Information Age
Recently Published Documents


TOTAL DOCUMENTS

3726
(FIVE YEARS 981)

H-INDEX

52
(FIVE YEARS 12)

2022 ◽  
pp. 1-19
Author(s):  
Uluğ Kuzuoğlu

Abstract This article rethinks the history of Chinese script reforms and proposes a new genealogy for the Chinese Latin Alphabet (CLA), invented in 1931 by Chinese and Russian revolutionaries in the Soviet Union. Situating script reforms within a global information age that emerged out of the nineteenth-century communications revolution, the article historicizes the CLA within a technologically and ideologically contrived Sino-Soviet space. In particular, it shows the intimate links between the CLA and the Unified New Turkic Alphabet (UNTA), which grew out of a latinization movement based in Baku, Azerbaijan. The primary purpose of the UNTA was to latinize the Arabic script of the Turkic people living in Soviet Central Asia, but it was immediately exported to the non-Turkic world as well in an effort to latinize languages across Eurasia and ignite revolutionary internationalism. This article investigates the forgotten figures involved in carrying the Latin alphabet from Baku to Shanghai and offers a new framework to scrutinize the history of language, scripts, and knowledge production across Eurasia.


Author(s):  
Juan Carlos Cepeda-Pacheco ◽  
Mari Carmen Domingo

AbstractWe propose a tourist attraction IoT-enabled deep learning-based recommendation system to enhance tourist experience in a smart city. Travelers will enter details about their travels (traveling alone or with a companion, type of companion such as partner or family with kids, traveling for business or leisure, etc.) as well as user side information (age of the traveler/s, hobbies, etc.) into the smart city app/website. Our proposed deep learning-based recommendation system will process this personal set of input features to recommend the tourist activities/attractions that best fit his/her profile. Furthermore, when the tourists are in the smart city, content-based information (already visited attractions) and context-related information (location, weather, time of day, etc.) are obtained in real time using IoT devices; this information will allow our proposed deep learning-based tourist attraction recommendation system to suggest additional activities and/or attractions in real time. Our proposed multi-label deep learning classifier outperforms other models (decision tree, extra tree, k-nearest neighbor and random forest) and can successfully recommend tourist attractions for the first case [(a) searching for and planning activities before traveling] with the loss, accuracy, precision, recall and F1-score of 0.5%, 99.7%, 99.9%, 99.9% and 99.8%, respectively. It can also successfully recommend tourist attractions for the second case [(b) looking for activities within the smart city] with the loss, accuracy, precision, recall and F1-score of 3.7%, 99.5%, 99.8%, 99.7% and 99.8%, respectively.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Junfeng Ge ◽  
Ning Li ◽  
Jianying Cao

With the development of digital signal processing and advanced algorithms, real-time signal processing based on FPGA and DSP is suitable for high-speed radar signal processing. With the rapid development of science and technology, war has entered the information age guided by high technology, and advanced science and technology has played a vital role in the trend of war. In recent years in the modern war, many countries invest a lot of research effort on the stealth technology, and advanced stealth technology can use a variety of technical means to alter or weaken the feature information of the target, confuse the enemy radar detection system effectively, reduce the chance of being detected to the largest extent, and prolong the lifecycle of aircraft and weapons. This research mainly discusses the electromagnetic occlusion algorithm and its optimization based on FPGA and panel grouping. The FPGA model selected for this study is XC6VLX240T-1FF1156I. Because the amount of data processed here is not very large, the cache part directly uses the on-chip storage resources of the FPGA, and the AD device is used to perform analog-to-digital/digital-to-analog conversion on the signal and perform digital up-down conversion. For a facet, it is necessary to first verify whether it is a bright facet and set the flag to mark it, then the facet needs to be occluded with the triangular facet marked as a bright facet, and all bright facets that have been marked need to be traversed. Open MP parallelization of the occlusion algorithm is as follows: The physical optics method is used to calculate the target RCS, and the focus of parallelism is placed on the part with a large amount of calculation. When using Open MP to design a program on a multicore computer, each group is assigned a thread to give full play to the core computing power. The total field is scattered and superimposed by each surface element. This part uses the parallel processing mode of Open MP, which allows the panel judgment in the group to be carried out at the same time. This part requires schedule to allocate resources and use different parallel mechanisms for different calculations to optimize debugging. In the angular range where there is multiple scattering at 0 ° ≤ φ ≤ 90 ° , the calculation results and the measurement results are in good agreement, and when the two planes are simulated with 1820 triangular faces, the fast multiple scattering in this paper only needs 4 minutes. This research has realized the general radar signal processing method based on FPGA structure, and the design has important engineering realization significance.


2021 ◽  
Vol 15 (1) ◽  
pp. 178
Author(s):  
Wentao Guo

Under the development of the information age, traditional Chinese teaching model of college English reading courses can no longer meet the needs of the times, and needs to be reformed urgently. From the perspective of mobile learning, this paper tries to combine modern educational technology with classroom teaching by using an online English reading learning platform, and explores the construction of a new teaching model. This model tries to form effective teaching supervision and assessment through the combination of online and offline teaching model, in-class and after-class teaching model, as well as real-time and dynamic big data monitoring, which breaks the closed classroom teaching environment, enriches the teaching content and means, complements and improves the teaching method of traditional Chinese college English reading courses. The aim of this study is to enrich teaching content, reform traditional teaching model and construct a new teaching model for English reading courses through the teaching practice of the online English reading platform, and further optimize the use of the platform by collecting and analyzing effective assessment and feedback, so as to make full use of the online reading platform and improve the mobile reading teaching model. 


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Zhaoyin Jiang ◽  
Fuyou Zhang ◽  
Laishuang Sun

The current era is an information age, and society is turning to the information age. The image processing technology is also widely used in various fields, and the technology of sports action recognition based on image processing technology can also be said to be appropriate. This article uses a spatial visual feature analysis algorithm to implement it. To implement this algorithm, a series of work such as image collection, feature extraction, and action recognition must be completed first and then implemented through texture functions and other related functions. This algorithm can be used to complete the image-based sports action recognition technology at the minimum time cost. This algorithm can help sportsmen better complete training and standardize movements to a certain extent. As for the development of China’s current sports industry structure, it is also steadily improving. The people’s love for sports is getting stronger and stronger, which also makes the development of China’s sports industry still benefit a lot.


Author(s):  
Woochun Jun

In the modern knowledge–information age, various information and communication technologies provide us with many benefits and at the same time, bring various side effects such as cybercrime. The number of cybercrimes is increasing gradually, and in particular, the number of digital sex crimes has been increasing recently. In addition, digital sex crimes are becoming increasingly violent, so national measures are needed. In this study, statistical data at the national level were used to investigate the overall characteristics of digital sex crimes in Korea. First, statistical analysis shows that the victims are mainly women in their teens and 20s. Typical types of digital sex crimes are distribution of illegal contents and illegal filming, the perpetrators are mainly unknown, and digital sex crimes were less often recognized by others and more often by the victims themselves. Based on these results, countermeasures against various digital sex crimes are suggested.


Author(s):  
Daria Kononovych

The spread of information technology in all spheres of life has a significant impact on the socialization and social adaptation of an individual. It also creates risks of negative impact on the psychological well-being, health and even life of the younger generation. The modern information age raises the problem of the formation of students ability to self-education, their competence work with different types of information and critical thinking skills. The purpose of the article is to reveal the essence of the program for the prevention of destructive influence of the Internet environment on the student youth in the activities of social service centers. Using the method of analysis of the scientific literature, the content of the basic concepts of research is clarified. To substantiate the essence and features of prevention programs of destructive influence of the Internet environment on the student youth we used methods of systematization and generalization. In the article the author considers the state of prevention of destructive influence of the Internet environment in Ukraine and reveals the essence of the complex program for the prevention of such influence on student youth in the activity of the centers of social services. The author analyzes the current state of preventive activities; defines the concept of «prevention of destructive influence». The paper describes the purpose and objectives of preventive work, the structural components of the program, reveals their content. The program is aimed at personal development, motivation for active involvement in the process of planning further life, providing opportunities to master the skills of counteracting destructive influence, critical thinking.


2021 ◽  
Vol 16 (5) ◽  
pp. 274-278
Author(s):  
April Riordan

Changemakers! Practitioners Advance Equity and Access in Out-of-School Time Programs, edited by Sara Hill and Femi Vance (Information Age) provides a thorough (and long overdue) examination of youth development policy and practice in the context of White supremacy, systemic oppression, and other forms of inequity. It offers a valuable introduction for those new to the field and for veterans just now starting to consider more equitable approaches to their work.   


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Xiaojing Cheng

The encryption and privacy protection of multimedia image resources are of great value in the information age. The utilization of the gyrator transform domain model in multimedia image encryption can select parameters more accurately, so it has a wider scope of utilization and further ameliorates the stability of the whole system. On account of this, this paper first analyzes the concept and connotation of gyrator transform, then studies the image encryption algorithm on account of gyrator transform, and verifies the robustness of the gyrator transform algorithm under the influence of noise interference, shear attack, and other factors through the high robust multimedia image encryption and result analysis of gyrator transform.


Sign in / Sign up

Export Citation Format

Share Document