The state-of-the-art of on-demand P2P media streaming over the Internet

Author(s):  
Son T. Vuong
i-com ◽  
2017 ◽  
Vol 16 (2) ◽  
pp. 181-193 ◽  
Author(s):  
Christian Reuter ◽  
Katja Pätsch ◽  
Elena Runft

AbstractThe Internet and especially social media are not only used for supposedly good purposes. For example, the recruitment of new members and the dissemination of ideologies of terrorism also takes place in the media. However, the fight against terrorism also makes use of the same tools. The type of these countermeasures, as well as the methods, are covered in this work. In the first part, the state of the art is summarized. The second part presents an explorative empirical study of the fight against terrorism in social media, especially on Twitter. Different, preferably characteristic forms are structured within the scope with the example of Twitter. The aim of this work is to approach this highly relevant subject with the goal of peace, safety and safety from the perspective of information systems. Moreover, it should serve following researches in this field as basis and starting point.


2018 ◽  
Vol 17 (2) ◽  
pp. 169
Author(s):  
Aceng Ruhendi Saifullah

Dalam dekade terakhir, kajian tentang  relasi bahasa, media, dan teknologi komunikasi telah menjadi kajian lintas disiplin yang menarik  perhatian para ahli dari berbagai disiplin ilmu. Lebih khusus, dalam kaitannya dengan kajian wacana  di Internet, penggunaan bahasa di Internet  dipandang sebagai pertanda lahirnya “new genre” sekaligus sebagai the state of the art dalam kajian wacana, yang dikenal sebagai kajian computer mediated discourse analysis (CMDA).  Dalam konteks perkembangan itu, kajian ini dimaksudkan untuk merumuskan model  analisis relasi bahasa dan Internet berbasis CMDA. Pertanyaannya, “sejauh mana paradigma CMDA  dapat dirumuskan sebagai model pengembangan analisis relasi bahasa dan Internet. Kajian ini menemukan, bahwa ragam bahasa di Internet tidak sepenuhnya menunjukkan ciri-ciri ragam tulis, akan tetapi cenderung menunjukkan ciri-ciri “ragam lisan yang dituliskan”. Di samping itu, ditemukan pula, bahwa konteks media dan konteks situasi komunikasi tampak berpengaruh secara signifikan dalam menentukan makna suatu tuturan di Internet.  Dengan demikian, paradigma CMDA dalam kajian wacana di Internet tampak relevan digunakan, terutama untuk mengindentifikasi ragam bahasa dan makna tuturan di Internet.Kata kunci: konteks media; konteks situasi komunikasi; Internet; computer mediated discourse analysis (CMDA)In the last decade, the study of language relations, media, and communications technology has become an interdisciplinary study that attracts the attention of experts from various disciplines. More specifically, in relation to the study of discourse on the Internet, the use of language on the Internet is seen as a sign of the birth of "new genre" as well as the state of the art in discourse studies, known as computer mediated discourse analysis (CMDA). In the context of this development, this study is intended to formulate models of analysis of language and Internet relationships based on CMDA. The question centers on the extent to which the CMDA paradigm can be formulated as a model for the development of language and Internet relation analysis. This study reveals that the variety of languages on the Internet does not fully show the characteristics of writing, but tends to show the characteristics of "written verbal". In addition, the analysis showed that the context of the media and the context of the communication situation seemed to have a significant effect on determining the meaning of a speech on the Internet. Thus, the CMDA paradigm in the study of discourse on the Internet seems relevant to use, especially to identify the variety of languages and meanings of speech on the Internet.Keywords: media context; context of communication situation; Internet; computer mediated discourse analysis (CMDA)


2015 ◽  
pp. 392-422
Author(s):  
Zhaohao Sun ◽  
John Yearwood

Web services are playing a pivotal role in business, management, governance, and society with the dramatic development of the Internet and the Web. However, many fundamental issues are still ignored to some extent. For example, what is the unified perspective to the state-of-the-art of Web services? What is the foundation of Demand-Driven Web Services (DDWS)? This chapter addresses these fundamental issues by examining the state-of-the-art of Web services and proposing a theoretical and technological foundation for demand-driven Web services with applications. This chapter also presents an extended Service-Oriented Architecture (SOA), eSMACS SOA, and examines main players in this architecture. This chapter then classifies DDWS as government DDWS, organizational DDWS, enterprise DDWS, customer DDWS, and citizen DDWS, and looks at the corresponding Web services. Finally, this chapter examines the theoretical, technical foundations for DDWS with applications. The proposed approaches will facilitate research and development of Web services, mobile services, cloud services, and social services.


2012 ◽  
Vol 4 (1) ◽  
pp. 52-66 ◽  
Author(s):  
Junaid Arshad ◽  
Paul Townend ◽  
Jie Xu ◽  
Wei Jie

The evolution of modern computing systems has lead to the emergence of Cloud computing. Cloud computing facilitates on-demand establishment of dynamic, large scale, flexible, and highly scalable computing infrastructures. However, as with any other emerging technology, security underpins widespread adoption of Cloud computing. This paper presents the state-of-the-art about Cloud computing along with its different deployment models. The authors also describe various security challenges that can affect an organization’s decision to adopt Cloud computing. Finally, the authors list recommendations to mitigate with these challenges. Such review of state-of-the-art about Cloud computing security can serve as a useful barometer for an organization to make an informed decision about Cloud computing adoption.


Author(s):  
Alex Ng ◽  
Paul Watters ◽  
Shiping Chen

The digital profile of a person has become one of the tradable digital commodities over the Internet. Identity management has gained increasing attention from both enterprises and government organisations, in terms of security, privacy, and trust. A considerable number of theories and techniques have been developed to deal with identity management issues using biometric multimodal approaches. In this chapter, the authors review, assess, and consolidate the research and development activities of contemporary biometric and non-biometric identity management in 21 privately and publicly funded organisations. Furthermore, they develop a taxonomy to characterise and classify these identity management frameworks into two categories: processes and technologies. The authors then study these frameworks by systematically reviewing the whole lifecycle of an identity management framework, including actors, roles, security, privacy, trust, interoperability, and federation. The goal is to provide readers with a comprehensive picture of the state of the art of the existing identity management frameworks that utilise biometric and non-biometric technologies with the aim to highlight the contemporary issues and progress in this area of identity management.


Author(s):  
Alex Ng ◽  
Paul Watters ◽  
Shiping Chen

The digital profile of a person has become one of the tradable digital commodities over the Internet. Identity management has gained increasing attention from both enterprises and government organisations, in terms of security, privacy, and trust. A considerable number of theories and techniques have been developed to deal with identity management issues using biometric multimodal approaches. In this chapter, the authors review, assess, and consolidate the research and development activities of contemporary biometric and non-biometric identity management in 21 privately and publicly funded organisations. Furthermore, they develop a taxonomy to characterise and classify these identity management frameworks into two categories: processes and technologies. The authors then study these frameworks by systematically reviewing the whole lifecycle of an identity management framework, including actors, roles, security, privacy, trust, interoperability, and federation. The goal is to provide readers with a comprehensive picture of the state of the art of the existing identity management frameworks that utilise biometric and non-biometric technologies with the aim to highlight the contemporary issues and progress in this area of identity management.


Author(s):  
Nurul Husna Mahadzir Et.al

In recent times, sentiment analysis has become one of the most active research and progressively popular areas in information retrieval and text mining. To date, sentiment analysis has been applied in various domains such as product, movie, sport and political reviews. Most of the previous work in this field has focused on analyzing only a single language, especially English. However, with the need of globalization and the increasing number of the Internet used worldwide; it is common to see the post written in multiple languages. Moreover, in an unstructured content like Twitter posts, people tend to mix languages in one sentence, which make sentiment analysis process even harder and more challenging. This paper reviews the state-of-the-art of sentiment analysis for code-mixed, which includes the detail discussions of each focus area, qualitative comparison and limitations of current approaches. This paper also highlights challenges along this line of research and suggests several recommendations for future works that should be explored.


2021 ◽  
Author(s):  
João Paulo K. S. Nunes ◽  
Thiago Bianchi ◽  
Anderson Y. Iwasaki ◽  
Elisa Yumi Nakagawa

The adoption of microservices architecture has taken on great pro-portions due to its benefits and popularization of containers driven tools, such as Kubernetes and Docker. Besides, the development of microservice-based applications is a complex task, specially because they can be composed of multiple heterogeneous parts. In particular, one of the main challenges is how to conduct the microservices autoscaling (i.e., adding or removing resources on demand), while still avoiding resource waste, such as CPU and memory. This paper presents the state of the art of approaches to solve the problem of micro services autoscaling, the main characteristics to be considered as well as the important future directions that need to be still investigated.


Sign in / Sign up

Export Citation Format

Share Document