To see the other types of publications on this topic, follow the link: RESID (Computer program).

Journal articles on the topic 'RESID (Computer program)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'RESID (Computer program).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Wasserman, L., and E. Bowell. "Astrometry with the Lowell PDS." Symposium - International Astronomical Union 109 (1986): 231–36. http://dx.doi.org/10.1017/s0074180900076622.

Full text
Abstract:
The Lowell Observatory PDS is currently used in several projects which necessitate astrometric reduction of photographic plates. To meet this need, we have developed a series of computer programs for astrometric data reduction which enable the user to obtain maximum flexibility from the PDS while at the same time retaining ease of use. In its simplest form our astrometric “package” consists of four separate programs. The first two constitute the “data taking” part of the process and reside on a DEC PDP 11/34, the computer which controls the PDS. The second two programs handle “data reduction” and reside on Lowell's general purpose computer, a DEC PDP 11/55.
APA, Harvard, Vancouver, ISO, and other styles
2

Grbich, Carol. "Computing Packages for Qualitative Data Management: What is Their Real Impact?" Australian Journal of Primary Health 4, no. 4 (1998): 98. http://dx.doi.org/10.1071/py98065.

Full text
Abstract:
Computer packages targeted at qualitative data are readily available and the methodology sections of research articles indicate that they are being utilised by some health researchers. The purpose of this article is to draw together concerns which have been expressed by researchers and critics and to place these within the perspective of 'framing' (MacLachlan & Reid, 1994). Here, the focus becomes the frame that these computer programs impose on qualitative data. Inevitably, all data sets are disturbed by the techniques of collection and the conceptual and theoretical frames imposed, but computer framing not only distorts physically but also imposes an often minimally acknowledged frame constructed by the metaphors and implicit ideology of the program. This frame is in opposition to most of the recent changes in qualitative data interpretation, which have emphasised context, thick description and exposure of the minimally disturbed voices of participants.
APA, Harvard, Vancouver, ISO, and other styles
3

NIgam, Gaurav Kumar. "SOFTWARE AUDIT SYSTEM." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 3 (November 30, 2012): 406–12. http://dx.doi.org/10.24297/ijct.v3i3a.2946.

Full text
Abstract:
To remotely monitor your computer over the internet, you have to install this software on the remote computer (called as server) as well as on your own computer (called as client). When connected , Software Audit System software gives you the full mouse and keyboard control over your computer and you can see the whole screen of the remote PC on your own desktop. As we know that computer networks within companies and organizations become more extensive and more complex, there is a considerable growth in the number of software programs that are installed and used on the computer systems. In order to increase the reliability and efficiency of computer Systems, it is mandatory that we clearly understand and control all the computer programs that are being used. The problem may also arise when people installing unauthorized or copied computer programs on their Desktop PC's. It is necessary that we provide auditing tools that can facilitate audit data either locally or reside on to a central network manager and it gives the information related to the installed and used computer programs
APA, Harvard, Vancouver, ISO, and other styles
4

Rathore, Kanishka Singh. "Gesture Controlled Music Player." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 15, 2021): 1185–89. http://dx.doi.org/10.22214/ijraset.2021.35167.

Full text
Abstract:
A music player is a computer program for playing audio files or songs encoded in MP3 format. This application will reside in the user's computer, such as iTunes, Windows Media Player and RealPlayer that are used to organize a music collection and play audio files. Our player provides an easy-to-use graphical user interface with symbols provided on the buttons to enable varied types of users to use the player efficiently. Along with the basic functionalities of a music player like playing, pausing, stopping and playing next or previous song, we have provided some interesting features which make our player intelligent. Hence, we have rightly named it ‘Brain Waves Music Player’. It has the ability to judge our sentiments and play the suitable songs accordingly. Also, the player can be controlled using gestures.
APA, Harvard, Vancouver, ISO, and other styles
5

Puttick, Gillian, Brian Drayton, and Joan Karp. "Digital Curriculum in the Classroom: Authority, Control, and Teacher Role." International Journal of Emerging Technologies in Learning (iJET) 10, no. 6 (December 16, 2015): 11. http://dx.doi.org/10.3991/ijet.v10i6.4825.

Full text
Abstract:
With greater online access and greater use of computers and tablets, educational materials are increasingly available digitally, and are soon predicted to become the standard for science classrooms. However, researchers have found that institutionalized structures and cultural factors in schools affect teacher uptake and integration of technology. Findings are sparse that detail the complexities of how teachers actually incorporate technology in their teaching as they negotiate the introduction of a new and potentially disruptive innovation. With respect to a digital curriculum in particular, teachers can be unclear about their role vis-a-vis the curriculum, as the "computer" potentially becomes an alternative source of authority in the classroom, and this can mean that the teacher is no longer in control. This paper reports on the implementation of two units of an innovative environmental science program, Biocomplexity and the Habitable Planet, as a digital curriculum. We discuss some of the lessons learned about the mix of challenges, anticipated and unanticipated, that confronted four high school teachers as they implemented the curriculum in their classrooms. We suggest that developers and users of digital curricula pay particular attention to how they envision where the authority for teaching and learning in the classroom should reside.
APA, Harvard, Vancouver, ISO, and other styles
6

Leavesley, P. J., and C. E. Knight. "An Analytical Model of Strength Loss in Filament Wound Spherical Vessels." Journal of Pressure Vessel Technology 109, no. 3 (August 1, 1987): 352–56. http://dx.doi.org/10.1115/1.3264877.

Full text
Abstract:
The potential strength degradation of a filament wound sphere was predicted using an incremental finite element model of the composite during fabrication. The sphere was modeled taking into account the winding pattern and the resulting internal layer boundaries. The thickness profile of the sphere’s layers were computed using a pattern simulation program. The total thickness profile and layer thickness profiles were used by the mesh generating program to ensure that the elements generated matched layer boundaries. The elements were isoparametric quadrilaterals which were collapsed to triangular elements for transitions. The main feature of the finite element program was the incremental construction and loading of the model to simulate the winding process. Strength degradation definitely occurs when the average fiber strain in any layer is negative. The negative strain means that all the winding tension has been lost from the layer, and the imposition of compressive strain causes fibers in uncured resin to wrinkle or buckle. Then when the resin cures the buckled region of fibers are degraded in strength. An analysis of a Kevlar/epoxy sphere demonstrated that strength degradation could occur. The innermost layers showed significant tension loss and compressive strain during fabrication which would produce strength degradation. The model sphere was a typical thick wall construction using normal processing conditions.
APA, Harvard, Vancouver, ISO, and other styles
7

Petrini, Morena, Silvia Di Lodovico, Giovanna Iezzi, Alessandro Cipollina, Adriano Piattelli, Luigina Cellini, and Simonetta D’Ercole. "Effects of Complex Electromagnetic Fields on Candida albicans Adhesion and Proliferation on Polyacrylic Resin." Applied Sciences 11, no. 15 (July 23, 2021): 6786. http://dx.doi.org/10.3390/app11156786.

Full text
Abstract:
(1) Background: The objectives of this study were to evaluate the effect of several sessions of the antibacterial protocol of complex electromagnetic fields (CMFs) on planktonic Candida albicans and fungal ability, after treatment with CMFs, to adhere and proliferate on acrylic resin materials. (2) Methods: Planktonic overnight cultures of Candida albicans were subjected to different entities of CMFs treatments. Four test groups were compared: “p1”: treated only with the first program of the antibacterial protocol; “p1–p5” subjected to the first five programs; “1 antibacterial” received one complete session of the protocol and “2 antibacterial” received two complete sessions. After the treatments, the number of colony forming units (CFUs) were recorded. Then, C. albicans broth cultures were cultivated on polyacrylic resin discs and evaluated for CFUs and subjected to scanning electron microscope (SEM) analysis. (3) Results: Microbiological analysis showed that CMFs promoted a significant reduction of C. albicans CFUs when the protocol “p1–p5” was applied. No statistically significant differences between test groups were observed if the time of exposure to CMFs was increased. SEM observations and CFUs showed that CMFs treatments have the ability to reduce C. albicans adherence and proliferation on discs. (4) Conclusions: The CMFs showed an antifungal effect as well as a decrease in C. albicans adhesion on polyacrylic resin.
APA, Harvard, Vancouver, ISO, and other styles
8

Krchňák, Viktor, Josef Vágner, and Ivan Hirsch. "Simultaneous synthesis of sequence-unrelated peptides derived from proteins of human papillomaviruses." Collection of Czechoslovak Chemical Communications 53, no. 11 (1988): 2645–53. http://dx.doi.org/10.1135/cccc19882645.

Full text
Abstract:
Amino acid sequences derived from the early (E) and late (L) coding regions of human papillomaviruses (HPV) type 6, 11, and 16 were analysed by means of a computer program for prediction of B-cell determinants. Eight peptides ranging from 9 to 17 amino acids and containing potential B-cell determinants were selected for synthesis. The peptides were synthesized by using a configuration for solid-phase synthesis that enables the simultaneous synthesis of several peptides in flow reactors at low pressure on standard poly(styrene-1% divinylbenzene)resin. Crude peptides were obtained in good yield and purity. They were then further purified by high-performance liquid chromatography for use as solid antigens in site-directed serology.
APA, Harvard, Vancouver, ISO, and other styles
9

Izaola, Zunbeltz, and Gotzon Madariaga. "DiXP: a Python-based GUI for controlling a powder diffractometerviathe Internet." Journal of Applied Crystallography 41, no. 2 (March 8, 2008): 481–82. http://dx.doi.org/10.1107/s0021889808000861.

Full text
Abstract:
DiXPis a multi-platform data collection program decoupled from low-level basic hardware management and based on the idea of client/server remote control. The main function ofDiXPis the sequential coordination of those basic operations, allowing different strategies for the collection, archiving and graphical representation of measured data.DiXPand the control software reside, in general, on different computers and communicate with one anotherviathe Internet using TCP sockets. The disconnection between low-level handling and the measurement process makesDiXPof general use for controlling a two-circle diffractometer, and this approach can be easily extended to more complex goniometers.
APA, Harvard, Vancouver, ISO, and other styles
10

Kim, Seong-Min, Keunbada Son, Duk-Yeon Kim, and Kyu-Bok Lee. "Digital Evaluation of the Accuracy of Computer-Guided Dental Implant Placement: An In Vitro Study." Applied Sciences 9, no. 16 (August 16, 2019): 3373. http://dx.doi.org/10.3390/app9163373.

Full text
Abstract:
Compared to traditional implant surgical guides, computer-assisted implant surgical guides can be considered for positioning implants in the final prosthesis. These computer-assisted implant surgical guides can be easily fabricated with personal 3D printers after being designed with implant planning CAD software. Although the accuracy of computer-assisted implant surgical guides fabricated using personal 3D printers is an important factor in their clinical use, there is still a lack of research examining their accuracy. Therefore, this study evaluated the accuracy of computer-assisted implant surgical guides, which were designed using two implant planning CAD software programs (Deltanine and R2gate software) and fabricated with personal 3D printers using a non-radiographic method. Amongst the patients who visited Kyungpook National University Dental Hospital, one patient scheduled to undergo surgery of the left mandibular second premolar was randomly selected. Twenty partially edentulous resin study models were produced using a 3D printer. Using the Deltanine and R2gate implant planning CAD software, 10 implant surgical guides per software were designed and produced using a personal 3D printer. The implants (SIII SA (Ø 4.0, L = 10 mm), Osstem, Busan, Korea) were placed by one skilled investigator using the computer-assisted implant surgical guides. To confirm the position of the actual implant fixture, the study models with the implant fixtures were scanned with a connected scan body to extract the STL files, and then overlapped with the scanned file by connecting the scan body-implant fixture complex. As a result, the mean apical deviation of the Deltanine and R2gate software was 0.603 ± 0.19 mm and 0.609 ± 0.18 mm, while the mean angular deviation was 1.97 ± 0.84° and 1.92 ± 0.52°, respectively. There was no significant difference between the two software programs (p > 0.05). Thus, the accuracy of the personal 3D printing implant surgical guides is in the average range allowed by the dental clinician.
APA, Harvard, Vancouver, ISO, and other styles
11

Son, Keunbada, and Kyu-Bok Lee. "A Novel Method for Precise Guided Hole Fabrication of Dental Implant Surgical Guide Fabricated with 3D Printing Technology." Applied Sciences 11, no. 1 (December 23, 2020): 49. http://dx.doi.org/10.3390/app11010049.

Full text
Abstract:
A dental implant surgical guide fabricated by 3-dimensional (3D) printing technology is widely used in clinical practice due to its convenience and fast fabrication. However, the 3D printing technology produces an incorrect guide hole due to the shrinkage of the resin materials, and in order to solve this, the guide hole is adjusted using a trimmer or a metal sleeve is attached to the guide hole. These methods can lead to another inaccuracy. The present method reports a technique to compensate for a decreased guide hole caused by shrinkage that can occur when a computer-guided implant surgical guide is fabricated with a 3D printer. The present report describes a technique to adjust the size of the guide hole using a free software program to identify the optimized guide hole size that is fabricated with the 3D printer.
APA, Harvard, Vancouver, ISO, and other styles
12

Jie, Wan Qi, Xin Lei Li, and Qi Tang Hao. "Counter-Gravity Casting Equipment and Technologies for Thin-Walled Al-Alloy Parts in Resin Sand Molds." Materials Science Forum 618-619 (April 2009): 585–89. http://dx.doi.org/10.4028/www.scientific.net/msf.618-619.585.

Full text
Abstract:
A counter-gravity casting equipment (CGCE) has been developed, which is specially designed for the production of large-size thin-walled high-quality aluminum alloy parts with resin sand molds. In this equipment, molten metal will be pushed upward counter-gravity into the mold at predetermined rate by compressed air, and solidified at an increased pressure. The equipment uses assembled valve system developed ourselves, and has sensitive pressure-adjusting property. All of the casting parameters, including filling rate, pressure-exerting sequence, pressure hold time etc., can be closely controlled by a self-designed computer program. Up to 2 ton casting can be produced with the equipment. Compared to the castings produced under conventional gravity conditions, the castings under counter-gravity condition have generally high soundness, higher tensile strengths and ductility. The pinhole defects are also degraded obviously. The equipment and the technology have been widely adopted by several users in China for the production of large-size thin-walled aluminum alloy castings with high property requirements.
APA, Harvard, Vancouver, ISO, and other styles
13

Santos, Maria Jacinta M. Coelho, Mário Honorato da Silva e. Souza Júnior, Gildo Coelho Santos Júnior, Omar El-Mowafy, Ana Paula Chedid Cavalcanti, and Carla Farah Neme. "Influence of light intensity and curing cycle on microleakage of Class V composite resin restorations." Journal of Applied Oral Science 13, no. 2 (June 2005): 193–97. http://dx.doi.org/10.1590/s1678-77572005000200019.

Full text
Abstract:
The aim of this study was to determine the effect of a softstart polymerization method from Quartz-Tungsten-Halogen (QTH) and Plasma Arc (PAC) curing units on microleakage of Class V composite resin restorations with dentin cavosurface margins. Seventy-five bovine incisors received standardized class V cavities in all dentin margins. Teeth were divided into 5 equal groups according to the curing cycle. The cavities were incrementally restored with a composite resin (Single Bond/Z-100, 3M). Light curing was applied as follows: Group I: PAC light continuous-cycle curing at 1600 mW/cm² for 3s; Group II: PAC light step-cycle curing (2s at 800 mW/cm² then 4s at 1600 mW/cm²); Group III: QTH light continuous-cycle curing at 400 mW/cm² for 40s; Group IV: QTH light ramp-cycle curing (from 100 to 600 mW/cm² in 15s followed by 25s at 600 mW/cm²); Group V: QTH light pulse-delay curing (200 mW/cm² for 3s followed by 3 min delay then 600 mW/cm² for 30s). Teeth were stored in distilled water at 37ºC for 30 days and then subjected to thermocycling for 500 cycles at 5 and 55ºC. Root apices were sealed and teeth coated with nail varnish before they were immersed in 0.5% fuchsine red dye solution. Teeth were then sectioned and slices were scanned with a computer scanner to determine the area of dye leakage using a computer program (Image Tools). Images of tooth slices were also visually examined under magnification and dye penetration along the tooth/restoration interface was scored. Significant differences in the degree of dye penetration and leakage were detected between groups (p<.05). Groups I and II had significantly higher values of dye penetration and leakage than groups III, IV and V. In conclusion, the use of PAC light curing in a continuous or step cycle modes resulted in increased microleakage of Class V resin composite restorations compared with medium intensity QTH light curing. Pulse, ramp and continuous-cycle curing modes with QTH light resulted in similar degrees of microleakage.
APA, Harvard, Vancouver, ISO, and other styles
14

Pollock, D. Stephen G. "Enhanced Methods of Seasonal Adjustment." Econometrics 9, no. 1 (January 5, 2021): 3. http://dx.doi.org/10.3390/econometrics9010003.

Full text
Abstract:
The effect of the conventional model-based methods of seasonal adjustment is to nullify the elements of the data that reside at the seasonal frequencies and to attenuate the elements at the adjacent frequencies. It may be desirable to nullify some of the adjacent elements instead of merely attenuating them. For this purpose, two alternative sets of procedures are presented that have been implemented in a computer program named SEASCAPE. In the first set of procedures, a basic seasonal adjustment filter is augmented by additional filters that are targeted at the adjacent frequencies. In the second set of procedures, a Fourier transform of the data is exploited to allow the elements in the vicinities of the seasonal frequencies to be eliminated or attenuated at will. The question is raised of whether an estimated trend-cycle trajectory that is devoid of high-frequency noise can serve in place of the seasonally adjusted data.
APA, Harvard, Vancouver, ISO, and other styles
15

Trytek, A., A. W. Orłowicz, M. Tupaj, M. Mróz, O. Markowska, G. Bąk, and T. Abram. "The Effect of a Thin-Wall Casting Mould Cavity Filling Conditions on the Casting Surface Quality." Archives of Foundry Engineering 16, no. 4 (December 1, 2016): 222–26. http://dx.doi.org/10.1515/afe-2016-0113.

Full text
Abstract:
Abstract The paper presents results of metallographic examination of faults occurring in the course of founding thin-walled cast-iron castings in furan resin sand molds. A non-conformance of the scab type was Observed on surface of the casting as well as sand buckles and cold shots. Studied the chemical composition by means of a scanning electron microscope in a region of casting defects: microanalysis point and microanalysis surface. Around the observed defects discloses high concentration of oxides of iron, manganese and silicon. A computer simulation of the casting process has been carried out with the objective to establish the cause of occurrence of cold shots on casting surface. The simulation was carried out with the use of NovaFlow & Solid program. We analyzed the flowing metal in the mold cavity. The main reason for the occurrence of casting defects on the surface of the casting was gating system, which caused turbulent flow of metal with a distinctive splash stream of liquid alloy.
APA, Harvard, Vancouver, ISO, and other styles
16

Hewan-Lowe, K. O. "Improving the user interface design for electron microscopy (EM) databases." Proceedings, annual meeting, Electron Microscopy Society of America 49 (August 1991): 536–37. http://dx.doi.org/10.1017/s0424820100086994.

Full text
Abstract:
The user interface is a critical portion of any application program. Many EM databases reside in dBASE ™, relational database management systems (RDBMS). The user interface for dBASE ™ RDBMS consists of menu choices and templates for the display of database fields. User interaction with menus and templates is by sequential keyboard input. Though the dBASE ™ RDBMS provides excellent support for database functions there is little support for the design of a functional user interface. Menus of screen choices, templates for field display and the requirement for keyboard input tend to overwhelm all but the most experienced computer user. Since most users prefer screen displays which include familiar objects, any improvement in the user interface for EM databases should seek to simulate these objects in the user interface. Because HyperPAD ™ allows the simulation of familiar objects during screen design, it is an excellent tool for constructing an improved user interface for EM databases in dBASE ™ file format.
APA, Harvard, Vancouver, ISO, and other styles
17

Ba-Hattab, Raidan A., and Dieter Pahncke. "Shaping Ability of Superelastic and Controlled Memory Nickel-Titanium File Systems: An In Vitro Study." International Journal of Dentistry 2018 (September 10, 2018): 1–5. http://dx.doi.org/10.1155/2018/6050234.

Full text
Abstract:
Improvements in the thermomechanical processing procedures of NiTi wires have led to the development of new NiTi instruments that compose mainly of martensite crystals, making the wire stable at clinical condition. This study aimed at comparing the shaping ability of two rotary nickel-titanium systems manufactured from different NiTi wires. Twenty simulated root canals each with a curvature of 35° in resin blocks were divided into two groups of 10 canals each. Canals in the first group were prepared with superelastic F360 instruments (Gebr. Brasseler, Germany) while canals in the second group were prepared using controlled memory HyFlex®CM™ instruments (Coltène Whaledent, Switzerland). Images were taken before canal preparation and after the use of each instrument. The assessment of the canal shapes was accomplished with a computer image analysis program. Data were statistically analyzed using SPSS program. Within the limitation of this in vitro study, HyFlex®CM™ instruments remained better centered in the apical third of the canals. In most canal segments, no significant differences were observed between either system in the amount of material removed. Both systems were comparable to each other in regards to their ability to enlarge root canal in the same way without procedural errors.
APA, Harvard, Vancouver, ISO, and other styles
18

Al Jmoor, Cheman Abdulrahman. "Bacterial Contamination of Acrylic Resin Complete Denture : In Vitro Study." Journal of Baghdad College of Dentistry 30, no. 2 (June 15, 2018): 1–4. http://dx.doi.org/10.26477/jbcd.v30i2.2455.

Full text
Abstract:
Background: Cross contamination of dental appliances in the dental clinics and laboratories may potentially be a health hazard to the dental team and the patient. This study aimed to evaluate bacterial contamination of acrylic complete denture as received from dental laboratory before delivery to the patient, and then to evaluate the effectiveness of disinfection with 2% chlorhexidine and Kin denture cleaner tablet. Materials and methods: 45 newly made upper complete dentures undergone biaacterial examination for contamination before delivered to the patient. Samples were examined in two stages, first after finishing and polishing; when collected from the laboratory and before inserting to the patient mouth, second; after the samples were immersed in 2 different disinfectant materials, 2% chlorhexidine mouth wash and Kin denture cleaner tablet. After initial stage, the dentures were divided into 3 groups. Group 1 immersed in Kin denture cleaner tablet for 10 minutes, group 2 immersed in 2% chlorhexidine mouth wash for 10 minutes and group 3 immersed for 20 minutes in 2% chlorhexidine. Data were analyzed with a computer-run statistical program (IBM SPSS Version 23). Results: High score of bacterial contamination was found initially in the sample collected from dental laboratory. Significant reduction in the colonies number was noticed after immersing the dentures in 2% Chlorhexidine and Kin denture cleaner tablets for10 minutes. There was nearly no contamination found with samples immersed in 2% chlorhexidine for 20 minutes. Conclusion: Dental laboratory is a main source of microbial contamination. Immersion of the dental prosthesis in disinfectant materials is essential before inserting into the patient mouth. 2%chlorhexidine mouth wash was more effective as disinfection material as compared to Kin denture cleaner tablet.
APA, Harvard, Vancouver, ISO, and other styles
19

Marčiukaitis, Gediminas, Mykolas Daugevičius, and Juozas Valivonis. "THE FRAGMENTATION OF THE TENSIONED ZONE OF THE STRENGTHENED REINFORCED CONCRETE BEAM WITH CARBON FIBER COMPOSITE." Engineering Structures and Technologies 2, no. 4 (December 31, 2010): 129–37. http://dx.doi.org/10.3846/skt.2010.17.

Full text
Abstract:
The article analyzes the intensification influence of tensioned concrete on carbon fiber composite and concrete joint in a strengthened beam cracking manner. The paper calculates enlarged concrete compressive tensioned strength according to the impregnation of epoxy resin. The article figures out the level of epoxy resin penetration and deals with a microscopic analysis of concrete and carbon fiber composite joint. The presented modified calculation method of the cracking moment evaluates the characteristics of impregnated modified tensioned concrete. Four beams were tested. Two reinforced concrete beams were additionally strengthened with an external carbon fiber composite layer and loaded till failure. In addition, two reinforced beams without external reinforcement were tested. The accomplished experimental research of cracking strengthened beams showed that the calculated cracking moments with evaluated tensioned concrete layer intensification were more similar than the results without evaluation. After failure of strengthened beams, accomplished microscopic analysisof debonded carbon fiber composite layer. A microscopic analysis of concrete and carbon fiber composite joint was performed applying electronic microscope DG-3x. The thickness of the composite layer and modified tensioned concrete layer was measured using Micro Measure V 1.0 computer program. The accomplished microscopic analysis approved theoretical assumptions about epoxy resin penetration and distribution between aggregates. The strengthening of the reinforced concrete beam with carbon fiber composite improved mechanical characteristics of the tensioned concrete layer near concrete and carbon fiber composite joint. During strengthening, epoxy resin penetrates into concrete and fills micro cracks and pores. Thus, epoxy resin provides additional connections with aggregates. The calculated modified concrete tensioned strength and modulus of elasticity was respectively 3,0 and 1,9 times higher than that of ordinary concrete. Changes in concrete strength at the tensioned layer have influence on cracking manner because the ultimate deformation of modified concrete increases. Experimentally determined what evolution of vertical crack starts above the modified tensioned concrete layer at the joint with carbon fiber composite. Peeling the carbon fiber composite layer when the ultimate load level is reached also evolves above the modified tensioned concrete layer. The remained hydrated cement on the surface of the peeled external composite layer proves that shear stresses in the joint of concrete and carbon fiber composite reduced a weaker tensioned layer of concrete.
APA, Harvard, Vancouver, ISO, and other styles
20

Devy, Laxsmy. "SIMULASI SISTEM PENDETEKSI UNTUK PERALATAN ELEKTRONIK DI RUMAH MELALUI SMS( Short Messages Service )." Elektron : Jurnal Ilmiah 1, no. 1 (September 10, 2009): 82–94. http://dx.doi.org/10.30630/eji.1.1.13.

Full text
Abstract:
Simulation of detection system for equipments electronics aim to facilitate people watch existence of equipments electronics or other valuable objects that still residing in on position which determined, if house in a state of remained house owner. This detection also at the same time can be functioned as preventative of thief. This detection system use 2 of HP ( Handphone), HP1 reside in house which incircuit with detection system and HP2 holded by house owner. Existence of electronics equipments that residing in house can be watched automatically from long distance with delivering SMS from HP1 to HP2 on the happening of condition of electronic equipments making of move from initialy position, also alarm will sound at home for notification to security or neighbour. SMS can be also delivered from HP2 to HP1 for the checking of electronic equipments if notification of HP2 at home don’t be executed when position the electronic equipments have making a move. The detection in the form of censor infra red (optocoupler) residing in at elbow equipments of electronic at home which input to parallel port ( DB25) of PC ( personal of computer). While HP1 incircuit serially port ( DB9) and thsi function of HP is executed by program of Visual Basic 6.0. Program to detect infra red and activate alarm also use Visually Basic 6.0.
APA, Harvard, Vancouver, ISO, and other styles
21

Koziol, Mateusz. "Mechanical Performance of Polymer-Matrix Laminate Reinforced with 3D Fabric during Three-Point Impact Bending." Solid State Phenomena 246 (February 2016): 193–96. http://dx.doi.org/10.4028/www.scientific.net/ssp.246.193.

Full text
Abstract:
The paper presents the analysis of course and the results of impact 3-point bending tests conducted with use of instrumented Charpy hammer (CEAST RESIL 50 hammer + MC101 registrator + CALKA J computer program) on GFRP laminate specimens cut of the panels manufactured by RTM method on base of classic plain-woven fabric preform and 3D fabric. The specimens of the 3D laminate were cut alternatively along (W direction) and transverse (P direction) to the translaminar interweave strands. It was found that maximum force obtained in the tests is comparable for both the classic and the 3D laminates. Deformability of the 3D (W) specimen is by about 20% higher than those of the classic laminate, whereas it is higher by even 75% for 3D (P). The trend of deformability observed for the tested laminates differs from known trends characteristic for static conditions what confirms different material response mechanisms at low and higher load rate. Failure energy in the classic and in the 3D (W) specimen is on comparable level. However, 3D (P) specimen showed slightly lower summary failure energy than the classic one and almost twice a high failure initiation energy (first effects of failure occur before maksimum load is gained).
APA, Harvard, Vancouver, ISO, and other styles
22

Bradel, Susanne, Laura Doniga-Crivat, Silke Besdo, Franziska Lexow, Michael Fehr, Thomas Lenarz, Nils Prenzler, and Gudrun Brandes. "Innovative 3D Model of the Human Middle Ear in High Resolution with a Histological Microgrinding Method: A Feasibility Study and Comparison with μCT." International Journal of Otolaryngology 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/6753604.

Full text
Abstract:
Conclusion. The development of a histological 3D model of the tympanic cavity visualizes the exact microanatomy of the sound conduction organ and is therefore essential for finite elements simulations and surgical training. Objectives. So far, no accurate histological 3D model of the sound conduction system existed in literature. For 3D reconstruction of the very fine structures inside and outside the auditory ossicles, a method based on histological slices allows a more differential analysis of both hard and soft tissues and could thus be superior to μCT. Method. A complete temporal bone was embedded in epoxy resin and microground in distances of about 34 μm. After photodocumentation of every plane, a 3D reconstruction was performed by using the Computer Aided Design (CAD) program Rhinoceros 5®. For comparison, a μCT of the same specimen resulted in a 3D model of the calcified structures in the middle ear. Results. The histological 3D model gives an excellent overview to all anatomical soft and bony tissues of the human auditory ossicles. Specifically the fine blood vessel system and the exact dimension of cartilage areas inside the ossicles can be illustrated much more precisely than with μCT data. The present technique also allows the evaluation of the fine connecting ligaments inside the tympanic cavity.
APA, Harvard, Vancouver, ISO, and other styles
23

Skrzypkowski, Krzysztof. "The Influence of Room and Pillar Method Geometry on the Deposit Utilization Rate and Rock Bolt Load." Energies 12, no. 24 (December 13, 2019): 4770. http://dx.doi.org/10.3390/en12244770.

Full text
Abstract:
In this article, a model of ore deposit in form of a lense carried out in the MineScape program, is presented. The lense had a thickness of 30 m, length along the strike 200 m, and the depth buried was for 80 m to 110 m below the surface. In the first layer, counting from the lowest level, a room and pillar method with variable geometry was designed. The width and length dimensions for rooms and pillars were: 4 m, 5 m and 6 m, respectively. For the selected part of the deposit, three variants of the system with variable geometry of rooms and pillars were designed, for which the deposit utilization coefficient was determined. The next stage of the research was to determine the influence of the geometry of the pillars and rooms on the range of the rock destruction zone around room excavations. For this purpose, numerical calculations using the three-dimensional Examine 3D program, based on the boundary element method, were made. The results of numerical tests were used to calculate the load of the rock bolt support, which is currently used in the zinc and lead underground mine “Olkusz-Pomorzany” in Poland. Currently in the mine, the bolt spacing is 1 m × 1 m, and the technology for fixing the bolt rod is based on resin cartridges that completely fill the bolt hole. In order to spread the spacing of the rock bolt support and to apply segmental fixing of the bolt rod, in the laboratory tests, rock bolt supports with increased strength were tested. Based on the results obtained, it was found that the rock bolt can be installed segmentally, using a cement grout, and its spacing can be increased to 2 m.
APA, Harvard, Vancouver, ISO, and other styles
24

Schmidt, Tim, Florian Schimmer, Aaron Widera, David May, Nicole Motsch, and Constantin Bauer. "A Novel Simulative-Experimental Approach to Determine the Permeability of Technical Textiles." Key Engineering Materials 809 (June 2019): 487–92. http://dx.doi.org/10.4028/www.scientific.net/kem.809.487.

Full text
Abstract:
Since years, fiber reinforced polymer composite (FRPC) parts made by Liquid composite molding (LCM) make up a significant share of the composite market. In LCM dry reinforcing structure gets impregnated with a resin system. Permeability, a material parameter with key influence on all LCM processes, quantifies the conductance of technical textiles for resin flow. Today, when a numerical filling simulation is applied for process design, large experimental test programs are required for characterization of permeability, as the permeability has to be measured for all textiles processed and also the dependency e.g. on the fiber volume content has to be considered. Together with Math2Market GmbH (M2M), the IVW currently develops a novel simulative-experimental approach (SEA), using experimental tests to calibrate a simulation model for replacing a significant amount of the experimental tests through “virtual” measurements. In a first step the functionality of the simulation and the most appropriate methods for textile modelling were investigated. For this, three routes were followed: At first a micro-computer tomograph (μCT)-scan of a glass fiber non-crimp fabric was fed into GeoDict, the material simulation software developed by M2M. Second, a digital model (DM) of the textile was created by computer modelling of basic structure and subsequent virtual compaction. μCT-model and DM were then used for computational fluid flow simulation which gives the direction-dependent permeability as an output. The DM calibrated by experiments represents the SEA and results in the digital twin. Third route was the experimental permeability measurement to generate reference values. Comparing the results of all three routes allows statements about the functionality of the simulation and accuracy of modelling. The rather deficient correlation between the results of experiments and μCT-model based simulations revealed that segmentation is a remarkable source of error despite the use of recognized methods. Different modeling approaches were followed to build up the digital twin. The best results were achieved with models undergoing a virtual compaction step, which takes various imperfections such as yarn deformation and varying nesting behavior into account. With this 2.25 - 6.75% deviation from the experimental results at an average standard deviation of 21.9 - 61.2% were achieved. Hence, the digital twin shows a better correlation than the μCT-model and high potential for substitution of experiments. Even better results are expected when in a next step a local anisotropic permeability will be allocated to the yarns.
APA, Harvard, Vancouver, ISO, and other styles
25

Nam, Hyung-Jin, You-Min Kim, Yong Hoon Kwon, Kyung-Hyeon Yoo, Seog-Young Yoon, In-Ryoung Kim, Bong-Soo Park, Woo-Sung Son, Seung-Min Lee, and Yong-Il Kim. "Fluorinated Bioactive Glass Nanoparticles: Enamel Demineralization Prevention and Antibacterial Effect of Orthodontic Bonding Resin." Materials 12, no. 11 (June 4, 2019): 1813. http://dx.doi.org/10.3390/ma12111813.

Full text
Abstract:
Orthodontic treatment involving the bonding of fixed appliances to tooth surfaces can cause white spot lesions (WSLs). WSLs increase the likelihood of cavity formation and hence require preservation and prosthetic restoration. Therefore, the prevention of WSLs is of greater importance than treatment. Application of fluoride or the use of fluoride-containing mouthwash can prevent WSLs, but this requires patient cooperation and additional time and cost. Bioactive glass containing 2.5% fluoride was synthesized and mixed with the orthodontic bonding adhesive Transbond XT Low Flow (LV) at ratios of 1, 3, and 5% to prepare orthodontic adhesive samples. Scanning electron microscopy (SEM) and X-ray diffraction (XRD) were used to characterize the samples. The Vickers hardness test, bracket retention test, and adhesive remnant index (ARI) of the samples were analysed to determine their mechanical properties. To determine the biological cytotoxicity, the cell activity of the samples was evaluated using cell viability tests and the antibacterial activity was analysed using Streptococcus mutans. To evaluate the anti-demineralization effect, the sample was bonded to extracted teeth and a pH cycle test was performed. Micro computed tomography data were obtained from the bonded teeth and sample, and the anti-demineralization effect was evaluated using the ImageJ software program. The Vickers hardness of the sample was higher than that of LV and was dependent on the concentration of fluoride-containing bioactive glass (FBAG). The bracket retention test and ARI of the sample showed no significant differences from those of LV. The cell viability test showed no significant changes at 24 and 48 h after application of the sample. The fluoride ion release test indicated an ion release rate of 9.5–17.4 μg/cm2. The antibacterial activity of the experimental group containing FBAG was significantly higher than that of the LV group. The anti-demineralization test showed a concentration-dependent increase. However, the resin containing 5 mass% FBAG (FBAG5) showed a statistically-significant increase compared with LV. The orthodontic adhesive containing FBAG showed antibacterial and anti-demineralization effects, thus indicating possible WSL prevention activity.
APA, Harvard, Vancouver, ISO, and other styles
26

Mikuš, Vladimír, Martina Ridzoňová, and Pavol Steltenpohl. "Fuel additives production: ethyl-t-butyl ether, a case study." Acta Chimica Slovaca 6, no. 2 (October 1, 2013): 211–26. http://dx.doi.org/10.2478/acs-2013-0034.

Full text
Abstract:
Abstract The students frequenting the program Chemical Engineering at the Department of Chemical and Environmental Engineering, Faculty of Chemical and Food Technology of the Slovak University of Technology in Bratislava are taught to be able to combine and develop their knowledge acquired in the area of chemical, energetic, environmental, and safety engineering. Prior to completing their study, they are obliged to develop a report regarding engineering, economic, and safety analysis of important chemical technology. This paper presents the most valuable outputs of the student’s Technology project aimed on simulation and optimization of the fuel additives production technology. 2-Ethoxy-2-methylpropane (ethyl-t-butyl ether, ETBE) production based on liquid-phase etherification of 2-methylpropene with ethanol in the presence of heterogeneous catalyst was studied. Different patented technologies were investigated in terms of their profitability and safeness. The first technology was an isothermal reactor with the product separation via distillation (Kochar & Marcell, 1981). The next ETBE production design assumed was a modification of the previous one; the product separation was carried out using liquid-phase extraction (Pucci et al., 1992). The last design considered in this study was a reactive distillation column with a pre-reactor (Bakshi et al., 1992). In all three technologies, etherification reaction was carried out using Amberlyst ion-exchange resin in its H+ form as the catalyst. Selected ETBE production designs were simulated using Aspen+ program. Their profitability was compared on basis of the investment and operation costs assessment taking into account both the produced ETBE yield and purity. Further, basic safety analysis of all chosen technologies was performed in order to identify possible hazards. Finally, individual and social risk connected with the plant operation was computed. Taking into account these economic and safety criteria, the best alternative for ETBE production was the reactive distillation.
APA, Harvard, Vancouver, ISO, and other styles
27

APOSTOLESCU, Nicolae, Ion TOMESCU, Dragos Daniel Ion GUTA, and Radu BOGATEANU. "The autonomous control of landing on mobile platforms." INCAS BULLETIN 13, no. 3 (September 4, 2021): 3–12. http://dx.doi.org/10.13111/2066-8201.2021.13.3.1.

Full text
Abstract:
In this paper, we propose a simulation application that allows an aerial vehicle to land autonomously on a moving platform in the presence of uncertainties and disturbances. We have tested our method with various speeds and positions for the landing platform. In the context of this article, the autonomous control of landing on mobile platforms consists in synchronizing the movement of an aerial vehicle with the movement of the mobile platform. As a first step, the Spacelab INCAS laboratory group has developed an offline simulation application that allows an ABB robot to receive information on the movement of a Stewart-type mobile platform in order to conduct a landing process. The application can initiate a landing process on the mobile platform and guide the vehicle for perfect docking on the platform. Offline simulation allows the study of several scenarios of a robot working cell - the mobile platform before setting up the production cell. The offline application has a distributed client-server structure. The client communicates with the server through specific communication protocols. The client and server can reside on the same computer. The client application is developed in the Matlab environment and has as object the simulation and programming of the PS-6TL-1500 platform; the server one simulates and programs an ABB 7600-500/2.55 robot that moves on the track, in the RAPID language under RobotStudio ABB simulator.
APA, Harvard, Vancouver, ISO, and other styles
28

Kirak, Oktay, Eugene Ke, Kevin Y. Yang, Anna Schwarz, Lars Plate, Amy Nham, Justin R. Abadejos, et al. "Premature Activation of Immune Transcription Programs in Autoimmune-Predisposed Mouse Embryonic Stem Cells and Blastocysts." International Journal of Molecular Sciences 21, no. 16 (August 11, 2020): 5743. http://dx.doi.org/10.3390/ijms21165743.

Full text
Abstract:
Autoimmune diabetes is a complex multifactorial disease with genetic and environmental factors playing pivotal roles. While many genes associated with the risk of diabetes have been identified to date, the mechanisms by which external triggers contribute to the genetic predisposition remain unclear. Here, we derived embryonic stem (ES) cell lines from diabetes-prone non-obese diabetic (NOD) and healthy C57BL/6 (B6) mice. While overall pluripotency markers were indistinguishable between newly derived NOD and B6 ES cells, we discovered several differentially expressed genes that normally are not expressed in ES cells. Several genes that reside in previously identified insulin-dependent diabetics (Idd) genomic regions were up-regulated in NOD ES cells. Gene set enrichment analysis showed that different groups of genes associated with immune functions are differentially expressed in NOD. Transcriptomic analysis of NOD blastocysts validated several differentially overexpressed Idd genes compared to B6. Genome-wide mapping of active histone modifications using ChIP-Seq supports active expression as the promoters and enhancers of activated genes are also marked by active histone modifications. We have also found that NOD ES cells secrete more inflammatory cytokines. Our data suggest that the known genetic predisposition of NOD to autoimmune diabetes leads to epigenetic instability of several Idd regions.
APA, Harvard, Vancouver, ISO, and other styles
29

Mia, Ar Mia. "Pengaruh Teknologi Informasi Terhadap akhlak siswa kelas V SDN 147 Pekanbaru." el-Ibtidaiy:Journal of Primary Education 2, no. 2 (November 28, 2019): 74. http://dx.doi.org/10.24014/ejpe.v2i2.8228.

Full text
Abstract:
Education of behavior represent especial problems which always become human being challenge in as long as history civilization of nations [in] world. history indicating that a[n nation will be sturdy if its sturdy behavior conversely a[n nation will collapse if its behavior destroy This research aim to to know what is there [is] influence which are positive [among/between] Penggunaaan Information Technology with student behavior of SD Country 147 Pekanbaru. To obtain;get required [by] data [is] writer use three data collecting technique that is: (1) Enquette, ( 2) Documentation Population in this research [is] Class student of V [in] SD Country 147 Town of Pekanbaru amounting to 139 student people. Because to the number of population, hence writer take sampel that is 25% from existing population with technique of Proposional Random Sampling. Become sampel of this research that is counted 35 student people. In quantitative data processing, writer of technique cave analyse quantitative approach with technique cave analyse linear regresi with Smallest Square method by using computer program of SPSS Windows version for 18.0 Conclusion that pursuant to reached persetase in this research can know that there is influence which [is] signifikan [among/between] Usage of Information Technology to student behavior. Influence storey;level [among/between] both variable reside in [at] high or strong category with reng ( 0,700 - 0,900), that is equal to 0,794. While coefficient of determinasi( Square R) [is] 0,631, Contribution information technology to student behavior equal to 0,631 X 100 = 63,1 % and rest influenced by other factor. this situation indicate that active progressively student in using Information Technology, hence student behavior progressively shift from behavior of Islami.
APA, Harvard, Vancouver, ISO, and other styles
30

Tarek, Yasmine, Nawar AlDeghaishem, Raghad AlNassar, Alaa AlKhamsan, and Khames T. Alzahrani. "Indirect Restorative Materials and Techniques Selection and Used by General Dentists in Riyadh, Kingdom of Saudi Arabia." International Journal of Innovative Research in Medical Science 5, no. 12 (December 4, 2020): 579–84. http://dx.doi.org/10.23958/ijirms/vol05-i12/1006.

Full text
Abstract:
Introduction: Dentistry is a highly commercialized profession, constantly changing with many new technologies, techniques, and dental materials. Patients suffering from dental decay and missing teeth would like to have their teeth replaced with the most aesthetically appealing and long-lasting material and technique possible and general dental practitioners provide a significant number of indirect restorations and fixed prostheses and the following are the most commonly used categories of indirect restorations in dental practice Inlays, Onlays, Veneers and Single crowns. Objectives: The purpose of this study is to investigate the use and selection of dental material used in indirect restorations by general dental practitioners in Riyadh, Kingdom of Saudi Arabia. Methods: This is an observational cross-sectional study based on a survey, validated questionnaires by Brunton Paul in the United Kingdom. The sample size was estimated using the Qualtrics calculator with a confidence level of 95% and a margin of error of 5%; a sample size of 226 collected from March 2020 to May. Data was entered on the computer using the “Microsoft Office Excel Software” program (2016) for Mac. Data was transferred to the Statistical Package of Statistical Science Software (SPSS) program, version 20 (IBM SPSS Statistics for Windows, Version 20.0. Armonk, NY: IBM Corp.) Pearson Chi-Square and Fisher’s Exact test we used to statistically analyzed. Results: A total of 226 participants, over half the participants, were females (53.3%). The majority were Saudi nationals (91.2%) and had 1-10 years of practice since graduation (62.2%, n=140). Just under half work in private sector (47.6%) and most of the participants reported material of choice for tooth-colored Inlays and Onlays and a case with anterior veneers is laboratory fabricated porcelain (56.2%) and (45.6%) respectively. The material of choice for core build-ups in vital teeth is a light-cured composite resin in 77.4% of cases and impression materials used are addition-cured silicones in 61.9% of cases. Conclusion: Our community needs more education about oral health and indications of esthetic dental treatments and their side effects. Also, we need to increase patients’ awareness of the importance of proper treatment planning and more conservative treatment options.
APA, Harvard, Vancouver, ISO, and other styles
31

Weiner, J. P., K. H. Bowles, P. Abbott, H. P. Lehmann, and P. S. Sockolow. "Advice for Decision Makers Based on an Electronic Health Record Evaluation at a Program for All-inclusive Care for Elders Site." Applied Clinical Informatics 02, no. 01 (2011): 18–38. http://dx.doi.org/10.4338/aci-2010-09-ra-0055.

Full text
Abstract:
Summary Objective: Provide evidence-based advise to “Program of All-inclusive Care for the Elderly” (PACE) decision makers considering implementing an electronic health record (EHR) system, drawing on the results of a mixed methods study to examine: (1) the diffusion of an EHR among clinicians documenting direct patient care in a PACE day care site, (2) the impact of the use of the EHR on the satisfaction levels of clinicians, and (3) the impact of the use of the EHR on patient functional outcomes. Methods: Embedded mixed methods design with a post-test design quantitative experiment and concurrent qualitative component. Quantitative methods included: (1) the EHR audit log used to determine the frequency and timing during the week of clinicians’ usage of the system; (2) a 22-item clinician satisfaction survey; and (3) a 16-item patient functional outcome questionnaire related to locomotion, mobility, personal hygiene, dressing, feeding as well the use of adaptive devices. Qualitative methods included observations and open-ended, semi-structured follow-up interviews. Qualitative data was merged with the quantitative data by comparing the findings along themes. The setting was a PACE utilizing an EHR in Philadelphia: PACE manages the care of nursing-home eligible members to enable them to avoid nursing home admission and reside in their homes. Participants were 39 clinicians on the multi-disciplinary teams caring for the elders and 338 PACE members. Results: Clinicians did not use the system as intended, which may help to explain why the benefits related to clinical processes and patient outcomes as expected for an EHR were not reflected in the results. Clinicians were satisfied with the EHR, although there was a non-significant decline between 11 and 17 months post implementation of the EHR. There was no significant difference in patient functional outcome the two time periods. However, the sample size of 48 was too small to allow any conclusive statements to be made. Interpretation of findings underscores the importance of the interaction of workflow and EHR functionality and usability to impact clinician satisfaction, efficiency, and clinician use of the EHR. Conclusion: This research provides insights into EHR use in the care of the older people in community-based health care settings. This study assessed the adoption of an EHR outside the acute hospital setting and in the community setting to provide evidence-based recommendations to PACE decision makers considering implementing an EHR.
APA, Harvard, Vancouver, ISO, and other styles
32

Akman, Melek, Serhan Akman, Oznur Derinbay, and Sema Belli. "Evaluation of Gaps or Voids Occurring in Roots Filled with Three Different Sealers." European Journal of Dentistry 04, no. 02 (April 2010): 101–9. http://dx.doi.org/10.1055/s-0039-1697817.

Full text
Abstract:
Objectives: The purpose of this in vitro study was to evaluate gaps or voids occurring in roots filled with three different sealers.Methods: Thirty extracted human single-rooted teeth were decoronated, instrumented using NiTi rotary instruments, divided into three groups (n=10 per group) and obturated with one of the following: Epiphany with Resilon, MetaSEAL with gutta-percha or AH Plus with gutta-percha using the match-taper single-cone technique. After storage for one week in 100% humidity at 37°C, the teeth were horizontally sectioned (n=10). Photographs were taken from the coronal, median and apical parts of the roots using a stereomicroscope at 10X magnification, and the images were then transferred to a computer. The mathematical method known as the ‘Affine Transformation’ was used for the transformation of pixel coordinates to ground coordinates in the Netcad Software program. The mean areas (μm2) of the gaps between the sealer and root dentin or gutta percha/resilon and the gaps between the sealer and/or voids inside the sealer mass were measured, scored on a 0-3 scale and statistically analyzed with the Kruskal-Wallis test.Results: The mean total area of gaps or voids for each sealer was 4631.80 μm2 for the Epiphany- Resilon, 3826.80 μm2 for the MetaSEAL-gutta-percha and 31334 μm2 for the AH Plus-gutta-percha. The MetaSEAL-gutta-percha group showed more gap or void-free interfaces. No significant differences were found among the sealers in the scores for the gap areas (P<.05), and the MetaSEAL showed similar interfaces with Epiphany.Conclusions: No significant differences in the mean areas of gaps or voids were found among the tested resin-based sealers. (Eur J Dent 2010;4:101-109)
APA, Harvard, Vancouver, ISO, and other styles
33

Saad, José Roberto Cury, Gisselle Moraima Chávez-Andrade, Andrea Abi Rached Dantas, José Cláudio Martins Segalla, Fabio Luiz Camargo Vilella Berbert, Camila Galletti Espir, Fernando Simões Crisci, et al. "Ultrasound Effect in the Removal of Intraradicular Posts Cemented with Different Materials." Journal of Contemporary Dental Practice 16, no. 6 (2015): 437–41. http://dx.doi.org/10.5005/jp-journals-10024-1703.

Full text
Abstract:
ABSTRACT Aim This study evaluated the effect of ultrasonic vibration on the tensile strength required to remove intraradicular post cemented with different materials. Materials and methods Bovine teeth were selected, and 7 mm of the cervical root canals were prepared to size 5 Largo drill, the posts were cemented with zinc phosphate, Enforce (resin) or Rely X (glass ionomer). The specimens were divided into six groups (n = 10), according to the following procedures: GI—cementation with zinc phosphate associated with traction force; GII—cementation with zinc phosphate associated with ultrasonic activation and traction force; GIII—cementation with Enforce associated with traction force; GIV—cementation with Enforce associated with ultrasonic activation and traction force; GV—cementation with Rely X associated with traction force; and GVI—cementation with Rely X associated with ultrasonic activation and traction force. The tensile test was conducted using the electromechanical testing machine, the force was determined by a specialized computer program and ultrasonic activation using the Jet Sonic Four Plus (Gnatus) device in 10P. Results Concerning to average ranking, GI showed statistically significant difference in comparison with GII and GVI (p < 0.05); there was no statistical difference in GIII and GIV when compared to other groups (p > 0.05). Conclusion The ultrasound favored the intraradicular post traction regardless of the employed cement in greater or lesser extent. Clinical significance The post removal is a routine practice in the dental office, therefore, new solutions and better alternatives are need to the practitioner. We did not find in the literature many articles referring to this practice. Thus, the results from this study are relevant in the case planning and to promote more treatment options. How to cite this article Berbert FLCV, Espir CG, Crisci FS, de Andrade MF, Chávez-Andrade GM, de Toledo Leonardo R, Saad JRC, Segalla JCM, Vaz LG, Basso KCFJ, Dantas AAR. Ultrasound Effect in the Removal of Intraradicular Posts Cemented with Different Materials. J Contemp Dent Pract 2015;16(6):437-441.
APA, Harvard, Vancouver, ISO, and other styles
34

Hang, Nguyen Thi Thu, Erdinc Oksum, Le Huy Minh, and Do Duc Thanh. "An improved space domain algorithm for determining the 3-D structure of the magnetic basement." VIETNAM JOURNAL OF EARTH SCIENCES 41, no. 1 (January 8, 2019): 69–80. http://dx.doi.org/10.15625/0866-7187/41/1/13550.

