Sex role stereotyping by players in first-person shooter games and other online gaming environments may encourage a social environment that marginalizes and alienates female players. Consistent with the social identity model of deindividuation effects (SIDE), the anonymity of online games may engender endorsement of group-consistent attitudes and amplification of social stereotyping, such as the adherence to gender norms predicted by expectations states theory. A 2 × 3 × 2 virtual field experiment (N = 520) in an online first-person shooter video game examined effects of a confederate players’ sex, communication style, and skill on players’ compliance with subsequent online friend requests. We found support for the hypothesis that, in general, women would gain more compliance with friend requests than men. We also found support for the hypothesis that women making positive utterances would gain more compliance with friend requests than women making negative utterances, whereas men making negative utterances would gain more compliance with friend requests than men making positive utterances. The hypothesis that player skill (i.e., game scores) would predict compliance with friend requests was not supported. Implications for male and female game players and computer-mediated communication in online gaming environments are discussed. 相似文献
3D video for tele-medicine applications is gradually gaining momentum since the 3D technology can provide precise location information. However, the weak link for 3D video streaming is the necessary wireless link of the communication system. Neglecting the wireless impairments can severely degrade the performance of 3D video streaming that communicates complex critical medical data. In this paper, we propose systematic methodology for ensuring high performance of the 3D medical video streaming system. First, we present a recursive end-to-end distortion estimation approach for MVC (multiview video coding)-based 3D video streaming over error-prone networks by considering the 3D inter-view prediction. Then, based on the previous model, we develop a cross-layer optimization scheme that considers the LTE wireless physical layer (PHY). In this optimization, the authentication requirements of 3D medical video are also taken into account. The proposed cross-layer optimization approach jointly controls and manages the authentication, video coding quantization of 3D video, and the modulation and channel coding scheme (MCS) of the LTE wireless PHY to minimize the end-to-end video distortion. Experimental results show that the proposed approach can provide superior 3D medical video streaming performance in terms of peak signal-to-noise ratio (PSNR) when compared to state-of-the-art approaches that include joint source-channel optimized streaming with multi-path hash-chaining based-authentication, and also conventional video streaming with single path hash-chaining-based authentication. 相似文献
Many methods for multinational License Plate Detection (LPD) have been proposed in recent times but most of them are not sophisticated enough to handle complex backgrounds. Moreover, their ability to handle various environmental and illumination conditions has been limited and still needs improvement. In this paper, we propose a novel technique to detect license plates of vehicles regardless of their color, size, and content. As the rear vehicle lights are an essential part of any vehicle, we reduce the image processing area to eliminate the complex background by detecting the rear-lights as the license plates are in a certain range of these lights. Heuristic Energy Map (HEM) of the vertical edge information in the Region of Interest (ROI) is calculated and area with the dense edges is selected using a unique histogram approach which is considered to be the license plate. The proposed algorithm is tested on 855 images from various countries including China, Pakistan, Serbia, Italy and various states of America. Experimental results show that the proposed method is able to detect license plates 90.4% of times despite of complex backgrounds in 0.25 s on average that can achieve real time performance. 相似文献
This study aimed to identify preservice chemistry teachers’ understanding of redox reactions at the submicroscopic level and how they make connections to macroscopic level. Twenty‐five preservice chemistry teachers first viewed a video of a redox reaction happening between a zinc wire and a copper(II) sulfate solution, then they reflected on their macroscopic observations, and generated storyboards (a sequence of drawings) representing this reaction at the submicroscopic level. Both the reflections and the storyboards were coded, and the categories reflecting the participants’ levels of understanding were determined. Results showed that the participants usually identified the macroscopic evidences, but they had conceptual difficulties in interpreting and representing evidences at the submicroscopic level. Few participants indicated a scientific or a moderate understanding of redox reactions, whereas the majority exhibited either weak or alternative understanding of redox reactions. 相似文献
The Fourth Amendment to the U.S. Constitution functions as a shield against excess governmental or police power by prohibiting unreasonable searches and seizures. Since its ratification, legal challenges have tempered this shield by frequently disputing the application of investigative processes and tools, including those that bypass the traditional – and simpler – analysis that focused on physical trespass. But recent technological advancements have prompted novel challenges and have forced the U.S. Supreme Court to adopt a parallel inquiry that evaluates society’s expectations of privacy as an alternate path to invoke the Fourth Amendment’s protections apart from any physical trespass. As revolutionary technology continues to present unique issues, this 200-year-old shield manifests a reflective luster as if polished by years of legal discourse that reveals the priorities of those who would interpret its text. Viewing the Fourth Amendment’s shield as a mirror illustrates not only the thoughts of the drafters that revolved primarily around protecting property interests but also the expectations of modern society with its insistence on promoting privacy. And where the drafters channeled their outrage against the loathsome writs of assistance in colonial times, later Americans continued to denounce the similarly invasive general warrants and attempts by investigators to expand the tools in their arsenal beyond constitutional bounds, especially in the surveillance context. Yet, the problems posed by new technology upon privacy concerns are best resolved by relying on the core principles supporting the Fourth Amendment, previous U.S. Supreme Court precedent, and current societal perspectives regarding privacy as a top priority proven by recently enacted legislation both foreign and domestic.
By applying a similar method to address advancing communication technology and its use as a surveillance tool in Carpenter v. United States, the Court turned this shield-become-mirror upon society to conclude that cell phone location information deserves Fourth Amendment protection because of its untiring comprehensiveness and its uniquely detailed nature. Moreover, nearly every American adult carries a cell phone with them almost all the time, making it possible to create a time-stamped map of any cell-phone-carrying-individual’s movements reaching back years and years. Unfortunately, the Carpenter Court did not extend this crucial protection far enough to protect all cell phone location data, and the unmistakable gap in its holding leaves a potential privacy vulnerability the exploitation of which could cause greater harm than all previously disputed surveillance technology combined because of cell phone usage’s general – near universal – applicability. Allowing cell phone location information to be obtained without probable cause and a proper search warrant not only fails to meet the spirit of the Fourth Amendment, it also begins to tarnish that shield such that it no longer reflects historical or current societal values, reducing its goal of protecting Americans to a hollow incantation of words left to languish as time (and technology) marches on. 相似文献
Abstract Recently, Gao and Tu presented an efficient algorithm for robust low bit‐rate video transmission by using a partial backward decodable bit stream (PBDBS) approach. In this paper, we first present a multiple‐PBDBS (MPBDBS) approach to improve on the previous PBDBS approach. Next a mathematical theory is provided to minimize the error propagation length in each group of blocks (GOB). Further, a novel MPBDBS‐based algorithm is presented for robust video transmission. Experimental results demonstrate that our proposed MPBDBS‐based algorithm has better image quality when compared to the previous PBDBS‐based algorithm, but has some bit‐rate and execution‐time degradation. In our experiments, both single and two‐bit error models are investigated. 相似文献
ABSTRACT Internet voice and video calling have demonstrated a dramatic rise in quality in the past several years and have quickly become communication technologies with a disruptive impact on society. Librarians, who regularly adopt such technologies in outreach and public services, should evaluate Web-calling programs as potential sources of innovative reference programming. This article describes the development of Skype video and Internet telephony pilot reference services at the Ohio University Libraries and considers the utility of Skype and VoIP in a library setting. 相似文献