scholarly journals Mining Contextual Information for Ephemeral Digital Video Preservation

2009 ◽  
Vol 4 (1) ◽  
pp. 175-192 ◽  
Author(s):  
Chirag Shah

For centuries the archival community has understood and practiced the art of adding contextual information while preserving an artifact. The question now is how these practices can be transferred to the digital domain. With the growing expansion of production and consumption of digital objects (documents, audio, video, etc.) it has become essential to identify and study issues related to their representation. A cura­tor in the digital realm may be said to have the same responsibilities as one in a traditional archival domain. However, with the mass production and spread of digital objects, it may be difficult to do all the work manually. In the present article this problem is considered in the area of digital video preservation. We show how this problem can be formulated and propose a framework for capturing contextual infor­mation for ephemeral digital video preservation. This proposal is realized in a system called ContextMiner, which allows us to cater to a digital curator's needs with its four components: digital video curation, collection visualization, browsing interfaces, and video harvesting and monitoring. While the issues and systems described here are geared toward digital videos, they can easily be applied to other kinds of digital objects.

2009 ◽  
Vol 4 (2) ◽  
pp. 171-183 ◽  
Author(s):  
Chirag Shah

Emerging information media present new challenges to the curators. While archiving objects, and building meaningful collection for long-term preservation and access, have been well-understood practice for centuaries, digital objects present new issues. In the previous article (Shah, 2009) I identified a number of these issues related to digital objects, specifically digital videos of an ephemeral nature. I argued that while preserving such objects, adding contextual information is essential. One of the interesting challenges is to identify what to collect and preserve as contextual information. For ephemeral digital videos, I proposed to harvest four kinds of relevances and five kinds of contexts. In order to implement this proposal, I presented ContextMiner, a framework and a system to support digital video curation. In this article, I will take a closer look at ContextMiner, analyzing it for its functionalities and usability. This is done by usability inspection and content analysis. For the former, we simulated two curatorial tasks, asked our users (curators) to use ContextMiner, and provide us feedback on its usability and functionalities. For the latter, we mined a collection prepared by ContextMiner for its potential usage in preservation. Finally, I have summarized the lessons learned from developing and using our system, providing implications for digital library curators interested in collecting and preserving digital objects of an ephemeral nature.   


Author(s):  
Poonam Arya ◽  
Tanya Christ ◽  
Ming Ming Chiu

This chapter presents relevant findings from research that explored literacy teachers' self-reflections and reflective discussions with peers that were mediated by digital video. Mixed methodological approaches were used, including statistical discourse analysis, which examines the relations between speech-turns in teachers' video discussions to provide a fine-grained view of digital video's mediating role. Findings showed that recursive viewing of videos, across different contexts or within a context facilitated shifts in purposes for discussing videos and broadened the foci of these discussions. Additionally, the situated context and multiple modes of information presented in digital videos supported literacy teachers' generation and application of ideas about reader processing and reader engagement. Teachers used certain conversation moves, such as critical thinking, hypothesizing, and challenging, as they transacted with the multimodal information in the video to support their generation of ideas for literacy instruction. Implications and future research directions are discussed.


2020 ◽  
pp. 249-280
Author(s):  
Billie Melman

Chapter 8 draws the web of relations between Egypt’s antiquity, empire, modernity, and internationalism from the outbreak of the First World War to decolonization. It focuses on the era between Britain’s unilateral granting of formal independence to Egypt in 1922 and the Anglo-Egyptian Agreement of 1936, and sets the imperial preoccupation with ancient Egypt in national and international contexts. The chapter fills a lacuna in the historiography of Egyptology and Egyptomania which has focused on the discovery of the tomb of Tutankhamun in 1922 and has largely overlooked the internationalist angles of the interwar obsession with ancient Egypt. The chapter maps the expansion of interest in Egypt beyond the pharaonic past and considers its extension to prehistoric Egypt. It relates Egyptology to the modernization of travel and speed technologies, and to popular representations of Egypt as a centre of globalized travel in a connective empire. The chapter further considers the roles of the global media in mediating between discoveries and transnational audiences. Following on the theme of the internationalization of Egypt’s past, it considers the presence of Egypt in material culture, particularly in eclectic styles and design which were associated with modernity, such as Art Deco architecture and fashion. One main argument of the chapter is that the interwar discovery of Egypt’s multiple pasts was characterized by an internationalization apparent in the politics of archaeology, the spread of the new regime of antiquities and cooperation between Egyptian nationalists and internationalist bodies, and in the mass production and consumption of Egyptiana.


2012 ◽  
Vol 6 (4) ◽  
pp. 71-93
Author(s):  
Ming Yang ◽  
Chih-Cheng Hung ◽  
Edward Jung

Secure communication has traditionally been ensured with data encryption, which has become easier to break than before due to the advancement of computing power. For this reason, information hiding techniques have emerged as an alternative to achieve secure communication. In this research, a novel information hiding methodology is proposed to deliver secure information with the transmission/broadcasting of digital video. Secure data will be embedded within the video frames through vector quantization. At the receiver end, the embedded information can be extracted without the presence of the original video contents. In this system, the major performance goals include visual transparency, high bitrate, and robustness to lossy compression. Based on the proposed methodology, the authors have developed a novel synchronization scheme, which ensures audio/video synchronization through speech-in-video techniques. Compared to existing algorithms, the main contributions of the proposed methodology are: (1) it achieves both high bitrate and robustness against lossy compression; (2) it has investigated impact of embedded information to the performance of video compression, which has not been addressed in previous research. The proposed algorithm is very useful in practical applications such as secure communication, captioning, speech-in-video, video-in-video, etc.


2018 ◽  
Vol 3 (1) ◽  
pp. 47-49
Author(s):  
Deepika Singh ◽  
Mukul Kumar

Education is one of the principal buildings blocks of the civilization. Since many centuries, teaching has been extensively accepted as a Nobel profession. The expected duty of teachers is to deliver their best in receiving and conveying the information correctly to their students in class and they do. But, in the modern era, when the young generation is conquered by the technological advancements, implementation of innovative teaching practices may help to improve the education system and can enhance the learning potential. The present article focuses on the integration of traditional and audio-video teaching practices.


Author(s):  
N.R. Zaynalov ◽  
U.Kh. Narzullaev ◽  
A.N. Muhamadiev ◽  
I.R. Rahmatullaev ◽  
R.K. Buranov

Steganography develops tools and methods for hiding the fact of message transmission. The first traces of steganographic methods are lost in ancient times. For example, there is a known method of hiding a written message: the slave's head was shaved, a message was written on the scalp, and after the hair grew back, the slave was sent to the addressee. From detective works, various methods of secret writing between the lines of ordinary text are well known: from milk to complex chemical reagents with subsequent processing. Digital steganography is based on hiding or embedding additional information in digital objects while causing some distortion of these objects. In this case, text, images, audio, video, network packets, and so on can be used as objects or containers. To embed a secret message, steganographic methods rely on redundant container information or properties that the human perception system cannot distinguish. Recently, there has been a lot of research in the field of hiding information in a text container, since many organizations widely use text documents. Based on this, here the MS Word document is considered as a medium of information. MS Word documents have different parameters, and by changing these parameters or properties, you can achieve data embedding. In the same article, we present steganography using invisible Unicode characters of the Space type, but with a different encoding.


Considered digital steganography is the direction of classical steganography based on concealing or introducing additional information into digital objects, while causing some distortions of these objects. At the same time, images, audio, video, network packets, etc. can be used as objects or containers. Recently, there has been a lot of publication in the field of information hiding in a text container. To embed a secret, steganographic methods rely on redundant information about the used covering media or properties that the human perception system cannot distinguish. Since text documents are widely used in organizations, using a text document as a storage medium may be the preferred choice in such an environment. On the other hand, the choice of using a text document as a storage medium is the most difficult, since it contains less redundant information. In this article, we present textual steganography using invisible characters in a word processor.


2009 ◽  
Vol 4 (3) ◽  
pp. 146-155 ◽  
Author(s):  
Dirk Von Suchodoletz ◽  
Jeffrey Van der Hoeven

Emulation used as a long-term preservation strategy offers the potential to keep digital objects in their original condition and experience them within their original computer environment. However, having just an emulator in place is not enough. To apply emulation as a fully fledged strategy, an automated and user-friendly approach is required. This cannot be done without knowledge and contextual information of the original software. This paper combines the existing concept of a view path, which captures the contextual information of software, together with new insights into improving the concept with extra metadata. It provides regularly updated instructions for archival management to preserve and access its artefacts. The view-path model requires extensions to the metadata set of the primary object of interest and depends on additionally stored secondary objects for environment recreation like applications or operating systems. This article also addresses a strategy of rendering digital objects by running emulation processes remotely. The advantage of this strategy is that it improves user convenience while maximizing emulation capability.


2019 ◽  
pp. 1-16
Author(s):  
Olja Munitlak Ivanovic

Ethical and ecological responsibility represent the root of sustainable development taking into account intergenerational justice. Mass production and consumption have left negative effects on the environment. Disregarding ecological responsibility, production processes were mainly based on uncontrollable use of raw materials and non-renewable energy sources. Taking into account limitation of raw materials, economic and ecological disasters, a concept of resilience has been developed to make all elements of society flexible in terms of unwanted shocks. This chapter describes two conceptual economic models: linear and circular. The linear model is based on the principle “take, produce, consume, and throw,” meaning that usability of waste is reduced and that waste is simply thrown out after consumption. Circular economic model takes into account environmental responsibility, but it also makes companies more competitive. Waste is treated and processed adequately and used as raw material in production, thus increasing competitiveness. Waste that cannot be processed is disposed permanently.


2016 ◽  
pp. 1075-1099
Author(s):  
Poonam Arya ◽  
Tanya Christ ◽  
Ming Ming Chiu

This chapter presents relevant findings from research that explored literacy teachers' self-reflections and reflective discussions with peers that were mediated by digital video. Mixed methodological approaches were used, including statistical discourse analysis, which examines the relations between speech-turns in teachers' video discussions to provide a fine-grained view of digital video's mediating role. Findings showed that recursive viewing of videos, across different contexts or within a context facilitated shifts in purposes for discussing videos and broadened the foci of these discussions. Additionally, the situated context and multiple modes of information presented in digital videos supported literacy teachers' generation and application of ideas about reader processing and reader engagement. Teachers used certain conversation moves, such as critical thinking, hypothesizing, and challenging, as they transacted with the multimodal information in the video to support their generation of ideas for literacy instruction. Implications and future research directions are discussed.


Sign in / Sign up

Export Citation Format

Share Document