
Internet Policies and Issues. Volume 7.
Title:
Internet Policies and Issues. Volume 7.
Author:
Kutais, B.G.
ISBN:
9781617283192
Personal Author:
Physical Description:
1 online resource (375 pages)
Series:
Internet Policies and Issues ; v.7
Internet Policies and Issues
Contents:
INTERNET POLICIES AND ISSUES, VOLUME 7 -- INTERNET POLICIES AND ISSUES, VOLUME 7 -- CONTENTS -- PREFACE -- Chapter 1 MOBILE MIDDLEWARE PLATFORMS FOR CONTENT AND SERVICE CREATION, MANAGEMENT AND DELIVERY: A TECHNOLOGY CLASSIFICATION FRAMEWORK -- Abstract -- 1. Introduction -- 2. Methodology -- 3. The MCSDP Technology Classification Model -- 3.1. The MCSDP Functional Architecture -- 3.2. The MCSDP Functional Architecture -- 3.3. The Identification of the Model's Technology Classification Variables -- 3.4. The Overall MCSDP Technology Classification Model -- 4. The Model Application to the Companies Sample -- 4.1. The Offer Distribution on the Five MCSDP Categories -- 4.2.The Mmtps Choices Concerning the Technology Classification Variables -- 5. Conclusion -- References -- Chapter 2 USING DIGITAL WATERMARKING TO IDENTIFY AUDIO AND VIDEO SOFTWARE PRODUCTS -- Abstract -- 1. Introduction -- 2. Software Product Serialization -- 2.1. Effectiveness of Identifying Software Product -- 2.2. Software Product Serialization Using Digital Watermarking Techniques -- 2.3. Underlying Watermarking Algorithm -- 2.4. Problems with Conventional Watermark Detection Improvement Methods -- 3. Audio Watermark Detection Using Reference Signal -- 3.1. Research Approach -- 3.2. Proposed System for Audio Watermark Detection Using Re-synthesized Voice -- 3.3. Process Flow of Audio Watermark Embedding and Detection -- 3.4. Evaluation for Synthesized Voice -- 3.4.1. Experimental Conditions -- 3.4.2. Results of Audibility Test -- 3.4.3. Results of Robustness Test -- 3.5. Summary of Evaluation for Audio Watermark Application -- 4. Video Watermark Detection Using Reference Signal -- 4.1. Use Case of Illegal Copies of Video Encoder -- 4.2. Problems with Conventional Methods -- 4.3. Proposed System for Video Watermark Detection Using Degraded Original Images.
4.3.1. Research Approach -- 4.3.2. Design of Proposed System -- 4.3.3. Prototype -- 4.4. System Evaluations -- 4.4.1. Experimental Conditions -- 4.4.2. Image Quality -- 4.4.3. Robustness Compared with Conventional Methods -- 4.4.4. Effect of Estimated Parameter on Detection Performance -- 4.4.5. Summary of Evaluation for Video Watermark Application -- 5. Conclusion -- References -- Chapter 3 A CASE OF MIDDLEWARE FOR INFORMATION SYSTEMS OF PUBLIC TRANSPORT BY ROAD -- Abstract -- 1. Introduction -- 2. General Description of the System -- 2.1. Ubiquitous Devices -- 2.2. Ubiquitous Network -- 2.2.1. Data Transference -- 2.2.2. Scheme Based on Mailboxes -- 3. Middleware -- 3.1. Ubiquitous Applications Interface -- 3.2. Actions Triggered by Context -- 3.3. Ubiquitous Network Interface -- 4. Ubiquitous Programs -- 4.1. Payment System -- 5. Conclusions -- Acknowledgement -- References -- Chapter 4 INSTANT MESSAGING IN PRIMARY SCHOOLS -- Abstract -- Introduction -- Using IM in the School Setting -- Facilitating Access between Schools -- Contacting Experts -- Ubiquitous Learning -- Using IM to Facilitate Links to the Home -- IM and Literacy -- Safety Issues -- Stranger Danger -- Cyberbullying -- Education -- Participation -- Advantages of Using IM in Primary Schools -- Challenges of Using IM in Primary Schools -- Conclusion -- References -- Chapter 5 SEARCH ENGINE INTERFACES -- Abstract -- Introduction -- Common Search Engine Interfaces -- User Queries -- Query Processing -- Conventional Components -- Augmentations -- Advanced Search Engine Interfaces -- Searching for Text -- Natural Language Interfaces -- Query Diagram Interfaces -- Searching for Different Media -- Searching by Different Users -- Searching with Different Devices -- Conclusion -- References.
Chapter 6 SOCIAL MOTIVES FOR WINDOWS LIVE MESSENGER USE: RELATIONS TO SOCIAL CAPITAL THEORY AND DEPRESSIVE PERSONALITY STYLES -- Abstract -- Introduction -- Social Capital -- Computer Mediated Communication -- Individual Motivations -- Poor Relationships and Depression -- The Present Research -- Method -- Participants -- Materials -- Procedure -- Results -- Data Reduction -- Correlations -- Discussion -- Individual-level Implications -- Conclusion -- References -- Chapter 7 FULL-TEXT SEARCH IN ELECTRONIC HEALTH RECORDS: CHALLENGES AND OPPORTUNITIES -- Abstract -- Introduction -- Advantages of Free Text -- Data Entry Methods -- Data Mining -- Search Engines for the Medical Record -- Hipaa and Privacy Regulations -- Typical Users and Use Cases for Searching Electronic Patient Care Data -- Distinctive Features of Emerse -- No Ranking of Search Results -- Stop Words and Synonyms -- Modifier Codes -- Presentation of Search Results -- Collaborative Search Features -- System Usage -- Evaluation -- Conclusion -- References -- Chapter 8 INSTANT MESSAGING: STANDARDS, PROTOCOLS, APPLICATIONS, AND RESEARCH DIRECTIONS -- Abstract -- 1. Introduction -- 2. Instant Messaging Fundamentals -- 2.1. How Instant Messaging Works -- 2.2. Architectures of Instant Messaging Systems -- 3. Instant Messaging Protocols -- 3.1. Open Standard Protocols -- A. XMPP -- B. SIMPLE -- 3.2. Proprietary Protocols -- 4. IM Security -- 4.1. Authentication in IM -- 4.2. IM Security Threats -- A. Worm -- B. Trojan Horses -- C. Denial-of-Service (dos) Attack -- D. Man-in-the-Middle (mitm) Attack -- E. Buffer Overflow Attack -- 5. Practical Uses of IM -- 5.1. Business Uses -- 5.2. Educational Uses -- 5.3. Social Uses -- 6. Research on IM -- 7. Conclusion -- References -- Chapter 9 INSTANT MESSAGING COMMUNICATION: SELF-DISCLOSURE, INTIMACY, AND DISINHIBITION -- Abstract.
Introduction -- Method -- Inclusion and Exclusion Criteria -- Search Strategy -- Results -- Adolescents -- College Students -- Conclusions -- Self-disclosure -- Intimacy -- Disinhibition -- Limitations and Future Research -- References -- Chapter 10 DIGITAL WATERMARKING FOR IPR PROTECTION OF MULTIMEDIA CONTENTS -- Abstract -- 1. Introduction -- 1.1. Information Security and Issues -- 1.2. Techniques for An Information Security -- 2. Digital Watermarking Technology -- 2.1. Digital Watermarking System Model -- 2.1.1. Watermark Generation -- 2.1.2. Watermark Embedding -- 2.1.3. Watermark Extraction -- 2.2. Digital Watermarking System Requirements -- 2.2.1. Perceptibility -- 2.2.2. Robustness -- 2.2.3. Payload Capacity -- 2.2.4. Watermark Security -- 2.2.5. Need of Original Data -- 2.3. Types and Applications -- 2.3.1. Digital Watermarking in Different Media -- 2.3.2. Types of Digital Watermarking -- 2.3.3. Digital Watermarking Applications -- 3. Security Issues in Digital Watermarking -- 4. Digital Watermarking Techniques for Images -- 4.1. Techniques for Images in Spatial Domain -- 4.2. Techniques for Images in Transform Domain -- 5. Observations -- 6. Conclusion -- References -- Chapter 11 PATHWAY SEARCH ENGINE FOR EXPRESSION PROTEOMICS -- Abstract -- Introduction -- Conclusion -- Acknolwledgments -- References -- Chapter 12 BIOMEDICAL LITERATURE ANALYSIS: CURRENT STATE AND CHALLENGES -- Abstract -- 1. Introduction -- 2. Brief History of Biomedical Literature Analysis -- 3. Current Areas of Research -- 3.1. Information Retrieval: Finding the Papers -- 3.1.1. Brief Descriptions of Information Retrieval Systems -- 3.2. Abbreviation Recognition: Aliasing the Names -- 3.3. Named Entity Recognition: Identifying the Players -- 3.4. Information Extraction: Getting the Facts -- 3.4.1. Co-occurrence.
3.4.1.1. Brief Descriptions of Co-occurrence Systems -- 3.4.2. Natural Language Processing / Template Matching -- 3.4.2.1. Brief Descriptions of Natural Language Processing/Template Matching Systems -- 3.4.3. Applications of Biomedical Information Extraction -- 3.5. Text Mining: Finding Hypotheses -- 4. Related Areas of Importance -- 4.1. Corpora -- 4.2. Databases -- 4.3. Evaluation Strategies -- 5. Challenges of Biomedical Literature Analysis -- 6. Conclusion -- Acknowledgment -- References -- Chapter 13 INTERACTION DESIGN PROCESS FOR AMBIENT INFORMATION IN UBIQUITOUS SPACE -- Analysis for Middleware -- Implementation Process -- Idea and Analysis -- Conclusion -- Chapter14CHRONOLOGIZINGWEBPAGESFOREFFECTIVESEARCH -- Abstract -- 1.Introduction -- 2.SearchEngineOverview -- 3.RankingAlgorithmsOverview -- 3.1.PageRankAlgorithm -- 3.2.TrustRankAlgorithm -- 3.3.HilltopAlgorithm -- 3.4.Hyperlink-InducedTopicSearch(HITS) -- 4.Metasearching -- 4.1.RankingMetasearchResults -- 5.TemporalRankingofWebPages -- 5.1.WhatIsWebPageChronologizing? -- 5.2.HowToAchieveChronolization? -- 6.Summary -- References -- Chapter15TOWARDSONDEMANDITSERVICEDEPLOYMENT -- Abstract -- 1.Introduction -- 2.BackgroundandRelatedWork -- 3.ServiceDeploymentProcess -- 3.1.DeploymentProcessOverview -- 3.2.DeploymentModelandProblemDefinition -- 4.TheCyberaideProjectandCyberaideCreative -- 4.1.TheCyberaideProject -- 4.2.CyberaideCreativeParadigm -- 5.EmergencyServicesDirectory -- 5.1.Overview -- 5.2.DeploymentStrategyOverview -- 6.DeploymentSolution -- 7.SolutionEvaluation -- 8.FutureWorkandConclusion -- References -- Chapter16ACOMPLETEPHYSICALLAYERARCHITECTUREFORROBUSTHIGHRATESPEECHWATERMARKINGONANALOGCHANNELSANDIPNETWORKS -- Abstract -- 1.Introduction -- 2.DigitalWatermarking:ABriefReview -- 8.FutureWorkandConclusion -- References -- 3.SpeechWatermarking.
3.1.LinearPredictiveCoding-basedModel.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Genre:
Electronic Access:
Click to View