scholarly journals Narrative as a Radial Category

2020 ◽  
Vol 55 (s1) ◽  
pp. 185-205
Author(s):  
Janusz Badio

Abstract Narrative is a complex and elusive category of cognition, culture, communication and language. An attempt has been made in this article with a large enough theoretical scope to consider the possibility of treating narrative as a radial category. To this end, the definition and characterisation of radiality is provided together with explanation of what it might mean to apply this term to the complex language-discourse unit of narrative. The prototype of this category involves features, functions, and ICMs. It has multiple representations with only family resemblance, involves more obvious exemplars and variable abstract knowledge structures. In particular, section one looks at the radiality question and what it might mean to think of the meaning of narrative in general. Section two focuses on centrality. Sections three to five deal with schematic representations of narrative and provide examples of extending the most subsuming schema of the Action Chain Model from cognitive linguistics and Labov’s Narrative Schema to various other types of conversational narrative, children’s dramatic plays, tactical narratives, story rounds, jokes, poems, current news articles on the Internet, images, and advertisements.

InterConf ◽  
2021 ◽  
pp. 220-225
Author(s):  
Iryna Stepanova ◽  
Svitlana Nykyporets

An effort to analyse the linguistic research of the Internet discourse is made in the article. The authors believe that the creation of linguistic corpora of the Ukrainian language at the present stage is not systemic. The authors also consider prospects and possible approaches to the Internet text space by means of Corpus Linguistics – a fairly new field of linguistics, closely related to computational and cognitive linguistics.


Author(s):  
Petar Halachev ◽  
Victoria Radeva ◽  
Albena Nikiforova ◽  
Miglena Veneva

This report is dedicated to the role of the web site as an important tool for presenting business on the Internet. Classification of site types has been made in terms of their application in the business and the types of structures in their construction. The Models of the Life Cycle for designing business websites are analyzed and are outlined their strengths and weaknesses. The stages in the design, construction, commissioning, and maintenance of a business website are distinguished and the activities and requirements of each stage are specified.


2013 ◽  
Vol 95 (6) ◽  
pp. 418-420 ◽  
Author(s):  
R Freeman ◽  
F Ashouri ◽  
J Papanikitas ◽  
D Ricketts

Introduction The internet is a convenient source of health information used widely by patients and doctors. Previous studies have found that the written information provided was often inaccurate. There is no literature regarding the accuracy of medical images on the internet. The aim of this study was to assess the accuracy of internet images of injuries to the glenoid labrum following shoulder dislocation. Methods The Google and Bing search engines were used to find images of Bankart, Perthes and anterior labroligamentous periosteal sleeve avulsion (ALPSA) lesions. Three independent reviewers assessed the accuracy of image labelling. Results Of images labelled ‘Bankart lesion’, 30% (9/30) were incorrect while ‘Perthes lesion’ images were incorrect in 15% of cases (9/60) and 4% of ‘ALPSA lesion’ images were incorrect (2/46). There was good interobserver reliability (kappa = 0.81). Labelling accuracy was better on educational sites than on commercial sites (6% vs 25% inaccurate, p=0.0013). Conclusions Caution is recommended when interpreting non-peer reviewed images on the internet.


2008 ◽  
Vol 26 (4) ◽  
pp. 210-216
Author(s):  
Bridget K. Behe ◽  
Brittany Harte ◽  
Chengyan Yue

Abstract Consumers have readily adopted personal computers and Internet technology with many seeking information and/or make purchases online. However, the extent to which horticultural consumers seek information and make purchases online is not well documented. A survey of 1588 consumers, representative of the United States on average, was conducted in 2004 to provide baseline information about online gardening search and purchase activities. Nearly 28% searched for gardening information at least once; of those, more than 50% of the participants searched for information at least weekly. There were differences in gardening-related searches by age and marital status, but not by region of residence, income, or gender. Nearly 50% of the study respondents made an online purchase in the year prior to the survey but only 7.4% made a gardening related purchase online. Over 50% had made a gardening-related purchase in-person. The same respondents who made in-person purchases were the individuals who made the online gardening purchases, so the Internet provided a supplemental shopping venue. There were demographic differences between those who made online gardening purchases and solely in-person gardening purchases. More males, younger and slightly less affluent participants were more likely to make online purchases than solely in-person purchases for gardening products, supplies, and services while more females who were slightly older and more affluent were more likely to make in-person gardening-related purchases.


2021 ◽  
Vol 13 (2) ◽  
pp. 20
Author(s):  
Evelina Francisco ◽  
Nadira Fardos ◽  
Aakash Bhatt ◽  
Gulhan Bizel

The COVID-19 pandemic and the resulting stay-at-home orders have disrupted all aspects of life globally, most notably our relationship with the internet and social media platforms. People are online more than ever before, working and attending school from home and socializing with friends and family via video conferencing. Marketers and brands have been forced to adapt to a new normal and, as a result, have shifted their brand communication and marketing mix to digital approaches. Hence, this study aims to examine the shift of influencer marketing on Instagram during this period and the possible future implications. By employing an online survey for exploratory research, individuals answered questions addressing their perceptions about the impact of the pandemic, brands and influencers’ relationship, and the overall changes made in marketing strategy.


Author(s):  
N. Raghavendra Rao

Information technology has advanced by delivering an exponential increase in computing power. Telecommunication technology has likewise advanced communicating capabilities. Convergence of these two technologies has become possible due to the rapid advancements made in the respective technology. This convergence is termed as information and communication technology as a discipline. Many concepts are emerging in this discipline. These concepts enable business, government, and human beings to reach new realities in their required activities. Some of these concepts have created various opportunities for designing and manufacturing electronic devices. When these devices are connected to other devices and systems over the internet, this is now known as internet of things (IoT). This chapter gives a brief overview of the concepts such as cloud computing and ubiquitous and pervasive computing in the context of internet of things. Further, this chapter discusses five case illustrations with the relevance of internet of things.


Sensors ◽  
2019 ◽  
Vol 19 (13) ◽  
pp. 2956 ◽  
Author(s):  
Paolo Lo Giudice ◽  
Antonino Nocera ◽  
Domenico Ursino ◽  
Luca Virgili

In the last years, several attempts to combine the Internet of Things (IoT) and social networking have been made. In the meantime, things involved in IoT are becoming increasingly sophisticated and intelligent, showing a behavior that tends to look like the one of users in social networks. Therefore, it is not out of place to talk about profiles of things and about information and topics exchanged among them. In such a context, constructing topic-driven virtual communities starting from the real ones operating in a Multi-IoT scenario is an extremely challenging issue. This paper aims at providing some contributions in this setting. First of all, it presents the concept of profile of a thing. Then, it introduces the concept of topic-guided virtual IoT. Finally, it illustrates two approaches (one supervised and one unsupervised) to constructing topic-guided virtual IoTs in a Multi-IoT scenario.


Energies ◽  
2020 ◽  
Vol 13 (10) ◽  
pp. 2509 ◽  
Author(s):  
Kamran Shaukat ◽  
Suhuai Luo ◽  
Vijay Varadharajan ◽  
Ibrahim A. Hameed ◽  
Shan Chen ◽  
...  

Cyberspace has become an indispensable factor for all areas of the modern world. The world is becoming more and more dependent on the internet for everyday living. The increasing dependency on the internet has also widened the risks of malicious threats. On account of growing cybersecurity risks, cybersecurity has become the most pivotal element in the cyber world to battle against all cyber threats, attacks, and frauds. The expanding cyberspace is highly exposed to the intensifying possibility of being attacked by interminable cyber threats. The objective of this survey is to bestow a brief review of different machine learning (ML) techniques to get to the bottom of all the developments made in detection methods for potential cybersecurity risks. These cybersecurity risk detection methods mainly comprise of fraud detection, intrusion detection, spam detection, and malware detection. In this review paper, we build upon the existing literature of applications of ML models in cybersecurity and provide a comprehensive review of ML techniques in cybersecurity. To the best of our knowledge, we have made the first attempt to give a comparison of the time complexity of commonly used ML models in cybersecurity. We have comprehensively compared each classifier’s performance based on frequently used datasets and sub-domains of cyber threats. This work also provides a brief introduction of machine learning models besides commonly used security datasets. Despite having all the primary precedence, cybersecurity has its constraints compromises, and challenges. This work also expounds on the enormous current challenges and limitations faced during the application of machine learning techniques in cybersecurity.


2013 ◽  
Vol 32 (2) ◽  
Author(s):  
Diane P. Janes

It has often been suggested that education via the Internet, or e-learning, leads to a sense of separation in individual learners; this need not be the case. Teaching is a relationship: a relationship that is built on a connection between teaching and learner, between learner and learner, and between the learners and the content. What then is the role of the instructor in moderating online learning? This paper will explore how that connection might be better made in an online environment and will explore the interpersonal or emotive distinctiveness needed in an e-moderator from the perspective of a group of graduate students engaged in an online master of education degree offered in Canada.


2009 ◽  
pp. 1-10
Author(s):  
Albert Boonstra ◽  
Bert de Brock

The past few years, many organizations have been using the Internet in quite arbitrary and experimental ways. This phase, which can be considered as a period of learning and experimentation, has created a need for a more systematic approach to the identification, the ordering and the assessment of e-business options. It is the objective of this paper to address this need by presenting a methodology that aims at supporting management in using alternative e-business applications in the first stage of the decision-making process. Figure 1 shows how a systematic decision-making process can be organized by using e-business options. The steps are based on Simon’s intelligence, design, and choice trichotomy (Simon, 1960). First, alternative e-business options have to be identified and ordered. Then the possible options have to be assessed and selected. After this stage the selected opportunities have to be specified and designed. Next, implementation, operation, maintenance, and evaluation may follow. In Figure 1 this is called the “formal life cycle”. We will apply the word “e-business option” referring to the possibility to use an electronic network for a business purpose. An e-business opportunity is defined here as an assessed and selected e-business option. In practice, different intermediate feedback activities, interrupts, delays and adjustments are often necessary to reconsider earlier steps (Mintzberg, Raisinghani, & Théorêt, 1976). This is—among other reasons—because decision-making processes of this kind take place in dynamic environments and decisions are made in political contexts (Pettigrew, 2002). Moreover, participants in decision-making processes are often lacking the necessary information to make well-considered decisions right from the start (Miller, Hickson, & Wilson, 1996). In Figure 1 these activities are called “intermediate feedback”.


Sign in / Sign up

Export Citation Format

Share Document