Explore chapters and articles related to this topic
Wireless Multimedia Services and Applications
Published in K.R. Rao, Zoran S. Bojkovic, Dragorad A. Milovanovic, Wireless Multimedia Communications, 2018
K.R. Rao, Zoran S. Bojkovic, Dragorad A. Milovanovic
As the name multimedia implies, different types of media—video, audio, voice, and text—are involved. When multiple media types are involved in a session (e.g., video and audio), they need to be synchronized for simultaneous presentation to the user. Furthermore, multimedia services may be real-time or non-real-time. Videoconferencing is an example of real-time multimedia service. For real-time services, the time relation between successive data packets must be preserved, with little tolerance for jitter in packet arrival times. An example of a non-real-time multimedia service is multimedia messaging service (MMS), an enhancement of the popular SMS that allows multimedia messages, not just text messages. We focus on real-time multimedia services and the UMTS IP multimedia subsystem (IMS) that enables these services in UMTS.
The Three L’s
Published in Krzysztof W. Kolodziej, Johan Hjelm, Local Positioning Systems, 2017
Krzysztof W. Kolodziej, Johan Hjelm
A real-world example of such an indoor LBS application is the Personalized Shopping Assistant (commerce application category) (Asthana et al., 1994). The current methods of advertising in stores rely on public address systems or programmable light-emitting diode (LED) displays in the aisles. These methods are not effective due to the noise, distractions, and impersonal nature of the method. Shopping by catalog or from home (such as using Prodigy or TV-based home-shopping networks) has great appeal but is not going to replace physical shopping. Also, mobile text messaging (or SMS) allows companies to distribute advertising messages to mobile phones, targeted by user preference profiles. What customers are frustrated about is where to find things, determining the right price, etc.
SDN and NFV
Published in Dijiang Huang, Ankur Chowdhary, Sandeep Pisharody, Software-Defined Networking and Security, 2018
Dijiang Huang, Ankur Chowdhary, Sandeep Pisharody
If a service provider's customer requests a new function, for example, NFV enables the service provider to more easily add that service in the form of a virtual machine without upgrading or buying new hardware. Consider Multimedia Messaging Service (MMS), which is used to send messages with multimedia content over a cellular network. During the early 2000s, the MMS infrastructure included at least a dozen dedicated servers that had specialized functions in addition to a multimedia gateway. Launching MMS, or increasing capacity was expensive for a telco - and hence for the user. However, with NFV, a telco can add capacity as needed with virtualized generic servers; thereby reducing costs drastically.
Can virtuality be protective of team trust? Conflict and effectiveness in hybrid teams
Published in Behaviour & Information Technology, 2023
Marta P. Alves, Isabel D. Dimas, Paulo R. Lourenço, Teresa Rebelo, Vicente Peñarroja, Nuria Gamero
Emotions are an essential element in conflict situations (Jehn 1997). Indeed, team conflict, regardless of its type, involves stress and tension. At the same time, expressing emotions in virtual contexts might be difficult due to the challenges of technology (e.g. difficulties in nonverbal communication expression) (Stephens et al. 2013). Accordingly, future studies should explore the role of emotions and emotional expression during conflict in hybrid teams. A further study in this area could also be enriched by the use of behavioural data because this kind of information tends to be closer to the phenomena of interest (Baumeister, Vohs, and Funder 2007). For instance, virtual interactions (e.g. messages through instant messaging software, emails) between team members could be explored and analyzed to identify the presence of conflicts and the expression of emotions.
Use of mobile phone among patients with HIV/AIDS in a low-middle income setting: a descriptive exploratory study
Published in Behaviour & Information Technology, 2022
Gladys Dzansi, Jeniffer Chipps, Margaret Lartey
The data collection instrument was developed based on the desired skill competencies expected for using mobile phone alarm, text messaging and voice messages. The theory of affordances (Hartson 2003) underpinned the constructs that were measured relative to the phone type and the population. It was important to explore cognitive and functional affordances by assessing the use of the applications of interest in this study. Phone sharing practices were assessed leaning to findings by Hampshire et al. (2015) about phone ownership practices. The questionnaire had ten (10) items that evaluated the use of mobile phones. The use of mobile reminders was excluded following pretesting due to the redundancy of responses. The questions which were mainly categorical, assessed phone sharing practices, the use of alarm, text messages, voice calls and language preference for communication on the mobile phone. Additionally, responses were elicited on preference for training on the use of mobile phone. The variables were dichotomous therefore not eligible for the estimation of internal consistency coefficient. Face and content validity were maintained by ensuring the items measured exactly what was intended.
Unsupervised Event Detection Using Self-learning-based Max-margin Clustering: Analysis on Streaming Tweets
Published in IETE Journal of Research, 2020
To cope with wrong spelling and short forms of words used in user’s generated texts, the following correction methods are adopted: Process Repeated Letters: If a given character or a sequence of characters are repeated more than two times, they are replaced with the twice text constructs, e.g. “hahahaha” is replaced with “haha” and “helllo” is replaced with “hello”.Lingo2Word: Lingo2Word4 is dedicated to the deactivation of text messaging, Internet shorthand language, and translate messages in ordinary English. For example, the word “bz” is replaced with “because” whereas “hv” is replaced with “have”.Edit Distance: WordNet Dictionary5 and frequency of words in tweet dataset are considered as a repository to find correct word using edit distance method [21]. In our experiments, to obtain correct words, we perform maximum two edit operations with three types of edit operation: insertion of character, deletion of character, and replacement of a character. For example, the word “rast” is replaced with “rest” with edit distance one and “replacement of a character” edit operation.