To see the other types of publications on this topic, follow the link: Regulated spring device.

Journal articles on the topic 'Regulated spring device'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 15 journal articles for your research on the topic 'Regulated spring device.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Shimazu, Yoshiaki, Kensuke Tono, Tomoyuki Tanaka, Yasuaki Yamanaka, Takanori Nakane, Chihiro Mori, Kanako Terakado Kimura, et al. "High-viscosity sample-injection device for serial femtosecond crystallography at atmospheric pressure." Journal of Applied Crystallography 52, no. 6 (October 17, 2019): 1280–88. http://dx.doi.org/10.1107/s1600576719012846.

Full text
Abstract:
A sample-injection device has been developed at SPring-8 Angstrom Compact Free-Electron Laser (SACLA) for serial femtosecond crystallography (SFX) at atmospheric pressure. Microcrystals embedded in a highly viscous carrier are stably delivered from a capillary nozzle with the aid of a coaxial gas flow and a suction device. The cartridge-type sample reservoir is easily replaceable and facilitates sample reloading or exchange. The reservoir is positioned in a cooling jacket with a temperature-regulated water flow, which is useful to prevent drastic changes in the sample temperature during data collection. This work demonstrates that the injector successfully worked in SFX of the human A2A adenosine receptor complexed with an antagonist, ZM241385, in lipidic cubic phase and for hen egg-white lysozyme microcrystals in a grease carrier. The injection device has also been applied to many kinds of proteins, not only for static structural analyses but also for dynamics studies using pump–probe techniques.
APA, Harvard, Vancouver, ISO, and other styles
2

Perry, Julie, Sébastien Debuisson, and Arnaud Descôtes. "Experimental training systems in Champagne: an overview of agronomical and qualitative parameters." E3S Web of Conferences 50 (2018): 01042. http://dx.doi.org/10.1051/e3sconf/20185001042.

Full text
Abstract:
Vine implantation in Champagne is strictly regulated. Row spacing is limited to 1,50 meter and the canopy height can not exceed 1,40 m. The traditional training system is therefore characterized by narrow spaced vines. From the late eighties, different vine training systems, such as lyres, have been tested in the Champagne area. The aim is to assess their interests in the terroir of Champagne, which is characterised by its cool climate, soil profile and its customs. Whereas the lyre training showed its limits in the Champagne context, some other training systems have been implemented such as half-widely-spaced vines. These devices are characterised by a row spacing of two meters, a consistent cover crop and a canopy up to two meters. The plots are located in various places in the area and are strictly followed each year since 2006 (and 2000 for the first sites). Phenological, agronomical and ripening parameters are controlled and compared to the traditional training system plots. Experimental vinifications are done each year so that sensory analysis can be undertaken to assess the ability of these vines to produce wines with a Champagne typicality. The results of this experimental device show interesting conclusions on the agronomical behaviour of experimental widely-spaced vines in a cool climate region. Spring frost resistance, cover crop management and ripening are some elements which show differences between the reference traditional system (REF) and the widely-spaced vines (VSL).
APA, Harvard, Vancouver, ISO, and other styles
3

Perez, Adolfo, and Armando Roman. "Morphing Air Foil NACA 6412 Inverted Using Flexure Hinges." Advanced Engineering Forum 45 (April 4, 2022): 43–48. http://dx.doi.org/10.4028/p-c8n56y.

Full text
Abstract:
In this paper a NACA 6412 regulated shape will be inverted to understand the behaviour of the air flow around the shape, this with the intention of convert the lifting effect to a downforce and braking effect changing the shape of the wing, displacing the trailing edge approximately 100mm over the first stage position. Using analysis as Computational Fluid Dynamics (CFD) and Finite Element Analysis (FEA) to depicts the operational parameters of the two stages of the inverted NACA 6412 air foil. To reach this displacement, the main idea is using a flexure hinge designed as a M-Shape beam, this flexure hinge works as a spring to allows to the morphing wing moves around the 100mm of trailing edge displacement and the spring-beam effect creates an inverse force, when the wing moves close to the110mm and does not exceed the yield strength of the Acrylonitrile butadiene styrene (ABS) of 74Mpa. As a result of this motion parameters, we could integrate a flexure hinge to an inverted air foil regulated to reach braking and downforce forces in order to slow down vehicles or aerodynamic devices.
APA, Harvard, Vancouver, ISO, and other styles
4

Shuravin, Aleksandr A., Vladimir Leonov, Elena Polikutina, Sergey V. Shchitov, and Evgeny E. Kuznetsov. "Influence of natural production conditions on efficient operation of wheel tractors." BIO Web of Conferences 42 (2022): 03003. http://dx.doi.org/10.1051/bioconf/20224203003.

Full text
Abstract:
For the zones of “risky farming” characteristic of the Far East of the Russian Federation, the natural production conditions of the region are an important problem in preparing the soil for further basic agricultural work. So, when carrying out early spring agricultural work, due to presence of a solid underlying layer in the form of permafrost, they shall be completed in operational terms no more than 10 days, until the permafrost base thaws and the soil has not lost its bearing capacity. In addition, due to the peculiarities of the relief, the soil does not thaw equally in depth everywhere, which reduces the quality of field work and harrowing, as the most common operation, namely. This article provides theoretical and experimental studies on the adaptation of a wheeled tractor as part of a machine-tractor unit (MTU) used in harrowing to natural production conditions by installing a device that automatically regulates the load on the working body of the disc harrow or on the propellers of the energy device, depending on the conditions of use or the state of the motion surface.
APA, Harvard, Vancouver, ISO, and other styles
5

Huynh, Nghia Dinh, and Dukhyun Choi. "Mechanical Conversion and Transmission Systems for Controlling Triboelectric Nanogenerators." Nanoenergy Advances 2, no. 1 (January 21, 2022): 29–51. http://dx.doi.org/10.3390/nanoenergyadv2010002.