Full text
Abstract:
The paper presents an improved algorithm based on Bhaskara Rao and Ramesh Babu’s algorithm to invert magnetic anomalies of three-dimensional basement structures. The magnetic basement is approximated by an ensemble of juxtaposed vertical prisms whose bottom surface coincides with Curie surface with the known depth. The computer program operating with the proposed algorithm is built in Matlab environment. Test applications show that the proposed method can perform computations with fast and stable convergence rate where the results also coincide well with the actual model structure. The effectiveness of the method is demonstrated by inverting magnetic anomalies of the southeast part of Vietnam continental shelf. The calculated magnetic basement relief of the study area provides useful additional information for studies in the aim of dealing with the geological structure of the area.References Beiki M., 2010. Analytic signals of gravity gradient tensor and their application to estimate source location, Geophysics, 75(6), i59–i74.Bui C.Q. (chief author), Le T., Tran T. D., Nguyen T. H., Phi T.T., 2007. Map of deep structure of the Earth’s crust, Atlas of the characteristics of natural conditions and environment in Vietnam’s waters and adjacent region. Publisher of Science and Technology, Ha Noi. Do D.T., Nguyen T.T.H., 2011. Atempt the improvement of inversion of magnetic anomalies of two dimensional polygonal cross sections to determine the depth of magnetic basement in some data profile of middle off shelf of Vietnam. Journal of Science and Technology, Vietnam Academy of Science and Technology, 49(2), 125–132.Do D.T., 2013. Study for application of 3D magnetic and gravity method to determine density contribution of basement rock and depth of magnetic basement on Vietnam’s shelf for oil research and prospecting Vietnam National University, Hanoi, Project code QG-11-04. Keating P. and Pilkington M., 2000, Euler deconvolution of the analytic signal, 62nd Annual International Meeting, EAGE, Session P0193.Keating P., Zerbo L., 1996. An improved technique for reduction to the pole at low latitudes, Geophysics, 61, 131–137.Le H.M., Luu V.H., 2003. Preliminary interpretation of the magnetic anomalies of the Eastern Vietnam sea and adiacent regions. J. Sci. of the Earth, 25(2), 173–181. Mai T.T., Pham V.T., Dang V.B., Le D.B., Nguyen B., Le V.D., 2011. Characteristics of Pliocene - Quaternary geology and Geoengineering in the Center and Southeast parts of Continental Shelf of Vietnam. J. Sci. of the Earth, 33(2), 109-118.Mushayandebvu M.F., Lesur V., Reid A.B., Fairhead J.D., 2004. Grid Euler deconvolution with constraints for 2D structures, Geophysics, 69, 489–496.Nguyen N.T., Bui V.N., Nguyen T.T.H., Than D.L., 2014a. Application of power density spectrum of magnetic anomaly to estimate the structure of magnetic layer of the earth crust in the Bac Bo gulf. Journal of Marine Science and Technology, 14(4A), 137–148.Nguyen N.T., Bui V.N., Nguyen T.T.H., 2014b. Determining the depth to the magnetic basementand fault systems in Tu Chinh - Vung May area by magnetic data interpretation. Journal of Marine Science and Technology, 14(4A), 16–25.Nguyen T.T.H., Pham T.L., Do D.T., Le H.M., 2018. Improving algorithm of determining the coordinates of the vertices of the polygon to invert magnetic anomalies of two-dimensional basement structures in space domain, Journal of Marine Science and Technology (preparing to print).Parker R.L., 1973. The rapid calculation of potential anomalies, Geophys. J. Roy. Astron. Soc, 31, 447–455. Pilkington M., Gregotski M.E., Todoeschuck J.P., 1994. Using fractal crustal magnetization models in magnetic interpretation, Geophysical Prospecting, 42, 677–692.Pilkington M., 2006. Joint inversion of gravity and magnetic data for two-layer models, Geophysics, 71, L35–L42.Rao D.B., Babu N.R., 1993. A fortran 77 computer program for three dimensional inversion of magnetic anomalies resulting from multiple prismatic bodies, Computer & Geosciences, 19(8), 781–801.Tanaka A., Okubo Y., Matsubayashi O., 1999. Curie point depth based on spectrum analysis of the magnetic anomaly data in East and Southeast Asia, Tectonic Pphysics, 306, 461–470.Thompson D.T., 1982. EULDTH – A new technique for marking computer-assisted depth estimates from magnetic data, Geophysics, 47, 31–37.Vo T.S., Le H.M., Luu V.H., 2005. Determining the horizontal position and depth of the density discontinuties in Red River Delta by using the vertical derivative and Euler deconvolution for the gravity anomaly data, Vietnam. Journal of Geology, Series A, 287(3–4), 39–52. Werner S., 1955. Interpretation of magnetic anomalies of sheet-like bodies, Sveriges Geologiska Undersokning, Series C, Arsbok, 43, 6.Xu S.Z., 2006. The integral-iteration method for continuation of potential fields, Chinese journal of geophysics (in Chinese), 49(4), 1176–1182.Zhang C., Huang D.N., Zhang K., Pu Y.T., Yu P., 2016. Magnetic interface forward and inversion method based on Padé approximation, Applied Geophysics, 13(4), 712–720.CCOP, 1996. Magnetic anomaly map of East Asia, scale 1:4.000.000, Geological survey of Japan and Committee for co-ordination of joint prospecting for mineral resources in asian offshore areas.
APA, Harvard, Vancouver, ISO, and other styles
35

Shrivastava, Rohit, Nitin Tupperwar, Bar Schwartz, Nofar Baron, and Michal Shapira. "LeishIF4E-5 Is a Promastigote-Specific Cap-Binding Protein in Leishmania." International Journal of Molecular Sciences 22, no. 8 (April 12, 2021): 3979. http://dx.doi.org/10.3390/ijms22083979.

Full text
Abstract:
Leishmania parasites cycle between sand fly vectors and mammalian hosts, transforming from extracellular promastigotes that reside in the vectors’ alimentary canal to obligatory intracellular non-motile amastigotes that are harbored by macrophages of the mammalian hosts. The transition between vector and host exposes them to a broad range of environmental conditions that induces a developmental program of gene expression, with translation regulation playing a key role. The Leishmania genome encodes six paralogs of the cap-binding protein eIF4E. All six isoforms show a relatively low degree of conservation with eIF4Es of other eukaryotes, as well as among themselves. This variability could suggest that they have been assigned discrete roles that could contribute to their survival under the changing environmental conditions. Here, we describe LeishIF4E-5, a LeishIF4E paralog. Despite the low sequence conservation observed between LeishIF4E-5 and other LeishIF4Es, the three aromatic residues in its cap-binding pocket are conserved, in accordance with its cap-binding activity. However, the cap-binding activity of LeishIF4E-5 is restricted to the promastigote life form and not observed in amastigotes. The overexpression of LeishIF4E-5 shows a decline in cell proliferation and an overall reduction in global translation. Immuno-cytochemical analysis shows that LeishIF4E-5 is localized in the cytoplasm, with a non-uniform distribution. Mass spectrometry analysis of proteins that co-purify with LeishIF4E-5 highlighted proteins involved in RNA metabolism, along with two LeishIF4G paralogs, LeishIF4G-1 and LeishIF4G-2. These vary in their conserved eIF4E binding motif, possibly suggesting that they can form different complexes.
APA, Harvard, Vancouver, ISO, and other styles
36

Ardiyansyah, Arief, Eko Setiawan, and Bahroin Budiya. "Moving Home Learning Program (MHLP) as an Adaptive Learning Strategy in Emergency Remote Teaching during the Covid-19 Pandemic." JPUD - Jurnal Pendidikan Usia Dini 15, no. 1 (April 30, 2021): 1–21. http://dx.doi.org/10.21009/jpud.151.01.

Full text
Abstract:
The Covid-19 pandemic had a dangerous impact on early-childhood education, lost learning in almost all aspects of child development. The house-to-house learning, with the name Moving Home Learning Program (MHLP), is an attractive offer as an emergency remote teaching solution. This study aims to describe the application of MHLP designed by early-childhood education institutions during the learning process at home. This study used a qualitative approach with data collection using interviews, observation, and documentation. The respondents involved in the interview were a kindergarten principal and four teachers. The research data were analyzed using the data content analysis. The Findings show that the MHLP has proven to be sufficiently in line with the learning needs of early childhood during the Covid-19 pandemic. Although, the application of the MHLP learning model has limitations such as the distance from the house that is far away, the number of meetings that are only once a week, the number of food and toy sellers passing by, disturbing children's concentration, and the risk of damage to goods at home. The implication of this research can be the basis for evaluating MHLP as an adaptive strategy that requires the attention of related parties, including policy makers, school principals, and teachers for the development of new, more effective online learning models. Keywords: Moving Home Learning Program (MHLP), Children Remote Teaching References:Abdollahi, E., Haworth-Brockman, M., Keynan, Y., Langley, M. J., & Oghadas, S. M. (2020). Simulating the effect of school closure during COVID-19 outbreaks in Ontario , Canada. BMC Medicine, 1–8. https://doi.org/https://doi.org/10.1186/s12916-020-01705-8 Arends, R. I., & Kilcher, A. (2010). Teaching for Student Learning: Becoming an Accomplished Teacher (1st ed.). Routledge. Arysandhi, K. N., & Meitriana, M. A. (2014). Studi Komparatif Motivasi Belajar Siswa pada Mata Pelajaran IPS antara Moving Class dengan Kelas Menetap di SMPN 1 Kerambitan dan SMPN 2 Tabanan Tahun Pelajaran 2013/2014. Ekuitas-Jurnal Pendidikan Ekonomi, 2(1), 30–39. Bawa, P. (2020). Learning in the age of SARS-COV-2 : A quantitative study of learners ’ performance in the age of emergency remote teaching. Computers and Education Open, 1(October), 100016. https://doi.org/10.1016/j.caeo.2020.100016 Bialek, S., Gierke, R., Hughes, M., McNamara, L., Pilishvili, T., & Skoff, T. (2020). Morbidity and mortality weekly report (mmwr) - Coronavirus Disease 2019 in Children — United States, February 12–April 2, 2020. Morbidity and Mortality Weekly Report, 69, 2–6. https://www.cdc.gov/coronavirus/2019-ncov/downloads/pui-form.pdf. Boardman, M. (2003). Changing Times: Changing Challenges for Early Childhood Leaders. Australasian Journal of Early Childhood, 28(2), 20–26. https://doi.org/10.1177/183693910302800205 Bronfenbrenner, U. (1979). The ecology of human development (1st ed.). Harvard University Press. Chen, Y. T. (2020). An investigation of young children’s science and aesthetic learning through a science aesthetic thematic curriculum: A mixed-methods study. Australasian Journal of Early Childhood, 45(2), 127–141. https://doi.org/10.1177/1836939120918503 Choi, N., & Jung, H. (2020). Temperament and Home Environment Characteristics as Predictors of Young Children ’ s Learning Motivation. Early Childhood Education Journal, 1994. https://doi.org/10.1007/s10643-020-01019-7 Counselman, K. P., & Jones, E. (2001). Distance learning in early childhood teacher education: The experience of Pacific Oaks College. Journal of Early Childhood Teacher Education, 22(4), 225–230. https://doi.org/10.1080/1090102010220402 Daniel, S. J. (2020). Education and the COVID-19 pandemic. PROSPECTS, 6. https://doi.org/10.1007/s11125-020-09464-3 Dick, W., Carey, L., & Carey, J. O. (2015). The Systematic Design of Instruction (8th ed.). Pearson. Diningrat, S. W. M., Nindya, M. A., & Salwa. (2020). Cakrawala Pendidikan ,. Cakrawala Pendidikan, 39(3), 705–719. https://doi.org/10.21831/cp.v39i3.32304 Dong, C., Cao, S., & Li, H. (2020). Young children’s online learning during COVID-19 pandemic: Chinese parents’ beliefs and attitudes. Children and Youth Services Review, 118(June), 105440. https://doi.org/10.1016/j.childyouth.2020.105440 Dong, Y., Dong, Y., Mo, X., Hu, Y., Qi, X., Jiang, F., Jiang, Z., Jiang, Z., Tong, S., Tong, S., & Tong, S. (2020). Epidemiology of COVID-19 among children in China. Pediatrics, 145(6). https://doi.org/10.1542/peds.2020-0702 Eliza, D. (2013). Penerapan Model Pembelajaran Kontekstual Learning (CTL) Berbasis Centra di Taman Kanak-Kanak. Pedagogi: Jurnal Ilmiah Ilmu Pendidikan, XIII(2), 93–106. Fadlilah, azizah nurul. (2021). Jurnal Obsesi : Jurnal Pendidikan Anak Usia Dini Strategi Menghidupkan Motivasi Belajar Anak Usia Dini Selama Pandemi COVID-19 melalui Publikasi Abstrak. Jurnal Obsesi : Jurnal Pendidikan Anak Usia Dini, 5(1), 373–384. https://doi.org/10.31004/obsesi.v5i1.548 Fenech, M. (2013). Quality early childhood education for my child or for all children?: Parents as activists for equitable, high-quality early childhood education in Australia. Australian Journal of Early Childhood, 38(4), 92–98. https://doi.org/10.1177/183693911303800413 Gibson, M. (2013). “I want to educate school-age children”: Producing early childhood teacher professional identities. Contemporary Issues in Early Childhood, 14(2), 127–137. https://doi.org/10.2304/ciec.2013.14.2.127 Hamzah, N. (2016). Pelaksanaan Pembelajaran BCCT Bagi Anak Usia Dini ; Study Pelaksanaan BCCT Di Tk Islam Mujahidin Pontianak. At-Turats: Jurnal Pemikiran Pendidikan Islama, 10(2), 119–131. Hasan, M. S., & Saputri, D. E. (2020). Pembelajaran PAI Berbasis Moving Class di SMP Negeri 1 Gudo Jombang. Attaqwa: Jurnal Ilmu Pendidikan Islam, 16(September), 113–125. Hew, K. F., Jia, C., Gonda, D. E., & Bai, S. (2020). Transitioning to the “new normal” of learning in unpredictable times: pedagogical practices and learning performance in fully online flipped classrooms. International Journal of Educational Technology in Higher Education, 17(1). https://doi.org/10.1186/s41239-020-00234-x Hodges, C. B., Moore, S., Lockee, B., Trust, T., & Bond, A. (2020). The Difference Between Emergency Remote Teaching and Online Learning. Educase Review. Hussein, E., Daoud, S., Alrabaiah, H., & Badawi, R. (2020). Children and Youth Services Review Exploring undergraduate students ’ attitudes towards emergency online learning during COVID-19 : A case from the UAE. Children and Youth Services Review, 1–7. https://doi.org/10.1016/j.childyouth.2020.105699 Işıkoğlu, N., Ero, A., Atan, A., & Aytekin, S. (2021). A qualitative case study about overuse of digital play at home. Current Psychology. https://doi.org/https://doi.org/10.1007/s12144-021-01442-y A Kilgallon, P., Maloney, C., & Lock, G. (2008). Early childhood teachers coping with educational change. Australian Journal of Early Childhood, 33(1), 23–29. https://doi.org/10.1177/183693910803300105 Kim, J. (2020). Learning and Teaching Online During Covid ‑ 19 : Experiences of Student Teachers in an Early Childhood Education Practicum. International Journal of Early Childhood, 52(2), 145–158. https://doi.org/10.1007/s13158-020-00272-6 Kurniati, E., Kusumanita, D., Alfaeni, N., & Andriani, F. (2021). Analisis Peran Orang Tua dalam Mendampingi Anak di Masa Abstrak. Jurnal Obsesi : Jurnal Pendidikan Anak Usia Dini, 5(1), 241–256. https://doi.org/10.31004/obsesi.v5i1.541 Lopes, H., & Mckay, V. (2020). pandemics : The COVID ‑ 19 experience. International Review of Education, 0123456789. https://doi.org/10.1007/s11159-020-09843-0 Macartney, K., Quinn, H. E., Pillsbury, A. J., Koirala, A., Deng, L., Winkler, N., Katelaris, A. L., & Sullivan, M. V. N. O. (2020). Articles Transmission of SARS-CoV-2 in Australian educational settings : a prospective cohort study. Lancet Child Adolesc Health 2020, 4642(20), 1–10. https://doi.org/10.1016/S2352-4642(20)30251-0 Marina, Indrawati, H., & Suarman. (2019). Application of Moving Class Learning Models and Teacher Pedagogical Competence on Learning Motivation and Student Learning Discipline. Journal of Educational Sciences, 3(1), 72–83. https://doi.org/doi.org/10.31258/jes.3.1.p.72-83 McLean, K., Edwards, S., & Mantilla, A. (2020). A review of community playgroup participation. Australasian Journal of Early Childhood, 45(2), 155–169. https://doi.org/10.1177/1836939120918484 Muhdi, Nurkolis, & Yuliejantiningsih, Y. (2020). The Implementation of Online Learning in Early Childhood Education During the Covid-19 Pandemic. Jurnal Pendidikan Usia Dini, 14(2), 248–261. https://doi.org/https://doi.org/10.21009/JPUD.142.04 Panovska-griffiths, J., Kerr, C. C., Stuart, R. M., Mistry, D., Klein, D. J., Viner, R. M., & Bonell, C. (2020). Articles Determining the optimal strategy for reopening schools , the impact of test and trace interventions , and the risk of occurrence of a second COVID-19 epidemic wave in the UK : a modelling study. The Lancet Child and Adolescent Health, 4642(20), 1–11. https://doi.org/10.1016/S2352-4642(20)30250-9 Piquero, A. R., Riddell, J. R., Bishopp, S. A., Narvey, C., Reid, J. A., & Piquero, N. L. (2020). Staying Home , Staying Safe ? A Short-Term Analysis of COVID-19 on Dallas Domestic Violence. American Journal of Criminal Justice, 601–635. https://doi.org/https://doi.org/10.1007/s12103-020-09531-7 Pramling, I., Judith, S., Elin, T. W., & Ødegaard, E. (2020). The Coronavirus Pandemic and Lessons Learned in Preschools in Norway , Sweden and the United States : OMEP Policy Forum. International Journal of Early Childhood, 0123456789. https://doi.org/10.1007/s13158-020-00267-3 Pribadi, H., & Harjati, P. (2013). Analisis Pembelajaran Fisika dalam Sistem Moving Class di SMP Negeri 1 Pekalongan Lampung Timur Tahun Pelajaran 2012/2013. JPF, 32–41. Project Tommorow & Blackboard. (2017). Trends in Digital Learning: Building teachers’ capacity and competency to create new learning experiences for students. https://tomorrow.org/speakup/speak-up-2016-trends-digital-learning-june-2017.html Rahiem, M. D. H. (2020). The Emergency Remote Learning Experience of University Students in Indonesia amidst the COVID-19 Crisis. International Journal of Learning, Teaching and Educational Research, 19(6), 1–26. http://orcid.org/0000-0002-5618-2486%0AAbstract. Ramdhani, M. T. (2016). Model Pelaksanaan Pembelajaran Pendidikan Agama Islam dengan Sistem Moving Class dalam Meningkatkan Motivasi dan Prestasi Belajar Siswa SMP IT Sahabat Alam. Anterior Jurnal, 15(2), 212–221. Reigeluth, C. M., Beatty, B. J., & Myers, R. D. (2017). Instructional-Design Theories and Models (R. D. Myers (Ed.); IV). Routledge. Sangsawang, T. (2020). Indonesian Journal of Science & Technology An Instructional Design for Online Learning in Vocational Education according to a Self-Regulated Learning Framework for Problem Solving during the CoViD-19 Crisis. 5. Schmerse, D., Anders, Y., Wieduwilt, N., & Tietze, W. (2018). Differential effects of home and preschool learning environments on early language development. British Educational Research Journal, 44(2), 338–357. https://doi.org/10.1002/berj.3332 Schreier, M. (2013). Qualitative Content Analysis (First Edit). SAGE Publications. Shisley, S. (2020). Emergency Remote Learning Compared to Online Learning. Learning Solution. https://learningsolutionsmag.com/articles/emergency-remote-learning-compared-to-online-learning Son, S., & Morrison, F. J. (2010). The Nature and Impact of Changes in Home Learning Environment on Development of Language and Academic Skills in Preschool Children. 46(5), 1103–1118. https://doi.org/10.1037/a0020065 Stephen, C., Ellis, J., & Martlew, J. (2010). Taking active learning into the primary school: A matter of new practices? International Journal of Early Years Education, 18(4), 315–329. https://doi.org/10.1080/09669760.2010.531916 Sudrajat, C. J., Agustin, M., Kurniati, L., & Karsa, D. (2021). Strategi Kepala TK dalam Meningkatkan Mutu Pendidikan pada Masa Pandemi Covid 19 Abstrak. Jurnal Obsesi : Jurnal Pendidikan Anak Usia Dini, 5(1), 508–520. https://doi.org/10.31004/obsesi.v5i1.582 Sumindar, A., & Wahyu, L. (2012). Model Pembelajaran Moving Class Mata Pelajaran Seni Budaya dan Implikasinya terhadap Kemandirian Siswa (Kajian Kasus) di SMA Karangturi Semarang. Catharsis: Journal of Arts Education, 1(2), 21. Supriatna, R., Hafidhuddin, D., & Syafri, U. A. (2018). Model Pembelajaran Beyond Center and Circle Time (BCCT) Berbasis Q.S Lukman Ayat 12-19. Tawazun: Jurnal Pendidikan Islam, 11(2), 1–11. Syarah, E. S. (2020). Understanding Teacher ’ s Perspectives in Media Literacy Education as an Empowerment Instrument of Blended Learning in Early Childhood Classroom. Jurnal Pendidikan Usia Dini, 14(2), 202–214. https://doi.org/https://doi.org/10.21009/JPUD.142.01 Tang, Y., & Hew, K. F. (2020). Does mobile instant messaging facilitate social presence in online communication? A two-stage study of higher education students. International Journal of Educational Technology in Higher Education, 17(1). https://doi.org/10.1186/s41239-020-00188-0 Thompson, M. (2019). Early Childhood Pedagogy in a Socio ‑ cultural Medley in Ghana : Case Studies in Kindergarten. International Journal of Early Childhood, 51(2), 177–192. https://doi.org/10.1007/s13158-019-00242-7 Togher, M., & Fenech, M. (2020). Ongoing quality improvement in the context of the National Quality Framework: Exploring the perspectives of educators in ‘Working Towards’ services. Australasian Journal of Early Childhood, 45(3), 241–253. https://doi.org/10.1177/1836939120936003 UNESCO. (2020). UNESCO’s support: Educational response to COVID-19. Unesco. https://en.unesco.org/covid19/educationresponse/support Vygotsky, L. S. (1978). Mind in Society: The Development of Higher Psychological Processes. Harvard University Press. Wiresti, R. D. (2021). Analisis Dampak Work From Home pada Anak Usia Dini di Masa Pandemi Covid-19. Jurnal Obsesi : Jurnal Pendidikan Anak Usia Dini, 5(1), 641–653. https://doi.org/10.31004/obsesi.v5i1.563 Wiwatowski, M., Page, J., & Young, S. (2020). Examining early childhood teachers’ attitudes and responses to superhero play. Australasian Journal of Early Childhood, 45(2), 170–182. https://doi.org/10.1177/1836939120918486 Yin, R. K. (2018). Case Study Research and Applications Design and Methods (Eliza Wells (Ed.); Sixth Edit). SAGE Publications. Yoshikawa, H., Wuermli, A. J., Britto, P. R., Dreyer, B., Leckman, J. F., Lye, S. J., Ponguta, L. A., Richter, L. M., & Stein, A. (2020). Effects of the Global Coronavirus Disease-2019 Pandemic on Early Childhood Development: Short- and Long-Term Risks and Mitigating Program and Policy Actions. The Journal of Pediatrics, 223(1), 188–193. https://doi.org/10.1016/j.jpeds.2020.05.020 Zhu, X., & Liu, J. (2020). Education in and After Covid-19 : Immediate Responses and Long-Term Visions. Postdigital Science and Education. https://doi.org/https://doi.org/10.1007/s42438-020-00126-3
APA, Harvard, Vancouver, ISO, and other styles
37

Ndari, Susianty selaras, Chandrawaty Chandrawaty, Imam Mujtaba, and Mafaza Conita Ananto. "Children's Outdoor Activities and Parenting Style in Children's Social Skill." JPUD - Jurnal Pendidikan Usia Dini 13, no. 2 (November 30, 2019): 217–31. http://dx.doi.org/10.21009/jpud.132.02.

