Journal articles on the topic 'Internet-transmitted content'

To see the other types of publications on this topic, follow the link: Internet-transmitted content.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Internet-transmitted content.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Arya, Meenakshi S., Meenu Rani, and Charndeep Singh Bedi. "Improved Capacity Image Steganography Algorithm using 16-Pixel Differencing with n-bit LSB Substitution for RGB Images." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 6 (December 1, 2016): 2735. http://dx.doi.org/10.11591/ijece.v6i6.10792.

Full text
Abstract:
<p>With the intrusion of internet into the lives of every household and terabytes of data being transmitted over the internet on daily basis, the protection of content being transmitted over the internet has become an extremely serious concern. Various measures and methods are being researched and devised everyday to ensure content protection of digital media. To address this issue of content protection, this paper proposes an RGB image steganography based on sixteen-pixel differencing with n-bit Least Significant Bit (LSB) substitution. The proposed technique provides higher embedding capacity without sacrificing the imperceptibility of the host data. The image is divided into 4×4 non overlapping blocks and in each block the average difference value is calculated. Based on this value the block is classified to fall into one of four levels such as, lower, lower-middle, higher-middle and higher. If block belongs to lower level then 2-bit LSB substitution is used in it. Similarly, for lower-middle, higher-middle and higher level blocks 3, 4, and 5 bit LSB substitution is used. In our proposed method there is no need of pixel value readjustment for minimizing distortion. The experimental results show that stego-images are imperceptible and have huge hiding capacity.</p>
APA, Harvard, Vancouver, ISO, and other styles
2

Arya, Meenakshi S., Meenu Rani, and Charndeep Singh Bedi. "Improved Capacity Image Steganography Algorithm using 16-Pixel Differencing with n-bit LSB Substitution for RGB Images." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 6 (December 1, 2016): 2735. http://dx.doi.org/10.11591/ijece.v6i6.pp2735-2741.

Full text
Abstract:
<p>With the intrusion of internet into the lives of every household and terabytes of data being transmitted over the internet on daily basis, the protection of content being transmitted over the internet has become an extremely serious concern. Various measures and methods are being researched and devised everyday to ensure content protection of digital media. To address this issue of content protection, this paper proposes an RGB image steganography based on sixteen-pixel differencing with n-bit Least Significant Bit (LSB) substitution. The proposed technique provides higher embedding capacity without sacrificing the imperceptibility of the host data. The image is divided into 4×4 non overlapping blocks and in each block the average difference value is calculated. Based on this value the block is classified to fall into one of four levels such as, lower, lower-middle, higher-middle and higher. If block belongs to lower level then 2-bit LSB substitution is used in it. Similarly, for lower-middle, higher-middle and higher level blocks 3, 4, and 5 bit LSB substitution is used. In our proposed method there is no need of pixel value readjustment for minimizing distortion. The experimental results show that stego-images are imperceptible and have huge hiding capacity.</p>
APA, Harvard, Vancouver, ISO, and other styles
3

ПУЧКОВ, Олег Александрович. "THE PHYSICAL NATURE OF THE NETWORK SPACE AND LAW: SOME METHODOLOGICAL PROBLEMS." Rule-of-law state: theory and practice 17, no. 3(65) (October 22, 2021): 146–57. http://dx.doi.org/10.33184/pravgos-2021.3.12.

Full text
Abstract:
In modern legal science, few studies are devoted to the issues of the legal nature of technical and physical phenomena that make up an encoded signal transmitted in the form of a file and containing a certain number of bits of information. At the same time, a set of questions relating to the legal nature of the information flow in its technical and physical sense and the legal nature of the transmitted signal from the emitter to the receiver remains unexplored. A closer look also reveals that the signal transmitted on the Internet by broadcasters is not unambiguous in terms of copyright law and principles. This, in turn, makes the issue of legal protection of the signal broadcast on the Internet topical. The paper suggests that the Web, the World Wide Web, is a continuous interaction of the physical (electrical) and information beginnings. Furthermore, physically the electric signal is transmitted in a coded form and has logically organized information content. This binary nature of the signal transmitted from source to consumer has not been properly described in legal studies. The purpose of the work is to study current trends in understanding the legal nature of the encoded electrical signal, transmitted in the network space by the relevant source and accepted by the consumer. The methods used in the research are of two types: firstly, this is a formal legal method associated with understanding and interpreting legal norms, clarifying the current situation in the legal regulation of the Internet space; secondly, the methods of analysis and synthesis, implying a consistent disclosure of the technical, social and cultural nature of the Internet space. The results of the study reveal the dual nature of the signal, which is a means of transmitting information on the information network. The nature of the signal (energy) has a coded form, which makes it possible to receive the information transmitted by the signal source. The legal regulation of the transmission and reception of such signals requires substantial additions.
APA, Harvard, Vancouver, ISO, and other styles
4

Smith, Meghan, Emily Gertz, Sarah Alvarez, and Peter Lurie. "The Content and Accessibility of Sex Education Information on the Internet." Health Education & Behavior 27, no. 6 (December 2000): 684–94. http://dx.doi.org/10.1177/109019810002700603.

Full text
Abstract:
The objective of this studywas to describe Web sites with sex education material and assess the accessibility of specific information on the Internet. First, the authors conducted a review of Web sites using specific sex education keywords. Second, 27 undergraduate students were asked to locate information on proper condom use and sexually transmitted disease (STD) symptoms. The time, number of search attempts, and number of clicks needed to identify each piece of information were recorded. The authors identified 41 sites with sex education material from almost 6 million pages yielded by the keywords. Sixty-three percent of the 1,556 most compatible pages were categorized as pornography. The students found the information on condom use and STD symptoms in an average of 4 minutes, using fewer then six clicks and two searches. The authors concluded that general information on sex education is difficult to locate on the Internet and often lacks essential elements, but accurate and useful information on specific topics can be more easily obtained.
APA, Harvard, Vancouver, ISO, and other styles
5

N. Al-Wesabi, Fahd. "A Hybrid Intelligent Approach for Content Authentication and Tampering Detection of Arabic Text Transmitted via Internet." Computers, Materials & Continua 66, no. 1 (2020): 195–211. http://dx.doi.org/10.32604/cmc.2020.012088.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

AL-WESABI, Fahd N. "Proposing High-Smart Approach for Content Authentication and Tampering Detection of Arabic Text Transmitted via Internet." IEICE Transactions on Information and Systems E103.D, no. 10 (October 1, 2020): 2104–12. http://dx.doi.org/10.1587/transinf.2020edp7011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Flinn, Clodagh, Christina Koretsidou, and Finiki Nearchou. "Accessing Sexual Health Information Online: Content, Reasons and Practical Barriers in Emerging Adults." Youth 3, no. 1 (January 13, 2023): 107–24. http://dx.doi.org/10.3390/youth3010007.

Full text
Abstract:
The Internet is an important platform for providing sexual health information for emerging adults. However, less is known about what content is accessed, why it is accessed and what practical barriers exist. Emerging adulthood is a developmental period often associated with increased risky sexual behaviour. This study explored practical aspects of accessing online sexual health information including the type of content accessed, reasons for accessing informationand practical barriers to accessing websites. A quantitative, cross-sectional design was applied. Participants were 751 emerging adults aged 18–29 years old (M = 23.3; SD = 3.11), recruited from the Republic of Ireland. Participants completed an online survey including variables about demographics, Internet searches for sex-related information, reasons for conducting searches, important aspects and practical difficulties in accessing sexual health websites. Most participants reported using the Internet for sexual health information. Content accessed related to sexually transmitted infections, contraceptives and relationship advice. Reasons for conducting searches included curiosity, privacy and presence of infection. Important website factors were usefulness, ease of understanding and confidentiality. Practical barriers included difficulty filtering excess information, lack of relevant content and limited awareness of trusted sources. Differences were observed between genders and sexual orientations. The findings have implications for healthcare and/or public health professionals who are responsible for providing online sexual health resources for emerging adults.
APA, Harvard, Vancouver, ISO, and other styles
8

Zeng, Meng, Ying Liu, and Geng Zhou. "Construction and Coping Strategies of Ideological and Political Education Evaluation System under the Background of Intelligent Internet of Things." Mobile Information Systems 2022 (September 26, 2022): 1–11. http://dx.doi.org/10.1155/2022/8937406.

Full text
Abstract:
The intelligent Internet of Things is a kind of communication between various sensing systems through the sensor network and the Internet, so that everything in it can communicate. According to the agreed protocol, information is transmitted and processed and exchanged through the sensor network, and the identification and control between objects are finally realized. In the context of the intelligent Internet of Things, the ideological and political education of students will also be affected to a certain extent, so the construction of the ideological and political education evaluation system and the research on coping strategies are very important. This article is mainly to study the current situation of ideological and political education, and to construct an evaluation system, and then to give countermeasures through analysis. In this paper, the data are obtained by the method of questionnaire. The experimental results show that more than 63% of college students agree with the content of ideological and political education, and 64% believe that the methods of ideological and political education in the questionnaire are very feasible.
APA, Harvard, Vancouver, ISO, and other styles
9

Naeem, Nor, Hassan, and Kim. "Compound Popular Content Caching Strategy in Named Data Networking." Electronics 8, no. 7 (July 10, 2019): 771. http://dx.doi.org/10.3390/electronics8070771.