Full text
Abstract:
Triboelectric nanogenerators (TENGs) are a promising renewable energy technology. Many applications have been successfully demonstrated, such as self-powered Internet-of-Things sensors and many wearables, and those portable power source devices are useful in daily life due to their light weight, cost effectiveness, and high power conversion. To boost TENG performance, many researchers are working to modulate the surface morphology of the triboelectric layer through surface-engineering, surface modification, material selection, etc. Although triboelectric material can obtain a high charge density, achieving high output performance that is predictable and uniform requires mechanical energy conversion systems (MECSs), and their development remains a huge challenge. Many previous works did not provide an MECS or introduced only a simple mechanical system to support the TENG integration system device. However, these kinds of designs cannot boost the output performance or control the output frequency waveform. Currently, some MECS designs use transmission conversion components such as gear-trains, cam-noses, spiral springs, flywheels, or governors that can provide the step-up, controllable, predictable, and uniform output performance required for TENGs to be suitable for daily applications. In this review, we briefly introduce various MECS designs for regulating the output performance of TENGs. First, we provide an overview of simple machines that can be used when designing MECSs and introduce the basic working principles of TENGs. The following sections review MECSs with gear-based, cam-based, flywheel-based, and multiple-stage designs and show how the MECS structure can be used to regulate the input flow for the energy harvester. Last, we present a perspective and outline for a full system design protocol to correlate MECS designs with future TENG applications.
APA, Harvard, Vancouver, ISO, and other styles
6

Klingberg, Franco, Melissa L. Chow, Anne Koehler, Stellar Boo, Lara Buscemi, Thomas M. Quinn, Mercedes Costell, Benjamin A. Alman, Elisabeth Genot, and Boris Hinz. "Prestress in the extracellular matrix sensitizes latent TGF-β1 for activation." Journal of Cell Biology 207, no. 2 (October 20, 2014): 283–97. http://dx.doi.org/10.1083/jcb.201402006.

Full text
Abstract:
Integrin-mediated force application induces a conformational change in latent TGF-β1 that leads to the release of the active form of the growth factor from the extracellular matrix (ECM). Mechanical activation of TGF-β1 is currently understood as an acute process that depends on the contractile force of cells. However, we show that ECM remodeling, preceding the activation step, mechanically primes latent TGF-β1 akin to loading a mechanical spring. Cell-based assays and unique strain devices were used to produce a cell-derived ECM of controlled organization and prestrain. Mechanically conditioned ECM served as a substrate to measure the efficacy of TGF-β1 activation after cell contraction or direct force application using magnetic microbeads. The release of active TGF-β1 was always higher from prestrained ECM as compared with unorganized and/or relaxed ECM. The finding that ECM prestrain regulates the bioavailability of TGF-β1 is important to understand the context of diseases that involve excessive ECM remodeling, such as fibrosis or cancer.
APA, Harvard, Vancouver, ISO, and other styles
7

Reis, M. N. E., S. G. Tavares, C. B. Soares, J. A. Soares, R. H. R. Antunes, C. H. L. Fossa, and P. R. Monteiro. "FUNCTIONS, FUNCTIONING AND OPTIMIZED POSITIONING OF PRESSURE CONTROL VALVES IN OIL-HYDRAULIC CIRCUITS." Revista de Engenharia Térmica 5, no. 2 (December 31, 2006): 42. http://dx.doi.org/10.5380/reterm.v5i2.61851.

Full text
Abstract:
The pressure control valves can perform different functions in the hydraulic systems, such as: establish maximum pressure, reduce pressure in some circuit lines, and establish sequence movements, among other functions. The main operation of these valves consists of providing a balance between pressure and the force load on a spring. Most of these valves can be positioned in many different levels, between totally open and totally closed, depending on the flow and on the pressure differential. The pressure control valves are usually named according to their primary functions, e.g., lock wire valve, sequence valve, safety valve, etc. and, their basic function is limit or to determine the pressure of the hydraulic system for the attainment of a certain function of the equipment in motion. They are also classified by the type of connections, by the size and by the selected pressure band. Instead of relief and security, discharge, counterbalance, sequence, reducing and shock suppressor valves represent the pressure control devices. In this paper, oil-hydraulic circuits are suggested for practical lessons of Hydraulic and Pneumatic Commands where they regulate valves of pressure, by acting in the following situations: limiting the maximum pressure of the system, determining a level of pressure, determining two different levels of pressure, determining at the same time two distinct levels of pressure, unloading the pump. The functions of these devices will be discussed and analyzed as an attempt to improve their position in the circuit.
APA, Harvard, Vancouver, ISO, and other styles
8

Ma, Guanguo, Zhaoxia Liu, Xiaobing Gong, Lianjun Chen, Guoming Liu, Gang Pan, and Qizheng Dong. "Research on Pressure Drop in the Accelerate Zone of Horizontal Conveying of Concrete Spraying." Advances in Civil Engineering 2019 (December 23, 2019): 1–10. http://dx.doi.org/10.1155/2019/7953434.

Full text
Abstract:
A pressure transmitter was installed at a specific position in a concrete conveying line to disclose the pressure drop when compressed air was conveyed during concrete spraying. A statistical analysis of the pressure at different positions was undertaken. Experimental results demonstrated that in the accelerate zone of horizontal conveying of concrete in the line, the pressure drop mainly occurred during the acceleration, collision, and friction processes. The momentum equation was introduced during the experiment, which interpreted the pressure drop caused by the accelerated conveying of concrete. The theoretical equation was corrected based on the results of theoretical experiments by introducing the value of α, and the experimental results were then optimized, thus obtaining an approximate model of pressure drop during the conveying of concrete. In addition, experimental results were compared with a model equation that showed the reliability of the proposed model. Research conclusions are of great significance to regulate the pressure drop in the conveying line of concretes, to design working parameters of concrete spraying devices, and to predict the ultimate distance for the conveying of concrete.
APA, Harvard, Vancouver, ISO, and other styles
9

Brabie, Gheorghe, and Bogdan Chirita. "Analysis of the Sheet Wrinkling Variation and Causes in the Case of Mini Drawn Parts." Applied Mechanics and Materials 809-810 (November 2015): 247–52. http://dx.doi.org/10.4028/www.scientific.net/amm.809-810.247.

