40 research outputs found
Spatially Immersive Networked Composites: A Media Archaeology of the Photogrammetric Image through Glitch Practice
This practice-based research engages new artistic production in an examination of the
aesthetics of 3D imaging technologies. In particular, the research concerns the photogrammetric
image and its aesthetics as encountered in art practice. Critical discourse on photogrammetry in
art practice is underexplored. Where such discourse does exist, for instance in and around the
work of the research and activist group Forensic Architecture, it has tended to focus on
questions of functionality. This PhD proposes a new starting point for an understanding of
photogrammetric representation in its own terms. The study finds the partiality of recent
critical research writing on photogrammetry to be too heavily conditioned by discourses of
photography. Such discussion fails to appreciate the computational mediation at the heart of
photogrammetry. The photogrammetric image is one of a range of images recently emerging
which are subject to heavily automated computational processes. This study sets out a
8
conceptual framework for understanding these images; photogrammetric images being one of
an emergent range of âSpatially-immersive Networked Compositesâ or âSiNCsâ. The research
outlines a way of foregrounding qualities of layering and assemblage through computation as
pivotal to understanding the image. These images are created through algorithmic analysis
resulting in the formation of a computational, navigable environment. The project engages
sculptural practice, video, Augmented Reality, and media installations. It provokes a plurality of
encounters to be enlisted into the research, thus demonstrating the necessity of art making in
this research. New forms of Media Archaeological methods are employed, focusing on glitch
practices that explore this evolving technology. Under certain conditions, peculiar errors and
aberrations occur. These attributes reveal a glimpse of the imageâs materiality by showing
estimations and extrapolations of algorithms. Methods devised include generating the
conditions for such errors to better understand the aesthetics of Spatially-immersive Networked
Composites (SiNCs), both on screen and removed from navigable, screen-based space. The
urgency of the research is evident in a digital media environment in which, through automation
and algorithmic agency, image production and dissemination are changing rapidly. This
research sets the conditions for discussion for emergent forms of imagery, encouraging wider
and more critical engagement with the photogrammetric image and its associated, evolving
technologie
Secure Communication in Disaster Scenarios
WĂ€hrend Naturkatastrophen oder terroristischer AnschlĂ€ge ist die bestehende Kommunikationsinfrastruktur hĂ€ufig ĂŒberlastet oder fĂ€llt komplett aus. In diesen Situationen können mobile GerĂ€te mithilfe von drahtloser ad-hoc- und unterbrechungstoleranter Vernetzung miteinander verbunden werden, um ein Notfall-Kommunikationssystem fĂŒr Zivilisten und Rettungsdienste einzurichten. Falls verfĂŒgbar, kann eine Verbindung zu Cloud-Diensten im Internet eine wertvolle Hilfe im Krisen- und Katastrophenmanagement sein.
Solche Kommunikationssysteme bergen jedoch ernsthafte Sicherheitsrisiken, da Angreifer versuchen könnten, vertrauliche Daten zu stehlen, gefĂ€lschte Benachrichtigungen von Notfalldiensten einzuspeisen oder Denial-of-Service (DoS) Angriffe durchzufĂŒhren. Diese Dissertation schlĂ€gt neue AnsĂ€tze zur Kommunikation in Notfallnetzen von mobilen GerĂ€ten vor, die von der Kommunikation zwischen MobilfunkgerĂ€ten bis zu Cloud-Diensten auf Servern im Internet reichen. Durch die Nutzung dieser AnsĂ€tze werden die Sicherheit der GerĂ€te-zu-GerĂ€te-Kommunikation, die Sicherheit von Notfall-Apps auf mobilen GerĂ€ten und die Sicherheit von Server-Systemen fĂŒr Cloud-Dienste verbessert
Cross Domain IW Threats to SOF Maritime Missions: Implications for U.S. SOF
As cyber vulnerabilities proliferate with the expansion of connected devices, wherein security is often forsaken for ease of use, Special Operations Forces (SOF) cannot escape the obvious, massive risk that they are assuming by incorporating emerging technologies into their toolkits. This is especially true in the maritime sector where SOF operates nearshore in littoral zones. As SOFâin support to the U.S. Navyâ increasingly operate in these contested maritime environments, they will gradually encounter more hostile actors looking to exploit digital vulnerabilities. As such, this monograph comes at a perfect time as the world becomes more interconnected but also more vulnerable
Unmanned Aircraft Systems in the Cyber Domain
Unmanned Aircraft Systems are an integral part of the US national critical infrastructure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This textbook will fully immerse and engage the reader / student in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). The first edition topics covered National Airspace (NAS) policy issues, information security (INFOSEC), UAS vulnerabilities in key systems (Sense and Avoid / SCADA), navigation and collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; weapons systems security; electronic warfare considerations; data-links, jamming, operational vulnerabilities and still-emerging political scenarios that affect US military / commercial decisions.
This second edition discusses state-of-the-art technology issues facing US UAS designers. It focuses on counter unmanned aircraft systems (C-UAS) â especially research designed to mitigate and terminate threats by SWARMS. Topics include high-altitude platforms (HAPS) for wireless communications; C-UAS and large scale threats; acoustic countermeasures against SWARMS and building an Identify Friend or Foe (IFF) acoustic library; updates to the legal / regulatory landscape; UAS proliferation along the Chinese New Silk Road Sea / Land routes; and ethics in this new age of autonomous systems and artificial intelligence (AI).https://newprairiepress.org/ebooks/1027/thumbnail.jp
Demystifying Internet of Things Security
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms
Post-Cinematic Bodies
How is human embodiment transformed in an age of algorithms? How do post-cinematic media technologies such as AI, VR, and robotics target and re-shape our bodies? 'Post-Cinematic Bodies' grapples with these questions by attending both to mundane devices - such as smartphones, networked exercise machines, and smart watches and other wearables equipped with heartrate sensors - as well as to new media artworks that rework such equipment to reveal to us the ways that our fleshly existences are increasingly up for grabs. Through an equally philosophical and interpretive analysis, the book aims to develop a new aesthetics of embodied experience that is attuned to a new age of predictive technology and metabolic capitalism