430 research outputs found

    Illuminating the Trauma of the Closet Among Sexual Minorities: A Cinematic-Phenomenological Study of Existential Rights

    Get PDF
    This dissertation is a phenomenological research study about the lived experience of being in the closet as a sexual minority. This study’s research findings are represented in two distinct but overlapping ways: a traditional written hermeneutic interpretation, and a short film called “Illuminate” which cinematically brings to life the closeted lifeworld. To produce this film, I developed an innovative research method called “cinematic-phenomenology.” As a researcher, I conducted phenomenological research interviews with five self-identified sexual minorities about their lived experiences of being in the closet. During interviews, I helped participants describe their felt sense of the closet through symbolic imagery, by guiding them to language their feelings using Eugene Gendlin’s body-focused psychotherapy technique Focusing. I also conducted a thematic interpretation of participants’ data using Max Van Manen’s approach to hermeneutic phenomenological interpretation. My research findings led to the following key insight: that the phenomenon of the closet entails a traumatic loss of existential rights—the right to truth, freedom, love, hope, and power. Then, as a filmmaker, I collaborated with cinematographers, actors and musicians to produce a phenomenological short film called “Illuminate” which visually illustrates these existential themes of the closet via poetic cinematography. All imagery in the film is directly inspired by research participants’ embodied and metaphoric descriptions of what being in the closet felt like for them personally. The final short film can be viewed at www.illuminatethecloset.com. It seeks to make visible the invisible trauma that the closet inflicts, illuminate how sociopolitical oppression deprives marginalized minorities of their existential rights, and instill empathy, compassion, and hope among viewers. “Illuminate” is the first film to be produced by the Phenomenological Film Collective, a community-engaged filmmaking group I have founded which utilizes my cinematic-phenomenological research method to produce social advocacy films (pfcollective.com

    Energy Efficient Clustered Routing Strategy For WSN

    Get PDF
    Wireless sensor network alludes in the route of a group of spatially dedicated sensors for screening, accumulating the normal information in distant zones and sending the gathered knowledge to a central region. In past a few methodologies that cut back the vitality utilization by actualizing efficient steering conventions had been presented. Every sensor hub detects learning and transmits it to its bunch head. Bunch head mix information from its group and transmit the gathered learning to the base station. A few vitality sparing gradable directing conventions are upheld inside the past like LEACH, HEED, PEGASIS, and TBC. TBC (Tree-based for the most part Clustering) convention is another change over HEED convention that executes intra-bunch correspondence to downsize vitality utilization. each bunch head go about as the root hub of the tree and every sensor hub transmit information to close hub that lies on the on account of the root hub. This convention circulates the vitality stack over all part hubs and thusly adjusts the general vitality utilization of the system. To draw out the system life, this work executes another tree-based bunch steering technique called Tree-Based Energy Efficient Clustering Protocol (TBEEC) (TBEEC). Amid this work, the hub having the lesser separation to the base station and preferable vitality over the contrary hubs of the bunch is hoisted as the group set out toward aspherical. All hubs of group forward their insight to the bunch head by exploitation elective halfway hubs that lie on the on account of the bunch head. Further, amid this work between bunch correspondence is authorized to downsize the vitality utilization. Each group head as opposed to sending blend information on to the base station appearance for halfway bunch head that untruths nearly the base station. This form information must go at the lesser separation that finishes in vitality sparing that delays the system life. The arranged convention beats the confinement of existing TBC convention. The reproduction comes about demonstrate that the arranged convention performs higher than the predominant directing conventions like LEACH, HEED, PEGASIS, and TBC

    Automatic Number Plate Recognition Using Raspberry Pi2 in Shovel-Dumper Combination

    Get PDF
    A designing of a system which captures the image of the number plate automatically of a Shovel-Dumper combination and these details were verified using Raspberry Pi2 processor for authentication. This system captures the number plate of shovel and dumper further processing for the character recognition. Automation is the most frequently spelled term in the field of electronics. The hunger for automation brought many revolutions in the existing technologies. This paper makes use of an onboard computer, which is commonly termed as Raspberry Pi2 processor. It acts as heart of the project. This onboard computer can efficiently communicate with the output and input modules which are being used. The device which is able to perform the task is a Raspberry Pi2 processor. When any vehicle passes by the system, the image of the number plate of every vehicle is captured using camera. The image of the number plate details are fed as input to the Raspberry Pi2 processor. The Processor takes responsibility to check the authentication details of every shover and dumper. Once the details are recognized then the processor operates it detects an unauthorized image of number plate was detected. To perform this task, Raspberry Pi processor is programmed using embedded ‘Raspbian’

    Automatic Number Plate Recognition Using Raspberry Pi2 in Shovel-Dumper Combination

    Get PDF
    A designing of a system which captures the image of the number plate automatically of a Shovel-Dumper combination and these details were verified using Raspberry Pi2 processor for authentication. This system captures the number plate of shovel and dumper further processing for the character recognition. Automation is the most frequently spelled term in the field of electronics. The hunger for automation brought many revolutions in the existing technologies. This paper makes use of an onboard computer, which is commonly termed as Raspberry Pi2 processor. It acts as heart of the project. This onboard computer can efficiently communicate with the output and input modules which are being used. The device which is able to perform the task is a Raspberry Pi2 processor. When any vehicle passes by the system, the image of the number plate of every vehicle is captured using camera. The image of the number plate details are fed as input to the Raspberry Pi2 processor. The Processor takes responsibility to check the authentication details of every shover and dumper. Once the details are recognized then the processor operates it detects an unauthorized image of number plate was detected. To perform this task, Raspberry Pi processor is programmed using embedded ‘Raspbian’
    corecore