Full text
Abstract:
The present paper analyses the results of investigations concerning the size and effects of sheet wrinkling in the case of mini cylindrical drawn parts made from aluminium alloy sheets. The wrinkling occurs in the mini drawn part walls when the blankholder is missing from the die structure or it is driven with an excessive force. By comparing to macro scale processes, the manufacturing of mini parts usually involves new concepts concerning the establishment of the following parameters: tool clearances, tool dimensional parameters, blank dimensions, working process parameters etc. In the case of mini deep drawing such objectives cannot be simply achieved by reducing the process from macro to mini scales. The present work was devoted to study the particularities of the wrinkling that occur during mini deep drawing processes and affect the quality of the mini drawn parts. The experimental investigations were performed using a mini tool having the following main components: punch with a flat bottom, die and an annular blankholder plate. The tool was installed on a mini deep drawing device having the following main components: mobile grip - connected to machine mobile head; fixed grip; helical spring - used to regulate the blankholder force and placed between the fixed grip plate and punch support. The simulation was performed using the DynaForm software and the applied criterion of plasticity was the Barlat 89 criterion.
APA, Harvard, Vancouver, ISO, and other styles
10

Satpute, Nitin, Lalitkumar Jugulkar, Siddharth Jabade, Ganesh Korwar, and Swapnil Arawade. "Design and analysis of motion and energy regulating vibration harvester." Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science, August 25, 2021, 095440622110214. http://dx.doi.org/10.1177/09544062211021441.

Full text
Abstract:
In this paper a novel design of energy harvester has been proposed, which converts harmonic or random vibrations energy into useful electric power. The energy harvester comprises of mechanical motion rectifier, motion regulator, strain energy storage element and a rotary electric generator. The mechanical motion rectifier comprises of a spatial mechanism with unidirectional bearings and spherical joint that converts the linear oscillating force into unidirectional torque pulses. Further, motion regulating mechanism directs the energy flow to the strain energy storage element and drives the electric generator. The arrangement ensures that flow of vibration energy is regulated such that it is stored in the spring up to a threshold limit and thereafter dissipated to the electric generator. Rigid body simulations in Adams and Matlab have been used in design and analysis of the energy harvester with investigations for the effect of significant design parameters. Experimentation on a prototype has been performed to validate the numerical model which delivered 4.13 W of peak power and average power of 0.12–0.52 W within frequency range of 1–15 Hz. Simulation results on a real size device with higher torsion spring stiffness indicates that the harvester can operate with 69.8% efficiency and deliver 0.32–2.45 W of average power for frequency of 0.5–4 Hz.
APA, Harvard, Vancouver, ISO, and other styles
11

Wagoner, Kimberly G., Jessica L. King, Cynthia K. Suerken, Beth A. Reboussin, Jennifer Cornacchione Ross, and Erin L. Sutfin. "Changes in knowledge, perceptions and use of JUUL among a cohort of young adults." Tobacco Control, August 26, 2020, tobaccocontrol—2020–055651. http://dx.doi.org/10.1136/tobaccocontrol-2020-055651.

Full text
Abstract:
ObjectiveE-cigarettes have gained popularity, most recently with pod-style devices, such as JUUL. We examined changes in JUUL awareness, use, perceptions, nicotine content knowledge, number of days a pod lasts and exposure to JUUL retail advertising over a 6-month period in a cohort of young adults.MethodsIn spring and fall 2018, 1836 young adults completed online surveys on tobacco use, including JUUL perceptions and use behaviours. Demographics, tobacco use and JUUL advertising exposure in spring 2018 were examined as predictors of current JUUL use in fall 2018.ResultsEver and current JUUL use doubled in 6 months (5.9% vs 12.7%, p<0.001; 1.6% vs 3.4%, p<0.001). The number of days a JUUL pod lasts significantly changed (p=0.049). Although there was an increase in those reporting JUUL has as much or more nicotine than a pack of cigarettes, 58% are ‘not sure’ of JUUL’s nicotine content. Exposure to JUUL’s advertising significantly increased (31.8% to 46.4%; p<0.001). In multivariable models, those perceiving JUUL as or more harmful than cigarettes, and former and never cigarette smokers had significantly lower odds of current JUUL use at 6 months compared with their respective counterparts (p<0.0001). Those reporting exposure to JUUL’s advertising had significantly increased odds of current JUUL use 6 months later (p<0.03).ConclusionsFindings demonstrate changes in knowledge of JUUL’s nicotine content, perceptions and use over a short period of time, suggesting frequent measurement is necessary. Additionally, efforts are needed to regulate retail advertising and ensure consumer education about product risks as they are associated with current use.
APA, Harvard, Vancouver, ISO, and other styles
12

Davis, Danielle R., Suchitra Krishnan-Sarin, Krysten W. Bold, Meghan E. Morean, Asti Jackson, Deepa Camenga, and Grace Kong. "Differences in JUUL Appeal Among Past and Current Youth JUUL Users." Nicotine & Tobacco Research, November 28, 2020. http://dx.doi.org/10.1093/ntr/ntaa246.

Full text
Abstract:
Abstract Introduction JUUL, a closed system e-cigarette with disposable pods, is popular among youth, with positive attributes of this product linked to current use by youth. However, many youth try JUUL and do not continue using; understanding differences in the appeal of this device between current users and those who chose not to continue use can inform regulation and prevention efforts. The aim of the current study is to compare JUUL appeal in youth among past users (i.e. used, but not in past month) and current users (i.e. used in past month). Methods A cross-sectional survey was conducted in four Connecticut high schools in Spring 2018. This survey assessed JUUL use and reasons for liking/disliking JUUL, including its’ pharmacological effects (e.g., nicotine “buzz”), product characteristics (e.g., flavors), peer influence, appeal compared to other e-cigarettes, and concealability. Logistic regressions were conducted to examine differences in liking/disliking JUUL by use status (past vs. current). Results Among JUUL users (N=1374; 43% of total sample), 30.4% were past users and 69.6% were current users. Compared to current users, past users were less likely to like JUUL for positive pharmacological effects (e.g. nicotine “buzz”), product characteristics (e.g. flavors), and peer use and more likely to dislike JUUL for the adverse pharmacological effects (e.g. headache), product characteristics (e.g. flavors), and for “other” reasons (open-ended response; e.g., perceived harm). Conclusions Findings suggest that altering JUUL appeal through regulating nicotine content and flavors may be key in policy aimed at shifting youth to become past JUUL users. Implications The current study investigates how current and past youth JUUL users differ in their report of the appeal of JUUL. Past users are less likely to report experiencing positive pharmacological effects and product characteristics of JUUL and are less likely to report appeal due to peer use. Understanding how appeal of JUUL may differ among past and current users can aid in our understanding of how to regulate these products so that they are less appealing to current youth users.
APA, Harvard, Vancouver, ISO, and other styles
13

胡紫婷, 舒鑫, 王香, 李跃, 徐闰, 洪峰, 马忠权, 蒋最敏, and 徐飞. "Air-stable CsPbIBr2 photodetector via dual-ligand-assisted solution strategy *." Acta Physica Sinica, 2022, 0. http://dx.doi.org/10.7498/aps.71.20212143.

Full text
Abstract:
The CsPbIBr2 perovskite films deposited from the precursor solutions in air, usually suffered from poor surface coverage and air-stability due to the uncontrolled nucleation and the existence of I- during the film formation, resulting in terrible photoelectric characteristics and reproducibility. At present, the preparation process of high-quality CsPbIBr2 films is under nitrogen atmosphere, which increases the cost and impedes its application in air. Herein, we propose a strategy for the growth of perovskite films with low defect density and better stability in air via dual-ligand-assisted (Ligand 1 (LP) and ligand 2 (NH4SCN))solution strategy. These ligands contains some organic molecules which have strong interaction with ions on the surface of perovskite thin films in order to regulate the addition of precursor ions onto the films. The high-quality CsPbIBr2 thin films were carried out in air with relative humidity of ≦60% by spraying method. The results indicate that ligand 1 with hydrophilic group and hydrophobic group, one of kind of surfactants, could effectively reduce the surface tension of perovskite precursor solution, improve the coverage of CsPbIBr2 perovskite film, and form a block layer of water and oxygen. However, the addition of ligand 1 in precursor solution inevitably introduced a large number of grain boundaries and detriment to carrier transport and collect. Thus, ligand 2 was employed to control the nucleation of perovskite films as another ligand, resulting in reducing the point defect formation. Their combination is beneficial to form the uniform perovskite film with large-size crystal and low-density defect. The high-quality crystallization of the perovskite film is found to simultaneously enhance the response and the durability of photodetectors. Thus, the unpackaged photodetectors (ITO/CsPbIBr2/Au) based on this strategy yield the outstanding photoelectric response under the excitation of 405 nm laser. This device exhibits a low dark current density of 2 × 10-4 mA cm-2, a fast response time of 20 μs and 21 μs, and high stability (81%, ≥70 days) in air with relative humidity of 40%-60%. Hence, this study provides a simple method to prepare high-quality CsPbIBr2 perovskite thin films with low-density defect and realize air-stable and charge-transport-layer-free CsPbIBr2 photodetectors for practical applications in photoelectric detection field.
APA, Harvard, Vancouver, ISO, and other styles
14

Mackenzie, Adrian. "Making Data Flow." M/C Journal 5, no. 4 (August 1, 2002). http://dx.doi.org/10.5204/mcj.1975.

