Installation version IV work in progress

05/04/2018

ChatBot using speech recognition  p5jS > create a Script for the interaction between audience and computer , (D.Shiffman Tutorial)

Chatbot is triggered by ultra sound sensors monitored via Arduino. Arduino send via Serial to Computer , 1 if there is someone in front of the sculpture. If there is no one, Chatbot is only displaying DataText. The installation is moving mechanically after the first trigger by Audio Speaker Sculpture

DataText is produced by training Texts on masks and object in theatre and Text about components specifications. Training model is Markov Chain

Audio Speaker sculpture with microphone and speakers plugged to computer: role is to get the Chatbot starting, has to drive the audience in, to start the conversation,

Chatbot ‘s script should be based on waiting for keywords ,and ability to display long sentences

Need to set up a private router , to have the installation free from overcrowded network

Questions about training Neural Networks from the maker

The maker : For who’s pleasure do we train the models?

Who is the curator/ the audience?

What is the purpose?

“If we employ machine intelligence to augment our writing activities, it’s worth asking how such technology would affect how we think about writing as well as how we think in the general sense.” (Ross Godwin )

How to start

Installation version III

 

 

04/27/2018 after tutorial with R. Fiebrink

Use sound recognition to find if there is someone talking to one of the artefact, will solve the problem of how many people are interacting effectively with the installation, play with the sensitivity level , to get the data sound we need

  • Build up one “ear” node, with microphone , check this  and that to understand wich type of microphone we need. > lavalier microphone
  • Build up a “mouth” to display the response of the chatbot installation, play with idea that a microphone is a reverse speaker?
    • version 1 simple version via p5js with the need to have access to cloud to do speech recognition ,
    • version 2 for speech recognition with BitVoicer API , speech recognition, check Arduino Tuto : speech recognition and synthesis,
    • would need to use a private router to secure access to the cloud for the text to speech > check authorisation for plugging the private router to internet, 

To generate responses from the ChatBot : build up different training set with different methods : Markov Chain , char RNN review and  basic char RNN training with github source,   , Tensor Flow‘s sequence to sequence library feed ,

write different scripts via RiverScript to compute the input text  to ouput text, use array in Riverscript? generate different characters , who you are talking to, use a list of trigger words in an array to output a certain sentence

or use the mic from MAC

04/26/2018 after tutorial with H. Pritchard

produce a mix reality with the electronic node devices and human interpretation by the nodes Node A activate node B/ one sensor, one motor, one movement, / small (or big)size nodes

create the narrative: when (no one/ or not enough people) is (looking or talking) , the nodes are interacting  with each other- when there is enough people or one person( looking or talking), the nodes stop moving, and talk back

Using text to speech and maybe speech recognition

 

 

Network characterization

01/29/2018

working with sensors and motors, reading Physical computing : Sensing and controlling the physical world with computers. O’Sullivan, D., & Igoe, T. (2004). Boston, MA: Thomson. interesting quotes about “lost” characters in ASCII table “Another point of confusion stems from the fact that the first 32 entries in the ASII table are control characters, like the “carriage return”( ASCII 13) and “line feed”( ASCII 10), are familiar to you from word processing. Some of them, like “bell”(ASII 7), are left over from the old teletype days. Sending these numbers can cause confusion in environments that can only interpret text characters becaue either nothing shos up, or you get a bunch of garbage characters( square, smiley faces, and other dingbat characters).p142

the machine talks to each other in a foreign language, we gave and forgot about it , they still talk this language< Check the ASCII control characters table from old teletype days>

01/28/2018

<Define the Network of artefacts contolled via OSC touch?  Network is the Mask, its artefacts are the nodes>

network desire onto us- through its material affordances, AfNet

 

http://www.lozano-hemmer.com/projects.php

Jane Prophet and Helen Pritchard , Entanglement of Ubicomp apps in Urban South East Asia as possibility to create your own creatures on the web, entangled making between humans and non humans

Ken Rinaldo

Jessica Field Semiotic Investigation into Cybernetic Behaviour, 

Digital flows

Network -Hide

01/25/2018

> Explore Steganography,  and embedding signal into Wearable Objects,

01/20/2018

State Machines is a programme of activities devoted to the investigation of new relationships between states, citizens and the stateless made possible by emerging technologies. Focussing on how such technologies impact identity and citizenship, digital labour and finance

Every time a smartphone powers up, their user is tied inextricably into data, laws and flowing bytes to different countries. Their every personal expression is framed and mediated by digital platforms which now include those operating new kinds of currencies, financial exchange, and labour relations that bypass corporations and governments.

Meanwhile these same technologies increase governmental powers of surveillance, allow corporations to extract ever more complex working arrangements, and, although seemingly the epitome of globalization, they do little to slow the construction of actual walls along actual borders.

We ask how might the digital subjects of today become active, engaged, and effective digital citizens of tomorrow?

State Machines now launches an open call for a new commissioned artistic project.. What kind of Project ? :

  • efforts and actions that resist new enclosures and preserve mobilities, freedom of assembly and other hard-won rights
  • unintended impacts of digital flows on physical bodies, places and infrastructure
  • shifting techniques for controls and flows of information and finance by governments, private companies and individuals;
  • public deliberation and free speech in social media – algorithmic and human corruption and its counterforces;
  • new tools and data for wrangling the personal and political impacts of cloud computing

The call is open to artists, technologists, activists, inventors and individuals, groups and hybrid human- artificial intelligence collaborations.

We are interested in all art forms and actions that can be encountered and experienced across networks, online and in physical exhibition. We welcome diverse viewpoints, experimental and playful approaches.

Fading Memories The social, political and economic future is determined globally by the evolution of digital technologies. The boundaries between the analogue and digital spheres have become increasingly blurred, and the digital has become an integral part of our actual reality. Fading memories devoted a year of international events to the themes of privacy and data ownership in the digital age against the backdrop of developments in the countries of north-western Europe.

 

What we give away when we log on to a public WiFi network experiment of creating a fake network and stealing data from visiting mobile phone in public space.The idea that public WiFi networks are not secure is not exactly news. It is, however, news that can’t be repeated often enough. There are currently more than 1.43 billion smartphone users worldwide and more than 150 million smartphone owners in the U.S. In the U.S., more than 92 million American adults own a tablet and more than 155 million The US census has numbers. own a laptop. Each year the worldwide demand for more laptops and tablets increases. In 2013, an estimated 206 million tablets and 180 million laptops were sold worldwide. Probably everyone with a portable device has once been connected to a public WiFi network: while having a coffee, on the train, or at a hotel. by Wouter Slotboom

> display the facts, rather than the content of counting smartphones and simulating their behaviour/ connections with K cells?

invisible-internet-of-things

Vladan Joler -ShareLab

Exploitation Forensics. Interview with Vladan Joler

The Human Fabric of the Facebook Pyramid

Textility of Code

FoAM . Collective looking into Weaving and Coding

A catalogue of errors, by David Griffiths and Alex McLean : This article presents a series of informal experiments in software and weaving, most of which were conducted as part of the Weaving Codes, Coding Weaves project.

FoAM github   Weaving experiment

 

Tools-Methods-Knitting

 

Easy Basket Weaving

How to Wire Spool Knit in 7 Easy Steps

Mixing Textile and Basket Weaving, Mould with weaving

twining and simple looping, making a connection with basketry and textiles. Work around simple moulds to make samples using both techniques and achieve an understanding of how to create woven structures, using a range of fine flexible materials.Twining involves the weaving of two threads using the fingertips, whilst the form is held in the hands. Processes covered will include joining of threads, patterning and developing a form. Each pod will incorporate some natural fibres such as hemp, nettle or linen and makers will be encouraged to think about their use of colour and texture. This will result in each pod having its own unique qualities.

mary crabb

Fiber Art ideas :

 willow-weaving-birdhouse

 

K- cells-Knitted cells – MFA year 2 practical project

 

 

01/25/2018

the cells, could functions as kinetic drawing bots:

01/10/2018

 In relation to my essay proposal about the  ”NetWork : the Ultimate Mask “
Find the Poetic Space of the Network , I have the intention is to build up some Knitted cells units.  I would like to be able to stitch them together to make either a costume , a quilt , a mask,  a 3D sculpture  , a sensitive environment, or reactive bodies for puppets…

“Rules” :

  • The cells will have different functions , and different structures . They could store visual memories . They could produce or record sounds, be thermo sensitives.  They could produce lights etc…
  • Combined and stiched together they form a body. Each of this unit has its own functions and life, stich together they form a collective and have a collective behaviour. Individually they have a autonomous behaviour.
  • Like puppets can do one thing , dancing versus walking, or a mask is expressing one quality ( neutral, clown, buffon ….)  each type of K cells have limited functions , either data feed, ligth or sound. their design should reflect this particular feature.
  • Decide whether together they are stronger or weaker ? amplification process? they can also relate to each other remotely ie not stitch together.

Strategy

  • >Build K cells in electronics and transpose into soft e textile
  • > Build two families KL, knitted light fiber cells .and KA knitted audio fiber cells

    • Wearable Antennae Speaker FM Transmitter (KA)
  •  Puppetry and mask making process of animating objects
  • then WA weaved audio cells
  • combine the two families in a collective structure
    yep
    Birdy, found objects puppet by theatredu1k
Mona Luison
credit : Mona Louison

“Variables and functions”:

To achieve the design of each family of K cells,  I will use ( list to be completed)

  • mapping technology ( Max/ MSP, Mad Mapper)
  • generative code to find interesting patterns for each type of cells
generative sin pattern in Processing by SRQ
 

Luce - Lucette & Lulu