China's Charm Defensive: Image Protection by Acquiring Mass Entertainment

Pacific Focus ◽  
2020 ◽  
Vol 35 (1) ◽  
pp. 141-171 ◽  
Author(s):  
Nilgün Eliküçük Yıldırım ◽  
Mesut Aslan
1967 ◽  
Vol 12 (6) ◽  
pp. 330-330
Author(s):  
EDWARD E. JONES
Keyword(s):  

1991 ◽  
Vol 23 (10-12) ◽  
pp. 1811-1816
Author(s):  
Kenneth D. Kerri

Benefits from operator training programs need to be measured to justify training budgets. Training benefits can be measured by both quantitative and qualitative procedures. Actual benefits from operator training programs are measured in terms of money saved on plant operation and maintenance, improved operator performance on certification examinations, better quality plant effluents, achievement of optimum chemical dose and favorable impressions on regulatory agency personnel. Benefits from training are also described on the basis of public satisfaction, public image, protection of capital investment, compliance with regulations, safety, staff selection and promotion and operator self-esteem.


2021 ◽  
pp. 186-213
Author(s):  
David Lugowski

This chapter explores a queer all-male dance lesson for partnered sailors in the Fred Astaire–Ginger Rogers musical Follow the Fleet (1936), using archival research (scripts, Production Code Administration records) and comparative textual and contextual analysis. It raises the queerness of Rogers and Astaire before exploring two intersecting axes. The association of sailors with queer behavior and effeminate “pansies” occurs in military scandals, paintings, and Depression-era Hollywood films, including Sailor’s Luck and Son of a Sailor (both 1933). The queerness of male same-sex dancing arises in ballet and in film, including Suicide Fleet (1931). Various institutions criticized or attempted to censor such representations, but they also found acceptance. The US Navy, for example, wanted the comical dance lesson removed from Fleet; instead, it was only rewritten, suggesting the inability to remove queerness from culture and its essential role in mass entertainment.


2021 ◽  
Author(s):  
Li Qi ◽  
Wang Xingyuan ◽  
Wang He ◽  
Ye Xiaolin ◽  
Zhou Shuang ◽  
...  
Keyword(s):  

2021 ◽  
Vol 8 (1-2) ◽  
pp. 15-42
Author(s):  
Ge Zhang

Abstract I tracked one Chinese livestreaming platform Douyu from its emergence as experimental subsidiary of a Video on Demand platform in 2013 to its status as an ordinary medium of mass entertainment in 2018. This affect-inflected ethnography is written based on participant observation of three channels on Douyu as I exhibit the microcontexts of each channel in chronicles of affective events, long pauses of silence, repetitive and incoherent dialogues, asymmetrical debates, and sporadic moments of emotional meltdown. This ethnographic writing is a contact zone, a provocation, and, by proxy, a dialogue between academic theories (especially from television studies), user practices, and my informants’ own attempts at theorising how and what livestream feels and means for them.


2021 ◽  
Author(s):  
Praveen Kumar Mannepalli ◽  
Vineet Richhariya ◽  
Susheel Kumar Gupta ◽  
Piyush Kumar Shukla ◽  
Pushan Kumar Dutta

Abstract Image protection is essential part of the scientific community today. The invisible watermark is widely being used in past to secure the medical imaging data from copyright protection. In this paper novel hybrid combination of the invisible image watermarking and the Blockchain based encryption is proposed to design. The watermarking is implemented using edge detection (ED) of discrete wavelet transform (DWT) coefficient. The medical image is decomposed using L level DWT transform to generate multi-resolution coefficients. The edge detection is applied to HH wavelet band to generate the edge coefficients. To improve robustness difference of dilation and edge coefficient are used for watermark embedding. The watermark image is encrypted using Blockchain based hash algorithm for medical images. Then at the decoding end first decryption is achieved and then image is reconstructed. The results are sequentially presented for both stages. The PSNR performance is compared with additional level of security.


Sign in / Sign up

Export Citation Format

Share Document