18,454 research outputs found
Serving to secure "Global Korea": Gender, mobility, and flight attendant labor migrants
This dissertation is an ethnography of mobility and modernity in contemporary South Korea (the Republic of Korea) following neoliberal restructuring precipitated by the Asian Financial Crisis (1997). It focuses on how comparative “service,” “security,” and “safety” fashioned “Global Korea”: an ongoing state-sponsored project aimed at promoting the economic, political, and cultural maturation of South Korea from a once notoriously inhospitable, “backward” country (hujin’guk) to a now welcoming, “advanced country” (sŏnjin’guk). Through physical embodiments of the culturally-specific idiom of “superior” service (sŏbisŭ), I argue that aspiring, current, and former Korean flight attendants have driven the production and maintenance of this national project.
More broadly, as a driver of this national project, this occupation has emerged out of the country’s own aspirational flights from an earlier history of authoritarian rule, labor violence, and xenophobia. Against the backdrop of the Korean state’s aggressive neoliberal restructuring, globalization efforts, and current “Hell Chosun” (Helchosŏn) economy, a group of largely academically and/or class disadvantaged young women have been able secure individualized modes of pleasure, self-fulfillment, and class advancement via what I deem “service mobilities.” Service mobilities refers to the participation of mostly women in a traditionally devalued but growing sector of the global labor market, the “pink collar” economy centered around “feminine” care labor. Korean female flight attendants share labor skills resembling those of other foreign labor migrants (chiefly from the “Global South”), who perform care work deemed less desirable. Yet, Korean female flight attendants elude the stigmatizing, classed, and racialized category of “labor migrant.” Moreover, within the context of South Korea’s unique history of rapid modernization, the flight attendant occupation also commands considerable social prestige.
Based on ethnographic and archival research on aspiring, current, and former Korean flight attendants, this dissertation asks how these unique care laborers negotiate a metaphorical and literal series of sustained border crossings and inspections between Korean flight attendants’ contingent status as lowly care-laboring migrants, on the one hand, and ostensibly glamorous, globetrotting elites, on the other. This study contends the following: first, the flight attendant occupation in South Korea represents new politics of pleasure and pain in contemporary East Asia. Second, Korean female flight attendants’ enactments of soft, sanitized, and glamorous (hwaryŏhada) service help to purify South Korea’s less savory past. In so doing, Korean flight attendants reconstitute the historical role of female laborers as burden bearers and caretakers of the Korean state.U of I OnlyAuthor submitted a 2-year U of I restriction extension request
Meso-scale FDM material layout design strategies under manufacturability constraints and fracture conditions
In the manufacturability-driven design (MDD) perspective, manufacturability of the product or system is the most important of the design requirements. In addition to being able to ensure that complex designs (e.g., topology optimization) are manufacturable with a given process or process family, MDD also helps mechanical designers to take advantage of unique process-material effects generated during manufacturing. One of the most recognizable examples of this comes from the scanning-type family of additive manufacturing (AM) processes; the most notable and familiar member of this family is the fused deposition modeling (FDM) or fused filament fabrication (FFF) process. This process works by selectively depositing uniform, approximately isotropic beads or elements of molten thermoplastic material (typically structural engineering plastics) in a series of pre-specified traces to build each layer of the part. There are many interesting 2-D and 3-D mechanical design problems that can be explored by designing the layout of these elements. The resulting structured, hierarchical material (which is both manufacturable and customized layer-by-layer within the limits of the process and material) can be defined as a manufacturing process-driven structured material (MPDSM). This dissertation explores several practical methods for designing these element layouts for 2-D and 3-D meso-scale mechanical problems, focusing ultimately on design-for-fracture. Three different fracture conditions are explored: (1) cases where a crack must be prevented or stopped, (2) cases where the crack must be encouraged or accelerated, and (3) cases where cracks must grow in a simple pre-determined pattern. Several new design tools, including a mapping method for the FDM manufacturability constraints, three major literature reviews, the collection, organization, and analysis of several large (qualitative and quantitative) multi-scale datasets on the fracture behavior of FDM-processed materials, some new experimental equipment, and the refinement of a fast and simple g-code generator based on commercially-available software, were developed and refined to support the design of MPDSMs under fracture conditions. The refined design method and rules were experimentally validated using a series of case studies (involving both design and physical testing of the designs) at the end of the dissertation. Finally, a simple design guide for practicing engineers who are not experts in advanced solid mechanics nor process-tailored materials was developed from the results of this project.U of I OnlyAuthor's request
Satellite Image Based Cross-view Localization for Autonomous Vehicle
Existing spatial localization techniques for autonomous vehicles mostly use a
pre-built 3D-HD map, often constructed using a survey-grade 3D mapping vehicle,
which is not only expensive but also laborious. This paper shows that by using
an off-the-shelf high-definition satellite image as a ready-to-use map, we are
able to achieve cross-view vehicle localization up to a satisfactory accuracy,
providing a cheaper and more practical way for localization. While the
utilization of satellite imagery for cross-view localization is an established
concept, the conventional methodology focuses primarily on image retrieval.
This paper introduces a novel approach to cross-view localization that departs
from the conventional image retrieval method. Specifically, our method develops
(1) a Geometric-align Feature Extractor (GaFE) that leverages measured 3D
points to bridge the geometric gap between ground and overhead views, (2) a
Pose Aware Branch (PAB) adopting a triplet loss to encourage pose-aware feature
extraction, and (3) a Recursive Pose Refine Branch (RPRB) using the
Levenberg-Marquardt (LM) algorithm to align the initial pose towards the true
vehicle pose iteratively. Our method is validated on KITTI and Ford Multi-AV
Seasonal datasets as ground view and Google Maps as the satellite view. The
results demonstrate the superiority of our method in cross-view localization
with median spatial and angular errors within meter and ,
respectively.Comment: Accepted by ICRA202
Security and Privacy Problems in Voice Assistant Applications: A Survey
Voice assistant applications have become omniscient nowadays. Two models that
provide the two most important functions for real-life applications (i.e.,
Google Home, Amazon Alexa, Siri, etc.) are Automatic Speech Recognition (ASR)
models and Speaker Identification (SI) models. According to recent studies,
security and privacy threats have also emerged with the rapid development of
the Internet of Things (IoT). The security issues researched include attack
techniques toward machine learning models and other hardware components widely
used in voice assistant applications. The privacy issues include technical-wise
information stealing and policy-wise privacy breaches. The voice assistant
application takes a steadily growing market share every year, but their privacy
and security issues never stopped causing huge economic losses and endangering
users' personal sensitive information. Thus, it is important to have a
comprehensive survey to outline the categorization of the current research
regarding the security and privacy problems of voice assistant applications.
This paper concludes and assesses five kinds of security attacks and three
types of privacy threats in the papers published in the top-tier conferences of
cyber security and voice domain.Comment: 5 figure
The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions
The Metaverse offers a second world beyond reality, where boundaries are
non-existent, and possibilities are endless through engagement and immersive
experiences using the virtual reality (VR) technology. Many disciplines can
benefit from the advancement of the Metaverse when accurately developed,
including the fields of technology, gaming, education, art, and culture.
Nevertheless, developing the Metaverse environment to its full potential is an
ambiguous task that needs proper guidance and directions. Existing surveys on
the Metaverse focus only on a specific aspect and discipline of the Metaverse
and lack a holistic view of the entire process. To this end, a more holistic,
multi-disciplinary, in-depth, and academic and industry-oriented review is
required to provide a thorough study of the Metaverse development pipeline. To
address these issues, we present in this survey a novel multi-layered pipeline
ecosystem composed of (1) the Metaverse computing, networking, communications
and hardware infrastructure, (2) environment digitization, and (3) user
interactions. For every layer, we discuss the components that detail the steps
of its development. Also, for each of these components, we examine the impact
of a set of enabling technologies and empowering domains (e.g., Artificial
Intelligence, Security & Privacy, Blockchain, Business, Ethics, and Social) on
its advancement. In addition, we explain the importance of these technologies
to support decentralization, interoperability, user experiences, interactions,
and monetization. Our presented study highlights the existing challenges for
each component, followed by research directions and potential solutions. To the
best of our knowledge, this survey is the most comprehensive and allows users,
scholars, and entrepreneurs to get an in-depth understanding of the Metaverse
ecosystem to find their opportunities and potentials for contribution
Recommended from our members
Ensuring Access to Safe and Nutritious Food for All Through the Transformation of Food Systems
ShakingBot: Dynamic Manipulation for Bagging
Bag manipulation through robots is complex and challenging due to the
deformability of the bag. Based on dynamic manipulation strategy, we propose a
new framework, ShakingBot, for the bagging tasks. ShakingBot utilizes a
perception module to identify the key region of the plastic bag from arbitrary
initial configurations. According to the segmentation, ShakingBot iteratively
executes a novel set of actions, including Bag Adjustment, Dual-arm Shaking,
and One-arm Holding, to open the bag. The dynamic action, Dual-arm Shaking, can
effectively open the bag without the need to account for the crumpled
configuration.Then, we insert the items and lift the bag for transport. We
perform our method on a dual-arm robot and achieve a success rate of 21/33 for
inserting at least one item across various initial bag configurations. In this
work, we demonstrate the performance of dynamic shaking actions compared to the
