Academic literature on the topic 'Internet-transmitted content'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Internet-transmitted content.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Internet-transmitted content"

1

Arya, Meenakshi S., Meenu Rani, and Charndeep Singh Bedi. "Improved Capacity Image Steganography Algorithm using 16-Pixel Differencing with n-bit LSB Substitution for RGB Images." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 6 (December 1, 2016): 2735. http://dx.doi.org/10.11591/ijece.v6i6.10792.

Full text
Abstract:
<p>With the intrusion of internet into the lives of every household and terabytes of data being transmitted over the internet on daily basis, the protection of content being transmitted over the internet has become an extremely serious concern. Various measures and methods are being researched and devised everyday to ensure content protection of digital media. To address this issue of content protection, this paper proposes an RGB image steganography based on sixteen-pixel differencing with n-bit Least Significant Bit (LSB) substitution. The proposed technique provides higher embedding capacity without sacrificing the imperceptibility of the host data. The image is divided into 4×4 non overlapping blocks and in each block the average difference value is calculated. Based on this value the block is classified to fall into one of four levels such as, lower, lower-middle, higher-middle and higher. If block belongs to lower level then 2-bit LSB substitution is used in it. Similarly, for lower-middle, higher-middle and higher level blocks 3, 4, and 5 bit LSB substitution is used. In our proposed method there is no need of pixel value readjustment for minimizing distortion. The experimental results show that stego-images are imperceptible and have huge hiding capacity.</p>
APA, Harvard, Vancouver, ISO, and other styles
2

Arya, Meenakshi S., Meenu Rani, and Charndeep Singh Bedi. "Improved Capacity Image Steganography Algorithm using 16-Pixel Differencing with n-bit LSB Substitution for RGB Images." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 6 (December 1, 2016): 2735. http://dx.doi.org/10.11591/ijece.v6i6.pp2735-2741.

Full text
Abstract:
<p>With the intrusion of internet into the lives of every household and terabytes of data being transmitted over the internet on daily basis, the protection of content being transmitted over the internet has become an extremely serious concern. Various measures and methods are being researched and devised everyday to ensure content protection of digital media. To address this issue of content protection, this paper proposes an RGB image steganography based on sixteen-pixel differencing with n-bit Least Significant Bit (LSB) substitution. The proposed technique provides higher embedding capacity without sacrificing the imperceptibility of the host data. The image is divided into 4×4 non overlapping blocks and in each block the average difference value is calculated. Based on this value the block is classified to fall into one of four levels such as, lower, lower-middle, higher-middle and higher. If block belongs to lower level then 2-bit LSB substitution is used in it. Similarly, for lower-middle, higher-middle and higher level blocks 3, 4, and 5 bit LSB substitution is used. In our proposed method there is no need of pixel value readjustment for minimizing distortion. The experimental results show that stego-images are imperceptible and have huge hiding capacity.</p>
APA, Harvard, Vancouver, ISO, and other styles
3

ПУЧКОВ, Олег Александрович. "THE PHYSICAL NATURE OF THE NETWORK SPACE AND LAW: SOME METHODOLOGICAL PROBLEMS." Rule-of-law state: theory and practice 17, no. 3(65) (October 22, 2021): 146–57. http://dx.doi.org/10.33184/pravgos-2021.3.12.

Full text
Abstract:
In modern legal science, few studies are devoted to the issues of the legal nature of technical and physical phenomena that make up an encoded signal transmitted in the form of a file and containing a certain number of bits of information. At the same time, a set of questions relating to the legal nature of the information flow in its technical and physical sense and the legal nature of the transmitted signal from the emitter to the receiver remains unexplored. A closer look also reveals that the signal transmitted on the Internet by broadcasters is not unambiguous in terms of copyright law and principles. This, in turn, makes the issue of legal protection of the signal broadcast on the Internet topical. The paper suggests that the Web, the World Wide Web, is a continuous interaction of the physical (electrical) and information beginnings. Furthermore, physically the electric signal is transmitted in a coded form and has logically organized information content. This binary nature of the signal transmitted from source to consumer has not been properly described in legal studies. The purpose of the work is to study current trends in understanding the legal nature of the encoded electrical signal, transmitted in the network space by the relevant source and accepted by the consumer. The methods used in the research are of two types: firstly, this is a formal legal method associated with understanding and interpreting legal norms, clarifying the current situation in the legal regulation of the Internet space; secondly, the methods of analysis and synthesis, implying a consistent disclosure of the technical, social and cultural nature of the Internet space. The results of the study reveal the dual nature of the signal, which is a means of transmitting information on the information network. The nature of the signal (energy) has a coded form, which makes it possible to receive the information transmitted by the signal source. The legal regulation of the transmission and reception of such signals requires substantial additions.
APA, Harvard, Vancouver, ISO, and other styles
4

Smith, Meghan, Emily Gertz, Sarah Alvarez, and Peter Lurie. "The Content and Accessibility of Sex Education Information on the Internet." Health Education & Behavior 27, no. 6 (December 2000): 684–94. http://dx.doi.org/10.1177/109019810002700603.

Full text
Abstract:
The objective of this studywas to describe Web sites with sex education material and assess the accessibility of specific information on the Internet. First, the authors conducted a review of Web sites using specific sex education keywords. Second, 27 undergraduate students were asked to locate information on proper condom use and sexually transmitted disease (STD) symptoms. The time, number of search attempts, and number of clicks needed to identify each piece of information were recorded. The authors identified 41 sites with sex education material from almost 6 million pages yielded by the keywords. Sixty-three percent of the 1,556 most compatible pages were categorized as pornography. The students found the information on condom use and STD symptoms in an average of 4 minutes, using fewer then six clicks and two searches. The authors concluded that general information on sex education is difficult to locate on the Internet and often lacks essential elements, but accurate and useful information on specific topics can be more easily obtained.
APA, Harvard, Vancouver, ISO, and other styles
5

N. Al-Wesabi, Fahd. "A Hybrid Intelligent Approach for Content Authentication and Tampering Detection of Arabic Text Transmitted via Internet." Computers, Materials & Continua 66, no. 1 (2020): 195–211. http://dx.doi.org/10.32604/cmc.2020.012088.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

AL-WESABI, Fahd N. "Proposing High-Smart Approach for Content Authentication and Tampering Detection of Arabic Text Transmitted via Internet." IEICE Transactions on Information and Systems E103.D, no. 10 (October 1, 2020): 2104–12. http://dx.doi.org/10.1587/transinf.2020edp7011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Flinn, Clodagh, Christina Koretsidou, and Finiki Nearchou. "Accessing Sexual Health Information Online: Content, Reasons and Practical Barriers in Emerging Adults." Youth 3, no. 1 (January 13, 2023): 107–24. http://dx.doi.org/10.3390/youth3010007.

Full text
Abstract:
The Internet is an important platform for providing sexual health information for emerging adults. However, less is known about what content is accessed, why it is accessed and what practical barriers exist. Emerging adulthood is a developmental period often associated with increased risky sexual behaviour. This study explored practical aspects of accessing online sexual health information including the type of content accessed, reasons for accessing informationand practical barriers to accessing websites. A quantitative, cross-sectional design was applied. Participants were 751 emerging adults aged 18–29 years old (M = 23.3; SD = 3.11), recruited from the Republic of Ireland. Participants completed an online survey including variables about demographics, Internet searches for sex-related information, reasons for conducting searches, important aspects and practical difficulties in accessing sexual health websites. Most participants reported using the Internet for sexual health information. Content accessed related to sexually transmitted infections, contraceptives and relationship advice. Reasons for conducting searches included curiosity, privacy and presence of infection. Important website factors were usefulness, ease of understanding and confidentiality. Practical barriers included difficulty filtering excess information, lack of relevant content and limited awareness of trusted sources. Differences were observed between genders and sexual orientations. The findings have implications for healthcare and/or public health professionals who are responsible for providing online sexual health resources for emerging adults.
APA, Harvard, Vancouver, ISO, and other styles
8

Zeng, Meng, Ying Liu, and Geng Zhou. "Construction and Coping Strategies of Ideological and Political Education Evaluation System under the Background of Intelligent Internet of Things." Mobile Information Systems 2022 (September 26, 2022): 1–11. http://dx.doi.org/10.1155/2022/8937406.

Full text
Abstract:
The intelligent Internet of Things is a kind of communication between various sensing systems through the sensor network and the Internet, so that everything in it can communicate. According to the agreed protocol, information is transmitted and processed and exchanged through the sensor network, and the identification and control between objects are finally realized. In the context of the intelligent Internet of Things, the ideological and political education of students will also be affected to a certain extent, so the construction of the ideological and political education evaluation system and the research on coping strategies are very important. This article is mainly to study the current situation of ideological and political education, and to construct an evaluation system, and then to give countermeasures through analysis. In this paper, the data are obtained by the method of questionnaire. The experimental results show that more than 63% of college students agree with the content of ideological and political education, and 64% believe that the methods of ideological and political education in the questionnaire are very feasible.
APA, Harvard, Vancouver, ISO, and other styles
9

Naeem, Nor, Hassan, and Kim. "Compound Popular Content Caching Strategy in Named Data Networking." Electronics 8, no. 7 (July 10, 2019): 771. http://dx.doi.org/10.3390/electronics8070771.

Full text
Abstract:
The aim of named data networking (NDN) is to develop an efficient data dissemination approach by implementing a cache module within the network. Caching is one of the most prominent modules of NDN that significantly enhances the Internet architecture. NDN-cache can reduce the expected flood of global data traffic by providing cache storage at intermediate nodes for transmitted contents, making data broadcasting in efficient way. It also reduces the content delivery time by caching popular content close to consumers. In this study, a new content caching mechanism named the compound popular content caching strategy (CPCCS) is proposed for efficient content dissemination and its performance is measured in terms of cache hit ratio, content diversity, and stretch. The CPCCS is extensively and comparatively studied with other NDN-based caching strategies, such as max-gain in-network caching (MAGIC), WAVE popularity-based caching strategy, hop-based probabilistic caching (HPC), LeafPopDown, most popular cache (MPC), cache capacity aware caching (CCAC), and ProbCache through simulations. The results shows that the CPCCS performs better in terms of the cache hit ratio, content diversity ratio, and stretch ratio than all other strategies.
APA, Harvard, Vancouver, ISO, and other styles
10

Yokota, Rie, Tsuyoshi Okuhara, Haruka Ueno, Hiroko Okada, Emi Furukawa, and Takahiro Kiuchi. "Online Japanese-Language Information on Lifestyle Factors Associated With Reduced Fertility: Content Analysis." Journal of Medical Internet Research 22, no. 8 (August 25, 2020): e19777. http://dx.doi.org/10.2196/19777.

Full text
Abstract:
Background Approximately one-third of Japanese couples currently worry or previously worried about infertility. To develop strategies for the primary prevention of infertility as a population approach, it is important for the general population to be knowledgeable about fertility and infertility. The internet may contribute to the dissemination of information regarding infertility and fertility. However, few studies have examined online information about fertility. Objective This study aimed to quantitatively examine online Japanese-language information about lifestyle factors associated with reduced fertility. Methods We conducted online searches, using the 10 search terms with the highest numbers of searches that people hoping to conceive are likely to input in two major search engines in Japan (Google Japan and Yahoo! Japan). From the 2200 retrieved websites, 1181 duplicates and 500 websites unrelated to our objective were excluded, resulting in a final dataset of 519 websites. Coding guidelines were developed for the following lifestyle factors associated with reduced fertility: sexually transmitted diseases, psychological stress, cigarette smoking, alcohol use, nutrition and diet, physical activity and exercise, underweight, overweight and obesity, and environmental pollutants. Results In terms of the website author’s professional expertise, 69.6 % of the coding instances for the selected lifestyle factors were mentioned by hospitals, clinics, or the media, whereas only 1.7% were mentioned by laypersons. Psychological stress (20.1%) and sexually transmitted diseases (18.8%) were the most frequently mentioned lifestyle factors associated with reduced fertility. In contrast, cigarette smoking, alcohol use, nutrition and diet, physical activity and exercise, underweight, overweight and obesity, and environmental pollutants were mentioned relatively infrequently. The association between reduced fertility and sexually transmitted diseases was mentioned significantly more frequently by hospitals and clinics than by the media (P<.001). The association between reduced fertility and nutrition and diet was mentioned significantly more frequently by the media than by hospitals and clinics (P=.008). With regard to the sex of the target audience for the information, female-specific references to psychological stress, sexually transmitted diseases, nutrition and diet, underweight, physical activity and exercise, and overweight and obesity were significantly more frequent than were male-specific references to these lifestyle factors (psychological stress: P=.002, sexually transmitted diseases: P<.001, nutrition and diet: P<.001, underweight: P<.001, physical activity and exercise: P<.001, overweight and obesity: P<.001). Conclusions Of the lifestyle factors known to be related to reduced fertility, cigarette smoking, alcohol use, and male-specific lifestyle factors are mentioned relatively infrequently in online information sources in Japan, and these factors should be discussed more in information published on websites.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Internet-transmitted content"

1

T. Marsden, Christopher. "Internet Service Providers." In Telecommunications Law and Regulation. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198807414.003.0020.

Full text
Abstract:
This chapter examines the regulation of third party content transmitted by Internet Service Providers (ISPs), though that general term of art needs definition for the purposes of the chapter. The chapter considers in turn three aspects of the transmission of content over ISPs, though not the provision of content owned by or affiliated with those ISPs. The aspects considered are in turn:
APA, Harvard, Vancouver, ISO, and other styles
2

Kovačević, Ivan, Mirjana Pejić Bach, and Božidar Jaković. "Always-On Sport Content Multimedia Delivery Over Internet in Croatia." In Advances in Business Information Systems and Analytics, 88–111. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3704-5.ch005.

Full text
Abstract:
Multimedia allows and encourages different ways and methods of human sense manipulation using the highest achievement of technological development with the aim of communication, education, or entertainment. The most frequent contents that are transmitted in real time are contents based on voice services, the so-called VoIP services. In order to shed some light to the opportunity of the media delivery of sports content in always-on mode in Croatia the following goals are fulfilled. First, the possibilities of transfer services of multimedia content live via Internet are analyzed. Second, the competitive advantages over the same or similar services and check its influence on the development of society and the general economic activity are examined. Third, habits of potential customers using multimedia services as well as their expectations are analyzed based on the survey research results. Finally, based on this information, the canvas model of providing a service of sport content multimedia delivery in always-on mode in Croatia is developed.
APA, Harvard, Vancouver, ISO, and other styles
3

Dasgupta, Kousik. "Particle Swarm Optimization (PSO) for Optimization in Video Steganography." In Handbook of Research on Natural Computing for Optimization Problems, 339–62. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0058-2.ch015.

Full text
Abstract:
This chapter describes use of Natural Computing for optimization in the domain of Steganography. Steganography is an art of concealing information in any media. Internet has made digital content popular and very widely used media. Digital contents shared over Internet are text, audio, images and video streams. Video steganography is hiding secret information in video. It is gaining increasing significance as video streams are transmitted frequently over social media sites like Facebook and YouTube. The first part of the chapter introduces steganography and highlights video steganography as an optimization problem. Further in the chapter natural computing is discussed and Particle Swarm Optimization (PSO) a popular natural computing tool is elaborated in details. Experimental results are presented to check the efficacy of the method.
APA, Harvard, Vancouver, ISO, and other styles
4

Boobalan, P., K. Gunasekar, P. Thirumoorthy, and J. Senthil. "An Introduction to Deepfakes on Cryptographic Image Security." In Advances in Multimedia and Interactive Technologies, 72–81. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-6060-3.ch006.

Full text
Abstract:
The level of protection afforded to the encryption key is directly proportional to the level of security afforded to the data being encrypted. Data transmission via networks is the primary application for encryption use. There have been many different methods developed and put into use, all of which are utilized for safeguarding sensitive image data from any kind of illegal access. Text, audio, video, graphics, and still photos are some of the numerous types of data that can be included within multimedia files. A rise in the use of multimedia content transmitted over the internet has resulted in an increase in the sortage for the content. The vast majority of current encryption algorithms are typically reserved for use with informations since they are mismatched with digitalized data. A block-based transformation technique was utilized for this project.
APA, Harvard, Vancouver, ISO, and other styles
5

Ahamed, B. Bazeer. "Computational Intelligence in the Reversible Data-Hiding Processes Using Radon Transform." In Handbook of Research on Smart Technology Models for Business and Industry, 414–24. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-3645-2.ch018.

Full text
Abstract:
Data hiding has emerged as a major research area due to the phenomenal growth in internet and multimedia technologies. Securing data transmitted over the internet becomes a challenging issue caused in digitization and networking over the past decade. Data hiding schemes have been adopted to protect digital media content which involves confidential data such as text, video, audio, images, and compression coding. A good reversible data hiding scheme is characterized by the possession of attributes like reversible, imperceptible, high payload capacity, and robustness. By reversible, it's meant that the extraction of the payload as well as the restoration of the host image perfectly from the stego image. Secondly, the imperceptible stego image resemblance against the cover/host image. Finally, robustness counts for the ability to sustain the secret payload against both intentional and unintentional attacks; it has been observed that all the proposed algorithms are more robust and reversible against various attacks in lower bit error rate and higher normalization coefficient.
APA, Harvard, Vancouver, ISO, and other styles
6

Link, Lisa, and Daniela Wagner. "Computer-Mediated Communication in Virtual Learning Communities." In Human Computer Interaction, 316–22. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-87828-991-9.ch024.

Full text
Abstract:
Computer-mediated communication (CMC) can be simply defined as “communication that takes place between human beings via the instrumentality of computers” (Herring, 1996, p. 1) and the technology used in CMC as “media that facilitate the exchange of semantic content, transmitted through telecommunication networks, processed through one or more computers, between individuals and among groups” (Rice, 1984, p. 438). As a concomitant result of the widespread use of computers and the Internet in the curriculum of higher education as well as the inclusion of various forms of online learning, CMC has become a common communication modality in teaching and learning contexts. Although all forms of CMC can be meaningfully integrated into learning contexts, the majority of CMC at present is nevertheless text based and hence the focus of this contribution. CMC plays a pivotal role in the context of e-learning models in higher education that offer students new forms of learning that would not be possible in a traditional classroom environment. Cooperative and collaborative learning, problemoriented and project-based learning, as well as authentic learning in which real-world scenarios are simulated, are some examples. In the context of these types of e-learning models, virtual learning communities as well as smaller virtual teams are often an essential component. The learning objectives of these models are manifold, but they generally include offering students the opportunity to acquire, practice and enhance important key competencies required in their future professional work. Hence, communication and media skills as well as the ability to work cooperatively in a virtual team are just as important as the actual subject matter of the course itself.
APA, Harvard, Vancouver, ISO, and other styles
7

Lurudusamy, Saravanan Nathan. "Broadband Solutions for the Last Mile to Malaysian Residential Customers." In Encyclopedia of Multimedia Technology and Networking, Second Edition, 164–70. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch023.

Full text
Abstract:
Broadband is a term that describes the Internet as a function of high-speed data connections and large bandwidth. The Federation Communication Commission (FCC) defines broadband service as data transmission speeds exceeding 200 kilobits per second (Kbps), or 200,000 bits per second, in at least one direction, either downstream or upstream. Its fundamental ability to bring about change in the socioeconomic fabric hinges on it being a medium for greater amount of data transmission. Briefly, high capacity bandwidth allows greater amount of information to be transmitted which is the essence of all applications and communications. It is widely predicted that Internet through broadband will quickly penetrate the residential markets that is in line with the National Broadband Plan (NBP) that focuses on infrastructure readiness and market penetration, expediting the rollout of broadband using both fixed and wireless access. The first in the list of 10 National Policy Objectives as stated in the Communications & Multimedia Act (CMA) 1998 reports the aspiration of turning Malaysia into a communications and multimedia global hub. Hashim (2006) states that a secretariat has been formed to roll out the NBP to ensure its success and to achieve the 10% of the population by 2008. Indeed, one of the fundamental strategies to accomplish such a vision is to put in place an efficient broadband network and ensure sufficient subscription to the services. Broadband is different from conventional dial-up services due to its many enhanced capabilities. It provides access to a wide range of Internet services and applications like streaming media, Internet phone, online gaming, and other interactive services. Many of these current and newly developed services are “bandwidth hungry,” thus requiring large amounts of data transfer at excessively fast speed, which may not be technically feasible with dial-up service. Therefore, broadband service may be increasingly necessary to access a full range of services and opportunities beyond what a dial-up service could potentially offer. Many residential customers who have been using traditional dial-up have been migrating to broadband. The constantly connected Internet accessibility remains another lucrative benefit for broadband converts as compared to the dial-up technology. Broadband technology does not block phone lines nor requires one to reconnect to the network after logging off. The dedicated connection for the user translates into less delay in transmission of content. A faster connection speed could allow users to access a wide range of resources, services, and products.
APA, Harvard, Vancouver, ISO, and other styles
8

Skardowska, Ewa. "Nowe ujęcie procesu twórczego w muzyce. Wewnętrzna polemika między założeniami estetycznymi a teraźniejszą rzeczywistością kryzysu." In Filozofia muzyki. Doświadczenie, poznanie, znaczenie, 155–77. Wydawnictwo UNUM, 2022. http://dx.doi.org/10.21906/9788376432250.70.

Full text
Abstract:
The creative artistic process linked to composing in modernity may now be viewed from different perspectives. Even though composing remains the central part of the creative process, there are other parts like artistic performance, improvisation, and sound engineering. The composer creating the composition will not be able to bring the composition to life without the help of the performer. The artistic process represents the idealistic triad of concepts: the beautiful, the true, and the good – the qualities that lead the artist’s inter-ego into the outer world. When the work is prompted by basic and felt emotions containing the creative spark, one sees the “content” of the “beautiful form” at the deepest level of the artistic soul. In the creative act, the formal element is the artist’s idea being passed on to the recipients. The creativity of artists-musicians in the times of the Covid pandemic 2019–2021 constantly develops into new forms and designs. In the reality of the art “Internet avant-garde,” the expansion of the virtual transmission becomes common. Today, the creative process, based on an attempt to recreate the ephemeral state of continuity and perfect union with music, seems to be dependent on new means of expression and streaming. Even though the category of artistic work has been modified in correlation with the world of transmitted data, the artistic works, by definition incongruent with the virtual reality, in times of crisis, must remain in dialog with it.
APA, Harvard, Vancouver, ISO, and other styles
9

Cremonini, Marco, Ernesto Damiani, Sabrina Capitani di Vimercati, and Pierangela Samarati. "Security, Privacy, and Trust in Mobile Systems." In Information Security and Ethics, 2095–102. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch140.

Full text
Abstract:
Access to general purpose information and communication technology (ICT) is not equally distributed on our planet: developed countries represent about 70% of all Internet users, while its percentage of Internet hosts has raised from 90% in 2000 to about 99% in 2002. Things change dramatically if we look at mobile and wireless technology: developing countries already represent about 40% of mobile connections in 2000, with a foreseen growth rate that is faster in developing countries than in developed ones in the period 2000-2005 (mainly due to India and the People’s Republic of China). This trend is driven by the new perspectives offered by mobile electronic technology applications that provide an alternative to poor telecommunication infrastructures still common in many developing countries. The technological evolution in wireless data communications is introducing a rich landscape of new services relying on three main technologies: • proximity (or personal) area networks (PANs), composed of personal and wearable devices capable of automatically setting up transient communication environments (also known as ad hoc networks); • wireless local area network technologies (WLANs); and • a third generation of mobile telecommunications (3G), gradually replacing General Packet Radio Service (GPRS) and the related set of technologies collectively called “2.5 Generation” (2.5G). PAN is a new technology bringing the “always connected” principle to the personal space. On the other hand, 3G systems and WLANs have coexisted for a while; what is new is their interconnection, aimed at decoupling terminals and applications from the access method. 3G mobile networks already provide video-capable bandwidth, global roaming for voice and data, and access to Internet-rich online content. Thanks to their increasing integration, PANs, WLANs, and 3G networks will extend the user’s connectivity in a complementary and hierarchical manner; in the fullness of time, they will provide all the functionalities of an Integrated Services Multimedia Network (ISMN), enabling a whole set of new business models and applications. The fusion of these technologies will eventually result in an ultimate ubiquitous wireless system that will be operated from anywhere, including homes, business locations, vehicles, and even commercial aircrafts. However, although wireless communications provide great flexibility and mobility, they often come at the expense of security. Indeed, wireless communications rely on open and public transmission media that expose new vulnerabilities in addition to the security threats found in wired networks. A number of specific open issues and even inherent dangers, some of which had been already identified and described in the early stages of wireless technology adoption, are yet to be solved (Howard, 2000). For instance, with wireless communications, important and vital information is often placed on a mobile device that is vulnerable to theft and loss. In addition, information is transmitted over the unprotected airwaves, and finally, 3G networks are getting smaller and more numerous, causing opportunities for hackers and other abusers to increase.
APA, Harvard, Vancouver, ISO, and other styles
10

Chiang, Tosti H. C., Tom T. C. Tsai, Irene Y. S. Li, Indy Y. T. Hsiao, and Stephen J. H. Yang. "Technology Enhanced Language Learning in Virtual Worlds." In Intelligent and Adaptive Learning Systems, 293–309. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-60960-842-2.ch019.

Full text
Abstract:
The application of Information Technology makes distance learning possible. Teachers can teach students who live in another side of the globe via Internet. They can see each others’ images and hear each others’ voices, which could not be done twenty years ago, through Internet. With the development of Internet, students can learn without the limitations of time and space. American Society for Training and Development proposed that digital learning includes learning through Internet, learning by computers, learning in virtual classrooms, and digital cooperation. The digitalized course contents can be transmitted via Internet, local or global networks, audio books, videotapes, satellite, interactive televisions, and compact disks.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Internet-transmitted content"

1

Krisilov, Victor A., Katherine Gorodnichaya, and Ngoc Huy Vu. "Method of Adapting Content by the Volume of Transmitted Information on the Internet." In 2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT). IEEE, 2018. http://dx.doi.org/10.1109/stc-csit.2018.8526647.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Turlapati, Lavanya, Nigel Hinds, Dhruv Nair, and Levente J. Klein. "Edge Computing and Contextual Information for the Internet of Things Sensors." In ASME 2017 International Technical Conference and Exhibition on Packaging and Integration of Electronic and Photonic Microsystems collocated with the ASME 2017 Conference on Information Storage and Processing Systems. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/ipack2017-74304.

Full text
Abstract:
Interpreting sensor data requires knowledge of sensor placement and the contextual environment surrounding the sensor. For a single sensor measurement, it is easy to document the context usually by visual observation. However, for millions of sensors reporting data back to a server, the contextual information needs to be automatically extracted from either data analysis or leveraging complimentary data sources. Data layers that overlap spatially or temporally with sensor locations, can be used to extract the context and validate the measurement. The second challenge is to minimize the amount of sensor data transmitted through the internet while preserving signal information content. Here we demonstrate two methods for communication bandwidth reduction: computation at the edge and compressed sensing. We validate the above methods on wind and chemical sensor data to: (1) eliminate redundant measurement from wind sensors and (2) extract peak value of a chemical sensor measuring a methane plume. We present a general cloud based framework to validate sensor data based on statistical and physical modeling and contextual data extracted from geospatial data.
APA, Harvard, Vancouver, ISO, and other styles
3

Skender, Lana. "Visual culture as new educational socio-technological paradigm." In 8th International e-Conference on Studies in Humanities and Social Sciences. Center for Open Access in Science, Belgrade, 2022. http://dx.doi.org/10.32591/coas.e-conf.08.12149s.

Full text
Abstract:
Digital technology has enabled the predominance of visual communication and rapid and simultaneous image transmission beyond the original context. In the “culture of the image,” communication, identity formation, and social patterns are transmitted by image. Under such conditions, visual literacy is considered as elementary literacy and goes towards the critical reading of visual content messages. This situation has also prompted a reflection on the art education paradigm turn towards the broader concept of visual culture as a new socio-technological paradigm. The Croatian results of the Delphi method survey showed that most experts see the paradigm turn, from fine art to visual culture, because of technological changes in society. Technological developments manifested through the Internet, mass media, and social networks affect new generations testing and understanding the world in new ways, most often through technology. It is essential to change the content, practices, and teaching methods.
APA, Harvard, Vancouver, ISO, and other styles
4

PRICOPOAIA, Oana, and Irina SUSANU. "THE IMPACT OF USING SOCIAL MEDIA PLATFORMS IN BUSINESS PROMOTION." In International Management Conference. Editura ASE, 2022. http://dx.doi.org/10.24818/imc/2021/05.10.

Full text
Abstract:
Social media is not just about socializing or interpersonal communication, it is about the transmission of information in order to influence public opinion and to shape a particular consumption behavior. Social media can be considered media of the future because companies promote Internet activity to attract the attention of the target audience. Social media platforms are an effective, interactive, and fast means of communication for both individuals and the legal persons. For companies present in the online environment, the connection with customers is direct, the campaign promotion can be monitored through special digital tools and the results of the campaign are easy to be quantified. In online promotion it is necessary to know the target audience because the message must be customized according to the requirements, constantly updated because the online customer is always stirred towards novelty and be attractiveness, original and relevant to the promoted object. Content transmitted targets a well-defined audience and influences through objective and valuable information. Social media is a tool for social interaction and a form of two-way communication based on online services. Thus, social media marketing must become a priority for all companies that want a successful business, because they can increase the company's notoriety, customer loyalty, improve relationship with the customers and gaining a favorable image in the market.
APA, Harvard, Vancouver, ISO, and other styles
5

Patel, Ashok, Kinshuk NA, David Russell, and R. Oppermann. "Intelligent Tutoring Systems: Confluence of Information Science and Cognitive Science." In 2001 Informing Science Conference. Informing Science Institute, 2001. http://dx.doi.org/10.28945/2387.

Full text
Abstract:
The advent of Internet as a global communication medium has brought a new focus on an area of research in designing Intelligent Tutoring System (ITS) that has not been adequately considered so far. In the main, this has been due to the localised nature of most academic environments limiting the sources of information and an implicit assumption that information and knowledge are synonymous. These factors have led to overemphasis on learner modelling in the traditional ITS research, which seeks to enhance the interaction between the ITS as the provider and the learner as the consumer of knowledge, ignoring the crucial role played by the teacher in enhancing the learning in a given context. The limitations of the traditional approach become more visible when educational information is sought to be transmitted across long distances and the need for adaptation to local contexts becomes apparent. This paper argues that the human teacher, as the manager of learning, plays a vital role within the joint cognitive system consisting of the teacher, ITS, learner and learning peers. This role needs to be recognised by ITS designers by through a teacher model. It also suggests that ITS may perhaps best embody the emerging framework of Informing Science.
APA, Harvard, Vancouver, ISO, and other styles
6

Malik, Sarah, and Antonios Kontsos. "An Information Theory Approach for Internet of Things Enabled Damage Monitoring." In ASME 2022 Conference on Smart Materials, Adaptive Structures and Intelligent Systems. American Society of Mechanical Engineers, 2022. http://dx.doi.org/10.1115/smasis2022-91119.

Full text
Abstract:
Abstract Nondestructive Evaluation (NDE) techniques such as acoustic emission, digital image correlation, infrared thermography, ultrasonic testing among others, have been used to monitor evolutionary failure processes, related to Structural Health Monitoring (SHM). Although such NDE sensing assists in understanding evolving material and structural states, machine learning methods capable of using real-time NDE data enable additional insights related to diagnostics and prognostics. In this context, this investigation presents a novel approach to enable the real time use of NDE data for damage detection. To achieve this goal, an Internet of Things (IoT) framework developed by the authors is used in conjunction with NDE datasets for near real-time diagnostics of crack initiation at the laboratory scale. Compact-tension specimens of an aerospace-grade aluminum alloy were used in accordance with ASTM standards. Acoustic emission NDE datasets were acquired and were subsequently used in an in-house built, scalable IoT system capable of edge and cloud computing with the purpose to reliably identify crack initiation. Once the signals are transmitted from the edge to the fog node, the trained information-entropy based model determines if the raw data is indicative of crack. The model used during live testing is trained offline on the Cloud. The model characterizes the disorder in signals using Shannon’s Entropy to ultimately determine the amount of information per signal. Then a statistical model is used to characterize such information. During the testing process, the signals are segmented based on file chunks to allow for real-time transmission. The main innovation of this approach is the fact that a combination of hardware, computing and machine learning analysis proves to be advantageous in implementing a data structure that can be used at the edge and which can successfully flag the incubation and subsequent initiation of fracture. The IoT system described can be applied to a variety of test setups and at various length scales. Extensions of this work to include forecasting are also discussed.
APA, Harvard, Vancouver, ISO, and other styles
7

Alkamil, Ethar H. K., Ammar A. Mutlag, Haider W. Alsaffar, and Mustafa H. Sabah. "The Role of Hybrid IoT with Cloud Computing and Fog Computing to Help the Oil and Gas Industry Recover from Covid-19 and Face Future Challenges." In SPE Annual Technical Conference and Exhibition. SPE, 2021. http://dx.doi.org/10.2118/206067-ms.

Full text
Abstract:
Abstract Recently, the oil and gas industry faced several crucial challenges affecting the global energy market, including the Covid-19 outbreak, fluctuations in oil prices with considerable uncertainty, dramatically increased environmental regulations, and digital cybersecurity challenges. Therefore, the industrial internet of things (IIoT) may provide needed hybrid cloud and fog computing to analyze huge amounts of sensitive data from sensors and actuators to monitor oil rigs and wells closely, thereby better controlling global oil production. Improved quality of service (QoS) is possible with the fog computing, since it can alleviate challenges that a standard isolated cloud can't handle, an extended cloud located near underlying nodes is being developed. The paradigm of cloud computing is not sufficient to meet the needs of the already extensively utilized IIoT (i.e., edge) applications (e.g., low latency and jitter, context awareness, and mobility support) for a variety of reasons (e.g., health care and sensor networks). Couple of paradigms just like mobile edge computing, fog computing, and mobile cloud computing, have arisen in recently to meet these criteria. Fog computing helps to optimize services and create better user experiences, such as faster responses for critical, time-sensitive needs. At the same time, it also invites problems, such as overload, underload, and disparity in resource usage, including latency, time responses, throughput, etc. The comprehensive review presented in this work shows that fog devices have highly constrained environments and limited hardware capabilities. The existing cloud computing infrastructure is not capable of processing all data in a centralized manner because of the network bandwidth costs and response latency requirements. Therefore, fog computing demonstrated, instead of edge computing, and referred to as "the enabling technologies allowing computation to be performed at the edge of the network, on downstream data on behalf of cloud services and upstream data on behalf of IIoT services" (Shi et al., 2016) is more effective for data processing when data sources are close together. A review of fog and cloud computing literature suggests that fog is better than cloud computing because fog computing performs time-dependent computations better than cloud computing. The cloud is inefficient for latency-sensitive multimedia services and other time-sensitive applications since it is accessible over the internet, like the real-time monitoring, automation, and optimization of petroleum industry operations. As a result, a growing number of IIoT projects are dispersing fog computing capacity throughout the edge network as well as through data centers and the public cloud. A comprehensive review of fog computing features is presented here, with the potential of using it in the petroleum industry. Fog computing can provide a rapid response for applications through preprocess and filter data. Data that has been trimmed can then be transmitted to the cloud for additional analysis and better service delivery.
APA, Harvard, Vancouver, ISO, and other styles
8

Kisné Bernhardt, Renáta, Laura Furcsa, Annamária Sinka, and Rita Szaszkó. "Digitális pedagógiai tapasztalatok tanítóként: lehetőségek a karanténpedgógiában." In Agria Média 2020 : „Az oktatás digitális átállása korunk pedagógiai forradalma”. Eszterházy Károly Egyetem Líceum Kiadó, 2021. http://dx.doi.org/10.17048/am.2020.93.

Full text
Abstract:
Az elmúlt évtizedben már számos kutatás bizonyította, hogy a pedagógusok megváltozott feladatai és szerepei, a módszertani kultúra és a komplex szemlélet a digitális kompetencia fejlesztésével párhuzamosan megjelenik (Fehér, 1999; Kirschner-Woperies, 2003; Law, Chow és Yuen, 2005). A tanítási-tanulási folyamat résztvevőiként a pedagógusok is részesei a rendkívüli iramban változó lehetőségeknek, melyek az iskola különböző „valós és virtuális” terein egyre inkább biztosítottá válnak (UNESCO, 2011). 2020 márciusában 6 a koronavírus-járvány miatt bevezetett digitális munkarend által – korábban még nem tapasztalt módon – aktuálissá vált mindaz, amit a „távoktatás”, „digitális oktatás”, „otthontanulás” és szinonimáik képviseltek. A pedagógusok, diákok és szülők egyik napról a másikra kerültek át az osztálytermi környezetből a digitális platformok világába, megváltoztatva szerepeiket, feladataikat és kompetenciahatáraikat. Felmérésünk azzal a céllal készült, hogy feltárja a tanítók hogyan igyekeztek megtalálni a tantárgyi specialitásnak, informatikai tudásuknak, rendelkezésre álló eszközeiknek, a diákoknak és a szülőknek leginkább adekvát megoldásokat. Kutatásunkban kvantitatív módszert alkalmazva, online kérdőíves vizsgálattal mértük fel az 1-6. osztályban tanító pedagógusok véleményét és gyakorlatát a digitális munkarendben történő oktatással kapcsolatban (N=71). Előadásunk a tanítók által alkalmazott karanténpedagógiára vonatkozó öszszefüggésekre világít rá a következő aspektusokból: eszközök, internet a távoktatásban, a pedagógusok digitális kompetenciája, a tananyagok küldésének felülete, kapcsolattartás a tanulókkal és szülőkkel. Fókuszba kerültek az alkalmazott digitális platformok és eszközök, azzal a céllal, hogy feltárjuk az elmúlt időszakban aktuális alsó tagozatos oktatás és nevelés főbb aspektusait. A digitális munkarend, valamint az online eszközök kiválasztásának és kipróbálásának tanítói tapasztalatait is vizsgáltuk az önértékelésen alapuló tanítói digitális kompetenciák feltárása mellett. A kapott leíró statisztikai elemzések megerősítik, hogy a digitális munkarenddel kialakuló távolléti oktatási struktúra rendszerezettségében, illetve következetes használatában plasztikus eltérések jelentkeztek. Példaként említhető a kapcsolattartási mintázatok egyenetlensége és a formális (Kréta)/informális kapcsolattartási struktúra (Messenger/Facebook csoport) használatának eltérő megoszlása. Konkrét számadatokkal mérve a szülőkkel való kapcsolattartásban kiemelkedett az egyéb lehetőségek mellett a Facebook csoport (59%), és a Messenger (53%) használata a formális platformként említett Krétával (22%) szemben. Összefoglalva, az eredmények hozzájárulhatnak az általános iskolákban működő online oktatás gyakorlatának megismeréséhez, a pedagógiai praxis lehetőségeinek bővítéséhez, ugyanakkor megerősítjük Lévai (2016) felvetését is, miszerint a pedagógusok felelőssége számottevő és árulkodó abból a szempontból is, hogy mit mutatnak róluk digitális lábnyomaik, illetve az online elérhető felületek. ---- Lower-primary-school teachers’ digital educational experience: possibilities in lockdown induced pedagogy ----- The past couple decades have seen a parallel change in teachers’ tasks and roles, methodologies, educational approaches and the development of their digital competences (Fehér, 2009; KirschnerWoperies, 2003; Law, Chow and Yuen, 2005). Also teachers as participants of the teaching-learning process experience the rapid evolution of the possibilities in the real-life and virtual platforms of school (UNESCO, 2011). In March, 2020 unprecedentedly digital education was launched due to the coronavirus pandemic and “distance education”, “digital education”, “home schooling” (at present regarded as synonyms) had become reality. All at once, teachers, students and parents were transmitted from real-life classrooms into the world of virtual platforms, which modified their roles, tasks and competence boundaries. Our survey was conducted to explore how lower-primary-school teachers experimented to find the most adequate solutions related to the issues of their teaching areas and digital knowledge. Also, we aimed to detect the most characteristic challenges that the respondent teachers had to face during the lockdown period online education processes. Our quantitative research was conducted to collect data via an online questionnaire to elicit beliefs and practices of lower-primary-school teachers of 1-6-forms regarding their work during lockdown digital education (N=71). The main focus of our research was the interrelationships of lockdown induced pedagogy from the following aspects: tools in digital education, teachers’ digital competence (based on self-assessment), the platforms of sharing teaching contents and of contacting students and parents. The focal points of our study were the applied digital platforms and tools and to gain insights into the teachers’ digital competences based on their self-evaluation. We also explored the respondent teachers’ choices and experience regarding the online tools of digital education. The results of descriptive statistics showed that there were differences in the structure and consistent use of digital education during the lockdown. As an example, the distribution of the formal Kréta platform and other informal ones (Messenger/Facebook group) is uneven in terms of contact between teachers and parents. Also, the Facebook group (59%) and Messenger (53%) platforms outnumber the use of Kréta (22%) during teacher-parent communication. In sum, our results can contribute to a better understanding of the practice of online education at primary-schools, and also to the extension of the teaching repertoire in 1-6 forms. These findings are also compatible with Lévai’s (2016) results, that is teachers’ digital footsteps and the online platforms that they use can reveal a lot about them, which is a great professional responsibility.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Internet-transmitted content"

1

Cantor, Amy, Heidi D. Nelson, Miranda Pappas, Chandler Atchison, Brigit Hatch, Nathalie Huguet, Brittny Flynn, and Marian McDonagh. Effectiveness of Telehealth for Women’s Preventive Services. Agency for Healthcare Research and Quality (AHRQ), June 2022. http://dx.doi.org/10.23970/ahrqepccer256.

Full text
Abstract:
Objectives. To evaluate the effectiveness, use, and implementation of telehealth for women’s preventive services for reproductive healthcare and interpersonal violence (IPV), and to evaluate patient preferences and engagement for telehealth, particularly in the context of the coronavirus (COVID-19) pandemic. Data sources. Ovid MEDLINE®, CINAHL®, Embase®, and Cochrane CENTRAL databases (July 1, 2016, to March 4, 2022); manual review of reference lists; suggestions from stakeholders; and responses to a Federal Register Notice. Review methods. Eligible abstracts and full-text articles of telehealth interventions were independently dual reviewed for inclusion using predefined criteria. Dual review was used for data abstraction, study-level risk of bias assessment, and strength of evidence (SOE) rating using established methods. Meta-analysis was not conducted due to heterogeneity of studies and limited available data. Results. Searches identified 5,704 unique records. Eight randomized controlled trials, one nonrandomized trial, and seven observational studies, involving 10,731 participants, met inclusion criteria. Of these, nine evaluated IPV services and seven evaluated contraceptive care, the only reproductive health service studied. Risk of bias was low in one study, moderate in nine trials and five observational studies, and high in one study. Telehealth interventions were intended to replace usual care in 14 studies and supplement care in 2 studies. Delivery modes included telephone (5 studies), online modules (5 studies), and mobile applications (1 study), and was unclear or undefined in five studies. There were no differences between telehealth interventions to supplement contraceptive care and comparators for rates of contraceptive use, sexually transmitted infection, and pregnancy (low SOE); evidence was insufficient for abortion rates. There were no differences between telehealth IPV services versus comparators for outcomes measuring repeat IPV, depression, post-traumatic stress disorder, fear of partner, coercive control, self-efficacy, and safety behaviors (low SOE). The COVID-19 pandemic increased telehealth utilization. Barriers to telehealth interventions included limited internet access and digital literacy among English-speaking IPV survivors, and technical challenges and confidentiality concerns for contraceptive care. Telehealth use was facilitated by strategies to ensure safety of individuals who receive IPV services. Evidence was insufficient to evaluate access, health equity, or harms outcomes. Conclusions. Limited evidence suggests that telehealth interventions for contraceptive care and IPV services result in equivalent clinical and patient-reported outcomes as in-person care. Uncertainty remains regarding the most effective approaches for delivering these services, and how to best mobilize telehealth, particularly for women facing barriers to healthcare.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography