scholarly journals Genre and thematic classification of video blogging: A scientific approach

Author(s):  
Iryna Gavran ◽  
Olga Grabarchuk ◽  
Kostyantyn Grubich

The purpose of the article is to clarify the genre-thematic classification of video blogging and the specific features of its affiliation with stylistic characteristics through the lens of a scientific approach. At present, there is no official classification of video blogging, but there are some types that help partially group all the variety of content into a single system. Methodology. The following methods were used during the study: scientific, content analysis, descriptive, statistical, comparative. The scientific novelty is to investigate video blogging as a subject of scientific analysis and study the genres of individual video platforms and online communities in terms of risks and opportunities. Conclusions. Video blogging is a relatively new concept that embodies an activity that is described by a communication function and a hybrid genre that has emerged as a result of technological progress. This phenomenon combines several genres, including the genres of comments and posts, and accompanies communicative situations on the Internet. The genre of this phenomenon is explained by its mobile features, because new modern videos are created every day, and they are difficult to refer to a specific topic because they are constantly mixed and modified with each other. The author's attitude towards his or her audience depends on aspects of individuality and aspects of personality. Today, a considerable number of successful video blogs are products of mass Internet consumption, devoid of monotonous content, which factor in the interests of the audience and help the film as efficiently as possible due to additional effects and editing.

Author(s):  
Petar Halachev ◽  
Victoria Radeva ◽  
Albena Nikiforova ◽  
Miglena Veneva

This report is dedicated to the role of the web site as an important tool for presenting business on the Internet. Classification of site types has been made in terms of their application in the business and the types of structures in their construction. The Models of the Life Cycle for designing business websites are analyzed and are outlined their strengths and weaknesses. The stages in the design, construction, commissioning, and maintenance of a business website are distinguished and the activities and requirements of each stage are specified.


Author(s):  
Nuke Lulu Ul Chusna

The internet can be used as a way to transfer knowledge from teachers to students. Learning that utilizes the development of technology and information, namely the internet, one of which is the e-learning learning system. E-learning is a form of conventional learning that is transferred in digital format through internet technology, not only to present subject matter on the internet but also must be in accordance with the principles of learning.The e-learning learning model results in changes in learning culture in the context of learning. Learning becomes very flexible, because it can be adjusted to the availability of time from students in learning the material provided by the teacher.The teacher determines the success of students in learning, therefore teachers are required to have the ability to adapt to technological progress. Keywords: ICT,e-learning, e-learning learning


2020 ◽  
Author(s):  
Kunal Srivastava ◽  
Ryan Tabrizi ◽  
Ayaan Rahim ◽  
Lauryn Nakamitsu

<div> <div> <div> <p>Abstract </p> <p>The ceaseless connectivity imposed by the internet has made many vulnerable to offensive comments, be it their physical appearance, political beliefs, or religion. Some define hate speech as any kind of personal attack on one’s identity or beliefs. Of the many sites that grant the ability to spread such offensive speech, Twitter has arguably become the primary medium for individuals and groups to spread these hurtful comments. Such comments typically fail to be detected by Twitter’s anti-hate system and can linger online for hours before finally being taken down. Through sentiment analysis, this algorithm is able to distinguish hate speech effectively through the classification of sentiment. </p> </div> </div> </div>


Author(s):  
Emily Kalah Gade ◽  
Sarah Dreier ◽  
John Wilkerson ◽  
Anne Washington

Abstract The Internet Archive curated a 90-terabyte sub-collection of captures from the US government's public website domain (‘.gov’). Such archives provide largely untapped resources for measuring attributes, behaviors and outcomes relevant to political science research. This study leverages this archive to measure a novel dimension of federal legislators' religiosity: their proportional use of religious rhetoric on official congressional websites (2006–2012). This scalable, time-variant measure improves upon more costly, time-invariant conventional approaches to measuring legislator attributes. The authors demonstrate the validity of this method for measuring legislators' public-facing religiosity and discuss the contributions and limitations of using archived Internet data for scientific analysis. This research makes three applied methodological contributions: (1) it develops a new measure for legislator religiosity, (2) it models an improved, more comprehensive approach to analyzing congressional communications and (3) it demonstrates the unprecedented potential that archived Internet data offer to researchers seeking to develop meaningful, cost-effective approaches to analyzing political phenomena.


2021 ◽  
Vol 7 (1) ◽  
pp. 01-08
Author(s):  
Safira Salsabila ◽  
Dian Kasoni

Abstract— Microcontroller is a hardware in which there is a processor, input and output, RAM, ROM, System Bus, Contol Unit, Shift Register and Aritmatic Logic Unit. Microcontroller is able to activate some electronic devices such as led, buzzer, motor, lighting and so on. Currently, at the home of the writer has many light switches in each room and often causes the user to become disoriented when turning on the light and the condition of the gate in the yard was that close to the roads often led to congestion when it would either open or close the house gates. The activation method of lights and other electronic devices still use manual method, so it is inefficient and causing excessive cost of electricity. For that built a system to activate every device in every room at the house based internet of things which will be activated by a website display on the internet so that the lights in each room and other device will activate.. With the creation of this system is expected to reduce the cost of electricity on writer’s house and as a first step to realize the smart home in the utilization of technological progress, especially in the field of microcontroller.   Intisari— Mikrokontroller merupakan sebuah perangkat keras yang didalamnya terdapat sebuah processor, input dan output, RAM, ROM, System Bus, Contol Unit, Shift Register dan Aritmatic Logic Unit. Mikrokontroller ini mampu mengaktifkan beberapa perangkat elektronika seperti led, buzzer, motor, lampu penerangan dan sebagainya. Saat ini, di rumah pribadi penulis memiliki banyak saklar lampu di setiap ruangan dan sering mengakibatkan setiap pengguna kebingungan saatmenghidupkan lampu dan gerbang di halaman rumah memiliki jarak yang dekat dengan jalanan seringkali menimbulkankemacetan saat akan membuka ataupun menutup gerbang rumah. Metode pengaktifan perangkat lampu dan alatelektronik yang lain masih menggunakan cara manual, sehingga tidak efisien dan menimbulkan pengeluaran biaya listrik yangberlebih. Untuk itu dibangun sebuah sistem untuk mengaktifkan setiap perangkat yang ada di ruangan rumah penulis berbasisInternet of Things yang akan diaktifkan oleh sebuah tampilan website melalui internet sehingga secara otomatis lampu disetiap ruangan dan perangkat lainnya akan aktif. Dengan dibuatnya sistem ini diharapkan dapat mengurangi pengeluaran biaya listrik di rumah pribadi penulis dan sebagai langkah awal mewujudkan smart home dalam pemanfaatan kemajuan teknologi, terutama dibidang mikrokontroller.


2010 ◽  
Vol 43 (12) ◽  
pp. 1344-1350 ◽  
Author(s):  
M. I. Gerasimova ◽  
S. F. Khokhlov
Keyword(s):  

2020 ◽  
pp. 89-101
Author(s):  
Katarzyna Borzucka-Sitkiewicz ◽  
Karina Leksy

The technological progress and unlimited access to media create new possibilities of self-presentation in the public domain nowadays, especially for the young generation. The article presents a part of a broader research project which was aimed at defining the characteristics of behaviors shown in cyberspace by Polish students of upper-secondary schools and also at determining potential social and health consequences of such behaviors. The chosen fragment of the study mainly focuses on those actions that were considered as a sign of social exhibitionism on the Internet, such as uploading photos and videos, sharing private information about oneself and informing about current activity. The research was conducted in accordance with a quantity paradigm. It was of diagnostic and verification nature and a method of diagnostic survey with the use of questionnaires was applied.


2021 ◽  
pp. 23-33
Author(s):  
Natalia STRIUK

The present research is an attempt to analyse metaphors in English and Ukrainian clothing inscriptions in a comparative aspect. The study focuses on providing a sufficient semantic classification of this versatile figure of speech in the discourse that has never been analysed in terms of metaphors. It deals with English and Ukrainian metaphorical inscriptions on clothing harvested on the Internet over a two-year period (2017-2019). The paper shows that metaphorisation is unevenly typical of English and Ukrainian linguocultural environments. The peculiarities of the source from which the units under analysis were collected allows us to identify seven main vehicle-driven categories of metaphors employed in clothing inscriptions: anthropic, zoomorphic, botanomorphic, creaturemorphic, artefactomorphic, ecomorphic and sensory. The research proves that both English and Ukrainian metaphorical clothing inscriptions have their peculiar sources; moreover, even if metaphors are built on the same or similar images, the focus is usually quite different. This study argues that metaphors on clothing inscriptions can serve as an applicable source to study social priorities, values and tendencies of two different European linguocultural environments. The outcome of the research can be used as an interesting material for sociolinguistics and linguocultural studies.


The advancement of technology and networking allows the use of the Web incredibly important. There is thus an exponential increase in data and information via the Internet. This flow thus is a beneficial field of study which can be defined accurately. Internet traffic detection is a very popular method of identifying information. Although so many methods have been successfully developed for classifying internet traffic, computer training technology among them is most popular. A short study of the classification of Internet traffic on various managed and non-regulated computer teaching systems was undertaken by many researchers. This paper will give various ideas to the other researcher’s and help them to learn a lot about machine learning


2021 ◽  
Author(s):  
Matthias Ludwig ◽  
Alexander Hepp ◽  
Michaela Brunner ◽  
Johanna Baehr

Trust and security of microelectronic systems are a major driver for game-changing trends like autonomous driving or the internet of things. These trends are endangered by threats like soft- and hardware attacks or IP tampering -- wherein often hardware reverse engineering (RE) is involved for efficient attack planning. The constant publication of new RE-related scenarios and countermeasures renders a profound rating of these extremely difficult. Researchers and practitioners have no tools or framework which aid a common, consistent classification of these scenarios. In this work, this rating framework is introduced: the common reverse engineering scoring system (CRESS). The framework allows a general classification of published settings and renders them comparable. We introduce three metrics: exploitability, impact, and a timestamp. For these metrics, attributes are defined which allow a granular assessment of RE on the one hand, and attack requirements, consequences, and potential remediation strategies on the other. The system is demonstrated in detail via five case studies and common implications are discussed. We anticipate CRESS to evaluate possible vulnerabilities and to safeguard targets more proactively.


Sign in / Sign up

Export Citation Format

Share Document