Full text
Abstract:
The aim of named data networking (NDN) is to develop an efficient data dissemination approach by implementing a cache module within the network. Caching is one of the most prominent modules of NDN that significantly enhances the Internet architecture. NDN-cache can reduce the expected flood of global data traffic by providing cache storage at intermediate nodes for transmitted contents, making data broadcasting in efficient way. It also reduces the content delivery time by caching popular content close to consumers. In this study, a new content caching mechanism named the compound popular content caching strategy (CPCCS) is proposed for efficient content dissemination and its performance is measured in terms of cache hit ratio, content diversity, and stretch. The CPCCS is extensively and comparatively studied with other NDN-based caching strategies, such as max-gain in-network caching (MAGIC), WAVE popularity-based caching strategy, hop-based probabilistic caching (HPC), LeafPopDown, most popular cache (MPC), cache capacity aware caching (CCAC), and ProbCache through simulations. The results shows that the CPCCS performs better in terms of the cache hit ratio, content diversity ratio, and stretch ratio than all other strategies.
APA, Harvard, Vancouver, ISO, and other styles
10

Yokota, Rie, Tsuyoshi Okuhara, Haruka Ueno, Hiroko Okada, Emi Furukawa, and Takahiro Kiuchi. "Online Japanese-Language Information on Lifestyle Factors Associated With Reduced Fertility: Content Analysis." Journal of Medical Internet Research 22, no. 8 (August 25, 2020): e19777. http://dx.doi.org/10.2196/19777.

Full text
Abstract:
Background Approximately one-third of Japanese couples currently worry or previously worried about infertility. To develop strategies for the primary prevention of infertility as a population approach, it is important for the general population to be knowledgeable about fertility and infertility. The internet may contribute to the dissemination of information regarding infertility and fertility. However, few studies have examined online information about fertility. Objective This study aimed to quantitatively examine online Japanese-language information about lifestyle factors associated with reduced fertility. Methods We conducted online searches, using the 10 search terms with the highest numbers of searches that people hoping to conceive are likely to input in two major search engines in Japan (Google Japan and Yahoo! Japan). From the 2200 retrieved websites, 1181 duplicates and 500 websites unrelated to our objective were excluded, resulting in a final dataset of 519 websites. Coding guidelines were developed for the following lifestyle factors associated with reduced fertility: sexually transmitted diseases, psychological stress, cigarette smoking, alcohol use, nutrition and diet, physical activity and exercise, underweight, overweight and obesity, and environmental pollutants. Results In terms of the website author’s professional expertise, 69.6 % of the coding instances for the selected lifestyle factors were mentioned by hospitals, clinics, or the media, whereas only 1.7% were mentioned by laypersons. Psychological stress (20.1%) and sexually transmitted diseases (18.8%) were the most frequently mentioned lifestyle factors associated with reduced fertility. In contrast, cigarette smoking, alcohol use, nutrition and diet, physical activity and exercise, underweight, overweight and obesity, and environmental pollutants were mentioned relatively infrequently. The association between reduced fertility and sexually transmitted diseases was mentioned significantly more frequently by hospitals and clinics than by the media (P<.001). The association between reduced fertility and nutrition and diet was mentioned significantly more frequently by the media than by hospitals and clinics (P=.008). With regard to the sex of the target audience for the information, female-specific references to psychological stress, sexually transmitted diseases, nutrition and diet, underweight, physical activity and exercise, and overweight and obesity were significantly more frequent than were male-specific references to these lifestyle factors (psychological stress: P=.002, sexually transmitted diseases: P<.001, nutrition and diet: P<.001, underweight: P<.001, physical activity and exercise: P<.001, overweight and obesity: P<.001). Conclusions Of the lifestyle factors known to be related to reduced fertility, cigarette smoking, alcohol use, and male-specific lifestyle factors are mentioned relatively infrequently in online information sources in Japan, and these factors should be discussed more in information published on websites.
APA, Harvard, Vancouver, ISO, and other styles
11

ABABNEH, Samer. "THE IMPACT OF ELECTRONICALLY TRANSMITTED WORD OF MOUTHE (E-WOM) ON THE MARKETING OF TOURISM SERVICES IN JORDAN: A CASE STUDY OF JERASH & AJLOUN CITIES." GeoJournal of Tourism and Geosites 43, no. 3 (September 30, 2022): 986–92. http://dx.doi.org/10.30892/gtg.43318-912.

Full text
Abstract:
After the repercussions of the global health crisis (Covid-19 pandemic) on the global economy and its various sectors, the word transmitted electronically has become a reality and affects social, economic, marketing and media life (Giddy et al, 2022). From this point of view, this study aims to: know the impact of the word transmitted over the Internet in the marketing of tourism services and the extent of its impact on the purchase decision of the tourist consumer. The research relies on the descriptive approach "the survey method". The researcher designed the form and distributed it to the study sample, which consisted of (300) tourists. The results of the study showed that the sites most used by tourists to learn about the tourist services provided in the region are: Facebook, Google and YouTube. The study concluded that providing sufficient information about the tourism services provided via the Internet reduces the expected risks, contributes to enhancing their purchasing intentions, and improves the psychological outcomes of the tourist. Tourism establishments should various credible virtual media content (texts, photos, and videos). Also, it should increase the activity of their websites by providing a constantly updated database that allows beneficiaries to easily access it. Moreover, tourist establishments should raise the awareness of their employees regarding the importance of Internet marketing.
APA, Harvard, Vancouver, ISO, and other styles
12

McGlamery, Patrick, and Robert G. Cromley. "The Map Library’s Emerging Role in the Dissemination of Cartographic Information on the Internet." Cartographic Perspectives, no. 39 (June 1, 2001): 4–11. http://dx.doi.org/10.14714/cp39.605.

Full text
Abstract:
The Internet is allowing a range of cartographic products from images of map documents to numerical databases of cartographic content to be transmitted to a global user community. This technological innovation is forcing map libraries to rethink the manner in which to provide their services since libraries have traditionally had the responsibility for the storage of, and access to, information by society. The functions of a map library that allow a patron to search the holdings, go to the storage location, browse the document, and ultimately copy it in-house or check out the document can now be provided online. This paper describes the efforts and problems of collection development, assessment of user community needs and access policies associated with an internet-based map library.
APA, Harvard, Vancouver, ISO, and other styles
13

Meng, Naeem, Ali, Zikria, and Kim. "DCS: Distributed Caching Strategy at the Edge of Vehicular Sensor Networks in Information-Centric Networking." Sensors 19, no. 20 (October 11, 2019): 4407. http://dx.doi.org/10.3390/s19204407.

Full text
Abstract:
Information dissemination in current Vehicular Sensor Networks (VSN) depends on the physical location in which similar data is transmitted multiple times across the network. This data replication has led to several problems, among which resource consumption (memory), stretch, and communication latency due to the lake of data availability are the most crucial. Information-Centric Networking (ICN) provides an enhanced version of the internet that is capable of resolving such issues efficiently. ICN is the new internet paradigm that supports innovative communication systems with location-independent data dissemination. The emergence of ICN with VSNs can handle the massive amount of data generated from heterogeneous mobile sensors in surrounding smart environments. The ICN paradigm offers an in-network cache, which is the most effective means to reduce the number of complications of the receiver-driven content retrieval process. However, due to the non-linearity of the Quality-of-Experience (QoE) in VSN systems, efficient content management within the context of ICN is needed. For this purpose, this paper implements a new distributed caching strategy (DCS) at the edge of the network in VSN environments to reduce the number of overall data dissemination problems. The proposed DCS mechanism is studied comparatively against existing caching strategies to check its performance in terms of memory consumption, path stretch ratio, cache hit ratio, and content eviction ratio. Extensive simulation results have shown that the proposed strategy outperforms these benchmark caching strategies.
APA, Harvard, Vancouver, ISO, and other styles
14

Tanseer, Iffrah, Nadia Kanwal, Mamoona Naveed Asghar, Ayesha Iqbal, Faryal Tanseer, and Martin Fleury. "Real-Time, Content-Based Communication Load Reduction in the Internet of Multimedia Things." Applied Sciences 10, no. 3 (February 8, 2020): 1152. http://dx.doi.org/10.3390/app10031152.

Full text
Abstract:
There is an increasing number of devices available for the Internet of Multimedia Things (IoMT). The demands these ever-more complex devices make are also increasing in terms of energy efficiency, reliability, quality-of-service guarantees, higher data transfer rates, and general security. The IoMT itself faces challenges when processing and storing massive amounts of data, transmitting it over low bandwidths, bringing constrained resources to bear and keeping power consumption under check. This paper’s research focuses on an efficient video compression technique to reduce that communication load, potentially generated by diverse camera sensors, and also improve bit-rates, while ensuring accuracy of representation and completeness of video data. The proposed method applies a video content-based solution, which, depending on the motion present between consecutive frames, decides on whether to send only motion information or no frame information at all. The method is efficient in terms of limiting the data transmitted, potentially conserving device energy, and reducing latencies by means of negotiable processing overheads. Data are also encrypted in the interests of confidentiality. Video quality measurements, along with a good number of Quality-of-Service measurements demonstrated the value of the load reduction, as is also apparent from a comparison with other related methods.
APA, Harvard, Vancouver, ISO, and other styles
15

Vučurović, Milica N. "An ethnotaxonomic classification of cultural thought among internet porn users, interpreted in the context of Japanese animated pornography." Issues in Ethnology and Anthropology 11, no. 1 (April 18, 2016): 193. http://dx.doi.org/10.21301/eap.v11i1.9.

