To see the other types of publications on this topic, follow the link: Dynamic webpages.

Journal articles on the topic 'Dynamic webpages'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Dynamic webpages.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Thangasamy, Vasantha. "Efficacious Hyperlink Based Similarity Measure Using Heterogeneous Propagation of PageRank Scores." International Journal of Information Retrieval Research 9, no. 4 (October 2019): 36–49. http://dx.doi.org/10.4018/ijirr.2019100104.

Full text
Abstract:
Information available on the internet is wide, diverse, and dynamic. Since an enormous amount of information is available online, finding similarity between webpages using efficient hyperlink analysis is a challenging task. In this article, the researcher proposes an improved PageSim algorithm which measurse the importance of a webpage based on the PageRank values of connected webpage. Therefore, the proposed algorithm uses heterogeneous propagation of the PageRank score, based on the prestige measure of each webpage. The existing and the improved PageSim algorithms are implemented with a sample web graph. Real time Citation Networks, namely the ZEWAIL Citation Network and the DBLP Citation Network are used to test and compare the existing and improved PageSim algorithms. By using this proposed algorithm, it has been found that a similarity score between two different webpages significantly increases based on common information features and significantly decreases based on distinct factors.
APA, Harvard, Vancouver, ISO, and other styles
2

Sun, Huiyou, Shuangyuan Li, and Mingqian Jia. "Design and Implementation of 3D Effect Web Page Based on JavaScript Technology." ITM Web of Conferences 25 (2019): 02004. http://dx.doi.org/10.1051/itmconf/20192502004.

Full text
Abstract:
With the development of Internet technology, people's production and life are greatly influenced. Web design is widely used in Internet world. Web design and user experience are inseparable. In the pursuit of webpage layout and aesthetics, but also to add user interaction functions, Dynamic effects technology based on JavaScript can achieve user interaction requirements. The perfect combination of JavaScript dynamic effects and interactive features is the best way to achieve webpage effects. This paper expounds the application method of JavaScript, and studies the special effect application of JavaScript technology in webpages through examples.
APA, Harvard, Vancouver, ISO, and other styles
3

Deng, Ziyun, and Tingqin He. "A Method for Filtering Pages by Similarity Degree based on Dynamic Programming." Future Internet 10, no. 12 (December 13, 2018): 124. http://dx.doi.org/10.3390/fi10120124.

Full text
Abstract:
To obtain the target webpages from many webpages, we proposed a Method for Filtering Pages by Similarity Degree based on Dynamic Programming (MFPSDDP). The method needs to use one of three same relationships proposed between two nodes, so we give the definition of the three same relationships. The biggest innovation of MFPSDDP is that it does not need to know the structures of webpages in advance. First, we address the design ideas with queue and double threads. Then, a dynamic programming algorithm for calculating the length of the longest common subsequence and a formula for calculating similarity are proposed. Further, for obtaining detailed information webpages from 200,000 webpages downloaded from the famous website “www.jd.com”, we choose the same relationship Completely Same Relationship (CSR) and set the similarity threshold to 0.2. The Recall Ratio (RR) of MFPSDDP is in the middle in the four filtering methods compared. When the number of webpages filtered is nearly 200,000, the PR of MFPSDDP is highest in the four filtering methods compared, which can reach 85.1%. The PR of MFPSDDP is 13.3 percentage points higher than the PR of a Method for Filtering Pages by Containing Strings (MFPCS).
APA, Harvard, Vancouver, ISO, and other styles
4

Yu, Fang. "Application of Computer-Based Distance Education with Dynamic Webpages in Financial Management Courses." International Journal of Emerging Technologies in Learning (iJET) 16, no. 14 (July 28, 2021): 99. http://dx.doi.org/10.3991/ijet.v16i14.24047.

Full text
Abstract:
Financial management is one of most important type of professional courses in the discipline of business management. The information-based teaching of the courses is a hot spot in the research of professional education. As a cutting-edge information technology, webpage technology provides a good information carrier that enables fast sharing, timely access, and opinion exchange of information. The application of information technology to distance education of financial management could promote the learning efficiency of the students. This paper mainly designs a computer-based distance education system with the aid of dynamic webpages. The system encompasses such modules like database, classroom module, and question and answer (Q&A) module. By introducing the operating mechanism of the system, this paper fully integrates the teaching resources and practices of financial management into the dynamic webpage-based system, providing students or trainees a convenient way of online learning. Through the integration of information technology in education, the proposed system promotes the reform of traditional education model, helps to improve teaching quality and learning efficiency, and enhances the students’ ability to analyze and implement financial management.
APA, Harvard, Vancouver, ISO, and other styles
5

Yuk, Simun, and Youngho Cho. "A Time-Based Dynamic Operation Model for Webpage Steganography Methods." Electronics 9, no. 12 (December 10, 2020): 2113. http://dx.doi.org/10.3390/electronics9122113.

Full text
Abstract:
The webpage steganography technique has been used for a covert communication method for various purposes in which a sender embeds a secret message into a plain webpage file like an HTML file by using various steganography methods. With human eyes, it is very difficult to distinguish between the original webpage (cover webpage) and the modified webpage with the secret data (stego webpage) because both are displayed alike in a web browser. In this approach, when two communicating entities want to share a secret message, a sender uploads a stego webpage to a web server or modifies an existing webpage in the web server by using a webpage steganography method, and then a receiver accesses the stego webpage to download and extract the embedded secret data from it. Meanwhile, according to our extensive survey, we observed that most webpage steganography methods focused on proposing or improving steganography algorithms but did not well address how to operate a stego webpage as time passes. However, if a stego webpage is used in a static way such that the stego webpage does not change and is constantly exposed to web clients until the sender removes it, such a static operation approach will limit or badly affect the hiding capacity and undetectability of a webpage steganography method. By this motivation, in this paper, we proposed a time-based dynamic operation model (TDOM) that improves the performance of existing webpage steganography methods in terms of hiding capacity and undetectability by dynamically replacing the stego webpage with other stego webpages or the original webpage. In addition, we designed two time-based dynamic operation algorithms (TDOA-C and TDOA-U), which improve the hiding capacity of existing methods and TDOA-U for improving the undetectability of existing methods, respectively. To validate our model and show the performance of our proposed algorithms, we conducted extensive comparative experiments and numerical analysis by implementing two webpage steganography methods with our TDOM (CCL with TDOA-C and COA with TDOA-C) and tested them in the web environment. According to our experiments and analysis, our proposed algorithms could significantly improve the hiding capacity and undetectability of two existing webpage steganography methods.
APA, Harvard, Vancouver, ISO, and other styles
6

Dai, Lu, Wei Wang, and Wanneng Shu. "An Efficient Web Usage Mining Approach Using Chaos Optimization and Particle Swarm Optimization Algorithm Based on Optimal Feedback Model." Mathematical Problems in Engineering 2013 (2013): 1–8. http://dx.doi.org/10.1155/2013/340480.

Full text
Abstract:
The dynamic nature of information resources as well as the continuous changes in the information demands of the users has made it very difficult to provide effective methods for data mining and document ranking. This paper proposes an efficient particle swarm chaos optimization mining algorithm based on chaos optimization and particle swarm optimization by using feedback model of user to provide a listing of best-matching webpages for user. The proposed algorithm starts with an initial population of many particles moving around in aD-dimensional search space where each particle vector corresponds to a potential solution of the underlying problem, which is formed by subsets of webpages. Experimental results show that our approach significantly outperforms other algorithms in the aspects of response time, execution time, precision, and recall.
APA, Harvard, Vancouver, ISO, and other styles
7

Wu, Yinqi, and Cecilia Yin Mei Cheong. "The Hypertextual Gateway of Elite Chinese Universities: A Genre Analysis of the ‘About’ Webpages." Issues in Language Studies 9, no. 2 (December 3, 2020): 94–125. http://dx.doi.org/10.33736/ils.2365.2020.

Full text
Abstract:
This article reports a genre study of the “About” webpages published in the websites of nine elite Chinese universities (the C9 League). This study explored the macro-level rhetorical structure and communicative purposes, followed by a micro-level discussion of the discursive strategies employed in this institutionalised genre. The findings reveal a dynamic interweaving of two distinct discursive resources – linguistic and multimodal – rhetorically organised through the interplay between the mixing of thirteen move types and various interdiscursive elements. The analytical results indicate that the trend of marketisation, other than a predominant rhetorical feature of being informative, indeed influences the institutional web structuring through employing branding strategies to promote academic excellence as well as strengthen relationship with web readers. The dynamic interactions unfolded by this research not only deepen users’ knowledge of a previously undiscovered yet discursively complex web genre, but also contribute to theoretical and methodological development in genre studies in this digital era.
APA, Harvard, Vancouver, ISO, and other styles
8

Solbjør, Marit, and Karen Willis. "Informed Choice and Nudging in Mammography Screening: A Discourse Analysis of Australian and Scandinavian Webpages." Science, Technology and Society 26, no. 1 (February 8, 2021): 64–80. http://dx.doi.org/10.1177/0971721820964890.

Full text
Abstract:
The tension between providing adequate information and achieving sufficiently high participation in population-based screening programmes, such as mammography, represents an ongoing challenge for health authorities. The theory of nudge illuminates how individuals may be nudged towards healthy behaviours without restricting individual freedom of choice. We analyse information provided on health authority webpages and uncover the subject positions available to healthy women deciding whether to participate in screening. We do so by comparing different policy contexts where women must opt in to screening (Australia) or opt out (Scandinavia). We conclude that information is used to nudge women towards screening. Alongside focus on the ease of being screened, tensions exist in simultaneously portraying women as being at risk of breast cancer and providing reassurance of their healthy state. We identify persuasive devices that emphasise responsibility to participate in screening and conclude that webpages play a dynamic role in authorities’ attempts to, on one hand, achieve high participation in screening, and on the other, promote mammography screening as an individual choice.
APA, Harvard, Vancouver, ISO, and other styles
9

Khor, Ean-Teng, and Sheng-Hung Chung. "PERFORMANCE EVALUATION OF CONCEPTUAL MODEL INSTANCE (CMI) DATA FOR E-LEARNING MULTIMEDIA PRESENTATIONS IN SCORM RUN-TIME ENVIRONMENT." Asian Association of Open Universities Journal 5, no. 2 (September 1, 2010): 78–88. http://dx.doi.org/10.1108/aaouj-05-02-2010-b003.

Full text
Abstract:
The paper aims to describe dynamic presentation generator that presents the same content in different ways through different media object and presentation layouts. The different media presentation will then display to student via Learning Management Systems (LMS). The paper also presents SCORM Compliant Learning Objects and Conceptual Model Instance (CMI). The prototype is then evaluated to demonstrate the performance of the students where the CMI data are collected for each student. The data collected include media preference, test score and time spent to study the Computer Programming subjects. The results show that with more media object used, students spent more time on the Webpages. However, the results also showed that using more media object may not produce better results in the assessment.
APA, Harvard, Vancouver, ISO, and other styles
10

Alex, Scaria, and T. Dhiliphan Rajkumar. "Adaptive Spider Bird Swarm Algorithm-Based Deep Recurrent Neural Network for Malicious JavaScript Detection Using Box-Cox Transformation." International Journal of Open Source Software and Processes 11, no. 4 (October 2020): 46–59. http://dx.doi.org/10.4018/ijossp.2020100103.

Full text
Abstract:
JavaScript is a scripting language that is commonly used in the web pages for providing dynamic functionality in order to enhance user experience. Malicious JavaScript in webpages on internet is an important security issue due to their potentially and universality severe impact. Finding the malicious JavaScript is usually more difficult and time-consuming task in the research community. Hence, an adaptive spider bird swarm algorithm-based deep recurrent neural network (adaptive SBSA-based deep RNN) is proposed for detecting the malicious JavaScript codes in web applications. However, the proposed adaptive SBSA is designed by integrating the adaptive concept with the bird swarm algorithm (BSA) and spider monkey optimization (SMO). With the deep RNN classifier, the complexity issues exists in detecting the malicious codes is effectively resolved through the process of hierarchical computation. Due to the efficiency of the proposed approach, it can evaluate under large real-life datasets.
APA, Harvard, Vancouver, ISO, and other styles
11

Silva, Rui Filipe, Raul Barbosa, and Jorge Bernardino. "Intrusion Detection Systems for Mitigating SQL Injection Attacks." International Journal of Information Security and Privacy 14, no. 2 (April 2020): 20–40. http://dx.doi.org/10.4018/ijisp.2020040102.

Full text
Abstract:
Databases are widely used by organizations to store business-critical information, which makes them one of the most attractive targets for security attacks. SQL Injection is the most common attack to webpages with dynamic content. To mitigate it, organizations use Intrusion Detection Systems (IDS) as part of the security infrastructure, to detect this type of attack. However, the authors observe a gap between the comprehensive state-of-the-art in detecting SQL Injection attacks and the state-of-practice regarding existing tools capable of detecting such attacks. The majority of IDS implementations provide little or no protection against SQL Injection attacks, with exceptions like the tools Bro and ModSecurity. In this article, the authors compare these tools using the CSIC dataset in order to examine the state-of-practice in database protection from SQL Injection attacks, identifying the main characteristics and implementation details needed for IDSs to successfully detect such attacks. The experiments indicate that signature-based IDS provide the greatest coverage against SQL Injection.
APA, Harvard, Vancouver, ISO, and other styles
12

Aldwairi, Monther, Musaab Hasan, and Zayed Balbahaith. "Detection of Drive-by Download Attacks Using Machine Learning Approach." International Journal of Information Security and Privacy 11, no. 4 (October 2017): 16–28. http://dx.doi.org/10.4018/ijisp.2017100102.

Full text
Abstract:
Drive-by download refers to attacks that automatically download malwares to user's computer without his knowledge or consent. This type of attack is accomplished by exploiting web browsers and plugins vulnerabilities. The damage may include data leakage leading to financial loss. Traditional antivirus and intrusion detection systems are not efficient against such attacks. Researchers proposed plenty of detection approaches mostly passive blacklisting. However, a few proposed dynamic classification techniques, which suffer from clear shortcomings. In this paper, we propose a novel approach to detect drive-by download infected web pages based on extracted features from their source code. We test 23 different machine learning classifiers using data set of 5435 webpages and based on the detection accuracy we selected the top five to build our detection model. The approach is expected to serve as a base for implementing and developing anti drive-by download programs. We develop a graphical user interface program to allow the end user to examine the URL before visiting the website. The Bagged Trees classifier exhibited the highest accuracy of 90.1% and reported 96.24% true positive and 26.07% false positive rate.
APA, Harvard, Vancouver, ISO, and other styles
13

Qi, Tao, Bo Wang, and Su Juan Zhao. "The Research of Website Tamper-Resistant Technology." Advanced Materials Research 850-851 (December 2013): 475–78. http://dx.doi.org/10.4028/www.scientific.net/amr.850-851.475.

Full text
Abstract:
Webpage tamperproof technology is a website technology to protect webpage not to display tamper contents and to carry out real-time recovery. Webpage tamperproof system uses advanced Web server core embedded technology and tamper detection technology based on cryptography to give a comprehensive protection of static webpage and dynamic webpage of the website. Webpage tamperproof system supports the automatic release, tamper detection, application protection, warning, and real-time recovery of webpage, guarantees the safety of various links of transmission, identification, address access, form submission, and auditing, fully eliminates the possibility of access to tampered webpage in a real-time manner, and puts an end to any tamper of backstage database in a manner of Web.
APA, Harvard, Vancouver, ISO, and other styles
14

Park, Hyunjae, and Youngjune Choi. "Dynamic Power Management for Webpage Loading on Mobile Devices." Journal of KIISE 42, no. 12 (December 15, 2015): 1623–28. http://dx.doi.org/10.5626/jok.2015.42.12.1623.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Grady, Mike, Usha Venugopal, Katia Robert, Graham Hurrell, and Oliver Schnell. "Health Care Professionals’ Clinical Perspectives and Acceptance of a Blood Glucose Meter and Mobile App Featuring a Dynamic Color Range Indicator and Blood Sugar Mentor: Online Evaluation in Seven Countries." JMIR Human Factors 6, no. 3 (July 3, 2019): e13847. http://dx.doi.org/10.2196/13847.

Full text
Abstract:
Background Despite many new therapies and technologies becoming available in the last decade, people with diabetes continue to struggle to achieve good glycemic control. Innovative and affordable solutions are needed to support health care professionals (HCPs) to improve patient outcomes. Objective To gather current self-management perceptions of HCPs in seven countries and investigate HCP satisfaction with a new glucose meter and mobile app featuring a dynamic color range indicator and a blood sugar mentor. Methods A total of 355 HCPs, including 142 endocrinologists (40.0%), 108 primary care physicians (30.4%), and 105 diabetes nurses (29.6%), were recruited from the United Kingdom (n=50), France (n=50), Germany (n=50), India (n=54), Algeria (50), Canada (n=51), and the United States (n=50). HCPs experienced the OneTouch Verio Reflect glucose meter and the OneTouch Reveal mobile app online from their own office computers using interactive demonstrations via webpages and multiple animations. After providing demographic and clinical practice insights, HCPs responded to statements about the utility of the system. Results Concerning current practice, 83.1% (295/355) of HCPs agreed that poor numeracy or health literacy was a barrier for their patients. A total of 85.9% (305/355) and 92.1% (327/355) of HCPs responded that type 2 diabetes (T2D) and type 1 diabetes (T1D) patients were aware of what represented a low, in-range, or high blood glucose result. Only 62.0% (220/355) felt current glucose meters made it easy for patients to understand if results were in range. A total of 50.1% (178/355) and 78.0% (277/355) of HCPs were confident that T1D and T2D patients took action for low or high results. A total of 87.0% (309/355) agreed that the ColorSure Dynamic Range Indicator could help them teach patients how to interpret results and 88.7% (315/355) agreed it made them more aware of hyper- and hypoglycemic results so they could take action. A total of 83.7% (297/355) of HCPs agreed that the Blood Sugar Mentor feature gave personalized guidance, insight, and encouragement so patients could take action. A total of 82.8% (294/355) of HCPs also agreed that the Blood Sugar Mentor provided real-time guidance to reinforce the goals HCPs had set so patients could take steps to manage their diabetes between office visits. After experiencing the full system, 85.9% (305/355) of HCPs agreed it was beneficial for patients with lower numeracy or health literacy; 96.1% (341/355) agreed that it helped patients understand when results were low, in range, or high; and 91.0% (323/355) agreed that the way it displayed diabetes information would make patients more inclined to act upon results. A total of 89.0% (316/355) of HCPs agreed that it would be helpful for agreeing upon appropriate in-range goals for their patients for their next clinic visit. Conclusions This multi-country online study provides evidence that HCPs were highly satisfied with the OneTouch Verio Reflect meter and the OneTouch Reveal mobile app. Each of these use color-coded information and the Blood Sugar Mentor feature to assist patients with interpreting, analyzing, and acting upon their blood glucose results, which is particularly beneficial to keep patients on track between scheduled office visits.
APA, Harvard, Vancouver, ISO, and other styles
16

Rahim, Robbi, S. Murugan, Reham R. Mostafa, Dr Anil Kumar Dubey, R. Regin, Dr Vikram Kulkarni, and Dr K. S. Dhanalakshmi. "Detecting the Phishing Attack Using Collaborative Approach and Secure Login through Dynamic Virtual Passwords." Webology 17, no. 2 (December 21, 2020): 524–35. http://dx.doi.org/10.14704/web/v17i2/web17049.

Full text
Abstract:
User data protection is a major problem in the technical world. To get critical data from people such as bank account, credit card details and passwords, fraudulent people use different techniques for their advantages. Misuse of user credentials affects many industry sectors day by day. The fraudulent practice where more people connected to a network revealing sensitive data of individual, group or a company of legitimate sources called phishing. The aids for the hackers are forged websites and emails which look similar as original. There are different anti-phishing methods are proposed which follows various methods, to protect users against phishing. Proposed technique has detection of phishing at various stages. It contains incoming mail analysis for its feature as well as source. If mail has link to webpage, that cautious webpage is checked for its legitimateness. It is examined by using two methods. For popular sites, webpage content is compared with content of known legitimate site. The second step is to find whether any cautious site is increasingly dependable on any related pages to calculate relationship strength indirectly or directly associated pages. To protect from phishing attacks, these techniques uses virtual passwords for logging into sites.
APA, Harvard, Vancouver, ISO, and other styles
17

Bai, Xiao Jun, and Fu Dan Wu. "Research on Web Page Staticize Technology in E-Commerce System." Applied Mechanics and Materials 427-429 (September 2013): 2179–83. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2179.

Full text
Abstract:
Dynamic webpage technology is widely used in web development, but for a large e-commerce system, it will bring huge workload to the server if access database frequently and create web page dynamically, thus the server may breakdown on this condition. In this paper, the author introduced the techniques of web page staticize, based on the design of an E-shop system, puts forward the principle, strategy and method for staticizing dynamic page, and verified the effectiveness of this solution by experiments.
APA, Harvard, Vancouver, ISO, and other styles
18

Han, Chang Jun. "Research on CGI in Embedded System." Applied Mechanics and Materials 539 (July 2014): 534–37. http://dx.doi.org/10.4028/www.scientific.net/amm.539.534.

Full text
Abstract:
This paper mainly studies the method of dynamic embedded Web server technology and its realization. Taking S3C2440 processor as the core hardware platform, constructed the software system of based on Linux operating system on the hardware platform; Analysis the key technology of web server, select Boa as the embedded web server, Boa server and CGIC database successfully transplanted and run the static Webpage; The paper detailed analysis of the CGI technology and using C language to compile the CGI program to realize dynamic Web server, realize the use of the Web browser to the remote Web server access control function.
APA, Harvard, Vancouver, ISO, and other styles
19

Wang, Feng, XiaoMing Qin, Yizhen Wang, and Xinjiang Wei. "System of Automatic Chinese Webpage Summarization Based on The Random Walk Algorithm of Dynamic Programming." Open Cybernetics & Systemics Journal 9, no. 1 (September 15, 2015): 1315–22. http://dx.doi.org/10.2174/1874110x01509011315.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Lin, Pei Guang, Su Ying Zhou, and Lin Zhao. "Design and Implementation of the Automatic Search and Price-Comparison System Based on the Deep Web." Advanced Materials Research 121-122 (June 2010): 209–14. http://dx.doi.org/10.4028/www.scientific.net/amr.121-122.209.

Full text
Abstract:
With the development of the Internet, the online shopping was increasingly into people's life. In order to provide convenient search and price comparison service for shopping online, this article designs and implements automatic search and comparison system based on Deep web. To overcome the difficulties of data capture from the current dynamic webpage, the background’s data capture of this system implements by watir. The search module for end-users implements by JavaEE. The practical application shows that this system can fully satisfy people’s needs in search and comparison.
APA, Harvard, Vancouver, ISO, and other styles
21

Laguna, Javier Rodriguez Rodriguez, and Manuel Pancorbo Castro. "Online manual on numerical computation." New Trends and Issues Proceedings on Humanities and Social Sciences 4, no. 5 (November 16, 2017): 17–22. http://dx.doi.org/10.18844/prosoc.v4i5.2668.

Full text
Abstract:
We present a tutorial on numerical computation for undergrads in Sciences, Maths and Engineering, based on Octave, a popular framework for numerical analysis which, in addition, is FOSS (Free & Open Source Software). So it can be freely run on several operating systems: Windows, MacOS, any GNU-Linux flavour, FreeBSD and, even, on Android mobile platform. The tutorial is given as a static web page with almost no extra complexities, such as database engine, dynamic rendering via PHP or similar. All the workflow is arranged through FOSS with full respect to standards. Keywords: FOSS; octave; webpage; tutorial; markup language; markdown
APA, Harvard, Vancouver, ISO, and other styles
22

Wu, Ke, Spencer Wheatley, and Didier Sornette. "Classification of cryptocurrency coins and tokens by the dynamics of their market capitalizations." Royal Society Open Science 5, no. 9 (September 2018): 180381. http://dx.doi.org/10.1098/rsos.180381.

Full text
Abstract:
We empirically verify that the market capitalizations of coins and tokens in the cryptocurrency universe follow power-law distributions with significantly different values for the tail exponent falling between 0.5 and 0.7 for coins, and between 1.0 and 1.3 for tokens. We provide a rationale for this, based on a simple proportional growth with birth and death model previously employed to describe the size distribution of firms, cities, webpages, etc. We empirically validate the model and its main predictions, in terms of proportional growth (Gibrat's Law) of the coins and tokens. Estimating the main parameters of the model, the theoretical predictions for the power-law exponents of coin and token distributions are in remarkable agreement with the empirical estimations, given the simplicity of the model. Our results clearly characterize coins as being ‘entrenched incumbents’ and tokens as an ‘explosive immature ecosystem’, largely due to massive and exuberant Initial Coin Offering activity in the token space. The theory predicts that the exponent for tokens should converge to 1 in the future, reflecting a more reasonable rate of new entrants associated with genuine technological innovations.
APA, Harvard, Vancouver, ISO, and other styles
23

Yang, Yu Xia, Cheng You Yuan, and Na Wang. "Research on Manufacturing Enterprise Training Management Information System Based on B/S Architecture." Applied Mechanics and Materials 340 (July 2013): 116–21. http://dx.doi.org/10.4028/www.scientific.net/amm.340.116.

Full text
Abstract:
On the basis of the real needs of human resource training center in training, the staff training information management in the course of training is surveyed, in-depth analysis and research of complex information is carried out, especially the process management of training plan approval. With wide application and good prospects of the B/S three layers system architecture, enterprise training management information system is developed, in the tomcat5.5 and JDK1.5 environment. With JSP dynamic Webpage technology, using SQL Server 2000 as database server, different permissions of the different identity of users being controlled by E-R model in field. The workload of person training is reduced and efficiency is improved.
APA, Harvard, Vancouver, ISO, and other styles
24

Sbardelotto, Moisés. "The Sacred in Bits and Pixels: An Analysis of the Interactional Interface in Brazilian Catholic Online Rituals." Journal of Religion, Media and Digital Culture 3, no. 2 (December 6, 2014): 82–115. http://dx.doi.org/10.1163/21659214-90000053.

Full text
Abstract:
Through digital technologies, a new form of communicational interaction between the user and the sacred occurs in an online religious experience. This phenomenon is illustrated in practice by numerous religious services present in the online Catholic environment, which manifest new modes of discourse and religious practices, beyond the scope of the traditional church – what I term here “online rituals” – marked by a process of mediatization of religion. In this paper, from a corpus of four Brazilian websites, I analyze key concepts for the understanding of this phenomenon, including digital mediatization and interface. I examine, in these Brazilian Catholic websites, the communicational configurations of the religious experience from five areas of the interactional interface: the screen; peripherals; the organizational structure of content on websites; the graphic composition of the webpages; and possible interface failures. Finally, I examine a shift in the communicational dynamics of religion today, marked by new materialities present in online religious rituals.
APA, Harvard, Vancouver, ISO, and other styles
25

Tykal, Petr, Diana Brnovik, and Jaromír Landa. "Creating a Food Menu Application for Mendel University in Brno." Acta Universitatis Agriculturae et Silviculturae Mendelianae Brunensis 68, no. 1 (2020): 275–80. http://dx.doi.org/10.11118/actaun202068010275.

Full text
Abstract:
The presented paper describes the creation of a mobile application module for showing a current menu at Mendel University cafeterias. Nowadays, the students and the university staff have the menu accessible through a static webpage. The presented solution serves as a dynamic presentation of the current menu for all Mendel University in Brno cafeterias. Most cafeteria menu applications use the REST architectures for the server backend. The contribution of the paper is in usage of the Google Firebase Realtime database as a server backend. Unlike in traditional REST architecture, the data e.g. the food rating is instantaneously changed and the users have an up to date information. Part of the presented solution is also a mobile application module for both Android and iOS where university students and staff can see the current cafeterias menus.
APA, Harvard, Vancouver, ISO, and other styles
26

Rama, Mr V. Seetha. "Precision Agriculture using IOT." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (July 10, 2021): 122–27. http://dx.doi.org/10.22214/ijraset.2021.36255.

Full text
Abstract:
Automation of farm activities can transform agricultural domain from being manual and static to intelligent and dynamic leading to higher production with lesser human supervision. This paper proposes an automated irrigation system which monitors and maintains the desired soil moisture content via automatic watering. Microcontroller ATMEGA328P on Arduino Uno platform is used to implement the control unit. The setup uses soil moisture sensors which measure the exact moisture level in soil. This value enables the system to use appropriate quantity of water which avoids over/under irrigation. IOT is used to keep the farmers updated about the status of sprinklers. Information from the sensors is regularly updated on a webpage using GSM-GPRS SIM900A modem through which a farmer can check whether the water sprinklers are ON/OFF at any given time. Also, the sensor readings are transmitted to a Thing speak channel to generate graphs for analysis.
APA, Harvard, Vancouver, ISO, and other styles
27

Gupta, Brij B., Pooja Chaudhary, and Shashank Gupta. "Designing a XSS Defensive Framework for Web Servers Deployed in the Existing Smart City Infrastructure." Journal of Organizational and End User Computing 32, no. 4 (October 2020): 85–111. http://dx.doi.org/10.4018/joeuc.2020100105.

Full text
Abstract:
Cross-site scripting is one of the notable exceptions effecting almost every web application. Hence, this article proposed a framework to negate the impact of the XSS attack on web servers deployed in one of the major applications of the Internet of Things (IoT) i.e. the smart city environment. The proposed framework implements 2 approaches: first, it executes vulnerable flow tracking for filtering injected malicious scripting code in dynamic web pages. Second, it accomplished trusted remark generation and validation for unveiling any suspicious activity in static web pages. Finally, the filtered and modified webpage is interfaced to the user. The prototype of the framework has been evaluated on a suite of real-world web applications to detect XSS attack mitigation capability. The performance analysis of the framework has revealed that this framework recognizes the XSS worms with very low false positives, false negatives and acceptable performance overhead as compared to existent XSS defensive methodologies.
APA, Harvard, Vancouver, ISO, and other styles
28

Butler, Rebecca L., Ann Katherine Hoobler, Lucy C. Stein, Erica S. Hoenig, Laura M. Lee, and Kathryn M. Kellogg. "Incorporating Human Factors Into a Healthcare System’s COVID-19 Communication Strategy." Proceedings of the International Symposium on Human Factors and Ergonomics in Health Care 10, no. 1 (June 2021): 175–79. http://dx.doi.org/10.1177/2327857921101154.

Full text
Abstract:
The COVID-19 era has been an age of change for healthcare systems worldwide. At the beginning of the pandemic in particular, there was a huge need to rapidly communicate new and constantly changing information with critical safety implications. Previously successful communication strategies were not adequate for this unprecedented challenge. At MedStar Health, the Quality & Safety team led a unique partnership between human factors experts, clinical teams, and the communications department to develop a three-pronged strategy for effective communication during the pandemic. This strategy incorporated the following components: 1) Using human factors and usability concepts to distill complex clinical information into easy-to-understand infographics for frontline associates; 2) Creating regular, succinct messaging to distribute the information and provide frequent updates throughout the healthcare system; and 3) Designing and maintaining a usable webpage where associates could access up-to-date information relevant to their specialty at any time, on or off the hospital network. This strategy, which was dynamic and adapted to user feedback, was supported by associates as a streamlined method for communicating important information throughout the pandemic.
APA, Harvard, Vancouver, ISO, and other styles
29

Gangurde, Roshan Anant, and Binod Kumar. "Biogeography optimization algorithm based next web page prediction using weblog and web content features." IAES International Journal of Artificial Intelligence (IJ-AI) 9, no. 2 (June 1, 2020): 327. http://dx.doi.org/10.11591/ijai.v9.i2.pp327-335.

Full text
Abstract:
<span lang="EN-US">Recommendation of web page as per users’ interest is a broad and important area of research. Researcher adopts user behavior from actions present in cookies, logs and search queries. This paper has utilized a prior webpage fetching model using web page prediction. For this purpose, web content in form of text and weblog features are analyzed. As per dynamic user behavior, proposed model LWPP-BOA (Logistic Web Page Prediction By Biogeography Optimization Algorithm) predict page by using genetic algorithm. Based on user actions, weblog feature are developed in form of association rules, while web content gives a set of relevant text patterns. Page prediction as per random user behavior is enhanced by means of Biogeography Optimization Algorithm where crossover operation is performed as per immigration and emigration values. Here population updation depends on other parameters of chromosome except fitness value. Experiments are conducted on real dataset having web content and weblogs. Results are compared using precision, coverage, M-Metric, MAE and RMSE parameters and it indicates that the proposed work is better than other approaches already in use.</span>
APA, Harvard, Vancouver, ISO, and other styles
30

Al-Bloush, Hani, and Badariah Solemon. "An Analysis of Intellectual Property Challenges in Crowdsourcing Platforms for Software Engineering." International Journal of Engineering & Technology 7, no. 4.35 (November 30, 2018): 354. http://dx.doi.org/10.14419/ijet.v7i4.35.22761.

Full text
Abstract:
Crowdsourced Software Engineering (CSE) is an application of online problem-solving model that provides a dynamic way of harnessing crowd intelligence in obtaining creative solutions. It consists of four elements: crowdsourcer, crowd, platform, and tasks. Although CSE offers various advantages to software engineering practices, recent research highlighted that there is still a lack of thorough understanding of Intellectual Property (IP) ownership rights of CSE elements. Therefore, management and control of CSE for obtaining adequate IP from the crowd is inevitable to reduce the risks of using that IP. This paper reviews existing CSE platforms and analyses associated IP challenges encountered by software engineering activities. 51 platforms were preselected and amongst these, analyses were performed on 37 CSE platforms. Exclusion of 11 platforms is on the basis of unavailability and 3 of which are linked to the same webpage. It also shows that 59% of the platforms acquire IP ownership of deliverables submitted by the crowd while 19% do not have a statement which provides clarity on IP ownership in their legal documents. This paper is significant in providing better understanding of IP risks of these CSE platforms and in assisting both crowdsourcers and the crowd in choosing crowdsourcing platforms based on the default IP ownership specification, which is often specified in legal documents of these platforms.
APA, Harvard, Vancouver, ISO, and other styles
31

Bonaiuto, Vincenzo, Paolo Boatto, Nunzio Lanotte, Cristian Romagnoli, and Giuseppe Annino. "A Multiprotocol Wireless Sensor Network for High Performance Sport Applications." Applied System Innovation 1, no. 4 (December 19, 2018): 52. http://dx.doi.org/10.3390/asi1040052.

Full text
Abstract:
The use of a network of wearable sensors placed on the athlete or installed into sport equipment is able to offer, in a real sport environment rather than in the unspecific spaces of a laboratory, a valuable real-time feedback to the coach during practice. This is made possible today by the coordinate use of a wide range of kinematic, dynamic, and physiological sensors. Using sensors makes training more effective, improves performance assessment, and can help in preventing injuries. In this paper, a new wireless sensor network (WSN) system for elite sport applications is presented. The network is made up of a master node and up to eight peripheral nodes (slave nodes), each one containing one or more sensors. The number of nodes can be increased with second level slave nodes; the nature of sensors varies depending on the application. Communication between nodes is made via a high performance 2.4 GHz transceiver; the network has a real-life range in excess of 100 m. The system can therefore be used in applications where the distance between nodes is long, for instance, in such sports as kayaking, sailing, and rowing. Communication with user and data download are made via a Wi-Fi link. The user communication interface is a webpage and is therefore completely platform (computer, tablet, smartphone) and operating system (Windows, iOS, Android, etc.) independent. A subset of acquired data can be visualized in real time on multiple terminals, for instance, by athlete and coach. Data from kayaking, karting, and swimming applications are presented.
APA, Harvard, Vancouver, ISO, and other styles
32

Kraheberger, S., S. Hoyas, and M. Oberlack. "DNS of a turbulent Couette flow at constant wall transpiration up to." Journal of Fluid Mechanics 835 (November 27, 2017): 421–43. http://dx.doi.org/10.1017/jfm.2017.757.

Full text
Abstract:
We present a new set of direct numerical simulation data of a turbulent plane Couette flow with constant wall-normal transpiration velocity $V_{0}$, i.e. permeable boundary conditions, such that there is blowing on the lower side and suction on the upper side. Hence, there is no net change in flux to preserve periodic boundary conditions in the streamwise direction. Simulations were performed at $Re_{\unicode[STIX]{x1D70F}}=250,500,1000$ with varying transpiration rates in the range $V_{0}^{+}\approx 0.03$ to 0.085. Additionally, a classical Couette flow case at $Re_{\unicode[STIX]{x1D70F}}=1000$ is presented for comparison. As a first key result we found a considerably extended logarithmic region of the mean velocity profile, with constant indicator function $\unicode[STIX]{x1D705}=0.77$ as transpiration increases. Further, turbulent intensities are observed to decrease with increasing transpiration rate. Mean velocities and intensities collapse only in the cases where the transpiration rate is kept constant, while they are largely insensitive to friction Reynolds number variations. The long and wide characteristic stationary rolls of classical turbulent Couette flow are still present for all present DNS runs. The rolls are affected by wall transpiration, but they are not destroyed even for the largest transpiration velocity case. Spectral information indicates the prevalence of the rolls and the existence of wide structures near the blowing wall. The statistics of all simulations can be downloaded from the webpage of the Chair of Fluid Dynamics.
APA, Harvard, Vancouver, ISO, and other styles
33

Jeong, Jinyong, Younggun Cho, Young-Sik Shin, Hyunchul Roh, and Ayoung Kim. "Complex urban dataset with multi-level sensors from highly diverse urban environments." International Journal of Robotics Research 38, no. 6 (April 17, 2019): 642–57. http://dx.doi.org/10.1177/0278364919843996.

Full text
Abstract:
The high diversity of urban environments, at both the inter and intra levels, poses challenges for robotics research. Such challenges include discrepancies in urban features between cities and the deterioration of sensor measurements within a city. With such diversity in consideration, this paper aims to provide Light Detection and Ranging (LiDAR) and image data acquired in complex urban environments. In contrast to existing datasets, the presented dataset encapsulates various complex urban features and addresses the major issues of complex urban areas, such as unreliable and sporadic Global Positioning System (GPS) data, multi-lane roads, complex building structures, and the abundance of highly dynamic objects. This paper provides two types of LiDAR sensor data (2D and 3D) as well as navigation sensor data with commercial-level accuracy and high-level accuracy. In addition, two levels of sensor data are provided for the purpose of assisting in the complete validation of algorithms using consumer-grade sensors. A forward-facing stereo camera was utilized to capture visual images of the environment and the position information of the vehicle that was estimated through simultaneous localization mapping (SLAM) are offered as a baseline. This paper presents 3D map data generated by the SLAM algorithm in the LASer (LAS) format for a wide array of research purposes, and a file player and a data viewer have been made available via the Github webpage to allow researchers to conveniently utilize the data in a Robot Operating System (ROS) environment. The provided file player is capable of sequentially publishing large quantities of data, similar to the rosbag player. The dataset in its entirety can be found at http://irap.kaist.ac.kr/dataset .
APA, Harvard, Vancouver, ISO, and other styles
34

Greer, Benjamin. "Who’s Watching the Watchdog?: Are the Names of Corporations Mandated to Disclose under the California Transparency in Supply Chain Act Subject to a Public Records Request?" Slavery Today Journal 1, no. 1 (2014): 44–57. http://dx.doi.org/10.22150/stj/zjol3088.

Full text
Abstract:
Trafficking is a highly dynamic and fluid criminal phenomenon. Determined traffickers react remarkably well to consumer demand and under-regulated economic sectors and easily adapt to legislative weaknesses. Corporate globalization of manufacturing and storefronts is contributing to human trafficking; aiding in forced labor in becoming the fastest growing and the third most widespread criminal enterprise in the world. As technology advances, allowing greater and easier access to goods from more remote countries, vulnerable populations become easier targets for traffickers to exploit. Understanding U.S. markets are key destinations for goods, enlightened states are looking to bolster their anti-trafficking criminal codes by requiring businesses to better clarify their efforts to discourage human trafficking/forced labor within their supply chains. The California State Legislature has begun an aggressive approach aimed at fostering greater public awareness of slave labor by requiring certain businesses to clearly articulate their anti-trafficking/anti-forced labor policies. California was the first government – local, state or federal - to codify mandatory policy disclosures. The California Transparency in Supply Chains Act of 2010 requires businesses domiciled in California and earning more that $100 million to conspicuously disclose on their publically accessed webpage, what policies, if any, they have implemented to detect and fight slave labor. The legislature intended to equip the common consumer with the needed information to effectively hold businesses accountable for human rights abuses. In order for the public to properly hold businesses accountable for their labor practices, it is essential the names of business subject to the disclosure be made public. The California Public Records Act should be a tool for concerned consumers and advocates to obtain the statutory list of affected companies.
APA, Harvard, Vancouver, ISO, and other styles
35

Pourghassemi, Behnam, Jordan Bonecutter, Zhou Li, and Aparna Chandramowlishwaran. "adPerf." Proceedings of the ACM on Measurement and Analysis of Computing Systems 5, no. 1 (February 18, 2021): 1–26. http://dx.doi.org/10.1145/3447381.

Full text
Abstract:
Monetizing websites and web apps through online advertising is widespread in the web ecosystem, creating a billion-dollar market. This has led to the emergence of a vast network of tertiary ad providers and ad syndication to facilitate this growing market. Nowadays, the online advertising ecosystem forces publishers to integrate ads from these third-party domains. On the one hand, this raises several privacy and security concerns that are actively being studied in recent years. On the other hand, the ability of today's browsers to load dynamic web pages with complex animations and Javascript has also transformed online advertising. This can have a significant impact on webpage performance. The latter is a critical metric for optimization since it ultimately impacts user satisfaction. Unfortunately, there are limited literature studies on understanding the performance impacts of online advertising which we argue is as important as privacy and security. In this paper, we apply an in-depth and first-of-a-kind performance evaluation of web ads. Unlike prior efforts that rely primarily on adblockers, we perform a fine-grained analysis on the web browser's page loading process to demystify the performance cost of web ads. We aim to characterize the cost by every component of an ad, so the publisher, ad syndicate, and advertiser can improve the ad's performance with detailed guidance. For this purpose, we develop a tool, adPerf, for the Chrome browser that classifies page loading workloads into ad-related and main-content at the granularity of browser activities. Our evaluations show that online advertising entails more than 15% of browser page loading workload and approximately 88% of that is spent on JavaScript. On smartphones, this additional cost of ads is 7% lower since mobile pages include fewer and well-optimized ads. We also track the sources and delivery chain of web ads and analyze performance considering the origin of the ad contents. We observe that 2 of the well-known third-party ad domains contribute to 35% of the ads performance cost and surprisingly, top news websites implicitly include unknown third-party ads which in some cases build up to more than 37% of the ads performance cost.
APA, Harvard, Vancouver, ISO, and other styles
36

Delazari, Luciene Stamato, Leonardo Ercolin Filho, and Ana Luiza Stamato Delazari Skroch. "UFPR CampusMap: a laboratory for a Smart City developments." Abstracts of the ICA 1 (July 15, 2019): 1–2. http://dx.doi.org/10.5194/ica-abs-1-57-2019.

Full text
Abstract:
<p><strong>Abstract.</strong> A Smart City is based on intelligent exchanges of information that flow between its many different subsystems. This flow of information is analyzed and translated into citizen and commercial services. The city will act on this information flow to make its wider ecosystem more resource-efficient and sustainable. The information exchange is based on a smart governance operating framework designed to make cities sustainable.</p><p>The public administration needs updated and reliable geospatial data which depicts the urban environment. These data can be obtained through smart devices (smartphones, e.g.), human agents (collaborative mapping) and remote sensing technologies, such as UAV (Unnamed Aerial Vehicles). According to some authors, there are four dimensions in a Smart City. The first dimension concerns the application of a wide range of electronic and digital technologies to create a cyber, digital, wired, informational or knowledge-based city; the second is the use of information technology to transform life and work; the third is to embed ICT (Information and Communication Technology) in the city infrastructure; the fourth is to bring ICT and people together to enhance innovation, learning, and knowledge. Analyzing these dimensions, it is possible to say that in all of them the geospatial information is crucial, otherwise, none of them are possible. Considering these aspects, this research intends to use the Smart City concept as a methodological approach using the UFPR (Federal University of Parana) as a target to develop a case study.</p><p>The UFPR has 26 campus in different cities of the Paraná State, south of Brazil. Its structure has 14 institutes. It comprises 11 million square meters of area, 500,000 square meters of constructed area and 316 buildings. There are more than 6,300 employees (staff and administration), 50,000 undergraduate students and 10,000 graduate students. Besides these figures, there are external people who need access to the UFPR facilities, such as deliveries, service providers and the community in general.</p><p>The lack of knowledge about the space and its characteristics has a direct impact on issues such as resources management (human and material), campi infrastructure (outside and inside of the buildings), security and other activities which can be supported using an updated geospatial database. In 2014, the UFPR CampusMap project was started with the indoor mapping as the main goal. However, the base map of the campus was needed in order to support the indoor mapping, the available one was produced in 2000. Thereafter, the campus Centro Politécnico (located in the city of Curitiba) is being used as a case study to develop methodologies to create a geospatial database which will allows to different users the knowledge and management of the space.</p><p>According to Gruen (2013), a Smart City must have spatial intelligence. Moreover, it is necessary the establishment of a database, in particular, a geospatial database. The knowledge of the space where the events happen is a key element in this context. This author also states that to achieve this objective are necessary the following items:</p> <ul><li>Automatic or semi-automated Digital Surface Models (DSM) generation from satellite, aerial and terrestrialimages and/or LiDAR data;</li><li>Further development of the semi-automated techniques onto a higher level of automation; </li><li>Integrated automated and semi-automated processing of LiDAR point clouds and images, both from aerial andterrestrial platforms; </li><li>Streamlining the processing pipeline for UAV image data projects; </li><li>Set-up of GIS with 3D/4D capabilities; </li><li>Change detection and databases updating; </li><li>Handling of dynamic and semantic aspects of city modeling and simulation. This leads to 4D city models; </li><li>LBS (Location Based Services) system investigations (PDAs, mobiles); and </li><li>Establishment of a powerful visualization and interaction platform.</li></ul><p>Some of these aspects are being addressed in this research. The first one is the integration of indoor/outdoor data to helps the space management and provides a tool for navigation between the spaces. The base map was updated through a stereo mapping compilation from images collected using a UAV Phantom 4 from DJI (https://www.dji.com/phantom-4). The use of this technology for data acquisition is not only faster but also cheaper compared to the traditional photogrammetric method. Besides the quality of the images (in this case a GSD – Ground Sample Distance – of 2,5 cm), it can be use in urban areas as a rapid response in emergency situations.</p><p> To georreferencing the image block, it was used 50 control points collected by GNSS (Global Navigation Satellite System) and the software Agisoft Photoscan (http://www.agisoft.com/) to perform the bundle block adjustment with self-calibration. After the processing, the exterior orientation parameters of image block and the tridimensional coordinates of each tie point were calculated simultaneously with the determination of the interior orientation parameters: focal length (f), principal point coordinates (x0, y0), radial symmetric (k1, k2, k3) and decentering distortion coefficients (p1, p2).</p><p> In the mapping production step, the features were extracted through stereo mapping compilation accordingly the standards defined by the Brazilian Mapping Agency. The several layers were edited in GIS software (QGIS) and then the topology was built. Afterward, it was created a spatial database using Postgre/PostGIS. Also, the dense point cloud was generated using SfM (Structure from Motion) algorithms to allow to generate the digital surface model and orthomosaics.</p><p> Meanwhile, a website using HTML5+CSS3&amp;reg; and JavaScript&amp;reg; technologies was developed to publish the results and the first applications. (www.campusmap.ufpr.br). The architecture of this application uses JavaScript&amp;reg;, LeafLet, PgRouting library (to calculate the routes between interest points), files in GeoJson format and custom applications. The indoor database comprises the data about the interior of the buildings and provides to the user some functionalities such as: search for rooms, laboratories, and buildings; routes between points (inside and outside the buildings), floor change. Also, some web applications were developed in order to demonstrate the capabilities of the use of geospatial information in an environment very similar to a city and its problems, e.g. parking management, security, logistics, resources inventory, among others. It was developed a mobile application to provide the indoor user positioning through Wi-Fi (Wireless Fidelity) networks. This, combined with the indoor mapping, will allow the users to navigate in real time inside the buildings. Using the data from the point cloud and the CityGML standard it was developed a 3D model of some buildings. An application to inform crime occurrences (such as robbery, assaults) was also developed so these occurrences can be mapped, and the administration can increase the security of the campus.</p><ol type="a"> <li>Design an interface with functionalities to integrate all applications which are being presented in individual Webpages;</li><li>Develop a visualization tool for 3D models using CityGML;</li><li>Evaluate the potential of UAV images for different applications in urban scenarios;</li><li>Develop an interface for collaborative database update.</li><li>Expand the database to other campus of UFPR and develop new functionalities to different users;</li></ol><p> The “smart city” concept allows to develop an optimized system that use geospatial data to understand the complexity of the urban environments. The use of the geospatial data can improve efficiency and security to manage urban aspects like infrastructure, building and public spaces, natural environment, urban services, health and education. Also, this concept can give a support to the city management agents during the design, realization and evaluation of the urban projects.</p><p>In the present project, we believe these are the first steps to build a connected environment and apply the “smart city” concept into the university administration to make the sustainable use of resources and could suit as an example to some existing problems in public administrations.</p>
APA, Harvard, Vancouver, ISO, and other styles
37

Filipin, Geórgia, Francielle Dorneles Casarotto, Bruno Machado Maroneze, and Pâmela B. Mello-Carpes. "POPNEURO: RELATO DE UM PROGRAMA DE EXTENSÃO QUE BUSCA DIVULGAR E POPULARIZAR A NEUROCIÊNCIA JUNTO A ESCOLARES." REVISTA BRASILEIRA DE EXTENSÃO UNIVERSITÁRIA 6, no. 2 (December 30, 2015): 87–95. http://dx.doi.org/10.36661/2358-0399.2015v6i2.3066.

Full text
Abstract:
A grande expansão de estudos relacionados à divulgação e popularização da neurociência vem ganhando um cenário mais visível recentemente, principalmente na área da educação. Contribuindo para esse crescimento foi criado um programa de extensão, denominado POPNEURO, que objetiva popularizar a neurociência, levando informações desta área de forma lúdica e dinâmica a escolares da rede pública de ensino do município de Uruguaiana-RS e à população em geral. As principais ações do programa foram realizadas em quatro escolas, com alunos entre 10 e 13 anos de idade. As atividades incluíram: (i) atividades práticas realizadas em semanas temáticas; (ii) Neuroblitzes semanais compostas por uma pequena explanação teórica de temas relacionados à neurociência, seguida de atividades práticas para a fixação do conteúdo trabalhado; (iii) criação e manutenção de uma página em rede social sobre neurociência e educação; e, (iv) cursos de formação para professores. As ações, principalmente as práticas, tiveram grande aceitação por parte dos alunos e professores participantes, atingindo o objetivo de promover a popularização da neurociência em âmbito escolar. Palavras-chave: Extensão Universitária, Divulgação Científica, Escola, Sistema Nervoso. POPNEURO: a Report of an extension Program that seeks to disseminate and popularize neuroscience at school Abstract: The great expansion of studies related to the dissemination and popularization of neuroscience has become more visible recently, particularly in education settings. In order to contribute to the development of this initiative, an extension program called POPNEURO was created with the objective of popularizing neuroscience by providing information related to this area in a fun and dynamic way to students from public schools and to thegeneral public in the city of Uruguaiana-RS. The actions were carried out in four schools, with students ranging from 10 to 13 years- old. The activities included: (i) practical activities that took place during thematic weeks; (ii) weekly Neuroblitzes that offered small lecture on topics related to neuroscience, followed by hands-on activities to reinforce the contents presented; (iii) the creation and maintenance of a social network webpage on the topic of neuroscience and education; (iv) training courses for teachers. The actions related to the project, especially the practical ones, had great acceptance by students and teachers, which contributed to achieve the goal of promoting neuroscience in schools. Key-words: University Extension, Scientific Dissemination, School, Nervous System. Relato de un Programa de Extensión que busca divulgar y popularizar la neurociencia junto a las escuelas Resumen: En la actualidad los proyectos relacionados a la difusión y popularización de la neurociencia han tenido un crecimiento significativo, principalmente en el área de educación. Contribuyendo a este desarrollo se ha creado un programa de extensión llamado POPNEURO, cuyo objetivo es popularizar la neurociencia y fomentar el suministro de información en este ámbito de una forma lúdica y dinámica a los estudiantes de escuelas públicas de la ciudad de Uruguaiana-RS y a la población en general. Este programa se llevó a cabo en cuatro escuelas, con alumnos de 10 a 13 años de edad. Las actividades que se implementaron en el programa incluyeron: (i) actividades prácticas en semanas temáticas; (ii) neuroblitzes semanales compuestos por una pequeña explicación teórica de temas relacionados con la neurociencia, que se siguieron de actividades prácticas para el establecimiento de los contenidos de trabajo; (iii) creación y manutención de una página en redes sociales sobre la neurociencia y la educación; y (iv) los cursos de formación para docentes. Las acciones, especialmente las prácticas, tuvieron gran aceptación por parte de los alumnos y profesores participantes, alcanzando el objetivo de promover la popularización de la neurociencia en las escuelas participantes. Palabras-clave: Extensión universitaria; Comunicación de la ciencia; Escuela; Sistema nervioso.
APA, Harvard, Vancouver, ISO, and other styles
38

Capdevila, Ignasi, and Matías I. Zarlenga. "Smart city or smart citizens? The Barcelona case." Journal of Strategy and Management 8, no. 3 (August 17, 2015): 266–82. http://dx.doi.org/10.1108/jsma-03-2015-0030.

Full text
Abstract:
Purpose – In recent years, the term “smart city” has attracted a lot of attention from policy makers, business leaders and citizenship in general. Although there is not a unique definition of what a smart city is, it is generally accepted that “smart” urban policies refer to local governments’ initiatives that use information and communication technologies in order to increase the quality of life of their inhabitants while contributing to a sustainable development. So far, “smart city” approaches have generally been related to top-down processes of technology diffusion. The purpose of this paper is to present a broader view on “smart” initiatives to analyze both top-down and bottom-up dynamics in a smart city. The authors argue that these two perspectives are complementary and its combination can reinforce the collaboration between different city stakeholders. Top-down and bottom-up initiatives are not opposed forces but, on the contrary, can have a synergistic effect on the innovation capacity of the city. Both perspectives are illustrated by providing examples of different “smart” aspects in the city of Barcelona: smart districts, open collaborative spaces, infrastructures and open data. Design/methodology/approach – To illustrate the arguments, the authors analyze the case of the city of Barcelona providing examples of top-down and bottom-up initiatives in four different smart city aspects: smart districts, open collaborative spaces, infrastructures and open data. The research method is based on a case study (Yin, 1984). The primary data consisted on interviews to city council representatives as well as managers of local public institutions, like economic development offices, and local organizations like for instance coworking spaces. The authors interviewed also specialists on the innovation history of the city in order to validate the data. In addition, the authors used secondary data such as reports on the 22@, and documentation on the Barcelona innovation policies, as well as doing a compilation of press articles and the online content of the institutional webpages. All together, the authors have followed a data triangulation strategy to seek data validation based on the cross-verification of the analyzed data sources. Findings – The analysis suggests that the top-down and bottom-up perspectives are complementary and their combination can reinforce the collaboration between different city stakeholders. Top-down and bottom-up initiatives are not opposed forces but, on the contrary, can have a synergistic effect on the innovation capacity of the city. Both perspectives are illustrated by providing examples of different “smart” aspects in the city of Barcelona: smart districts, open collaborative spaces, infrastructures and open data. Research limitations/implications – Nevertheless, the analysis has its limitations. Even if the authors have emphasized the importance of the bottom-up initiatives, citizens do not have often the resources to act without governmental intervention. This is the case of services that require high-cost infrastructures or regulatory changes. Also, as it usually happens in the case of disruptive technology, it is hard for citizens to understand the possibilities of its use. In these cases, firms and institutions must play an important role in the first phases of the diffusion of innovations, by informing and incentivizing its use. It is also important to note that some of the emerging usages of technology are confronted to legal or regulatory issues. For instance, distributed and shared Wi-Fi networks might be in opposition to economic interests of internet providers, that often difficult its expansion. It is also the case of services of the sharing economy that represent a menace to established institutions (like the tensions between Uber and taxi companies, or Airbnb and hotels). In these cases, city halls like it is the case in Barcelona, tend to respond to these emergent uses of technology by regulating to ensure protection to existing corporate services. Practical implications – In conclusion, the transformational process that leads a city to become a smart city has to take in consideration the complexity and the plurality of the urban reality. Beyond considering citizens as being users, testers or consumers of technology, local administrations that are able to identify, nourish and integrate the emerging citizens’ initiatives would contribute to the reinforcement of a smart city reality. Originality/value – The contribution of the paper is to go beyond the generalized technologic discourse around smart cities by adding the layer of the citizens’ initiatives.
APA, Harvard, Vancouver, ISO, and other styles
39

"Evaluation of WebPages performance W.R.T UI/UX developed using different frameworks." International Journal of Engineering and Advanced Technology 8, no. 6 (August 30, 2019): 575–79. http://dx.doi.org/10.35940/ijeat.8064.088619.

Full text
Abstract:
Last decade observed the exponential growth of World Wide Web (WWW) due to the growing trend of migration of each & every information on the web. In order to design the User Interface (UI) of web based application, a number of frameworks are used such as Bootstrap, WordPress, and Joomla etc. But sometimes the use of Dynamic HyperText Markup Language (DHTML) to design from scratch is preferred over frameworks. In this paper, research was carried out to compare the performance with respect to UI on different parameters of web-portals designed using frameworks viz-a-viz use of DHTML technology. Performance was compared using the tools, GTMetrix and Pingdom. Results can be used to facilitate the decision to select the framework or not, while designing the UI of webpages.
APA, Harvard, Vancouver, ISO, and other styles
40

Gunasekaran, M., S. Prabhakaran, and C. Balamurugan. "Dynamic Webpage Management System." SSRN Electronic Journal, 2010. http://dx.doi.org/10.2139/ssrn.2335291.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Kuo, Lungwen, Tsuiyueh Chang, and Chih‐Chun Lai. "Visual effect and color matching of dynamic image webpage design." Color Research & Application, March 31, 2021. http://dx.doi.org/10.1002/col.22662.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

"A Framework to improve the Web Performance using Reorganization, Optimized Prediction and Prefetching." International Journal of Recent Technology and Engineering 8, no. 3 (September 30, 2019): 7791–96. http://dx.doi.org/10.35940/ijrte.c6332.098319.

Full text
Abstract:
Improving web performance is becoming more hectic in recent days. This paperelucidates the combination of many ideas to improve web performance and given as a framework. The entire framework depicts various aspects in improving web access performance which includes website reorganization, webpage prediction and prefetching, optimized way of accessing prediction algorithm in webserver and finally improvements in a proxy cache at the time of accessing dynamic content. Each portion of the framework has been successfully proposed and implemented. The various algorithms have been introduced in each portion of the implementation. This research work not only introduced new algorithms but also create scope for further research works in terms of improving web performance.
APA, Harvard, Vancouver, ISO, and other styles
43

Rath, S. "Neural Network Based Adaptation Algorithm for Online Prediction of Mechanical Properties of Steel." Journal of Computer Science Research 2, no. 2 (July 22, 2020). http://dx.doi.org/10.30564/jcsr.v2i2.1966.

Full text
Abstract:
After production of a steel product in a steel plant, a sample of the product is tested in a laboratory for its mechanical properties like yield strength (YS), ultimate tensile strength (UTS) and percentage elongation. This paper describes a mathematical model based method which can predict the mechanical properties without testing. A neural network based adaptation algorithm was developed to reduce the prediction error. The uniqueness of this adaptation algorithm is that the model trains itself very fast when predicted and measured data are incorporated to the model. Based on the algorithm, an ASP.Net based intranet website has also been developed for calculation of the mechanical properties. In the starting Furnace Module webpage, austenite grain size is calculated using semi-empirical equations of austenite grain size during heating of slab in a reheating furnace. In the Mill Module webpage, different conditions of static, dynamic and metadynamic recrystallization are calculated. In this module, austenite grain size is calculated from the recrystallization conditions using corresponding recrystallization and grain growth equations. The last module is a cooling module. In this module, the phase transformation equations are used to predict the grain size of ferrite phase. In this module, structure-property correlation is used to predict the final mechanical properties. In the Training Module, the neural network based adapation algorithm trains the model and stores the weights and bias in a database for future predictions. Finally, the model was trained and validated with measured property data.
APA, Harvard, Vancouver, ISO, and other styles
44

McCormack, Paul. "Screen II." M/C Journal 2, no. 2 (March 1, 1999). http://dx.doi.org/10.5204/mcj.1744.

Full text
Abstract:
I recently undertook the unenviable task of moving house and amidst all the packing, puffing, panting and paying-through-the-nose for various services and utilities one thing caught my attention. The living room essentially laid itself out with little or no human input (apart from puffing and panting of course), and it did so all in relation to a single small hole in the wall of approximately one centimetre in diameter: the TV jack. So this article stems from that observation, and from the fact that so many of the living rooms one enters have almost exactly the same general configuration as mine. Sofas, or lounge chairs, or recliners, or beanbags, or cushions (or even hard wooden benches for the more puritan amongst us), or any combination of all or any of these, all facing more or less in the direction of a relatively small rectangular screen. There was a time when chairs in a room tended to face each other (so that the people sitting in them could also face each other and have a conversation, I guess). In colder climates, like the one I came from, the seating used to be aligned towards the fire, the heart(h) of the house; now it invariably faces the TV. There's nothing natural about this orientation of course, though like many such things it does seem to happen almost naturally. Like many new technologies before and since, the arrival of the television into the home was generally met with a curious mixture of enthusiasm, ambivalence and hesitation. Lynn Spigel notes, for example, how American women's magazines of the 1940s and 1950s largely responded in such a fashion when they began attempting to negotiate, on behalf of their readers, the integration of the shiny new devices, and the endless potential for pleasure and distraction that they offered, into the existing domestic space which had hitherto mostly represented a somewhat duller mixture of various chores and responsibilities (Ang 133). Where should the TV be placed, both in a physical and cultural sense, in order that the home might continue to function efficiently? But fifty years later the home is arguably less a site of work and more a site of recreation, and the laying out of one's living room has become an almost automatic process. It requires an effort of concentration not to have the TV dominating the relaxation space, it is remarkable to find a home without one -- in the 'developed' world anyway. What is our society like, then, now that this dominating little screen has so thoroughly invaded our homes? One way of beginning to address this question might be through what Igor Kopytoff called the biography of the thing. The idea is that just as people have biographies, so too can things, objects, commodities be thought of as having biographies. And just as the recorded life of a human being may illuminate the dynamic cultural or social context in which it is, or was, lived, so too can the recorded 'life' of something like television illuminate the socio-cultural formations and transformations that occurred, or are occurring in the context within which that 'life' is 'lived' (Silverstone et al. 17). The biography of television would most probably record a life in progress which has so far grown from a monochromatic, single channel, unarchived infancy into a multicoloured, multichannelled, recorded (and often repeated)... and here the metaphor fails me: is television an 'adult' yet? Or is it still more like a petulant and self obsessed adolescent? Whatever it is, it certainly demands a lot of attention. But does it get it? Or to be more precise, what is the quality of the attention it receives? As Ien Ang points out, when you actually spend your hard earned dollars buying a TV what you're also getting, for the same cheap price, is potential access to all the available broadcast television output. In return for this bargain you are supposed to forthwith expose yourself to as much of this output as you possibly can, including (and indeed most importantly) the commercials that punctuate and pay for it. You theoretically become part of an Audience, a commodity to be measured, bought, and sold by TV stations and Advertisers; you theoretically are supposed to sit in those chairs that almost inevitably face the TV; and pay attention Godammit! Yes, there is, strange as it may seem, a right way and a wrong way to watch TV, from the point of view of the industry, that is. But of course, nobody ever does that: people don't pay attention, they walk out and put on the kettle during the ads, they channel-surf, they record programmes to watch later, fast forwarding through the ads. Realistically, television viewing for the majority of us is a bizarre behaviour made up of probably fairly equal parts of watching and nonwatching (Ang 139). And of course now there is an ever increasing threat to the domination of the small screen coming from a slightly smaller, but nevertheless strongly attention-snatching screen. This second screen doesn't have its spatial position in the home quite worked out yet: sometimes it's in the living area, sometimes it's hidden away in a bedroom, or study, or some other nook or cranny (my brother has his beside the laundry). But it's getting there. Of course moves are afoot to blend the two screens together: Sony, for example, sell a thing called a Web TV Internet Terminal® which "puts the Web where it really belongs, on your big-screen TV" ("Sony Brings"). All you need is a television (check), a standard phone line (check), and a thumb (check, in fact I've got two). Yes indeed, using "One Thumb Browsing® technology" ("Everything") -- yes, they really call it that, and what's more they've registered it as a trademark -- you too can "read bulletin boards for expert information on an incredible range of special interests. Join groups that let you share ideas and opinions. Or send and receive e-mail messages faster than any overnight service" ("Sony Brings"). The question remains: will we ever be able to look away? References Ang, Ien. "Living-Room Wars: New Technologies, Audience Measurement and the Tactics of Television Consumption." Silverstone and Hirsch 131-45. "Everything You Want and Need." Sony Electronics Inc. Webpages. 1997. 10 Mar. 1999 <http://www.sel.sony.com/SEL/webtv/every/every.php>. Silverstone, Roger, et al. "Information and Communication Technologies and the Moral Economy of the Household." Silverstone and Hirsch 15-31. Silverstone, Roger, and Eric Hirsch, eds. Consuming Technologies: Media and Information in Domestic Spaces. London: Routledge, 1994. "Sony Brings the Internet to Your TV." Sony Electronics Inc. Webpages. 1997. 10 Mar. 1999 <http://www.sel.sony.com/SEL/webtv/nettotv/nettotv.php>. Citation reference for this article MLA style: Paul Mc Cormack. "Screen II: The Invasion of the Attention Snatchers." M/C: A Journal of Media and Culture 2.2 (1999). [your date of access] <http://www.uq.edu.au/mc/9903/screen.php>. Chicago style: Paul Mc Cormack, "Screen II: The Invasion of the Attention Snatchers," M/C: A Journal of Media and Culture 2, no. 2 (1999), <http://www.uq.edu.au/mc/9903/screen.php> ([your date of access]). APA style: Paul Mc Cormack. (1999) Screen II: the invasion of the attention snatchers. M/C: A Journal of Media and Culture 2(2). <http://www.uq.edu.au/mc/9903/screen.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
45

Andersen, Njål, Jørgen G. Bramness, and Ingunn Olea Lund. "The emerging COVID-19 research: dynamic and regularly updated science maps and analyses." BMC Medical Informatics and Decision Making 20, no. 1 (November 30, 2020). http://dx.doi.org/10.1186/s12911-020-01321-9.

Full text
Abstract:
Abstract Background The COVID-19 pandemic is a global public health emergency and experts emphasize the need for rapid and a high degree of communication and interaction between all parties, in order for critical research to be implemented. We introduce a resource (website) that provides bibliometric analysis showing the current content and structure of the published literature. As new research is published daily, the analysis is regularly updated to show the status as the research field develops and matures. Methods Two bibliometric methods were employed, the first is a keyword co-occurrence analysis, based on published work available from PubMed. The second is a bibliometric coupling analysis, based on articles available through Scopus. The results are presented as clustered network graphs; available as interactive network graphs through the webpage. Results For research as of March 23rd, keyword co-occurrence analysis showed that research was organized in 4 topic clusters: “Health and pandemic management”, “The disease and its pathophysiology”, “Clinical epidemiology of the disease” and “Treatment of the disease”. Coupling analyses resulted in 4 clusters on literature that relates to “Overview of the new virus”, “Clinical medicine”, “On the virus” and “Reproduction rate and spread”. Conclusion We introduced a dynamic resource that will give a wide readership an overview of how the structure of the COVID-19 literature is developing. To illustrate what this can look like, we showed the structure as it stands three months after the virus was identified; the structure is likely to change as we progress to later stages of this pandemic.
APA, Harvard, Vancouver, ISO, and other styles
46

"Malicious Traffic Detection System using Publicly Available Blacklist’s." International Journal of Engineering and Advanced Technology 8, no. 6S (September 6, 2019): 356–61. http://dx.doi.org/10.35940/ijeat.f1075.0886s19.

Full text
Abstract:
In this fastest growing technology with the increase in internet usage, the communication became much faster and easier which resulted in the massive growth in digitalization. With this the cyber crimes were increasing day-by-day . They employ every possible technique and trick to make the users as zombies for their malicious activities or Crypto mining. In recent years we are facing issues with ransomware’ which result in the loss of data integrity and confidentiality along with our privacy and anonymity. The malware’ can spread all over the network within no time. Using anti virus programs alone for safeguarding our network is a bad practice because they filter the traffic on signature based. Here problem is if the user is not up to date with the definitions from the AV provider, then he will be prone to the attack. In this model a system to track malicious trails in a network is done. This employs online malware detection system (Virus Total) and open source dynamic black lists which contain malware or suspicious programs along with some static pre compiled blacklists from different antivirus providers and our own definitions of block to filter the traffic which gives the detailed log report on the suspicious trails, this is from domain name or IP address or malicious scripts in the webpage.
APA, Harvard, Vancouver, ISO, and other styles
47

Avsarkisov, V., S. Hoyas, M. Oberlack, and J. P. García-Galache. "Turbulent plane Couette flow at moderately high Reynolds number." Journal of Fluid Mechanics 751 (June 17, 2014). http://dx.doi.org/10.1017/jfm.2014.323.

Full text
Abstract:
AbstractA new set of numerical simulations of turbulent plane Couette flow in a large box of dimension ($\def \xmlpi #1{}\def \mathsfbi #1{\boldsymbol {\mathsf {#1}}}\let \le =\leqslant \let \leq =\leqslant \let \ge =\geqslant \let \geq =\geqslant \def \Pr {\mathit {Pr}}\def \Fr {\mathit {Fr}}\def \Rey {\mathit {Re}}20\pi h,\, 2h,\, 6\pi h$) at Reynolds number $(\mathit{Re}_{\tau }) =125$, 180, 250 and 550 is described and compared with simulations at lower Reynolds numbers, Poiseuille flows and experiments. The simulations present a logarithmic near-wall layer and are used to verify and revise previously known results. It is confirmed that the fluctuation intensities in the streamwise and spanwise directions do not scale well in wall units. The scaling failure occurs both near to and away from the wall. On the contrary, the wall-normal intensity scales in inner units in the near-wall region and in outer units in the core region. The spectral ridge found by Hoyas & Jiménez (Phys. Fluids, vol. 18, 2003, 011702) for the turbulent Poiseuille flow can also be seen in the present flow. Away from the wall, very large-scale motions are found spanning through all the length of the channel. The statistics of these simulations can be downloaded from the webpage of the Chair of Fluid Dynamics.
APA, Harvard, Vancouver, ISO, and other styles
48

"Nanotechnology Law for Commercialization of Nano-Enabled Products." Advances in Materials Science and Engineering 3, no. 2 (August 28, 2019). http://dx.doi.org/10.33140/jamser.03.02.03.

Full text
Abstract:
This presentation begins with a very short overview of the emerging laws of nanotechnology and then moves forward to study the key trends in emerging nanoregulations. Now that nanomaterials are becoming part of the global codification of nanoregulations hundreds of emerging laws have begun to sprout like mushrooms in unexpected places all over the globe. Surrounding these mushrooms is a vague and treacherous swamp of new laws draft laws and pre-existing laws. Additionally there are rules emerging from powerful opinion leaders who have expertise but not regulatory authority, such as some USA federal government agencies and the World Health Organization (WHO). This overview of the emerging nanoregulations explores USA OSHA and EU REACh and NIOSH RELs (Recommended Exposure Limits) for carbon nanotubes and nanofibers, NIOSH documents such as TiO2 guidance for nanomaterials and an entire webpage full of sound approaches to nanomaterials should remove many questions about the methods for best practices but leaves legal authority unclear because NIOSH is not an enforcement authority and the concept of RELs itself does not appear anywhere in the OSH Act that created NIOSH. So too, WHO guidelines for workplace exposure to nanomaterials are an unprecedented well intended application of precautionary principles even though no data yet exists demonstrating a link between exposure to manufactured nanomaterials in the workplace and proven harm and WHO has no enforcement authority. This trend towards prevention in face of unquantifed risk is important. This presentation will examine what this means from the global health standpoint, regarding nanotechnology; what does this mean for global health law and governance of science and emerging technologies? This presentation concludes that the new nanomaterial rules focus on problems that haven’t happened yet but that experts believe are likely to occur. This unprecedented preventive phenomenon in nanoregulations impacts risk assessment, quality assurance for compliance and inevitably the acceptaable methods for preventing corporate or professional liability. Therefore nanoregulation is a dynamic process that will influence many health laws around the world.
APA, Harvard, Vancouver, ISO, and other styles
49

Seilstad, Brian. "EDUCATING REFUGEE‐BACKGROUND STUDENTS: CRITICAL ISSUES AND DYNAMIC CONTEXTS Edited by ShawnaShapiro, RaichleFarrelly, and Mary JaneCurryMultilingual Matters. ISBN 9781783099986 (Paperback) £20.00, (Hardback) $35.00, (EPUB) €25.00. From the publisher webpage: http://www.multilingual-matters.com/display.aspK=9781783099986, 288 pages. Multilingual Matters." TESOL Journal 11, no. 3 (August 30, 2020). http://dx.doi.org/10.1002/tesj.501.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Gagliardi, Katy. "Facebook Captions: Kindness, or Inspiration Porn?" M/C Journal 20, no. 3 (June 21, 2017). http://dx.doi.org/10.5204/mcj.1258.

Full text
Abstract:
IntroductionIn 2017, both the disability community and popular culture are using the term “inspiration porn” to describe one form of discrimination against people with disability. ABC’s Speechless, “a sitcom about a family with a son who has a disability, (has) tackled why it’s often offensive to call people with disabilities ‘inspirational’” (Wanshel). The reasons why inspiration porn is considered to be discriminatory have been widely articulated online by people with disability. Amongst them is Carly Findlay, a disabled writer, speaker, and appearance activist, who has written that:(inspiration porn) shows non-disabled people doing good deeds for disabled people—feeding them chips at McDonald’s—’serving us all lessons in kindness’: or taking them to the high school dance. These stories usually always go viral. The person with disability probably never gave their permission for the photo or story to be used in a meme or told to the media (Findlay).The definition and dynamics of inspiration porn as illustrated in this quote will be expanded upon in this paper’s critical analysis of captions. Here, the term captions is used to describe both writing found on memes and on Facebook posts (created by a “poster”), and the comments written below these posts (created by “commenters”). Facebook threads underneath posts about people with disability both “reflect and create” (Barnes, Mercer and Shakespeare 202) current societal attitudes towards disability. That is, such threads not only illustrate negative societal attitudes towards disability, but can also perpetuate these attitudes by increasing people’s exposure to them. This paper will focus on a specific case study of inspiration porn on Facebook—the crowning of a student with autism as prom king—and consider both the conflict of whether people’s kind words are patronising use of language, as well as the concerns of over-disclosure used in this thread.What Is Inspiration Porn?The genesis of the term inspiration porn is commonly attributed to the late Stella Young, a disabled woman who was an advocate for people with disability. However, the term has been traced to a blog post written in February 2012 (bear). Anecdotal evidence from Lisa Harris, a disability consultant and advocate with over 20 years’ disability education experience, suggests that the term was blogged about as far back as 2006 on Rachel Cohen-Rottenberg’s Webpage Disability and Representation (Harris). However, it was Young who popularised the term with her 2012 article We’re Not Here for Your Inspiration and 2014 TED Talk I’m Not Your Inspiration, Thank You Very Much. Young defined inspiration porn as “an image of a person with a disability, often a kid, doing something completely ordinary—like playing, or talking, or running, or drawing a picture, or hitting a tennis ball—carrying a caption like ‘your excuse is invalid’ or ‘before you quit, try’”.It is worth noting that the use of the word porn has been considered controversial in this context. Yet it can be argued that the perception of the person with disability having achieved something great gives the person without disability a hit of positive “inspired” emotion. In this way, such inspiration could be termed as porn as it serves the purpose of fulfilling the “pornographic” self-gratification of people without disability.The term inspiration porn has historically been used in disability studies in two ways. Firstly, it has been used to describe the “ableist gaze” (Davis), which is when a person with disability is ‘seen’ through the eyes of someone without disability. Indeed, just as the “male gaze” (Mulvey) is implicit in sexualised porn, so too the “ableist gaze” is implicit in inspiration porn. Secondly, it has been used to highlight the lack of power experienced by people with disability in cultural representation (Barnes, Mercer, and Shakespeare 201). This study is a good example of the latter—it is not uncommon for people with disability to be refuted when they speak out against the inherent discrimination found within captions of (intended) kindness on Facebook threads.Inspiration porn is also a form of “objectification” (Perry) of people with disability, and is based on stereotypes (Haller and Zhang 22) about disability held by people without disability. According to Dr. Paul Sinclair, a disability scholar with 15 years’ experience in disability education, objectification and stereotyping are essential factors to understanding inspiration porn as discrimination:when a person with disability engages in their daily life, it is possible that a person without disability sees them as inspirational by superimposing his/her stereotypical perception of, or understanding about, people with disability onto the identity of the person, as a human being.Such objectification and stereotyping of people with disability is evident across various media captioning. This is particularly so in social media which often includes memes of images with “inspiring” captions—such as the ones Young highlighted as clear examples of inspiration porn, which “feature the Hamilton quote (‘The only disability in life is a bad attitude’)”. Another example of this kind of captioning is found in news items such as the 2015 article Disabled Teen Crowned Homecoming Queen in Awesome Way as featured in the article USA Today (Saggio). This article described how a student not identified as having a disability gave her homecoming queen crown to a student with a disability and captioned the YouTube clip of these students with, “High school senior [Name] was hoping she’d be crowned homecoming queen. She has cerebral palsy and has never felt like she fit in at school. What happened during the crowning ceremony will warm your heart” (Saggio). The fact that the young woman was pleased with getting the crown does not mitigate the objectifying dynamics of inspiration porn present within this example. Captioning such as this both creates and reflects some of the existing attitudes—including charity and its appeal to emotionality—that perpetuate inspiration porn.Measuring Inspiration Porn with Sentiment AnalysisThe challenge for the researcher analysing Facebook threads is how to meaningfully interpret the captions’ numerous contexts. The methodology of this research used a quantitative approach to gather numerical data about selected Facebook captions. This paper discusses data gained from a sentiment analysis (Pang and Lee; Thelwall et al.; Driscoll) of these captions within the contexts of my own and other researchers’ analyses of inspiration porn, as well as the perspectives of people with disability.The sentiment analysis was conducted using SentiStrength, a software tool that extracts both positive and negative sentiment strengths “from short informal electronic text” (Thelwall et al., 2545), and ranks it “on a numerical scale” (Driscoll 3). Sentiment analysis and SentiStrength are useful, but not perfect, tools with which to analyse Facebook captions. For example, SentiStrength determines two scales: a positive emotion measurement scale ranging from +1 (neutral) to +5 (most positive), and a negative emotion measurement scale ranging from –1 (neutral) to –5 (most negative). It calculates the positive and negative scores concurrently rather than averaging them out in order to acknowledge that captions can and do express mixed emotion (Driscoll 5).News articles about people with disability attending proms and comparable events, such as the homecoming queen example described above, are often criticised by disability activists for perpetuating inspiration porn (Mort; Findlay; Brown). Based on this criticism, sentiment analysis was used in this research to measure the emotional strength of captions—particularly their possible use of patronising language—using the Autism Speaks Facebook post as a case study. The post featured an image of a high school student with autism who had been crowned prom king.The Autism Speaks Facebook page was set up to fund “research into the causes, prevention, treatments and a cure for autism; increas(e) awareness of autism spectrum disorders; and advocat(e) for the needs of individuals with autism and their families” (Autism Speaks). The location of the prom was not specified; however, Autism Speaks is based in New York. This particular Facebook page was selected for this study based on criticism that Autism Speaks receives from disability advocates. One of the major critiques is that “(its) advertising depends on offensive and outdated rhetoric of fear and pity, presenting the lives of autistic people as tragic burdens on our families and society” (Boycott Autism Speaks). Autism Speaks has also been described as a problematic example of an organisation that “dictate(s) how disability should be perceived and dealt with. Often without input of disabled people either in the design or implementation of these organizations” (crippledscholar). This article goes on to state that “charities always frame what they do as positive and helpful even when the people who are the intended recipients disagree.”The prom king post included a photo of a young man with autism after he was crowned. He was standing beside a woman who wasn’t identified. The photo, posted by the young man’s aunt on the Autism Speaks Facebook page, included a status update that read:My autistic nephew won PROM KING today! Just so you all know, having a disability doesn’t hold you back if you don’t let it! GO [NAME]. #AutismAwareness (Autism Speaks)The following caption from the comment thread of the same Facebook post is useful as an example of how SentiStrength works. The caption read:Tears of Joy! Thank you for posting!!! Wow this gives me hope for his and my son’s and everyone’s special wonderful child nephew and niece! Way cool!However, because SentiStrength does not always accurately detect and measure sarcasm or idiomatic language usage, ”Tears” (the only negatively interpreted word in this caption) has been scored as –4, while the overall positive sentiment was scored as 3. Therefore, the final SentiStrength score of this caption was 3, –4, thereby demonstrating both the utility and limitations of SentiStrength as a sentiment analysis tool. This is useful to understand when analysing the data it produces.When analysing the entire thread, the sentiment analysis results across 238 captions, showed that 2 was the average strength of positive emotion, and that –1.16 was the average strength of negative emotion. The following section will analyse how a specific caption chosen from the most positively-scored captions from these data indicates that inspiration porn is possibly evident within.Use of Language: Kind, or Patronising?This discussion analyses the use of language in one caption from this thread, focusing on the way it likely demonstrated the ableist gaze. The caption was the most positive one from these data as scored by SentiStrength (5, –1) and read, ”CONGRATULATIONS SWEETIE!!!”. While it is noted that basing this analysis primarily on one caption provides limited insight into the dynamics of inspiration porn, this analysis forms a basis from which to consider other “inspirational” Facebook posts about people with disability. As well as this caption, this discussion will also draw upon other examples mentioned in this paper—from the homecoming queen article in USA Today to another caption on the Autism Speaks thread—to illustrate the dynamics of inspiration porn.On the surface, this congratulatory caption seems like a kind thing to post. However, inspiration porn has been identified in this analysis based on the caption’s effusive use of punctuation coupled with use of capital letters and the word “sweetie”. The excitement depicted through use of multiple exclamation marks and capital letters implies that the commenter has a personal connection with the prom king, which is a possibility. However, this possibility becomes less feasible when the caption is considered within the context of other captions that display not dissimilar use of language, as well as some that also display intimate emojis, such as grin faces and love heart eyes. Further, when this use of language is used with any consistency across a thread and is not coupled with textual information that implies a personal connection between the commenter/s and the prom king, it could be interpreted as patronising, condescending and/or infantilising. In addition, “sweetie” is a term of endearment commonly used in conversation with a romantic partner, child, or someone the speaker/writer knows intimately. While, again, it is possible that these commenters knew the prom king intimately, a more likely possibility is that he was being written to by strangers, yet using language that implied he was close to them—which would then have the same patronising connotations as above. It can therefore be argued that there is a strong possibility that this heightened use of intimate and emotional language was chosen based on his autism diagnosis.The conclusion drawn above is based in part on contextual similarities between the Autism Speaks post and its associated thread, and the aforementioned homecoming queen news article. In the former, it is likely that the young prom king was congratulated effusively because of his autism diagnosis. Similarly, in the latter article, the young woman was crowned not because she was named homecoming queen, but because the crown was given to her because of her diagnosis of cerebral palsy. As both gestures appear to have been based on others’ perceptions of these individuals’ disabilities rather than on their achievements, they are both likely to be patronising gestures.Over-DisclosureIn addition to use of language, another noteworthy issue in the captions thread on the Autism Speaks Facebook page was that many of them were from parents disclosing the diagnosis of their child. One example of this was a post from a mother that read (in part):I’ll be over here worried & concerned with the other 9,999 & ½ things to deal with, keeping up with new therapies, current therapy, we came in progress from any past therapies, meltdowns, dietary restrictions, educational requirements, The joy and difficulties of not just learning a new word but actually retaining that word, sleep, being hit, keeping him from hitting himself, tags on clothes etc. etc. [sic] (Autism Speaks)The above commenter listed a number of disability-specific issues that she experienced while raising her son who has autism. The context for her caption was a discussion, unrelated to the original post, that had sparked underneath a sub-thread regarding whether the use of person-first language (“person with autism”) or identity-first language (“Autistic person”) was best when referring to someone with autism. The relationship between inspiration porn and this intimately negative post about someone with disability is that both types of post are examples of the “ableist gaze”: inspiration porn demonstrates an exaggerated sense of positivity based on someone’s disability, and this post demonstrates disregard for the privacy of the person being posted about—perhaps due to his disability. The ease with which this negative comparison (over-disclosure) can be made between ‘inspirational’ and ‘negative’ posts illustrates in part why inspiration porn is a form of discrimination—intentional or otherwise.Furthermore, some of the children who were disclosed about on the main thread were too young to be asked consent, and it is unclear whether those who were old enough had the capacity to provide informed consent. Research has found that online over-disclosure in general is a matter of concern.The specific practice of online over-disclosure from parents about their children—with or without disability—has been raised by Leaver (151), “what happens before young people have the agency, literacy or skills to take the reins of their own selves online? Parents, guardians, loved ones and others inevitably set the initial identity parameters for young people online.” Over-disclosure is therefore also an issue that concerns people with disability, and the people closest to them.There exists both anecdotal evidence and academic research regarding online over-disclosure about people with disability. The research states that when people with physical disability disclose online, they employ strategic approaches that involve the degree to which they disclose (Furr, Carreiro, and McArthur). This suggests that there are complex factors to consider around such disclosure. Also relevant is that the practice of over-disclosure about another person’s disability, regardless of whether that disclosure is made by a close family member, has been critiqued by people (Findlay; Stoltz) within the disability community: “would you publicly share this information about your other children, an aging parent, or yourself?” (Stoltz). Finally, the practice of disability over-disclosure by anyone other than the person themselves supports the understanding that inspiration porn is not about the “object” of inspiration; rather, it serves to give pleasure (and/or pain) to the objectifier.ConclusionInspiration porn via the ableist gaze is discriminatory because it focuses on a (societally) undesirable trait in a way that serves the “gazer” at the expense of the “gazed-at”. That is, people with disability are objectified and exploited in various ways that can initially appear to be positive to people without disability. For example, when someone with disability posts or is posted about on Facebook, a person without disability might then add a caption—possibly with good intentions—that serves as their “inspired” response to what it “must” be like to have a disability. It can be argued that such captions, whether on news articles or when framing social media images, therefore either reflect or create existing social inequalities—and possibly do both.In continuing to use the term inspiration porn to describe one form of discrimination against people with disability, both the disability community and popular culture are contributing to an important narrative that scholarship needs to continue to address. Indeed, the power imbalance that is celebrated within inspiration porn is in some ways more insidious than malicious discrimination against people with disability, because it is easier to mistake as kindness. The research sample presented in this paper supports the countless expressions of anecdotal evidence given by people with disability that this “kindness” is inspiration porn; a damaging expression of the ableist gaze.ReferencesAutism Speaks. Facebook 21 May 2017 <https://www.facebook.com/autismspeaks>.Barnes, Colin, Geof Mercer, and Tom Shakespeare. Exploring Disability. Maiden, MA: Blackwell Publishers Inc., 1999.bear, romham a. “Inspiration Porn.” radical access mapping project 7 Apr. 2014. 21 May 2017 <https://radicalaccessiblecommunities.wordpress.com/2012/02/14/inspiration-porn/>.The Autistic Self Advocacy Network, et al. “Why Boycott.” Boycott Autism Speaks, 6 Jan. 2014. 21 May 2017 <http://www.boycottautismspeaks.com/why-boycott-1.html>.Brown, Lydia X.Z. “Disabled People Are Not Your Feel-Good Back-Pats.” Autistic Hoya 11 Feb. 2016. 21 May 2017 <http://www.autistichoya.com/2016/02/disabled-people-are-not-your-feel-good-back-pats.html>.Crippledscholar. “Inspiration Porn Is Not Progress, It’s a New Kind of Oppression.” crippledscholar 5 May 2015. 21 May 2017 <https://crippledscholar.com/2015/05/05/inspiration-porn-is-not-progress-its-a-new-kind-of-oppression/>.Davis, Lennard J. Enforcing Normalcy: Disability, Deafness, and the Body. London: Verso, 1995.Driscoll, Beth. “Sentiment Analysis and the Literary Festival Audience.” Continuum 29.6 (2015): 861–873.Findlay, Carly. “Inspiration and Objectification of People with Disability – A Resource for Teachers and Parents.” Tune into Radio Carly 5 Feb. 2017. 21 May 2017 <http://carlyfindlay.blogspot.com.au/2017/02/inspiration-and-objectification-of.html>.Findlay, Carly. “When Parents Overshare Their Children’s Disability.” Sydney Morning Herald 23 July 2015. 21 May 2017 <http://www.smh.com.au/lifestyle/news-and-views/opinion/when-parents-overshare-their-childrens-disability-20150724-gijtw6.html>.Furr, June B., Alexis Carreiro, and John A. McArthur. “Strategic Approaches to Disability Disclosure on Social Media.” Disability & Society 31.10 (2016): 1353–1368.Haller, Beth, and Lingling Zhang. “Stigma or Empowerment? What Do Disabled People Say about Their Representation in News and Entertainment Media?” Review of Disability Studies: An International Journal 9.4 (2014).Harris, Lisa. “Genesis of Term ‘Inspiration Porn’?” Letter. 5 Oct. 2016.Leaver, Tama. “Born Digital? Presence, Privacy, and Intimate Surveillance.” Re-Orientation: Translingual Transcultural Transmedia. Studies in Narrative, Language, Identity, and Knowledge. Eds. John Hartley and Weigou Qu. Shanghai: Fudan University Press, 2015. 23 May 2017 <https://www.academia.edu/11736307/Born_Digital_Presence_Privacy_and_Intimate_Surveillance>.Mulvey, Laura. “Narrative Cinema and Visual Pleasure.” Visual and Other Pleasures. 1975.Mort, Mike. “Pity and the Prom.” Disabled Identity 9 May 2016. 21 May 2017 <https://disabledidentity.wordpress.com/2016/04/27/pity-and-the-prom/>.Pang, Bo, and Lillian Lee. “Opinion Mining and Sentiment Analysis.” Foundations and Trends® in Information Retrieval 2.1-2 (2008): 1–135.Perry, David M. “How ‘Inspiration Porn’ Reporting Objectifies People with Disabilities.” The Establishment 25 Feb. 2016. 23 May 2017 <https://theestablishment.co/how-inspiration-porn-reporting-objectifies-people-with-disabilities-db30023e3d2b>.Saggio, Jessica. “Disabled Teen Crowned Homecoming Queen in Awesome Way.” USA Today 13 Nov. 2015. 21 May 2017 <https://www.usatoday.com/story/news/humankind/2015/11/13/disabled-teen-crowned-homecoming-queen-awesome-way/75658376/>.Sinclair, Paul. “Inspiration Porn: Email Interview.” Letter. 21 Oct 2016.Stoltz, Melissa. “Parents of Children with Disabilities: Are We Speaking with or for a Community?” Two Thirds of the Planet 22 Jan. 2016. 21 May 2017 <http://www.twothirdsoftheplanet.com/parents-disability/>.Thelwall, Mike, et al. “Sentiment Strength Detection in Short Informal Text.” Journal of the American Society for Information Science and Technology 61.12 (2010): 2544–2558.Wanshel, Elyse. “This Show Just Schooled Everyone on ‘Inspiration Porn’.” Huffington Post 16 Jan. 2017. 21 May 2017 <http://www.huffingtonpost.com.au/entry/speechless-disability-porn_us_5877ddf6e4b0e58057fdc342>.Young, Stella. “I’m Not Your Inspiration, Thank You Very Much.” TED Talk Apr. 2014. 21 May 2017 <https://www.ted.com/talks/stella_young_i_m_not_your_inspiration_thank_you_very_much>.Young, Stella. “We’re Not Here for Your Inspiration.” ABC Ramp Up 1 July 2012. 21 May 2017 <http://www.abc.net.au/rampup/articles/2012/07/02/3537035.htm>.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography