880 resultados para broadcast encryption
Resumo:
Social media utilities have made it easier than ever to know about the range of online or offline social activities one could be engaging. On the upside, these social resources provide a multitude of opportunities for interaction; on the downside, they often broadcast more options than can be pursued, given practical restrictions and limited time. This dual nature of social media has driven popular interest in the concept of Fear of Missing Out – popularly referred to as FoMO. Defined as a pervasive apprehension that others might be having rewarding experiences from which one is absent, FoMO is characterized by the desire to stay continually connected with what others are doing. The present research presents three studies conducted to advance an empirically based understanding of the fear of missing out phenomenon. The first study collected a diverse international sample of participants in order to create a robust individual differences measure of FoMO, the Fear of Missing Out scale (FoMOs); this study is the first to operationalize the construct. Study 2 recruited a nationally representative cohort to investigate how demographic, motivational and well-being factors relate to FoMO. Study 3 examined the behavioral and emotional correlates of fear of missing out in a sample of young adults. Implications of the FoMOs measure and for the future study of FoMO are discussed.
Resumo:
The BBC television drama anthology The Wednesday Play, broadcast from 1964-70 on the BBC1 channel, was high-profile and often controversial in its time and has since been central to accounts of British television’s ‘golden age’. This article demonstrates that production technologies and methods were more diverse at that time than is now acknowledged, and that The Wednesday Play dramas drew both approving but also very critical responses from contemporary viewers and professional reviewers. This article analyses the ways that the physical spaces of production for different dramas in the series, and the different technologies of shooting and recording that were adopted in these production spaces, are associated with but do not determine aesthetic style. The adoption of single-camera location filming rather than the established production method of multi-camera studio videotaping in some of the dramas in the series has been important to The Wednesday Play’s significance, but each production method was used in different ways. The dramas drew their dramatic forms and aesthetic emphases from both theatre and cinema, as well as connecting with debates about the nature of drama for television. Institutional and regulatory frameworks such as control over staff working away from base, budgetary considerations and union agreements also impacted on decisions about how programmes were made. The article makes use of records from the BBC Written Archives Centre, as well as published scholarship. By placing The Wednesday Play in a range of overlapping historical contexts, its identity can be understood as transitional, differentiated and contested.
Resumo:
Seychelles supports around three million nesting pairs of sooty terns. However, there have been recent declines and the colonies continue to face ongoing threats from habitat change and excessive commercial harvesting of their eggs, as well as potential threats by commercial fishing and climate change. A possible method to counter these threats is to re-establish breeding colonies on islands from which they have disappeared. An attempt was made to attract birds to a previously occupied island through habitat management, decoy birds and playback of recorded sooty tern calls. Habitat preparation involved predator eradication and tree removal to provide open ground with bare sandy areas and low herb vegetation. Overflying birds were attracted by broadcast calls, with some circling over and landing among the decoys. Large three-dimensional plastic models were superior to other models presented. This study demonstrated that large numbers of birds can be attracted by these means and that the birds then undertook behaviour associated with breeding, including egg laying by a few birds. However, after five seasons a breeding colony has not yet been established; one possible cause is the emergence of unexpected egg predators, common moorhen Gallinula chloropus and common myna Acridotheres tristis.
Resumo:
In multiple-input multiple-output (MIMO) radar systems, the transmitters emit orthogonal waveforms to increase the spatial resolution. New frequency hopping (FH) codes based on chaotic sequences are proposed. The chaotic sequences have the characteristics of good encryption, anti-jamming properties and anti-intercept capabilities. The main idea of chaotic FH is based on queuing theory. According to the sensitivity to initial condition, these sequences can achieve good Hamming auto-correlation while also preserving good average correlation. Simulation results show that the proposed FH signals can achieve lower autocorrelation side lobe level and peak cross-correlation level with the increasing of iterations. Compared to the LFM signals, this sequence has higher range-doppler resolution.
Resumo:
Drawing on BBC archival documentation, this article outlines how BBC television versions of Beckett’s plays were affected by copyright. Rights to record and broadcast original drama for the screen differ from those governing adaptations of existing theatre plays. Rights can be assigned for specific territories and periods of time, and are negotiated and traded via complex contractual agreements. Examining how Beckett’s agents and the BBC dealt with rights sheds new light on the history of his work on television.
Resumo:
Twitter has become a dependable microblogging tool for real time information dissemination and newsworthy events broadcast. Its users sometimes break news on the network faster than traditional newsagents due to their presence at ongoing real life events at most times. Different topic detection methods are currently used to match Twitter posts to real life news of mainstream media. In this paper, we analyse tweets relating to the English FA Cup finals 2012 by applying our novel method named TRCM to extract association rules present in hash tag keywords of tweets in different time-slots. Our system identify evolving hash tag keywords with strong association rules in each time-slot. We then map the identified hash tag keywords to event highlights of the game as reported in the ground truth of the main stream media. The performance effectiveness measure of our experiments show that our method perform well as a Topic Detection and Tracking approach.
Resumo:
In an era of fragmenting audience and diversified viewing platforms, youth television needs to move fast and make a lot of noise in order to capture and maintain the attention of the teenage viewer. British ensemble youth drama Skins (E4, 2007-2013) calls attention to itself with its high doses of drugs, chaotic parties and casual attitudes towards sexuality. It also moves quickly, shedding its cast every two seasons as they graduate from school, then renewing itself with a fresh generation of 16 year old characters - three cycles in total. This essay will explore the challenges of maintaining audience connections whilst resetting the narrative clock with each cycle. I suggest that the development of the Skins brand was key to the programme’s success. Branding is particularly important for an audience demographic who increasingly consume their television outside of broadcast flow and essential for a programme which renews its cast every two years. The Skins brand operate as a framework, as the central audience draw, have the strength to maintain audience connections when it ‘graduates’ those characters they identify with at the close of each cycle and starts again from scratch. This essay will explore how the Skins brand constructs a cohesive identity across its multiple generations, yet also consider how the cyclic form poses challenges for the programme’s representations and narratives. This cyclic form allows Skins to repeatedly reach out to a new audience who comes of age alongside each new generation and to reflect shifts in British youth culture. Thus Skins remains ever-youthful, seeking to maintain an at times painfully hip identity. Yet the programme has a somewhat schizophrenic identity, torn between its roots in British realist drama and surrealist comedy and an escapist aspirational glamour that shows the influence of US Teen TV. This combination results in a tendency towards a heightened melodrama at odds with Skins claims for authenticity - its much vaunted teenage advisors and young writers - with the cyclic structure serving to amplify the programme’s excessive tendencies. Each cycle wrestles with a need for continuity and familiarity - partly maintained through brand, aesthetic and setting - yet a desire for freshness and originality, to assert difference from what has gone before. I suggest that the inevitable need for each cycle to ‘top’ what has gone before results in a move away from character-based intimacy and the everyday to high-stakes drama and violence which sits uncomfortably within British youth television.
Resumo:
The ambiguity of the role played by British propaganda in Italy during the Second World War is clearly reflected in the phenomenon of Radio London. While Radio London raised the morale of the Italian civilians living under the Fascist regime and provided them with alternative information on the conflict, the microphones of the BBC were also used by the British government to address a country they were planning to occupy. In this article, I will analyse the occupation/liberation operations that were run at the BBC Italian Service from two separate angles. On the one hand, the analysis of the programmes broadcast between the months preceding the Allies’ landing in Sicily and the actual occupation shows how the Allies built their image as liberators and guarantors of better living conditions. On the other, the analysis of the relationships between the Foreign Office and the anti-Fascist exiles reveals that the Italian BBC broadcasters were not always allowed to freely express their political opinion or to dispose of their own lives.
Resumo:
For the last few years, I have been working on an extensive digital model of ancient Rome as it appeared in the early 4th Century AD. This sort of visualisation lends itself to many applications in diverse fields: I am currently using it for research work into illumination and sightlines in the ancient city, have licensed it for broadcast in TV documentaries and publication in magazines, and am working with a computer games studio to turn it into an online game where players will be able to walk round the streets and buildings of the entire city (when not engaged in trading with or assassinating one another). Later this year I will be making a free online course, or MOOC, about the architecture of ancient Rome, which will largely be illustrated by this model.
Resumo:
Sampling owls in a reliable and standardized way is not easy given their nocturnal habits. Playback is a widely employed technique to survey owls. We assessed the influence of wind speed, temperature, air humidity, and moon phase on the response rate of the Tropical Screech Owl Megascops choliba and the Burrowing Owl Athene cunicularia in southeast Brazil. Tropical Screech Owl occurs in scrubland and wooded habitats, whereas the Burrowing Owl inhabits open grasslands to grassland savannah. Sixteen survey points were systematically distributed in four different landscape types, ranging from open grassland to woodland savannah. Field work was conducted in 2004 from June to December, the reproductive season of the two owl species. Our study design consisted of eight field expeditions of five nights each; four expeditions occurred under full moon and four under new moon conditions. At each survey station, we performed a broadcast/listening sequence involving several calls and vocalizations from each species, starting with Tropical Screech Owl (the smaller species). From 112 sample periods for each species within their respective preferred habitats, we obtained 54 responses from Tropical Screech Owl (48% response rate) and 30 responses (27% response rate) from Burrowing Owl. We found that the response rate of Tropical Screech Owl increased under conditions of higher temperature and air humidity, while the response rate of Burrowing Owl was higher during full moon nights.
Resumo:
While watching TV, viewers use the remote control to turn the TV set on and off, change channel and volume, to adjust the image and audio settings, etc. Worldwide, research institutes collect information about audience measurement, which can also be used to provide personalization and recommendation services, among others. The interactive digital TV offers viewers the opportunity to interact with interactive applications associated with the broadcast program. Interactive TV infrastructure supports the capture of the user-TV interaction at fine-grained levels. In this paper we propose the capture of all the user interaction with a TV remote control-including short term and instant interactions: we argue that the corresponding captured information can be used to create content pervasively and automatically, and that this content can be used by a wide variety of services, such as audience measurement, personalization and recommendation services. The capture of fine grained data about instant and interval-based interactions also allows the underlying infrastructure to offer services at the same scale, such as annotation services and adaptative applications. We present the main modules of an infrastructure for TV-based services, along with a detailed example of a document used to record the user-remote control interaction. Our approach is evaluated by means of a proof-of-concept prototype which uses the Brazilian Digital TV System, the Ginga-NCL middleware.
Resumo:
A novel cryptography method based on the Lorenz`s attractor chaotic system is presented. The proposed algorithm is secure and fast, making it practical for general use. We introduce the chaotic operation mode, which provides an interaction among the password, message and a chaotic system. It ensures that the algorithm yields a secure codification, even if the nature of the chaotic system is known. The algorithm has been implemented in two versions: one sequential and slow and the other, parallel and fast. Our algorithm assures the integrity of the ciphertext (we know if it has been altered, which is not assured by traditional algorithms) and consequently its authenticity. Numerical experiments are presented, discussed and show the behavior of the method in terms of security and performance. The fast version of the algorithm has a performance comparable to AES, a popular cryptography program used commercially nowadays, but it is more secure, which makes it immediately suitable for general purpose cryptography applications. An internet page has been set up, which enables the readers to test the algorithm and also to try to break into the cipher.
Resumo:
IPTV is now offered by several operators in Europe, US and Asia using broadcast video over private IP networks that are isolated from Internet. IPTV services rely ontransmission of live (real-time) video and/or stored video. Video on Demand (VoD)and Time-shifted TV are implemented by IP unicast and Broadcast TV (BTV) and Near video on demand are implemented by IP multicast. IPTV services require QoS guarantees and can tolerate no more than 10-6 packet loss probability, 200 ms delay, and 50 ms jitter. Low delay is essential for satisfactory trick mode performance(pause, resume,fast forward) for VoD, and fast channel change time for BTV. Internet Traffic Engineering (TE) is defined in RFC 3272 and involves both capacity management and traffic management. Capacity management includes capacityplanning, routing control, and resource management. Traffic management includes (1)nodal traffic control functions such as traffic conditioning, queue management, scheduling, and (2) other functions that regulate traffic flow through the network orthat arbitrate access to network resources. An IPTV network architecture includes multiple networks (core network, metronetwork, access network and home network) that connects devices (super head-end, video hub office, video serving office, home gateway, set-top box). Each IP router in the core and metro networks implements some queueing and packet scheduling mechanism at the output link controller. Popular schedulers in IP networks include Priority Queueing (PQ), Class-Based Weighted Fair Queueing (CBWFQ), and Low Latency Queueing (LLQ) which combines PQ and CBWFQ.The thesis analyzes several Packet Scheduling algorithms that can optimize the tradeoff between system capacity and end user performance for the traffic classes. Before in the simulator FIFO,PQ,GPS queueing methods were implemented inside. This thesis aims to implement the LLQ scheduler inside the simulator and to evaluate the performance of these packet schedulers. The simulator is provided by ErnstNordström and Simulator was built in Visual C++ 2008 environmentand tested and analyzed in MatLab 7.0 under windows VISTA.
Resumo:
This Master’s Thesis examines transnational conflicts and Christian-Muslim relations in Nigeria between the years 2001 and 2006. It focuses on two major transnational conflicts: The September 11, 2001 attacks in the United States and the Danish cartoon controversy of 2005/2006. It discusses the impact of these transnational conflicts on Christian-Muslim relations in Nigeria in the light of the implementation of the Sharia Law in some northern Nigerian states and the improved access to the broadcast media and mobile telephone communication in Nigeria. By underscoring the relationship between transnational conflicts and the local context, this study provides a new perspective for understanding Christian-Muslim relations in Nigeria
Resumo:
The purpose of this thesis is to show how to use vulnerability testing to identify and search for security flaws in networks of computers. The goal is partly to give a casual description of different types of methods of vulnerability testing and partly to present the method and results from a vulnerability test. A document containing the results of the vulnerability test will be handed over and a solution to the found high risk vulnerabilities. The goal is also to carry out and present this work as a form of a scholarly work.The problem was to show how to perform vulnerability tests and identify vulnerabilities in the organization's network and systems. Programs would be run under controlled circumstances in a way that they did not burden the network. Vulnerability tests were conducted sequentially, when data from the survey was needed to continue the scan.A survey of the network was done and data in the form of operating system, among other things, were collected in the tables. A number of systems were selected from the tables and were scanned with Nessus. The result was a table across the network and a table of found vulnerabilities. The table of vulnerabilities has helped the organization to prevent these vulnerabilities by updating the affected computers. Also a wireless network with WEP encryption, which is insecure, has been detected and decrypted.