quasi-static manipulation in the bagging task. We also show that our method
generalizes to variations despite the bag's size, pattern, and color.Comment: Manipulating bag through robots to baggin
A hybrid quantum algorithm to detect conical intersections
Conical intersections are topologically protected crossings between the
potential energy surfaces of a molecular Hamiltonian, known to play an
important role in chemical processes such as photoisomerization and
non-radiative relaxation. They are characterized by a non-zero Berry phase,
which is a topological invariant defined on a closed path in atomic coordinate
space, taking the value when the path encircles the intersection
manifold. In this work, we show that for real molecular Hamiltonians, the Berry
phase can be obtained by tracing a local optimum of a variational ansatz along
the chosen path and estimating the overlap between the initial and final state
with a control-free Hadamard test. Moreover, by discretizing the path into
points, we can use single Newton-Raphson steps to update our state
non-variationally. Finally, since the Berry phase can only take two discrete
values (0 or ), our procedure succeeds even for a cumulative error bounded
by a constant; this allows us to bound the total sampling cost and to readily
verify the success of the procedure. We demonstrate numerically the application
of our algorithm on small toy models of the formaldimine molecule
(\ce{H2C=NH}).Comment: 15 + 10 pages, 4 figure
Exploiting Symmetry and Heuristic Demonstrations in Off-policy Reinforcement Learning for Robotic Manipulation
Reinforcement learning demonstrates significant potential in automatically
building control policies in numerous domains, but shows low efficiency when
applied to robot manipulation tasks due to the curse of dimensionality. To
facilitate the learning of such tasks, prior knowledge or heuristics that
incorporate inherent simplification can effectively improve the learning
performance. This paper aims to define and incorporate the natural symmetry
present in physical robotic environments. Then, sample-efficient policies are
trained by exploiting the expert demonstrations in symmetrical environments
through an amalgamation of reinforcement and behavior cloning, which gives the
off-policy learning process a diverse yet compact initiation. Furthermore, it
presents a rigorous framework for a recent concept and explores its scope for
robot manipulation tasks. The proposed method is validated via two
point-to-point reaching tasks of an industrial arm, with and without an
obstacle, in a simulation experiment study. A PID controller, which tracks the
linear joint-space trajectories with hard-coded temporal logic to produce
interim midpoints, is used to generate demonstrations in the study. The results
of the study present the effect of the number of demonstrations and quantify
the magnitude of behavior cloning to exemplify the possible improvement of
model-free reinforcement learning in common manipulation tasks. A comparison
study between the proposed method and a traditional off-policy reinforcement
learning algorithm indicates its advantage in learning performance and
potential value for applications
In-situ crack and keyhole pore detection in laser directed energy deposition through acoustic signal and deep learning
Cracks and keyhole pores are detrimental defects in alloys produced by laser
directed energy deposition (LDED). Laser-material interaction sound may hold
information about underlying complex physical events such as crack propagation
and pores formation. However, due to the noisy environment and intricate signal
content, acoustic-based monitoring in LDED has received little attention. This
paper proposes a novel acoustic-based in-situ defect detection strategy in
LDED. The key contribution of this study is to develop an in-situ acoustic
signal denoising, feature extraction, and sound classification pipeline that
incorporates convolutional neural networks (CNN) for online defect prediction.
Microscope images are used to identify locations of the cracks and keyhole
pores within a part. The defect locations are spatiotemporally registered with
acoustic signal. Various acoustic features corresponding to defect-free
regions, cracks, and keyhole pores are extracted and analysed in time-domain,
frequency-domain, and time-frequency representations. The CNN model is trained
to predict defect occurrences using the Mel-Frequency Cepstral Coefficients
(MFCCs) of the lasermaterial interaction sound. The CNN model is compared to
various classic machine learning models trained on the denoised acoustic
dataset and raw acoustic dataset. The validation results shows that the CNN
model trained on the denoised dataset outperforms others with the highest
overall accuracy (89%), keyhole pore prediction accuracy (93%), and AUC-ROC
score (98%). Furthermore, the trained CNN model can be deployed into an
in-house developed software platform for online quality monitoring. The
proposed strategy is the first study to use acoustic signals with deep learning
for insitu defect detection in LDED process.Comment: 36 Pages, 16 Figures, accepted at journal Additive Manufacturin
- …