1,465 research outputs found
The Collaborative Role of the Technician in ...sofferte onde serene...
The music of the late 20th and early 21st centuries presents a challenge to traditional music theory through the adoption of a musical language containing sonic elements that previously fell outside the scope of accepted musical categories (primarily those of pitch and rhythm). Experiences gained by performing the electronics in a transitional work ("¦..sofferte onde serene...) by a pivotal figure (Luigi Nono) in this development are explored as a potential inspiration for new notational and analytical models of sound-based composition. Spectrograms and other technologically derived visualizations of sound are proposed as potential aids to both the performance and analysis of music from this period. The importance of .....sofferte onde serene... is emphasized not only in the context of these analytical developments, but also within the oeuvre of Nono as a whole, with its revolutionary shift towards pure sound as a primary compositional material
Requirements Analysis of a Quad-Redundant Flight Control System
In this paper we detail our effort to formalize and prove requirements for
the Quad-redundant Flight Control System (QFCS) within NASA's Transport Class
Model (TCM). We use a compositional approach with assume-guarantee contracts
that correspond to the requirements for software components embedded in an AADL
system architecture model. This approach is designed to exploit the
verification effort and artifacts that are already part of typical software
verification processes in the avionics domain. Our approach is supported by an
AADL annex that allows specification of contracts along with a tool, called
AGREE, for performing compositional verification. The goal of this paper is to
show the benefits of a compositional verification approach applied to a
realistic avionics system and to demonstrate the effectiveness of the AGREE
tool in performing this analysis.Comment: Accepted to NASA Formal Methods 201
In Memory: Bruce D. Leopold
This In Memory article honors the life and contributions of Bruce D. Leopold
Studying slip system activity in deforming single crystals using high-energy X-ray diffraction
High-energy X-ray diffraction microscopy experiments can be used as an effective tool to observe changes of lattice state in crystalline materials as plastic deformation proceeds. The evolution of diffracted intensity distributions measured during the plastic deformation of a crystal is directly related to the underlying distributions of lattice orientation and strain. These distributions of orientation and strain are closely linked to heterogeneities of the deformation across a crystal. Our current study focuses on how developing diffracted intensity distributions can be related to slip system activity. New data analysis methods will be presented which use Nye’s model of heterogeneous slip to link slip system activity with evolution of diffracted intensity distributions caused by increasing misorientation. These data analysis methods are tested using diffraction data measured in situ during plastic deformation of silicon single crystals oriented for single slip at the elastic-plastic transition
Register and Charge: Using Synonym Maps to Explore Connotation
To help students think carefully about specific words and their uses, Darren Crovitz and Jessica A. Miller conceive a diagram that visually expresses the spaces and ties between words. Students eagerly explore contextual connotations and defend subtle shifts in word meaning, discovering how time, use, and circumstance all influence meaning
ID scanners in the night time economy
ID scanners are quickly emerging as a new technological fix to long-standing problems of security and safety within licensed venues. Yet at this point in time detailed research of this rapidly expanding security technology is remarkably limited. To address this analytical deficit we are currently examining the uptake of ID scanners in licensed venues operating in the night-time economy. We have found significant interest in the implementation of ID scanners in other Australian cities. However, the introduction of ID scanners in late-night licensed venues has occurred with little public awareness, no policy consideration and questionable claims concerning their effectiveness in enhancing safety and reducing crime. This article explores the factors shaping the introduction of ID scanners and the underlying beliefs concerning their utility as a crime prevention technology. The article then considers some broader implications to be explored in future analyses
ID scanning, the media and the politics of urban surveillance in an Australian regional city
Computerised ID scanning technologies have permeated many urban night-time economies in Australia, the United States, Canada and the United Kingdom. This paper documents how one media organisation’s overt and tacit approval of ID scanners helped to normalise this form of surveillance as a precondition of entry into most licensed venues in the Australian city of Geelong. After outlining how processes of governance “from above” and “from below” interweave to generate distinct political and media demands for strategies to prevent localised crime problems, a chronological reconstruction of media reports over a three-and-a half year period demonstrates how ID scanning became the centrepiece of a holistic reform strategy to combat alcohol-related violence in this nightclub precinct. Several discursive techniques helped to normalise this “technological fix”, while suppressing critical discussion of viable concerns over information privacy, data security and system networking. Theseincluded pairing reports of an initial “signal crime” with examples of “virtual victimhood” to stress the urgency of a radical surveillance-based response, which was supported by anecdotal statements from key “primary definers” highlighting the success of this initiative in targeting a wider population of antisocial “others”. The implications of these reporting practices are discussed in light of the media’s central role in reforming the Geelong night-time economy and broader trends in using novel surveillance technologies to combat urban crime problems at the expense of alternative measures that protect individual liberty
ID scanners and überveillance in the night-time economy: crime prevention or invasion of privacy?
ID scanners are promoted as an effective solution to the problems of anti-social behavior and violence in many urban nighttime economies. However, the acceptance of this and other forms of computerized surveillance to prevent crime and anti-social behavior is based on several unproven assumptions. After outlining what ID scanners are and how they are becoming a normalized precondition of entry into one Australian nighttime economy, this chapter demonstrates how technology is commonly viewed as the key to preventing crime despite recognition of various problems associated with its adoption. The implications of technological determinism amongst policy makers, police, and crime prevention theories are then critically assessed in light of several issues that key informants talking about the value of ID scanners fail to mention when applauding their success. Notably, the broad, ill-defined, and confused notion of "privacy" is analyzed as a questionable legal remedy for the growing problems of überveillance
ID scanners in the night-time economy: Social sorting or social order?
Digital technologies are often considered effective methods of deterring or preventing crime. New forms of surveillance have particular appeal when attempting to reduce violence in the night-time economy, given ongoing concerns over perceived increases in the frequency and severity of reported assaults. This study examines the rationales for adopting compulsory patron ID scanning as a key method of reducing violence in and around licensed venues in the Victorian regional city of Geelong. Using a mixed methods approach, this paper challenges the popular perception that ID scanning has helped to reduce violence Geelong’s night-time economy. Further, the research identifies several limits in the administration of this technology that potentially undermine patron safety in the night-time economy. The authors conclude by proposing a series of reforms to address current regulatory gaps associated with ID scanning and related surveillance and identity authentication technologies to prevent crime
- …