Where Cartographies Collide

Author(s):  
Jess Bier

Chapter 1, “Where Cartographies Collide”, analyzes the unique position of maps in Palestine and Israel. Maps are everywhere in the region, but many of them are not used for getting around. This is because of the difficulties updating maps due to the restrictions on mobility under the Israeli occupation. The chapter introduces the notion of the geographic production of knowledge, which draws attention to the materialities and spatialities of technoscience. It also analyzes three main themes that run throughout the book: internationalism, landscape, and symmetry. In the process, it tells the story of the parallel lives of two pivotal cartographers of the mid-20th century: Sami Hadawi and David Amiran. Through a comparison of these major figures, it explores how politics shape the practice of science and technology. It also delineates how, despite the use of aerial photography and digital data transmitted via the internet, maps continue to be shaped by where and how they are made—as well as who is making them. Lastly, it draws on Edward Said’s notion of traveling theory to present an argument for a reflexive method of traveling ethnography.

2018 ◽  
Vol 6 (3) ◽  
pp. 359-363
Author(s):  
A. Saxena ◽  
◽  
S. Sharma ◽  
S. Dangi ◽  
A. Sharma ◽  
...  

2021 ◽  
Vol 21 (1) ◽  
pp. 1-20
Author(s):  
A. K. Singh ◽  
S. Thakur ◽  
Alireza Jolfaei ◽  
Gautam Srivastava ◽  
MD. Elhoseny ◽  
...  

Recently, due to the increase in popularity of the Internet, the problem of digital data security over the Internet is increasing at a phenomenal rate. Watermarking is used for various notable applications to secure digital data from unauthorized individuals. To achieve this, in this article, we propose a joint encryption then-compression based watermarking technique for digital document security. This technique offers a tool for confidentiality, copyright protection, and strong compression performance of the system. The proposed method involves three major steps as follows: (1) embedding of multiple watermarks through non-sub-sampled contourlet transform, redundant discrete wavelet transform, and singular value decomposition; (2) encryption and compression via SHA-256 and Lempel Ziv Welch (LZW), respectively; and (3) extraction/recovery of multiple watermarks from the possibly distorted cover image. The performance estimations are carried out on various images at different attacks, and the efficiency of the system is determined in terms of peak signal-to-noise ratio (PSNR) and normalized correlation (NC), structural similarity index measure (SSIM), number of changing pixel rate (NPCR), unified averaged changed intensity (UACI), and compression ratio (CR). Furthermore, the comparative analysis of the proposed system with similar schemes indicates its superiority to them.


1994 ◽  
Vol 19 ◽  
pp. 25-32
Author(s):  
J. E. Lewis ◽  
P. Budkewitsch ◽  
G. Newton ◽  
M. Sayed ◽  
R. M. W. Frederking

Aerial photography was obtained for the Beaufort Sea north of Tuktoyaktuk. The flight path covered two distinct ice zones over a 15.5 km transect extending perpendicular to the coast, yielding fifty-nine photographs at a scale of 1 : 2000. The process of ridge extraction was automated using a series of computer algorithms for image filtering, edge detection and edge linking. Examples from two different sections along the transect are chosen for presentation: (a) a heavily ridged area, and (b) an area with one dominant linear ridge feature that separates ice cover of different age. Two parameters used in the automated process, a minimum edge gradient and minimum number of connected pixels said to form a continuous ridge segment, influence the number, length and spatial pattern of extracted ridges. Direct one-to-one correlations between manually interpreted ridges from photographs and the algorithm extracted ridges from digital data are not always possible. However, results indicate that the automated ridge extraction procedure reliably characterizes the overall direction and density of the ice ridges. The distribution of the ice-ridge directions is estimated from circular (angular) histograms constructed directly from the digital data. Analysis of the Beaufort Sea transect reveals that the ice ridging is strongly anisotropic, with a principal direction parallel to the local coastline.


2021 ◽  
pp. 111-120
Author(s):  
Rob Kitchin

This chapter charts the transition from an analogue to a digital world, its effect on data footprints and shadows, and the growth of data brokers and government use of data. The World Wide Web (WWW) started to change things by making information accessible across the Internet through an easy-to-use, intuitive graphical interface. Using the Internet, people started leaving digital traces. In their everyday lives, their digital shadows were also growing through the use of debit, credit, and store loyalty cards, and captured in government databases which were increasingly digital. Running tandem to the creation of digital lifestyles was the datafication of everyday life. This was evident in a paper which examined the various ways in which digital data was being generated and tracked using indexical codes about people, but also objects, transactions, interactions, and territories, and how these data were being used to govern people and manage organizations. Today, people live in a world of continuous data production, since smart systems generate data in real time.


1988 ◽  
Vol 5 (2) ◽  
pp. 117-120
Author(s):  
Roger H. Greene

Abstract Airborne video data in digital form provides an inexpensive alternative to aerial photography to provide up-to-date information on the size, kinds, and distribution of forest types. Its capability to be incorporated into a geographic information system can augment the value of information produced during analysis. In Maine, Landmark Applied Technologies has developed and is using a system which includes acquiring the video imagery, extracting scenes in digital form, analyzing these data, and incorporating them into an Intergraph GIS to provide a mechanism for rapid updating of spatial data bases. North. J. Appl. For. 5:117-120, June 1988.


2018 ◽  
Author(s):  
Jen Schradie

With a growing interest in data science and online analytics, researchers are increasingly using data derived from the Internet. Whether for qualitative or quantitative analysis, online data, including “Big Data,” can often exclude marginalized populations, especially those from the poor and working class, as the digital divide remains a persistent problem. This methodological commentary on the current state of digital data and methods disentangles the hype from the reality of digitally produced data for sociological research. In the process, it offers strategies to address the weaknesses of data that is derived from the Internet in order to represent marginalized populations.


2021 ◽  
Vol 44 (4) ◽  
pp. 21-44
Author(s):  
Ana Eliza Ferreira Alvim-Silva ◽  
José Roberto Pereira ◽  
Cibele Maria Garcia de Aguiar

Abstract: This theoretical essay explores three publications by Jürgen Habermas from the 1960s. The author deals with the critique of science, the production of knowledge and universities democratization. The objective was to extract from them clipings of reflections that can contribute to the studies of public communication of science. We consolidated the considerations into a graphic representation that summarizes the factors to be considered when thinking about the practice of science communication in society: the importance of considering the three interests that drive the production of knowledge - technical, practical and emancipatory, of promoting self-reflection of sciences in politicized and democratized universities, and the mediation of society in the interaction between science and politics, to subsidize decision-making based on social interests. We argue that the basis for a public communication idea of dialogical science - now widely defended - emerged in the German philosopher’s thinking in books published more than 50 years ago. However, that was not his central motivation at that time.


2020 ◽  
pp. 132-145
Author(s):  
Shahin Mammadrzali

It is indicated in the article that emerging information technologies influences human rights norms in any democratic society. Especially, the Internet has changed the traditional approach to methods of ensuring human rights, while adding new challenges at the same time, such as regulating cybersecurity, digital data protection, digital freedom of information, privacy, discrimination in the Internet, etc. The traditional flow of information through newspapers, radio and television is currently combined with new means of exchanging digital information, mobile and satellite communications, the Internet and other technological advances. Of course, these innovations make governments to review traditional human rights legislation to stay fit and updated. Yet, some fundamental norms of national human rights legislation should remain unchangeable. Simply put, it looks like Captain America from the movie “Avengers” – a very old guy who develops his abilities to defeat dangers, but also preserves “old school” strength and leadership skills. In the light of these issues, the present article is devoted to the analysis of the conceptual foundations of national legislation in Azerbaijan on the protection of digital rights in the Internet. The article emphasizes that digital rights themselves are one of the factors demonstrating the strong impact of communication technologies on human rights, especially information rights and freedom of expression.


Compiler ◽  
2014 ◽  
Vol 3 (1) ◽  
Author(s):  
Cakra Aminuddin Hamka ◽  
Haruno Sajati ◽  
Yuliani Indrianingsih

Along with the development of current technology, making technology is very important in today's life. Security level digital data has become more vulnerable to exploitation, the problem arises when an information technology device was attacked by people who do not want to take a responsible and important data illegally, so the administrator must act quickly to secure important data. Making a data security technology on the internet is very important information. Limitations administrator underlying the creation of a system that is able to detect and defense systems against such attacks is automation, so that it can be applied to data security. The system is built to prevent attacks on computer networks with more specific on THC - Hydra. This system will analyze the number of errors in the log into the database, and if the error exceeds the tolerance rules are made by the administrator. If the error is more than 3 times in one minute, then with automation, the system will create a rule that can imprison users who do not have such access, and access to the prison in the illegal user can not perform such activities on legal access and access to activities conducted illegal user can be recorded on a file and jail.txt. So under any circumstances and not in supervising administrator, the security of other user data will be safe and can not be retrieved or viewed by a user of illegal access.


NFC devices are used in contactless payment systems, similar to those used in credit cards electronic ticket smartcards and allow mobile payment to replace and supplement these systems. Specifically, combining NFC enabled devices or NFC mobile phones with RFID tags offers additional benefits when compared to traditional RFID solutions. When an application requires that a device have frequent interaction with tags at numerous process points, the high expense of using traditional handheld RFID readers is cost prohibitive. By replacing handheld readers with NFC-enabled phones at data collection points, the ROI for the application increases. HID Trusted Tag® Services is an example of an application that combines HID Global's patented Near Field Communication (NFC) trusted tag technology and cloud-based authentication platform to add unique and trusted identities to everyday objects that can be read by NFC-enabled mobile devices. This is ideal for establishing proof of presence, digital out of home (DOOH) and electronic visitor verification (EVV) and also serves as a real-world application of the Internet of Things (IoT) that has been discussed in Chapter 1. Some of the examples of NFC based mobile devices is discussed in the chapter.


Sign in / Sign up

Export Citation Format

Share Document