40 research outputs found

    Spatially Immersive Networked Composites: A Media Archaeology of the Photogrammetric Image through Glitch Practice

    Get PDF
    This practice-based research engages new artistic production in an examination of the aesthetics of 3D imaging technologies. In particular, the research concerns the photogrammetric image and its aesthetics as encountered in art practice. Critical discourse on photogrammetry in art practice is underexplored. Where such discourse does exist, for instance in and around the work of the research and activist group Forensic Architecture, it has tended to focus on questions of functionality. This PhD proposes a new starting point for an understanding of photogrammetric representation in its own terms. The study finds the partiality of recent critical research writing on photogrammetry to be too heavily conditioned by discourses of photography. Such discussion fails to appreciate the computational mediation at the heart of photogrammetry. The photogrammetric image is one of a range of images recently emerging which are subject to heavily automated computational processes. This study sets out a 8 conceptual framework for understanding these images; photogrammetric images being one of an emergent range of ‘Spatially-immersive Networked Composites’ or ‘SiNCs’. The research outlines a way of foregrounding qualities of layering and assemblage through computation as pivotal to understanding the image. These images are created through algorithmic analysis resulting in the formation of a computational, navigable environment. The project engages sculptural practice, video, Augmented Reality, and media installations. It provokes a plurality of encounters to be enlisted into the research, thus demonstrating the necessity of art making in this research. New forms of Media Archaeological methods are employed, focusing on glitch practices that explore this evolving technology. Under certain conditions, peculiar errors and aberrations occur. These attributes reveal a glimpse of the image’s materiality by showing estimations and extrapolations of algorithms. Methods devised include generating the conditions for such errors to better understand the aesthetics of Spatially-immersive Networked Composites (SiNCs), both on screen and removed from navigable, screen-based space. The urgency of the research is evident in a digital media environment in which, through automation and algorithmic agency, image production and dissemination are changing rapidly. This research sets the conditions for discussion for emergent forms of imagery, encouraging wider and more critical engagement with the photogrammetric image and its associated, evolving technologie

    Secure Communication in Disaster Scenarios

    Get PDF
    WĂ€hrend Naturkatastrophen oder terroristischer AnschlĂ€ge ist die bestehende Kommunikationsinfrastruktur hĂ€ufig ĂŒberlastet oder fĂ€llt komplett aus. In diesen Situationen können mobile GerĂ€te mithilfe von drahtloser ad-hoc- und unterbrechungstoleranter Vernetzung miteinander verbunden werden, um ein Notfall-Kommunikationssystem fĂŒr Zivilisten und Rettungsdienste einzurichten. Falls verfĂŒgbar, kann eine Verbindung zu Cloud-Diensten im Internet eine wertvolle Hilfe im Krisen- und Katastrophenmanagement sein. Solche Kommunikationssysteme bergen jedoch ernsthafte Sicherheitsrisiken, da Angreifer versuchen könnten, vertrauliche Daten zu stehlen, gefĂ€lschte Benachrichtigungen von Notfalldiensten einzuspeisen oder Denial-of-Service (DoS) Angriffe durchzufĂŒhren. Diese Dissertation schlĂ€gt neue AnsĂ€tze zur Kommunikation in Notfallnetzen von mobilen GerĂ€ten vor, die von der Kommunikation zwischen MobilfunkgerĂ€ten bis zu Cloud-Diensten auf Servern im Internet reichen. Durch die Nutzung dieser AnsĂ€tze werden die Sicherheit der GerĂ€te-zu-GerĂ€te-Kommunikation, die Sicherheit von Notfall-Apps auf mobilen GerĂ€ten und die Sicherheit von Server-Systemen fĂŒr Cloud-Dienste verbessert

    Cross Domain IW Threats to SOF Maritime Missions: Implications for U.S. SOF

    Get PDF
    As cyber vulnerabilities proliferate with the expansion of connected devices, wherein security is often forsaken for ease of use, Special Operations Forces (SOF) cannot escape the obvious, massive risk that they are assuming by incorporating emerging technologies into their toolkits. This is especially true in the maritime sector where SOF operates nearshore in littoral zones. As SOF—in support to the U.S. Navy— increasingly operate in these contested maritime environments, they will gradually encounter more hostile actors looking to exploit digital vulnerabilities. As such, this monograph comes at a perfect time as the world becomes more interconnected but also more vulnerable

    Unmanned Aircraft Systems in the Cyber Domain

    Get PDF
    Unmanned Aircraft Systems are an integral part of the US national critical infrastructure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This textbook will fully immerse and engage the reader / student in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). The first edition topics covered National Airspace (NAS) policy issues, information security (INFOSEC), UAS vulnerabilities in key systems (Sense and Avoid / SCADA), navigation and collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; weapons systems security; electronic warfare considerations; data-links, jamming, operational vulnerabilities and still-emerging political scenarios that affect US military / commercial decisions. This second edition discusses state-of-the-art technology issues facing US UAS designers. It focuses on counter unmanned aircraft systems (C-UAS) – especially research designed to mitigate and terminate threats by SWARMS. Topics include high-altitude platforms (HAPS) for wireless communications; C-UAS and large scale threats; acoustic countermeasures against SWARMS and building an Identify Friend or Foe (IFF) acoustic library; updates to the legal / regulatory landscape; UAS proliferation along the Chinese New Silk Road Sea / Land routes; and ethics in this new age of autonomous systems and artificial intelligence (AI).https://newprairiepress.org/ebooks/1027/thumbnail.jp

    Deep time of the museum : the materiality of media infrastructures

    Get PDF

    Demystifying Internet of Things Security

    Get PDF
    Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms

    Post-Cinematic Bodies

    Get PDF
    How is human embodiment transformed in an age of algorithms? How do post-cinematic media technologies such as AI, VR, and robotics target and re-shape our bodies? 'Post-Cinematic Bodies' grapples with these questions by attending both to mundane devices - such as smartphones, networked exercise machines, and smart watches and other wearables equipped with heartrate sensors - as well as to new media artworks that rework such equipment to reveal to us the ways that our fleshly existences are increasingly up for grabs. Through an equally philosophical and interpretive analysis, the book aims to develop a new aesthetics of embodied experience that is attuned to a new age of predictive technology and metabolic capitalism
    corecore