905 research outputs found

    Adjustable impedance, force feedback and command language aids for telerobotics (parts 1-4 of an 8-part MIT progress report)

    Get PDF
    Projects recently completed or in progress at MIT Man-Machine Systems Laboratory are summarized. (1) A 2-part impedance network model of a single degree of freedom remote manipulation system is presented in which a human operator at the master port interacts with a task object at the slave port in a remote location is presented. (2) The extension of the predictor concept to include force feedback and dynamic modeling of the manipulator and the environment is addressed. (3) A system was constructed to infer intent from the operator's commands and the teleoperation context, and generalize this information to interpret future commands. (4) A command language system is being designed that is robust, easy to learn, and has more natural man-machine communication. A general telerobot problem selected as an important command language context is finding a collision-free path for a robot

    Russian approaches to energy security and climate change: Russian gas exports to the EU

    Get PDF
    The proposition that EU climate policy represents a threat to Russia’s gas exports to the EU, and therefore to Russia’s energy security, is critically examined. It is concluded that whilst the greater significance of climate-change action for Russian energy security currently lies not in Russia’s own emissions reduction commitments but in those of the EU, an even greater threat to Russia’s energy security is posed by the development of the EU internal gas market and challenges to Russia’s participation in that market. However, the coming decades could see Russia’s energy security increasingly influenced by climate-change action policies undertaken by current importers of Russian gas such as the EU, and potential importers such as China and India. The challenge for Russia will be to adapt to developments in energy security and climate-change action at the European and global levels

    Reclaiming the political : emancipation and critique in security studies

    Get PDF
    The critical security studies literature has been marked by a shared commitment towards the politicization of security – that is, the analysis of its assumptions, implications and the practices through which it is (re)produced. In recent years, however, politicization has been accompanied by a tendency to conceive security as connected with a logic of exclusion, totalization and even violence. This has resulted in an imbalanced politicization that weakens critique. Seeking to tackle this situation, the present article engages with contributions that have advanced emancipatory versions of security. Starting with, but going beyond, the so-called Aberystwyth School of security studies, the argument reconsiders the meaning of security as emancipation by making the case for a systematic engagement with the notions of reality and power. This revised version of security as emancipation strengthens critique by addressing political dimensions that have been underplayed in the critical security literature

    Cues and knowledge structures used by mental-health professionals when making risk assessments

    Get PDF
    Background: Research into mental-health risks has tended to focus on epidemiological approaches and to consider pieces of evidence in isolation. Less is known about the particular factors and their patterns of occurrence that influence clinicians’ risk judgements in practice. Aims: To identify the cues used by clinicians to make risk judgements and to explore how these combine within clinicians’ psychological representations of suicide, self-harm, self-neglect, and harm to others. Method: Content analysis was applied to semi-structured interviews conducted with 46 practitioners from various mental-health disciplines, using mind maps to represent the hierarchical relationships of data and concepts. Results: Strong consensus between experts meant their knowledge could be integrated into a single hierarchical structure for each risk. This revealed contrasting emphases between data and concepts underpinning risks, including: reflection and forethought for suicide; motivation for self-harm; situation and context for harm to others; and current presentation for self-neglect. Conclusions: Analysis of experts’ risk-assessment knowledge identified influential cues and their relationships to risks. It can inform development of valid risk-screening decision support systems that combine actuarial evidence with clinical expertise

    The environmental security debate and its significance for climate change

    Get PDF
    Policymakers, military strategists and academics all increasingly hail climate change as a security issue. This article revisits the (comparatively) long-standing “environmental security debate” and asks what lessons that earlier debate holds for the push towards making climate change a security issue. Two important claims are made. First, the emerging climate security debate is in many ways a re-run of the earlier dispute. It features many of the same proponents and many of the same disagreements. These disagreements concern, amongst other things, the nature of the threat, the referent object of security and the appropriate policy responses. Second, given its many different interpretations, from an environmentalist perspective, securitisation of the climate is not necessarily a positive development

    On Online Collaboration and Construction of Shared Knowledge: Assessing Mediation Capability in Computer Supported Argument Visualization Tools

    Get PDF
    Collaborative Computer-Supported Argument Visualization (CCSAV) has often been proposed as an alternative over more conventional, mainstream platforms for online discussion (e.g., online forums and wikis). CCSAV tools require users to contribute to the creation of a joint artifact (argument map) instead of contributing to a conversation. In this paper we assess empirically the effects of this fundamental design choice and show that the absence of conversational affordances and socially salient information in representation-centric tools is detrimental to the users' collaboration experience. We report empirical findings from a study in which subjects using different collaborative platforms (a forum, an argumentation platform, and a socially augmented argumentation tool) were asked to discuss and predict the price of a commodity. By comparing users' experience across several metrics we found evidence that the collaborative performance decreases gradually when we remove conversational interaction and other types of socially salient information. We interpret these findings through theories developed in conversational analysis (common ground theory) and communities of practice and discuss design implications. In particular, we propose balancing the trade-off between knowledge reification and participation in representation-centric tools with the provision of social feedback and functionalities supporting meaning negotiation

    Re-imagining the Borders of US Security after 9/11: Securitisation, Risk, and the Creation of the Department of Homeland Security

    Get PDF
    The articulation of international and transnational terrorism as a key issue in US security policy, as a result of the 9/11 attacks, has not only led to a policy rethink, it has also included a bureaucratic shift within the US, showing a re-thinking of the role of borders within US security policy. Drawing substantively on the 'securitisation' approach to security studies, the article analyses the discourse of US security in order to examine the founding of the Department of Homeland Security, noting that its mission provides a new way of conceptualising 'borders' for US national security. The securitisation of terrorism is, therefore, not only represented by marking terrorism as a security issue, it is also solidified in the organisation of security policy-making within the US state. As such, the impact of a 'war on terror' provides an important moment for analysing the re-articulation of what security is in the US, and, in theoretical terms, for reaffirming the importance of a relationship between the production of threat and the institutionalisation of threat response. © 2007 Taylor & Francis

    Large-scale sequestration of atmospheric carbon via plant roots in natural and agricultural ecosystems: why and how

    Get PDF
    The soil holds twice as much carbon as does the atmosphere, and most soil carbon is derived from recent photosynthesis that takes carbon into root structures and further into below-ground storage via exudates therefrom. Nonetheless, many natural and most agricultural crops have roots that extend only to about 1 m below ground. What determines the lifetime of below-ground C in various forms is not well understood, and understanding these processes is therefore key to optimising them for enhanced C sequestration. Most soils (and especially subsoils) are very far from being saturated with organic carbon, and calculations show that the amounts of C that might further be sequestered (http://dbkgroup.org/carbonsequestration/rootsystem.html) are actually very great. Breeding crops with desirable below-ground C sequestration traits, and exploiting attendant agronomic practices optimised for individual species in their relevant environments, are therefore important goals. These bring additional benefits related to improvements in soil structure and in the usage of other nutrients and water
    corecore