scholarly journals The internet needs a competitive, royalty-free video codec

Author(s):  
James Bankoski ◽  
Matthew Frost ◽  
Adrian Grange

In this paper, we present the argument in favor of an open source, a royalty-free video codec that will keep pace with the evolution of video traffic. Additionally, we argue that the availability of a state-of-the-art, royalty-free codec levels the playing field, allowing small content owners, and application developers to compete with the larger companies that operate in this space.

Author(s):  
MUNEEB AHMED QURESHI ◽  
M.MADAN GOPAL ◽  
MOHAMMED SADIQ

The Open Source Environment and API’s Android not only created a boom in the market but also attracted large number of people to turn in to application developers. Android not only changed the technology but also help people how to get better with the means of technology This paper mainly showcase kernel level development with the help of java native interface technology; and FFmpeg (open source codec project) tool and associated libraries and at the end android based codec application is designed and implemented with the help of c/c++ and other languages.


2015 ◽  
pp. 87 ◽  
Author(s):  
Heidi Jauhiainen ◽  
Tommi Jauhiainen ◽  
Krister Lindén

 This paper describes a Kone Foundation funded project called "The Finno-Ugric Languages and The Internet" together with some of the achieved results. The main activity of the project is to crawl the internet and gather texts written in small Uralic languages. The sentences and words of the found texts will be assembled into a freely available corpus. Crawling is done using the open source crawler Heritrix, which is developed by the Internet Archive. Heritrix crawls through the pages and passes the found texts to a language identifier. We are using a state of the art language identifier, which has been further developed within the project and has been evaluated using 285 languages. We describe the language identification evaluation results concerning the 34 Uralic languages known by the language identifier. We also describe the initial observations and results from the first five large crawls which were done in the national internet domains of Finland, Sweden, Norway, Russia, and Estonia. 


2016 ◽  
Vol 11 (1) ◽  
pp. 91-103
Author(s):  
Carole Cusack ◽  
David Pecotic

The occult and the internet intersect in four ways: as a static medium for information; as a space where contested information or ideological conflict may occur; as a facilitator of communication; and as a medium for esoteric practice. The last type of activity is rare, but it is intriguing, in that technology can shape and inform beliefs and practices in unanticipated ways. Online engagement with the ‘Work’, the movement produced by the Greek Armenian spiritual teacher and esotericist G. I. Gurdjieff (c. 1866-1949) and his immediate followers, is an under-researched instance of online esoteric practice. This article addresses this scholarly desideratum, bringing the theoretical approaches of online religion and digital ethnography to bear on the Gurdjieff Internet Guide (GIG) website, founded by Reijo Oksanen (b. 1942) and later maintained by Kristina Turner, who created an accompanying Facebook page. The GIG manifests a shift away from the sectarian secrecy of the ‘Foundation’ groups, founded by Jeanne de Salzmann (1889-1990) after Gurdjieff’s death to formalise and protect the content of the Work, and the limited web presence that the Foundation permits. The GIG moves towards an ecumenical ‘open source’ approach to the dissemination of Gurdjieff’s teachings rooted in independent groups founded by other first generation followers of Gurdjieff who remained outside of the Foundation. It is argued that the deregulation of the religious and spiritual marketplace of the contemporary West, coupled with the dominant role played by the Internet in disseminating information, has radically transformed the Gurdjieff tradition, collapsing hierarchies and esoteric strategies, democratizing access for seekers, and creating new ritual and teaching modes.


Author(s):  
Elly Mufida ◽  
David Wardana Agus Rahayu

The VoIP communication system at OMNI Hospital Alam Sutera uses the Elastix 2.5 server with the Centos 5.11 operating system. Elastix 2.5 by the developer has been declared End of Life. The server security system is a serious concern considering that VoIP servers can be accessed from the internet. Iptables and fail2ban applications are applications that are used to limit and counteract those who try to attack the VoIP server. One application that can be used as an open source VoIP server is the Issabel Application version 4.0. The migration process from Elastix 2.5 application to Issabel 4.0 by backing up all configurations in the Elastix 2.5 application through a web browser including the configuration of endpoints, fax, e-mail, asterisk. After the backup file is downloaded then upload the backup file to the Issabel 4.0 application then run the migration process. Adding a backup path as a failover connection is needed because the VoIP communication protocol between the OMNI Hospitals Group still uses one path so that when there is a problem in the connection path, the communication protocol will stop. The tunnel EoIP is a protocol used as a backup path between the OMNI Hospitals Group site.


2006 ◽  
Vol 40 (3) ◽  
pp. 286-295 ◽  
Author(s):  
Andrew Buxton

PurposeTo review the variety of software solutions available for putting CDS/ISIS databases on the internet. To help anyone considering which route to take.Design/methodology/approachBriefly describes the characteristics, history, origin and availability of each package. Identifies the type of skills required to implement the package and the kind of application it is suited to. Covers CDS/ISIS Unix version, JavaISIS, IsisWWW, WWWISIS Versions 3 and 5, Genisis, IAH, WWW‐ISIS, and OpenIsis.FindingsThere is no obvious single “best” solution. Several are free but may require more investment in acquiring the skills to install and configure them. The choice will depend on the user's experience with CDS/ISIS formatting language, HTML, programming languages, operating systems, open source software, and so on.Originality/valueThere is detailed documentation available for most of these packages, but little previous guidance to help potential users to distinguish and choose between them.


Author(s):  
J.M. Murray ◽  
P. Pfeffer ◽  
R. Seifert ◽  
A. Hermann ◽  
J. Handke ◽  
...  

Objective: Manual plaque segmentation in microscopy images is a time-consuming process in atherosclerosis research and potentially subject to unacceptable user-to-user variability and observer bias. We address this by releasing Vesseg a tool that includes state-of-the-art deep learning models for atherosclerotic plaque segmentation. Approach and Results: Vesseg is a containerized, extensible, open-source, and user-oriented tool. It includes 2 models, trained and tested on 1089 hematoxylin-eosin stained mouse model atherosclerotic brachiocephalic artery sections. The models were compared to 3 human raters. Vesseg can be accessed at https://vesseg .online or downloaded. The models show mean Soerensen-Dice scores of 0.91±0.15 for plaque and 0.97±0.08 for lumen pixels. The mean accuracy is 0.98±0.05. Vesseg is already in active use, generating time savings of >10 minutes per slide. Conclusions: Vesseg brings state-of-the-art deep learning methods to atherosclerosis research, providing drastic time savings, while allowing for continuous improvement of models and the underlying pipeline.


i-com ◽  
2017 ◽  
Vol 16 (2) ◽  
pp. 181-193 ◽  
Author(s):  
Christian Reuter ◽  
Katja Pätsch ◽  
Elena Runft

AbstractThe Internet and especially social media are not only used for supposedly good purposes. For example, the recruitment of new members and the dissemination of ideologies of terrorism also takes place in the media. However, the fight against terrorism also makes use of the same tools. The type of these countermeasures, as well as the methods, are covered in this work. In the first part, the state of the art is summarized. The second part presents an explorative empirical study of the fight against terrorism in social media, especially on Twitter. Different, preferably characteristic forms are structured within the scope with the example of Twitter. The aim of this work is to approach this highly relevant subject with the goal of peace, safety and safety from the perspective of information systems. Moreover, it should serve following researches in this field as basis and starting point.


Sign in / Sign up

Export Citation Format

Share Document