Applying Electro-Optical Space Surveillance Technology to Asteroid Search and Detection: The LINEAR Program Results

Space 98 ◽  
1998 ◽  
Author(s):  
H. E. M. Viggh ◽  
G. H. Stokes ◽  
F. C. Shelly ◽  
M. S. Blythe ◽  
J. S. Stuart
Author(s):  
Felicity Amaya Schaeffer

I argue that we are entering an automated era of border control that I label a border-biosecurity industrial complex. Funded in great part by the Department of Homeland Security (DHS), scientific research and automated surveillance technologies promise the state innovative and supposedly unbiased solutions to the challenge of border control and security. This article spotlights a border surveillance technology called AVATAR (Automated Virtual Agent for Truth Assessment in Real-Time). Analyzing this technology, which was funded by the DHS and developed by faculty at the University of Arizona’s National Center for Border Security and Immigration (BORDERS), allows me to assess how the emphasis on novel technologies to detect terrorists unleashes the search for ubiquitous surveillance devices programmed to detect deviant behavioral and physiological movements. I offer a wider view of this technology-in-the-making by analyzing how university research in aerial defense, the psychology of deception, the life sciences, and computer engineering influences the development of surveillance devices and techniques. I explore how, during a posthuman era, automated technologies detect and racialize “suspect life” under the guise of scientific neutrality and supposedly free from human interference. Suspect life refers to the racial bias preprogrammed into algorithms that compute danger or risk into certain human movements and regions such as border zones. As these technologies turn the body into matter, they present biological life as a more scientifically verifiable truth than human verbal testimony, moving border control from the adjudication of law through the subjective interview to the automated body that speaks a truth more powerful than a complex story can tell.


2021 ◽  
pp. 1329878X2110058
Author(s):  
Neil Selwyn ◽  
Chris O’Neill ◽  
Gavin Smith ◽  
Mark Andrejevic ◽  
Xin Gu

The COVID-19 pandemic has seen the rapid but sometimes controversial take-up of ‘online examination proctoring’ systems by universities keen to maintain their assessment schedules during times of campus closure. Following the theoretical tradition of media ‘domestication’, this article examines the mainstream adoption of different online proctoring systems in Australian higher education during the first year of the pandemic. Through analysis of interviews, documents, news, social media and marketing materials, the article examines the ‘appropriation’, ‘objectification’, incorporation’ and ‘conversion’ of proctoring technology from the perspective of commercial providers, university authorities, university staff and student groups. This raises a number of critical issues underpinning the adoption of this exam surveillance technology – not least the surrender of control to commercial providers, the hidden labour required to sustain ‘automated’ systems and the increased vulnerabilities of ‘remote’ studying.


Mathematics ◽  
2019 ◽  
Vol 7 (11) ◽  
pp. 1089
Author(s):  
Wenzhao Zhang

In this paper, we consider the discrete-time constrained average stochastic games with independent state processes. The state space of each player is denumerable and one-stage cost functions can be unbounded. In these game models, each player chooses an action each time which influences the transition probability of a Markov chain controlled only by this player. Moreover, each player needs to pay some costs which depend on the actions of all the players. First, we give an existence condition of stationary constrained Nash equilibria based on the technique of average occupation measures and the best response linear program. Then, combining the best response linear program and duality program, we present a non-convex mathematic program and prove that each stationary Nash equilibrium is a global minimizer of this mathematic program. Finally, a controlled wireless network is presented to illustrate our main results.


Sign in / Sign up

Export Citation Format

Share Document