scholarly journals Лексические инновации в мемосфере: названия мемных жанров

2020 ◽  
Vol 45 (2) ◽  
Author(s):  
Olga Makarowska

The development of the Internet gave life to Internet memes. Their diversity and rapid growth contributed to the formation of the memosphere, the development of which is accompanied by the emergence of lexical innovations. These include language memes and the names of meme genres. All of them are the result of linguistic creativity, which in relation to the names of meme genres, covers several stages: English loanwords for the name of the meme genre, their adaptation in Russian, changes in semantics, and preference for specific neologisms. The concept of lexical innovation was apprehended on the foundation of Markovsky’s concept. The study of lexical innovations was carried out within the framework of the structural-semantic direction, as well as on the basis of the theory of Kotelova and the concepts of Rakhmanova and Suzdaltseva. Studies have shown that semantic changes in the names of meme genres are associated with a denotation change. Changes in the semantics of word loaning are very dynamic as English loanwords enable the swift naming of new realities. This tendency towards the internationalization of vocabulary is related to the Internet and the memosphere. The obtained results fill the gap in the study of vocabulary related to the memosphere. A few studies of meme genres relate to their description and analysis, yet do not focus on the semantic and graphic modification of loanwords. This work presents the unprecedented mechanisms and stages of the formation of meme genres names.

2021 ◽  
pp. 47-50
Author(s):  
Abdullatif Y. M. Alhatem

At the present time the smart technology enhanced to be utilized for the human life in many elds, especially in the houses. The building automation experienced a rapid growth in techniques and methods to provide an advanced management for operational advantages in buildings and develop the equipment in the houses to the consumption of energy and operation. When the KNX system has been developed to be the most important building automation, the ethernet system has evolved to be global communication system and use it as automation system. Among the various technological developments is IoT, which is the essential development the future achievement via the internet techniques, Meanwhile the different available communication mediums of KNX and the need of utilizing IP network in compiling extensive areas of KNX has led us to conduct this comparison.


2020 ◽  
Author(s):  
Ellita Permata Widjayanti ◽  
Chaerul Anwar

In 4.0 era, in which popular culture is flourishing, fanfiction is experiencing rapid growth. Many fans write about their idols, characters in movies, anime, games, and TV series. They make simulations, create simulacra, and hyperreality. Unfortunately, there are many fan-fiction productions which have pornographic content that is not in accordance with Indonesian cultural norms and moral ethics. This then becomes a moral challenge for the nation, especially for the youth, as they have free access to the internet. This research aims to look the challenges of morality within fanfiction, explaining it through the theory of hyperreality by using data taken from popular fanfiction platforms. The results show that pornography contained in fanfiction poses a threat to the moral codes of teenage readers, and renders pornographic practices more common. Besides, the hyperreality fosters sexual fantasies, which may lead to sexual harassment, free sex, and deviant sex. Keywords: fanfiction, simulation, simulacra, hyperreality, pornography, morality


Author(s):  
Amit Kumar Sinha

E-commerce and internet businesses are driving the rapid growth of the domestic IT-ITeS industry, attracting unprecedented global interest and funding. Indian e-commerce and internet companies are growing rapidly with about 460 million internet users and a tele-density of around 85.2%. Increasing penetration of the internet, adoption of smartphones and minimal effort low-cost mobile devices, changing demographics, mobile-empowered youth, and the emergence of tier 2 and tier 3 cities as major shopping hubs have been driving the growth of the industry, with new retail forces shifting its dynamics. Furthermore, the continued growth of large pure-play organisations that are powerhouses has moved retailers' focus to the web channel. These companies are not only becoming gateways to product research, but have also introduced consumers to new ways of viewing the retail process.


2016 ◽  
Vol 1 (01) ◽  
pp. 21-28
Author(s):  
Michael Kristanto

In this modern days, E-commerce having a rapid growth and becoming an important activity. E-commerce is widely considered   the   buying   and   selling   of   products   over   the internet. With a broadening product range, E-commerce will have a direct effect on bricks and mortar retail. Now the business is moving into this new services, and it will reduce net demand for future additional retail space. The paper concludes that E-commerce will have significant impacts on Bricks and Mortar Retail.


2017 ◽  
Vol 11 (60) ◽  
pp. 2967-2980
Author(s):  
Diego F. Rocha ◽  
Octavio Jose Salcedo Parra ◽  
Giovanny Mauricio Tarazona Bermudez

The paper must have abstract. The rapid growth of networks base on IP, and the current challenge posed by the technological deployment of IPv6 and annexed applications, challenges that must confront the Internet Service Provider and have stimulated the development for rigorous researches on the topic. The Internet Service Providers ISP offer infrastructure for implementation of virtual private network VPN, where is fundamental the definition of routing schemas between the border route of client CE and the provider PE. In this sense, have been proposed different schemas where the new protocols as Open Short Path First version 3 OSPFv3 have a key role. In the context of VPN, the routing protocol BGP is used to distribute the client’s path, the multi-protocol label switching MPLS is used to send the information packages through the network core in tunnel mode. Originally, only IPv4 was supported and expanded after support OSPFv2 and VPN IPv6. Based on the new specifications in order to support OSPFv3 as a routing protocol PE-CE and the current technological infrastructures begin the process of IPv6 deployment, these elements driving this research which evaluate the performance of routing protocol OSPFv3 on border scenarios MPLS/VPN/IPv6.


2017 ◽  
Vol 11 (4) ◽  
pp. 1-15 ◽  
Author(s):  
Nagesh K. ◽  
Sumathy R. ◽  
Devakumar P. ◽  
Sathiyamurthy K.

Security is concerned with protecting assets. The aspects of security can be applied to any situation- defense, detection and deterrence. Network security plays important role of protecting information, hardware and software on a computer network. Denial of service (DOS) attacks causes great impacts on the internet world. These attacks attempt to disrupt legitimate user's access to services. By exploiting computer's vulnerabilities, attackers easily consume victim's resources. Many special techniques have been developed to protest against DOS attacks. Some organizations constitute several defense mechanism tools to tackle the security problems. This paper has proposed various types of attacks and solutions associated with each layers of OSI model. These attacks and solutions have different impacts on the different environment. Thus the rapid growth of new technologies may constitute still worse impacts of attacks in the future.


Author(s):  
Alex Mathew

There has been a rapid growth of the devices connected to the internet in the last decade for the various internet (IoT) of things applications. The increase of these smart devices has posed a great security concern in the internet of things ecosystem. The internet of things ecosystem must be protected from these threats. Reinforcement learning has been proposed by the cybersecurity professionals to provide the needed security tools for securing the IoT system since it is able to interact with the environment and learn how to detect the threats. This paper presents a comprehensive research on cybersecurity threats to the IoT system applications. The RL algorithms are also presented to understand the attacks on the IoT. Reinforcement learning is widely employed in cybersecurity because it can learn on its own experience by investigating and capitalizing on the unknown ecosystem, this enables it solve many complex problems. The RL capabilities on dealing with cybercrime challenges are also exploited in this paper.


2019 ◽  
Vol 2 (2) ◽  
pp. 534
Author(s):  
Delvina Alodia ◽  
Jesslyn Lie ◽  
Vini Anggreini

Pedophilia is an obsession with children as sex objects. Overt acts, including taking sexual explicit photographs, molesting children, and exposing one's genitalia to children are all crimes. The problem with these crimes is that pedophilia is also treated as a mental illness, and the pedophiles are often released only to repeat the crimes or escalate the activity to the level of murder. This caused for the victims, in this case the children, and their families to feel insecure as there are still chances that the culprit is still targeting them. And there is also the physical and mental trauma that the children suffer as a result of the illicit act. Therefore pedophilia should be addressed seriously as the lives of children are at stake. Many regulations have been created in order to decrease this crime, but with technology’s rapid growth and increase of pedophilia communities that can be found all over the internet, it seems like it would be a long way before the crime could be eradicated completely. Because of that the government along with several other authority figures would occasionally search for sanctions that will hopefully decrease the number of pedophiles.


2021 ◽  
pp. 46-80
Author(s):  
Jirka Konietzny ◽  
Albert Caruana

Recreational gambling has become an accepted pursuit, and the advent of the Internet has rendered online gambling ubiquitous. However, the resultant rapid growth in online recreational gambling is not matched by an understanding of the drivers of customers’ intentions to gamble online. While this is potentially a fascinating aspect of consumer behavior, marketing scholars have shied away from giving online gambling much attention. This research seeks a better understanding of the drivers of recreational online gambling intentions among customers by applying the latest version of the Unified Theory of Acceptance and Technology—UTAUT 2, to customers in an online gambling context. It also proposes additional hypotheses that account for the role of anticipated enjoyment and perceived fairness. Data are collected from 593 casino customers of an online gambling firm and analyzed using PLS-SEM via Smart PLS. Results show that perceived fairness and anticipated enjoyment are significant drivers of online gambling intention, with perceived fairness being fully mediated by effort expectancy, anticipated enjoyment, and social influence. Shorn of drivers and moderators that are not significant, an online gambling intention model is proposed. Theoretical and managerial implications are discussed, limitations are noted, and areas for further research are suggested.


2013 ◽  
Vol 9 (1) ◽  
pp. 47-60 ◽  
Author(s):  
Piotr L. Szczepański ◽  
Adrian Wiśniewski ◽  
Tomasz Gerszberg

Abstract A rapid growth of online advertisements results in unsolicited bulk of data being downloaded during web surfing. To tackle this problem a fast mechanism detecting adverts is required. In this paper we present the usefulness of URL based web-pages classification in the process of online advertisements detection. Our experiments are performed on seven popular classifiers using the real-life dataset obtained by human agents browsing the internet. We introduce a general and fully automated framework that allows us to do a comprehensive analysis by performing simultaneously hundreds of experiments. This study results in solution with 0.987 accuracy and 0.822 F-measure.


Sign in / Sign up

Export Citation Format

Share Document