Full text
Abstract:
Physical activity is very important for early childhood, especially outdoor activities that add a lot of new experiences. This study aims to check the relationship of children's outdoor activities and parenting styles and children's social skills. The participants are 125 parents of early childhood who attend kindergarten. The research method is a descriptive study using the relational screening model. The results showed that there was a relationship between outside play and parenting style on the social skills of children in their childhood. Democratic parenting styles are found to promote children's social skills, while authoritative parenting styles have a negative correlation with interpersonal skills, the ability to express verbally, self-control, listening skills, emotional management and adaptation to change. In the sub-dimensions of anger management and adaptation to changing skills is a significant difference between authoritative parenting styles and not permissive parenting with children's social skills. Keywords: Early Childhood Social skills, Outdoor Activities, Parenting Styles Reference: Azlina, W., & S., Z. A. (2012). A Pilot Study: The Impact of Outdoor Play Spaces on Kindergarten Children. Procedia - Social and Behavioral Sciences, 38(December 2010), 275–283. https://doi.org/10.1016/j.sbspro.2012.03.349 Bento, G., & Dias, G. (2017). The importance of outdoor play for young childrenʼs healthy development. Porto Biomedical Journal, 2(5), 157–160. https://doi.org/10.1016/j.pbj.2017.03.003 Beyer, K., Bizub, J., Szabo, A., Heller, B., Kistner, A., Shawgo, E., & Zetts, C. (2015). Development and validation of the attitudes toward outdoor play scales for children. Social Science and Medicine, 133, 253–260. https://doi.org/10.1016/j.socscimed.2014.10.033 Boxberger, K., & Reimers, A. K. (2019). Parental correlates of outdoor play in boys and girls aged 0 to 12—A systematic review. International Journal of Environmental Research and Public Health, 16(2). https://doi.org/10.3390/ijerph16020190 Coleman, W. L., & Lindsay, R. L. (1992). Interpersonal disabilities: Social skill deficits in older children and adolescents: Their description, assessment, and management. Pediatric Clinics of North America, 39(3), 551–567. https://doi.org/10.1016/S0031-3955(16)38344-4 Cui, M., Janhonen-Abruquah, H., Darling, C. A., Carlos Chavez, F. L., & Palojoki, P. (2019). Helicopter Parenting and Young Adults’ Well-Being: A Comparison Between United States and Finland. Cross-Cultural Research, 53(4), 410–427. https://doi.org/10.1177/1069397118802253 Fjørtoft, I., & Sageie, J. (2000). The natural environment as a playground for children. Landscape description and analyses of a natural playscape. Landscape and Urban Planning, 48(1–2), 83–97. https://doi.org/10.1016/S0169-2046(00)00045-1 Ghanbari-Azarneir, S., Anbari, S., Hosseini, S.-B., & Yazdanfar, S.-A. (2015). Identification of Child-friendly Environments in Poor Neighborhoods. Procedia - Social and Behavioral Sciences, 201(February), 19–29. https://doi.org/10.1016/j.sbspro.2015.08.114 Giedd, J. N. (2012). The Digital Revolution and Adolescent Brain Evolution. Journal of Adolescent Health, 51(2), 101–105. https://doi.org/10.1016/j.jadohealth.2012.06.002 Hinkley, T., Brown, H., Carson, V., & Teychenne, M. (2018). Cross sectional associations of screen time and outdoor play with social skills in preschool children. PLoS ONE, 13(4), 1–15. https://doi.org/10.1371 Johnson, J. E., & Christie, J. F. (2009). Play and digital media. Computers in the Schools, 26(4), 284–289. https://doi.org/10.1080/07380560903360202 Junot, A., Paquet, Y., & Martin-Krumm, C. (2017). Passion for outdoor activities and environmental behaviors: A look at emotions related to passionate activities. Journal of Environmental Psychology, 53, 177–184. https://doi.org/10.1016/j.jenvp.2017.07.011 Kemple, K. M., Oh, J. H., Kenney, E., & Smith-Bonahue, T. (2016). The Power of Outdoor Play and Play in Natural Environments. Childhood Education, 92(6), 446–454. https://doi.org/10.1080/00094056.2016.1251793 Kol, S. (2016). The Effects of the Parenting Styles on Social Skills of Children Aged 5-6. Malaysian Online Journal of Educational Sciences, 4(2), 49–58. Kozina, Z., Repko, O., Kozin, S., Kostyrko, A., Yermakova, T., & Goncharenko, V. (2016). Motor skills formation technique in 6 to 7-year-old children based on their psychological and physical features (Rock climbing as an example). Journal of Physical Education and Sport, 16(3), 866–874. https://doi.org/10.7752/jpes.2016.03137 Larson, L. R., Szczytko, R., Bowers, E. P., Stephens, L. E., Stevenson, K. T., & Floyd, M. F. (2019). Outdoor Time, Screen Time, and Connection to Nature: Troubling Trends Among Rural Youth? Environment and Behavior, 51(8), 966–991. https://doi.org/10.1177/0013916518806686 Lindsey, G., Maraj, M., & Kuan, S. C. (2001). Access, Equity, and Urban Greenways: An Exploratory Investigation. Professional Geographer, 53(3), 332–346. https://doi.org/10.1111/0033-0124.00288 Louv, R. (2008). Last child in the woods: Saving our children from nature-deficit disorder. Chapel Hill, NC: Algonquin Books. Maynard, T., & Waters, J. (2007). Learning in the outdoor environment: A missed opportunity? Early Years, 27(3), 255–265. https://doi.org/10.1080/09575140701594400 Moreland, A. D., & McRae-Clark, A. (2018). Parenting outcomes of parenting interventions in integrated substance-use treatment programs: A systematic review. Journal of Substance Abuse Treatment, 89(August 2017), 52–59. https://doi.org/10.1016/j.jsat.2018.03.005 Moriguchi, Y., Zelazo, P. D., & Chevalier, N. (2016). Development of Executive Function During Childhood. https://doi.org/10.3389/978-2-88919-800-9 Mullenbach, L. E., Andrejewski, R. G., & Mowen, A. J. (2019). Connecting children to nature through residential outdoor environmental education. Environmental Education Research, 25(3), 365–374. https://doi.org/10.1080/13504622.2018.1458215 Norðdahl, K., & Einarsdóttir, J. (2015). Children’s views and preferences regarding their outdoor environment. Journal of Adventure Education and Outdoor Learning, 15(2), 152–167. https://doi.org/10.1080/14729679.2014.896746 Pinquart, M. (2016). Associations of Parenting Styles and Dimensions with Academic Achievement in Children and Adolescents: A Meta-analysis. Educational Psychology Review, 28(3), 475–493. https://doi.org/10.1007/s10648-015-9338-y Riany, Y. E., Cuskelly, M., & Meredith, P. (2016). Cultural Beliefs about Autism in Indonesia. International Journal of Disability, Development and Education, 63(6), 623–640. https://doi.org/10.1080/1034912X.2016.1142069 Riany, Y. E., Meredith, P., & Cuskelly, M. (2017). Understanding the Influence of Traditional Cultural Values on Indonesian Parenting. Marriage and Family Review, 53(3), 207–226. https://doi.org/10.1080/01494929.2016.1157561 Saltali, N. D., & Arslan, E. (2012). Parent ’ s Attitudes as a Predictor of Preschoolers ’ Social Competence and Introverted Behavior. Elementary Education Online, 11(3), 729–737. Schoeppe, S., Vandelanotte, C., Bere, E., Lien, N., Verloigne, M., Kovács, É., … Van Lippevelde, W. (2017). The influence of parental modelling on children’s physical activity and screen time: Does it differ by gender? European Journal of Public Health, 27(1), 152–157. https://doi.org/10.1093/eurpub/ckw182 Shi, Y. (2017). Explore Children’s Outdoor Play Spaces of Community Areas in High-density Cities in China: Wuhan as an Example. Procedia Engineering, 198(September 2016), 654–682. https://doi.org/10.1016/j.proeng.2017.07.118 Strasburger, V. C., Jordan, A. B., & Donnerstein, E. (2012). Children, Adolescents, and the Media:. Health Effects. Pediatric Clinics of North America, 59(3), 533–587. https://doi.org/10.1016/j.pcl.2012.03.025 Victoria J. Rideout, Foehr, M. A. U. G., & Roberts, D. F. (2010). GENERATION M2 Media in the Lives of 8- to 18-Year-Olds. In Theresa Boston (Ed.), Henry J. Kaiser Family Foundation. Boston: Henry J. Kaiser Family Foundation. Wang, S. hua, Zhang, Y., & Baillargeon, R. (2016). Young infants view physically possible support events as unexpected: New evidence for rule learning. Cognition, 157, 100–105. https://doi.org/10.1016/j.cognition.2016.08.021 Waters, J., & Rekers, A. (2019). Young Children ’ s Outdoor Play-Based Learning. 1–7. Webster-Stratton, C., Reid, J., & Hammond, M. (2001). Social skills and problem-solving training for children with early-onset conduct problems: Who benefits? Journal of Child Psychology and Psychiatry and Allied Disciplines, 42(7), 943–952. Retrieved from http://ovidsp.ovid.com/ovidweb.cgi?T=JS&PAGE=reference&D=emed5&NEWS=N&AN=2001380196 Wilkie, H. J., Standage, M., Gillison, F. B., Cumming, S. P., & Katzmarzyk, P. T. (2018). The home electronic media environment and parental safety concerns: relationships with outdoor time after school and over the weekend among 9-11 year old children. BMC Public Health, 18(1), 456. https://doi.org/10.1186/s12889-018-5382-0 Zajenkowska, A., Jankowski, K. S., Lawrence, C., & Zajenkowski, M. (2013). Personality and individual differences in responses to aggression triggering events among prisoners and non-prisoners. Personality and Individual Differences, 55(8), 947–951. https://doi.org/10.1016/j.paid.2013.07.467
APA, Harvard, Vancouver, ISO, and other styles
38

Atkinson, Timothy, Detlef Plump, and Susan Stepney. "Evolving graphs with semantic neutral drift." Natural Computing, October 29, 2019. http://dx.doi.org/10.1007/s11047-019-09772-4.

Full text
Abstract:
Abstract We introduce the concept of Semantic Neutral Drift (SND) for genetic programming (GP), where we exploit equivalence laws to design semantics preserving mutations guaranteed to preserve individuals’ fitness scores. A number of digital circuit benchmark problems have been implemented with rule-based graph programs and empirically evaluated, demonstrating quantitative improvements in evolutionary performance. Analysis reveals that the benefits of the designed SND reside in more complex processes than simple growth of individuals, and that there are circumstances where it is beneficial to choose otherwise detrimental parameters for a GP system if that facilitates the inclusion of SND.
APA, Harvard, Vancouver, ISO, and other styles
39

Ibe, Chidinma A., Danielle R. Haywood, Ciana Creighton, Yidan Cao, Angel Gabriel, Hossein Zare, Wehmah Jones, et al. "Study protocol of a randomized controlled trial evaluating the Prime Time Sister Circles (PTSC) program's impact on hypertension among midlife African American women." BMC Public Health 21, no. 1 (March 29, 2021). http://dx.doi.org/10.1186/s12889-021-10459-8.

Full text
Abstract:
Abstract Background The Prime-Time Sister Circles® (PTSC) program is a multifaceted, community-based peer support intervention targeting African American women who are 40 to 75 years of age. It aims to reduce hypertension disparities observed among African American women by promoting adherence to antihypertensive therapies, including lifestyle modification and therapeutic regimens. Methods The PTSC randomized controlled trial will evaluate the effectiveness of the PTSC Program on improved blood pressure control, healthcare utilization attributed to cardiovascular events, and healthcare costs. The study began in 2016 and will end in 2022. African American women who are 40–75 years old, have been diagnosed with hypertension, reside in Washington, D.C. or Baltimore, Maryland, and receive their care from Unity Health Care, a federally qualified health center in Washington, D.C., or Baltimore Medical System, a federally qualified health center in Baltimore, Maryland, are eligible to participate. Those randomized to the intervention group participate in the PTSC Program, which spans 13 weeks and comprises facilitator-led discussions, didactic training about hypertension management, and peer-based problem-solving concerning CVD risk factors and their amelioration. Blood pressure, weight, body mass index, waist circumference, self-reported adherence, physical activity, dietary practices, stress, and healthcare utilization data are collected at baseline, 13 weeks (end of the intervention), 9 months (months post-intervention), and 15 months (one year after the intervention). Healthcare costs will be computed at the end of the study. The study’s design is reported in the present manuscript, wherein we employed the SPIRIT checklist to guide its construction. Discussion Disparities in hypertension prevalence and management observed among mid-life African American women exist as a result of a confluence of structural determinants of health. Consequently, there is a need to develop, implement, and evaluate culturally appropriate and relevant interventions that are tailored to their lived experiences. The PTSC Trial aims to assess the impact of the program on participants’ cardiovascular, psychosocial, and cost outcomes. Its results have implications for advancing the science of designing and implementing culturally relevant interventions for African American women. Trial registration Unique identifier: NCT04371614. Retrospectively registered on April 30, 2020.
APA, Harvard, Vancouver, ISO, and other styles
40

"Systematic Approach to Optimize Injection Molding and Microstructural Analysis of Fiber Reinforced Resins for Anisotropic Mechanical Characterization." Journal of Dynamics of Machines, March 17, 2020, 1–9. http://dx.doi.org/10.31829/2690-0963/dom2020-3(1)-106.

Full text
Abstract:
Fiber reinforced resin materials are increasingly being used in aviation, automotive, mass transportation and healthcare industries. Engineers are keen to explore new design concepts with such materials, since these materials promises to offer high strength to weight ratio, elimination of secondary operations and ease in process ability to form complex shaped parts through injection molding. The mechanical properties of molded parts made from such materials depends on the orientation of the reinforcing fibers. Such orientation occurs in fiber-reinforced plastics, since the fibers in the plastic melt during processing, will orient in different directions under the influence of shear forces that are driven by flow pattern. This paper provides details on systematic and abusive injection molding of test specimens and characterizing anisotropic mechanical data that can be used for fiber orientation predictions in computer aided engineering programs. Systematic molding as compared to abusive molding, identifies optimum molding parameters that reduces part–to-part variation during injection molding, thereby reduces part rejections. It provides optimum part performance during application and the process settings are repeatable and reproducible. The intention of this paper is to share widely such a method to make this process less of a skill or art. The mechanical properties covered here are elastic, shear modulus and poisson ratio. Scanning electron microscopy (SEM) analysis revealed that most of the fibers are aligned in melt flow direction for systematic molded plaques, leading to higher stiffness and strength characteristics as compared to transverse to melt flow.
APA, Harvard, Vancouver, ISO, and other styles
41

Koguchi, Hideo, and Kazuhisa Hoshi. "Evaluation of Joining Strength of Silicon-Resin Interface at a Vertex in a Three-Dimensional Joint Structure." Journal of Electronic Packaging 134, no. 2 (June 1, 2012). http://dx.doi.org/10.1115/1.4006139.

Full text
Abstract:
Portable electric devices such as mobile phones and portable music players have become compact and improved their performance. High-density packaging technology such as chip size package (CSP) and stacked-CSP is used for improving the performance of devices. CSP has a bonded structure composed of materials with different properties. A mismatch of material properties may cause a stress singularity, which leads to the failure of the bonding part in structures. In the present paper, stress analysis using the boundary element method and an eigenvalue analysis using the finite element method are used for evaluating the intensity of a singularity at a vertex in three-dimensional joints. A three-dimensional boundary element program based on the fundamental solution for two-phase isotropic materials is used for calculating the stress distribution in a three-dimensional joint. Angular function in the singular stress field at the vertex in the three-dimensional joint is calculated using an eigenvector determined from the eigenvalue analysis. The joining strength of interface in several kinds of sillicon-resin specimen with different triangular bonding areas is investigated analytically and experimentally. An experiment for debonding the interface in the joints is firstly carried out. Stress singularity analysis for the three-dimensional joints subjected to an external force for debonding the joints is secondly conducted. Combining results of the experiment and the analysis yields a final stress distribution for evaluating the strength of interface. Finally, a relationship of force for delamination in joints with different bonding areas is derived, and a critical value of the 3D intensity of the singularity is determined.
APA, Harvard, Vancouver, ISO, and other styles
42

Shaw, Janice Marion. "The Curious Transformation of Boy to Computer." M/C Journal 19, no. 4 (August 31, 2016). http://dx.doi.org/10.5204/mcj.1130.

Full text
Abstract:
Mark Haddon’s The Curious Incident of the Dog in the Night-Time has achieved success as “the new Rain Man” or “the new definitive, popular account of the autistic condition” (Burks-Abbott 294). Integral to its favourable reception is the way it conflates the autistic main character, the fifteen-year-old narrator Christopher Boone, with the savant, or individual who exhibits both neurological problems and giftedness, thereby engaging with the way autism is presented in popular culture. In a variety of contemporary films and television series, autism has been transformed from a disability to a form of giftedness by relating it to abilities associated in contemporary media with a genius, in particular by invoking the metaphor of an autistic mind as a type of computer. As a result, the book engages with the current association of giftedness in mathematics and science with social awkwardness and isolation as constructed in popular culture: in idiomatic terms, the genius “nerd” figure characterised by an uncertain, adolescent approach to social contact (Kendall 353). The disablement of the character is, then, lessened so that the idea of being “special,” continually evoked throughout the text, has a transformative function that is related less to the special needs of those with a disability and more to the common element in adolescent fiction of longing for extraordinary power and control through being a special, gifted individual. The Curious Incident of the Dog in the Night-Time relates the protagonist, Christopher, to Sherlock Holmes and his methods of detection, specifically through the title being taken from a story by Conan Doyle, “Silver Blaze,” in which the “curious incident” referred to is that the dog did nothing in the night. In the original story, that the dog did not bark or react to an intruder was a clue that the person was known to the animal, so allowing Holmes to solve the crime by a process of deduction. Christopher copies these traditional methods of the classical detective to solve his personal mystery, that of who killed a neighbour’s dog, Wellington. The adoption of this title allows a double irony to emerge. Christopher’s attempts to emulate Holmes in his approach to crime are predicated on his assumption of his likeness to the model of the classical detective as he states, “I think that if I were a proper detective he is the kind of detective I would be,” pointing out the similarity of their powers of observation and his ability, like Holmes, to “detach his mind at will” as well as his capacity to find patterns in events (92). Through the novel, these attributes are aligned with his autism, constructing a trope of his disability conferring extraordinary abilities that are predicated on a computer-like detachment and precision in his method of thinking. The accessible narrative of the autistic Christopher gives the reader the impression of being able to understand the perspective of an individual with a spectrum disorder. In this way, the text not only engages with, but contributes to the construction of this disability in current popular culture as merely an extension of giftedness, especially in mathematics, and an associated unwillingness to communicate. Indeed, according to Raoul Eshelman, “one of its most engaging narrative devices is to make us identify with a mentally impaired narrator who is manifestly not interested in identifying either with us or anyone else” (1). The main character’s reference to mathematical and scientific ideas exploits an interest in giftedness already established by popular literature and film, and engages with a transformation effected in popular culture of the genius as autistic, and its corollary of an autistic person as potentially a genius. Such a construction ranges from fictional characters like Sheldon in The Big Bang Theory, Charlie and his physicist colleagues in Numb3rs, and Raymond Babbitt in Rain Man, to real life characters or representative figures in reality series and feature films such as x + y, The Imitation Game, The Big Short, and the television program Beauty and the Geek. While never referring specifically to autism, all the real or fictional representations contribute to the construction of a stereotype in which behaviours on the autistic spectrum are linked to a talent in mathematics and the sciences. In addition to this, detectives in the classical crime fiction alluded to in the novel typically exhibit traits of superhuman powers of deduction, pattern making, and problem solving that engage with the popular notion of genius in general and mathematics in particular by possessing a mind like a computer. Such detectives from current television series as Saga from The Bridge and Spencer Reid from Criminal Minds exhibit distance, coldness, and lack of social awareness or empathy with others, and this is presented as the basis of their extraordinary ability to discern patterns and solve crime. Spencer Reid, for example, has three PhDs in Science disciplines and Mathematics. Charlie in the television series Numb3rs is also a genius who uses his mathematical abilities to not only find the solution to crime but also explain the maths behind it to his FBI colleagues, and, in conjunction, the audience. But the character with the clearest association to Christopher is, naturally, Sherlock Holmes, both as constructed in Conan Doyle’s original text and the current adaptations and transformations of it. The television series Sherlock and Elementary, as well as the films Sherlock Holmes and Sherlock Holmes: A Game of Shadows all invoke a version of Holmes in which his powers of deduction are associated with symptoms to be found in a spectrum disorder.Like Christopher, the classical detective is characterised by being cold, emotionless, distant, socially inept, and isolated, but also keenly observant, analytical, and scientific; one who approaches the crime as a puzzle to be solved (Cawelti 43) with computer-like precision. In what is considered to be the original detective story, The Murders in the Rue Morgue, Poe included a “pseudo-mathematical logic in his literary scenario” (Platten 255). In Conan Doyle’s stories, Holmes, too, adopts a mathematical and scientific approach to construct patterns from clues that he alone can discern, and thereby solve the crime. The depiction of investigators in contemporary media such as Charlie in Numb3rs engages with these origins so that he is objective, dispassionate, and able to relate to real-world problems only through the filter of mathematical formulae. Christopher is presented similarly by engaging with the idea of the detective as implied savant and relying on an ability to discern patterns for successful crime solving.The book links the disabling behaviours of autism with the savant, so that the stereotype of the mystic displaying both disability and giftedness in fiction of earlier ages has been transformed in contemporary literature to a figure with extraordinary powers related both to autism and to the contemporary form of mysticism: innate mathematical ability and computer-style calculation. Allied with what Murray terms the “unknown and ambiguous nature” of autism, it is characterised as “the alien within the human, the mystical within the rational, the ultimate enigma” (25) in a way that is in keeping with the current fascination with the nature of genius and its association with being “special,” a term continually evoked and discussed throughout the book by the main character. The chapters on scientific ideas relate to Christopher’s world view, filtered through a mathematical and analytical approach to life and relationships with other people. Christopher examines beliefs such as the concept of humanity as superior to other animals, and the idea of religion and creationism, that is, the idea of humanity itself as special, with a cold and logical approach. He similarly discusses the idea of the individual person as special, linking this to a metaphor of the human mind being a computer (203, 148). Christopher’s narrow perspective as a result of his autism is not presented as disabling so much as protective, because the metaphorical connection of his viewpoint to a computer provides him with distance. Although initially Christopher fails to realise the significance of events, this allows him to be “switched off” (103) from events that he finds traumatising.The transformative metaphor of an autistic individual thinking like a computer is also invoked through Christopher’s explanation of “why people think that their brains are special, and different from computers” (147). Indeed, both in terms of his tendency to retreat or by “pressing CTRL + ALT + DEL and shutting down programs and turning the computer off and rebooting” (178) in times of stress, Christopher metaphorically views himself as a computer. Such a perspective invokes yet another popular cultural reference through the allusion to the human brain as “Captain Jean-Luc Picard in Star Trek: The Next Generation, sitting in his captain’s seat looking at a big screen” (147). But more importantly, the explanation refers to the basic premise of the book, that the text offers access to a condition that is inherently unknowable, but able to be understood by the reader through metaphor, often based on computers or technology as a result of a popular construction of autism that “the condition is the product of a brain in which the hard drive is incorrectly formatted” (Murray 25).Throughout the novel, the notion of “special” is presented as a trope for those with a disability, but as the protagonist, Christopher, points out, everyone is special in some way, so the whole idea of a disability as disabling is problematised throughout the text, while its associations of giftedness are upheld. Christopher’s disability, never actually designated as Asperger’s Syndrome or any type of spectrum disorder, is transformed into a protective mechanism that shields him from problematic social relationships of which he is unaware, but that the less naïve reader can well discern. In this way, rather than a limitation, the main character’s disorder protects him from a harsh reality. Even Christopher’s choice of Holmes as a role model is indicative of his desire to impose an eccentric order on his world, since this engages with a character in popular fiction who is famous not simply for his abilities, but for his eccentricity bordering on a form of autism. His aloof personality and cold logic not only fail to hamper him in his investigations, but these traits actually form the basis of them. The majority of recent adaptations of Conan Doyle’s stories, especially the BBC series Sherlock, depict Holmes with symptoms associated with spectrum disorder such as lack of empathy, difficulty in communication, and limited social skills, and these are clearly shown as contributing to his problem-solving ability. The trope of Christopher as detective also allows a parodic, postmodern comment on the classical detective form, because typically this fiction has a detective that knows more than the reader, and therefore the goal for the reader is to find the solution to the crime before it is revealed by the investigator in the final stages of the text (Rzepka 14). But the narrative works ironically in the novel since the non-autistic reader knows more than a narrator who is hampered by a limited worldview. From the beginning of the book, the narrative as focalised through Christopher’s narrow perspective allows a more profound view of events to be adopted by the reader, who is able to read clues that elude the protagonist. Christopher is well aware of this as he explains his attraction to the murder mystery novel, even though he has earlier stated he does not like novels since his inability to imagine or empathise means he is unable to relate to their fiction. For him, the genre of murder mystery is more akin to the books on maths and science that he finds comprehensible, because, like the classical detective, he views the crime as primarily a puzzle to be solved: as he states, “In a murder mystery novel someone has to work out who the murderer is and then catch them. It is a puzzle. If it is a good puzzle you can sometimes work out the answer before the end of the book” (5). But unlike Christopher, Holmes invariably knows more about the crime, can interpret the clues, and find the pattern, before other characters such as Watson, and especially the reader. In contrast, in The Curious Incident of the Dog in the Night-Time, the reader has more awareness of the probable context and significance of events than Christopher because, like a computer, he can calculate but not imagine. The reader can interpret clues within the plot of the story, such as the synchronous timing of the “death” of Christopher’s mother with the breakdown of the marriage of a neighbour, Mrs Shears. The astute reader is able to connect these events and realise that his mother has not died, but is living in a relationship with the neighbour’s husband. The construction of this pattern is denied Christopher, since he fails to determine their significance due to his limited imagination. Such a failure is related to Simon Baron-Cohen’s Theory of Mind, in which he proposes that autistic individuals have difficulty with social behaviour because they lack the capacity to comprehend that other people have individual mental states, or as Christopher terms it, “when I was little I didn’t understand about other people having minds” (145). Haddon utilises fictional licence when he allows Christopher to overcome such a limitation by a conscious shift in perspective, despite the specialist teacher within the text claiming that he would “always find this very difficult” (145). Christopher has here altered his view of events through his modelling both on the detective genre and on his affinity with mathematics, since he states, “I don’t find this difficult now. Because I decided that it was a kind of puzzle, and if something is a puzzle there is always a way of solving it” (145). In this way, the main character is shown as transcending symptoms of autism through the power of his giftedness in mathematics to ultimately discern a pattern in human relationships thereby adopting a computational approach to social problems.Haddon similarly explains the perspective of an individual with autism through a metaphor of Christopher’s memory being like a DVD recording. He is able to distance himself from his memories, choosing “Rewind” and then “Fast Forward” (96) to retrieve his recollection of events. This aspect of the precision of his memory relates to his machine-like coldness and lack of empathy for the feelings of others. But it also refers to the stereotype of the nerd figure in popular culture, where the nerd is able to relate more to a computer than to other people, exemplified in Sheldon from the television series The Big Bang Theory. Thus the presentation of Christopher’s autism relates to his giftedness in maths and science more than to areas that relate to his body. In general, descriptions of inappropriate or distressing bodily functions associated with disorders are mainly confined to other students at Christopher’s school. His references to his fellow students, such as Joseph eating his poo and playing in it (129) and his unsympathetic evaluation of Steve as not as clever or interesting as a dog because he “needs help to eat his food and could not even fetch a stick” (6), make a clear distinction between him and the other children, who despite being termed “special needs” are “special” in a different way from Christopher, because, according to him, “All the other children at my school are stupid” (56). While some reference is made to Christopher’s inappropriate behaviour in times of stress, such as punching a fellow student, wetting himself while on the train, and vomiting outside the school, in the main the emphasis is on his giftedness as a result of his autism, as displayed in the many chapters where he explains scientific and mathematical concepts. This is extrapolated into a further mathematical metaphor underlying the book, that he is like one of the prime numbers he finds so fascinating, because prime numbers do not fit neatly into the pattern of the number system, but they are essential and special nevertheless. Moreover, as James Berger suggests, prime numbers can “serve as figures for the autistic subject,” because like autistic individuals “they do not mix; they are singular, indivisible, unfactorable” yet “Mathematics could not exist without these singular entities that [. . .] are only apparent anomalies” (271).Haddon therefore offers a transformation by confounding autism with a computer-like ability to solve mathematical problems, so that the text is, as Haddon concedes, “as much about a gifted boy with behavior problems as it is about anyone on the autism spectrum” (qtd. in Burks-Abbott 291). Indeed, the word “autism” does not even appear in the book, while the terms “genius,” (140) “clever,” (32, 65, 252) and the like are continually being invoked in descriptions of Christopher, even if ironically. More importantly, the reader is constantly being shown his giftedness through the reiteration of his study of A Level Mathematics, and his explanation of scientific concepts. Throughout, Christopher explains aspects of mathematics, astrophysics, and other sciences, referring to such well-known puzzles in popular culture as the Monty Hall problem, as well as more obscure formulae and their proofs. They function to establish Christopher’s intuitive grasp of complex mathematical and scientific principles, as well as providing the reader with insight into both his perspective and the paradoxical nature of an individual who is at once able to solve quadratic equations in his head, yet is incapable of understanding the simple instruction, “Take the tube to Willesden Junction” (211).The presentation of Christopher is that of an individual who displays an extension of the social problems established in popular literature as connected to a talent for mathematics, therefore engaging with a depiction already existing in popular mythology: the isolated and analytical nerd or genius social introvert. Indeed, much of Christopher’s autistic behaviour functions to protect him from unsettling or traumatic information, since he fails to realise the significance of the information he collects or the clues he is given. His disability is therefore presented as not limiting so much as protective, and so the notion of disability is subsumed by the idea of the savant. The book, then, engages with a contemporary representation within popular culture that has transformed spectrum disability into mathematical giftedness, thereby metaphorically associating the autistic mind with the computer. ReferencesBaron-Cohen, Simon. Mindblindness: An Essay on Autism and Theory of Mind. Cambridge MA: MIT Press, 1995. Berger, James. “Alterity and Autism: Mark Haddon’s Curious Incident in the Neurological Spectrum.” Autism and Representation. Ed. Mark Osteen. Hoboken: Routledge, 2007. 271–88. Burks-Abbott, Gyasi. “Mark Haddon’s Popularity and Other Curious Incidents in My Life as an Autistic.” Autism and Representation. Ed. Mark Osteen. Hoboken: Routledge, 2007. 289–96. Cawelti, John G. Adventure, Mystery, and Romance: Formula Stories as Art and Popular Culture. Chicago: U of Chicago P, 1976. Eshelman, Raoul. “Transcendence and the Aesthetics of Disability: The Case of The Curious Incident of the Dog in the Night-Time.” Anthropoetics: The Journal of Generative Anthropology 15.1 (2009). Haddon, Mark. The Curious Incident of the Dog in the Night-Time. London: Random House Children’s Books, 2004. Kendall, Lori. “The Nerd Within: Mass Media and the Negotiation of Identity among Computer-Using Men.” Journal of Men’s Studies 3 (1999): 353–67. Murray, Stuart. “Autism and the Contemporary Sentimental: Fiction and the Narrative Fascination of the Present.” Literature and Medicine 25.1 (2006): 24–46. Platten, David. “Reading Glasses, Guns and Robots: A History of Science in French Crime Fiction.” French Cultural Studies 12 (2001): 253–70. Rzepka, Charles J. Detective Fiction. Cambridge, UK: Polity Press, 2005.
APA, Harvard, Vancouver, ISO, and other styles
43

Pargman, Daniel. "The Fabric of Virtual Reality." M/C Journal 3, no. 5 (October 1, 2000). http://dx.doi.org/10.5204/mcj.1877.

Full text
Abstract:
Introduction -- Making Sense of the (Virtual) World Computer games are never "just games". Computer games are models of reality and if they were not, we would never be able to understand them. Models serve three functions; they capture important, critical features of that which is to be represented while ignoring the irrelevant, they are appropriate for the person and they are appropriate for the task -- thereby enhancing the ability to make judgements and discover relevant regularities and structures (Norman 1993). Despite the inherently unvisualisable nature of computer code -- the flexible material of which all software constructs are built -- computer code is still the most "salient" ingredient in computer games. Less salient are those assumptions that are "built into" the software. By filtering out those parts of reality that are deemed irrelevant or unnecessary, different sorts of assumptions, different sorts of bias are automatically built into the software, reified in the very computer code (Friedman 1995, Friedman and Nissenbaum 1997). Here I will analyse some of the built-in structures that constitute the fabric of a special sort of game, a MUD. A MUD is an Internet-accessible "multi-participant, user-extensible virtual reality whose user interface is entirely textual" (Curtis, 1992). The specific MUD in question is a nine-year old Swedish-language adventure MUD called SvenskMUD ("SwedishMUD") that is run by Lysator, the academic computer club at Linköping University, Sweden. I have done field studies of SvenskMUD over a period of three and a half years (Pargman, forthcoming 2000). How is the SvenskMUD adventure world structured and what are the rules that are built into the fabric of this computer game? I will describe some of the ways in which danger and death, good and evil, courage, rewards and wealth are handled in the game. I will conclude the paper with a short analysis of the purpose of configuring the player according to those structures. Revocable Deaths Characters (personae/avatars) in SvenskMUD can be divided into two categories, players and magicians. Making a career as a player to a large part involves solving quests and killing "monsters" in the game. The magicians are all ex-players who have "graduated" and gone beyond playing the game of SvenskMUD. They have become the administrators, managers and programmers of SvenskMUD. A watchful eye is kept on the magicians by "God", the creator, owner and ultimate custodian of SvenskMUD. My own first battle in the game, in a sunlit graveyard with a small mouse, is an example of a bit-sized danger suitable for newcomers, or "newbies". I correctly guessed that the mouse was a suitably weak opponent for my newborn character, but still had to "tickle" the mouse on its belly (a euphemism for hitting it without much force) 50 times before I managed to kill it. Other parts of this epic battle included 45 failed attempts of mine to "tickle" the mouse, 39 successful "tickles" of the mouse and finally a wild chase around the graveyard before I caught up with the mouse, cornered it and managed to kill it and end the fight. Although I was successful in my endeavour, I was also more than half dead after my run-in with the mouse and had to spend quite some time engaged in more peaceful occupations before I was completely healed. It was only later that I learned that you can improve your odds considerably by using weapons and armour when you fight... Should a SvenskMUD player fail in his (or less often, her) risky and adventurous career and die, that does not constitute an insurmountable problem. Should such a thing pass, the player's ghost only has to find the way back to a church in one of the villages. In the church, the player is reincarnated, albeit with some loss of game-related abilities and experience. The way the unfortunate event of an occasional death is handled is part of the meta-rules of SvenskMUD. The meta-rules are the implicit, underlying rules that represent the values, practices and concerns that shape the frame from which the "ordinary" specific rules operate. Meta-rules are part of the "world view that directs the game action and represents the implicit philosophy or ideals by which the world operates" (Fine 1983, 76). Despite the adventure setting with all its hints of medieval lawlessness and unknown dangers lurking, SvenskMUD is in fact a very caring and forgiving environment. The ultimate proof of SvenskMUD's forgiveness is the revocable character of death itself. Fair Dangers Another SvenskMUD meta-rule is that dangers (and death) should be "fair". This fairness is extended so as to warn players explicitly of dangers. Before a dangerous monster is encountered, the player receives plenty of warnings: You are standing in the dark woods. You feel a little afraid. East of you is a small dark lake in the woods. There are three visible ways from here: east, north and south. It would be foolish to direct my character to go east in this situation without being adequately prepared for encountering and taking on something dangerous in battle. Those preparations should include a readiness to flee if the expected danger proves to be superior. If, in the example above, a player willingly and knowingly directs a character to walk east, that player has to face the consequences of this action. But if another player is very cautious and has no reason to suspect a deadly danger lurking behind the corner, it is not considered "fair" if that player's character dies or is hurt in such a way that it results in damage that has far-reaching consequences within the game. The dangerous monsters that roam the SvenskMUD world are restricted to roam only "dangerous" areas and it is considered good manners to warn players in some way when they enter such an area. Part of learning how to play SvenskMUD successfully becomes a matter of understanding different cues, such as the transition from a safe area to a dangerous one, or the different levels of danger signalled by different situations. Should they not know it in advance, players quickly learn that it is not advisable to enter the "Valley of Ultimate Evil" unless they have reached a very high level in the game and are prepared to take on any dangers that come their way. As with all other meta-rules, both players and magicians internalise this rule to such an extent that it becomes unquestionable and any transgression (such as a dangerous monster roaming around in a village, killing newbie characters who happen to stray its way) would immediately render complaints from players and corresponding actions on behalf of the magicians to rectify the situation. Meta-Rules as "Folk Ideas" Fine (1983, 76-8) enumerates four meta-rules that Dundes (1971) has described and applies them to the fantasy role-playing games he has studied. Dundes's term for these meta-rules is "folk ideas" and they reflect existing North American (and Western European) cultural beliefs. Fine shows that these folk ideas capture core beliefs or central values of the fantasy role-playing games he studied. Three of Dundes's four folk ideas are also directly applicable to SvenskMUD. Unlimited Wealth The first folk idea is the principle of unlimited good. There is no end to growth or wealth. For that reason, treasure found in a dungeon doesn't need a rationale for being there. This folk idea is related to the modernist concept of constant, unlimited progress. "Some referees even 'restock' their dungeons when players have found a particular treasure so that the next time someone enters that room (and kills the dragon or other beasties guarding it) they, too, will be rewarded" (Fine 1983, 76). To restock all treasures and reawaken all killed monsters at regular intervals is standard procedure in SvenskMUD and all other adventure MUDs. The technical term is that the game "resets". The reason why a MUD resets at regular intervals is that, while the MUD itself is finite, there is no end to the number of players who want their share of treasures and other goodies. The handbook for SvenskMUD magicians contains "design guidelines" for creating quests: You have to invent a small story about your quest. The typical scenario is that someone needs help with something. It is good if you can get the story together in such a way that it is possible to explain why it can be solved several times, since the quest will be solved, once for each prospective magician. Perhaps a small spectacle a short while after (while the player is pondering the reward) that in some way restore things in such a way that it can be solved again. (Tolke 1993, my translation) Good and Evil The second folk idea is that the world is a battleground between good and evil. In fantasy literature or a role-playing game there is often no in-between and very seldom any doubt whether someone encountered is good or evil, as "referees often express the alignment [moral character] of nonplayer characters through stereotyped facial features or symbolic colours" (Fine 1983, 77). "Good and evil" certainly exists as a structuring resource for the SvenskMUD world, but interestingly the players are not able to be described discretely in these terms. As distinct from role-playing games, a SvenskMUD player is not created with different alignments (good, evil or neutral). All players are instead neutral and they acquire an alignment as they go along, playing SvenskMUD -- the game. If a player kills a lot of mice and cute rabbits, that player will turn first wicked and then evil. If a player instead kills trolls and orcs, that player first turns good and then saint-like. Despite the potential fluidity of alignment in SvenskMUD, some players cultivate an aura of being good or evil and position themselves in opposition to each other. This is most apparent with two of the guilds (associations) in SvenskMUD, the Necromancer's guild and the Light order's guild. Courage Begets Rewards The third folk idea is the importance of courage. Dangers and death operate in a "fair" way, as should treasures and rewards. The SvenskMUD world is structured both so as not to harm or kill players "needlessly", and in such a way that it conveys the message "no guts, no glory" to the players. In different places in the MUD (usually close to a church, where new players start), there are "easy" areas with bit-sized dangers and rewards for beginners. My battle with the mouse was an example of such a danger/reward. A small coin or an empty bottle that can be returned for a small finder's fee are examples of other bit-sized rewards: The third folk idea is the importance of courage. Dangers and death operate in a "fair" way, as should treasures and rewards. The SvenskMUD world is structured both so as not to harm or kill players "needlessly", and in such a way that it conveys the message "no guts, no glory" to the players. In different places in the MUD (usually close to a church, where new players start), there are "easy" areas with bit-sized dangers and rewards for beginners. My battle with the mouse was an example of such a danger/reward. A small coin or an empty bottle that can be returned for a small finder's fee are examples of other bit-sized rewards: More experienced characters gain experience points (xps) and rise in levels only by seeking out and overcoming danger and "there is a positive correlation between the danger in a setting and its payoff in treasure" (Fine 1983, 78). Just as it would be "unfair" to die without adequate warning, so would it be (perceived to be) grossly unfair to seek out and overcome dangerous monsters or situations without being adequately rewarded. And conversely, it would be perceived to be unfair if someone "stumbled over the treasure" without having deserved it, i.e. if someone was rewarded without having performed an appropriately difficult task. Taken from the information on etiquette in an adventure MUD, Reid's quote is a good example of this: It's really bad form to steal someone else's kill. Someone has been working on the Cosmicly Invulnerable Utterly Unstoppable Massively Powerful Space Demon for ages, leaves to get healed, and in the interim, some dweeb comes along and whacks the Demon and gets all it's [sic] stuff and tons of xps [experience points]. This really sucks as the other person has spent lots of time and money in expectation of the benefits from killing the monster. The graceful thing to do is to give em [sic] all the stuff from the corpse and compensation for the money spent on healing. This is still a profit to you as you got all the xps and spent practically no time killing it. (Reid 1999, 122, my emphasis) The User Illusion An important objective of the magicians in SvenskMUD is to describe everything that a player experiences in the SvenskMUD world in game-related terms. The game is regarded as a stage where the players are supposed to see only what is in front of, but not behind the scenes. A consistent use of game-related terms and game-related explanations support the suspension of disbelief and engrossment in the SvenskMUD fantasy world. The main activity of the MUD users should be to enter into the game and guide their characters through a fascinating (and, as much as possible and on its own terms, believable) fantasy world. The guiding principle is therefore that the player should never be reminded of the fact that the SvenskMUD world is not for real, that SvenskMUD is only a game or a computer program. From this perspective, the worst thing players can encounter in SvenskMUD is a breakdown of the user illusion, a situation that instantly transports a person from the SvenskMUD world and leaves that person sitting in front of a computer screen. Error messages, e.g. the feared "you have encountered a bug [in the program]", are an example of this. If a magician decides to change the SvenskMUD world, that magician is supposed to do the very best to explain the change by using game-related jargon. This is reminiscent of the advice to "work within the system": "wherever possible, things that can be done within the framework of the experiential level should be. The result will be smoother operation and greater harmony among the user community" (Morningstar and Farmer 1991, 294). If for some reason a shop has to be moved from one village to another, a satisfactory explanation must be given, e.g. a fire occurring in the old shop or the old shop being closed due to competition (perhaps from the "new", relocated shop). Explanations that involve supernatural forces or magic are also fine in a fantasy world. Explanations that remind the player of the fact that the SvenskMUD world is not for real ("I moved the shop to Eriksros, because all magicians decided that it would be so much better to have it there"), or even worse, that SvenskMUD is a computer program ("I moved the program shop.c to another catalogue in the file structure") are to be avoided at all costs. Part of socialising magicians becomes teaching them to express themselves in this way even when they know better about the machinations of SvenskMud. There are several examples of ingenious and imaginative ways to render difficult-to-explain phenomena understandable in game-related terms: There was a simple problem that appeared at times that made the computer [that SvenskMUD runs on] run a little slower, and as time went by the problem got worse. I could fix the problem easily when I saw it and I did that at times. After I had fixed the problem the game went noticeably faster for the players that were logged in. For those occasions, I made up a message and displayed it to everyone who was in the system: "Linus reaches into the nether regions and cranks a little faster". (Interview with Linus Tolke, "God" in SvenskMUD) When a monster is killed in the game, it rots away (disappears) after a while. However, originally, weapons and armour that the monster wielded did not disappear; a lucky player could find valuable objects and take them without having "deserved" them. This specific characteristic of the game was deemed to be a problem, not least because it furthered a virtual inflation in the game that tended to decrease the value of "honestly" collected weapons and loot. The problem was discussed at a meeting of the SvenskMUD magicians that I attended. It was decided that when a monster is killed and the character that killed it does not take the loot, the loot should disappear ("rot") together with the monster. But how should this be explained to the players in a suitable way if they approach a magician to complain about the change, a change that in their opinion was for the worse? At the meeting it was suggested that from now on, all weapons and shields were forged with a cheaper, weaker metal. Not only would objects of this metal "rot" away together with the monster that wielded them, but it was also suggested that all weapons in the whole game should in fact be worn down as time goes by. (Not to worry, new ones appear in all the pre-designated places every time the game resets.) Conclusion -- Configuring the Player SvenskMUD can easily be perceived as a "blooming buzzing confusion" for a new player and my own first explorations in SvenskMUD often left me confused even as I was led from one enlightenment to the next. Not everyone feels inclined to take up the challenge to make sense of a world where you have to learn everything anew, including how to walk and how to talk. On the other hand, in the game world, much is settled for the best, and a crack in a subterranean cave is always exactly big enough to squeeze through... The process of becoming part of the community of SvenskMUD players is inexorably connected to learning to become an expert in the activities of that community, i.e. of playing SvenskMUD (Wenger 1998). A player who wants to program in SvenskMUD (thereby altering the fabric of the virtual world) will acquire many of the relevant concepts before actually becoming a magician, just by playing and exploring the game of SvenskMUD. Even if the user illusion succeeds in always hiding the computer code from the player, the whole SvenskMUD world constitutes a reflection of that underlying computer code. An implicit understanding of the computer code is developed through extended use of SvenskMUD. The relationship between the SvenskMUD world and the underlying computer code is in this sense analogous to the relationship between the lived-in world and the rules of physics that govern the world. All around us children "prepare themselves" to learn the subject of physics in school by throwing balls up in the air (gravity) and by pulling carts or sledges (friction). By playing SvenskMUD, a player will become accustomed to many of the concepts that govern the SvenskMUD world and will come to understand the goals, symbols, procedures and values of SvenskMUD. This process bears many similarities to the "primary socialisation" of a child into a member of society, a socialisation that serves "to make appear as necessity what is in fact a bundle of contingencies" (Berger and Luckmann 1966, 155). This is the purpose of configuring the player and it is intimately connected to the re-growth of SvenskMUD magicians and the survival of SvenskMUD itself over time. However, it is not the only possible outcome of the SvenskMUD socialisation process. The traditional function of trials and quests in fantasy literature is to teach the hero, usually through a number of external or internal encounters with evil or doubt, to make the right, moral choices. By excelling at these tests, the protagonist shows his or her worthiness and by extension also stresses and perhaps imputes these values in the reader (Dalquist et al. 1991). Adventure MUDs could thus socialise adolescents and reinforce common moral values in society; "the fantasy hero is the perfectly socialised and exemplary subject of a society" (53, my translation). My point here is not that SvenskMUD differs from other adventure MUDs. I would imagine that most of my observations are general to adventure MUDs and that many are applicable also to other computer games. My purpose here has rather been to present a perspective on how an adventure MUD is structured, to trace the meaning of that structure beyond the game itself and to suggest a purpose behind that organisation. I encourage others to question built-in bias and underlying assumptions of computer games (and other systems) in future studies. References Berger, P., and T. Luckmann. The Social Construction of Reality: A Treatise in the Sociology of Knowledge. London: Penguin, 1966. Curtis, P. "MUDding: Social Phenomena in Text-Based Virtual Realities." High Noon on the Electronic Frontier. Ed. P. Ludlow. Cambridge, MA: MIT P, 1996. 13 Oct. 2000 <http://www.ibiblio.org/pub/academic/computer-science/virtual-reality/communications/papers/muds/muds/Mudding-Social-Phenomena.txt>. Dalquist, U., T. Lööv, and F. Miegel. "Trollkarlens lärlingar: Fantasykulturen och manlig identitetsutveckling [The Wizard's Apprentices: Fantasy Culture and Male Identity Development]." Att förstå ungdom [Understanding Youth]. Ed. A. Löfgren and M. Norell. Stockholm/Stehag: Brutus Östlings Bokförlag Symposion, 1991. Dundes, A. "Folk Ideas as Units of World View." Toward New Perspectives in Folklore. Ed. A. Paredes and R. Bauman. Austin: U of Texas P, 1971. Fine, G.A. Shared Fantasy: Role-Playing Games as Social Worlds. Chicago: U of Chicago P, 1983. Friedman, B. and H. Nissenbaum. "Bias in Computer Systems." Human Values and the Design of Computer Technology. Ed. B. Friedman. Cambridge, UK: Cambridge UP, 1997. Friedman, T. "Making Sense of Software: Computer Games and Interactive Textuality." Cybersociety: Computer-Mediated Communication and Community. Ed. S. Jones. Thousand Oaks, CA: Sage, 1995. Morningstar, C. and F. R. Farmer. "The Lessons of Lucasfilm's Habitat." Cyberspace: The First Steps. Ed. M. Benedikt. Cambridge: MA, MIT P, 1991. 13 Oct. 2000 <http://www.communities.com/company/papers/lessons.php>. Norman, D. Things That Make Us Smart: Defending Human Attributes in the Age of the Machine. Reading, MA: Addison-Wesley, 1993. Pargman, D. "Code Begets Community: On Social and Technical Aspects of Managing a Virtual Community." Ph.D. dissertation. Dept. of Communication Studies, Linköping University, Sweden, forthcoming, December 2000. Reid, E. "Hierarchy and Power: Social Control in Cyberspace." Communities in Cyberspace. Ed. M. Smith and P. Kollock. London, England: Routledge, 1999. Tolke, L. Handbok för SvenskMudmagiker: ett hjälpmedel för byggarna i SvenskMUD [Handbook for SvenskMudmagicians: An Aid for the Builders in SvenskMUD]. Printed and distributed by the author in a limited edition, 1993. Wenger, E. Communities of Practice: Learning, Meaning and Identity. Cambridge, UK: Cambridge UP, 1998. Citation reference for this article MLA style: Daniel Pargman. "The Fabric of Virtual Reality -- Courage, Rewards and Death in an Adventure MUD." M/C: A Journal of Media and Culture 3.5 (2000). [your date of access] <http://www.api-network.com/mc/0010/mud.php>. Chicago style: Daniel Pargman, "The Fabric of Virtual Reality -- Courage, Rewards and Death in an Adventure MUD," M/C: A Journal of Media and Culture 3, no. 5 (2000), <http://www.api-network.com/mc/0010/mud.php> ([your date of access]). APA style: Daniel Pargman. (2000) The Fabric of Virtual Reality -- Courage, Rewards and Death in an Adventure MUD. M/C: A Journal of Media and Culture 3(5). <http://www.api-network.com/mc/0010/mud.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
44

Hinner, Kajetan. "Statistics of Major IRC Networks." M/C Journal 3, no. 4 (August 1, 2000). http://dx.doi.org/10.5204/mcj.1867.

Full text
Abstract:
Internet Relay Chat (IRC) is a text-based computer-mediated communication (CMC) service in which people can meet and chat in real time. Most chat occurs in channels named for a specific topic, such as #usa or #linux. A user can take part in several channels when connected to an IRC network. For a long time the only major IRC network available was EFnet, founded in 1990. Over the 1990s three other major IRC networks developed, Undernet (1993), DALnet (1994) and IRCnet (which split from EFnet in June 1996). Several causes led to the separate development of IRC networks: fast growth of user numbers, poor scalability of the IRC protocol and content disagreements, like allowing or prohibiting 'bot programs. Today we are experiencing the development of regional IRC networks, such as BrasNet for Brazilian users, and increasing regionalisation of the global networks -- IRCnet users are generally European, EFnet users generally from the Americas and Australia. All persons connecting to an IRC network at one time create that IRC network's user space. People are constantly signing on and off each network. The total number of users who have ever been to a specific IRC network could be called its 'social space' and an IRC network's social space is by far larger than its user space at any one time. Although there has been research on IRC almost from its beginning (it was developed in 1988, and the first research was made available in late 1991 (Reid)), resources on quantitative development are rare. To rectify this situation, a quantitative data logging 'bot program -- Socip -- was created and set to run on various IRC networks. Socip has been running for almost two years on several IRC networks, giving Internet researchers empirical data of the quantitative development of IRC. Methodology Any approach to gathering quantitative data on IRC needs to fulfil the following tasks: Store the number of users that are on an IRC network at a given time, e.g. every five minutes; Store the number of channels; and, Store the number of servers. It is possible to get this information using the '/lusers' command on an IRC-II client, entered by hand. This approach yields results as in Table 1. Table 1: Number of IRC users on January 31st, 1995 Date Time Users Invisible Servers Channels 31.01.95 10:57 2737 2026 93 1637 During the first months of 1995, it was even possible to get all user information using the '/who **' command. However, on current major IRC networks with greater than 50000 users this method is denied by the IRC Server program, which terminates the connection because it is too slow to accept that amount of data. Added to this problem is the fact that collecting these data manually is an exhausting and repetitive task, better suited to automation. Three approaches to automation were attempted in the development process. The 'Eggdrop' approach The 'Eggdrop' 'bot is one of the best-known IRC 'bot programs. Once programmed, 'bots can act autonomously on an IRC network, and Eggdrop was considered particularly convenient because customised modules could be easily installed. However, testing showed that the Eggdrop 'bot was unsuitable for two reasons. The first was technical: for reasons undetermined, all Eggdrop modules created extensive CPU usage, making it impossible to run several Eggdrops simultaneously to research a number of IRC networks. The second reason had to do with the statistics to be obtained. The objective was to get a snapshot of current IRC users and IRC channel use every five minutes, written into an ASCII file. It was impossible to extend Eggdrop's possibilities in a way that it would periodically submit the '/lusers' command and write the received data into a file. For these reasons, and some security concerns, the Eggdrop approach was abandoned. IrcII was a UNIX IRC client with its own scripting language, making it possible to write command files which periodically submit the '/lusers' command to any chosen IRC server and log the command's output. Four different scripts were used to monitor IRCnet, EFnet, DALnet and Undernet from January to October 1998. These scripts were named Socius_D, Socius_E, Socius_I and Socius_U (depending on the network). Every hour each script stored the number of users and channels in a logfile (examinable using another script written in the Perl language). There were some drawbacks to the ircII script approach. While the need for a terminal to run on could be avoided using the 'screen' package -- making it possible to start ircII, run the scripts, detach, and log off again -- it was impossible to restart ircII and the scripts using an automatic task-scheduler. Thus periodic manual checks were required to find out if the scripts were still running and restart them if needed (e.g. if the server connection was lost). These checks showed that at least one script would not be running after 10 hours. Additional disadvantages were the lengthy log files and the necessity of providing a second program to extract the log file data and write it into a second file from which meaningful graphs could be created. The failure of the Eggdrop and ircII scripting approaches lead to the solution still in use today. Perl script-only approach Perl is a powerful script language for handling file-oriented data when speed is not extremely important. Its version 5 flavour allows a lot of modules to use it for expansion, including the Net::IRC package. The object-oriented Perl interface enables Perl scripts to connect to an IRC server, and use the basic IRC commands. The Socip.pl program includes all server definitions needed to create connections. Socip is currently monitoring ten major IRC networks, including DALnet, EFnet, IRCnet, the Microsoft Network, Talkcity, Undernet and Galaxynet. When run, "Social science IRC program" selects a nickname from its list corresponding to the network -- For EFnet, the first nickname used is Socip_E1. It then functions somewhat like a 'bot. Using that nickname, Socip tries to create an IRC connection to a server of the given network. If there is no failure, handlers are set up which take care of proper reactions to IRC server messages (such as Ping-pong, message output and reply). Socip then joins the channel #hose (the name has no special meaning), a maintenance channel with the additional effect of real persons meeting the 'bot and trying to interact with it every now and then. Those interactions are logged too. Sitting in that channel, the script sleeps periodically and checks if a certain time span has passed (the default is five minutes). After that, the '/lusers' command's output is stored in a data file for each IRC network and the IRC network's RRD (Round Robin database) file is updated. This database, which is organised chronologically, offers great detail for recent events and more condensed information for older events. User and channel information younger than 10 days is stored in five-minute detail. If older than two years, the same information is automatically averaged and stored in a per-day resolution. In case of network problems, Socip acts as necessary. For example, it recognises a connection termination and tries to reconnect after pausing by using the next nickname on the list. This prevents nickname collision problems. If the IRC server does not respond to '/luser' commands three times in a row, the next server on the list is accessed. Special (crontab-invoked) scripts take care of restarting Socip when necessary, as in termination of script because of network problems, IRC operator kill or power failure. After a reboot all scripts are automatically restarted. All monitoring is done on a Linux machine (Pentium 120, 32 MB, Debian Linux 2.1) which is up all the time. Processor load is not extensive, and this machine also acts as the Sociology Department's WWW-Server. Graphs creation Graphs can be created from the data in Socip's RRD files. This task is done using the MRTG (multi router traffic grapher) program by Tobias Oetiker. A script updates all IRC graphs four times a day. Usage of each IRC network is visualised through five graphs: Daily, Weekly and Monthly users and channels, accompanied by two graphs showing all known data users/channels and servers. All this information is continuously published on the World Wide Web at http://www.hinner.com/ircstat. Figures The following samples demonstrate what information can be produced by Socip. As already mentioned, graphs of all monitored networks are updated four times a day, with five graphs for each IRC network. Figure 1 shows the rise of EFnet users from about 40000 in November 1998 to 65000 in July 2000. Sampled data is oscillating around an average amount, which is resulting from the different time zones of users. Fig. 1: EFnet - Users and Channels since November 1998 Figure 2 illustrates the decrease of interconnected EFnet servers over the years. Each server is now handling more and more users. Reasons for taking IRC servers off the net are security concerns (attacks on the server by malicious persons), new payment schemes, maintenance and cost effort. Fig. 2: EFnet - Servers since November 1998 A nice example of a heavily changing weekly graph is Figure 3, which shows peaks shortly before 6pm CEST and almost no users shortly after midnight. Fig. 3: Galaxynet: Weekly Graph (July, 15th-22nd, 2000) The daily graph portrays usage variations with even more detail. Figure 4 is taken from Undernet user and channel data. The vertical gap in the graph indicates missing data, caused either by a net split or other network problems. Fig. 4: Undernet: Daily Graph: July, 22nd, 2000 The final example (Figure 5) shows a weekly graph of the Webchat (http://www.webchat.org) network. It can be seen that every day the user count varies from 5000 to nearly 20000, and that channel numbers fluctuate in concert accordingly from 2500 to 5000. Fig. 5: Webchat: Monthly graph, Week 24-29, 2000 Not every IRC user is connected all the time to an IRC network. This figure may have increased lately with more and more flatrates and cheap Internet access offers, but in general most users will sign off the network after some time. This is why IRC is a very dynamic society, with its membership constantly in flux. Maximum user counts only give the highest number of members who were simultaneously online at some point, and one could only guess at the number of total users of the network -- that is, including those who are using that IRC service but are not signed on at that time. To answer these questions, more thorough investigation is necessary. Then inflows and outflows might be more readily estimated. Table 2 shows the all time maximum user counts of seven IRC networks, compared to the average numbers of IRC users of the four major IRC networks during the third quarter 1998 (based on available data). Table 2: Maximum user counts of selected IRC networks DALnet EFnet Galaxy Net IRCnet MS Chat Undernet Webchat Max. 2000 64276 64309 15253 65340 17392 60210 19793 3rd Q. 1998 21000 37000 n/a 24500 n/a 24000 n/a Compared with the 200-300 users in 1991 and the 7000 IRC-chatters in 1994, the recent growth is certainly extraordinary: it adds up to a total of 306573 users across all monitored networks. It can be expected that the 500000 IRC user threshold will be passed some time during the year 2001. As a final remark, it should be said that obviously Web-based chat systems will be more and more common in the future. These chat services do not use standard IRC protocols, and will be very hard to monitor. Given that these systems are already quite popular, the actual number of chat users in the world could have already passed the half million landmark. References Reid, Elizabeth. "Electropolis: Communications and Community on Internet Relay Chat." Unpublished Honours Dissertation. U of Melbourne, 1991. The Socip program can be obtained at no cost from http://www.hinner.com. Most IRC networks can be accessed with the original Net::Irc Perl extension, but for some special cases (e.g. Talkcity) an extended version is needed, which can also be found there. Citation reference for this article MLA style: Kajetan Hinner. "Statistics of Major IRC Networks: Methods and Summary of User Count." M/C: A Journal of Media and Culture 3.4 (2000). [your date of access] <http://www.api-network.com/mc/0008/count.php>. Chicago style: Kajetan Hinner, "Statistics of Major IRC Networks: Methods and Summary of User Count," M/C: A Journal of Media and Culture 3, no. 4 (2000), <http://www.api-network.com/mc/0008/count.php> ([your date of access]). APA style: Kajetan Hinner. (2000) Statistics of major IRC networks: methods and summary of user count. M/C: A Journal of Media and Culture 3(4). <http://www.api-network.com/mc/0008/count.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
45

Bailly, Nicolas. "Taxonomy and Systematics in Biodiversity Informatics: Lessons learned from ichthyology and general perspectives." Biodiversity Information Science and Standards 3 (July 2, 2019). http://dx.doi.org/10.3897/biss.3.37657.

Full text
Abstract:
Although still strongly intertwined, taxonomy and systematics are diverging more and more in their paradigms, methods, and agendas: it is not possible to consider them as synonyms anymore. While taxonomy remains an analytical science based on abductive reasoning (trying to find the historical pathways leading to present species delineations), systematics diverged as an information science since the rise of computers: summarizing, organising, and exposing taxonomical, biological, and ecological data, information, and knowledge in the most efficient ways, with respect to various targeted audiences. One could even consider synonymising biodiversity informatics with systematics instead! Schematically, this led to two different types of information systems: one dedicated to pure taxonomic and nomenclatural data; one oriented to record life-traits. Obviously, the latter must be built along reliable taxonomic backbones, therefore the former should have been built before the latter. It did not happen as exemplified in fishes by the Food and Agriculture Organisation (FAO) Fisheries Global Information System (FIGIS) and related, Catalog of Fishes, and FishBase, and later the databases of the International Union for Conservation of Nature (IUCN) and World Register of Marine Species (WoRMS), or for aggregators with Catalogue of Life and e.g., GBIF, Encyclopedia of Life. This has created some confusion for end users, “which system should I use” being their regular question with the invariable answer, “it depends”. In the absence of a formal preexisting taxonomic information system, each biodiversity information system has developed its own way to manage its taxonomic backbone with more or less impact of taxonomists. For fishes, we are not far from reconciling the various systems, and data to knowledge flows are becoming clearer, but it is not without unnecessary extra work. A real breakthrough is necessary to move from a collaboration stage to a cooperative stage, where systems are interconnected (not necessarily integrated) in such a way that the same taxonomic work is not repeated over and over to synchronise the systems. The difficulty is that taxonomic information systems must be designed for the needs of taxonomists, while their resulting classifications and the way they are exposed must fit the needs of systematics/biodiversity systems purposes, and by extension of the rest of scientific domains and the society in general. Conditions for this breakthrough to happen are discussed. The breakthrough does not reside in only one action but rather is the result of multiple simultaneous advances in the theory of taxonomy, its (mathematical?) formalization and informatics implementation, technology (although progress in that domain may be well in advance over others), data entry, networking, and sociology of science. The "potential taxon" concept (Berendsohn 1995) led to important theoretical progresses but its actual implementation lags behind in many systems, due probably to the huge effort of data entry it requires. Data entry is certainly a part that was neglected at the beginning of biodiversity informatics, because it has to be sustained endlessly, while the development of new systems was seen as more rewarding in time-limited frameworks. This has been corrected at least for occurrences and specimens, with the development of national and international digitization programs. Besides, the development of the Biodiversity Heritage Library and text extraction technologies is quite promising for taxon information. As in all complex situations with many interacting dimensions (e.g., fisheries management in ichthyology), progress must be balanced among all dimensions to have effective results for the overall domain. Among others, issues in sociology of sciences, for instance, must be addressed to make significant progresses. In particular the way data, information and knowledge are published, and jobs delineated and careers evaluated, must still be seriously reviewed in the light of information system development.
APA, Harvard, Vancouver, ISO, and other styles
46

Marinda, Edmore, Leickness Simbayi, Khangelani Zuma, Nompumelelo Zungu, Sizulu Moyo, Lwando Kondlo, Sean Jooste, et al. "Towards achieving the 90–90–90 HIV targets: results from the south African 2017 national HIV survey." BMC Public Health 20, no. 1 (September 9, 2020). http://dx.doi.org/10.1186/s12889-020-09457-z.

Full text
Abstract:
Abstract Background Measuring progress towards the Joint United Nations Programme on HIV/AIDS (UNAIDS) 90–90–90 treatment targets is key to assessing progress towards turning the HIV epidemic tide. In 2017, the UNAIDS model estimated that 75% of people living with HIV (PLHIV) globally knew their HIV positive status, 79% of those who knew their status were on antiretroviral therapy (ART), and 81% of those who knew their HIV status and were on ART had a suppressed viral load. The fifth South African national HIV sero-behavioural survey collected nationally representative data that enabled the empirical estimation of these 90–90–90 targets for the country stratified by a variety of key factors. Methods To evaluate progress towards achievement of the 90–90–90 targets for South Africa, data obtained from a national, representative, cross-sectional population-based multi-stage stratified cluster random survey conducted in 2017 were analysed. The Fifth South African National HIV Prevalence, Incidence, Behaviour and Communication Survey (SABSSM V), collected behavioural and biomarker data from individuals residing in households from 1000 randomly selected Small Area Layers (SALs), across all nine provinces of the country. Structured questionnaires were used to collect socio-demographic data, knowledge and perceptions about HIV, and related risk behaviours. Blood samples were collected to test for HIV infection, antiretroviral use, and viral suppression (defined as < 1000 copies/ml). Weighted proportions of study participants aged 15 years and older who tested HIV positive were computed for those who reported awareness of their status (1st 90), and among these, those who were currently on ART (2nd 90) and of these, those who were virally suppressed (3rd 90). Results Among persons 15 years and older who were HIV positive, 84.8% were aware of their HIV positive status, of whom 70.7% were currently on ART, with 87.4% of these estimated to have suppressed viral load at the time of the survey. These estimates varied by sex, age, and geo-location type. Relatively higher percentages across all three indicators for women compared to men were observed: 88.7% versus 78.2% for those aware of their status, 72.3% versus 67.7% for on ART, and 89.8% versus 82.3% for viral suppression. Knowing one’s positive HIV status increased with age: 74.0, 85.8, and 88.1% for age groups 15–24 years old, 25–49 years old and 50–64 years old, although for those 65 years and older, 78.7% knew their HIV positive status. A similar pattern was observed for the 2nd 90, among those who knew their HIV positive status, 51.7% of 15 to 24 year olds, 70.5% of those aged 25–49 years old, 82.9% of those aged 50–64 years old and 82.4% of those aged 65 years or older were currently on ART. Viral suppression for the above mentioned aged groups, among those who were on ART was 85.2, 87.2, 89.5, and 84.6% respectively. The 90–90–90 indicators for urban areas were 87.7, 66.5, and 87.2%, for rural settings was 85.8, 79.8, and 88.4%, while in commercial farming communities it was 56.2, 67.6 and 81.4%. Conclusions South Africa appears to be on track to achieve the first 90 indicator by 2020. However, it is behind on the second 90 indicator with ART coverage that was ~ 20-percentage points below the target among people who knew their HIV status, this indicates deficiencies around linkage to and retention on ART. Overall viral suppression among those on ART is approaching the target at 87.4%, but this must be interpreted in the context of low reported ART coverage as well as with variation by age and sex. Targeted diagnosis, awareness, and treatment programs for men, young people aged 15–24 years old, people who reside in farming communities, and in specific provinces are needed. More nuanced 90–90–90 estimates within provinces, specifically looking at more granular sub-national level (e.g. districts), are needed to identify gaps in specific regions and to inform provincial interventions.
APA, Harvard, Vancouver, ISO, and other styles
47

Reid, Christy. "Journey of a Deaf-Blind Woman." M/C Journal 13, no. 3 (June 30, 2010). http://dx.doi.org/10.5204/mcj.264.

Full text
Abstract:
I sat alone on the beach under the shade of a big umbrella. My husband, Bill, and our three children were in the condo taking a break from the Florida sunshine. Dreamily, I gazed at the vast Gulf of Mexico, the brilliant blue sky stretching endlessly above. I was sitting about 50 feet from the surf, but I couldn't actually see the waves hitting the beach; I was almost blind. It was a windy day in late May and I loved feeling the ocean breeze sweeping over me. I imagined I could hear the waves crashing onto the surf, but the sound was only a memory. I was totally deaf. Although I had a cochlear implant and could hear the waves, the cry of sea gulls, and many other sounds with the technology, I wasn't wearing it at the moment and everything I heard was in my mind. As a child, my understanding of speech was better and my vision was clearer. My diagnosis was optic atrophy at age 5 and my vision gradually degenerated over the years. For unknown reasons, nerve damage caused hearing loss and during my teens, my hearing grew worse and worse until by the time I was ready for college, I was profoundly deaf. I chose to attend Gallaudet University because my high school teachers and my parents felt I would receive better services as a deaf and blind student. I feel it was a very good decision; when I entered Gallaudet, it was like entering a new and exhilarating world. Before attending Gallaudet, while I struggled to cope with hearing loss combined with severely low vision, my world grew smaller and smaller, not being able to communicate efficiently with others. At Gallaudet, I suddenly found I could communicate with almost anybody I met on campus using sign language. Thus, my self-confidence and independence grew as I proceeded to get a college education.It wasn't an easy route to follow. I didn't know Braille at the time and depended on using a CCTV (closed captioned television) electronic aid which magnified text, enabling me to read all my college books. I also relied on the assistance of a class aid who interpreted all my teachers' lectures and class discussions because I was unable to see people's signing unless they signed right in front of my face. It was slow going and often frustrating, trying to keep involved socially and keeping up with my coursework but when I was 13 years old, my vision specialist teacher who had worked with me from 5th grade until I graduated from high school, wrote a note for me saying, "Anything worthwhile seldom comes easy." The phrase stuck in my mind and I tried to follow this philosophy. In 1989 after 7 years of persistence, I graduated with a Bachelor's of Arts degree in psychology. With the B.A. in hand and having developed good communication skills with deaf and deaf-blind people using sign language and ASL (American Sign Language), I was ready to face the world. But I wasn't exactly ready; I knew I wanted a professional job working with deaf-blind people and the way to get there was to earn a master's degree. I applied for admission into Gallaudet's graduate school and was accepted into the vocational rehabilitation counselling program. While I thoroughly enjoyed graduate school experience, I got to work with my class mates one-on-one more often and there were a lot more hands-on activities, it became obvious to me that I wasn't prepared for graduate school. I needed to learn Braille and how to use Braille technology; my vision had worsened a lot since starting college. In addition, I needed a break from school and needed to gain experience in the working world. After completing one and a half years and earning 15 credit hours in the master's program, I left Gallaudet and found a job in Baltimore, Maryland.The job was with a new program for adults who were visually and hearing impaired and mentally disabled. My job was assisting the clients with independent living and work related skills. Most of the other staff were deaf, communicating via ASL. By then, I was skilled using tactile signing, putting my hand on the back of the signer's hand to follow movements by touch, and I made friends with co-workers. I felt grown up and independent working full-time, living in my own apartment, using the subway train and bus to travel to and from work. I didn't have any serious problems living on my own. There was a supermarket up the road to which I could walk or ride a bus. But I needed a taxi ride back to the apartment when I had more groceries than I could carry. I would leave a sign I made out of cardboard and wrote my address in big black numbers, on my apartment door to help the driver find my place. I used a white cane and upon moving to Baltimore, an Orientation and Mobility (O and M) teacher who worked with blind people, showing them how to travel in the city, taught me the route to my work place using the subway and bus. Thus, I was independent and knew my way to work as well as to a nearby shopping mall. One day as I stood on the subway station platform holding my white cane, waiting for my train, the opposite train pulled in. As I stood watching passengers hurrying to board, knowing my train would arrive soon on the other side, a woman ran up to me and started pulling my arm. I handed her my notebook and black marker I used for communicating with people in the public, telling her I couldn't hear and would she please write in large print? She frantically scribbled something, but I couldn't read the note. She then gave me back the pen and pad, grabbed my arm again and started pulling me towards the train. I refused to budge, gesturing towards the opposite tracks, clearly indicating I was waiting for the other train. Finally, she let go, dashed into the train before the doors closed. I watched the train pull away, sadly reflecting that some people who wanted to help, just didn't understand how to approach disabled people. As a deaf-blind traveller, it was my duty to help educate the general public how to assist disabled persons in a humane way. After I established my new life for a few months, Bill was offered a position in the same program and moved to Baltimore to join me. He had worked at the Helen Keller National Centre in New York where I met him while doing a summer internship there three years before. I was thrilled when he got the job working beside me and we got to know each other on a daily basis. We had been dating since we met although I was in college and he was working and living in New York and then Cleveland, Ohio. Bill being hearing and sighted, was skilled in sign language and communication techniques with deaf-blind people. He had a wonderful attitude towards disabled people and made me feel like a normal person who was capable of doing things. We shared a lot and were very comfortable with each other. After nearly six months together in Baltimore, we married in May 1992, several weeks before my 28th birthday.After our first year of marriage living in Maryland, Bill and I moved to Little Rock, Arkansas. We wanted to live closer to my family and parents, Ron and Judy Cummings, who lived in Poplar Bluff, Missouri, 176 miles north of Little Rock. I wanted to go back to school and entered the deaf education program at the University of Arkansas at Little Rock with the goal of becoming a teacher for deaf-blind students. I never dreamed I would have a deaf-blind child of my own one day. My vision and hearing loss were caused by nerve damage and no one else in my family nor Bill's had a similar disability.I was pregnant with our first child when I entered UALR. In spite of my growing belly, I enjoyed the teacher training experience. I worked with a deaf-blind 12-year-old student and her teacher at the Arkansas School for the Deaf; observed two energetic four-year-olds in the pre-school program. But when my son, Joe was born in June 1994, my world changed once again. School became less important and motherhood became the ultimate. As a deaf-blind person, I wanted to be the best mom within my abilities.I decided that establishing good communication with my child was an important aspect of being a deaf-blind mom. Bill was in full agreement and we would set Joe on the kitchen table in his infant carrier, reciting together in sign language, "The three Bears". I could see Joe's tiny fists and feet wave excitedly in the air as he watched us signing children's stories. I would encourage Joe to hold my fingers while I signed to him, trying to establish a tactile signing relationship. But he was almost two years old when he finally understood that he needed to sign into my hands. We were sitting at the table and I had a bag of cookies. I refused to give him one until he made the sign for "cookie" in my hand. I quickly rewarded him with a cookie and he got three or four each time he made the sign in my hand. Today at 16, Joe is an expert finger speller and can effectively communicate with me and his younger deaf-blind brother, Ben.When Joe was two and a half, I decided to explore a cochlear implant. It was 1996 and we were living in Poplar Bluff by then. My cousin, who was studying audiology, told me that people using cochlear implants were able to understand sound so well they didn't need good vision. I made an appointment with the St. Louis cochlear implant program and after being evaluated, I decided to go ahead. I am glad I have a cochlear implant. After months of practice I learned to use the new sound and was eventually able to understand many environmental sounds. I never regained the ability of understanding speech, though, but I could hear people's voices very clearly, the sound of laughter, birds singing, and many more. Being able to hear my children's voices is especially wonderful, even when they get noisy and I get a headache. That fall I went to Leader Dogs School for the Blind (LDSB) where I met Milo, a large yellow Labrador retriever. At LDSB I learned how to care for and work with a dog guide. Having Milo as my companion and guide was like stepping into another new and wonderful world of independence. With Milo, I could walk briskly and feel secure. Milo was a big help as a deaf-blind mom, too. With Milo's guiding help, it was wonderful following my children while they rode tricycles or bikes and the whole family enjoyed going out for walks together. Our second son, Ben, was born in February 1999. He was a perfectly healthy little boy and Bill and I were looking forward to raising two sons. Joe was four and a half years old when Ben was born and was fascinated in his new brother. But when Ben was 5 months old, he was diagnosed with Langerhans Cell Histiocytosis (LCH), a rare childhood disease and in some cases, fatal. It was a long, scary road we followed as Ben received treatment at the children's hospital in St. Louis which involved making the 150 mile trip almost weekly for chemotherapy and doctor check-ups. Through it all, Ben was a happy little boy, in spite of the terrible rash that affected his scalp and diaper area, a symptom of LCH. Bill and I knew that we had to do everything possible to help Ben. When he was a year old, his condition seemed stable enough for me to feel comfortable leaving my family for two months to study Braille and learn new technology skills at a program in Kansas City. My vision had deteriorated to a point where I could no longer use a CCTV.Bill's mom, Marie Reid, who lived in Cleveland, Ohio, made a special trip to stay at our home in Poplar Bluff to help Bill with the boys while I was gone. I was successful at the program, learning Braille, making a change from magnification to Braille technology. Upon returning home, I began looking for a job and found employment as a deaf-blind specialist in a new project in Mississippi. The job was in Tupelo and we moved to northern Mississippi, settling into a new life. We transferred Ben's treatment to St. Judes Children's hospital located in Memphis, 94 miles west of Tupelo. I went to work and Bill stayed home with the boys, which worked well. When Ben had to go to St. Judes every three weeks for chemotherapy, Bill was able to drive him. The treatment was successful, the rash had disappeared and there were no traces of LCH in Ben's blood tests. But when he was almost 3 years old, he was diagnosed with optic atrophy, the same eye disease I suffered from and an audiologist detected signs of inner ear hearing loss.Shocked at the news that our little son would grow up legally blind and perhaps become deaf, Bill and I had to rethink our future. We knew we wanted Ben to have a good life and as a deaf-blind child, he needed quality services. We chose to move to Pittsburgh, Pennsylvania because I knew there were good services for deaf-blind people and I could function independently as a stay-home mom. In addition, Cleveland, Ohio, where Marie Reid and several of Bill's siblings lived, was a two hour's drive from Pittsburgh and living near family was important to us. With regret, I left my job opportunity and new friends and we re-located to Pittsburgh. We lived on a quiet street near Squirrel Hill and enrolled Joe into a near-by Catholic school. Ben received excellent early intervention services through the Pittsburgh public school, beginning Braille, using a white cane and tactile signing. The Pennsylvania services for the blind generously purchased a wonderful computer system and Braille display for me to use at home. I was able to communicate with Joe's and Ben's teachers and other contacts using e-mail. Ben's Braille teacher provided us with several print/Braille books which I read to the boys while Ben touched the tactile pictures. I made friends in the deaf and deaf-blind community and our family attended social events. Besides the social benefits of a deaf community, Pittsburgh offered a wonderful interpreting service and I was able to take Ben to doctor appointments knowing an interpreter would meet me at the hospital to assist with communication. I also found people who were willing to help me as volunteer SSPs (support Service Providers), persons whose role is to assist a deaf-blind person in any way, such as shopping, going to the bank, etc. Thus, I was able to function quite independently while Bill worked. Perhaps Bill and I were a bit crazy; after all, we had enough on our plate with a deaf-blind son and a deaf-blind mom, but love is a mysterious thing. In October 2003, Tim was born and our family was complete. Having two school-aged children and a baby on my hands was too much for me to handle alone. Bill was working and busy with culinary arts school. We realized we needed more help with the children, plus the high cost of living in the city was a struggle for us. We decided for the family's best interest, it would be better to move back to Poplar Bluff. After Joe and Ben were out of school in June, my mom flew out to Pittsburgh to escort them back to her home while Bill finished his externship for his culinary arts degree and in the late summer of 2004, we packed up our apartment, said good-bye to Pittsburgh, and drove to Missouri. The move was a good decision in many ways. Poplar Bluff, a rural town in south-eastern Missouri, has been my hometown since I was 10 years old. My extended family live there and the boys are thriving growing up among their cousins. Ben is receiving Braille and sign language services at public school and reads Braille faster than me!While both Bill and I are deeply satisfied knowing our children are happy, we have made personal sacrifices. Bill has given up his career satisfaction as a professional cook, needing to help look after the children and house. I have given up the benefits of city life such as interpreting and SSP services, not to mention the social benefits of a deaf community. But the children's well-being comes first, and I have found ways to fulfil my needs by getting involved with on-line groups for deaf-blind people, including writers and poets. I have taken a great interest in writing, especially children's stories and hope to establish a career as a writer. While I work on my computer, Bill keeps busy engaging the boys in various projects. They have built a screened-in tree house in the backyard where Ben and Tim like to sleep during warm summer nights.“It's almost 5 o'clock," Bill signed into my hand, rousing me from my thoughts. Time to prepare for our homeward journey the next day to Poplar Bluff, Missouri.Christy and Family
APA, Harvard, Vancouver, ISO, and other styles
48

Maybury, Terrence. "The Literacy Control Complex." M/C Journal 7, no. 2 (March 1, 2004). http://dx.doi.org/10.5204/mcj.2337.

Full text
Abstract:
Usually, a literature search is a benign phase of the research regime. It was, however, during this phase on my current project where a semi-conscious pique I’d been feeling developed into an obvious rancour. Because I’ve been involved in both electronic production and consumption, and the pedagogy surrounding it, I was interested in how the literate domain was coping with the transformations coming out of the new media communications r/evolution. This concern became clearer with the reading and re-reading of Kathleen Tyner’s book, Literacy in a Digital World: Teaching and Learning in the Age of Information. Sometimes, irritation is a camouflage for an emerging and hybridised form of knowledge, so it was necessary to unearth this masquerade of discord that welled-up in the most unexpected of places. Literacy in a Digital World makes all the right noises: it discusses technology; Walter Ong; media literacy; primary, secondary, and tertiary schooling; Plato’s Phaedrus; psychoanalysis; storytelling; networks; aesthetics; even numeracy and multiliteracies, along with a host of other highly appropriate subject matter vis-à-vis its object of analysis. On one reading, it’s a highly illuminating overview. There is, however, a differing interpretation of Literacy in a Digital World, and it’s of a more sombre hue. This other more doleful reading makes Literacy in a Digital World a superior representative of a sometimes largely under-theorised control-complex, and an un.conscious authoritarianism, implicit in the production of any type of knowledge. Of course, in this instance the type of production referenced is literate in orientation. The literate domain, then, is not merely an angel of enlightened debate; under the influence and direction of particular human configurations, literacy has its power struggles with other forms of representation. If the PR machine encourages a more seraphical view of the culture industry, it comes at the expense of the latter’s sometimes-tyrannical underbelly. It is vital, then, to question and investigate these un.conscious forces, specifically in relation to the production of literate forms of culture and the ‘discourse’ it carries on regarding electronic forms of knowledge, a paradigm for which is slowly emerging electracy and a subject I will return to. This assertion is no overstatement. Literacy in a Digital World has concealed within its discourse the assumption that the dominant modes of teaching and learning are literate and will continue to be so. That is, all knowledge is mediated via either typographic or chirographic words on a page, or even on a screen. This is strange given that Tyner admits in the Introduction that “I am an itinerant teacher, reluctant writer, and sometimes media producer” (1, my emphasis). The orientation in Literacy in a Digital World, it seems to me, is a mask for the authoritarianism at the heart of the literate establishment trying to contain and corral the intensifying global flows of electronic information. Ironically, it also seems to be a peculiarly electronic way to present information: that is, the sifting, analysis, and categorisation, along with the representation of phenomena, through the force of one’s un.conscious biases, with the latter making all knowledge production laden with emotional causation. This awkwardness in using the term “literacy” in relation to electronic forms of knowledge surfaces once more in Paul Messaris’s Visual “Literacy”. Again, this is peculiar given that this highly developed and informative text might be a fine introduction to electracy as a possible alternative paradigm to literacy, if only, for instance, it made some mention of sound as a counterpoint to textual and visual symbolisation. The point where Messaris passes over this former contradiction is worth quoting: Strictly speaking, of course, the term “literacy” should be applied only to reading and writing. But it would probably be too pedantic and, in any case, it would surely be futile to resist the increasingly common tendency to apply this term to other kinds of communication skills (mathematical “literacy,” computer “literacy”) as well as to the substantive knowledge that communication rests on (historical, geographic, cultural “literacy”). (2-3) While Messaris might use the term “visual literacy” reluctantly, the assumption that literacy will take over the conceptual reins of electronic communication and remain the pre-eminent form of knowledge production is widespread. This assumption might be happening in the literature on the subject but in the wider population there is a rising electrate sensibility. It is in the work of Gregory Ulmer that electracy is most extensively articulated, and the following brief outline has been heavily influenced by his speculation on the subject. Electracy is a paradigm that requires, in the production and consumption of electronic material, highly developed competencies in both oracy and literacy, and if necessary comes on top of any knowledge of the subject or content of any given work, program, or project. The conceptual frame of electracy is herein tentatively defined as both a well-developed range and depth of communicative competency in oral, literate, and electronic forms, biased from the latter’s point of view. A crucial addition, one sometimes overlooked in earlier communicative forms, is that of the technate, or technacy, a working knowledge of the technological infrastructure underpinning all communication and its in-built ideological assumptions. It is in this context of the various communicative competencies required for electronic production and consumption that the term ‘literacy’ (or for that matter ‘oracy’) is questionable. Furthermore, electracy can spread out to mean the following: it is that domain of knowledge formation whose arrangement, transference, and interpretation rely primarily on electronic networks, systems, codes and apparatuses, for either its production, circulation, or consumption. It could be analogue, in the sense of videotape; digital, in the case of the computer; aurally centred, as in the examples of music, radio or sound-scapes; mathematically configured, in relation to programming code for instance; visually fixated, as in broadcast television; ‘amateur’, as in the home-video or home-studio realm; politically sensitive, in the case of surveillance footage; medically fixated, as in the orbit of tomography; ambiguous, as in the instance of The Sydney Morning Herald made available on the WWW, or of Hollywood blockbusters broadcast on television, or hired/bought in a DVD/video format; this is not to mention Brad Pitt reading a classic novel on audio-tape. Electracy is a strikingly simple, yet highly complex and heterogeneous communicative paradigm. Electracy is also a generic term, one whose very comprehensiveness and dynamic mutability is its defining hallmark, and one in which a whole host of communicative codes and symbolic systems reside. Moreover, almost anyone can comprehend meaning in electronic media because “electric epistemology cannot remain confined to small groups of users, as oral epistemologies have, and cannot remain the property of an educated elite, as literate epistemologies have” (Gozzi and Haynes 224). Furthermore, as Ulmer writes: “To speak of computer literacy or media literacy may be an attempt to remain within the apparatus of alphabetic writing that has organized the Western tradition for nearly the past three millennia” (“Foreword” xii). The catch is that the knowledge forms thus produced through electracy are the abstract epistemological vectors on which the diverse markets of global capitalism thrive. The dynamic nature of these “multimodal” forms of electronic knowledge (Kress, “Visual” 73), then, is increasingly applicable to all of us in the local/global, human/world conglomerate in which any polity is now framed. To continue to emphasise literacy and alphabetic consciousness might then be blinding us to this emerging relationship between electracy and globalisation, possibly even to localisation and regionalisation. It may be possible to trace the dichotomy outlined above between literate and electrate forms of knowledge to larger political/economic and cultural forces. As Saskia Sassen illustrates, sovereignty and territoriality are central aspects in the operation of the still important nation-state, especially in an era of encroaching globalisation. In the past, sovereignty referred to the absolute power of monarchs to control their dominions and is an idea that has been transferred to the nation-state in the long transition to representative democracy. Territoriality refers to the specific physical space that sovereignty is seen as guaranteeing. As Sassen writes, “In the main … rule in the modern world flows from the absolute sovereignty of the state over its national territory” (3). Quite clearly, in the shifting regimes of geo-political power that characterise the global era, sovereign control over territory, and, equally, control over the ideas that might reconfigure our interpretation of concepts such as sovereignty and territoriality, nationalism and literacy, are all in a state of change. Today’s climate of geo-political uncertainty has undoubtedly produced a control complex in relation to these shifting power bases, a condition that arises when psychic, epistemological and political certainties move to a state of unpredictable flux. In Benedict Anderson’s Imagined Communities another important examination of nationalism there is an emphasis on how literacy was an essential ingredient in its development as a political structure. Operational levels of literacy also came to be a key component in the development of the idea of the autonomous self that arose with democracy and its use as an organising principle in citizenship rituals like voting in some nation-states. Eric Leed puts it this way: “By the sixteenth century, literacy had become one of the definitive signs — along with the possession of property and a permanent residence — of an independent social status” (53). Clearly, any conception of sovereignty and territoriality has to be read, after being written constitutionally, by those people who form the basis of a national polity and over whom these two categories operate. The “fundamental anxiety” over literacy that Kress speaks of (Before Writing 1) is a sub-component of this larger control complex in that a quantum increase in the volume and diversity of electronic communication is contributing to declining levels of literacy in the body politic. In the current moment there is a control complex of almost plague proportions in our selves, our systems of knowledge, and our institutions and polities, because it is undoubtedly a key factor at the epicentre of any turf war. Even my own strident anxieties over the dominance of literacy in debates over electronic communication deserve to be laid out on the analyst’s couch, in part because any manifestation of the control complex in a turf war is aimed squarely at the repression of alternative ways of being and becoming. The endgame: it might be wiser to more closely examine this literacy control complex, possible alternative paradigms of knowledge production and consumption such as electracy, and their broader relationship to patterns of political/economic/cultural organisation and control. Acknowledgements I am indebted to Patrice Braun and Ros Mills, respectively, for editorial advice and technical assistance in the preparation of this essay. Note on reading “The Literacy Control Complex” The dot configuration in ‘un.conscious’ is used deliberately as an electronic marker to implicitly indicate the omni-directional nature of the power surges that dif.fuse the conscious and the unconscious in the field of political action where any turf war is conducted. While this justification is not obvious, I do want to create a sense of intrigue in the reader as to why this dot configuration might be used. One of the many things that fascinates me about electronic communication is its considerable ability for condensation; the sound-bite is one epistemological example of this idea, the dot, as an electronic form of conceptual elision, is another. If you are interested in this field, I highly recommend perusal of the MEZ posts that crop up periodically on a number of media related lists. MEZ’s posts have made me more cognisant of electronic forms of written expression. These experiments in electronic writing deserve to be tested. Works Cited Anderson, Benedict. Imagined Communities: Reflections on the Origin and Spread of Nationalism. rev. ed. London and New York: Verso, 1991. Gozzi Jr., Raymond, and W. Lance Haynes. “Electric Media and Electric Epistemology: Empathy at a Distance.” Critical Studies in Mass Communication 9.3 (1992): 217-28. Messaris, Paul. Visual “Literacy”: Image, Mind, and Reality. Boulder: Westview Press, 1994. Kress, Gunther. “Visual and Verbal Modes of Representation in Electronically Mediated Communication: The Potentials of New Forms of Text.” Page to Screen: Taking Literacy into the Electronic Era. Ed. Ilana Snyder. Sydney: Allen & Unwin, 1997. 53-79. ---. Before Writing: Rethinking the Paths to Literacy. London: Routledge, 1997. Leed, Eric. “‘Voice’ and ‘Print’: Master Symbols in the History of Communication.” The Myths of Information: Technology and Postindustrial Culture. Ed. Kathleen Woodward. Madison, Wisconsin: Coda Press, 1980. 41-61. Sassen, Saskia. Losing Control? Sovereignty in an Age of Globalization. New York: Columbia UP, 1996. Tyner, Kathleen. Literacy in a Digital World: Teaching and Learning in the Age of Information. Mahwah, NJ: Lawrence Erlbaum Associates, 1998. Ulmer, Gregory. Teletheory: Grammatology in the Age of Video. New York: Routledge, 1989. ---. Heuretics: The Logic of Invention. New York: Johns Hopkins U P, 1994. ---. “Foreword/Forward (Into Electracy).” Literacy Theory in the Age of the Internet. Ed. Todd Taylor and Irene Ward. New York: Columbia U P, 1998. ix-xiii. ---. Internet Invention: Literacy into Electracy. Boston: Longman, 2003. Citation reference for this article MLA Style Maybury, Terrence. "The Literacy Control Complex" M/C: A Journal of Media and Culture <http://www.media-culture.org.au/0403/05-literacy.php>. APA Style Maybury, T. (2004, Mar17). The Literacy Control Complex. M/C: A Journal of Media and Culture, 7, <http://www.media-culture.org.au/0403/05-literacy.php>
APA, Harvard, Vancouver, ISO, and other styles
49

Kadivar, Jamileh. "Government Surveillance and Counter-Surveillance on Social and Mobile Media: The Case of Iran (2009)." M/C Journal 18, no. 2 (April 29, 2015). http://dx.doi.org/10.5204/mcj.956.

Full text
Abstract:
Human history has witnessed varied surveillance and counter-surveillance activities from time immemorial. Human beings could not surveille others effectively and accurately without the technology of their era. Technology is a tool that can empower both people and governments. The outcomes are different based on the users’ intentions and aims. 2,500 years ago, Sun Tzu noted that ‘If you know both yourself and your enemy, you can win numerous (literally, "a hundred") battles without jeopardy’. His words still ring true. To be a good surveiller and counter-surveiller it is essential to know both sides, and in order to be good at these activities access to technology is vital. There is no doubt that knowledge is power, and without technology to access the information, it is impossible to be powerful. As we become more expert at technology, we will learn what makes surveillance and counter-surveillance more effective, and will be more powerful.“Surveillance” is one of the most important aspects of living in the convergent media environment. This essay illustrates government surveillance and counter-surveillance during the Iranian Green Movement (2009) on social and mobile media. The Green Movement refers to a non-violent movement that arose after the disputed presidential election on June 2009. After that Iran was facing its most serious political crisis since the 1979 revolution. Claims of vote fraud triggered massive street protests. Many took to the streets with “Green” signs, chanting slogans such as ‘the government lied’, and ‘where is my vote?’ There is no doubt that social and mobile media has played an important role in Iran’s contemporary politics. According to Internet World Stats (IWS) Internet users in 2009 account for approximately 48.5 per cent of the population of Iran. In 2009, Iran had 30.2 million mobile phone users (Freedom House), and 72 cellular subscriptions for every 100 people (World Bank). Today, while Iran has the 19th-largest population in the world, its blogosphere holds the third spot in terms of number of users, just behind the United States and China (Beth Elson et al.). In this essay the use of social and mobile media (technology) is not debated, but the extent of this use, and who, why and how it is used, is clearly scrutinised.Visibility and Surveillance There have been different kinds of surveillance for a very long time. However, all types of surveillance are based on the notion of “visibility”. Previous studies show that visibility is not a new term (Foucault Discipline). The new things in the new era, are its scale, scope and complicated ways to watch others without being watched, which are not limited to a specific time, space and group, and are completely different from previous instruments for watching (Andrejevic). As Meikle and Young (146) have mentioned ‘networked digital media bring with them a new kind of visibility’, based on different kinds of technology. Internet surveillance has important implications in politics to control, protect, and influence (Marx Ethics; Castells; Fuchs Critique). Surveillance has been improved during its long history, and evolved from very simple spying and watching to complicated methods of “iSpy” (Andrejevic). To understand the importance of visibility and its relationship with surveillance, it is essential to study visibility in conjunction with the notion of “panopticon” and its contradictory functions. Foucault uses Bentham's notion of panopticon that carries within itself visibility and transparency to control others. “Gaze” is a central term in Bentham’s view. ‘Bentham thinks of a visibility organised entirely around a dominating, overseeing gaze’ (Foucault Eye). Moreover, Thomson (Visibility 11) notes that we are living in the age of ‘normalizing the power of the gaze’ and it is clear that the influential gaze is based on powerful means to see others.Lyon (Surveillance 2) explains that ‘surveillance is any collection and processing of personal data, whether identifiable or not, for the purpose of influencing or managing those whose data have been granted…’. He mentions that today the most important means of surveillance reside in computer power which allows collected data to be sorted, matched, retrieved, processed, marketed and circulated.Nowadays, the Internet has become ubiquitous in many parts of the world. So, the changes in people’s interactions have influenced their lives. Fuchs (Introduction 15) argues that ‘information technology enables surveillance at a distance…in real time over networks at high transmission speed’. Therefore, visibility touches different aspects of people’s lives and living in a “glasshouse” has caused a lot of fear and anxiety about privacy.Iran’s Green Movement is one of many cases for studying surveillance and counter-surveillance technologies in social and mobile media. Government Surveillance on Social and Mobile Media in Iran, 2009 In 2009 the Iranian government controlled technology that allowed them to monitor, track, and limit access to the Internet, social media and mobiles communication, which has resulted in the surveillance of Green Movement’s activists. The Iranian government had improved its technical capabilities to monitor the people’s behavior on the Internet long before the 2009 election. The election led to an increase in online surveillance. Using social media the Iranian government became even more powerful than it was before the election. Social media was a significant factor in strengthening the government’s power. In the months after the election the virtual atmosphere became considerably more repressive. The intensified filtering of the Internet and implementation of more advanced surveillance systems strengthened the government’s position after the election. The Open Net Initiative revealed that the Internet censorship system in Iran is one of the most comprehensive and sophisticated censorship systems in the world. It emphasized that ‘Advances in domestic technical capacity have contributed to the implementation of a centralized filtering strategy and a reduced reliance on Western technologies’.On the other hand, the authorities attempted to block all access to political blogs (Jaras), either through cyber-security methods or through threats (Tusa). The Centre for Investigating Organized Cyber Crimes, which was founded in 2007 partly ‘to investigate and confront social and economic offenses on the Internet’ (Cyber Police), became increasingly important over the course of 2009 as the government combated the opposition’s online activities (Beth Elson et al. 16). Training of "senior Internet lieutenants" to confront Iran's "virtual enemies online" was another attempt that the Intelligence minister announced following the protests (Iran Media Program).In 2009 the Iranian government enacted the Computer Crime Law (Jaras). According to this law the Committee in Charge of Determining Unauthorized Websites is legally empowered to identify sites that carry forbidden content and report that information to TCI and other major ISPs for blocking (Freedom House). In the late fall of 2009, the government started sending threatening and warning text messages to protesters about their presence in the protests (BBC). Attacking, blocking, hacking and hijacking of the domain names of some opposition websites such as Jaras and Kaleme besides a number of non-Iranian sites such as Twitter were among the other attempts of the Iranian Cyber Army (Jaras).It is also said that the police and security forces arrested dissidents identified through photos and videos posted on the social media that many imagined had empowered them. Furthermore, the online photos of the active protesters were posted on different websites, asking people to identify them (Valizadeh).In late June 2009 the Iranian government was intentionally permitting Internet traffic to and from social networking sites such as Facebook and Twitter so that it could use a sophisticated practice called Deep Packet Inspection (DPI) to collect information about users. It was reportedly also applying the same technology to monitor mobile phone communications (Beth Elson et al. 15).On the other hand, to cut communication between Iranians inside and outside the country, Iran slowed down the Internet dramatically (Jaras). Iran also blocked access to Facebook, YouTube, Wikipedia, Twitter and many blogs before, during and after the protests. Moreover, in 2009, text message services were shut down for over 40 days, and mobile phone subscribers could not send or receive text messages regardless of their mobile carriers. Subsequently it was disrupted on a temporary basis immediately before and during key protests days.It was later discovered that the Nokia Siemens Network provided the government with surveillance technologies (Wagner; Iran Media Program). The Iranian government built a complicated system that enabled it to monitor, track and intercept what was said on mobile phones. Nokia Siemens Network confirmed it supplied Iran with the technology needed to monitor, control, and read local telephone calls [...] The product allowed authorities to monitor any communications across a network, including voice calls, text messaging, instant messages, and web traffic (Cellan-Jones). Media sources also reported that two Chinese companies, Huawei and ZTE, provided surveillance technologies to the government. The Nic Payamak and Saman Payamak websites, that provide mass text messaging services, also reported that operator Hamrah Aval commonly blocked texts with words such as meeting, location, rally, gathering, election and parliament (Iran Media Program). Visibility and Counter-Surveillance The panopticon is not limited to the watchers. Similarly, new kinds of panopticon and visibility are not confined to government surveillance. Foucault points out that ‘the seeing machine was once a sort of dark room into which individuals spied; it has become a transparent building in which the exercise of power may be supervised by society as a whole’ (Discipline 207). What is important is Foucault's recognition that transparency, not only of those who are being observed but also of those who are observing, is central to the notion of the panopticon (Allen) and ‘any member of society will have the right to come and see with his own eyes how schools, hospitals, factories, and prisons function’ (Foucault, Discipline 207). Counter-surveillance is the process of detecting and mitigating hostile surveillance (Burton). Therefore, while the Internet is a surveillance instrument that enables governments to watch people, it also improves the capacity to counter-surveille, and draws public attention to governments’ injustice. As Castells (185) notes the Internet could be used by citizens to watch their government as an instrument of control, information, participation, and even decision-making, from the bottom up.With regards to the role of citizens in counter-surveillance we can draw on Jay Rosen’s view of Internet users as ‘the people formerly known as the audience’. In counter-surveillance it can be said that passive citizens (formerly the audience) have turned into active citizens. And this change was becoming impossible without mobile and social media platforms. These new techniques and technologies have empowered people and given them the opportunity to have new identities. When Thompson wrote ‘the exercise of power in modern societies remains in many ways shrouded in secrecy and hidden from the public gaze’ (Media 125), perhaps he could not imagine that one day people can gaze at the politicians, security forces and the police through the use of the Internet and mobile devices.Furthermore, while access to mobile media allows people to hold authorities accountable for their uses and abuses of power (Breen 183), social media can be used as a means of representation, organization of collective action, mobilization, and drawing attention to police brutality and reasons for political action (Gerbaudo).There is no doubt that having creativity and using alternative platforms are important aspects in counter-surveillance. For example, images of Lt. Pike “Pepper Spray Cop” from the University of California became the symbol of the senselessness of police brutality during the Occupy Movement (Shaw). Iranians’ Counter-Surveillance on Social and Mobile Media, 2009 Iran’s Green movement (2009) triggered a lot of discussions about the role of technology in social movements. In this regard, there are two notable attitudes about the role of technology: techno-optimistic (Shriky and Castells) and techno-pessimistic (Morozov and Gladwell) views should be taken into account. While techno-optimists overrated the role of social media, techno-pessimists underestimated its role. However, there is no doubt that technology has played a great role as a counter-surveillance tool amongst Iranian people in Iran’s contemporary politics.Apart from the academic discussions between techno-optimists and techno-pessimists, there have been numerous debates about the role of new technologies in Iran during the Green Movement. This subject has received interest from different corners of the world, including Western countries, Iranian authorities, opposition groups, and also some NGOs. However, its role as a means of counter-surveillance has not received adequate attention.As the tools of counter-surveillance are more or less the tools of surveillance, protesters learned from the government to use the same techniques to challenge authority on social media.Establishing new websites (such as JARAS, RASA, Kalemeh, and Iran green voice) or strengthening some previous ones (such as Saham, Emrooz, Norooz), also activating different platforms such as Facebook, Twitter, and YouTube accounts to broadcast the voice of the Iranian Green Movement and neutralize the government’s propaganda were the most important ways to empower supporters of Iran’s Green Movement in counter-surveillance.‘Reporters Without Borders issued a statement, saying that ‘the new media, and particularly social networks, have given populations collaborative tools with which they can change the social order’. It is also mentioned that despite efforts by the Iranian government to prevent any reporting of the protests and due to considerable pressure placed on foreign journalists inside Iran, social media played a significant role in sending the messages and images of the movement to the outside world (Axworthy). However, at that moment, many thought that Twitter performed a liberating role for Iranian dissenters. For example, Western media heralded the Green Movement in Iran as a “Twitter revolution” fuelled by information and communication technologies (ICTs) and social media tools (Carrieri et al. 4). “The Revolution Will Be Twittered” was the first in a series of blog posts published by Andrew Sullivan a few hours after the news of the protests was released.According to the researcher’s observation the numbers of Twitter users inside Iran who tweeted was very limited in 2009 and social media was most useful in the dissemination of information, especially from those inside Iran to outsiders. Mobile phones were mostly influential as an instrument firstly used for producing contents (images and videos) and secondly for the organisation of protests. There were many photos and videos that were filmed by very simple mobile cell phones, uploaded by ordinary people onto YouTube and other platforms. The links were shared many times on Twitter and Facebook and released by mainstream media. The most frequently circulated story from the Iranian protests was a video of Neda Agha-Sultan. Her final moments were captured by some bystanders with mobile phone cameras and rapidly spread across the global media and the Internet. It showed that the camera-phone had provided citizens with a powerful means, allowing for the creation and instant sharing of persuasive personalised eyewitness records with mobile and globalised target populations (Anden-Papadopoulos).Protesters used another technique, DDOS (distributed denial of service attacks), for political protest in cyber space. Anonymous people used DDOS to overload a website with fake requests, making it unavailable for users and disrupting the sites set as targets (McMillan) in effect, shutting down the site. DDOS is an important counter-surveillance activity by grassroots activists or hackers. It was a cyber protest that knocked the main Iranian governmental websites off-line and caused crowdsourcing and false trafficking. Amongst them were Mahmoud Ahmadinejad, Iran's supreme leader’s websites and those which belong to or are close to the government or security forces, including news agencies (Fars, IRNA, Press TV…), the Ministry of Foreign Affairs, the Ministry of Justice, the Police, and the Ministry of the Interior.Moreover, as authorities uploaded the pictures of protesters onto different platforms to find and arrest them, in some cities people started to put the pictures, phone numbers and addresses of members of security forces and plain clothes police officers who attacked them during the protests and asked people to identify and report the others. They also wanted people to send information about suspects who infringed human rights. Conclusion To sum up, visibility, surveillance and counter-surveillance are not new phenomena. What is new is the technology, which increased their complexity. As Foucault (Discipline 200) mentioned ‘visibility is a trap’, so being visible would be the weakness of those who are being surveilled in the power struggle. In the convergent era, in order to be more powerful, both surveillance and counter-surveillance activities aim for more visibility. Although both attempt to use the same means (technology) to trap the other side, the differences are in their subjects, objects, goals and results.While in surveillance, visibility of the many by the few is mostly for the purpose of control and influence in undemocratic ways, in counter-surveillance, the visibility of the few by the many is mostly through democratic ways to secure more accountability and transparency from the governments.As mentioned in the case of Iran’s Green Movement, the scale and scope of visibility are different in surveillance and counter-surveillance. The importance of what Shaw wrote about Sydney occupy counter-surveillance, applies to other places, such as Iran. She has stressed that ‘protesters and police engaged in a dance of technology and surveillance with one another. Both had access to technology, but there were uncertainties about the extent of technology and its proficient use…’In Iran (2009), both sides (government and activists) used technology and benefited from digital networked platforms, but their levels of access and domains of influence were different, which was because the sources of power, information and wealth were divided asymmetrically between them. Creativity was important for both sides to make others more visible, and make themselves invisible. Also, sharing information to make the other side visible played an important role in these two areas. References Alen, David. “The Trouble with Transparency: The Challenge of Doing Journalism Ethics in a Surveillance Society.” Journalism Studies 9.3 (2008): 323-40. 8 Dec. 2013 ‹http://www.tandfonline.com/doi/full/10.1080/14616700801997224#.UqRFSuIZsqN›. Anden-Papadopoulos, Kari. “Citizen Camera-Witnessing: Embodied Political Dissent in the Age of ‘Mediated Mass Self-Communication.’” New Media & Society 16.5 (2014). 753-69. 9 Aug. 2014 ‹http://nms.sagepub.com/content/16/5/753.full.pdf+html›. Andrejevic, Mark. iSpy: Surveillance and Power in the Interactive Era. Lawrence, Kan: UP of Kansas, 2007. Axworthy, Micheal. Revolutionary Iran: A History of the Islamic Republic. London: Penguin Books, 2014. Bentham, Jeremy. Panopticon Postscript. London: T. Payne, 1791. Beth Elson, Sara, Douglas Yeung, Parisa Roshan, S.R. Bohandy, and Alireza Nader. Using Social Media to Gauge Iranian Public Opinion and Mood after the 2009 Election. Santa Monica: RAND Corporation, 2012. 1 Aug. 2014 ‹http://www.rand.org/content/dam/rand/pubs/technical_reports/2012/RAND_TR1161.pdf›. Breen, Marcus. Uprising: The Internet’s Unintended Consequences. Champaign, Ill: Common Ground Pub, 2011. Burton, Fred. “The Secrets of Counter-Surveillance.” Stratfor Global Intelligence. 2007. 19 April 2015 ‹https://www.stratfor.com/secrets_countersurveillance›. Carrieri, Matthew, Ali Karimzadeh Bangi, Saad Omar Khan, and Saffron Suud. After the Green Movement Internet Controls in Iran, 2009-2012. OpenNet Initiative, 2013. 17 Dec. 2013 ‹https://opennet.net/sites/opennet.net/files/iranreport.pdf›. Castells, Manuel. The Internet Galaxy: Reflections on the Internet, Business, and Society. Oxford: Oxford UP: 2001. Cellan-Jones, Rory. “Hi-Tech Helps Iranian Monitoring.” BBC, 2009. 26 July 2014 ‹http://news.bbc.co.uk/1/hi/technology/8112550.stm›. “Cyber Crimes’ List.” Iran: Cyber Police, 2009. 17 July 2014 ‹http://www.cyberpolice.ir/page/2551›. Foucault, Michel. Discipline and Punish: The Birth of the Prison. Trans. Alan Sheridan. Harmondsworth: Penguin, 1977. Foucault, Michel. “The Eye of Power.” 1980. 12 Dec. 2013 ‹https://nbrokaw.files.wordpress.com/2010/12/the-eye-of-power.doc›. Freedom House. “Special Report: Iran.” 2009. 14 June 2014 ‹http://www.sssup.it/UploadDocs/4661_8_A_Special_Report_Iran_Feedom_House_01.pdf›. Fuchs, Christian. “Introduction.” Internet and Surveillance: The Challenges of Web 2.0 and Social Media. Ed. Christian Fuchs. London: Routledge, 2012. 1-28. Fuchs, Christian. “Critique of the Political Economy of Web 2.0 Surveillance.” Internet and Surveillance: The Challenges of Web 2.0 and Social Media. Ed. Christian Fuchs. London: Routledge, 2012. 30-70. Gerbaudo, Paolo. Tweets and the Streets: Social Media and Contemporary Activism. London: Pluto, 2012. “Internet: Iran’s New Imaginary Enemy.” Jaras Mar. 2009. 28 June 2014 ‹http://www.rahesabz.net/print/12143›.Iran Media Program. “Text Messaging as Iran's New Filtering Frontier.” 2013. 25 July 2014 ‹http://www.iranmediaresearch.org/en/blog/227/13/04/25/136›. Internet World Stats News. The Internet Hits 1.5 Billion. 2009. 3 July 2014 ‹ http://www.internetworldstats.com/pr/edi038.htm›. Lyon, David. Surveillance Society: Monitoring Everyday Life. Buckingham: Open UP, 2001. Lyon, David. “9/11, Synopticon, and Scopophilia: Watching and Being Watched.” The New Politics of Surveillance and Visibility. Eds. Richard V. Ericson and Kevin D. Haggerty. Toronto: UP of Toronto, 2006. 35-54. Marx, Gary T. “What’s New about the ‘New Surveillance’? Classify for Change and Continuity.” Surveillance & Society 1.1 (2002): 9-29. McMillan, Robert. “With Unrest in Iran, Cyber-Attacks Begin.” PC World 2009. 17 Apr. 2015 ‹http://www.pcworld.com/article/166714/article.html›. Meikle, Graham, and Sherman Young. Media Convergence: Networked Digital Media in Everyday Life. London: Palgrave Macmillan, 2012. Morozov, Evgeny. “How Dictators Watch Us on the Web.” Prospect 2009. 15 June 2014 ‹http://www.prospectmagazine.co.uk/magazine/how-dictators-watch-us-on-the-web/#.U5wU6ZRdU00›.Open Net. “Iran.” 2009. 26 June 2014 ‹https://opennet.net/research/profiles/iran›. Reporters without Borders. “Web 2.0 versus Control 2.0.” 2010. 27 May 2014 ‹http://en.rsf.org/web-2-0-versus-control-2-0-18-03-2010,36697›.Rosen, Jay. The People Formerly Known as the Audience. 2006. 7 Dec. 2013 ‹http://www.huffingtonpost.com/jay-rosen/the-people-formerly-known_1_b_24113.html›. Shaw, Frances. “'Walls of Seeing': Protest Surveillance, Embodied Boundaries, and Counter-Surveillance at Occupy Sydney.” Transformation 23 (2013). 9 Dec. 2013 ‹http://www.transformationsjournal.org/journal/issue_23/article_04.shtml›. “The Warning of the Iranian Revolutionary Guard Corps (IRGC) to the Weblogs and Websites.” BBC, 2009. 27 July 2014 ‹http://www.bbc.co.uk/persian/iran/2009/06/090617_ka_ir88_sepah_internet.shtml›. Thompson, John B. The Media And Modernity: A Social Theory of the Media. Cambridge: Polity Press, 1995. Thompson, John B. “The New Visibility.” Theory, Culture & Society 22.6 (2005): 31-51. 10 Dec. 2013 ‹http://tcs.sagepub.com/content/22/6/31.full.pdf+html›. Tusa, Felix. “How Social Media Can Shape a Protest Movement: The Cases of Egypt in 2011 and Iran in 2009.” Arab Media and Society 17 (Winter 2013). 15 July 2014 ‹http://www.arabmediasociety.com/index.php?article=816&p=0›. Tzu, Sun. Sun Tzu: The Art of War. S.l.: Pax Librorum Pub. H, 2009. Valizadeh, Reza. “Invitation to the Public Shooting with the Camera.” RFI, 2011. 19 June 2014 ‹http://www.persian.rfi.fr/%D8%AF%D8%B9%D9%88%D8%AA-%D8%A8%D9%87-%D8%B4%D9%84%DB%8C%DA%A9-%D8%B9%D9%85%D9%88%D9%85%DB%8C-%D8%A8%D8%A7-%D8%AF%D9%88%D8%B1%D8%A8%DB%8C%D9%86-%D8%B9%DA%A9%D8%A7%D8%B3%DB%8C-20110307/%D8%A7%DB%8C%D8%B1%D8%A7%D9%86›. Wagner, Ben. Exporting Censorship and Surveillance Technology. Netherlands: Humanist Institute for Co-operation with Developing Countries (Hivos), 2012. 7 July 2014 ‹https://hivos.org/sites/default/files/exporting_censorship_and_surveillance_technology_by_ben_wagner.pdf›. World Bank. Mobile Cellular Subscriptions (per 100 People). The World Bank. N.d. 27 June 2014 ‹http://data.worldbank.org/indicator/IT.CEL.SETS.P2›.
APA, Harvard, Vancouver, ISO, and other styles
50

Downes, Daniel M. "The Medium Vanishes?" M/C Journal 3, no. 1 (March 1, 2000). http://dx.doi.org/10.5204/mcj.1829.

Full text
Abstract:
Introduction The recent AOL/Time-Warner merger invites us to re-think the relationships amongst content producers, distributors, and audiences. Worth an estimated $300 billion (US), the largest Internet transaction of all time, the deal is 45 times larger than the AOL/Netscape merger of November 1998 (Ledbetter). Additionally, the Time Warner/EMI merger, which followed hard on the heels of the AOL/Time-Warner deal and is itself worth $28 billion (US), created the largest content rights organisation in the music industry. The joining of the Internet giant (AOL) with what was already the world's largest media corporation (Time-Warner-EMI) has inspired some exuberant reactions. An Infoworld column proclaimed: The AOL/Time-Warner merger signals the demise of traditional media companies and the ascendancy of 'new economy' media companies that will force any industry hesitant to adopt a complete electronic-commerce strategy to rethink and put itself on Internet time. (Saap & Schwarrtz) This comment identifies the distribution channel as the dominant component of the "new economy" media. But this might not really be much of an innovation. Indeed, the assumption of all industry observers is that Time-Warner will provide broadband distribution (through its extensive cable holdings) as well as proprietary content for AOL. It is also expected that Time-Warner will adopt AOL's strategy of seeking sponsorship for development projects as well as for content. However, both of these phenomena -- merger and sponsorship -- are at least as old as radio. It seems that the Internet is merely repeating an old industrial strategy. Nonetheless, one important difference distinguishes the Internet from earlier media: its characterisation of the audience. Internet companies such as AOL and Microsoft tend towards a simple and simplistic media- centred view of the audience as market. I will show, however, that as the Internet assumes more of the traditional mass media functions, it will be forced to adopt a more sophisticated notion of the mass audience. Indeed, the Internet is currently the site in which audience definitions borrowed from broadcasting are encountering and merging with definitions borrowed from marketing. The Internet apparently lends itself to both models. As a result, definitions of what the Internet does or is, and of how we should understand the audience, are suitably confused and opaque. And the behaviour of big Internet players, such as AOL and MSN, perfectly reflects this confusion as they seem to careen between a view of the Internet as the new television and a contrasting view of the Internet as the new shopping mall. Meanwhile, Internet users move in ways that most observers fail to capture. For example, Baran and Davis characterise mass communication as a process involving (1) an organized sender, (2) engaged in the distribution of messages, (3) directed toward a large audience. They argue that broadcasting fits this model whereas a LISTSERV does not because, even though the LISTSERV may have very many subscribers, its content is filtered through a single person or Webmaster. But why is the Webmaster suddenly more determining than a network programmer or magazine editor? The distinction seems to grow out of the Internet's technological characteristics: it is an interactive pipeline, therefore its use necessarily excludes the possibility of "broadcasting" which in turn causes us to reject "traditional" notions of the audience. However, if a media organisation were to establish an AOL discussion group in order to promote Warner TV shows, for example, would not the resulting communication suddenly fall under the definition as set out by Baran and Davis? It was precisely the confusion around such definitions that caused the CRTC (Canada's broadcasting and telecommunications regulator) to hold hearings in 1999 to determine what kind of medium the Internet is. Unlike traditional broadcasting, Internet communication does indeed include the possibility of interactivity and niche communities. In this sense, it is closer to narrowcasting than to broadcasting even while maintaining the possibility of broadcasting. Hence, the nature of the audience using the Internet quickly becomes muddy. While such muddiness might have led us to sharpen our definitions of the audience, it seems instead to have led many to focus on the medium itself. For example, Morris & Ogan define the Internet as a mass medium because it addresses a mass audience mediated through technology (Morris & Ogan 39). They divide producers and audiences on the Internet into four groups: One-to-one asynchronous communication (e-mail); Many-to-many asynchronous communication (Usenet and News Groups); One-to-one, one-to-few, and one-to-many synchronous communication (topic groups, construction of an object, role-playing games, IRC chats, chat rooms); Asynchronous communication (searches, many-to-one, one-to-one, one to- many, source-receiver relations (Morris & Ogan 42-3) Thus, some Internet communication qualifies as mass communication while some does not. However, the focus remains firmly anchored on either the sender or the medium because the receiver --the audience -- is apparently too slippery to define. When definitions do address the content distributed over the Net, they make a distinction between passive reception and interactive participation. As the World Wide Web makes pre-packaged content the norm, the Internet increasingly resembles a traditional mass medium. Timothy Roscoe argues that the main focus of the World Wide Web is not the production of content (and, hence, the fulfilment of the Internet's democratic potential) but rather the presentation of already produced material: "the dominant activity in relation to the Web is not producing your own content but surfing for content" (Rosco 680). He concludes that if the emphasis is on viewing material, the Internet will become a medium similar to television. Within media studies, several models of the audience compete for dominance in the "new media" economy. Denis McQuail recalls how historically, the electronic media furthered the view of the audience as a "public". The audience was an aggregate of common interests. With broadcasting, the electronic audience was delocalised and socially decomposed (McQuail, Mass 212). According to McQuail, it was not a great step to move from understanding the audience as a dispersed "public" to thinking about the audience as itself a market, both for products and as a commodity to be sold to advertisers. McQuail defines this conception of the audience as an "aggregate of potential customers with a known social- economic profile at which a medium or message is directed" (McQuail, Mass 221). Oddly though, in light of the emancipatory claims made for the Internet, this is precisely the dominant view of the audience in the "new media economy". Media Audience as Market How does the marketing model characterise the relationship between audience and producer? According to McQuail, the marketing model links sender and receiver in a cash transaction between producer and consumer rather than in a communicative relationship between equal interlocutors. Such a model ignores the relationships amongst consumers. Indeed, neither the effectiveness of the communication nor the quality of the communicative experience matters. This model, explicitly calculating and implicitly manipulative, is characteristically a "view from the media" (McQuail, Audience 9). Some scholars, when discussing new media, no longer even refer to audiences. They speak of users or consumers (Pavick & Dennis). The logic of the marketing model lies in the changing revenue base for media industries. Advertising-supported media revenues have been dropping since the early 1990s while user-supported media such as cable, satellite, online services, and pay-per-view, have been steadily growing (Pavlik & Dennis 19). In the Internet-based media landscape, the audience is a revenue stream and a source of consumer information. As Bill Gates says, it is all about "eyeballs". In keeping with this view, AOL hopes to attract consumers with its "one-stop shopping and billing". And Internet providers such as MSN do not even consider their subscribers as "audiences". Instead, they work from a consumer model derived from the computer software industry: individuals make purchases without the seller providing content or thematising the likely use of the software. The analogy extends well beyond the transactional moment. The common practice of prototyping products and beta-testing software requires the participation of potential customers in the product development cycle not as a potential audience sharing meanings but as recalcitrant individuals able to uncover bugs. Hence, media companies like MTV now use the Internet as a source of sophisticated demographic research. Recently, MTV Asia established a Website as a marketing tool to collect preferences and audience profiles (Slater 50). The MTV audience is now part of the product development cycle. Another method for getting information involves the "cookie" file that automatically provides a Website with information about the user who logs on to a site (Pavick & Dennis). Simultaneously, though, both Microsoft and AOL have consciously shifted from user-subscription revenues to advertising in an effort to make online services more like television (Gomery; Darlin). For example, AOL has long tried to produce content through its own studios to generate sufficiently heavy traffic on its Internet service in order to garner profitable advertising fees (Young). However, AOL and Microsoft have had little success in providing content (Krantz; Manes). In fact, faced with the AOL/Time-Warner merger, Microsoft declared that it was in the software rather than the content business (Trott). In short, they are caught between a broadcasting model and a consumer model and their behaviour is characteristically erratic. Similarly, media companies such as Time-Warner have failed to establish their own portals. Indeed, Time-Warner even abandoned attempts to create large Websites to compete with other Internet services when it shut down its Pathfinder site (Egan). Instead it refocussed its Websites so as to blur the line between pitching products and covering them (Reid; Lyons). Since one strategy for gaining large audiences is the creation of portals - - large Websites that keep surfers within the confines of a single company's site by providing content -- this is the logic behind the AOL/Time-Warner merger though both companies have clearly been unsuccessful at precisely such attempts. AOL seems to hope that Time- Warner will act as its content specialist, providing the type of compelling material that will make users want to use AOL, whereas Time- Warner seems to hope that AOL will become its privileged pipeline to the hearts and minds of untold millions. Neither has a coherent view of the audience, how it behaves, or should behave. Consequently, their efforts have a distinctly "unmanaged" and slighly inexplicable air to them, as though everyone were simultaneously hopeful and clueless. While one might argue that the stage is set to capitalise on the audience as commodity, there are indications that the success of such an approach is far from guaranteed. First, the AOL/Time-Warner/EMI transaction, merely by existing, has sparked conflicts over proprietary rights. For example, the Recording Industry Association of America, representing Sony, Universal, BMG, Warner and EMI, recently launched a $6.8 billion lawsuit against MP3.com -- an AOL subsidiary -- for alleged copyright violations. Specifically, MP3.com is being sued for selling digitized music over the Internet without paying royalties to the record companies (Anderson). A similar lawsuit has recently been launched over the issue of re- broadcasting television programs over the Internet. The major US networks have joined together against Canadian Internet company iCravetv for the unlawful distribution of content. Both the iCravetv and the MP3.com cases show how dominant media players can marshal their forces to protect proprietary rights in both content and distribution. Since software and media industries have failed to recreate the Internet in the image of traditional broadcasting, the merger of the dominant players in each industry makes sense. However, their simultaneous failure to secure proprietary rights reflects both the competitive nature of the "new media economy" and the weakness of the marketing view of the audience. Media Audience as Public It is often said that communication produces social cohesion. From such cohesion communities emerge on which political or social orders can be constructed. The power of social cohesion and attachment to group symbols can even create a sense of belonging to a "people" or nation (Deutsch). Sociologist Daniel Bell described how the mass media helped create an American culture simply by addressing a large enough audience. He suggested that on the evening of 7 March 1955, when one out of every two Americans could see Mary Martin as Peter Pan on television, a kind of social revolution occurred and a new American public was born. "It was the first time in history that a single individual was seen and heard at the same time by such a broad public" (Bell, quoted in Mattelart 72). One could easily substitute the 1953 World Series or the birth of little Ricky on I Love Lucy. The desire to document such a process recurs with the Internet. Internet communities are based on the assumption that a common experience "creates" group cohesion (Rheingold; Jones). However, as a mass medium, the Internet has yet to find its originary moment, that event to which all could credibly point as the birth of something genuine and meaningful. A recent contender was the appearance of Paul McCartney at the refurbished Cavern Club in Liverpool. On Tuesday, 14 December 1999, McCartney played to a packed club of 300 fans, while another 150,000 watched on an outdoor screen nearby. MSN arranged to broadcast the concert live over the Internet. It advertised an anticipated global audience of 500 million. Unfortunately, there was such heavy Internet traffic that the system was unable to accommodate more than 3 million people. Servers in the United Kingdom were so congested that many could only watch the choppy video stream via an American link. The concert raises a number of questions about "virtual" events. We can draw several conclusions about measuring Internet audiences. While 3 million is a sizeable audience for a 20 minute transmission, by advertising a potential audience of 500 million, MSN showed remarkably poor judgment of its inherent appeal. The Internet is the first medium that allows access to unprocessed material or information about events to be delivered to an audience with neither the time constraints of broadcast media nor the space limitations of the traditional press. This is often cited as one of the characteristics that sets the Internet apart from other media. This feeds the idea of the Internet audience as a participatory, democratic public. For example, it is often claimed that the Internet can foster democratic participation by providing voters with uninterpreted information about candidates and issues (Selnow). However, as James Curran argues, the very process of distributing uninterrupted, unfiltered information, at least in the case of traditional mass media, represents an abdication of a central democratic function -- that of watchdog to power (Curran). In the end, publics are created and maintained through active and continuous participation on the part of communicators and audiences. The Internet holds together potentially conflicting communicative relationships within the same technological medium (Merrill & Ogan). Viewing the audience as co-participant in a communicative relationship makes more sense than simply focussing on the Internet audience as either an aggregate of consumers or a passively constructed symbolic public. Audience as Relationship Many scholars have shifted attention from the producer to the audience as an active participant in the communication process (Ang; McQuail, Audience). Virginia Nightingale goes further to describe the audience as part of a communicative relationship. Nightingale identifies four factors in the relationship between audiences and producers that emphasize their co-dependency. The audience and producer are engaged in a symbiotic relationship in which consumption and use are necessary but not sufficient explanations of audience relations. The notion of the audience invokes, at least potentially, a greater range of activities than simply use or consumption. Further, the audience actively, if not always consciously, enters relationships with content producers and the institutions that govern the creation, distribution and exhibition of content (Nightingale 149-50). Others have demonstrated how this relationship between audiences and producers is no longer the one-sided affair characterised by the marketing model or the model of the audience as public. A global culture is emerging based on critical viewing skills. Kavoori calls this a reflexive mode born of an increasing familiarity with the narrative conventions of news and an awareness of the institutional imperatives of media industries (Kavoori). Given the sophistication of the emergent global audience, a theory that reduces new media audiences to a set of consumer preferences or behaviours will inevitably prove inadequate, just as it has for understanding audience behavior in old media. Similarly, by ignoring those elements of audience behavior that will be easily transported to the Web, we run the risk of idealising the Internet as a medium that will create an illusory, pre-technological public. Conclusion There is an understandable confusion between the two models of the audience that appear in the examples above. The "new economy" will have to come to terms with sophisticated audiences. Contrary to IBM's claim that they want to "get to know all about you", Internet users do not seem particularly interested in becoming a perpetual source of market information. The fragmented, autonomous audience resists attempts to lock it into proprietary relationships. Internet hypesters talk about creating publics and argue that the Internet recreates the intimacy of community as a corrective to the atomisation and alienation characteristic of mass society. This faith in the power of a medium to create social cohesion recalls the view of the television audience as a public constructed by the common experience of watching an important event. However, MSN's McCartney concert indicates that creating a public from spectacle it is not a simple process. In fact, what the Internet media conglomerates seem to want more than anything is to create consumer bases. Audiences exist for pleasure and by the desire to be entertained. As Internet media institutions are established, the cynical view of the audience as a source of consumer behavior and preferences will inevitably give way, to some extent, to a view of the audience as participant in communication. Audiences will be seen, as they have been by other media, as groups whose attention must be courted and rewarded. Who knows, maybe the AOL/Time-Warner merger might, indeed, signal the new medium's coming of age. References Anderson, Lessley. "To Beam or Not to Beam. MP3.com Is Being Sued by the Major Record Labels. Does the Digital Download Site Stand a Chance?" Industry Standard 31 Jan. 2000. <http://www.thestandard.com>. Ang, Ien. Watching Dallas: Soap Opera and the Melodramatic Imagination. London: Methuen, 1985. Baran, Stanley, and Dennis Davis. Mass Communication Theory: Foundations, Ferment, and Future. 2nd ed. Belmont, Calif.: Wadsworth 2000. Curran, James. "Mass Media and Democracy Revisited." Mass Media and Society. Eds. James Curran and Michael Gurevitch. New York: Hodder Headline Group, 1996. Darlin, Damon. "He Wants Your Eyeballs." Forbes 159 (16 June 1997): 114-6. Egan, Jack, "Pathfinder, Rest in Peace: Time-Warner Pulls the Plug on Site." US News and World Report 126.18 (10 May 1999): 50. Gomery, Douglas. "Making the Web Look like Television (American Online and Microsoft)." American Journalism Review 19 (March 1997): 46. Jones, Steve, ed. CyberSociety: Computer-Mediated Communication and Community. Thousand Oaks: Sage, 1995. Kavoori, Amandam P. "Discursive Texts, Reflexive Audiences: Global Trends in Television News Texts and Audience Reception." Journal of Broadcasting and Electronic Media 43.3 (Summer 1999): 386-98. Krantz, Michael. "Is MSN on the Block?" Time 150 (20 Oct. 1997): 82. Ledbetter, James. "AOL-Time-Warner Make It Big." Industry Standard 11 Jan. 2000. <http://www.thestandard.com>. Lyons, Daniel. "Desparate.com (Media Companies Losing Millions on the Web Turn to Electronic Commerce)." Forbes 163.6 (22 March 1999): 50-1. Manes, Stephen. "The New MSN as Prehistoric TV." New York Times 4 Feb. 1997: C6. McQuail, Denis. Audience Analysis. Thousand Oaks, Calif.: Sage, 1997. ---. Mass Communication Theory. 2nd ed. London: Sage, 1987. Mattelart, Armand. Mapping World Communication: War, Progress, Culture. Trans. Susan Emanuel and James A. Cohen. Minneapolis: U of Minnesota P, 1994. Morris, Merrill, and Christine Ogan. "The Internet as Mass Medium." Journal of Communications 46 (Winter 1996): 39-50. Nightingale, Virginia. Studying Audience: The Shock of the Real. London: Routledge, 1996. Pavlik, John V., and Everette E. Dennis. New Media Technology: Cultural and Commercial Perspectives. 2nd ed. Boston: Allyn and Bacon, 1998. Reid, Calvin. "Time-Warner Seeks Electronic Synergy, Profits on the Web (Pathfinder Site)." Publisher's Weekly 242 (4 Dec. 1995): 12. Rheingold, Howard. Virtual Community: Homesteading on the Electronic Frontier. New York: Harper, 1993. Roscoe, Timothy. "The Construction of the World Wide Web Audience." Media, Culture and Society 21.5 (1999): 673-84. Saap, Geneva, and Ephraim Schwarrtz. "AOL-Time-Warner Deal to Impact Commerce, Content, and Access Markets." Infoworld 11 January 2000. <http://infoworld.com/articles/ic/xml/00/01/11/000111icimpact.xml>. Slater, Joanna. "Cool Customers: Music Channels Hope New Web Sites Tap into Teen Spirit." Far Eastern Economic Review 162.9 (4 March 1999): 50. Trott, Bob. "Microsoft Views AOL-Time-Warner as Confirmation of Its Own Strategy." Infoworld 11 Jan. 2000. <http://infoworld.com/articles/pi/xml/00/01/11/000111pimsaoltw.xml>. Yan, Catherine. "A Major Studio Called AOL?" Business Week 1 Dec. 1997: 1773-4. Citation reference for this article MLA style: Daniel M. Downes. "The Medium Vanishes? The Resurrection of the Mass Audience in the New Media Economy." M/C: A Journal of Media and Culture 3.1 (2000). [your date of access] <http://www.uq.edu.au/mc/0003/mass.php>. Chicago style: Daniel M. Downes, "The Medium Vanishes? The Resurrection of the Mass Audience in the New Media Economy," M/C: A Journal of Media and Culture 3, no. 1 (2000), <http://www.uq.edu.au/mc/0003/mass.php> ([your date of access]). APA style: Daniel M. Downes. (2000) The Medium Vanishes? The Resurrection of the Mass Audience in the New Media Economy. M/C: A Journal of Media and Culture 3(1). <http://www.uq.edu.au/mc/0003/mass.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography