Image Embedded Metadata in Cultural Heritage Digital Collections on the Web: an Analytical Study

Total Page:16

File Type:pdf, Size:1020Kb

Image Embedded Metadata in Cultural Heritage Digital Collections on the Web: an Analytical Study Journal of Arab Federation for Libraries & Information "Ialam" Image Embedded Metadata in Cultural Heritage Digital Collections on the Web: An Analytical Study Emad I. Saleh Associate Professor (1) Information Science Department, King Abdulaziz University, Jeddah, Saudi Arabia (2) Library and Information Science Department, Helwan University, Egypt Abstract Information institutions used to create metadata describing the content and properties of information resources and package it separately from the resource itself. However, given today’s web environment, the increasing number of published digital objects and the need to share the metadata describing those objects, it became necessary to embed metadata as an integral part of the objects. In fact, embedding standard metadata in a file structure makes a file self describing, helps identify the resource outside its home system, and supports the searchability, discoverability and management of those resources. The web abounds with many sites providing the dissemination and sharing of pictures because of their importance in all aspects of life; in fact, in 2012 an estimated 250 million images were posted daily on Facebook. Hence this study focuses on the verification of the following hypothesis: Most digitally derived images of cultural resources are stripped of their metadata that identify it once they are published on websites. The study seeks to achieve a number of research objectives, including: analysis of images of heritage websites and identify of metadata standards included, definition of the importance of descriptive metadata contained in image for retrieval and archiving, investigate standards and tools needed to embed descriptive metadata in image files. The study depends on the descriptive, analytical methodology using the checklist as a tool for data collection. That a remarkably low percentage of the images analyzed contain metadata, that no links exist between image embedded metadata and its metadata record or the pages of the websites analyzed and that there is significant usage of XMP to encode embedded metadata within the images. Keywords: Image Embedded Metadata; Cultural Heritage; Digital Collections; Image Metadata 1 Emad, I. Saleh 1. Introduction For some time now, the world has witnessed a growing trend to preserve cultural heritage and make it accessible for public users over the web. There have been several initiatives and international collaborations, such as the World Digital Library and Europeana, whose goal is to make digital cultural heritage collections widely available by targeting diverse user communities with varying levels of subject knowledge for both leisure and education purposes(Klimaszewski, 2016). Information institutions used to create metadata describing the content and properties of information resources as separate entities from the resource itself. Nowadays, however, given the web environment, the increasing number of published digital objects and the need to share the metadata describing those objects, it has become necessary to embed the metadata as an integral part of the objects. In fact, embedding standard metadata in a file structure makes a file self-describing, helps identify the resource outside its home system and improves the searchability, discoverability and interoperability management of information objects. The International Press Telecommunications Council (IPTC) stated that: “In the online world, there can be many copies of a single image or video file, and with millions of images or videos on the internet, metadata is essential for identification and copyright protection. We should ensure this metadata travels with the content as a digital label, and remains with it over its lifetime. The metadata associated with an image or video can provide information about: copyright and copyright holders’ associated information, image content, search terms (keywords), technical details of the photography, rights restrictions for use of the image, etc.”(IPTC—International Press Telecommunications Council, 2015). In 2008, the Stock Artists Alliance (SAA) launched a comprehensive “MetaSurvey” to investigate practices around metadata use and preservation among major stock image distributors. The SAA conducted a random sampling of digital image files available on the websites of five distributors, which included Getty Images, Corbis, Jupiterimages, Masterfile and Alamy, to document the presence of metadata in both “thumbnails” and larger “preview” images. The team then tracked sample images to see what happened to embedded metadata as files were forwarded from distributors to multiple sub-distributors. Preliminary findings included the following: too many images in the licensing market lacked key identifying and content information (caption/descriptive information, color management information); there was little use of XMP or ICC profiles on the web; , IPTC “Legacy” metadata Journal of Arab Federation for Libraries & Information "Ialam" was the most popular; few thumbnails had any metadata; slightly more than half of the sample in preview mode had IPTC/XMP; most of the sample did not have XMP metadata; and the most popular IPTC metadata fields were: credit, copyright notice, object name and caption. The survey attributed the reasons for the missing metadata to internal workflows, server-side processing and special processes, such as watermarking (Riecks, 2008)(SAA, n.d.-a). The objective of the Controlled Vocabulary Survey, which began in November 2009, is to find out whether social media websites or various image-sharing services were preserving embedded image metadata after upload. Unfortunately, there is no conclusion to this survey, except an updated spreadsheet made available on the web. However, based on preliminary survey data, the amount and type of embedded metadata preserved in JPEG images online varies. Much seems to depend on the type of server side software used and the type of image processing performed when resizing. Some services may claim they remove this information to decrease download time for those viewing the images(Controlled Vocabulary, n.d.). Embedded metadata is contained within the structure of a digital file and can be descriptive, technical, or administrative in nature. Reser (2010) (“Embedded Metadata: Share, Deliver, Preserve” 2010) distinguished between two types of embedded metadata; external data included in images for public use, which aims to maximize interoperability in order to convey content, source, and restriction information to most users; and internal data used primarily for internal processes. The Madison Digital Image Database (MDID) is an example of a content delivery system that allows external metadata to be embedded in its exported image files. Role of image embedded metadata Information professionals can create additional layers of description to form an external catalog as an integral part of a digital file with which collection managers can strengthen the connection between the image and its data record. These technical and ownership data are often found embedded. Embedded description also creates more flexibility for user access across platforms(“Embedded Metadata: Share, Deliver, Preserve” 2010). By choosing to embed descriptive data, the following benefits can be achieved: - The connection between the image and its data record can be strengthened. An image with embedded metadata becomes an access point to additional information outside the catalog record. Without embedded metadata, the identity of the image is lost and the user has no point of reference to begin research (Frisch, 2012). 3 Emad, I. Saleh - A file becomes self-describing so that it can be identified and described outside of its home system(Matthew Miller & Mullin, 2011). - The value of an image increases, in terms of both potential licensing arrangements and the protection of culturally significant works. When descriptive, source, and ownership metadata are embedded in image files, users can properly identify and attribute images from multiple sources, even if they have kept incomplete notes or renamed files(“Embedded Metadata: Share, Deliver, Preserve,” 2010). - There is increased flexibility for accessing across platforms, which enables people in and outside an organization to work more efficiently, provides valuable data to the systems that preserve digital content, and can assist in disaster recovery(FADGI, 2015). - It assists and facilitates interoperability between image management systems, and adds descriptive metadata to a digital image, allowing it to take advantage of technologies that can harvest and extract that metadata (EMDaWG, 2010). - Users are able to search and sort image files in a system browser or a photo organization application (Reser, 2012b). - Without descriptive data, digital images will lose their cultural context. In this deluge of images how will future users know what they are looking at? Embedding descriptive metadata in image files offers us the chance to survive(Frisch, 2012). 2. Literature Review A search using the terms “Image embedded metadata” and “cultural heritage”, in SAGE, LISA, Emerald, Science Direct and EBSCO, yielded similar results. The literature reveals a preponderance of studies focusing on four major domains, namely: Image embedded metadata implementation Huiskes & Lew (2008) presented a collection for the MIR community comprising 25,000 images from the Flickr website which are redistributable for research purposes and represent a real community of users,
Recommended publications
  • Secret Digital Image Sharing Using Natural Image Based VSS Scheme
    International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2013): 6.14 | Impact Factor (2013): 4.438 Secret Digital Image Sharing Using Natural Image Based VSS Scheme Pinky .V M. Tech Student, Dept. of Computer Science & Engineering Mount Zion College of Engineering, Pathanamthitta, Kerala, India Abstract: Visual cryptography is a technique of sharing secret images. This technique encrypts a secret image into number of shares. Combining these shares generates the original image and it can be directly recognized by the human visual system. Visual Secret Sharing scheme is a method of distributing and sharing the secret image amongst a set of users. In conventional visual secret sharing scheme, the shares May holding the security parameters for protecting the secret image but it will leads to suffering the problem of transmission risk. This is the main problem in conventional VSS scheme. To solve this problem here introduce a new scheme of secret digital image sharing via natural image based VSS scheme. In this proposed scheme the shares are encrypted by using the strong AES encryption technique after that this encrypted share is embedded into the natural image. For recovering the original image, it is necessary to decrypt the encrypted share. This method not only reduces the transmission risk problem but also enhance the security of the secret image. Keywords: Visual Cryptography, Visual Secret Sharing Scheme, Transmission Risk Problem, Natural Image based VSS scheme, Encryption/Decryption technique. 1. Introduction photographs. In the proposed scheme diverse media is used for sharing digital images. Using a variety of media for In communication system security of secret image is very sharing the secret image increases the difficulty of altering important.
    [Show full text]
  • Penelope Umbrico's Suns Sunsets from Flickr
    City University of New York (CUNY) CUNY Academic Works Dissertations and Theses City College of New York 2014 Image Commodification and Image Recycling: Penelope Umbrico's Suns Sunsets from Flickr Minjung “Minny” Lee CUNY City College of New York How does access to this work benefit ou?y Let us know! More information about this work at: https://academicworks.cuny.edu/cc_etds_theses/506 Discover additional works at: https://academicworks.cuny.edu This work is made publicly available by the City University of New York (CUNY). Contact: [email protected] The City College of New York Image Commodification and Image Recycling: Penelope Umbrico’s Suns from Sunsets from Flickr Submitted to the Faculty of the Division of the Arts in Candidacy for the Degree of Master of Arts Department of Humanities and Liberal Arts by Minjung “Minny” Lee New York, New York May 2014 Copyright © 2014 by Minjung “Minny” Lee All rights reserved CONTENTS Acknowledgements v List of Illustrations vi Introduction 1 Chapter 1. Umbrico’s Transformation of Vernacular Visions Found on Flickr 14 Suns from Sunsets from Flickr and the Flickr Website 14 Working Methods for Suns from Sunsets from Flickr 21 Changing Titles 24 Exhibition Installation 25 Dissemination of Work 28 The Temporality and Mortality of Umbrico’s Work 29 Universality vs. Individuality and The Expanded Role of Photographers 31 The New Way of Image-making: Being an Editor or a Curator of Found Photos 33 Chapter 2. The Ephemerality of Digital Photography 36 The Meaning and the Role of JPEG 37 Digital Photographs as Data 40 The Aura of Digital Photography 44 Photography as a Tool for Experiencing 49 Image Production vs.
    [Show full text]
  • Adobe's Extensible Metadata Platform (XMP): Background [DRAFT -- Caroline Arms, 2011-11-30]
    Adobe's Extensible Metadata Platform (XMP): Background [DRAFT -- Caroline Arms, 2011-11-30] Contents • Introduction • Adobe's XMP Toolkits • Links to Adobe Web Pages on XMP Adoption • Appendix A: Mapping of PDF Document Info (basic metadata) to XMP properties • Appendix B: Software applications that can read or write XMP metadata in PDFs • Appendix C: Creating Custom Info Panels for embedding XMP metadata Introduction Adobe's XMP (Extensible Metadata Platform: http://www.adobe.com/products/xmp/) is a mechanism for embedding metadata into content files. For example. an XMP "packet" can be embedded in PDF documents, in HTML and in image files such as TIFF and JPEG2000 as well as Adobe's own PSD format native to Photoshop. In September 2011, XMP was approved as an ISO standard.[ ISO 16684-1: Graphic technology -- Extensible metadata platform (XMP) specification -- Part 1: Data model, serialization and core properties] XMP is an application of the XML-based Resource Description Framework (RDF; http://www.w3.org/TR/2004/REC-rdf-primer-20040210/), which is a generic way to encode metadata from any scheme. RDF is designed for it to be easy to use elements from any namespace. An important application area is in publication workflows, particularly to support submission of pictures and advertisements for inclusion in publications. The use of RDF allows elements from different schemes (e.g., EXIF and IPTC for photographs) to be held in a common framework during processing workflows. There are two ways to get XMP metadata into PDF documents: • manually via a customized File Info panel (or equivalent for products from vendors other than Adobe).
    [Show full text]
  • Image-Based Abuse, Non-Consensual Pornography, Revenge Porn: a Study of Criminalization and Crime Prevention in Australia and England & Wales
    Yar & Drew – Image-Based Abuse, Non-Consensual Pornography, Revenge Porn Copyright © 2019 International Journal of Cyber Criminology – ISSN: 0974–2891 July – December 2019. Vol. 13(2): 578–594. DOI: 10.5281/zenodo.3709306 Publisher & Editor-in-Chief – K. Jaishankar / Open Access (Authors / Readers No Pay Journal). This is a Diamond Open Access article distributed under the terms of the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC-BY-NC-SA 4.0) License, which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited. Image-Based Abuse, Non-Consensual Pornography, Revenge Porn: A Study of Criminalization and Crime Prevention in Australia and England & Wales Majid Yar1 University of Hull, United Kingdom Jacqueline Drew2 Griffith Criminology Institute, Australia Abstract Distribution of nude, intimate and sexualized images of individuals without consent and against the wishes of those individuals whose image has been captured, is of growing concern across the world. Moving from the conceptualization of ‘revenge porn’ in the early 2000’s, through to our more sophisticated understanding of the issues of “image-based abuse” and “non-consensual pornography” this paper considers the broad context of these crimes. The paper draws on the concepts of online misogyny, gender-based victimization, and “toxic masculinity”. The progress towards criminalization of such online abuse, with reference to the recent introduction of new laws in England & Wales and Australia is examined. This shift from voluntary to statutory regulation, and from civil to criminal law remedies has been coupled with new crime prevention and control initiatives that seek to encourage reporting leading to prosecution and educate users and empower victims.
    [Show full text]
  • Digital Forensics Tool Testing – Image Metadata in the Cloud
    Digital Forensics Tool Testing – Image Metadata in the Cloud Philip Clark Master’s Thesis Master of Science in Information Security 30 ECTS Department of Computer Science and Media Technology Gjøvik University College, 2011 Avdeling for informatikk og medieteknikk Høgskolen i Gjøvik Postboks 191 2802 Gjøvik Department of Computer Science and Media Technology Gjøvik University College Box 191 N-2802 Gjøvik Norway Digital Forensics Tool Testing – Image Metadata in the Cloud Abstract As cloud based services are becoming a common way for users to store and share images on the internet, this adds a new layer to the traditional digital forensics examination, which could cause additional potential errors in the investigation. Courtroom forensics evidence has historically been criticised for lacking a scientific basis. This thesis aims to present an approach for testing to what extent cloud based services alter or remove metadata in the images stored through such services. To exemplify what information which could potentially reveal sensitive information through image metadata, an overview of what information is publically shared will be presented, by looking at a selective section of images published on the internet through image sharing services in the cloud. The main contributions to be made through this thesis will be to provide an overview of what information regular users give away while publishing images through sharing services on the internet, either willingly or unwittingly, as well as provide an overview of how cloud based services handle Exif metadata today, along with how a forensic practitioner can verify to what extent information through a given cloud based service is reliable.
    [Show full text]
  • America Through Street Photography
    From the Instructor Sarah wrote this piece for my section of the Genre and Audience WR X cluster. Students had undertaken semester-long research projects and, in the final assignment for the course, were asked to reimagine their academic arguments for a public audience. Deciding to write in the style of The New Republic, which is, in the publication’s own words, “tailored for smart, curi- ous, socially aware readers.” Sarah’s focus on street photography brings her research on classic American images to a non-expert audience with diverse professional and disciplinary perspectives, appealing to their interests in history and the arts while tapping into contemporary culture. — Gwen Kordonowy WR 150: The American Road 135 From the Writer When I enrolled in an experimental writing class entitled “The American Road,” I assumed that the semester would be filled with discussions about the physical American road, its attractions, and its place in American history. While the physical road was an important subject in the class, I learned that this “American Road” was expansive beyond its physical limi- tations, able to encompass topics as broad and abstract as social progress, popular television shows, and, in my case, photography. I ultimately chose to investigate the works of two American street photographers, Robert Frank and Lee Friedlander, whose approaches to photography reveal much about life in America and what it means to be an American. While both photographers frequently feature the road in their pictures, I chose to focus more on the people and culture found alongside it and how they represent America.
    [Show full text]
  • Easybuild Documentation Release 20210706.0 Ghent University
    EasyBuild Documentation Release 20210907.0 Ghent University Tue, 07 Sep 2021 08:55:25 Contents 1 What is EasyBuild? 3 2 Concepts and terminology 5 2.1 EasyBuild framework..........................................5 2.2 Easyblocks................................................6 2.3 Toolchains................................................7 2.3.1 system toolchain.......................................7 2.3.2 dummy toolchain (DEPRECATED) ..............................7 2.3.3 Common toolchains.......................................7 2.4 Easyconfig files..............................................7 2.5 Extensions................................................8 3 Typical workflow example: building and installing WRF9 3.1 Searching for available easyconfigs files.................................9 3.2 Getting an overview of planned installations.............................. 10 3.3 Installing a software stack........................................ 11 4 Getting started 13 4.1 Installing EasyBuild........................................... 13 4.1.1 Requirements.......................................... 14 4.1.2 Using pip to Install EasyBuild................................. 14 4.1.3 Installing EasyBuild with EasyBuild.............................. 17 4.1.4 Dependencies.......................................... 19 4.1.5 Sources............................................. 21 4.1.6 In case of installation issues. .................................. 22 4.2 Configuring EasyBuild.......................................... 22 4.2.1 Supported configuration
    [Show full text]
  • Making Sense of the Selfie: Keywords: Rudolfs Blaumanis, Gottfried Keller, 19Th Century Literature, Latvian Litera­ Ture, Autobiographical Novel, Art and Artist
    46 RAKSTI BENEDIKTS KALNACS 47 Artist. Reality, and (Auto)biography ALISE TIFENTALE in Rudolfs Blaumanis's and Gottfried Keller's Fiction Making Sense of the Selfie: Keywords: Rudolfs Blaumanis, Gottfried Keller, 19th century literature, Latvian litera­ ture, autobiographical novel, art and artist. Digital Image-Making Summary and Image-Sharing in Social Media The paper discusses aspects of the Latvian writer's Rudolfs Blaumanis (1863-1908) fiction in comparative perspective. An important aspect of Blaumanis's efforts was devoted to the discussion ofindividual life stories of his characters, and he also dealt with the possibility or impossibility of a person to become his or her true self in the interpretative contexts ofthe l 9th century society and culture. In European perspective, Keywords: History of photography, digital photography, social media, the image of an artist was often put at the centre of writers' attention, and the paper Ins tagram, self-portraits, software studies. provides one such case study, a discussion of the Swiss author's, Gottfried Keller autobiographical novel "Green Henry" (Der Grune Heinrich, 1st version 1855, 2nd Introduction version 1880) to which the works ofBlaumanis are then compared. The paper deals with some of the Latvian author's most important novellas, written between 1882 and 1898, A wide range of photographic practices has flo urished outside the and discusses the impossibility of artistic career in the context of the 19th century institutional framework of the art world or commercial photography since Latvian society due to different historical and social background as discussed in the early 1900s, when the availability and ease of use of the Kodak Brownie Blaumanis's texts.
    [Show full text]
  • Flickr and Public Image-Sharing: Distant Closeness and Photo Exhibition
    Flickr and Public Image-Sharing: Distant Closeness and Photo Exhibition Nancy A. Van House Abstract School of Information This paper presents an empirical study in progress of University of California, Berkeley the use of Flickr.com™, part of an on-going research Berkeley, CA 94720-4600 program on personal digital media, including images. [email protected] Two new kinds of image-sharing with Flickr are “distant closeness” and “photo exhibition.” We are seeing changing uses of images in social interaction and increased multi-modal communication. Keywords digital photos, distant closeness, Flickr.com, photography, photo sharing, social networking ACM Classification H5.m. Information interfaces and presentation (e.g., HCI): Miscellaneous Introduction The popularity of image-sharing sites like Flickr.com™ allows us to observe what “ordinary” users do when given the ability to more readily incorporate images in their everyday activity. More generally, we are seeing Copyright is held by the author/owner(s). large numbers of people engaged in the creation and CHI 2007, April 28May 3, 2007, San Jose, California, USA. sharing of new media, in the context of a long tradition ACM 978-1-59593-642-4/07/0004. of media use, in this case, personal photography. In this paper, we report on early findings of a study of Third, photos are used for self-representation. People Flickr and put these findings about the uses of new seek to present themselves in such a way as to ensure media and technologies in the context of photographic that others see them as they wish to be seen [7].
    [Show full text]
  • The Social Life of Snapshots the Past, Present, and Future of Personal Photography
    The Social Life of Snapshots The Past, Present, and Future of Personal Photography Morgan Golata Ames School of Information University of California, Berkeley Advised by Professor Nancy Van House Final Project (Option B: Research Track) for the degree of Master in Information Management and Systems Submitted May 4, 2006 Morgan Ames The Social Life of Snapshots Abstract Digital cameras, cameraphones, online sharing, and other innovations are expanding the ways we interact with photographs. This study examines the past and present social uses of personal photography and reports on an investigation into possible future uses of cameraphones and online/mobile image sharing. We conducted 57 interviews with 51 participants and carried out a 10-month investigation of cameraphone use in a group of 70 strongly-connected participants, all on the west coast of the United States. We found that cameraphones are interpreted as three devices in one: they are memory-capture devices, communicative devices, and expressive devices, with the third being dominant. Traditionally, cameras were primarily memory-capture devices, especially in family photography where the most research has been done. To balance tendencies toward technological or social determinism, we use concepts from Activity Theory and the Social Construction of Technology in our analysis. We compare our results to those of researchers doing similar work in Japan and Finland. 2 Morgan Ames The Social Life of Snapshots Table of Contents Introduction...................................................................................................................5
    [Show full text]
  • Display, Identity and the Everyday: Self-Presentation Through Online Image Sharing Julia Davies* University of Sheffield, UK
    Discourse: studies in the cultural politics of education Vol. 28, No. 4, December 2007, pp. 549Á564 Display, Identity and the Everyday: Self-presentation through online image sharing Julia Davies* University of Sheffield, UK Drawing on a study of a photo-sharing website (Flickr.com), this paper explores ways in which everyday life is reconfigured through an online photo-sharing space, where traditional boundaries between the public and private spheres are being extended, challenged or eroded. The paper reflects on the presentation and subjects of the images; the narratives within and around them, and the affordances and practices which impact on the ways in which many people review and represent their ‘‘everyday selves and lives’’ online. The interactions on Flickr are presented as instantiating both learning and literacy as a social practice (Barton & Hamilton, 1998; Lave & Wenger, 1991) within a context that can be conceptualised as simultaneously global and local. The paper further considers the relationship between digital and traditional domestic photography, drawing on analyses of photographic representation (Hirsh, 2002; Kuhn, 1995) and contrasts how digital practices affect meanings differently. Introduction A 13-year-old boy is in the kitchen while his mother peels potatoes; holding his prized cameraphone in his palm, he photographs her hands skilfully paring vegetables, capturing the curled trails of muddied skin on the work surface. He is one of millions of new photographers incessantly taking digital shots with cameras they keep with them all the time; he hones in on detail here, but also captured the panoramic moving-images of the waving sea of football fans at last Saturday’s match.
    [Show full text]
  • Digital Visual Cryptographical Image Sharing Using DIM
    ISSN(Online): 2319-8753 ISSN (Print): 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology (An ISO 3297: 2007 Certified Organization) Website: www.ijirset.com Vol. 6, Issue 4, April 2017 Digital Visual Cryptographical Image Sharing Using DIM Bhagyashri Machale1, Prajakta Baravakar1, Padmashri Thorat1, Tejshri Bavale1, Prof.Pankaj Agarkar2 U.G. Student, Department of CSE, Dr.D.Y.Patil School of Engineering, Lohegaon Pune, Maharashtra, India1 Professor, Department of CSE, Dr.D.Y.Patil School of Engineering, Lohegaon Pune, Maharashtra, India2 ABSTRACT: In this paper, we search technique on how to ameliorate the safety for an original data by hiding important data behind cover image (which may be digital or printed image) by using data hiding, cryptography and NVSS algorithm. The proposed system hides the secret data which is first encrypted and then is hidden behind a one of the patch of a cover image. The total effort of the proposed method is the achievement of hiding and extracting secret images and secret data. In proposed method, we have tried to improve the capacity of the original scheme by improving the capacity of hiding data and increasing security to send image through different media. Our method increase security, efficiency and reliability of the any persons, systems,or organisations important data which is autherised by using data hiding, cryptography method and NVSS algorithm. The natural shares which are unchanged are distinct and inofensive, hence it mainly decreases the risk of traject over communication media. The proposed approach is best for solving the problem of transmission risk for the VSS schemes is shown by experimental results.
    [Show full text]