130 research outputs found

    Multimedia content description framework

    Get PDF
    A framework is provided for describing multimedia content and a system in which a plurality of multimedia storage devices employing the content description methods of the present invention can interoperate. In accordance with one form of the present invention, the content description framework is a description scheme (DS) for describing streams or aggregations of multimedia objects, which may comprise audio, images, video, text, time series, and various other modalities. This description scheme can accommodate an essentially limitless number of descriptors in terms of features, semantics or metadata, and facilitate content-based search, index, and retrieval, among other capabilities, for both streamed or aggregated multimedia objects

    Otter Realm, April 19, 2000, Vol. 5 No. 14

    Get PDF
    Presidential Re-Election or Not? -- Otter Stream -- Dancing on the Rim of the Universe on FT Ord with Phil Esparza -- World of Experience Comes to the World Theater -- First Annual Spring World Arts Festival -- Big Sur 1/2 Marathon Success! -- Otter Hockey -- Science Center Gains Ground! -- Got roomie? -- Twilight on Campus -- Your Money Your Choice -- Burn Baby Burn -- Students Learn Life Skills Rock\u27n at Sea aboard the USS Golden Bear -- Breakwater by Day or Night -- The Greenhouse Effect -- The Word -- Rent Increase -- Fall 2000 Registration -- Earthweek 2000 at CSUMB -- Preparing Leaders for a Collaborative Multicultural Society -- Horoscopeshttps://digitalcommons.csumb.edu/otterrealm/1057/thumbnail.jp

    Protecting the future ‘Us’ : a rhetoric-performative multimodal analysis of the polarising far-right YouTube campaign videos in Finland

    Get PDF
    The far right is active on social media, including YouTube for its outreach, community-building and mainstreaming of radical content. This article compares campaign videos of two distinct Finnish far-right parties. It develops a rhetoric-performative and multimodal analysis of audiovisual material and unveils how the contemporary Finnish far right articulates and performs affectively ‘us’ through counterhegemonic articulation on YouTube with connection to nostalgia, national war myths and misogyny. The analysis widens from the visual to the audio-visual dimension which enables the exploration of the formation of diverse signifiers and affective interpretations. Political actors refer to nationalist ideas in a way that can create and mainstream far-right ideology building on shared myths and even spread violent thoughts. Our analysis highlights the importance of spatial and temporal signifiers in the far-right meaning-making process.© 2023 The Author(s). Published by Informa UK Limited, trading as Taylor & Francis Group. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. The terms on which this article has been published allow the posting of the Accepted Manuscript in a repository by the author(s) or with their consent.fi=vertaisarvioitu|en=peerReviewed

    Inferring Network Usage from Passive Measurements in ISP Networks: Bringing Visibility of the Network to Internet Operators

    Get PDF
    The Internet is evolving with us along the time, nowadays people are more dependent of it, being used for most of the simple activities of their lives. It is not uncommon use the Internet for voice and video communications, social networking, banking and shopping. Current trends in Internet applications such as Web 2.0, cloud computing, and the internet of things are bound to bring higher traffic volume and more heterogeneous traffic. In addition, privacy concerns and network security traits have widely promoted the usage of encryption on the network communications. All these factors make network management an evolving environment that becomes every day more difficult. This thesis focuses on helping to keep track on some of these changes, observing the Internet from an ISP viewpoint and exploring several aspects of the visibility of a network, giving insights on what contents or services are retrieved by customers and how these contents are provided to them. Generally, inferring these information, it is done by means of characterization and analysis of data collected using passive traffic monitoring tools on operative networks. As said, analysis and characterization of traffic collected passively is challenging. Internet end-users are not controlled on the network traffic they generate. Moreover, this traffic in the network might be encrypted or coded in a way that is unfeasible to decode, creating the need for reverse engineering for providing a good picture to the Internet operator. In spite of the challenges, it is presented a characterization of P2P-TV usage of a commercial, proprietary and closed application, that encrypts or encodes its traffic, making quite difficult discerning what is going on by just observing the data carried by the protocol. Then it is presented DN-Hunter, which is an application for rendering visible a great part of the network traffic even when encryption or encoding is available. Finally, it is presented a case study of DNHunter for understanding Amazon Web Services, the most prominent cloud provider that offers computing, storage, and content delivery platforms. In this paper is unveiled the infrastructure, the pervasiveness of content and their traffic allocation policies. Findings reveal that most of the content residing on cloud computing and Internet storage infrastructures is served by one single Amazon datacenter located in Virginia despite it appears to be the worst performing one for Italian users. This causes traffic to take long and expensive paths in the network. Since no automatic migration and load-balancing policies are offered by AWS among different locations, content is exposed to outages, as it is observed in the datasets presented

    Virtual Interviewing for Residency/Fellowship during the COVID-19 Pandemic

    Get PDF
    Virtual interviewing for graduate medical education (GME) had been experimented with on a small scale in the late 2000s and early 2010s, but it became a necessity for the 2020–2021 match season as a result of the COVID-19 pandemic. We will briefly discuss the history of virtual interviewing and the published literature on virtual interviewing in GME. Based on the literature and recommendations from various organizations, we address preparation for virtual interviews including special considerations for programs and fellowships. We discuss the pros and cons of virtual interviewing both in order to better understand the current situation and to make informed choices moving forward regarding continuation of virtual interviewing versus returning to in-person interviewing

    AN OFFER THEY CANNOT REFUSE: A Behavioural Approach to Stimulating Consumer Demand for Innovations in the Telecommunications Sector

    Get PDF
    Mobile advertising (m-advertising) is one of the most exciting new research areas in the marketing field. The personal, always-on and always-at-hand nature of a mobile phone, its interactive features, combined with its near universal ubiquity give the mobile device unrivalled potential as an advertising platform. In addition, mobile phone operators are uniquely positioned to further enhance its potential- their real-time access to customers’ demographic, geographic and historical data enables them not only to help retailers establish a strong electronic presence but also to allow them to customise advertising content to target specific people in specific situations. With the growing awareness of these advantages, retailers are increasingly looking to integrate m-advertising into their marketing communications. However, turning a mobile phone into an effective advertising medium poses a formidable challenge as prior consumer permission is a legal prerequisite for m-advertising practices. It is apparent that to fully embrace the potential of m-advertising, retailers need to identify the precise factors that influence consumer opt-in choice. This thesis is unique in investigating factors influencing consumer opt-in choice with the ultimate purpose of developing an effective solution to reliably stimulate opt-ins. To this end, it adopts a radical behaviourist perspective, applying a Behavioural Perspective Model (BPM) in order to explore the influence of both contextual and consumer-related factors, account for their interactive effects and, most importantly, focus on the actual opt-in choice rather than the pre-behavioural variables of “willingness” and “intention” commonly used in previous m-advertising studies. Additionally, accounting for the fact that m-advertising is a relatively new service, this thesis integrates consumer innovativeness variable into the BPM and explores its respective influence on the opt-in choice. The thesis builds upon three consecutive empirical projects, each having its own objective: Project One conducts a preliminary exploratory investigation of the opt-in phenomenon; Project Two measures the factors identified systematically; and Project Three experimentally tests the instrument developed. Overall, the results of this investigation suggest that consumer opt-in choice is largely contingency-shaped and is affected by numerous contextual variables. In particular, among the BPM components, consumers’ past experience with m-advertising and/or m-advertisers, utilitarian benefits associated with m-advertising and its content characteristics are the three most important opt-in choice determinants. Of particular significance is the consumer situation, which has been proven to greatly affect opt-in likelihood. The importance of the newly incorporated innovativeness factor is two-fold. First, it functions as one of the strongest direct predictors of the opt-in choice. Second, it serves in a moderating capacity, further amplifying the positive effects of other choice antecedents in the BPM. On this basis, it is concluded that the opt-in choice is amenable to the behaviourist explanation and that in new service contexts the innovativeness factor further contributes to the BPM’s predictive capacity

    Study of Peer-to-Peer Network Based Cybercrime Investigation: Application on Botnet Technologies

    Full text link
    The scalable, low overhead attributes of Peer-to-Peer (P2P) Internet protocols and networks lend themselves well to being exploited by criminals to execute a large range of cybercrimes. The types of crimes aided by P2P technology include copyright infringement, sharing of illicit images of children, fraud, hacking/cracking, denial of service attacks and virus/malware propagation through the use of a variety of worms, botnets, malware, viruses and P2P file sharing. This project is focused on study of active P2P nodes along with the analysis of the undocumented communication methods employed in many of these large unstructured networks. This is achieved through the design and implementation of an efficient P2P monitoring and crawling toolset. The requirement for investigating P2P based systems is not limited to the more obvious cybercrimes listed above, as many legitimate P2P based applications may also be pertinent to a digital forensic investigation, e.g, voice over IP, instant messaging, etc. Investigating these networks has become increasingly difficult due to the broad range of network topologies and the ever increasing and evolving range of P2P based applications. In this work we introduce the Universal P2P Network Investigation Framework (UP2PNIF), a framework which enables significantly faster and less labour intensive investigation of newly discovered P2P networks through the exploitation of the commonalities in P2P network functionality. In combination with a reference database of known network characteristics, it is envisioned that any known P2P network can be instantly investigated using the framework, which can intelligently determine the best investigation methodology and greatly expedite the evidence gathering process. A proof of concept tool was developed for conducting investigations on the BitTorrent network.Comment: This is a thesis submitted in fulfilment of a PhD in Digital Forensics and Cybercrime Investigation in the School of Computer Science, University College Dublin in October 201

    Cloud resource provisioning and bandwidth management in media-centric networks

    Get PDF
    corecore