Full text
Abstract:
The simple drawing style of Japanese animated pornography (hentai) and the incomplete messages transmitted through the handling short video clips instead of complete pornographic films or series on the Internet create a space in which users can reinterpret the content themselves and assign it meanings different to those originally intended by anime creators, the subculture or suggested by researchers. Based on the porn categories specific to the hentai genre, and keeping in mind the context and content of complete animated Japanese pornographic films, and the attitudes of their users, I will analyze the perspectives of users of short videos of both animated and feature porn on the internet. Through the use of an ethnotaxonomic approach, cognitive schemes and relations between categories have been uncovered. The self-reliance and distance of “alternative” subcultures represented through masturbation, sexual inferiority due to hypermasculine messages conveyed by big black penises as well as violence which does not allow the victim passive regression represented through the abuse of a teenage girl who is supposedly 18 years old, represent messages which correspond with the yaoi, tentacle rape and lolicon subgenres, as well as a subjective perspective in which any user behavior on the internet is legitimate, because of the users’ view that society doesn’t protect them, but protects those who supposedly do not deserve it. The oppressive force and villain of hentai narratives in pornographic feature films is the hyper-passivity of (not) allowing instant gratification, which aligns with the value assigned to the speed and availability of information in the “virtual” field.
APA, Harvard, Vancouver, ISO, and other styles
16

Miruta, Radu-Dinel, Cosmin Stanuica, and Eugen Borcoci. "New Fields in Classifying Algorithms for Content Awareness." International Journal of Information Technology and Web Engineering 7, no. 2 (April 2012): 1–15. http://dx.doi.org/10.4018/jitwe.2012040101.

Full text
Abstract:
The content aware (CA) packet classification and processing at network level is a new approach leading to significant increase of delivery quality of the multimedia traffic in Internet. This paper presents a solution for a new multi-dimensional packet classifier of an edge router, based on content - related new fields embedded in the data packets. The technique is applicable to content aware networks. The classification algorithm is using three new packet fields named Virtual Content Aware Network (VCAN), Service Type (STYPE), and U (unicast/multicast) which are part of the Content Awareness Transport Information (CATI) header. A CATI header is inserted into the transmitted data packets at the Service/Content Provider server side, in accordance with the media service definition, and enables the content awareness features at a new overlay Content Aware Network layer. The functionality of the CATI header within the classification process is then analyzed. Two possibilities are considered: the adaptation of the Lucent Bit vector algorithm and, respectively, of the tuple space search, in order to respond to the suggested multi-fields classifier. The results are very promising and they prove that theoretical model of inserting new packet fields for content aware classification can be implemented and can work in a real time classifier.
APA, Harvard, Vancouver, ISO, and other styles
17

Yerpude, Samir, and Dr Tarun Kumar Singhal. "Internet of Things based Customer Relationship Management – A Research Perspective." International Journal of Engineering & Technology 7, no. 2.7 (March 18, 2018): 444. http://dx.doi.org/10.14419/ijet.v7i2.7.10860.

Full text
Abstract:
Objectives: To study the impact of Internet of things (IoT) on the Customer Relationship Management process and evaluate the benefits in terms of customer satisfaction and customer retention. Methods: An extensive literature review was conducting wherein the constructs of CRM and IoT are studied. Various preliminary information on IoT and CRM system along with the components of Digital enablers have been evaluated. References from research papers, journals, Internet sites, statistical data sites and books were used to collate the relevant content on the subject. The study of all the relevant scenarios where there is a possible impact of IoT origin real time data on CRM was undertaken. Findings: Customer demands are continuously evolving and it is very relevant for all the organizations to align and keep pace with the change. Organizations need to be customer centric and agile to the changing market scenarios. Evaluation of the trends in mobile internet vs desktop internet was also conducted to validate the findings. Application: The usage of real time data emerging out of the IoT landscape has become a reality with the data transmitted over the Internet and consumed by the CRM system. It improves the control on the customer relationship function helping the organizations to operate within healthy and sustained profit
APA, Harvard, Vancouver, ISO, and other styles
18

Al-Dailami, Abdulrahman, Chang Ruan, Zhihong Bao, and Tao Zhang. "QoS3: Secure Caching in HTTPS Based on Fine-Grained Trust Delegation." Security and Communication Networks 2019 (December 28, 2019): 1–16. http://dx.doi.org/10.1155/2019/3107543.

Full text
Abstract:
With the ever-increasing concern in network security and privacy, a major portion of Internet traffic is encrypted now. Recent research shows that more than 70% of Internet content is transmitted using HyperText Transfer Protocol Secure (HTTPS). However, HTTPS encryption eliminates the advantages of many intermediate services like the caching proxy, which can significantly degrade the performance of web content delivery. We argue that these restrictions lead to the need for other mechanisms to access sites quickly and safely. In this paper, we introduce QoS3, which is a protocol that can overcome such limitations by allowing clients to explicitly and securely re-introduce in-network caching proxies using fine-grained trust delegation without compromising the integrity of the HTTPS content and modifying the format of Transport Layer Security (TLS). In QoS3, we classify web page contents into two types: (1) public contents that are common for all users, which can be stored in the caching proxies, and (2) private contents that are specific for each user. Correspondingly, QoS3 establishes two separate TLS connections between the client and the web server for them. Specifically, for private contents, QoS3 just leverages the original HTTPS protocol to deliver them, without involving any middlebox. For public contents, QoS3 allows clients to delegate trust to specific caching proxy along the path, thereby allowing the clients to use the cached contents in the caching proxy via a delegated HTTPS connection. Meanwhile, to prevent Man-in-the-Middle (MitM) attacks on public contents, QoS3 validates the public contents by employing Document object Model (DoM) object-level checksums, which are delivered through the original HTTPS connection. We implement a prototype of QoS3 and evaluate its performance in our testbed. Experimental results show that QoS3 provides acceleration on page load time ranging between 30% and 64% over traditional HTTPS with negligible overhead. Moreover, QoS3 is deployable since it requires just minor software modifications to the server, client, and the middlebox.
APA, Harvard, Vancouver, ISO, and other styles
19

Cil, Ibrahim, Fahri Arisoy, and Hilal Kilinc. "Visibility of resources and assets in the shipyard through industrial internet of things." Global Journal of Computer Sciences: Theory and Research 11, no. 2 (October 31, 2021): 88–101. http://dx.doi.org/10.18844/gjcs.v11i2.5429.

Full text
Abstract:
Industrial Internet of Things is becoming one of the fundamental technologies with the potential to be widely used in shipyards as in other industries to increase information visibility. This article aims to analyze how to develop an industrial IoT-enabled system that provides visibility and tracking of assets at SEDEF Shipyard, which is in the digital transformation process. The research made use of data from previous studies and by using content analysis, the findings were discussed. Industrial IoT enables the collection and analysis of data for more informed decisions. Based on the findings, sensor data in the shipyard are transmitted to the cloud via connected networks. These data are analysed and combined with other information and presented to the stakeholders. Industrial IoT enables this data flow and monitors processes remotely and gives the ability to quickly change plans as needed. Keywords: Shipyard, Industrial Internet of Things, Cyber-Physical System, Visibility, Assets tracking;
APA, Harvard, Vancouver, ISO, and other styles
20

Shafi, Yusra, and Satish Saini. "A Study of Content-Based Recognition of Speech Utterance." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 480–88. http://dx.doi.org/10.22214/ijraset.2022.41292.

Full text
Abstract:
Abstract: Automated voice recognition is a branch of algorithms and cognitive computing that tries to produce robots which can interact with other folks through speaking. Speaking is a data imply suggesting includes both verbal and psycholinguistic information in addition to paralinguistic data. Emotion is a good example of paralinguistic information transmitted in part through speech. Verbal interaction gets simpler because of the development of technologies that can comprehend paralinguistic information such as mood. In this Cnns circuits' usefulness in language research emotion identification was investigated. Spectrograms with a wide range of frequencies of audio samples remained employed as only a source characteristic for the internet infrastructure The circuits had been educated. to identify speaking patterns provided by performers when expressing a certain mood. We used English-language speech resources to validate and develop our technologies The information used for retraining was expanded by two levels in each database. As a result of this, the dropout strategy was employed to. The genderagnostic, language-agnostic CNN models, as per our findings, achieved the highest degree of accuracy, beat Consequences of elections in the literary, and equalled or even surpassed human performance on benchmark databases. Future study should test the capability of deep learning methods in voice emotion identification using real-life speech data. Keywords: Artificial intelligence, Machine Learning, Speech recognition, Convolutional neural network (CNN)
APA, Harvard, Vancouver, ISO, and other styles
21

Guskova, Svetlana V. "Polemical nature of political discourse in the regional Internet space." Neophilology, no. 2 (2022): 358–68. http://dx.doi.org/10.20310/2587-6953-2022-8-2-358-368.

Full text
Abstract:
The mass media system of the 21st century is significantly different from that of the turn of the century. Mass media have undergone significant changes, which is largely due to the increased technical capabilities of both senders of media content and its recipients. Significant volumes of operational information in such conditions are transmitted through Internet media, which, under conditions of convergence, combine the capabilities of print media, TV and radio channels. A significant layer of relevant information on various topics is transmitted through social networks. We consider the relevance of political discourse in the Internet space of the region. The choice of the issues of the materials analyzed in the work is dictated by the invariable relevance of political discourse in modern mass media. The purpose of the study is to comprehensively explore the assumption that political content has significant potential to encourage mass audiences to engage in dialogue; at the same time, polemic is often organized around such materials between various users of social networks. We study the algorithm for conducting controversy in social networks, identify its relevance among the audience of users in the region. The empirical base of the study is made up of publics in social networks that are popular with residents of the Tambov Region. In addition, attention is drawn to the accounts of the heads of other regions of the Central Black Earth region – Belgorod, Voronezh, Kursk regions. When selecting materials for analysis, a continuous sampling method is used, while the popularity of Internet publics and the presence of a significant number of reactions to materials expressed by means available to users (verbal and non-verbal) became the key criterion for selecting texts. As a result of the study, we reveal a high degree of popularity of political discourse in social networks among the regional audience, its ac-tivity in the discussion of media materials. We find that a significant part of such publications is accompanied by controversy in social networks, in the development of which both the authors of the publications and (to a greater extent) the mass audience of readers participate. We conclude that publics in social networks can contribute to the growth of ratings of political leaders, streng-thening their positions and, as a result, increasing the trust of the audience of the electorate.
APA, Harvard, Vancouver, ISO, and other styles
22

Mancheva, Rusanka. "The Cyberbullying Phenomenon – Contemporary Narrative Form of Aggression in the School." Postmodernism Problems 10, no. 1 (April 2, 2020): 41–61. http://dx.doi.org/10.46324/pmp2001041.

Full text
Abstract:
The development of internet networks has undoubtedly increased the awareness of everyone who uses them. How far, however, perceived information delivers only positive experiences depending on its content. Everyone prefers to read for himself or herself or see himself or herself on the internet in priority in a positive light. Internet communication, however, also provides another opportunity - the negative relationships that have arisen from the real communication environment to be transmitted into cyberspace. The phenomenon of causing pain, harm, demonstration of hatred and enmity through the capabilities of social internet networks is referred to as cyberbullying. It is a contemporary form sending and receiving information, which, since its distribution, aims to injure, frighten the recipient or embarrass him in front of more people. The article presents the results of a study conducted with students from different schools in Bulgaria. No matter what age or gender the students are, the strongest effect of change occurs in their behavioral responses. Negative experiences make the victims unsure. Students who are victimized by cyberbullying lose their desire to go to school, they even close for their friends, neglect their academic preparation, more at home, watch more TV, avoid the society of their classmates, reduce their internet activity. This closeness and contact limitation enhances their experiences. Girls’ victims of cyberbullying are more likely to turn to their parents for help than boys.
APA, Harvard, Vancouver, ISO, and other styles
23

Abdulazeez, Hiba K., and Nasser N. Khamiss. "AN EFFICIENT ADAPTATION OF UHD VIDEO STREAMING OVER INTERNET." Iraqi Journal of Information and Communications Technology 1, no. 1 (December 15, 2021): 121–33. http://dx.doi.org/10.31987/ijict.1.1.154.

Full text
Abstract:
The main challenge of multimedia applications is how to transmission the Ultra-High Definition (UHD) video streaming in real time over the internet. The real time video streaming suffer from difficulties to be flexible and efficiency cause the wide variation of the available internet bandwidth. To avoid the problems that introduces with internet, in this work the HEVC with required video network adaptive streaming are proposed and tested using different six levels of three UHD video (4K, FHD, 720p, 4CIF, CIF and QCIF). From different experiments that applied find the optimal configuration of H.265 encoding features for six levels to obtain the required PSNR with range (32-38 dB). The important part in this project is a controller that worked incorporate with the encoder (H.265) to obtain the video streaming adaptation on the available bandwidth of the channel. The controller continuously reads the status of channel buffer, then choosing the proper level of video to be transmitted over the channel. The work architecture is content two parts: First, the H.265 codec that apply on the three raw videos with optimal parameters configuration to compress them and get videos with lower bit rate and acceptable quality. Second, the compressed videos, based to controller.....
APA, Harvard, Vancouver, ISO, and other styles
24

Taha, Miran, Jaime Lloret, Alejandro Canovas, and Laura Garcia. "Survey of Transportation of Adaptive Multimedia Streaming service in Internet." Network Protocols and Algorithms 9, no. 1-2 (June 30, 2017): 85. http://dx.doi.org/10.5296/npa.v9i1-2.12412.

Full text
Abstract:
World Wide Web is the greatest boon towards the technological advancement of modern era. Using the benefits of Internet globally, anywhere and anytime, users can avail the benefits of accessing live and on demand video services. The streaming media systems such as YouTube, Netflix, and Apple Music are reining the multimedia world with frequent popularity among users. A key concern of quality perceived for video streaming applications over Internet is the Quality of Experience (QoE) that users go through. Due to changing network conditions, bit rate and initial delay and the multimedia file freezes or provide poor video quality to the end users, researchers across industry and academia are explored HTTP Adaptive Streaming (HAS), which split the video content into multiple segments and offer the clients at varying qualities. The video player at the client side plays a vital role in buffer management and choosing the appropriate bit rate for each such segment of video to be transmitted. A higher bit rate transmitted video pauses in between whereas, a lower bit rate video lacks in quality, requiring a tradeoff between them. The need of the hour was to adaptively varying the bit rate and video quality to match the transmission media conditions. Further, The main aim of this paper is to give an overview on the state of the art HAS techniques across multimedia and networking domains. A detailed survey was conducted to analyze challenges and solutions in adaptive streaming algorithms, QoE, network protocols, buffering and etc. It also focuses on various challenges on QoE influence factors in a fluctuating network condition, which are often ignored in present HAS methodologies. Furthermore, this survey will enable network and multimedia researchers a fair amount of understanding about the latest happenings of adaptive streaming and the necessary improvements that can be incorporated in future developments.
APA, Harvard, Vancouver, ISO, and other styles
25

Hadi, Ido Prijana. "Pengguna Media Interaktif Sebagai Kenyataan Maya: Studi Resepsi Khalayak Suarasurabaya.net Sebagai Media Interaktif." Jurnal ASPIKOM 1, no. 3 (July 15, 2011): 231. http://dx.doi.org/10.24329/aspikom.v1i3.22.

Full text
Abstract:
My aim in writing this paper is to describe that in this fast-changing world, media in Indonesia has undergone a rapid transformation. Digital technology continues to reshape the mass media landscape using internet technology. Internet brings a technical communication revolution, a fundamental change takes place in the structure of connections, artificial memories and the reproduction of their content. Internet technology has made communication much easier and less expensive. It has attracted many people and has penetrated into people’s daily lives. The mass media also have accepted the internet. Almost all forms of traditional media (old media) in local media, such as radio, television, and newspaper have extended their work into this new field. The internet and the World Wide Web have both significantly influenced modern journalism. In online media allows readers to enjoy browsing their product and service of contents, such as news feed, podcasts, desktop alert, news on mobile phones, PDA and others mobile devices. Online media offer not only text but also digital images , audio file, moving images (video), internet radio and internet t v. The interactive features of the internet seemingly imply that online media have more advantages than traditional media forms (old media). So, the internet have dramatically evolved become new media with characteristic multimedia, hypertext, interactivity, archives , and virtuality. The most important structural new media characteristic is the integration of telecommunications, data communications and mass communication in a single medium – it is the convergence. It should be pointed out that the trend toward digital is affecting the various media and brings the local media in East Java to become a global media, where breaking news from Surabaya or anywhere in East Java is transmitted to around the world in a matter of minutes . The research was carried out to find out how user reception on convergence media, journalism and local media on the site of SuaraSurabaya.net and how to access subjective meanings that they have created based on t heir understanding on online media so far. The research is also interested in looking into user reception on information and communication technology based on its relevance with the selected theme namely discourses on global media in website of Radio Suara Surabaya.
APA, Harvard, Vancouver, ISO, and other styles
26

Petrova, Yulia. "Meme language, its impact on digital culture and collective thinking." E3S Web of Conferences 273 (2021): 11026. http://dx.doi.org/10.1051/e3sconf/202127311026.

Full text
Abstract:
Memes have become an increasingly common form of modern communication, which has recently attracted great research interest. In this article we analyze "language - memes", its influence on digital culture and collective thinking. The Internet, by expanding social content, contributes to the variability of cultural codes and consequently changes an individual’s cultural identity throughout life. The culture composed of cultural groups is defined as a kind of macro-code, consisting of numerous codes that are commonly used to interpret reality among members of the cyber community. Identity is also transmitted through the use of a specific language during interaction, which is a marker of discourse, in which Memes represent a distinctive business card. Linguists, as well as specialists in other disciplines (such as philosophy, anthropology) use each other’s work to study the interrelationships and mutual influences of language and culture. The study proposed a hypothesis about the influence of the Internet on changes in society’s thinking, the formation of the Internet culture and language, using the example of meme language, which is confirmed by the analysis of Internet survey. The interdisciplinary nature of the research is due to the use of mathematical method and the logic of meme language, its impact on digital culture and collective thinking, which is represented in the responses of respondents to the questions in online questionnaires.
APA, Harvard, Vancouver, ISO, and other styles
27

Sarakutsa, Maria O., and Suliko V. Piliuk. "International legal regulation of rights and freedoms on the Internet." Analytical and Comparative Jurisprudence, no. 3 (February 20, 2022): 275–80. http://dx.doi.org/10.24144/2788-6018.2021.03.51.

Full text
Abstract:
The Internet, viewed as a global information and communication network, has several significant characteristics. It facilitates the exchange of information, information is transmitted through communication networks, its number is practically not limited either by volume or by spheres of interest. The Internet, which is not owned by any state or organization, unites various information systems and telecommunication networks without national restrictions. The consumers of the transmitted information can be any subjects-users of the network. Most of the rules on the basis of which the Internet functions are protocols that allow the network to remain operational according to a variety of parameters. Taking into account the named characteristics, the Internet cannot remain outside the legal space. Therefore, the important question is at what level and who should determine the legal parameters for the functioning of the Internet. Is it possible to regulate only by international law due to the global nature of this network. To what extent does the national legislator have the right to regulate Internet governance issues? What should be the correlation between the norms of international and national law in this area? To what extent is its self-regulation permissible. The issue of legal regulation of the Internet is also important because of the need to consider the information and communication network as a means of realizing almost any human rights. Where there are rights, there are obligations and there is always the possibility of their violation. Thus, the possibility of realizing rights and freedoms via the Internet and at the same time the existence of a huge number of violations of these rights and freedoms confirm the need for the adoption of legal acts of different levels in this area. It seems that the on-net regulation (self-regulation) by the Internet community of relations in the network will not ensure freedom of the information space, will not establish clear rules of behavior for network users, in particular, because recommendations, resolutions, and other acts are not universal and obligatory for users, in including states. Therefore, in recent years, one can hear more and more often that in the sphere of regulating Internet governance issues, the adoption of acts containing, in particular, international legal standards that are binding on the national legislator is required. Gradually, international Internet law is being formed, designed to regulate general issues of Internet governance, relations between states in this area, measures of control over the use of the Internet and, most importantly, the observance of citizens' rights in it. Proposals have been made for the adoption of a Universal Declaration of Digital Rights, a Convention on the Safeguards and Protection of Human Rights in the Digital World, or a Digital Constitution. Or, perhaps, we should simply recognize the completed stage of the formation of the fourth generation of rights related to the information and digital revolution, and regulate the content of these rights, guarantees of their implementation by a new international document.
APA, Harvard, Vancouver, ISO, and other styles
28

Zakharchenko, Artem, and Edward Tsymbal. "Transformation of Viral Content in the Communication Process." Current Issues of Mass Communication, no. 17 (2015): 59–71. http://dx.doi.org/10.17721/2312-5160.2015.17.59-71.

Full text
Abstract:
The main objective of the study was to find out the typical scenarios of the viral content transformation in the contemporary communicative practice, as well as to identify the typical directions of changing both form and meaning of the content that had been actively spreading through the web. In this research the authors primarily used the method of descriptive analysis to reveal the features of the media virus’ main components in the Internet. The method of synthesis was used to identify the common patterns of the viral content transformation. Results / findings. The authors identified scenarios of media viruses transformations during their distribution in the various web platforms designed for communication. The directions of meme transition from the offline communication to the online one and vice versa were detected. The reasons for such changes were identified as well as the communication environments, which conduce selecting of certain directions for the viral content transformation. It was found out that the memes as units of actively horizontally disseminated information are extremely labile. They vary both in forms, in which they are transmitted from one man to another, and in their actual meanings. The course of changes of the viral content that contains a certain meme primarily depends on the form of such content. In many cases, the content can remain unchanged, when the form is changing. In some cases the viral content gets an additional meaning. Sometimes a combination of two media viruses occurs, thus actually shaping the third one or at least significantly altering the original meaning. Occasionally there are cases when the meme during its spreading and usage in communications, changes its value into completely opposite.
APA, Harvard, Vancouver, ISO, and other styles
29

Ma, Xue Chao, and Yan Bo Liu. "Research and Application of Information Hiding Algorithm." Applied Mechanics and Materials 672-674 (October 2014): 2009–12. http://dx.doi.org/10.4028/www.scientific.net/amm.672-674.2009.

Full text
Abstract:
Along with the development of the computer technology and the Internet, information hiding is given increasing attention. All kinds of the important information, such as government information, business information, personal privacy etc, should be transmitted safely. In the future, information hiding will play a very important role in the network to protect the information from damage. The content of this thesis is presented as follows: The analysis of the basic theory and concept of information hiding; The analysis and application of the space domain algorithms, transform (frequency) domain algorithm, etc focusing on the technology of digital watermarking, covert channel and anonymous communications. The theory of wavelet analysis and the experimental models are discussed deeply, basing on which the research and application of the wavelet is explored in the field of information hiding.
APA, Harvard, Vancouver, ISO, and other styles
30

FRIEDLAND, GERALD, LARS KNIPPING, and ERNESTO TAPIA. "WEB BASED LECTURES PRODUCED BY AI SUPPORTED CLASSROOM TEACHING." International Journal on Artificial Intelligence Tools 13, no. 02 (June 2004): 367–82. http://dx.doi.org/10.1142/s0218213004001582.

Full text
Abstract:
This article presents a system that maps classroom lectures directly into web based education lessons. In the classroom, the lecturer writes on a wide, pen sensitive display. The system tracks all actions and makes it possible for the lecture to be replayed from the web any time. The remote viewer can follow the progress of the lecture: Audio, the creation of the board content, and an optional video image of the instructor is transmitted. In addition to usual drawing functionality the board can handle a range of multimedia elements from the Internet. The board can integrate different kinds of modules, invoked by board drawings. One of these modules is described here: A computer algebra system that evaluates mathematical expressions or plots functions is placed at the lecturers disposal by a handwriting recognition.
APA, Harvard, Vancouver, ISO, and other styles
31

Thabit, Reema, Nur Izura Udzir, Sharifah Md Yasin, Aziah Asmawi, Nuur Alifah Roslan, and Roshidi Din. "A Comparative Analysis of Arabic Text Steganography." Applied Sciences 11, no. 15 (July 26, 2021): 6851. http://dx.doi.org/10.3390/app11156851.

Full text
Abstract:
Protecting sensitive information transmitted via public channels is a significant issue faced by governments, militaries, organizations, and individuals. Steganography protects the secret information by concealing it in a transferred object such as video, audio, image, text, network, or DNA. As text uses low bandwidth, it is commonly used by Internet users in their daily activities, resulting a vast amount of text messages sent daily as social media posts and documents. Accordingly, text is the ideal object to be used in steganography, since hiding a secret message in a text makes it difficult for the attacker to detect the hidden message among the massive text content on the Internet. Language’s characteristics are utilized in text steganography. Despite the richness of the Arabic language in linguistic characteristics, only a few studies have been conducted in Arabic text steganography. To draw further attention to Arabic text steganography prospects, this paper reviews the classifications of these methods from its inception. For analysis, this paper presents a comprehensive study based on the key evaluation criteria (i.e., capacity, invisibility, robustness, and security). It opens new areas for further research based on the trends in this field.
APA, Harvard, Vancouver, ISO, and other styles
32

Gyimah, Seth Adjei. "Security During Transmission Of Data Using Web Steganography." Advances in Multidisciplinary and scientific Research Journal Publication 34 (December 30, 2022): 37–42. http://dx.doi.org/10.22624/aims/accrabespoke2022/v34p3.

Full text
Abstract:
The enormous improvements in communications and related technologies, such as the Internet of Things (IoT) and its web-based and mobile applications, have changed our way of life. We are also noticing a trend in which internet-connected electronic devices are using technology more frequently and providing customers with services of a higher standard. However, there are several complications and issues that arise when sending and receiving information via the internet. The security, privacy, and preservation of sent information are the most critical of them all. The security of information has grown to be a significant problem with the expansion of data transfer across computer networks. There are numerous ways to safeguard data and prevent unwanted users from accessing it. Steganography and cryptography are two different data hiding and protection techniques. Steganography conceals communications within some other digital media. On the other side, cryptography obscures the message's content and makes it challenging for readers to decipher. To safeguard data, steganography can be combined with cryptographic methods. Combining steganography and cryptography for hidden data transmission is the best suggested method for protecting data transferred over the internet. A data carrier that is an image can be used for the transmission. With regard to capacity, security, and robustness for secure data transmission over an open channel, this combinational methodology will be sufficient. The purpose of this paper is to explain the steganographic security measures used to protect data while it is being transmitted across a network. Key words: Security, Transmission, Data, Web Steganography
APA, Harvard, Vancouver, ISO, and other styles
33

Tian, Jing, Gang Xiong, Zhen Li, and Gaopeng Gou. "A Survey of Key Technologies for Constructing Network Covert Channel." Security and Communication Networks 2020 (August 5, 2020): 1–20. http://dx.doi.org/10.1155/2020/8892896.

Full text
Abstract:
In order to protect user privacy or guarantee free access to the Internet, the network covert channel has become a hot research topic. It refers to an information channel in which the messages are covertly transmitted under the network environment. In recent years, many new construction schemes of network covert channels are proposed. But at the same time, network covert channel has also received the attention of censors, leading to many attacks. The network covert channel refers to an information channel in which the messages are covertly transmitted under the network environment. Many users exploit the network covert channel to protect privacy or guarantee free access to the Internet. Previous construction schemes of the network covert channel are based on information steganography, which can be divided into CTCs and CSCs. In recent years, there are some covert channels constructed by changing the transmission network architecture. On the other side, some research work promises that the characteristics of emerging network may better fit the construction of the network covert channel. In addition, the covert channel can also be constructed by changing the transmission network architecture. The proxy and anonymity communication technology implement this construction scheme. In this paper, we divide the key technologies for constructing network covert channels into two aspects: communication content level (based on information steganography) and transmission network level (based on proxy and anonymity communication technology). We give an comprehensively summary about covert channels at each level. We also introduce work for the three new types of network covert channels (covert channels based on streaming media, covert channels based on blockchain, and covert channels based on IPv6). In addition, we present the attacks against the network covert channel, including elimination, limitation, and detection. Finally, the challenge and future research trend in this field are discussed.
APA, Harvard, Vancouver, ISO, and other styles
34

Chiti, Francesco, Romano Fantacci, and Laura Pierucci. "Energy Efficient Communications for Reliable IoT Multicast 5G/Satellite Services." Future Internet 11, no. 8 (July 25, 2019): 164. http://dx.doi.org/10.3390/fi11080164.

Full text
Abstract:
Satellites can provide strong value-add and complementarity with the new cellular system of the fifth generation (5G) in cost-effective solutions for a massive number of users/devices/things. Due to the inherent broadcast nature of satellite communications, which assures access to remote areas and the support to a very large number of devices, satellite systems will gain a major role in the development of the Internet of Things (IoT) sector. In this vision, reliable multicast services via satellite can be provided to deliver the same content efficiently to multiple devices on the Earth, or for software updating to groups of cars in the Machine-to-Machine (M2M) context or for sending control messages to actuators/IoT embedded devices. The paper focuses on the Network coding (NC) techniques applied to a hybrid satellite/terrestrial network to support reliable multicast services. An energy optimization method is proposed based on joint adaptation of: (i) the repetition factor of data symbols on multiple subcarries of the transmitted orthogonal frequency division multiplexing (OFDM) signal; and (ii) the mean number of needed coded packets according to the requirements of each group and to the physical satellite links conditions.
APA, Harvard, Vancouver, ISO, and other styles
35

Zhang, Yunsheng, and Xiaoping Meng. "Optimization of Self-Media Film and Television Content Production and Dissemination Paths under the Background of Artificial Intelligence." International Journal of Antennas and Propagation 2022 (September 8, 2022): 1–9. http://dx.doi.org/10.1155/2022/7983798.

Full text
Abstract:
The development of Internet technology and cloud computing has promoted the rapid development of self-media technology. The self-media technology has better people-friendliness compared to the traditional media communication mode, so it has gained more popularity compared to the traditional media mode. For professional self-media teams, the popularity and clicks of self-media content are very critical. It needs to make corresponding predictions and judgments according to the content and transmission path of the self-media. However, self-media is transmitted in the form of video, which involves a huge amount of data. This team of self-media staff is a more difficult and tedious task. This study uses the atrous convolution and long short-term memory neural network to predict the video content, sound features, and propagation path of self-media technology. Atrous convolution is more suitable for research objects with more data. The research results show that the atrous convolution and LSTM methods have better feasibility and credibility in predicting three special characteristics of self-media. Compared with a single atrous convolution, the feature prediction errors of the three kinds of self-media are smaller by using the atrous convolution and LSTM hybrid method. The largest prediction error is 2.39%, and this part of the error is mainly due to the sound characteristics of self-media technology.
APA, Harvard, Vancouver, ISO, and other styles
36

Pappalardo, Martina, Antonio Virdis, and Enzo Mingozzi. "Energy-Optimized Content Refreshing of Age-of-Information-Aware Edge Caches in IoT Systems." Future Internet 14, no. 7 (June 28, 2022): 197. http://dx.doi.org/10.3390/fi14070197.

Full text
Abstract:
The Internet of Things (IoT) brings internet connectivity to everyday devices. These devices generate a large volume of information that needs to be transmitted to the nodes running the IoT applications, where they are processed and used to make some output decisions. On the one hand, the quality of these decisions is typically affected by the freshness of the received information, thus requesting frequent updates from the IoT devices. On the other hand, the severe energy, memory, processing, and communication constraints of IoT devices and networks pose limitations in the frequency of sensing and reporting. So, it is crucial to minimize the energy consumed by the device for sensing the environment and for transmitting the update messages, while taking into account the requirements for information freshness. Edge-caching can be effective in reducing the sensing and the transmission frequency; however, it requires a proper refreshing scheme to avoid staleness of information, as IoT applications need timeliness of status updates. Recently, the Age of Information (AoI) metric has been introduced: it is the time elapsed since the generation of the last received update, hence it can describe the timeliness of the IoT application’s knowledge of the process sampled by the IoT device. In this work, we propose a model-driven and AoI-aware optimization scheme for information caching at the network edge. To configure the cache parameters, we formulate an optimization problem that minimizes the energy consumption, considering both the sampling frequency and the average frequency of the requests sent to the device for refreshing the cache, while satisfying an AoI requirement expressed by the IoT application. We apply our caching scheme in an emulated IoT network, and we show that it minimizes the energy cost while satisfying the AoI requirement. We also compare the case in which the proposed caching scheme is implemented at the network edge against the case in which there is not a cache at the network edge. We show that the optimized cache can significantly lower the energy cost of devices that have a high transmission cost because it can reduce the number of transmissions. Moreover, the cache makes the system less sensitive to higher application-request rates, as the number of messages forwarded to the devices depends on the cache parameters.
APA, Harvard, Vancouver, ISO, and other styles
37

Badr, Aymen Mudheher, Mohamed layth Talal, and Ghassan Sabeh. "Image in Image Steganography based on modified Advanced Encryption Standard and Lest Significant Bit Algorithms." JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences 26, no. 8 (October 15, 2018): 112–21. http://dx.doi.org/10.29196/jubpas.v26i8.1676.

Full text
Abstract:
Because the big grown of the digital market and the growing demand for protection to data and information which transmitted through the Internet. Steganography is the art of embedding, hiding information into different digital media, it was the main reason to increase its importance in the exponential development of the secret communication of computer and digital cloud users over the internet. There are a lot of techniques and different ways to achieve hiding data. Usually, the data embedding is obtained in communication such as image, text, voice or any multimedia content for copyright and also in military communication for authentication and many other different purposes. In this paper, we protected the information in two ways: Encryption and Steganography. The basic idea is to present a method that encrypted the message firstly by using The AES (Advanced Encryption Standard) it is a symmetric-key encryption each of these ciphers it has 128-bit the size to block, and size keys of 128, 192 and 256 bits. Secondly, hide that encrypted message in color cover image in the Least Significant Bit (LSB) to image’s frame with (.bmp, .jpg) extensions. Our scheme is to enhance the ability of LSB algorithm to include the storage of information and images encoded and intangible sense of human vision. That two methods to increased together the security attend any attack.
APA, Harvard, Vancouver, ISO, and other styles
38

Debita, Grzegorz, Przemysław Falkowski-Gilski, Monika Zamłyńska, Marcin Habrych, Bogdan Miedziński, Teresa Kupczyk, and Bartosz Polnik. "Analysis of Video Transmission Capabilities in a Simulated OFDM-Based Supplementary BPL-PLC System." Energies 15, no. 10 (May 15, 2022): 3621. http://dx.doi.org/10.3390/en15103621.

Full text
Abstract:
The design and maintenance of a reliable communication system, especially in harsh working conditions for the oil and mining industry, brings many challenges. With the use of a video transmission system, one can monitor the crew and their working environment. Broadband over power line–power line communication (BPL-PLC) seems an ideal medium for such a service, since it enables the use of the existing wired infrastructure for supplementary applications. In this paper, we perform a set of simulations for a dedicated wired medium as well as analyses of a visual data transmission system, designed to deliver video content with quadrature amplitude modulation (QAM) and orthogonal frequency division multiplexing (OFDM). We investigate a set of video sequences at 480 × 270 resolution under varying network conditions, including signal-to-noise ratio (SNR) and bit error rate (BER). We perform a subjective evaluation study of video content transmitted over our simulated communication link. The results of this study may aid parties involved in designing additional services for portable devices and user terminals, including reliable means of contact, surveillance and monitoring. The obtained results may be of particular interest to researchers and professionals related to the Industry 4.0 and Internet of things (IoT) concepts.
APA, Harvard, Vancouver, ISO, and other styles
39

Kaziaba, Viktoria, and Dana Barmina. "Linguistic Characteristics of the Captions to Internet Posts of English-Speaking Influencers." Vestnik Volgogradskogo gosudarstvennogo universiteta. Serija 2. Jazykoznanije, no. 3 (July 2022): 176–91. http://dx.doi.org/10.15688/jvolsu2.2022.3.14.

Full text
Abstract:
The article is devoted to a multidimensional analysis of the linguistic properties of captions, i.e. texts under publications of English-speaking influencers on the Internet. The research is aimed at studying the syntactic, lexical-and-semantic, thematic and graphic features of the verbal component of opinion leaders' posts on the Internet platform. Interest in the verbal output of this category of communicants is due to their authority compared to other users, as well as due to the commercialization of their communication in the absence of special knowledge and qualifications. The factual material includes 2000 captions, which belong to 100 popular opinion leaders in the English-language Internet segment. At the center of the research methodology there are multidirectional critical content analysis, linguo-statistical and corpus methods of data processing, including automated ones, using application programs for SEO-analytics. The results of the captions study reveal their syntactic design mainly in the form of sentences and small narrative texts. A poor, plain and easy-to-follow vocabulary with a lot of inconsequential words makes the influencers' captions understandable and readable for general consumption. The emotional tone of the captions is ambivalent – neutral to a greater degree, or rather positive. The active usage of graphic means (ideograms, iteration, capitalization) is not creative, but only serves as a visual reinforcement and intensification of the transmitted intentions. The disclosure of the topics covered in the captions is superficially conducted. However, the subject matter is wide and focused on representation of impressionistic experiences and routine events in the author's life. This posting strategy is similar to online-diary genre. It allows influencers to make their virtual presence felt on a daily basis, thus, creating minor news hooks, and to engage their readers emotionally, while broadcasting hidden advertising under the guise of personal preferences, tips and recommendations.
APA, Harvard, Vancouver, ISO, and other styles
40

Bedari, Aseel, Song Wang, and Wencheng Yang. "A Secure Online Fingerprint Authentication System for Industrial IoT Devices over 5G Networks." Sensors 22, no. 19 (October 7, 2022): 7609. http://dx.doi.org/10.3390/s22197609.

Full text
Abstract:
The development of 5G networks has rapidly increased the use of Industrial Internet of Things (IIoT) devices for control, monitoring, and processing purposes. Biometric-based user authentication can prevent unauthorized access to IIoT devices, thereby safeguarding data security during production. However, most biometric authentication systems in the IIoT have no template protection, thus risking raw biometric data stored as templates in central databases or IIoT devices. Moreover, traditional biometric authentication faces slow, limited database holding capacity and data transmission problems. To address these issues, in this paper we propose a secure online fingerprint authentication system for IIoT devices over 5G networks. The core of the proposed system is the design of a cancelable fingerprint template, which protects original minutia features and provides privacy and security guarantee for both entity users and the message content transmitted between IIoT devices and the cloud server via 5G networks.Compared with state-of-the-art methods, the proposed authentication system shows competitive performance on six public fingerprint databases, while saving computational costs and achieving fast online matching.
APA, Harvard, Vancouver, ISO, and other styles
41

G, Anil Reddy, Balakathikeyan B, Sri Ram S, Dr R. P. S. Manikandan, Dr S. Prakash, and Mr B. Varun Kumar. "Automatic Water Saving Irrigation System Using IoT." International Journal for Research in Applied Science and Engineering Technology 10, no. 2 (February 28, 2022): 1157–60. http://dx.doi.org/10.22214/ijraset.2022.40469.

Full text
Abstract:
Abstract: Automation of farm activities can transform agricultural domain from being manual and static to intelligent and dynamic leading to higher production with lesser human supervision. This paper proposes an automated irrigation system which monitors and maintains the desired soil moisture content via automatic watering. SoC ESP8266 Wi-Fi module platform is used to implement the control unit. The setup uses soil moisture sensors which measure the exact moisture level in soil. This value enables the system to use appropriate quantity of water which avoids over/under irrigation and the ph sensor measure the ph value of water finally the DHT11 used to analysis the temperature of atmosphere. IOT is used to keep the farmers updated about the status of sprinklers. Information from the sensors is regularly updated on a webpage using internet through which a farmer can check whether the water sprinklers are ON/OFF at any given time. Also, the sensor readings are transmitted to cloud storage to generate graphs for analysis Keywords: Automation, SoC, ESP8266, DHT11, IOT, Cloud storage
APA, Harvard, Vancouver, ISO, and other styles
42

Vladimir I., Karasik, and Slyshkin Gennady G. "Modern discourse developmental trends." Current Issues in Philology and Pedagogical Linguistics, no. 1(2021) (March 25, 2021): 14–31. http://dx.doi.org/10.29025/2079-6021-2021-1-14-31.

Full text
Abstract:
The paper deals with discourse development tendencies determined by social, economic, cultural and historic characteristics of our present existence, on the one hand, and modern technologies of distant communication, on the other hand. The material analyzed comprises texts taken from network and media discourse as presented in the Internet and Russian contemporary oral and written speech card-catalogue compiled by the authors. The model of our study includes four components of a communicative situation: subjects, texts, chronotops and organizational characteristics. We argue that modern discourse is characterized by the following properties of its participants: expansion of self-presentation, juvenile manner of communication, critical attitude to information, communicative over-saturation. Semiotic properties of modern discourse characterize the texts used in various types of communicative interaction, they include significant growth of multimodal content in all the types of written communication (it corresponds to predominant usage of visual information transmitted by electronic media), vulgarization of speech, and oral and written texts diffusion in distant communication. Chronotopic properties of oral discourse consist in the communicative compression of messages we exchange, in acceleration of our life and shrinkage of communicative turns, and in new demands to everyday habitual existence which makes it a vital necessity to have the access to the Internet in every home. Organizational properties of modern communicative practice may be defined as emerging of inter-discursive hybrid types of communication concerning media and network discourse, diffusion and merging of personal and institutional and private and public communication, and formation of new rituals which are mostly realized in gestures or clips.
APA, Harvard, Vancouver, ISO, and other styles
43

Devi, Kilari Jyothsna, Priyanka Singh, Jatindra Kumar Dash, Hiren Kumar Thakkar, José Santamaría, Musalreddy Venkata Jayanth Krishna, and Antonio Romero-Manchado. "A New Robust and Secure 3-Level Digital Image Watermarking Method Based on G-BAT Hybrid Optimization." Mathematics 10, no. 16 (August 21, 2022): 3015. http://dx.doi.org/10.3390/math10163015.

Full text
Abstract:
This contribution applies tools from the information theory and soft computing (SC) paradigms to the embedding and extraction of watermarks in aerial remote sensing (RS) images to protect copyright. By the time 5G came along, Internet usage had already grown exponentially. Regarding copyright protection, the most important responsibility of the digital image watermarking (DIW) approach is to provide authentication and security for digital content. In this paper, our main goal is to provide authentication and security to aerial RS images transmitted over the Internet by the proposal of a hybrid approach using both the redundant discrete wavelet transform (RDWT) and the singular value decomposition (SVD) schemes for DIW. Specifically, SC is adopted in this work for the numerical optimization of critical parameters. Moreover, 1-level RDWT and SVD are applied on digital cover image and singular matrices of LH and HL sub-bands are selected for watermark embedding. Further selected singular matrices SLH and SHL are split into 3×3 non-overlapping blocks, and diagonal positions are used for watermark embedding. Three-level symmetric encryption with low computational cost is used to ensure higher watermark security. A hybrid grasshopper–BAT (G-BAT) SC-based optimization algorithm is also proposed in order to achieve high quality DIW outcomes, and a broad comparison against other methods in the state-of-the-art is provided. The experimental results have demonstrated that our proposal provides high levels of imperceptibility, robustness, embedding capacity and security when dealing with DIW of aerial RS images, even higher than the state-of-the-art methods.
APA, Harvard, Vancouver, ISO, and other styles
44

Yerpude, Samir, Tarun Kumar Singhal, and Hiren Rajeshkumar Rathod. "Achieving Service Process Excellence With Connected Customer." International Journal of Information Systems and Supply Chain Management 12, no. 1 (January 2019): 66–80. http://dx.doi.org/10.4018/ijisscm.2019010104.

Full text
Abstract:
This article studies the service process and evaluates the need of a connected customer for achieving customer satisfaction and customer ecstasy, in-turn improving service process excellence for the organization. The method used was an exploratory analysis of research studying the CRM concept and usage data generated from IoT devices. Through a literature review process, various preliminary information constructs on IoT and CRM system with digital enablers are evaluated. References from research papers, journals, internet sites, statistical data sites and books were used to collate the relevant content on the subject. The study of all the relevant scenarios and impact assessment on all the relevant stakeholders was undertaken. Further primary data was gathered from the customer sample and was evaluated to substantiate the importance of connected customer for an organization and its linkage to customer satisfaction. It was found that customer demands are continuously evolving, and it is very relevant for all the organizations to align and keep pace with the change. Connected customers help organizations maintain a complete customer profile, needs, and ability to customize for the individual customer. With this, customers become active participants in the whole ecosystem. The usage of real time data becomes a reality with IoT data transmitted over the internet and analyzed by the CRM system. It gives a better understanding of the customer relationship aspect, helping organizations to operate within healthy financial margins. It also resolves the softer issues arising out of such strategic alliances such as trust and ensures that the organization remains competitive.
APA, Harvard, Vancouver, ISO, and other styles
45

Civila, Sabina, Luis M. Romero-Rodríguez, and Amparo Civila. "The Demonization of Islam through Social Media: A Case Study of #Stopislam in Instagram." Publications 8, no. 4 (December 1, 2020): 52. http://dx.doi.org/10.3390/publications8040052.

Full text
Abstract:
This article studies the process of demonization, its consequences, and how social media contribute to the formalization of its axiology. The demonization of societies aims to create social subjects that fit into the idea of the “other” by exposing them to compulsory invisibility. This research’s main objective was to examine how demonization is used as a weapon of oppression to devalue specific individuals through the hashtag #StopIslam and Instagram’s role in this process. The methodology used for this purpose has consisted of an empirical and quantitative analysis of the most recent (1 January 2020–31 July 2020) posts on Instagram with #StopIslam, analyzing the images and the content. The study has determined how, through social media manipulation, erroneous ideas are transmitted that prevent the Islamic collective’s integration, especially in European countries. The conclusions will reflect hate speech and how the Islamic world’s demonization results in the Muslim community’s stigmatization, racism, and Islamophobia. Although there are different articles related to demonization and hate speech, there are not many scientific resources that explain these variables on Instagram and how it affects the inclusion of the Muslim community in Europe, significantly when the time spent on the Internet is growing.
APA, Harvard, Vancouver, ISO, and other styles
46

Kanupuru, Priyanka, and Uma Reddy Nadig Vijayendra Reddy. "Multi Node Based Smart Monitoring System with Motor Dry Run Avoidance for Sustainable Agriculture." Instrumentation Mesure Métrologie 20, no. 1 (February 28, 2021): 39–47. http://dx.doi.org/10.18280/i2m.200106.

Full text
Abstract:
Food is the major source for the existence of the mankind. In order to meet the food requirements for the ever increasing population, the quantity of the food production has to be increased maintaining the quality standards. Agriculture is one such major sector which provides the food for mankind. It not only provides food but also supplies raw materials for industries. Implementation of advanced technologies such as Internet of Things in agriculture helps in improving the production with limited resources. The key parameter for the sustainable agriculture is moisture content available for the crop from the soil. This can be supplied efficiently by controlling the irrigation process. In this system an intelligent agriculture monitoring system with multiple wireless monitoring sensor nodes are used at different locations to monitor the parameters such as temperature, moisture content in the soil, humidity and rainfall. The data from the various sensors is aggregated at each node and transmitted to the coordinator station using long range transceiver. The data received at the coordinator station is subjected to a rule based decision making process to efficiently control the irrigation process. Also motor protection against the dry run was implemented, which not only protects the motor from break down but also avoids the unwanted power consumption. All the live data is in turn uploaded to the cloud so that the user can have a track of the current status of his farm at any time.
APA, Harvard, Vancouver, ISO, and other styles
47

Sreenivasulu, Vallamchetty, and Mohammed Abdul Wajeed. "Image Based Classification of Rumor Information from the Social Network Platform." Traitement du Signal 38, no. 5 (October 31, 2021): 1413–21. http://dx.doi.org/10.18280/ts.380516.

Full text
Abstract:
Spam emails based on images readily evade text-based spam email filters. More and more spammers are adopting the technology. The essence of email is necessary in order to recognize image content. Web-based social networking is a method of communication between the information owner and end users for online exchanges that use social network data in the form of images and text. Nowadays, information is passed on to users in shorter time using social networks, and the spread of fraudulent material on social networks has become a major issue. It is critical to assess and decide which features the filters require to combat spammers. Spammers also insert text into photographs, causing text filters to fail. The detection of visual garbage material has become a hotspot study on spam filters on the Internet. The suggested approach includes a supplementary detection engine that uses visuals as well as text input. This paper proposed a system for the assessment of information, the detection of information on fraud-based mails and the avoidance of distribution to end users for the purpose of enhancing data protection and preventing safety problems. The proposed model utilizes Machine Learning and Convolutional Neural Network (CNN) methods to recognize and prevent fraud information being transmitted to end users.
APA, Harvard, Vancouver, ISO, and other styles
48

Duan, Yingjie, Hong Ni, and Xiaoyong Zhu. "Reliable Multicast Based on Congestion-Aware Cache in ICN." Electronics 10, no. 13 (June 30, 2021): 1579. http://dx.doi.org/10.3390/electronics10131579.

Full text
Abstract:
Reliable multicast distribution is essential for some applications such as Internet of Things (IoT) alarm information and important file distribution. Traditional IP reliable multicast usually relies on multicast source retransmission for recovery losses, causing huge recovery delay and redundancy. Moreover, feedback implosion tends to occur towards multicast source as the number of receivers grows. Information-Centric Networking (ICN) is an emerging network architecture that is efficient in content distribution by supporting multicast and in-network caching. Although ubiquitous in-network caching provides nearby retransmission, the design of cache strategy greatly affects the performance of loss recovery. Therefore, how to recover losses efficiently and quickly is an urgent problem to be solved in ICN reliable multicast. In this paper, we first propose an overview architecture of ICN-based reliable multicast and formulate a problem using recovery delay as the optimization target. Based on the architecture, we present a Congestion-Aware Probabilistic Cache (CAPC) strategy to reduce recovery delay by caching recently transmitted chunks during multicast transmission. Then, we propose NACK feedback aggregation and recovery isolation scheme to decrease recovery overhead. Finally, experimental results show that our proposal can achieve fully reliable multicast and outperforms other approaches in recovery delay, cache hit ratio, transmission completion time, and overhead.
APA, Harvard, Vancouver, ISO, and other styles
49

Ayoob, Noor Kadhim, Asraa Abdullah Hussein, and Rusul Mohammed Neamah. "A new method for watermarking color images using virtual hiding and El-Gamal ciphering." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (December 1, 2021): 5251. http://dx.doi.org/10.11591/ijece.v11i6.pp5251-5258.

Full text
Abstract:
One of the important issues in the era of computer networks and multimedia technology development is to find ways to maintain the reliability, credibility, copyright and non-duplication of digital content transmitted over the internet. For the purpose of protecting images from illegal usage, a watermark is used. A hidden digital watermark is the process of concealing information on a host to prove that this image is owned by a specific person or organization. In this paper, a new method has been proposed to use an RGB logo to protect color images from unlicensed trading. The method depends on retrieving logo data from specific locations in the host to form a logo when the owner claims the rights to those images. These positions are chosen because their pixels match the logo data. The locations of matching pixels are stored in a table that goes through two stages of treatment to ensure confidentiality: First, table compression, second, encoding positions in the compressed table through El-Gamal algorithm. Because the method depends on the idea of keeping host pixels without change, PSNR will always be infinity. After subjecting the host to five types of attack, the results demonstrate that the method can effectively protect the image and hidden logo is retrieved clearly even after the attacks.
APA, Harvard, Vancouver, ISO, and other styles
50

DeMers, Gerard, Christopher Kahn, Per Johansson, Colleen Buono, Octav Chipara, William Griswold, and Theodore Chan. "Secure Scalable Disaster Electronic Medical Record and Tracking System." Prehospital and Disaster Medicine 28, no. 5 (June 26, 2013): 498–501. http://dx.doi.org/10.1017/s1049023x13008686.

Full text
Abstract:
AbstractIntroductionElectronic medical records (EMRs) are considered superior in documentation of care for medical practice. Current disaster medical response involves paper tracking systems and radio communication for mass-casualty incidents (MCIs). These systems are prone to errors, may be compromised by local conditions, and are labor intensive. Communication infrastructure may be impacted, overwhelmed by call volume, or destroyed by the disaster, making self-contained and secure EMR response a critical capability.ReportAs the prehospital disaster EMR allows for more robust content including protected health information (PHI), security measures must be instituted to safeguard these data. The Wireless Internet Information System for medicAl Response in Disasters (WIISARD) Research Group developed a handheld, linked, wireless EMR system utilizing current technology platforms. Smart phones connected to radio frequency identification (RFID) readers may be utilized to efficiently track casualties resulting from the incident. Medical information may be transmitted on an encrypted network to fellow prehospital team members, medical dispatch, and receiving medical centers. This system has been field tested in a number of exercises with excellent results, and future iterations will incorporate robust security measures.ConclusionA secure prehospital triage EMR improves documentation quality during disaster drills.DeMersG, KahnC, JohanssonP, BuonoC, ChiparaO, GriswoldW, ChanT. Secure scalable disaster electronic medical record and tracking system. Prehosp Disaster Med. 2013;28(5):1-4.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography