• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 141
  • 31
  • 15
  • 5
  • 4
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 372
  • 372
  • 135
  • 130
  • 101
  • 73
  • 60
  • 55
  • 49
  • 48
  • 45
  • 42
  • 41
  • 41
  • 37
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
281

Like, Follow, Share

Unknown Date (has links)
My intention for this show is to explore the effect of alienation that ironically is being produced by social media. The principal concept is developed around shame, sharing, and notoriety on three different social media platforms, including Facebook, Instagram, and Telegram. This show explores the social media perception of myself in the realms of human interaction, identity, and memory in social media through the critical appropriation of the languages of design and photography. The installation with four Facebook profile pictures in large scale and framed looks at the way a personal image can convey the impression of widely different personalities. The selections of personal exchanges over Facebook and Instagram show the degree to which social media creates its own visual language and mode of communication, which sometimes becomes separated from reality and intention. The show extends its reach to performance and direct interaction with the viewer through the availability of stickers for comments by the profile pictures and a third area, where viewers can write or draw their own messages through the simple medium of chalk, which can then be rendered in virtual form through posts on a specially created webpage. The viewer should thus be challenged to ask, to what degrees do words and images communicate the essence of our selves and our own will. / Includes bibliography. / Thesis (M.F.A.)--Florida Atlantic University, 2016. / FAU Electronic Theses and Dissertations Collection
282

Comunicação digital de moda: entre o visível e o volátil na construção de imagens de marca

Hallage, Mariana Leonhardt 03 April 2018 (has links)
Submitted by Filipe dos Santos (fsantos@pucsp.br) on 2018-06-15T12:34:02Z No. of bitstreams: 1 Mariana Leonhardt Hallage.pdf: 4649504 bytes, checksum: 73447bf4b5dfd8e3f3979822307c794c (MD5) / Made available in DSpace on 2018-06-15T12:34:02Z (GMT). No. of bitstreams: 1 Mariana Leonhardt Hallage.pdf: 4649504 bytes, checksum: 73447bf4b5dfd8e3f3979822307c794c (MD5) Previous issue date: 2018-04-03 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES / This study intends to understand how fashion brands keep their strategies of branding and its own stories, while being internet’s social agents, through real time communication in digital social medias. The analysis is based by the view of the conflicting dynamic between the need showed by brands to be always visible and the scheduled volatility of images and videos produced in the cyberspace, particularly in social medias which its premise surrounds the idea of producing content units that lasts in visibility only for only day after being created and started its disclosure. To achieve this main reflection of thoughts, we intend to analyze the ephemeral audiovisual content production that three brands, being in the market as fast-fashions, besides of observing how they hand with their own image complexities by passing information of branding for volatile images. The logic of digital communication in real time and the one of fashion system are incredibly like each other, in terms of language and expressions of the needs of these brands, which will be also included here, in conclusion of this study. It will be elaborated case studies analyzing the brands C&A Brasil, Forever21 and Topshop, in their activities on digital social medias Snapchat and Instagram Stories, by collecting sixty days of image production. Talking about results, we could found content units which helps on the creation of a singular narrative strategy for each brand, maintaining their media visibility to their spectators / O presente estudo busca entender como algumas marcas de moda reiteram suas narrativas, enquanto agentes sociais na internet, através da comunicação em tempo real nas redes sociais digitais. A análise é balizada tendo em vista a dinâmica conflitante entre a necessidade que possuem, de estarem sempre visíveis, e a volatilidade programada das imagens e vídeos produzidos no ciberespaço, especificamente em redes sociais digitais, cuja premissa é que se produzam unidades de conteúdo, que durem por até um dia após o início de sua veiculação. Para atingir essa principal reflexão, analisa-se a produção de conteúdo audiovisual efêmero que três marcas em regime fast-fashion elaboraram, além de observar como lidam com complexidades imagéticas, na passagem de informação de imagem de marca para imagens voláteis. As lógicas de comunicação digital em tempo real e do sistema de moda apresentam pontos de convergência e similaridades, em termos de linguagem e expressão dos anseios dos agentes do mercado, que também serão abordados na dissertação. A análise dos dados percorre sessenta dias das marcas C&A Brasil, Forever 21 e Topshop, nas redes sociais digitais Snapchat e Instagram Stories, avaliando suas produções imagéticas. Como resultados, são evidenciados conteúdos que visam criar estrategicamente algumas narrativas, para auxiliarem as marcas na construção de uma imagem própria, singular
283

Redes transmidiáticas, diálogos e narrativas de esperança: uma cartografia do imaginário de um programa de TV religioso / Transmission networks, dialogues and narratives of hope: a cartography of the imaginary of a religious TV program

Jardim, Ana Paula Teixeira Guimarães 29 June 2018 (has links)
Submitted by Filipe dos Santos (fsantos@pucsp.br) on 2018-08-09T12:32:41Z No. of bitstreams: 1 Ana Paula Teixeira Guimarães Jardim.pdf: 6666761 bytes, checksum: 33e89de5a090c67b62e49975ae5bc403 (MD5) / Made available in DSpace on 2018-08-09T12:32:41Z (GMT). No. of bitstreams: 1 Ana Paula Teixeira Guimarães Jardim.pdf: 6666761 bytes, checksum: 33e89de5a090c67b62e49975ae5bc403 (MD5) Previous issue date: 2018-06-29 / In the context of network cultures and transmissive communication processes, there is an increasing number of online programs and platforms that are designed to create spaces for conversation. Several of these projects are integrated systems that seek to assist their readers, spectators and followers in overcoming existential problems and thus, adopt motivational discourses. The present master 's research has as objective to carry out a cartography of the social imaginary constituted from the dialogues and the narratives of hope that circulate around a program of Catholic religious television. The corpus of analysis is composed of the transmissive discourses made by the production and presentation of the program and the testimonies sent by viewers via social networks. The theoretical foundation is composed by: Jung (relations between the idea of "hope" and the discourses of religions); Paulo Freire, (concept of hope as persistence); and Lucia Leão (network culture, cartography of the imaginary, method and processes of communication in transmedia). The research method involved: (1) bibliographic research; (2) empirical research composed of surveys of social networking platforms such as Facebook, Twitter and Instagram; and (3) organization and analysis of the data according to the mapping method of narrative imagery. As a result, we have listed: (1) a review of the state of the art on the understanding of the idea of hope in digital social network discourses; (2) development of a system for collecting and mapping data from discourses in social networks; and (3) application, exercise and creation of a mapping of the data collected / No contexto das culturas em redes e dos processos comunicacionais transmidiáticos, observa-se a presença de uma crescente quantidade de programas e plataformas online que têm por objetivo criar espaços de conversação. Vários desses projetos são sistemas integrados que buscam auxiliar seus leitores, espectadores e seguidores na superação de problemas existenciais e, assim, adotam discursos motivacionais. A presente pesquisa de mestrado tem como objetivo realizar uma cartografia do imaginário social constituído a partir dos diálogos e das narrativas de esperança que circulam em torno de um programa de televisão religioso católico. O corpus de análise é composto pelos discursos transmidiáticos realizados pela produção e apresentação do programa e pelos testemunhos enviados por telespectadores via redes sociais. A fundamentação teórica é composta por: Jung (relações entre a ideia de “esperança” e os discursos das religiões); Paulo Freire (conceito de esperança como persistência); e Lucia Leão (cultura das redes, cartografia do imaginário, método e processos de comunicação em transmídia). O método de pesquisa envolveu: (1) pesquisa bibliográfica; (2) pesquisa empírica composta por levantamento dos discursos nas plataformas de redes sociais, como Facebook, Twitter e Instagram; e (3) organização e análise dos dados segundo o método de cartografia do imaginário das narrativas. Como resultados alcançados, listamos: (1) revisão do estado da arte sobre o entendimento da ideia de esperança nos discursos das redes sociais digitais; (2) desenvolvimento de um sistema de coleta e mapeamento de dados dos discursos nas redes sociais e (3) aplicação, exercício e criação de uma cartografia dos dados coletados
284

Comunicação em rede e alternativas democráticas: um estudo sobre junho de 2013 e novas formas de atuação política

Ferreira, Marco Aurélio 02 July 2018 (has links)
Submitted by Filipe dos Santos (fsantos@pucsp.br) on 2018-08-13T13:07:15Z No. of bitstreams: 1 Marco Aurélio Ferreira.pdf: 1954364 bytes, checksum: 5a80165bae241ad8ff13768ccec6d249 (MD5) / Made available in DSpace on 2018-08-13T13:07:15Z (GMT). No. of bitstreams: 1 Marco Aurélio Ferreira.pdf: 1954364 bytes, checksum: 5a80165bae241ad8ff13768ccec6d249 (MD5) Previous issue date: 2018-07-02 / The ideas generated in any locality soon accede the virtual space. They spread and are concretized in different places, be it a business room, a factory floor, a schoolyard, a family house or even in streets and public spaces. At the turn of the century, several large-scale protest demonstrations took the streets of urban centers around the world and an unprecedented element could be perceived among its agents: the intensive association of protesters with communication networks, which have as main characteristic the abundance and high-speed circulation of information. However,in the midst of so many transformations and novelties, digital information and communication technologies remain, to some extent, surrounded by unknowns about their potentialities, properties and functions in the context of contemporary democracy, as well as the cultural consequences of their application, reason which expresses the urgency to reflect on its nature and form of participation in collective dynamics, political mobilizations and social movements. This research analyzes the role played by digital communication networks in protests occurred in the city of São Paulo in June 2013, in order to delineate, analyze and understand some of the characteristics of its successful way to disseminate information and its power to persuade and engage citizens that were not previously linked to cultural-political groups or social movements. In sum, it is proposed to investigate how and why the ICTs used in digital communication networks have assumed a preponderant role in June’s disputes and to raise interpretations about their nature and the issues ofcommunicationin contemporary society. The methodology of the work assumes hybrid formulation between bibliographic research, documentary analysis and, consequently, conceptual articulation, from which the analyzes were carried out / As ideias geradas em qualquer localidade logo acedem ao espaço virtual. Disseminam-se e se concretizam em diferentes lugares, seja uma sala de empresa, um chão de fábrica, um pátio de escola, um cômodo da casa ou, ainda, as ruas e espaços públicos das cidades. Na virada do século, diversas manifestações reivindicatórias de grandes proporções tomaram as ruas de centros urbanos em todo o mundo e um elemento inédito pode ser percebido entre seus agentes: a associação intensiva das redes de comunicação, cuja marca característica versa sobre a abundância e aceleração da circulação de informações. Em meio a tantas transformações e novidades, entretanto, as tecnologias de informação e comunicação digitais permanecem, em certa medida, cercadas por incógnitas a respeito de suas potencialidades, propriedades e funções no contexto da democracia contemporânea; além das consequências culturais de sua aplicação, motivo pelo qual se expressa a urgência da necessidade de refletir sobre sua natureza e forma de participação nas dinâmicas coletivas, mobilizações políticas e movimentos sociais. Esta pesquisa analisa o papel desempenhado pelas redes de comunicação digitais nas manifestações ocorridas na cidade de São Paulo, em junho de 2013, a fim de delinear, analisar e compreender algumas das características desse modelo exitoso na difusão de informações, convencimento e engajamento de manifestantes não vinculados diretamente a coletivos político-culturais ou membros dos movimentos sociais. Em suma, propõe-se investigar como e porque as TICs utilizadas em redes digitais de comunicação assumiram papel preponderante nas disputas de junho e levantar interpretações acerca de sua natureza e de questões comunicacionais da sociedade contemporânea. A metodologia do trabalho assume formulação híbrida entre pesquisa bibliográfica, análise documental e, consequentemente, articulação conceitual, a partir das quais foram realizadas as análises
285

Empirical Evaluation of Cloud IAAS Platforms using System-level Benchmarks

Deval, Niharika 01 January 2017 (has links)
Cloud Computing is an emerging paradigm in the field of computing where scalable IT enabled capabilities are delivered ‘as-a-service’ using Internet technology. The Cloud industry adopted three basic types of computing service models based on software level abstraction: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS). Infrastructure-as-a-Service allows customers to outsource fundamental computing resources such as servers, networking, storage, as well as services where the provider owns and manages the entire infrastructure. This allows customers to only pay for the resources they consume. In a fast-growing IaaS market with multiple cloud platforms offering IaaS services, the user's decision on the selection of the best IaaS platform is quite challenging. Therefore, it is very important for organizations to evaluate and compare the performance of different IaaS cloud platforms in order to minimize cost and maximize performance. Using a vendor-neutral approach, this research focused on four of the top IaaS cloud platforms- Amazon EC2, Microsoft Azure, Google Compute Engine, and Rackspace cloud services. This research compared the performance of IaaS cloud platforms using system-level parameters including server, file I/O, and network. System-level benchmarking provides an objective comparison of the IaaS cloud platforms from performance perspective. Unixbench, Dbench, and Iperf are the system-level benchmarks chosen to test the performance of the server, file I/O, and network respectively. In order to capture the performance variability, the benchmark tests were performed at different time periods on weekdays and weekends. Each IaaS platform's performance was also tested using various parameters. The benchmark tests conducted on different virtual machine (VM) configurations should help cloud users select the best IaaS platform for their needs. Also, based on their applications' requirements, cloud users should get a clearer picture of which VM configuration they should choose. In addition to the performance evaluation, the price-per-performance value of all the IaaS cloud platforms was also examined.
286

Towards Designing Energy Efficient Symmetric Key Protocols

Talluri, Sai Raghu 01 January 2018 (has links)
Energy consumption by various modern symmetric key encryption protocols (DES, 3-DES, AES and, Blowfish) is studied from an algorithmic perspective. The work is directed towards redesigning or modifying the underlying algorithms for these protocols to make them consume less energy than they currently do. This research takes the approach of reducing energy consumption by parallelizing the consecutive memory accesses of symmetric key encryption algorithms. To achieve parallelization, an existing energy complexity model is applied to symmetric key encryption algorithms. Inspired by the popular DDR3 architecture, the model assumes that main memory is divided into multiple banks, each of which can store multiple blocks. Each block in a bank can only be accessed from a cache of its own, that can hold exactly one block. However all the caches from different banks can be accessed simultaneously. In this research, experiments are conducted to measure the difference in energy consumption by varying the level of parallelization, i.e. variations of, number of banks that can be accessed in parallel. The experimental results show that the higher the level of parallelism, smaller is the energy consumption.
287

Modeling Context-Adaptive Energy-Aware Security in Mobile Devices

Singh, Preeti 01 January 2019 (has links)
As increasing functionality in mobile devices leads to rapid battery drain, energy management has gained increasing importance. However, differences in user’s usage contexts and patterns can be leveraged for saving energy. On the other hand, the increasing sensitivity of users’ data, coupled with the need to ensure security in an energy-aware manner, demands careful analyses of trade-offs between energy and security. The research described in this thesis addresses this challenge by 1)modeling the problem of context-adaptive energy-aware security as a combinatorial optimization problem (Context-Sec); 2) proving that the decision version of this problem is NP-Complete, via a reduction from a variant of the well-known Knapsack problem; 3) developing three different algorithms to solve a related offline version of Context-Sec; and 4) implementing tests and compares the performance of the above three algorithms with data-sets derived from real-world smart-phones on wireless networks. The first algorithm presented is a pseudo-polynomial dynamic programming (DP)algorithm that computes an allocation with optimal user benefit using recurrence of the relations; the second algorithm is a greedy heuristic for allocation of security levels based on user benefit per unit of power consumption for each level; and the third algorithm is a Fully Polynomial Time Approximation Scheme (FPTAS) which has a polynomial time execution complexity as opposed to the pseudo-polynomialDP based approach. To the best of the researcher’s knowledge, this is the first work focused on modeling, design, implementation and experimental performance.
288

Trust-but-Verify: Guaranteeing the Integrity of User-generated Content in Online Applications

Dua, Akshay 26 September 2013 (has links)
Online applications that are open to participation lack reliable methods to establish the integrity of user-generated information. Users may unknowingly own compromised devices, or intentionally publish forged information. In these scenarios, applications need some way to determine the "correctness" of autonomously generated information. Towards that end, this thesis presents a "trust-but-verify" approach that enables open online applications to independently verify the information generated by each participant. In addition to enabling independent verification, our framework allows an application to verify less information from more trustworthy users and verify more information from less trustworthy ones. Thus, an application can trade-off performance for more integrity, or vice versa. We apply the trust-but-verify approach to three different classes of online applications and show how it can enable 1) high-integrity, privacy-preserving, crowd-sourced sensing 2) non-intrusive cheat detection in online games, and 3) effective spam prevention in online messaging applications.
289

User-Centric Privacy Preservation in Mobile and Location-Aware Applications

Guo, Mingming 10 April 2018 (has links)
The mobile and wireless community has brought a significant growth of location-aware devices including smart phones, connected vehicles and IoT devices. The combination of location-aware sensing, data processing and wireless communication in these devices leads to the rapid development of mobile and location-aware applications. Meanwhile, user privacy is becoming an indispensable concern. These mobile and location-aware applications, which collect data from mobile sensors carried by users or vehicles, return valuable data collection services (e.g., health condition monitoring, traffic monitoring, and natural disaster forecasting) in real time. The sequential spatial-temporal data queries sent by users provide their location trajectory information. The location trajectory information not only contains users’ movement patterns, but also reveals sensitive attributes such as users’ personal habits, preferences, as well as home and work addresses. By exploring this type of information, the attackers can extract and sell user profile data, decrease subscribed data services, and even jeopardize personal safety. This research spans from the realization that user privacy is lost along with the popular usage of emerging location-aware applications. The outcome seeks to relive user location and trajectory privacy problems. First, we develop a pseudonym-based anonymity zone generation scheme against a strong adversary model in continuous location-based services. Based on a geometric transformation algorithm, this scheme generates distributed anonymity zones with personalized privacy parameters to conceal users’ real location trajectories. Second, based on the historical query data analysis, we introduce a query-feature-based probabilistic inference attack, and propose query-aware randomized algorithms to preserve user privacy by distorting the probabilistic inference conducted by attackers. Finally, we develop a privacy-aware mobile sensing mechanism to help vehicular users reduce the number of queries to be sent to the adversarial servers. In this mechanism, mobile vehicular users can selectively query nearby nodes in a peer-to-peer way for privacy protection in vehicular networks.
290

Analysis and Mitigation of SEU-induced Noise in FPGA-based DSP Systems

Pratt, Brian Hogan 11 February 2011 (has links)
This dissertation studies the effects of radiation-induced single-event upsets (SEUs) on digital signal processing (DSP) systems designed for field-programmable gate arrays (FPGAs). It presents a novel method for evaluating the effects of radiation on DSP and digital communication systems. By using an application-specific measurement of performance in the presence of SEUs, this dissertation demonstrates that only 5-15% of SEUs affecting a communications receiver (i.e. 5-15% of sensitive SEUs) cause critical performance loss. It also reports that the most critical SEUs are those that affect the clock, global reset, and most significant bits (MSBs) of computation. This dissertation also demonstrates reduced-precision redundancy (RPR) as an effective and efficient alternative to the popular triple modular redundancy (TMR) for FPGA-based communications systems. Fault injection experiments show that RPR can improve the failure rate of a communications system by over 20 times over the unmitigated system at a cost less than half that of TMR by focusing on the critical SEUs. This dissertation contrasts the cost and performance of three different variations of RPR, one of which is a novel variation developed here, and concludes that the variation referred to as "Threshold RPR" is superior to the others for FPGA systems. Finally, this dissertation presents several methods for applying Threshold RPR to a system with the goal of reducing mitigation cost and increasing the system performance in the presence of SEUs. Additional fault injection experiments show that optimizing the application of RPR can result in a decrease in critical SEUs by as much 65% at no additional hardware cost.

Page generated in 0.0637 seconds