Full text
Abstract:
Why has software code become an object of intense interest in several different domains of cultural life? In art (.net art or software art), in Open source software (Linux, Perl, Apache, et cetera (Moody; Himanen)), in tactical media actions (hacking of WEF Melbourne and Nike websites), and more generally, in the significance attributed to coding as work at the pinnacle of contemporary production of information (Negri and Hardt 298), code itself has somehow recently become significant, at least for some subcultures. Why has that happened? At one level, we could say that this happened because informatic interaction (websites, email, chat, online gaming, ecommerce, etc) has become mainstream to media production, organisational practice and indeed, quotidian life in developed and developing countries. As information production moves into the mainstream, working against mainstream control of flows of information means going upstream. For artists, tactical media groups and hackers, code seems to provide a way to, so to speak, reach over the shoulder of mainstream media channels and contest their control of information flows.1 A basic question is: does it? What code does We all see content flowing through the networks. Yet the expressive traits of the flows themselves are harder to grapple with, partly because they are largely infrastructural. When media and cultural theory discuss information-network society, cyberculture or new media, questions of flow specificity are usually downplayed in favour of high-level engagement with information as content. Arguably, the heightened attention to code attests to an increasing awareness that power relations are embedded in the generation and control of flow rather than just the meanings or contents that might be transported by flow. In this context, loops provide a really elementary and concrete way to explore how code participates in information flows. Loops structure almost every code object at a basic level. The programmed loop, a very mundane construct, can be found in any new media artist's or software engineer's coding toolkit. All programming languages have them. In popular programming and scripting languages such as FORTRAN, C, Pascal, C++, Java, Visual Basic, Perl, Python, JavaScript, ActionScript, etc, an almost identical set of looping constructs are found.2 Working with loops as material and as instrument constitutes an indispensable part of producing code-based objects. On the one hand, the loop is the most basic technical element of code as written text. On the other hand, as process executed by CPUs, and in ways that are not immediately obvious even to programmers themselves, loops of various kinds underpin the generative potential of code.3 Crucially, code is concerned with operationality rather than meaning (Lash 203). Code does not directly create meaning. It circulates, transforms, and reproduces messages and patterns of widely varying semantic and contextual richness. By definition, flow is something continuous. In the case of information, what flows are not things but patterns which can be rendered perceptible in different ways—as image, text, sound—on screen, display, and speaker. While the patterns become perceptible in a range of different spatio-temporal modes, their circulation is serialised. They are, as we know, composed of sequences of modulations (bits). Loops control the flow of patterns. Lev Manovich writes: programming involves altering the linear flow of data through control structures, such as 'if/then' and 'repeat/while'; the loop is the most elementary of these control structures (Manovich 189). Drawing on these constructs, programming or coding work gain traction in flows. Interactive looping Loops also generate flows by multiplying events. The most obvious example of how code loops generate and control flows comes from the graphic user interfaces (GUIs) provided by typical operating systems such as Windows, MacOs or one of the Linux desktop environments. These operating systems configure the visual space of millions of desktop screen according to heavily branded designs. Basically they all divide the screen into different framing areas—panels, dividing lines, toolbars, frames, windows—and then populate those areas with controls and indicators—buttons, icons, checkboxes, dropdown lists, menus, popup menus. Framing areas hold content—text, tables, images, video. Controls, usually clustered around the edge of the frame, transform the content displayed in the framed areas in many different ways. Visual controls are themselves hooked up via code to physical input devices such as keyboard, mouse, joystick, buttons and trackpad. The highly habituated and embodied experience of interacting with contemporary GUIs consists of moving in and out, within and between different framing areas, using visual controls that respond either to pointing (with the mouse) or keyboard command to change what is displayed, how it is displayed or indeed to move that content elsewhere (onto disk, across a network). Beneath the highly organised visual space of the GUI, lie hundreds if not thousands of loops. The work of coding these interfaces involves making loops, splicing loops together, and nesting loops within loops. At base, the so-called event loop means that the GUI in principle stands ready at any time to accept input from the physical interface devices. Depending on what that input is, it may translate into direct changes within the framed areas (for instance, keystrokes appear in a text field as letters) or changes affecting the controls (for instance, Control-Enter might signal send the text as an email). What we usually understand by interactivity stems from the way that a loop constantly accepts signals from the physical inputs, queues the signals as events, and deals with them one by one as discrete changes in what appears on screen. Within the GUI's basic event loop, many other loops are constantly starting and finishing. They are nested and unnested. They often affect some or other of the dozens of processes running at any one time within the operating system. Sometimes a command coming from the keyboard or a signal arriving from some other peripheral interface (the network interface card, the printer, a scanner, etc) will trigger the execution of a new process, itself composed of manifold loops. Hence loops often transiently interact with each other during execution of code. At base, the GUI shows something important, something that extends well beyond the domain of the GUI per se: the event loop generates and controls informations flows at the same time. People type on keyboards or manipulate game controllers. A single keypress or mouse click itself hardly constitutes a flow. Yet the event loop can amplify it into a cascade of thousands of events because it sets other loops in process. What we call information flow springs from the multiplicatory effect of loops. A typology of looping Information flows don't come from nowhere. They always go somewhere. Perhaps we could generalise a little from the mundane example of the GUI and say that the generation and control of information flows through loops is itself regulated by bounding conditions. A bounding condition determines the number of times and the sequence of operations carried out by a loop. They often come from outside the machine (interfaces of many different kinds) and from within it (other processes running at the same time, dependent on the operating system architecture and the hardware platform). Their regulatory role suggests the possibility of classifying loops according to boundary conditions.4 The following table classifies loops based on bounding conditions: Type of loop Bounding condition Typical location Simple & indefinite No bounding conditions Event loops in GUIs, servers ... Simple & definite Bounding conditions determined by a finite set of elements Counting, sorting, input and output Nested & definite Multiple bounding conditions Transforming grid and table structures Recursive Depth of possible recursion (memory or time) Searching and sorting of tree or network structures Result controlled Loop ends when some goal has been reached Goal-seeking algorithms Interactive and indefinite Bounding conditions change during the course of the loop User interfaces or interaction Although it risks simplifying something that is quite intricate in any actually executing process, this classification does stress that the distinguishing feature of loops may well be their bounding conditions. In practical terms, within program code, a bounding condition takes the form of some test carried out before, during or after each iteration of a loop. The bounding conditions for some loops relate to data that the code expects to come from other places—across networks, from the user interface, or some other devices. For other loops, the bounding conditions continually emerge in the course of the loop itself—the result of a calculation, finding some result in the course of searching a collection or receiving some new input in a flow of data from an interface or network connection. Based on the classification, we could suggest that loops not only generate flows, but they generate those flows within particular spatio-temporal manifolds. Put less abstractly, if we accept that flows don't come from nowhere, we then need to say what kind of places they do come from. The classification shows that they do not come from homogeneous spaces. In fact they relate to different topologies, to the hugely diverse orderings of signs and gestures within mediatic cultures. To take a mundane example, why has the table become such an important element in the HTML coding of webpages? Clearly tables provide an easy way to organise a page. Tables as classifying and visual ordering devices are nothing new. Along with lists, they have been used for centuries. However, the table as onscreen spatial entity also maps very directly onto a nested loop: the inner loop generates the horizontal row contents; the outer loop places the output of the inner loop in vertical order. As web-designers quickly discovered during the 1990s, HTML tables are rendered quickly by browsers and can easily position different contents—images, headings, text, lines, spaces—in proximity. In shorts, nested loops can quickly turn a table into a serial flow or quickly render a table out of a serial flow. Implications We started with the observation that artists, writers, hackers and media activists are working with code in order to reposition themselves in relation to information flows. Through technical elements such as loops, they reappropriate certain facets of the production of information and communication. Working with these and other elements, they look for different points of entry into the flows, attempting to move upstream of the heavily capitalised sites of mainstream production such as the Windows GUI, eCommerce websites or blockbuster game titles. The proliferation of information objects in music, in visual culture, in database and net-centred forms of interactivity ranging from computer games to chat protocols, suggests that the coding work can trigger powerful shifts in the cultures of circulation. Analysis of loops also suggests that the notion of data or information flow, understood as the continuous gliding of bits through systems of communication, needs revision. Rather than code simply controlling flow, code generates flows as well. What might warrant further thought is just how different kinds of bounding conditions generate different spatio-temporal patterns and modes of inclusion within flows. The diversity of loops within information objects imply a variety of topologically complicated places. It would be possible to work through the classification describing how each kind of loop maps into different spatial and temporal orderings. In particular, we might want to focus on how more complicated loops—result controlled, recursive, or interactive and indefinite types—map out more topologically complicated spaces and times. For my purposes, the important point is that bounding conditions not only regulate loops, they bring different kinds of spatio-temporal manifold into the seriality of flow. They imprint spatial and temporal ordering. Here the operationality of code begins to display a generative dimension that goes well beyond merely transporting or communicating content. Notes 1. At a more theoretical level, for a decade or so fairly abstract notions of virtuality have dominated media and cultural studies approaches to new media. While that domination has been increasingly contested by more fine grained studies of how the Internet is enmeshed with different places (Miller and Slater), attention to code is justified on the grounds that it constitutes an increasingly important form of expression within information flows. 2. Detailed discussion of these looping constructs can be found in any programming textbook or introductory computer science course, so I will not be going through them in any detail. 3. For instance, the cycles of the clock chip are absolutely irreducible. Virtually all programs implicitly rely on a clock chip to regulate execution of their instructions. 4. A classification can act as a symptomatology, that is, as something that sets out the various signs of the existence of a particular condition (Deleuze 368), in this case, the operationality of code. References Appadurai, Arjun. Modernity at Large: Cultural Dimensions of Globalization. Minneapolis: U of Minnesota P, 1996. Deleuze, Gilles. The Brain is the Screen. An Interview with Gilles Deleuze. The Brain is the Screen. Deleuze and the Philosophy of Cinema. Ed Gregory Flaxman. Minneapolis: U of Minnesota P, 2000. 365-68. Hardt, Michael and Antonio Negri. Empire. Cambridge, MA: Harvard U P, 2000. Himanen, Pekka. The Hacker Ethic and the Spirit of the Information Age. London: Secker and Warburg, 2001. Lash, Scott. Critique of Information. London: Sage, 2002. Manovich, Lev. What is Digital Cinema? Ed. Peter Lunenfeld. The Digital Dialectic: New Essays on New Media. Cambridge, MA: MIT, 1999. 172-92. Miller, Daniel, and Don Slater. The Internet: An Ethnographic Approach. Oxford: Berg, 2000. Moody, Glyn. Rebel Code: Linux and the Open Source Revolution. Middlesworth: Penguin, 2001. Citation reference for this article MLA Style Mackenzie, Adrian. "Making Data Flow" M/C: A Journal of Media and Culture 5.4 (2002). [your date of access] < http://www.media-culture.org.au/mc/0208/data.php>. Chicago Style Mackenzie, Adrian, "Making Data Flow" M/C: A Journal of Media and Culture 5, no. 4 (2002), < http://www.media-culture.org.au/mc/0208/data.php> ([your date of access]). APA Style Mackenzie, Adrian. (2002) Making Data Flow. M/C: A Journal of Media and Culture 5(4). < http://www.media-culture.org.au/mc/0208/data.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
15

Leder, Kerstin, Angelina Karpovich, Maria Burke, Chris Speed, Andrew Hudson-Smith, Simone O'Callaghan, Morna Simpson, et al. "Tagging is Connecting: Shared Object Memories as Channels for Sociocultural Cohesion." M/C Journal 13, no. 1 (March 22, 2010). http://dx.doi.org/10.5204/mcj.209.

Full text
Abstract:
Connections In Small Pieces Loosely Joined, David Weinberger identifies some of the obvious changes which the Web has brought to human relations. Social connections, he argues, used to be exclusively defined and constrained by the physics and physicality of the “real” world, or by geographical and material facts: it’s … true that we generally have to travel longer to get to places that are farther away; that to be heard at the back of the theater, you have to speak louder; that when a couple moves apart, their relationship changes; that if I give you something, I no longer have it. (xi) The Web, however, is a place (or many places) where the boundaries of space, time, and presence are being reworked. Further, since we built this virtual world ourselves and are constantly involved in its evolution, the Web can tell us much about who we are and how we relate to others. In Weinberger’s view, it demonstrates that “we are creatures who care about ourselves and the world we share with others”, and that “we live within a context of meaning” beyond what we had previously cared to imagine (xi-xii). Before the establishment of computer-mediated communication (CMC), we already had multiple means of connecting people commonly separated by space (Gitelman and Pingree). Yet the Web has allowed us to see each other whilst separated by great distances, to share stories, images and other media online, to co-construct or “produse” (Bruns) content and, importantly, to do so within groups, rather than merely between individuals (Weinberger 108). This optimistic evaluation of the Web and social relations is a response to some of the more cautious public voices that have accompanied recent technological developments. In the 1990s, Jan van Dijk raised concerns about what he anticipated as wide-reaching social consequences in the new “age of networks” (2). The network society, as van Dijk described it, was defined by new interconnections (chiefly via the World Wide Web), increased media convergence and narrowcasting, a spread of both social and media networks and the decline of traditional communities and forms of communication. Modern-day communities now consisted both of “organic” (physical) and “virtual” communities, with mediated communication seemingly beginning to replace, or at least supplement, face-to-face interaction (24). Recently, we have found ourselves on the verge of even more “interconnectedness” as the future seems determined by ubiquitous computing (ubicomp) and a new technological and cultural development known as the “Internet of Things” (Greenfield). Ubicomp refers to the integration of information technology into everyday objects and processes, to such an extent that the end-users are often unaware of the technology. According to Greenfield, ubicomp has significant potential to alter not only our relationship with technology, but the very fabric of our existence: A mobile phone … can be switched off or left at home. A computer … can be shut down, unplugged, walked away from. But the technology we're discussing here–ambient, ubiquitous, capable of insinuating itself into all the apertures everyday life affords it–will form our environment in a way neither of those technologies can. (6) Greenfield's ideas are neither hypothesis, nor hyperbole. Ubicomp is already a reality. Dodson notes, Ubicomp isn't just part of our ... future. Its devices and services are already here. Think of the use of prepaid smart cards for use of public transport or the tags displayed in our cars to help regulate congestion charge pricing or the way in which corporations track and move goods around the world. (7) The Internet of Things advances the ubicomp notion of objects embedded with the capacity to receive and transmit data and anticipates a move towards a society in which every device is “on” and in some way connected to the Internet; in other words, objects become networked. Information contained within and transmitted among networked objects becomes a “digital overlay” (Valhouli 2) over the physical world. Valhouli explains that objects, as well as geographical sites, become part of the Internet of Things in two ways. Information may become associated with a specific location using GPS coordinates or a street address. Alternatively, embedding sensors and transmitters into objects enables them to be addressed by Internet protocols, and to sense and react to their environments, as well as communicate with users or with other objects. (2) The Internet of Things is not a theoretical paradigm. It is a framework for describing contemporary technological processes, in which communication moves beyond the established realm of human interaction, to enable a whole range of potential communications: “person-to-device (e.g. scheduling, remote control, or status update), device-to-device, or device-to-grid” (Valhouli 2). Are these newer forms of communication in any sense meaningful? Currently, ubicomp's applications are largely functional, used in transport, security, and stock control. Yet, the possibilities afforded by the technology can be employed to enhance “connectedness” and “togetherness” in the broadest social sense. Most forms of technology have at least some social impact; this is particularly true of communication technology. How can that impact be made explicit? Here, we discuss one such potential application of ubicomp with reference to a new UK research project: TOTeM–Tales of Things and Electronic Memory. TOTeM aims to draw on personal narratives, digital media, and tagging to create an “Internet” of people, things, and object memories via Web 2.0 and mobile technologies. Communicating through Objects The TOTeM project, began in August 2009 and funded by Research Councils UK's Digital Economy Programme, is concerned with eliciting the memory and value of “old” artefacts, which are generally excluded from the discourse of the Internet of Things, which focuses on new and future objects produced with embedded sensors and transmitters. We focus instead on existing artefacts that hold significant personal resonance, not because they are particularly expensive or useful, but because they contain or “evoke” (Turkle) memories of people, places, times, events, or ideas. Objects across a mantelpiece can become conduits between events that happened in the past and people who will occupy the future (Miller 30). TOTeM will draw on user-generated content and innovative tagging technology to study the personal relationships between people and objects, and between people through objects. Our hypothesis is that the stories that are connected to particular objects can become binding ties between individuals, as they provide insights into personal histories and values that are usually not shared, not because they are somehow too personal or uninteresting, but because there is currently little systematic context for sharing them. Even in families, where objects routinely pass down through generations, the stories associated with these objects are generally either reduced to a vague anecdote or lost entirely. Beyond families, there are some objects whose stories are deemed culturally-significant: monuments, the possessions of historical figures, religious artefacts, and archaeological finds. The current value system which defines an object’s cultural significance appears to replicate Bourdieu's assessment of the hierarchies which define aesthetic concepts such as taste. In both cases, the popular, everyday, or otherwise mundane is deemed to possess less cultural capital than that which is less accessible or otherwise associated with the social elites. As a result, objects whose histories are well-known are mostly found in museums, untouchable and unused, whereas objects which are within reach, all around us, tend to travel from owner to owner without anyone considering what histories they might contain. TOTeM’s aim is to provide both a context and a mechanism for enabling individuals and community groups to share object-related stories and memories through digital media, via a custom-built platform of “tales of things”. Participants will be able to use real-life objects as conduits for memory, by producing “tales” about the object's personal significance, told through digital video, photographs, audio, or a mixture of media. These tales will be hosted on the TOTeM project's website. Through specifically-developed TOTeM technology, each object tale will generate a unique physical tag, initially in the form of RFID (Radio Frequency Identification) and QR (Quick Response) codes. TOTeM participants will be able to attach these tags/codes to their objects. When scanned with a mobile phone equipped with free TOTeM software or an RFID tag reader, each tag will access the individual object's tale online, playing the media files telling that object’s story on the mobile phone or computer. The object's user-created tale will be persistently accessible via both the Internet and 3G (third generation) mobile phones. The market share of 3G and 4G mobile networks is expanding, with some analysts predicting that they will account for 30% of the global mobile phone market by 2014 (Kawamoto). As the market for mobile phones with fast data transfer rates keeps growing, TOTeM will become accessible to an ever-growing number of mobile, as well as Internet, users. The TOTeM platform will serve two primary functions. It will become an archive for object memories and thus grow to become an “archaeology for the future”. We hope that future generations will be able to return to this repository and learn about the things that are meaningful to groups and individuals right now. The platform will also serve as an arena for contemporary communication. As the project develops, object memories will be directly accessible through tagged artefacts, as well as through browsing and keyword searches on the project website. Participants will be able to communicate via the TOTeM platform. On a practical level, the platform can bring together people who already share an interest in certain objects, times, or places (e.g. collectors, amateur historians, genealogists, as well as academics). In addition, we hope that the novelty of TOTeM’s approach to objects may encourage some of those individuals for whom non-participation in the digital world is not a question of access but one of apathy and perceived irrelevance (Ofcom 3). Tales of Things: Pilots Since the beginning of this research project, we have begun to construct the TOTeM platform and develop the associated tagging technology. While the TOTeM platform is being built, we have also used this time to conduct a pilot “tale-telling” phase, with the aim of exploring how people might choose to communicate object stories and how this might make them feel. In this initial phase, we focus on eliciting and constructing object tales, without the use of the TOTeM platform or the tagging technology, which will be tested in a future trial. Following Thomson and Holland’s autoethnographic approach, in the first instance, the TOTeM team and advisors shared their own tales with each other (some of these can be viewed on the TOTeM Website). Each of us chose an object that was personally significant to us, digitally recorded our object memories, and uploaded videos to a YouTube channel for discussion amongst the group. Team members in Edinburgh subsequently involved a group of undergraduate students in the pilot. Here, we offer some initial reflections on what we have learned from recording and sharing these early TOTeM tales. The objects the TOTeM team and advisors chose independently from each other included a birth tag, a box of slides, a tile, a block of surf wax, a sweet jar from Japan, a mobile phone, a concert ticket, a wrist band, a cricket bat, a watch, an iPhone, a piece of the Berlin Wall, an antique pocket sundial, and a daughter’s childhood toy. The sheer variety of the objects we selected as being personally significant was intriguing, as were the varying reasons for choosing the objects. Even there was some overlap in object choice, for instance between the mobile and the iPhone, the two items (one (relatively) old, one new) told conspicuously different stories. The mobile held the memory of a lost friend via an old text message; the iPhone was valued not only for its practical uses, but because it symbolised the incarnation of two childhood sci-fi fantasies: a James Bond-inspired tracking device (GPS) and the “Hitchhiker’s Guide to the Galaxy”. While the memories and stories linked to these objects were in many ways idiosyncratic, some patterns have emerged even at this early stage. Stories broadly differed in terms of whether they related to an individual’s personal experience (e.g. memorable moments or times in one’s life) or to their connection with other people. They could also relate to the memory of particular events, from football matches, concerts and festivals on a relatively local basis, to globally significant milestones, such as the fall of the Berlin Wall. In many cases, objects had been kept as tokens and reminders of particularly “colourful” and happy times. One student presented a wooden stick which he had picked up from a beach on his first parent-free “lads’ holiday”. Engraved on the stick were the names of the friends who had accompanied him on this memorable trip. Objects could also mark the beginning or end of a personal life stretch: for one student, his Dub Child vinyl record symbolised the moment he discovered and began to understand experimental music; it also constituted a reminder of the influence his brother had had on his musical taste. At other times, objects were significant because they served as mementos for people who had been “lost” in one way or another, either because they had moved to different places, or because they had gone missing or passed away. With some, there was a sense that the very nature of the object enabled the act of holding on to a memory in a particular way. The aforementioned mobile phone, though usually out of use, was actively recharged for the purposes of remembering. Similarly, an unused wind-up watch was kept going to simultaneously keep alive the memory of its former owner. It is commonly understood that the sharing of insights into one’s personal life provides one way of building and maintaining social relationships (Greene et al.). Self-disclosure, as it is known in psychological terms, carries some negative connotations, such as making oneself vulnerable to the judgement of others or giving away “too much too soon”. Often its achievement is dependent on timing and context. We were surprised by the extent to which some of us chose to disclose quite sensitive information with full knowledge of eventually making these stories public online. At the same time, as both researchers and, in a sense, as an audience, we found it a humbling experience to be allowed into people’s and objects’ meaningful pasts and presents. It is obvious that the invitation to talk about meaningful objects also results in stories about things and people we deeply care about. We have yet to see what shape the TOTeM platform will take as more people share their stories and learn about those of others. We don’t know whether it will be taken up as a fully-fledged communication platform or merely as an archive for object memories, whether people will continue to share what seem like deep insights into personal life stories, or if they choose to make more subversive (no less meaningful) contributions. Likewise, it is yet to be seen how the linking of objects with personal stories through tagging could impact people’s relationships with both the objects and the stories they contain. To us, this initial trial phase, while small in scale, has re-emphasised the potential of sharing object memories in the emerging network of symbolic meaning (Weinberger’s “context of meaning”). Seemingly everyday objects did turn out to contain stories behind them, personal stories which people were willing to share. Returning to Weinberger’s quote with which we began this article, TOTeM will enable the traces of material experiences and relationships to become persistently accessible: giving something away would no longer mean entirely not having it, as the narrative of the object’s significance would persist, and can be added to by future participants. Indeed, TOTeM would enable participants to “give away” more than just the object, while retaining access to the tale which would augment the object. Greenfield ends his discussion of the potential of ubicomp by listing multiple experiences which he does not believe would benefit from any technological augmentation: Going for a long run in the warm gentle rain, gratefully and carefully easing my body into the swelter of a hot springs, listening to the first snowfall of winter, savouring the texture of my wife’s lips … these are all things that require little or no added value by virtue of being networked, relational, correlated to my other activities. They’re already perfect, just as they stand. (258) It is a resonant set of images, and most people would be able to produce a similar list of meaningful personal experiences. Yet, as we have already suggested, technology and meaning need not be mutually exclusive. Indeed, as the discussion of TOTeM begins to illustrate, the use of new technologies in new contexts can augment the commercial applications of ubiquoutous computing with meaningful human communication. At the time of writing, the TOTeM platform is in the later stages of development. We envisage the website taking shape and its content becoming more and more meaningful over time. However, some initial object memories should be available from April 2010, and the TOTeM platform and mobile tagging applications will be fully operational in the summer of 2010. Our progress can be followed on www.youtotem.com and http://twitter.com/talesofthings. TOTeM looks forward to receiving “tales of things” from across the world. References Bourdieu, Pierre. Distinction: A Social Critique of the Judgement of Taste. London: Routledge, 1984.Bruns, Axel. “The Future is User-Led: The Path towards Widespread Produsage.” fibreculture 11 (2008). 20 Mar. 2010 ‹http://www.journal.fibreculture.org/issue11/issue11_bruns_print.html›. Dodson, Sean. “Forward: A Tale of Two Cities.” Rob van Kranenburg. The Internet of Things: A Critique of Ambient Technology and the All-Seeing Network of RFID. Amsterdam: Institute of Network Cultures, Network Notebooks 02, 2008. 5-9. 20 Mar. 2010 ‹http://www.networkcultures.org/_uploads/notebook2_theinternetofthings.pdf›. Gitelman, Lisa, and Geoffrey B. Pingree. Eds. New Media: 1740-1915. Cambridge, MA: MIT Press, 2003. Greene, Kathryn, Valerian Derlega, and Alicia Mathews. “Self-Disclosure in Personal Relationships.” Ed. Anita L. Vangelisti and Daniel Perlman. Cambridge Handbook of Personal Relationships. Cambridge: Cambridge UP, 2006. 409-28. Greenfield, Adam. Everyware: The Dawning Age of Ubiquitous Computing. Berkeley, CA: New Riders, 2006. Kawamoto, Dawn. “Report: 3G and 4G Market Share on the Rise.” CNET News 2009. 20 Mar. 2010 ‹http://news.cnet.com/8301-1035_3-10199185-94.html›. Kwint, Marius, Christopher Breward, and Jeremy Aynsley. Material Memories: Design and Evocation. Oxford: Berg, 1999. Miller, Daniel. The Comfort of Things. Cambridge: Polity Press, 2008. Ofcom. ”Accessing the Internet at Home”. 2009. 20 Mar. 2010 ‹http://www.ofcom.org.uk/research/telecoms/reports/bbresearch/bbathome.pdf›. Thomson, Rachel, and Janet Holland. “‘Thanks for the Memory’: Memory Books as a Methodological Resource in Biographical Research.” Qualitative Research 5.2 (2005): 201-19. Turkle, Sherry. Evocative Objects: Things We Think With. Cambridge, MA: MIT Press, 2007. Valhouli, Constantine A. The Internet of Things: Networked Objects and Smart Devices. The Hammersmith Group Research Report, 2010. 20 Mar. 2010 ‹http://thehammersmithgroup.com/images/reports/networked_objects.pdf›. Van Dijk, Jan. The Network Society: Social Aspects of New Media. London: SAGE, 1999. Weinberger, David. Small Pieces Loosely Joined: How the Web Shows Us Who We Really Are. Oxford: Perseus Press, 2002.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography