styles
9

Nangolo, Fillemon Nduvu, and František Klimenda. "Modal Parameter Analysis for Underdamped Mechanical Systems." Applied Mechanics and Materials 732 (February 2015): 247–52. http://dx.doi.org/10.4028/www.scientific.net/amm.732.247.

Full text
Abstract:
There are many ways to model and to analyze discrete event systems. In general these systems lead to a non-linear characteristic equation description in linear algebra. This paper presents an analytical method for solving the characteristic equation of higher order, which arise when solving ordinary differential equations of motion of rigid body systems with 2 ≤ p° ≤ 10 degrees of freedom. The objective of this work was to express the characteristic equation in the form of product quadratic polynomial, from which the modal components could be found. To validate the model, the modal parameters extraction technique – Ibrahim Time Domain (ITD) – was used to extract modal parameters from artificial data developed in MATLAB environment. The extracted modal components were compared to those obtained from the analytical model.
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Zhi Ying, Qing Sun, and Zheng Yang. "An Identification Method for Damping Ratio of In Situ Building." Advanced Materials Research 446-449 (January 2012): 556–60. http://dx.doi.org/10.4028/www.scientific.net/amr.446-449.556.

Full text
Abstract:
Damping evaluation is of great importance in predicting the dynamic response of systems. To get the accurate damping ratios of a system, many identification methods have been proposed and developed. But only few of them achieved accurate results for in-situ buildings due to the fact that the responses are significantly influenced by noise. This paper proposes a new method to accurately identify the damping ratios of in-situ buildings. The method is based on ambient excitation technique which requires no artificial excitation applied to SSI system and to measure output-only. The damping ratio identification is then performed by combining the improved random decrement method and Ibrahim time domain method. To demonstrate the validity of the proposed approach, a case study is performed and the results are compared with the conventional peak-peaking method results. The results show the proposed method can effectively identify the modal parameter of either frequencies or damping ratios of in-situ buildings subjected to ambient excitation.
APA, Harvard, Vancouver, ISO, and other styles
11

Fujino, Yozo, Masato Abe, Hajime Shibuya, Masato Yanagihara, Masashi Sato, Shun-Ichi Nakamura, and Yoshifumi Sakamoto. "Forced and Ambient Vibration Tests and Vibration Monitoring of Hakucho Suspension Bridge." Transportation Research Record: Journal of the Transportation Research Board 1696, no. 1 (January 2000): 57–63. http://dx.doi.org/10.3141/1696-43.

Full text
Abstract:
Forced and ambient dynamic tests of the Hakucho Bridge were carried out to study the dynamic characteristics of this suspension bridge. Dense-array measurement was employed in order to capture not only natural frequencies and damping, but also the mode shapes of the bridge. The natural frequencies and mode shapes obtained from the forced and ambient vibration tests agreed well with those calculated by a three-dimensional finite element model. A new method that combines the random decrement method with the Ibrahim time domain method is proposed to systematically identify the natural frequencies, damping, and mode shapes. This method is successfully applied to ambient vibration data. It is shown that the natural frequency of the first vertical bending mode decreases noticeably as the wind speed increases. It is also shown that the shape of the first vertical bending mode changes slightly near the towers, depending on the wind velocity; this finding indicates that the change may be associated with friction in the bearings at the towers. Finally, application of the Global Positioning System to measure static displacement of the girder is explained.
APA, Harvard, Vancouver, ISO, and other styles
12

Asayesh, M., B. Khodabandeloo, and A. Siami. "A random decrement technique for operational modal analysis in the presence of periodic excitations." Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science 223, no. 7 (March 18, 2009): 1525–34. http://dx.doi.org/10.1243/09544062jmes1392.

Full text
Abstract:
Operational modal analysis (OMA) is a procedure that allows the identification of the modal parameters of a structure using measured responses to unknown excitation. OMA techniques are based on the assumption that the input to the structure is stationary white noise. One of the OMA techniques, which is based on the assumption of a zero mean Gaussian white noise excitation, is the random decrement (RD) technique. In many practical cases, however, periodic excitation is often present in addition to the white noise. In this study, a method based on the concept of RD transformation is proposed to extract the response of a structure to the random input from the measured response that is due to both random and periodic excitations. Applying the RD method to the extracted random response, RD signatures were estimated. Modal parameters were estimated from RD signatures using the Ibrahim time domain algorithm. It is assumed that the period of the periodic excitation is known a priori. To verify the applicability of the method, a numerical simulation of a discrete two-degrees-of-freedom (DOF) dynamic system with a viscous damping is carried out. The results of this method were also compared with the results obtained from the enhanced frequency domain decomposition method. The efficiency of the proposed method, in the cases where the frequencies of harmonic components of periodic excitation are located at the natural frequencies of the system, is also evaluated.
APA, Harvard, Vancouver, ISO, and other styles
13

Hollkamp, Joseph J., and Stephen M. Batill. "Noise bias in various formulations of Ibrahim's time domain technique." AIAA Journal 27, no. 8 (August 1989): 1142–45. http://dx.doi.org/10.2514/3.10238.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Riyadli, Hafiz, and Arliyana Arliyana. "Analisis Tingkat Akurasi Algoritma Novel Sebagai Metode Prediksi (Studi Kasus: Prediksi Harga Emas)." Jurnal SAINTEKOM 7, no. 2 (September 25, 2017): 162. http://dx.doi.org/10.33020/saintekom.v7i2.35.

Full text
Abstract:
Fuzzy method in the world of information and communication technology especially in the domain of intelligent systems, which one can be used to predictions/ forecasting. In this study the author will use the Novel Algorithm presented by Jasim, Salim and Ibraheem as a method to predictioning the Gold Price, the data source is retrieved from the http://www.kitco.com. Then the predictions result with Novel Algorithm will be comparing with fuzzy time series methods presented by Ruey Chyn Tsaur. Results of the predictions using Novel Algorithm, obtained a value of MAPE 0,0385(3,85%), while the Fuzzy Time Series Ruey Chyn Tsaur, obtained results of MAPE 0,0544(5,44%)
APA, Harvard, Vancouver, ISO, and other styles
15

Biran, Yahav, George Collins, Borky John M, and Joel Dubow. "Volume 2, Issue 3, Special issue on Recent Advances in Engineering Systems (Published Papers) Articles Transmit / Received Beamforming for Frequency Diverse Array with Symmetrical frequency offsets Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 1-6 (2017); View Description Detailed Analysis of Amplitude and Slope Diffraction Coefficients for knife-edge structure in S-UTD-CH Model Eray Arik, Mehmet Baris Tabakcioglu Adv. Sci. Technol. Eng. Syst. J. 2(3), 7-11 (2017); View Description Applications of Case Based Organizational Memory Supported by the PAbMM Architecture Martín, María de los Ángeles, Diván, Mario José Adv. Sci. Technol. Eng. Syst. J. 2(3), 12-23 (2017); View Description Low Probability of Interception Beampattern Using Frequency Diverse Array Antenna Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 24-29 (2017); View Description Zero Trust Cloud Networks using Transport Access Control and High Availability Optical Bypass Switching Casimer DeCusatis, Piradon Liengtiraphan, Anthony Sager Adv. Sci. Technol. Eng. Syst. J. 2(3), 30-35 (2017); View Description A Derived Metrics as a Measurement to Support Efficient Requirements Analysis and Release Management Indranil Nath Adv. Sci. Technol. Eng. Syst. J. 2(3), 36-40 (2017); View Description Feedback device of temperature sensation for a myoelectric prosthetic hand Yuki Ueda, Chiharu Ishii Adv. Sci. Technol. Eng. Syst. J. 2(3), 41-40 (2017); View Description Deep venous thrombus characterization: ultrasonography, elastography and scattering operator Thibaud Berthomier, Ali Mansour, Luc Bressollette, Frédéric Le Roy, Dominique Mottier Adv. Sci. Technol. Eng. Syst. J. 2(3), 48-59 (2017); View Description Improving customs’ border control by creating a reference database of cargo inspection X-ray images Selina Kolokytha, Alexander Flisch, Thomas Lüthi, Mathieu Plamondon, Adrian Schwaninger, Wicher Vasser, Diana Hardmeier, Marius Costin, Caroline Vienne, Frank Sukowski, Ulf Hassler, Irène Dorion, Najib Gadi, Serge Maitrejean, Abraham Marciano, Andrea Canonica, Eric Rochat, Ger Koomen, Micha Slegt Adv. Sci. Technol. Eng. Syst. J. 2(3), 60-66 (2017); View Description Aviation Navigation with Use of Polarimetric Technologies Arsen Klochan, Ali Al-Ammouri, Viktor Romanenko, Vladimir Tronko Adv. Sci. Technol. Eng. Syst. J. 2(3), 67-72 (2017); View Description Optimization of Multi-standard Transmitter Architecture Using Single-Double Conversion Technique Used for Rescue Operations Riadh Essaadali, Said Aliouane, Chokri Jebali and Ammar Kouki Adv. Sci. Technol. Eng. Syst. J. 2(3), 73-81 (2017); View Description Singular Integral Equations in Electromagnetic Waves Reflection Modeling A. S. Ilinskiy, T. N. Galishnikova Adv. Sci. Technol. Eng. Syst. J. 2(3), 82-87 (2017); View Description Methodology for Management of Information Security in Industrial Control Systems: A Proof of Concept aligned with Enterprise Objectives. Fabian Bustamante, Walter Fuertes, Paul Diaz, Theofilos Toulqueridis Adv. Sci. Technol. Eng. Syst. J. 2(3), 88-99 (2017); View Description Dependence-Based Segmentation Approach for Detecting Morpheme Boundaries Ahmed Khorsi, Abeer Alsheddi Adv. Sci. Technol. Eng. Syst. J. 2(3), 100-110 (2017); View Description Paper Improving Rule Based Stemmers to Solve Some Special Cases of Arabic Language Soufiane Farrah, Hanane El Manssouri, Ziyati Elhoussaine, Mohamed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 111-115 (2017); View Description Medical imbalanced data classification Sara Belarouci, Mohammed Amine Chikh Adv. Sci. Technol. Eng. Syst. J. 2(3), 116-124 (2017); View Description ADOxx Modelling Method Conceptualization Environment Nesat Efendioglu, Robert Woitsch, Wilfrid Utz, Damiano Falcioni Adv. Sci. Technol. Eng. Syst. J. 2(3), 125-136 (2017); View Description GPSR+Predict: An Enhancement for GPSR to Make Smart Routing Decision by Anticipating Movement of Vehicles in VANETs Zineb Squalli Houssaini, Imane Zaimi, Mohammed Oumsis, Saïd El Alaoui Ouatik Adv. Sci. Technol. Eng. Syst. J. 2(3), 137-146 (2017); View Description Optimal Synthesis of Universal Space Vector Digital Algorithm for Matrix Converters Adrian Popovici, Mircea Băbăiţă, Petru Papazian Adv. Sci. Technol. Eng. Syst. J. 2(3), 147-152 (2017); View Description Control design for axial flux permanent magnet synchronous motor which operates above the nominal speed Xuan Minh Tran, Nhu Hien Nguyen, Quoc Tuan Duong Adv. Sci. Technol. Eng. Syst. J. 2(3), 153-159 (2017); View Description A synchronizing second order sliding mode control applied to decentralized time delayed multi−agent robotic systems: Stability Proof Marwa Fathallah, Fatma Abdelhedi, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 160-170 (2017); View Description Fault Diagnosis and Tolerant Control Using Observer Banks Applied to Continuous Stirred Tank Reactor Martin F. Pico, Eduardo J. Adam Adv. Sci. Technol. Eng. Syst. J. 2(3), 171-181 (2017); View Description Development and Validation of a Heat Pump System Model Using Artificial Neural Network Nabil Nassif, Jordan Gooden Adv. Sci. Technol. Eng. Syst. J. 2(3), 182-185 (2017); View Description Assessment of the usefulness and appeal of stigma-stop by psychology students: a serious game designed to reduce the stigma of mental illness Adolfo J. Cangas, Noelia Navarro, Juan J. Ojeda, Diego Cangas, Jose A. Piedra, José Gallego Adv. Sci. Technol. Eng. Syst. J. 2(3), 186-190 (2017); View Description Kinect-Based Moving Human Tracking System with Obstacle Avoidance Abdel Mehsen Ahmad, Zouhair Bazzal, Hiba Al Youssef Adv. Sci. Technol. Eng. Syst. J. 2(3), 191-197 (2017); View Description A security approach based on honeypots: Protecting Online Social network from malicious profiles Fatna Elmendili, Nisrine Maqran, Younes El Bouzekri El Idrissi, Habiba Chaoui Adv. Sci. Technol. Eng. Syst. J. 2(3), 198-204 (2017); View Description Pulse Generator for Ultrasonic Piezoelectric Transducer Arrays Based on a Programmable System-on-Chip (PSoC) Pedro Acevedo, Martín Fuentes, Joel Durán, Mónica Vázquez, Carlos Díaz Adv. Sci. Technol. Eng. Syst. J. 2(3), 205-209 (2017); View Description Enabling Toy Vehicles Interaction With Visible Light Communication (VLC) M. A. Ilyas, M. B. Othman, S. M. Shah, Mas Fawzi Adv. Sci. Technol. Eng. Syst. J. 2(3), 210-216 (2017); View Description Analysis of Fractional-Order 2xn RLC Networks by Transmission Matrices Mahmut Ün, Manolya Ün Adv. Sci. Technol. Eng. Syst. J. 2(3), 217-220 (2017); View Description Fire extinguishing system in large underground garages Ivan Antonov, Rositsa Velichkova, Svetlin Antonov, Kamen Grozdanov, Milka Uzunova, Ikram El Abbassi Adv. Sci. Technol. Eng. Syst. J. 2(3), 221-226 (2017); View Description Directional Antenna Modulation Technique using A Two-Element Frequency Diverse Array Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 227-232 (2017); View Description Classifying region of interests from mammograms with breast cancer into BIRADS using Artificial Neural Networks Estefanía D. Avalos-Rivera, Alberto de J. Pastrana-Palma Adv. Sci. Technol. Eng. Syst. J. 2(3), 233-240 (2017); View Description Magnetically Levitated and Guided Systems Florian Puci, Miroslav Husak Adv. Sci. Technol. Eng. Syst. J. 2(3), 241-244 (2017); View Description Energy-Efficient Mobile Sensing in Distributed Multi-Agent Sensor Networks Minh T. Nguyen Adv. Sci. Technol. Eng. Syst. J. 2(3), 245-253 (2017); View Description Validity and efficiency of conformal anomaly detection on big distributed data Ilia Nouretdinov Adv. Sci. Technol. Eng. Syst. J. 2(3), 254-267 (2017); View Description S-Parameters Optimization in both Segmented and Unsegmented Insulated TSV upto 40GHz Frequency Juma Mary Atieno, Xuliang Zhang, HE Song Bai Adv. Sci. Technol. Eng. Syst. J. 2(3), 268-276 (2017); View Description Synthesis of Important Design Criteria for Future Vehicle Electric System Lisa Braun, Eric Sax Adv. Sci. Technol. Eng. Syst. J. 2(3), 277-283 (2017); View Description Gestural Interaction for Virtual Reality Environments through Data Gloves G. Rodriguez, N. Jofre, Y. Alvarado, J. Fernández, R. Guerrero Adv. Sci. Technol. Eng. Syst. J. 2(3), 284-290 (2017); View Description Solving the Capacitated Network Design Problem in Two Steps Meriem Khelifi, Mohand Yazid Saidi, Saadi Boudjit Adv. Sci. Technol. Eng. Syst. J. 2(3), 291-301 (2017); View Description A Computationally Intelligent Approach to the Detection of Wormhole Attacks in Wireless Sensor Networks Mohammad Nurul Afsar Shaon, Ken Ferens Adv. Sci. Technol. Eng. Syst. J. 2(3), 302-320 (2017); View Description Real Time Advanced Clustering System Giuseppe Spampinato, Arcangelo Ranieri Bruna, Salvatore Curti, Viviana D’Alto Adv. Sci. Technol. Eng. Syst. J. 2(3), 321-326 (2017); View Description Indoor Mobile Robot Navigation in Unknown Environment Using Fuzzy Logic Based Behaviors Khalid Al-Mutib, Foudil Abdessemed Adv. Sci. Technol. Eng. Syst. J. 2(3), 327-337 (2017); View Description Validity of Mind Monitoring System as a Mental Health Indicator using Voice Naoki Hagiwara, Yasuhiro Omiya, Shuji Shinohara, Mitsuteru Nakamura, Masakazu Higuchi, Shunji Mitsuyoshi, Hideo Yasunaga, Shinichi Tokuno Adv. Sci. Technol. Eng. Syst. J. 2(3), 338-344 (2017); View Description The Model of Adaptive Learning Objects for virtual environments instanced by the competencies Carlos Guevara, Jose Aguilar, Alexandra González-Eras Adv. Sci. Technol. Eng. Syst. J. 2(3), 345-355 (2017); View Description An Overview of Traceability: Towards a general multi-domain model Kamal Souali, Othmane Rahmaoui, Mohammed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 356-361 (2017); View Description L-Band SiGe HBT Active Differential Equalizers with Variable, Positive or Negative Gain Slopes Using Dual-Resonant RLC Circuits Yasushi Itoh, Hiroaki Takagi Adv. Sci. Technol. Eng. Syst. J. 2(3), 362-368 (2017); View Description Moving Towards Reliability-Centred Management of Energy, Power and Transportation Assets Kang Seng Seow, Loc K. Nguyen, Kelvin Tan, Kees-Jan Van Oeveren Adv. Sci. Technol. Eng. Syst. J. 2(3), 369-375 (2017); View Description Secure Path Selection under Random Fading Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 376-383 (2017); View Description Security in SWIPT with Power Splitting Eavesdropper Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 384-388 (2017); View Description Performance Analysis of Phased Array and Frequency Diverse Array Radar Ambiguity Functions Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 389-394 (2017); View Description Adaptive Discrete-time Fuzzy Sliding Mode Control For a Class of Chaotic Systems Hanene Medhaffar, Moez Feki, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 395-400 (2017); View Description Fault Tolerant Inverter Topology for the Sustainable Drive of an Electrical Helicopter Igor Bolvashenkov, Jörg Kammermann, Taha Lahlou, Hans-Georg Herzog Adv. Sci. Technol. Eng. Syst. J. 2(3), 401-411 (2017); View Description Computational Intelligence Methods for Identifying Voltage Sag in Smart Grid Turgay Yalcin, Muammer Ozdemir Adv. Sci. Technol. Eng. Syst. J. 2(3), 412-419 (2017); View Description A Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation Ali Akbar Pammu, Kwen-Siong Chong, Bah-Hwee Gwee Adv. Sci. Technol. Eng. Syst. J. 2(3), 420-426 (2017); View Description Service Productivity and Complexity in Medical Rescue Services Markus Harlacher, Andreas Petz, Philipp Przybysz, Olivia Chaillié, Susanne Mütze-Niewöhner Adv. Sci. Technol. Eng. Syst. J. 2(3), 427-434 (2017); View Description Principal Component Analysis Application on Flavonoids Characterization Che Hafizah Che Noh, Nor Fadhillah Mohamed Azmin, Azura Amid Adv. Sci. Technol. Eng. Syst. J. 2(3), 435-440 (2017); View Description A Reconfigurable Metal-Plasma Yagi-Yuda Antenna for Microwave Applications Giulia Mansutti, Davide Melazzi, Antonio-Daniele Capobianco Adv. Sci. Technol. Eng. Syst. J. 2(3), 441-448 (2017); View Description Verifying the Detection Results of Impersonation Attacks in Service Clouds Sarra Alqahtani, Rose Gamble Adv. Sci. Technol. Eng. Syst. J. 2(3), 449-459 (2017); View Description Image Segmentation Using Fuzzy Inference System on YCbCr Color Model Alvaro Anzueto-Rios, Jose Antonio Moreno-Cadenas, Felipe Gómez-Castañeda, Sergio Garduza-Gonzalez Adv. Sci. Technol. Eng. Syst. J. 2(3), 460-468 (2017); View Description Segmented and Detailed Visualization of Anatomical Structures based on Augmented Reality for Health Education and Knowledge Discovery Isabel Cristina Siqueira da Silva, Gerson Klein, Denise Munchen Brandão Adv. Sci. Technol. Eng. Syst. J. 2(3), 469-478 (2017); View Description Intrusion detection in cloud computing based attack patterns and risk assessment Ben Charhi Youssef, Mannane Nada, Bendriss Elmehdi, Regragui Boubker Adv. Sci. Technol. Eng. Syst. J. 2(3), 479-484 (2017); View Description Optimal Sizing and Control Strategy of renewable hybrid systems PV-Diesel Generator-Battery: application to the case of Djanet city of Algeria Adel Yahiaoui, Khelifa Benmansour, Mohamed Tadjine Adv. Sci. Technol. Eng. Syst. J. 2(3), 485-491 (2017); View Description RFID Antenna Near-field Characterization Using a New 3D Magnetic Field Probe Kassem Jomaa, Fabien Ndagijimana, Hussam Ayad, Majida Fadlallah, Jalal Jomaah Adv. Sci. Technol. Eng. Syst. J. 2(3), 492-497 (2017); View Description Design, Fabrication and Testing of a Dual-Range XY Micro-Motion Stage Driven by Voice Coil Actuators Xavier Herpe, Matthew Dunnigan, Xianwen Kong Adv. Sci. Technol. Eng. Syst. J. 2(3), 498-504 (2017); View Description Self-Organizing Map based Feature Learning in Bio-Signal Processing Marwa Farouk Ibrahim Ibrahim, Adel Ali Al-Jumaily Adv. Sci. Technol. Eng. Syst. J. 2(3), 505-512 (2017); View Description A delay-dependent distributed SMC for stabilization of a networked robotic system exposed to external disturbances Fatma Abdelhedi, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 513-519 (2017); View Description Modelization of cognition, activity and motivation as indicators for Interactive Learning Environment Asmaa Darouich, Faddoul Khoukhi, Khadija Douzi Adv. Sci. Technol. Eng. Syst. J. 2(3), 520-531 (2017); View Description Homemade array of surface coils implementation for small animal magnetic resonance imaging Fernando Yepes-Calderon, Olivier Beuf Adv. Sci. Technol. Eng. Syst. J. 2(3), 532-539 (2017); View Description An Encryption Key for Secure Authentication: The Dynamic Solution Zubayr Khalid, Pritam Paul, Khabbab Zakaria, Himadri Nath Saha Adv. Sci. Technol. Eng. Syst. J. 2(3), 540-544 (2017); View Description Multi-Domain Virtual Network Embedding with Coordinated Link Mapping Shuopeng Li, Mohand Yazid Saidi, Ken Chen Adv. Sci. Technol. Eng. Syst. J. 2(3), 545-552 (2017); View Description Semantic-less Breach Detection of Polymorphic Malware in Federated Cloud." Advances in Science, Technology and Engineering Systems Journal 2, no. 3 (June 2017): 553–61. http://dx.doi.org/10.25046/aj020371.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Abdelhedi, Fatma, and Nabil Derbel. "Volume 2, Issue 3, Special issue on Recent Advances in Engineering Systems (Published Papers) Articles Transmit / Received Beamforming for Frequency Diverse Array with Symmetrical frequency offsets Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 1-6 (2017); View Description Detailed Analysis of Amplitude and Slope Diffraction Coefficients for knife-edge structure in S-UTD-CH Model Eray Arik, Mehmet Baris Tabakcioglu Adv. Sci. Technol. Eng. Syst. J. 2(3), 7-11 (2017); View Description Applications of Case Based Organizational Memory Supported by the PAbMM Architecture Martín, María de los Ángeles, Diván, Mario José Adv. Sci. Technol. Eng. Syst. J. 2(3), 12-23 (2017); View Description Low Probability of Interception Beampattern Using Frequency Diverse Array Antenna Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 24-29 (2017); View Description Zero Trust Cloud Networks using Transport Access Control and High Availability Optical Bypass Switching Casimer DeCusatis, Piradon Liengtiraphan, Anthony Sager Adv. Sci. Technol. Eng. Syst. J. 2(3), 30-35 (2017); View Description A Derived Metrics as a Measurement to Support Efficient Requirements Analysis and Release Management Indranil Nath Adv. Sci. Technol. Eng. Syst. J. 2(3), 36-40 (2017); View Description Feedback device of temperature sensation for a myoelectric prosthetic hand Yuki Ueda, Chiharu Ishii Adv. Sci. Technol. Eng. Syst. J. 2(3), 41-40 (2017); View Description Deep venous thrombus characterization: ultrasonography, elastography and scattering operator Thibaud Berthomier, Ali Mansour, Luc Bressollette, Frédéric Le Roy, Dominique Mottier Adv. Sci. Technol. Eng. Syst. J. 2(3), 48-59 (2017); View Description Improving customs’ border control by creating a reference database of cargo inspection X-ray images Selina Kolokytha, Alexander Flisch, Thomas Lüthi, Mathieu Plamondon, Adrian Schwaninger, Wicher Vasser, Diana Hardmeier, Marius Costin, Caroline Vienne, Frank Sukowski, Ulf Hassler, Irène Dorion, Najib Gadi, Serge Maitrejean, Abraham Marciano, Andrea Canonica, Eric Rochat, Ger Koomen, Micha Slegt Adv. Sci. Technol. Eng. Syst. J. 2(3), 60-66 (2017); View Description Aviation Navigation with Use of Polarimetric Technologies Arsen Klochan, Ali Al-Ammouri, Viktor Romanenko, Vladimir Tronko Adv. Sci. Technol. Eng. Syst. J. 2(3), 67-72 (2017); View Description Optimization of Multi-standard Transmitter Architecture Using Single-Double Conversion Technique Used for Rescue Operations Riadh Essaadali, Said Aliouane, Chokri Jebali and Ammar Kouki Adv. Sci. Technol. Eng. Syst. J. 2(3), 73-81 (2017); View Description Singular Integral Equations in Electromagnetic Waves Reflection Modeling A. S. Ilinskiy, T. N. Galishnikova Adv. Sci. Technol. Eng. Syst. J. 2(3), 82-87 (2017); View Description Methodology for Management of Information Security in Industrial Control Systems: A Proof of Concept aligned with Enterprise Objectives. Fabian Bustamante, Walter Fuertes, Paul Diaz, Theofilos Toulqueridis Adv. Sci. Technol. Eng. Syst. J. 2(3), 88-99 (2017); View Description Dependence-Based Segmentation Approach for Detecting Morpheme Boundaries Ahmed Khorsi, Abeer Alsheddi Adv. Sci. Technol. Eng. Syst. J. 2(3), 100-110 (2017); View Description Paper Improving Rule Based Stemmers to Solve Some Special Cases of Arabic Language Soufiane Farrah, Hanane El Manssouri, Ziyati Elhoussaine, Mohamed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 111-115 (2017); View Description Medical imbalanced data classification Sara Belarouci, Mohammed Amine Chikh Adv. Sci. Technol. Eng. Syst. J. 2(3), 116-124 (2017); View Description ADOxx Modelling Method Conceptualization Environment Nesat Efendioglu, Robert Woitsch, Wilfrid Utz, Damiano Falcioni Adv. Sci. Technol. Eng. Syst. J. 2(3), 125-136 (2017); View Description GPSR+Predict: An Enhancement for GPSR to Make Smart Routing Decision by Anticipating Movement of Vehicles in VANETs Zineb Squalli Houssaini, Imane Zaimi, Mohammed Oumsis, Saïd El Alaoui Ouatik Adv. Sci. Technol. Eng. Syst. J. 2(3), 137-146 (2017); View Description Optimal Synthesis of Universal Space Vector Digital Algorithm for Matrix Converters Adrian Popovici, Mircea Băbăiţă, Petru Papazian Adv. Sci. Technol. Eng. Syst. J. 2(3), 147-152 (2017); View Description Control design for axial flux permanent magnet synchronous motor which operates above the nominal speed Xuan Minh Tran, Nhu Hien Nguyen, Quoc Tuan Duong Adv. Sci. Technol. Eng. Syst. J. 2(3), 153-159 (2017); View Description A synchronizing second order sliding mode control applied to decentralized time delayed multi−agent robotic systems: Stability Proof Marwa Fathallah, Fatma Abdelhedi, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 160-170 (2017); View Description Fault Diagnosis and Tolerant Control Using Observer Banks Applied to Continuous Stirred Tank Reactor Martin F. Pico, Eduardo J. Adam Adv. Sci. Technol. Eng. Syst. J. 2(3), 171-181 (2017); View Description Development and Validation of a Heat Pump System Model Using Artificial Neural Network Nabil Nassif, Jordan Gooden Adv. Sci. Technol. Eng. Syst. J. 2(3), 182-185 (2017); View Description Assessment of the usefulness and appeal of stigma-stop by psychology students: a serious game designed to reduce the stigma of mental illness Adolfo J. Cangas, Noelia Navarro, Juan J. Ojeda, Diego Cangas, Jose A. Piedra, José Gallego Adv. Sci. Technol. Eng. Syst. J. 2(3), 186-190 (2017); View Description Kinect-Based Moving Human Tracking System with Obstacle Avoidance Abdel Mehsen Ahmad, Zouhair Bazzal, Hiba Al Youssef Adv. Sci. Technol. Eng. Syst. J. 2(3), 191-197 (2017); View Description A security approach based on honeypots: Protecting Online Social network from malicious profiles Fatna Elmendili, Nisrine Maqran, Younes El Bouzekri El Idrissi, Habiba Chaoui Adv. Sci. Technol. Eng. Syst. J. 2(3), 198-204 (2017); View Description Pulse Generator for Ultrasonic Piezoelectric Transducer Arrays Based on a Programmable System-on-Chip (PSoC) Pedro Acevedo, Martín Fuentes, Joel Durán, Mónica Vázquez, Carlos Díaz Adv. Sci. Technol. Eng. Syst. J. 2(3), 205-209 (2017); View Description Enabling Toy Vehicles Interaction With Visible Light Communication (VLC) M. A. Ilyas, M. B. Othman, S. M. Shah, Mas Fawzi Adv. Sci. Technol. Eng. Syst. J. 2(3), 210-216 (2017); View Description Analysis of Fractional-Order 2xn RLC Networks by Transmission Matrices Mahmut Ün, Manolya Ün Adv. Sci. Technol. Eng. Syst. J. 2(3), 217-220 (2017); View Description Fire extinguishing system in large underground garages Ivan Antonov, Rositsa Velichkova, Svetlin Antonov, Kamen Grozdanov, Milka Uzunova, Ikram El Abbassi Adv. Sci. Technol. Eng. Syst. J. 2(3), 221-226 (2017); View Description Directional Antenna Modulation Technique using A Two-Element Frequency Diverse Array Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 227-232 (2017); View Description Classifying region of interests from mammograms with breast cancer into BIRADS using Artificial Neural Networks Estefanía D. Avalos-Rivera, Alberto de J. Pastrana-Palma Adv. Sci. Technol. Eng. Syst. J. 2(3), 233-240 (2017); View Description Magnetically Levitated and Guided Systems Florian Puci, Miroslav Husak Adv. Sci. Technol. Eng. Syst. J. 2(3), 241-244 (2017); View Description Energy-Efficient Mobile Sensing in Distributed Multi-Agent Sensor Networks Minh T. Nguyen Adv. Sci. Technol. Eng. Syst. J. 2(3), 245-253 (2017); View Description Validity and efficiency of conformal anomaly detection on big distributed data Ilia Nouretdinov Adv. Sci. Technol. Eng. Syst. J. 2(3), 254-267 (2017); View Description S-Parameters Optimization in both Segmented and Unsegmented Insulated TSV upto 40GHz Frequency Juma Mary Atieno, Xuliang Zhang, HE Song Bai Adv. Sci. Technol. Eng. Syst. J. 2(3), 268-276 (2017); View Description Synthesis of Important Design Criteria for Future Vehicle Electric System Lisa Braun, Eric Sax Adv. Sci. Technol. Eng. Syst. J. 2(3), 277-283 (2017); View Description Gestural Interaction for Virtual Reality Environments through Data Gloves G. Rodriguez, N. Jofre, Y. Alvarado, J. Fernández, R. Guerrero Adv. Sci. Technol. Eng. Syst. J. 2(3), 284-290 (2017); View Description Solving the Capacitated Network Design Problem in Two Steps Meriem Khelifi, Mohand Yazid Saidi, Saadi Boudjit Adv. Sci. Technol. Eng. Syst. J. 2(3), 291-301 (2017); View Description A Computationally Intelligent Approach to the Detection of Wormhole Attacks in Wireless Sensor Networks Mohammad Nurul Afsar Shaon, Ken Ferens Adv. Sci. Technol. Eng. Syst. J. 2(3), 302-320 (2017); View Description Real Time Advanced Clustering System Giuseppe Spampinato, Arcangelo Ranieri Bruna, Salvatore Curti, Viviana D’Alto Adv. Sci. Technol. Eng. Syst. J. 2(3), 321-326 (2017); View Description Indoor Mobile Robot Navigation in Unknown Environment Using Fuzzy Logic Based Behaviors Khalid Al-Mutib, Foudil Abdessemed Adv. Sci. Technol. Eng. Syst. J. 2(3), 327-337 (2017); View Description Validity of Mind Monitoring System as a Mental Health Indicator using Voice Naoki Hagiwara, Yasuhiro Omiya, Shuji Shinohara, Mitsuteru Nakamura, Masakazu Higuchi, Shunji Mitsuyoshi, Hideo Yasunaga, Shinichi Tokuno Adv. Sci. Technol. Eng. Syst. J. 2(3), 338-344 (2017); View Description The Model of Adaptive Learning Objects for virtual environments instanced by the competencies Carlos Guevara, Jose Aguilar, Alexandra González-Eras Adv. Sci. Technol. Eng. Syst. J. 2(3), 345-355 (2017); View Description An Overview of Traceability: Towards a general multi-domain model Kamal Souali, Othmane Rahmaoui, Mohammed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 356-361 (2017); View Description L-Band SiGe HBT Active Differential Equalizers with Variable, Positive or Negative Gain Slopes Using Dual-Resonant RLC Circuits Yasushi Itoh, Hiroaki Takagi Adv. Sci. Technol. Eng. Syst. J. 2(3), 362-368 (2017); View Description Moving Towards Reliability-Centred Management of Energy, Power and Transportation Assets Kang Seng Seow, Loc K. Nguyen, Kelvin Tan, Kees-Jan Van Oeveren Adv. Sci. Technol. Eng. Syst. J. 2(3), 369-375 (2017); View Description Secure Path Selection under Random Fading Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 376-383 (2017); View Description Security in SWIPT with Power Splitting Eavesdropper Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 384-388 (2017); View Description Performance Analysis of Phased Array and Frequency Diverse Array Radar Ambiguity Functions Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 389-394 (2017); View Description Adaptive Discrete-time Fuzzy Sliding Mode Control For a Class of Chaotic Systems Hanene Medhaffar, Moez Feki, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 395-400 (2017); View Description Fault Tolerant Inverter Topology for the Sustainable Drive of an Electrical Helicopter Igor Bolvashenkov, Jörg Kammermann, Taha Lahlou, Hans-Georg Herzog Adv. Sci. Technol. Eng. Syst. J. 2(3), 401-411 (2017); View Description Computational Intelligence Methods for Identifying Voltage Sag in Smart Grid Turgay Yalcin, Muammer Ozdemir Adv. Sci. Technol. Eng. Syst. J. 2(3), 412-419 (2017); View Description A Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation Ali Akbar Pammu, Kwen-Siong Chong, Bah-Hwee Gwee Adv. Sci. Technol. Eng. Syst. J. 2(3), 420-426 (2017); View Description Service Productivity and Complexity in Medical Rescue Services Markus Harlacher, Andreas Petz, Philipp Przybysz, Olivia Chaillié, Susanne Mütze-Niewöhner Adv. Sci. Technol. Eng. Syst. J. 2(3), 427-434 (2017); View Description Principal Component Analysis Application on Flavonoids Characterization Che Hafizah Che Noh, Nor Fadhillah Mohamed Azmin, Azura Amid Adv. Sci. Technol. Eng. Syst. J. 2(3), 435-440 (2017); View Description A Reconfigurable Metal-Plasma Yagi-Yuda Antenna for Microwave Applications Giulia Mansutti, Davide Melazzi, Antonio-Daniele Capobianco Adv. Sci. Technol. Eng. Syst. J. 2(3), 441-448 (2017); View Description Verifying the Detection Results of Impersonation Attacks in Service Clouds Sarra Alqahtani, Rose Gamble Adv. Sci. Technol. Eng. Syst. J. 2(3), 449-459 (2017); View Description Image Segmentation Using Fuzzy Inference System on YCbCr Color Model Alvaro Anzueto-Rios, Jose Antonio Moreno-Cadenas, Felipe Gómez-Castañeda, Sergio Garduza-Gonzalez Adv. Sci. Technol. Eng. Syst. J. 2(3), 460-468 (2017); View Description Segmented and Detailed Visualization of Anatomical Structures based on Augmented Reality for Health Education and Knowledge Discovery Isabel Cristina Siqueira da Silva, Gerson Klein, Denise Munchen Brandão Adv. Sci. Technol. Eng. Syst. J. 2(3), 469-478 (2017); View Description Intrusion detection in cloud computing based attack patterns and risk assessment Ben Charhi Youssef, Mannane Nada, Bendriss Elmehdi, Regragui Boubker Adv. Sci. Technol. Eng. Syst. J. 2(3), 479-484 (2017); View Description Optimal Sizing and Control Strategy of renewable hybrid systems PV-Diesel Generator-Battery: application to the case of Djanet city of Algeria Adel Yahiaoui, Khelifa Benmansour, Mohamed Tadjine Adv. Sci. Technol. Eng. Syst. J. 2(3), 485-491 (2017); View Description RFID Antenna Near-field Characterization Using a New 3D Magnetic Field Probe Kassem Jomaa, Fabien Ndagijimana, Hussam Ayad, Majida Fadlallah, Jalal Jomaah Adv. Sci. Technol. Eng. Syst. J. 2(3), 492-497 (2017); View Description Design, Fabrication and Testing of a Dual-Range XY Micro-Motion Stage Driven by Voice Coil Actuators Xavier Herpe, Matthew Dunnigan, Xianwen Kong Adv. Sci. Technol. Eng. Syst. J. 2(3), 498-504 (2017); View Description Self-Organizing Map based Feature Learning in Bio-Signal Processing Marwa Farouk Ibrahim Ibrahim, Adel Ali Al-Jumaily Adv. Sci. Technol. Eng. Syst. J. 2(3), 505-512 (2017); View Description A delay-dependent distributed SMC for stabilization of a networked robotic system exposed to external disturbances." Advances in Science, Technology and Engineering Systems Journal 2, no. 3 (June 2016): 513–19. http://dx.doi.org/10.25046/aj020366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Anjali, Anjali, and Manisha Sabharwal. "Perceived Barriers of Young Adults for Participation in Physical Activity." Current Research in Nutrition and Food Science Journal 6, no. 2 (August 25, 2018): 437–49. http://dx.doi.org/10.12944/crnfsj.6.2.18.

Full text
Abstract:
This study aimed to explore the perceived barriers to physical activity among college students Study Design: Qualitative research design Eight focus group discussions on 67 college students aged 18-24 years (48 females, 19 males) was conducted on College premises. Data were analysed using inductive approach. Participants identified a number of obstacles to physical activity. Perceived barriers emerged from the analysis of the data addressed the different dimensions of the socio-ecological framework. The result indicated that the young adults perceived substantial amount of personal, social and environmental factors as barriers such as time constraint, tiredness, stress, family control, safety issues and much more. Understanding the barriers and overcoming the barriers at this stage will be valuable. Health professionals and researchers can use this information to design and implement interventions, strategies and policies to promote the participation in physical activity. This further can help the students to deal with those barriers and can help to instil the habit of regular physical activity in the later adult years.
APA, Harvard, Vancouver, ISO, and other styles
18

Zhou, Wenliang, and David Chelidze. "Generalized Eigenvalue Decomposition in Time Domain Modal Parameter Identification." Journal of Vibration and Acoustics 130, no. 1 (November 12, 2007). http://dx.doi.org/10.1115/1.2775509.

Full text
Abstract:
This paper is intended to point out the relationship among current time domain modal analysis methods by employing generalized eigenvalue decomposition. Ibrahim time domain (ITD), least-squares complex exponential (LSCE) and eigensystem realization algorithm (ERA) methods are reviewed and chosen to do the comparison. Reformulation to their original forms shows these three methods can all be attributed to a generalized eigenvalue problem with different matrix pairs. With this general format, we can see that single-input multioutput (SIMO) methods can easily be extended to multi-input multioutput (MIMO) cases by taking advantage of a generalized Hankel matrix or a generalized Toeplitz matrix.
APA, Harvard, Vancouver, ISO, and other styles
19

Ibrahim, Yasmin. "Commodifying Terrorism." M/C Journal 10, no. 3 (June 1, 2007). http://dx.doi.org/10.5204/mcj.2665.

Full text
Abstract:
Introduction Figure 1 The counter-Terrorism advertising campaign of London’s Metropolitan Police commodifies some everyday items such as mobile phones, computers, passports and credit cards as having the potential to sustain terrorist activities. The process of ascribing cultural values and symbolic meanings to some everyday technical gadgets objectifies and situates Terrorism into the everyday life. The police, in urging people to look out for ‘the unusual’ in their normal day-to-day lives, juxtapose the everyday with the unusual, where day-to-day consumption, routines and flows of human activity can seemingly house insidious and atavistic elements. This again is reiterated in the Met police press release: Terrorists live within our communities making their plans whilst doing everything they can to blend in, and trying not to raise suspicions about their activities. (MPA Website) The commodification of Terrorism through uncommon and everyday objects situates Terrorism as a phenomenon which occupies a liminal space within the everyday. It resides, breathes and co-exists within the taken-for-granted routines and objects of ‘the everyday’ where it has the potential to explode and disrupt without warning. Since 9/11 and the 7/7 bombings Terrorism has been narrated through the disruption of mobility, whether in mid-air or in the deep recesses of the Underground. The resonant thread of disruption to human mobility evokes a powerful meta-narrative where acts of Terrorism can halt human agency amidst the backdrop of the metropolis, which is often a metaphor for speed and accelerated activities. If globalisation and the interconnected nature of the world are understood through discourses of risk, Terrorism bears the same footprint in urban spaces of modernity, narrating the vulnerability of the human condition in an inter-linked world where ideological struggles and resistance are manifested through inexplicable violence and destruction of lives, where the everyday is suspended to embrace the unexpected. As a consequence ambient fear “saturates the social spaces of everyday life” (Hubbard 2). The commodification of Terrorism through everyday items of consumption inevitably creates an intertextuality with real and media events, which constantly corrode the security of the metropolis. Paddy Scannell alludes to a doubling of place in our mediated world where “public events now occur simultaneously in two different places; the place of the event itself and that in which it is watched and heard. The media then vacillates between the two sites and creates experiences of simultaneity, liveness and immediacy” (qtd. in Moores 22). The doubling of place through media constructs a pervasive environment of risk and fear. Mark Danner (qtd. in Bauman 106) points out that the most powerful weapon of the 9/11 terrorists was that innocuous and “most American of technological creations: the television set” which provided a global platform to constantly replay and remember the dreadful scenes of the day, enabling the terrorist to appear invincible and to narrate fear as ubiquitous and omnipresent. Philip Abrams argues that ‘big events’ (such as 9/11 and 7/7) do make a difference in the social world for such events function as a transformative device between the past and future, forcing society to alter or transform its perspectives. David Altheide points out that since September 11 and the ensuing war on terror, a new discourse of Terrorism has emerged as a way of expressing how the world has changed and defining a state of constant alert through a media logic and format that shapes the nature of discourse itself. Consequently, the intensity and centralisation of surveillance in Western countries increased dramatically, placing the emphasis on expanding the forms of the already existing range of surveillance processes and practices that circumscribe and help shape our social existence (Lyon, Terrorism 2). Normalisation of Surveillance The role of technologies, particularly information and communication technologies (ICTs), and other infrastructures to unevenly distribute access to the goods and services necessary for modern life, while facilitating data collection on and control of the public, are significant characteristics of modernity (Reiman; Graham and Marvin; Monahan). The embedding of technological surveillance into spaces and infrastructures not only augment social control but also redefine data as a form of capital which can be shared between public and private sectors (Gandy, Data Mining; O’Harrow; Monahan). The scale, complexity and limitations of omnipresent and omnipotent surveillance, nevertheless, offer room for both subversion as well as new forms of domination and oppression (Marx). In surveillance studies, Foucault’s analysis is often heavily employed to explain lines of continuity and change between earlier forms of surveillance and data assemblage and contemporary forms in the shape of closed-circuit television (CCTV) and other surveillance modes (Dee). It establishes the need to discern patterns of power and normalisation and the subliminal or obvious cultural codes and categories that emerge through these arrangements (Fopp; Lyon, Electronic; Norris and Armstrong). In their study of CCTV surveillance, Norris and Armstrong (cf. in Dee) point out that when added to the daily minutiae of surveillance, CCTV cameras in public spaces, along with other camera surveillance in work places, capture human beings on a database constantly. The normalisation of surveillance, particularly with reference to CCTV, the popularisation of surveillance through television formats such as ‘Big Brother’ (Dee), and the expansion of online platforms to publish private images, has created a contradictory, complex and contested nature of spatial and power relationships in society. The UK, for example, has the most developed system of both urban and public space cameras in the world and this growth of camera surveillance and, as Lyon (Surveillance) points out, this has been achieved with very little, if any, public debate as to their benefits or otherwise. There may now be as many as 4.2 million CCTV cameras in Britain (cf. Lyon, Surveillance). That is one for every fourteen people and a person can be captured on over 300 cameras every day. An estimated £500m of public money has been invested in CCTV infrastructure over the last decade but, according to a Home Office study, CCTV schemes that have been assessed had little overall effect on crime levels (Wood and Ball). In spatial terms, these statistics reiterate Foucault’s emphasis on the power economy of the unseen gaze. Michel Foucault in analysing the links between power, information and surveillance inspired by Bentham’s idea of the Panopticon, indicated that it is possible to sanction or reward an individual through the act of surveillance without their knowledge (155). It is this unseen and unknown gaze of surveillance that is fundamental to the exercise of power. The design and arrangement of buildings can be engineered so that the “surveillance is permanent in its effects, even if it is discontinuous in its action” (Foucault 201). Lyon (Terrorism), in tracing the trajectory of surveillance studies, points out that much of surveillance literature has focused on understanding it as a centralised bureaucratic relationship between the powerful and the governed. Invisible forms of surveillance have also been viewed as a class weapon in some societies. With the advancements in and proliferation of surveillance technologies as well as convergence with other technologies, Lyon argues that it is no longer feasible to view surveillance as a linear or centralised process. In our contemporary globalised world, there is a need to reconcile the dialectical strands that mediate surveillance as a process. In acknowledging this, Giles Deleuze and Felix Guattari have constructed surveillance as a rhizome that defies linearity to appropriate a more convoluted and malleable form where the coding of bodies and data can be enmeshed to produce intricate power relationships and hierarchies within societies. Latour draws on the notion of assemblage by propounding that data is amalgamated from scattered centres of calculation where these can range from state and commercial institutions to scientific laboratories which scrutinise data to conceive governance and control strategies. Both the Latourian and Deleuzian ideas of surveillance highlight the disparate arrays of people, technologies and organisations that become connected to make “surveillance assemblages” in contrast to the static, unidirectional Panopticon metaphor (Ball, “Organization” 93). In a similar vein, Gandy (Panoptic) infers that it is misleading to assume that surveillance in practice is as complete and totalising as the Panoptic ideal type would have us believe. Co-optation of Millions The Metropolitan Police’s counter-Terrorism strategy seeks to co-opt millions where the corporeal body can complement the landscape of technological surveillance that already co-exists within modernity. In its press release, the role of civilian bodies in ensuring security of the city is stressed; Keeping Londoners safe from Terrorism is not a job solely for governments, security services or police. If we are to make London the safest major city in the world, we must mobilise against Terrorism not only the resources of the state, but also the active support of the millions of people who live and work in the capita. (MPA Website). Surveillance is increasingly simulated through the millions of corporeal entities where seeing in advance is the goal even before technology records and codes these images (William). Bodies understand and code risk and images through the cultural narratives which circulate in society. Compared to CCTV technology images, which require cultural and political interpretations and interventions, bodies as surveillance organisms implicitly code other bodies and activities. The travel bag in the Metropolitan Police poster reinforces the images of the 7/7 bombers and the renewed attempts to bomb the London Underground on the 21st of July. It reiterates the CCTV footage revealing images of the bombers wearing rucksacks. The image of the rucksack both embodies the everyday as well as the potential for evil in everyday objects. It also inevitably reproduces the cultural biases and prejudices where the rucksack is subliminally associated with a specific type of body. The rucksack in these terms is a laden image which symbolically captures the context and culture of risk discourses in society. The co-optation of the population as a surveillance entity also recasts new forms of social responsibility within the democratic polity, where privacy is increasingly mediated by the greater need to monitor, trace and record the activities of one another. Nikolas Rose, in discussing the increasing ‘responsibilisation’ of individuals in modern societies, describes the process in which the individual accepts responsibility for personal actions across a wide range of fields of social and economic activity as in the choice of diet, savings and pension arrangements, health care decisions and choices, home security measures and personal investment choices (qtd. in Dee). While surveillance in individualistic terms is often viewed as a threat to privacy, Rose argues that the state of ‘advanced liberalism’ within modernity and post-modernity requires considerable degrees of self-governance, regulation and surveillance whereby the individual is constructed both as a ‘new citizen’ and a key site of self management. By co-opting and recasting the role of the citizen in the age of Terrorism, the citizen to a degree accepts responsibility for both surveillance and security. In our sociological imagination the body is constructed both as lived as well as a social object. Erving Goffman uses the word ‘umwelt’ to stress that human embodiment is central to the constitution of the social world. Goffman defines ‘umwelt’ as “the region around an individual from which signs of alarm can come” and employs it to capture how people as social actors perceive and manage their settings when interacting in public places (252). Goffman’s ‘umwelt’ can be traced to Immanuel Kant’s idea that it is the a priori categories of space and time that make it possible for a subject to perceive a world (Umiker-Sebeok; qtd. in Ball, “Organization”). Anthony Giddens adapted the term Umwelt to refer to “a phenomenal world with which the individual is routinely ‘in touch’ in respect of potential dangers and alarms which then formed a core of (accomplished) normalcy with which individuals and groups surround themselves” (244). Benjamin Smith, in considering the body as an integral component of the link between our consciousness and our material world, observes that the body is continuously inscribed by culture. These inscriptions, he argues, encompass a wide range of cultural practices and will imply knowledge of a variety of social constructs. The inscribing of the body will produce cultural meanings as well as create forms of subjectivity while locating and situating the body within a cultural matrix (Smith). Drawing on Derrida’s work, Pugliese employs the term ‘Somatechnics’ to conceptualise the body as a culturally intelligible construct and to address the techniques in and through which the body is formed and transformed (qtd. in Osuri). These techniques can encompass signification systems such as race and gender and equally technologies which mediate our sense of reality. These technologies of thinking, seeing, hearing, signifying, visualising and positioning produce the very conditions for the cultural intelligibility of the body (Osuri). The body is then continuously inscribed and interpreted through mediated signifying systems. Similarly, Hayles, while not intending to impose a Cartesian dichotomy between the physical body and its cognitive presence, contends that the use and interactions with technology incorporate the body as a material entity but it also equally inscribes it by marking, recording and tracing its actions in various terrains. According to Gayatri Spivak (qtd. in Ball, “Organization”) new habits and experiences are embedded into the corporeal entity which then mediates its reactions and responses to the social world. This means one’s body is not completely one’s own and the presence of ideological forces or influences then inscribe the body with meanings, codes and cultural values. In our modern condition, the body and data are intimately and intricately bound. Outside the home, it is difficult for the body to avoid entering into relationships that produce electronic personal data (Stalder). According to Felix Stalder our physical bodies are shadowed by a ‘data body’ which follows the physical body of the consuming citizen and sometimes precedes it by constructing the individual through data (12). Before we arrive somewhere, we have already been measured and classified. Thus, upon arrival, the citizen will be treated according to the criteria ‘connected with the profile that represents us’ (Gandy, Panoptic; William). Following September 11, Lyon (Terrorism) reveals that surveillance data from a myriad of sources, such as supermarkets, motels, traffic control points, credit card transactions records and so on, was used to trace the activities of terrorists in the days and hours before their attacks, confirming that the body leaves data traces and trails. Surveillance works by abstracting bodies from places and splitting them into flows to be reassembled as virtual data-doubles, and in the process can replicate hierarchies and centralise power (Lyon, Terrorism). Mike Dee points out that the nature of surveillance taking place in modern societies is complex and far-reaching and in many ways insidious as surveillance needs to be situated within the broadest context of everyday human acts whether it is shopping with loyalty cards or paying utility bills. Physical vulnerability of the body becomes more complex in the time-space distanciated surveillance systems to which the body has become increasingly exposed. As such, each transaction – whether it be a phone call, credit card transaction, or Internet search – leaves a ‘data trail’ linkable to an individual person or place. Haggerty and Ericson, drawing from Deleuze and Guattari’s concept of the assemblage, describe the convergence and spread of data-gathering systems between different social domains and multiple levels (qtd. in Hier). They argue that the target of the generic ‘surveillance assemblage’ is the human body, which is broken into a series of data flows on which surveillance process is based. The thrust of the focus is the data individuals can yield and the categories to which they can contribute. These are then reapplied to the body. In this sense, surveillance is rhizomatic for it is diverse and connected to an underlying, invisible infrastructure which concerns interconnected technologies in multiple contexts (Ball, “Elements”). The co-opted body in the schema of counter-Terrorism enters a power arrangement where it constitutes both the unseen gaze as well as the data that will be implicated and captured in this arrangement. It is capable of producing surveillance data for those in power while creating new data through its transactions and movements in its everyday life. The body is unequivocally constructed through this data and is also entrapped by it in terms of representation and categorisation. The corporeal body is therefore part of the machinery of surveillance while being vulnerable to its discriminatory powers of categorisation and victimisation. As Hannah Arendt (qtd. in Bauman 91) had warned, “we terrestrial creatures bidding for cosmic significance will shortly be unable to comprehend and articulate the things we are capable of doing” Arendt’s caution conveys the complexity, vulnerability as well as the complicity of the human condition in the surveillance society. Equally it exemplifies how the corporeal body can be co-opted as a surveillance entity sustaining a new ‘banality’ (Arendt) in the machinery of surveillance. Social Consequences of Surveillance Lyon (Terrorism) observed that the events of 9/11 and 7/7 in the UK have inevitably become a prism through which aspects of social structure and processes may be viewed. This prism helps to illuminate the already existing vast range of surveillance practices and processes that touch everyday life in so-called information societies. As Lyon (Terrorism) points out surveillance is always ambiguous and can encompass genuine benefits and plausible rationales as well as palpable disadvantages. There are elements of representation to consider in terms of how surveillance technologies can re-present data that are collected at source or gathered from another technological medium, and these representations bring different meanings and enable different interpretations of life and surveillance (Ball, “Elements”). As such surveillance needs to be viewed in a number of ways: practice, knowledge and protection from threat. As data can be manipulated and interpreted according to cultural values and norms it reflects the inevitability of power relations to forge its identity in a surveillance society. In this sense, Ball (“Elements”) concludes surveillance practices capture and create different versions of life as lived by surveilled subjects. She refers to actors within the surveilled domain as ‘intermediaries’, where meaning is inscribed, where technologies re-present information, where power/resistance operates, and where networks are bound together to sometimes distort as well as reiterate patterns of hegemony (“Elements” 93). While surveillance is often connected with technology, it does not however determine nor decide how we code or employ our data. New technologies rarely enter passive environments of total inequality for they become enmeshed in complex pre-existing power and value systems (Marx). With surveillance there is an emphasis on the classificatory powers in our contemporary world “as persons and groups are often risk-profiled in the commercial sphere which rates their social contributions and sorts them into systems” (Lyon, Terrorism 2). Lyon (Terrorism) contends that the surveillance society is one that is organised and structured using surveillance-based techniques recorded by technologies, on behalf of the organisations and governments that structure our society. This information is then sorted, sifted and categorised and used as a basis for decisions which affect our life chances (Wood and Ball). The emergence of pervasive, automated and discriminatory mechanisms for risk profiling and social categorising constitute a significant mechanism for reproducing and reinforcing social, economic and cultural divisions in information societies. Such automated categorisation, Lyon (Terrorism) warns, has consequences for everyone especially in face of the new anti-terror measures enacted after September 11. In tandem with this, Bauman points out that a few suicidal murderers on the loose will be quite enough to recycle thousands of innocents into the “usual suspects”. In no time, a few iniquitous individual choices will be reprocessed into the attributes of a “category”; a category easily recognisable by, for instance, a suspiciously dark skin or a suspiciously bulky rucksack* *the kind of object which CCTV cameras are designed to note and passers-by are told to be vigilant about. And passers-by are keen to oblige. Since the terrorist atrocities on the London Underground, the volume of incidents classified as “racist attacks” rose sharply around the country. (122; emphasis added) Bauman, drawing on Lyon, asserts that the understandable desire for security combined with the pressure to adopt different kind of systems “will create a culture of control that will colonise more areas of life with or without the consent of the citizen” (123). This means that the inhabitants of the urban space whether a citizen, worker or consumer who has no terrorist ambitions whatsoever will discover that their opportunities are more circumscribed by the subject positions or categories which are imposed on them. Bauman cautions that for some these categories may be extremely prejudicial, restricting them from consumer choices because of credit ratings, or more insidiously, relegating them to second-class status because of their colour or ethnic background (124). Joseph Pugliese, in linking visual regimes of racial profiling and the shooting of Jean Charles de Menezes in the aftermath of 7/7 bombings in London, suggests that the discursive relations of power and visuality are inextricably bound. Pugliese argues that racial profiling creates a regime of visuality which fundamentally inscribes our physiology of perceptions with stereotypical images. He applies this analogy to Menzes running down the platform in which the retina transforms him into the “hallucinogenic figure of an Asian Terrorist” (Pugliese 8). With globalisation and the proliferation of ICTs, borders and boundaries are no longer sacrosanct and as such risks are managed by enacting ‘smart borders’ through new technologies, with huge databases behind the scenes processing information about individuals and their journeys through the profiling of body parts with, for example, iris scans (Wood and Ball 31). Such body profiling technologies are used to create watch lists of dangerous passengers or identity groups who might be of greater ‘risk’. The body in a surveillance society can be dissected into parts and profiled and coded through technology. These disparate codings of body parts can be assembled (or selectively omitted) to construct and represent whole bodies in our information society to ascertain risk. The selection and circulation of knowledge will also determine who gets slotted into the various categories that a surveillance society creates. Conclusion When the corporeal body is subsumed into a web of surveillance it often raises questions about the deterministic nature of technology. The question is a long-standing one in our modern consciousness. We are apprehensive about according technology too much power and yet it is implicated in the contemporary power relationships where it is suspended amidst human motive, agency and anxiety. The emergence of surveillance societies, the co-optation of bodies in surveillance schemas, as well as the construction of the body through data in everyday transactions, conveys both the vulnerabilities of the human condition as well as its complicity in maintaining the power arrangements in society. Bauman, in citing Jacques Ellul and Hannah Arendt, points out that we suffer a ‘moral lag’ in so far as technology and society are concerned, for often we ruminate on the consequences of our actions and motives only as afterthoughts without realising at this point of existence that the “actions we take are most commonly prompted by the resources (including technology) at our disposal” (91). References Abrams, Philip. Historical Sociology. Shepton Mallet, UK: Open Books, 1982. Altheide, David. “Consuming Terrorism.” Symbolic Interaction 27.3 (2004): 289-308. Arendt, Hannah. Eichmann in Jerusalem: A Report on the Banality of Evil. London: Faber & Faber, 1963. Bauman, Zygmunt. Liquid Fear. Cambridge, UK: Polity, 2006. Ball, Kristie. “Elements of Surveillance: A New Framework and Future Research Direction.” Information, Communication and Society 5.4 (2002): 573-90 ———. “Organization, Surveillance and the Body: Towards a Politics of Resistance.” Organization 12 (2005): 89-108. Dee, Mike. “The New Citizenship of the Risk and Surveillance Society – From a Citizenship of Hope to a Citizenship of Fear?” Paper Presented to the Social Change in the 21st Century Conference, Queensland University of Technology, Queensland, Australia, 22 Nov. 2002. 14 April 2007 http://eprints.qut.edu.au/archive/00005508/02/5508.pdf>. Deleuze, Gilles, and Felix Guattari. A Thousand Plateaus. Minneapolis: U of Minnesota P, 1987. Fopp, Rodney. “Increasing the Potential for Gaze, Surveillance and Normalization: The Transformation of an Australian Policy for People and Homeless.” Surveillance and Society 1.1 (2002): 48-65. Foucault, Michel. Discipline and Punish: The Birth of the Prison. London: Allen Lane, 1977. Giddens, Anthony. Modernity and Self-Identity. Self and Society in the Late Modern Age. Stanford: Stanford UP, 1991. Gandy, Oscar. The Panoptic Sort: A Political Economy of Personal Information. Boulder, CO: Westview, 1997. ———. “Data Mining and Surveillance in the Post 9/11 Environment.” The Intensification of Surveillance: Crime, Terrorism and War in the Information Age. Eds. Kristie Ball and Frank Webster. Sterling, VA: Pluto Press, 2003. Goffman, Erving. Relations in Public. Harmondsworth: Penguin, 1971. Graham, Stephen, and Simon Marvin. Splintering Urbanism: Networked Infrastructures, Technological Mobilities and the Urban Condition. New York: Routledge, 2001. Hier, Sean. “Probing Surveillance Assemblage: On the Dialectics of Surveillance Practices as Process of Social Control.” Surveillance and Society 1.3 (2003): 399-411. Hayles, Katherine. How We Became Posthuman: Virtual Bodies in Cybernetics, Literature and Informatics. Chicago: U of Chicago P, 1999. Hubbard, Phil. “Fear and Loathing at the Multiplex: Everyday Anxiety in the Post-Industrial City.” Capital & Class 80 (2003). Latour, Bruno. Science in Action. Cambridge, Mass: Harvard UP, 1987 Lyon, David. The Electronic Eye – The Rise of Surveillance Society. Oxford: Polity Press, 1994. ———. “Terrorism and Surveillance: Security, Freedom and Justice after September 11 2001.” Privacy Lecture Series, Queens University, 12 Nov 2001. 16 April 2007 http://privacy.openflows.org/lyon_paper.html>. ———. “Surveillance Studies: Understanding Visibility, Mobility and the Phonetic Fix.” Surveillance and Society 1.1 (2002): 1-7. Metropolitan Police Authority (MPA). “Counter Terrorism: The London Debate.” Press Release. 21 June 2006. 18 April 2007 http://www.mpa.gov.uk.access/issues/comeng/Terrorism.htm>. Pugliese, Joseph. “Asymmetries of Terror: Visual Regimes of Racial Profiling and the Shooting of Jean Charles de Menezes in the Context of the War in Iraq.” Borderlands 5.1 (2006). 30 May 2007 http://www.borderlandsejournal.adelaide.edu.au/vol15no1_2006/ pugliese.htm>. Marx, Gary. “A Tack in the Shoe: Neutralizing and Resisting the New Surveillance.” Journal of Social Issues 59.2 (2003). 18 April 2007 http://web.mit.edu/gtmarx/www/tack.html>. Moores, Shaun. “Doubling of Place.” Mediaspace: Place Scale and Culture in a Media Age. Eds. Nick Couldry and Anna McCarthy. Routledge, London, 2004. Monahan, Teri, ed. Surveillance and Security: Technological Politics and Power in Everyday Life. Routledge: London, 2006. Norris, Clive, and Gary Armstrong. The Maximum Surveillance Society: The Rise of CCTV. Oxford: Berg, 1999. O’Harrow, Robert. No Place to Hide. New York: Free Press, 2005. Osuri, Goldie. “Media Necropower: Australian Media Reception and the Somatechnics of Mamdouh Habib.” Borderlands 5.1 (2006). 30 May 2007 http://www.borderlandsejournal.adelaide.edu.au/vol5no1_2006 osuri_necropower.htm>. Rose, Nikolas. “Government and Control.” British Journal of Criminology 40 (2000): 321–399. Scannell, Paddy. Radio, Television and Modern Life. Oxford: Blackwell, 1996. Smith, Benjamin. “In What Ways, and for What Reasons, Do We Inscribe Our Bodies?” 15 Nov. 1998. 30 May 2007 http:www.bmezine.com/ritual/981115/Whatways.html>. Stalder, Felix. “Privacy Is Not the Antidote to Surveillance.” Surveillance and Society 1.1 (2002): 120-124. Umiker-Sebeok, Jean. “Power and the Construction of Gendered Spaces.” Indiana University-Bloomington. 14 April 2007 http://www.slis.indiana.edu/faculty/umikerse/papers/power.html>. William, Bogard. The Simulation of Surveillance: Hypercontrol in Telematic Societies. Cambridge: Cambridge UP, 1996. Wood, Kristie, and David M. Ball, eds. “A Report on the Surveillance Society.” Surveillance Studies Network, UK, Sep. 2006. 14 April 2007 http://www.ico.gov.uk/upload/documents/library/data_protection/ practical_application/surveillance_society_full_report_2006.pdf>. Citation reference for this article MLA Style Ibrahim, Yasmin. "Commodifying Terrorism: Body, Surveillance and the Everyday." M/C Journal 10.3 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0706/05-ibrahim.php>. APA Style Ibrahim, Y. (Jun. 2007) "Commodifying Terrorism: Body, Surveillance and the Everyday," M/C Journal, 10(3). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0706/05-ibrahim.php>.
APA, Harvard, Vancouver, ISO, and other styles
20

Merchant, Melissa, Katie M. Ellis, and Natalie Latter. "Captions and the Cooking Show." M/C Journal 20, no. 3 (June 21, 2017). http://dx.doi.org/10.5204/mcj.1260.

Full text
Abstract:
While the television cooking genre has evolved in numerous ways to withstand competition and become a constant feature in television programming (Collins and College), it has been argued that audience demand for televisual cooking has always been high because of the daily importance of cooking (Hamada, “Multimedia Integration”). Early cooking shows were characterised by an instructional discourse, before quickly embracing an entertainment focus; modern cooking shows take on a more competitive, out of the kitchen focus (Collins and College). The genre has continued to evolve, with celebrity chefs and ordinary people embracing transmedia affordances to return to the instructional focus of the early cooking shows. While the television cooking show is recognised for its broad cultural impacts related to gender (Ouellette and Hay), cultural capital (Ibrahim; Oren), television formatting (Oren), and even communication itself (Matwick and Matwick), its role in the widespread adoption of television captions is significantly underexplored. Even the fact that a cooking show was the first ever program captioned on American television is almost completely unremarked within cooking show histories and literature.A Brief History of Captioning WorldwideWhen captions were first introduced on US television in the early 1970s, programmers were guided by the general principle to make the captioned program “accessible to every deaf viewer regardless of reading ability” (Jensema, McCann and Ramsey 284). However, there were no exact rules regarding captioning quality and captions did not reflect verbatim what was said onscreen. According to Jensema, McCann and Ramsey (285), less than verbatim captioning continued for many years because “deaf people were so delighted to have captions that they accepted almost anything thrown on the screen” (see also Newell 266 for a discussion of the UK context).While the benefits of captions for people who are D/deaf or hard of hearing were immediate, its commercial applications also became apparent. When the moral argument that people who were D/deaf or hard of hearing had a right to access television via captions proved unsuccessful in the fight for legislation, advocates lobbied the US Congress about the mainstream commercial benefits such as in education and the benefits for people learning English as a second language (Downey). Activist efforts and hard-won legal battles meant D/deaf and hard of hearing viewers can now expect closed captions on almost all television content. With legislation in place to determine the provision of captions, attention began to focus on their quality. D/deaf viewers are no longer just delighted to accept anything thrown on the screen and have begun to demand verbatim captioning. At the same time, market-based incentives are capturing the attention of television executives seeking to make money, and the widespread availability of verbatim captions has been recognised for its multimedia—and therefore commercial—applications. These include its capacity for information retrieval (Miura et al.; Agnihotri et al.) and for creative repurposing of television content (Blankinship et al.). Captions and transcripts have been identified as being of particular importance to augmenting the information provided in cooking shows (Miura et al.; Oh et al.).Early Captions in the US: Julia Child’s The French ChefJulia Child is indicative of the early period of the cooking genre (Collins and College)—she has been described as “the epitome of the TV chef” (ray 53) and is often credited for making cooking accessible to American audiences through her onscreen focus on normalising techniques that she promised could be mastered at home (ray). She is still recognised for her mastery of the genre, and for her capacity to entertain in a way that stood out from her contemporaries (Collins and College; ray).Julia Child’s The French Chef originally aired on the US publicly-funded Public Broadcasting System (PBS) affiliate WBGH from 1963–1973. The captioning of television also began in the 1960s, with educators creating the captions themselves, mainly for educational use in deaf schools (Downey 70). However, there soon came calls for public television to also be made accessible for the deaf and hard of hearing—the debate focused on equality and pushed for recognition that deaf people were culturally diverse (Downey 70).The PBS therefore began a trial of captioning programs (Downey 71). These would be “open captions”—characters which were positioned on the screen as part of the normal image for all viewers to see (Downey 71). The trial was designed to determine both the number of D/deaf and hard of hearing people viewing the program, as well as to test if non-D/deaf and hard of hearing viewers would watch a program which had captions (Downey 71). The French Chef was selected for captioning by WBGH because it was their most popular television show in the early 1970s and in 1972 eight episodes of The French Chef were aired using open—albeit inconsistent—captions (Downey 71; Jensema et al. 284).There were concerns from some broadcasters that openly captioned programs would drive away the “hearing majority” (Downey 71). However, there was no explicit study carried out in 1972 on the viewers of The French Chef to determine if this was the case because WBGH ran out of funds to research this further (Downey 71). Nevertheless, Jensema, McCann and Ramsey (284) note that WBGH did begin to re-broadcast ABC World News Tonight in the 1970s with open captions and that this was the only regularly captioned show at the time.Due to changes in technology and fears that not everyone wanted to see captions onscreen, television’s focus shifted from open captions to closed captioning in the 1980s. Captions became encoded, with viewers needing a decoder to be able to access them. However, the high cost of the decoders meant that many could not afford to buy them and adoption of the technology was slow (Youngblood and Lysaght 243; Downey 71). In 1979, the US government had set up the National Captioning Institute (NCI) with a mandate to develop and sell these decoders, and provide captioning services to the networks. This was initially government-funded but was designed to eventually be self-sufficient (Downey 73).PBS, ABC and NBC (but not CBS) had agreed to a trial (Downey 73). However, there was a reluctance on the part of broadcasters to pay to caption content when there was not enough evidence that the demand was high (Downey 73—74). The argument for the provision of captioned content therefore began to focus on the rights of all citizens to be able to access a public service. A complaint was lodged claiming that the Los Angeles station KCET, which was a PBS affiliate, did not provide captioned content that was available elsewhere (Downey 74). When Los Angeles PBS station KCET refused to air captioned episodes of The French Chef, the Greater Los Angeles Council on Deafness (GLAD) picketed the station until the decision was reversed. GLAD then focused on legislation and used the Rehabilitation Act to argue that television was federally assisted and, by not providing captioned content, broadcasters were in violation of the Act (Downey 74).GLAD also used the 1934 Communications Act in their argument. This Act had firstly established the Federal Communications Commission (FCC) and then assigned them the right to grant and renew broadcast licenses as long as those broadcasters served the ‘‘public interest, convenience, and necessity’’ (Michalik, cited in Downey 74). The FCC could, argued GLAD, therefore refuse to renew the licenses of broadcasters who did not air captioned content. However, rather than this argument working in their favour, the FCC instead changed its own procedures to avoid such legal actions in the future (Downey 75). As a result, although some stations began to voluntarily caption more content, it was not until 1996 that it became a legally mandated requirement with the introduction of the Telecommunications Act (Youngblood and Lysaght 244)—too late for The French Chef.My Kitchen Rules: Captioning BreachWhereas The French Chef presented instructional cooking programming from a kitchen set, more recently the food genre has moved away from the staged domestic kitchen set as an instructional space to use real-life domestic kitchens and more competitive multi-bench spaces. The Australian program MKR straddles this shift in the cooking genre with the first half of each season occurring in domestic settings and the second half in Iron Chef style studio competition (see Oren for a discussion of the influence of Iron Chef on contemporary cooking shows).All broadcast channels in Australia are mandated to caption 100 per cent of programs aired between 6am and midnight. However, the 2013 MKR Grand Final broadcast by Channel Seven Brisbane Pty Ltd and Channel Seven Melbourne Pty Ltd (Seven) failed to transmit 10 minutes of captions some 30 minutes into the 2-hour program. The ACMA received two complaints relating to this. The first complaint, received on 27 April 2013, the same evening as the program was broadcast, noted ‘[the D/deaf community] … should not have to miss out’ (ACMA, Report No. 3046 3). The second complaint, received on 30 April 2013, identified the crucial nature of the missing segment and its effect on viewers’ overall enjoyment of the program (ACMA, Report No. 3046 3).Seven explained that the relevant segment (approximately 10 per cent of the program) was missing from the captioning file, but that it had not appeared to be missing when Seven completed its usual captioning checks prior to broadcast (ACMA, Report No. 3046 4). The ACMA found that Seven had breached the conditions of their commercial television broadcasting licence by “failing to provide a captioning service for the program” (ACMA, Report No. 3046 12). The interruption of captioning was serious enough to constitute a breach due, in part, to the nature and characteristic of the program:the viewer is engaged in the momentum of the competitive process by being provided with an understanding of each of the competition stages; how the judges, guests and contestants interact; and their commentaries of the food and the cooking processes during those stages. (ACMA, Report No. 3046 6)These interactions have become a crucial part of the cooking genre, a genre often described as offering a way to acquire cultural capital via instructions in both cooking and ideological food preferences (Oren 31). Further, in relation to the uncaptioned MKR segment, ACMA acknowledged it would have been difficult to follow both the cooking process and the exchanges taking place between contestants (ACMA, Report No. 3046 8). ACMA considered these exchanges crucial to ‘a viewer’s understanding of, and secondly to their engagement with the different inter-related stages of the program’ (ACMA, Report No. 3046 7).An additional complaint was made with regards to the same program broadcast on Prime Television (Northern) Pty Ltd (Prime), a Seven Network affiliate. The complaint stated that the lack of captions was “Not good enough in prime time and for a show that is non-live in nature” (ACMA, Report No. 3124 3). Despite the fact that the ACMA found that “the fault arose from the affiliate, Seven, rather than from the licensee [Prime]”, Prime was also found to also have breached their licence conditions by failing to provide a captioning service (ACMA, Report No. 3124 12).The following year, Seven launched captions for their online catch-up television platform. Although this was a result of discussions with a complainant over the broader lack of captioned online television content, it was also a step that re-established Seven’s credentials as a leader in commercial television access. The 2015 season of MKR also featured their first partially-deaf contestant, Emilie Biggar.Mainstreaming Captions — Inter-Platform CooperationOver time, cooking shows on television have evolved from an informative style (The French Chef) to become more entertaining in their approach (MKR). As Oren identifies, this has seen a shift in the food genre “away from the traditional, instructional format and towards professionalism and competition” (Oren 25). The affordances of television itself as a visual medium has also been recognised as crucial in the popularity of this genre and its more recent transmedia turn. That is, following Joshua Meyrowitz’s medium theory regarding how different media can afford us different messages, televised cooking shows offer audiences stylised knowledge about food and cooking beyond the traditional cookbook (Oren; ray). In addition, cooking shows are taking their product beyond just television and increasing their inter-platform cooperation (Oren)—for example, MKR has a comprehensive companion website that viewers can visit to watch whole episodes, obtain full recipes, and view shopping lists. While this can be viewed as a modern take on Julia Child’s cookbook success, it must also be considered in the context of the increasing focus on multimedia approaches to cooking instructions (Hamada et al., Multimedia Integration; Cooking Navi; Oh et al.). Audiences today are more likely to attempt a recipe if they have seen it on television, and will use transmedia to download the recipe. As Oren explains:foodism’s ascent to popular culture provides the backdrop and motivation for the current explosion of food-themed formats that encourages audiences’ investment in their own expertise as critics, diners, foodies and even wanna-be professional chefs. FoodTV, in turn, feeds back into a web-powered, gastro-culture and critique-economy where appraisal outranks delight. (Oren 33)This explosion in popularity of the web-powered gastro culture Oren refers to has led to an increase in appetite for step by step, easy to access instructions. These are being delivered using captions. As a result of the legislation and activism described throughout this paper, captions are more widely available and, in many cases, now describe what is said onscreen verbatim. In addition, the mainstream commercial benefits and uses of captions are being explored. Captions have therefore moved from a specialist assistive technology for people who are D/deaf or hard of hearing to become recognised as an important resource for creative television viewers regardless of their hearing (Blankinship et al.). With captions becoming more accessible, accurate, financially viable, and mainstreamed, their potential as an additional television resource is of interest. As outlined above, within the cooking show genre—especially with its current multimedia turn and the demand for captioned recipe instructions (Hamada et al., “Multimedia Integration”, “Cooking Navi”; Oh et al.)—this is particularly pertinent.Hamada et al. identify captions as a useful technology to use in the increasingly popular educational, yet entertaining, cooking show genre as the required information—ingredient lists, instructions, recipes—is in high demand (Hamada et al., “Multimedia Integration” 658). They note that cooking shows often present information out of order, making them difficult to follow, particularly if a recipe must be sourced later from a website (Hamada et al., “Multimedia Integration” 658-59; Oh et al.). Each step in a recipe must be navigated and coordinated, particularly if multiple recipes are being completed at the same times (Hamada, et al., Cooking Navi) as is often the case on cooking shows such as MKR. Using captions as part of a software program to index cooking videos facilitates a number of search affordances for people wishing to replicate the recipe themselves. As Kyeong-Jin et al. explain:if food and recipe information are published as linked data with the scheme, it enables to search food recipe and annotate certain recipe by communities (sic). In addition, because of characteristics of linked data, information on food recipes can be connected to additional data source such as products for ingredients, and recipe websites can support users’ decision making in the cooking domain. (Oh et al. 2)The advantages of such a software program are many. For the audience there is easy access to desired information. For the number of commercial entities involved, this consumer desire facilitates endless marketing opportunities including product placement, increased ratings, and software development. Interesting, all of this falls outside the “usual” parameters of captions as purely an assistive device for a few, and facilitates the mainstreaming—and perhaps beginnings of acceptance—of captions.ConclusionCaptions are a vital accessibility feature for television viewers who are D/deaf or hard of hearing, not just from an informative or entertainment perspective but also to facilitate social inclusion for this culturally diverse group. The availability and quality of television captions has moved through three stages. These can be broadly summarised as early yet inconsistent captions, captions becoming more widely available and accurate—often as a direct result of activism and legislation—but not yet fully verbatim, and verbatim captions as adopted within mainstream software applications. This paper has situated these stages within the television cooking genre, a genre often remarked for its appeal towards inclusion and cultural capital.If television facilitates social inclusion, then food television offers vital cultural capital. While Julia Child’s The French Chef offered the first example of television captions via open captions in 1972, a lack of funding means we do not know how viewers (both hearing and not) actually received the program. However, at the time, captions that would be considered unacceptable today were received favourably (Jensema, McCann and Ramsey; Newell)—anything was deemed better than nothing. Increasingly, as the focus shifted to closed captioning and the cooking genre embraced a more competitive approach, viewers who required captions were no longer happy with missing or inconsistent captioning quality. The was particularly significant in Australia in 2013 when several viewers complained to ACMA that captions were missing from the finale of MKR. These captions provided more than vital cooking instructions—their lack prevented viewers from understanding conflict within the program. Following this breach, Seven became the only Australian commercial television station to offer captions on their web based catch-up platform. While this may have gone a long way to rehabilitate Seven amongst D/deaf and hard of hearing audiences, there is the potential too for commercial benefits. Caption technology is now being mainstreamed for use in cooking software applications developed from televised cooking shows. These allow viewers—both D/deaf and hearing—to access information in a completely new, and inclusive, way.ReferencesAgnihotri, Lalitha, et al. “Summarization of Video Programs Based on Closed Captions.” 4315 (2001): 599–607.Australian Communications and Media Authority (ACMA). Investigation Report No. 3046. 2013. 26 Apr. 2017 <http://www.acma.gov.au/~/media/Diversity%20Localism%20and%20Accessibility/Investigation%20reports/Word%20document/3046%20My%20Kitchen%20Rules%20Grand%20Final%20docx.docx>.———. Investigation Report No. 3124. 2014. 26 Apr. 2017 <http://www.acma.gov.au/~/media/Diversity%20Localism%20and%20Accessibility/Investigation%20reports/Word%20document/3124%20NEN%20My%20Kitchen%20Rules%20docx.docx>.Blankinship, E., et al. “Closed Caption, Open Source.” BT Technology Journal 22.4 (2004): 151–59.Collins, Kathleen, and John Jay College. “TV Cooking Shows: The Evolution of a Genre”. Flow: A Critical Forum on Television and Media Culture (7 May 2008). 14 May 2017 <http://www.flowjournal.org/2008/05/tv-cooking-shows-the-evolution-of-a-genre/>.Downey, Greg. “Constructing Closed-Captioning in the Public Interest: From Minority Media Accessibility to Mainstream Educational Technology.” The Journal of Policy, Regulation and Strategy for Telecommunications, Information and Media 9.2/3 (2007): 69–82. DOI: 10.1108/14636690710734670.Hamada, Reiko, et al. “Multimedia Integration for Cooking Video Indexing.” Advances in Multimedia Information Processing-PCM 2004 (2005): 657–64.Hamada, Reiko, et al. “Cooking Navi: Assistant for Daily Cooking in Kitchen.” Proceedings of the 13th Annual ACM International Conference on Multimedia. ACM.Ibrahim, Yasmin. “Food Porn and the Invitation to Gaze: Ephemeral Consumption and the Digital Spectacle.” International Journal of E-Politics (IJEP) 6.3 (2015): 1–12.Jensema, Carl J., Ralph McCann, and Scott Ramsey. “Closed-Captioned Television Presentation Speed and Vocabulary.” American Annals of the Deaf 141.4 (1996): 284–292.Matwick, Kelsi, and Keri Matwick. “Inquiry in Television Cooking Shows.” Discourse & Communication 9.3 (2015): 313–30.Meyrowitz, Joshua. No Sense of Place: The Impact of Electronic Media on Social Behavior. New York: Oxford University Press, 1985.Miura, K., et al. “Automatic Generation of a Multimedia Encyclopedia from TV Programs by Using Closed Captions and Detecting Principal Video Objects.” Eighth IEEE International Symposium on Multimedia (2006): 873–80.Newell, A.F. “Teletext for the Deaf.” Electronics and Power 28.3 (1982): 263–66.Oh, K.J. et al. “Automatic Indexing of Cooking Video by Using Caption-Recipe Alignment.” 2014 International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC2014) (2014): 1–6.Oren, Tasha. “On the Line: Format, Cooking and Competition as Television Values.” Critical Studies in Television: The International Journal of Television Studies 8.2 (2013): 20–35.Ouellette, Laurie, and James Hay. “Makeover Television, Governmentality and the Good Citizen.” Continuum: Journal of Media & Cultural Studies 22.4 (2008): 471–84.ray, krishnendu. “Domesticating Cuisine: Food and Aesthetics on American Television.” Gastronomica 7.1 (2007): 50–63.Youngblood, Norman E., and Ryan Lysaght. “Accessibility and Use of Online Video Captions by Local Television News Websites.” Electronic News 9.4 (2015): 242–256.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography