Internet-Based Skill Learning

Author(s):  
Shuichi Fukuda ◽  
Yoshifusa Matsuura ◽  
Martin Dzbor

Abstract Non-verbal motional skill plays a very important role in manufacturing. The transfer of the skill is important in two aspects:One is for passing the skill on to others, either from generation to generation or from one place to another. The other is for integrating this information into design. For both of these purposes, the symbolization of motional skill is necessary in order effectively to represent it and to use it. Therefore, in this work, we digitized motion data and allotted attributes to each data chunk and developed a client/server system on the internet. The teacher and the student can teach and learn on their own client machines. Our system pennits the teacher and the student to share the processes of learning in addition to the results.

2016 ◽  
Vol 4 (2) ◽  
pp. 242
Author(s):  
Fatah Mumtaz Al'Ala ◽  
Rinta Kridalukmana ◽  
Eko Didik Widianto

Numbers of internet users are increasing incredibly fast. Ideally, this increasing numbers of users are also supported by capacity uplift, in this case an increase in bandwidth to maintain the standard services that received by the users. However, increasing the bandwidth not always becomes the first option since it is quite expensive. Implementing proxy server as content/cache engine is the other option available. It will cache the content that user requested and keep it for a while for servicing the other users that will request the same content in the future. WCCP protocol is used to redirect user’s traffic to the proxy server. The standard proxy server configurations are using single router with one or more proxy servers. This thesis is aims to design and implement proxy server system with multi routers configuration. Multi routers configuration is used as a failover mechanism to provide network high availability. It will use HSRP protocol to provide the high availability services. Tests that conducted after implementation shows the increase in transaction and successful transaction by 296% and 284% also a decrease in response time as well as failed transaction by 18% and 99% consecutively. Failover test shows the percentage of packet loss amounted to 31,3% and 26,3% for clients in VLAN 10 and VLAN 20 consecutively. The average time required for clients to reconnect to the internet after router failure is 7 seconds for clients in VLAN 10 and 6 seconds for client in VLAN 20.


Author(s):  
Hind Mohammed Abdul Jabbar Ali

Connecting to the  electronic information network (internet) became the most characteristic that distinguish this era However , the long hours which young men daily spend on the internet On the other hand ,there are many people who are waiting for the chance to talk and convince them with their views This will lead the young people to be part in the project of the “cyber armies “that involved with states and terrorist organizations  This project has been able  to recruitment hundreds of people every day to work in its rank . It is very difficult to control these websites because we can see the terrorist presence in all its forms in the internet   In addition there are many incubation environments that feed in particular the young people minds                                                                                         Because they are suffering from the lack of social justice Also the unemployment, deprivation , social and political repression So , that terrorist organizations can attract young people through the internet by convincing them to their views and ideas . So these organizations will enable to be more  stronger.


Author(s):  
Lemcia Hutajulu ◽  
Hery Sunandar ◽  
Imam Saputra

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD4 and SHA-384 methods to detect the originality of digital images, by using this method an image of doubtful authenticity can be found out that the image is authentic or fake.Keywords: Originality, Image, MD4 and SHA-384


Network ◽  
2021 ◽  
Vol 1 (1) ◽  
pp. 28-49
Author(s):  
Ehsan Ahvar ◽  
Shohreh Ahvar ◽  
Syed Mohsan Raza ◽  
Jose Manuel Sanchez Vilchez ◽  
Gyu Myoung Lee

In recent years, the number of objects connected to the internet have significantly increased. Increasing the number of connected devices to the internet is transforming today’s Internet of Things (IoT) into massive IoT of the future. It is predicted that, in a few years, a high communication and computation capacity will be required to meet the demands of massive IoT devices and applications requiring data sharing and processing. 5G and beyond mobile networks are expected to fulfill a part of these requirements by providing a data rate of up to terabits per second. It will be a key enabler to support massive IoT and emerging mission critical applications with strict delay constraints. On the other hand, the next generation of software-defined networking (SDN) with emerging cloudrelated technologies (e.g., fog and edge computing) can play an important role in supporting and implementing the above-mentioned applications. This paper sets out the potential opportunities and important challenges that must be addressed in considering options for using SDN in hybrid cloud-fog systems to support 5G and beyond-enabled applications.


Daedalus ◽  
2011 ◽  
Vol 140 (4) ◽  
pp. 108-120 ◽  
Author(s):  
R. Kelly Garrett ◽  
Paul Resnick

Must the Internet promote political fragmentation? Although this is a possible outcome of personalized online news, we argue that other futures are possible and that thoughtful design could promote more socially desirable behavior. Research has shown that individuals crave opinion reinforcement more than they avoid exposure to diverse viewpoints and that, in many situations, hearing the other side is desirable. We suggest that, equipped with this knowledge, software designers ought to create tools that encourage and facilitate consumption of diverse news streams, making users, and society, better off. We propose several techniques to help achieve this goal. One approach focuses on making useful or intriguing opinion-challenges more accessible. The other centers on nudging people toward diversity by creating environments that accentuate its benefits. Advancing research in this area is critical in the face of increasingly partisan news media, and we believe these strategies can help.


Target ◽  
2017 ◽  
Vol 29 (2) ◽  
pp. 319-338 ◽  
Author(s):  
Teresa Iribarren

This article explores translational literary Web 2.0 practices and user-generated cultural creations on the Internet, focusing on video poetry that re-creates canonical poets’ bodies of work. It will be argued that the use of for-profit platforms like YouTube and Vimeo by indie creators and translators of video poetry favours the emergence of new translational attitudes, practices and objects that have positive but also contentious effects. One the one hand, these online mediators explore new poetic expressions and tend to make the most of the potential for dissemination of poetic heritage, providing visibility to non-hegemonic literatures. On the other hand, however, these translational digitally-born practices and creations by voluntary and subaltern mediators might reinforce the hegemonic position of large American Internet corporations at the risk of commodifying cultural capital, consolidating English as a lingua franca and perhaps, in the long run, even fostering a potentially monocultural and internationally homogeneous aesthetics.


2016 ◽  
Vol 11 (6) ◽  
pp. 32 ◽  
Author(s):  
Shwu-Ing Wu ◽  
Rou Jyun Chen

<p class="ArticleTitle">In recent years, the increasingly innovative and diverse mobile devices have significantly promoted the mobile device-based shopping. What factors influence this kind of shopping? Will consumers purchase things with mobile devices? These are two topics that need to be explored. Through the literature analysis and the empirical research, this study aims to analyze the quality of information, system, service and mobile devices on the mobile device-based shopping platform. Moreover, it studies the attitude of consumers towards mobile device-based shopping, their willingness to adopt the shopping method and the behavioral relationship model in the actual mobile device-based shopping as well as compares the groups of different frequencies of the Internet use in terms of the relationship model.</p>  With the convenient sampling, this study made an investigation among some of those who had experienced shopping on such mobile devices as tablets or smart phones. The 765 retrieved valid copies of questionnaire were divided into three groups—“often”, “average” and “seldom” according to the frequency consumers undertook mobile device-based shopping and were then compared. The results showed that there were significant differences among the three groups in four relationship paths, including: 1) the information quality of the mobile device-based shopping platform has more significant positive influence on consumers’ attitude path of mobile device-based shopping in the “average” group than in the other two; 2) the service quality of the mobile device-based shopping platform has more significant positive influence on consumers’ attitude path of mobile device-based shopping in the “seldom” group than in the other two; 3) the preference for mobile device-based shopping has much significant positive influence on the behavior path of mobile device-based shopping in the “often” group. According to the research results, different groups have different behavior models. These results can serve as reference information in the decision-making of those who establish mobile device-based shopping platforms and manufacture mobile devices.


Sign in / Sign up

Export Citation Format

Share Document