Search results

1 – 10 of over 19000
Article
Publication date: 1 February 1997

Gerard McCusker

This study attempts to fill the gap in organisational identity literature. It describes the use of sound in communicating brand identity and explains the roles of the principal…

Abstract

This study attempts to fill the gap in organisational identity literature. It describes the use of sound in communicating brand identity and explains the roles of the principal ‘players’ in the production of one organisation's audio identity. As a case study, this research focuses on Radio Scotland's need for an identifiable sound, and also details the process involved in the design and implementation of its identity. Information about the case was generated via unstructured, open‐ended interviews with key informants within Radio Scotland and external parties who participated in the project. A chronology is used to present the findings of the case with analysis of the data led by four key research issues concerning: —sound's ability to communicate identity, —the balance between science and intuition in designing audio identity, —responsibility for sound identity production, and —requisite qualifications or knowledge for shaping audio identity. Conclusions show the use of sound to be instrumental in communicating Radio Scotland's identity, with the author suggesting that more research should be undertaken into the role of audio designs given the growth explosion in audio visual communications technology.

Details

Journal of Communication Management, vol. 1 no. 4
Type: Research Article
ISSN: 1363-254X

Keywords

Article
Publication date: 1 December 2004

Ishan Mandrekar, Vassilis Prevelakis and David Michael Turner

The authors have developed the “Ethernet Speaker” (ES), a network‐enabled single board computer embedded into a conventional audio speaker. Audio streams are transmitted in the…

Abstract

The authors have developed the “Ethernet Speaker” (ES), a network‐enabled single board computer embedded into a conventional audio speaker. Audio streams are transmitted in the local area network using multicast packets, and the ES can select any one of them and play it back. A key requirement for the ES is that it must be capable of playing any type of audio stream, independent of the streaming protocol, or the encoding used. The authors achieved this by providing a streaming audio server built using the kernel‐based audio stream redirector (ASR) in the OpenBSD kernel. The ASR accepts input from any of the existing audio file players, or streaming audio clients. Since all audio applications have to be able to use the system audio driver, this system can accommodate any protocol or file format, provided that there exists some compatible player running under OpenBSD. This paper discusses the design and implementation of the server as an ASR, the streaming protocol developed for this application, and the implementation of the client.

Details

Campus-Wide Information Systems, vol. 21 no. 5
Type: Research Article
ISSN: 1065-0741

Keywords

Article
Publication date: 27 February 2007

Patrick Wolf, Martin Steinebach and Konstantin Diener

The purpose of this paper is to show how digital watermarking can be applied to assist and improve cryptography‐based digital rights management (DRM) systems by allowing the…

1059

Abstract

Purpose

The purpose of this paper is to show how digital watermarking can be applied to assist and improve cryptography‐based digital rights management (DRM) systems by allowing the protection of content beyond the domain protected by the DRM system.

Design/methodology/approach

Digital watermarking is a passive technology, not allowing the active prevention of copyright violations. But it allows the irreversible linking of information with multimedia data, ensuring that an embedded watermark can be retrieved even after analogue copies. Therefore watermarking can be used where DRM fails: whenever content needs to be moved out of the protected DRM domain, e.g. when playing back content via analogue output channels it can mark the content with information that would help to identify its origin if it is used for copyright violations. The remaining challenge now is to find the marked content within the channels regularly used for copyright violations. The paper therefore introduces a concept for scanning file sharing networks for marked content.

Findings

The vast number of files present in the file sharing networks prohibits every approach based on completely scanning and analysing each file. Therefore concepts for filtered search queries where only potentially watermarked files are downloaded are discussed.

Originality/value

The paper shows how watermarking can be applied as a technology to allow active content protection beyond the limitations of current DRM systems.

Details

Online Information Review, vol. 31 no. 1
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 1 July 2021

Kawther Methlouthi and Ayoub Nefzi

This paper aims to investigate the ability of threatening communication to favorably modify children’s preventive behavior (8–12 years old) in the context of dental hygiene. It…

Abstract

Purpose

This paper aims to investigate the ability of threatening communication to favorably modify children’s preventive behavior (8–12 years old) in the context of dental hygiene. It also seeks to identify the type of threat that promotes the most children's persuasion (physical/social threat). Multi-method qualitative study was conducted followed by an experimental study to test the influence of threatening communication (social or physical) on children's emotional, cognitive and behavioral responses.

Design/methodology/approach

This study applies a combination of qualitative and quantitative approaches. First, multi-method qualitative study was used to explore the experience of children's exposure to threatening dental hygiene communications (focus groups, projective technique, individual interviews with dentists, etc.). Then, an experimental study based on a survey data collection to 1496 schoolchildren was conducted to test the influence of threatening communications (social or physical) on children's emotional, cognitive and behavioral responses. Indeed, different experimental situations were created by varying at each time the type of ads to which children were exposed.

Findings

Results indicate that using threat communications can be a powerful way to convince children to adopt healthy dental hygiene behaviour, and that physical threats are more effective than social threats.

Originality/value

The originality of this study is to focus on children’s’ affective and cognitive reactions to threatening dental health communication. This by emphasizing the nature of the threat used in communication (physical or social threat).

Details

Young Consumers, vol. 22 no. 4
Type: Research Article
ISSN: 1747-3616

Keywords

Article
Publication date: 1 November 2005

Thomas Moritz, Klaus‐Dieter Schewe and Bernhard Thalheim

The development of web information systems (WISs) requires modelling on various layers of abstraction. Based on an abstract abstraction layer model (ALM) the work in this article…

Abstract

The development of web information systems (WISs) requires modelling on various layers of abstraction. Based on an abstract abstraction layer model (ALM) the work in this article approaches the modelling on the highest layer dealing with strategic modelling. Strategic modelling addresses a very general characterisation of WISs in terms of its content, functionality, context, usage and presentation, and pragmatic guidelines for achieving these. The article discusses branding, utilisation space modelling, utilisation portfolio modelling and atmosphere modelling as the major parts of a strategic model. Furthermore, techniques based on linguistic analysis, communication analysis and metaphors make up the informal means to approach WISs in strategic terms.

Details

International Journal of Web Information Systems, vol. 1 no. 4
Type: Research Article
ISSN: 1744-0084

Keywords

Open Access
Article
Publication date: 22 September 2021

Gianluca Maguolo, Michelangelo Paci, Loris Nanni and Ludovico Bonan

Create and share a MATLAB library that performs data augmentation algorithms for audio data. This study aims to help machine learning researchers to improve their models using the…

1858

Abstract

Purpose

Create and share a MATLAB library that performs data augmentation algorithms for audio data. This study aims to help machine learning researchers to improve their models using the algorithms proposed by the authors.

Design/methodology/approach

The authors structured our library into methods to augment raw audio data and spectrograms. In the paper, the authors describe the structure of the library and give a brief explanation of how every function works. The authors then perform experiments to show that the library is effective.

Findings

The authors prove that the library is efficient using a competitive dataset. The authors try multiple data augmentation approaches proposed by them and show that they improve the performance.

Originality/value

A MATLAB library specifically designed for data augmentation was not available before. The authors are the first to provide an efficient and parallel implementation of a large number of algorithms.

Details

Applied Computing and Informatics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-1964

Keywords

Article
Publication date: 1 February 2005

Andreas Zimmermann and Andreas Lorenz

The paper deals with the design and creation of an intelligent user interface augmenting the user experience in everyday environments, by providing an immersive audio environment…

Abstract

The paper deals with the design and creation of an intelligent user interface augmenting the user experience in everyday environments, by providing an immersive audio environment. We highlight the potential of augmenting the visual real environment in a personalized way, thanks to context modeling techniques. The LISTEN project, a system for an immersive audio augmented environment applied in the art exhibition domain, provides an example of modeling and personalization methods affecting the audio interface in terms of content and organization. In addition, the different evolution steps of the system and the outcomes of the accompanying user tests are here reported.

Details

International Journal of Pervasive Computing and Communications, vol. 1 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 24 August 2010

Antonio K.W. Lau, Richard C.M. Yam, Esther P.Y. Tang and H.Y. Sun

The purpose of this paper is to explore the relationship between product modularity (PM) and supply chain integration (SCI), and to identify factors influencing this relationship.

3371

Abstract

Purpose

The purpose of this paper is to explore the relationship between product modularity (PM) and supply chain integration (SCI), and to identify factors influencing this relationship.

Design/methodology/approach

A case study approach involving in‐depth interviews on three modular and two non‐modular design projects in the Hong Kong and Pearl River Delta region was conducted. Within and cross‐case analyses were adopted.

Findings

Results support the current view that modular design is related to a loosely coordinated supply chain, whereas integrated design is associated with a tightly coordinated supply chain. However, this relationship is affected and explained by four contingency factors: new module/component development, technological knowledge leakage and creation, project team size and supply chain efficiency.

Research limitations/implications

The paper used a case study approach so the generalizability of the study is limited. This approach, however, enabled us to examine explicitly the relationship between PM and SCI, where empirical research was lacking. The rich content of each case suggested how and why modular design affects supply chain management.

Originality/value

The findings of this paper increase the understanding of the dynamics of modular product design and supply chain management. The paper also explores four contingency factors affecting the relationship.

Details

International Journal of Operations & Production Management, vol. 30 no. 9
Type: Research Article
ISSN: 0144-3577

Keywords

Book part
Publication date: 1 November 2012

Michael Truong and Anne Zanzucchi

In this chapter, we explore how new technologies, namely, video essays, audio-based feedback, and electronic portfolios, can transform traditional composition curriculum and…

Abstract

In this chapter, we explore how new technologies, namely, video essays, audio-based feedback, and electronic portfolios, can transform traditional composition curriculum and deepen student learning. We begin by discussing how new technologies connect and enhance learning experiences, especially within writing-intensive courses. For each of the three technologies, we provide a brief literature review, give a local case study, and conclude with suggested applications and related resources.

Details

Increasing Student Engagement and Retention Using Social Technologies
Type: Book
ISBN: 978-1-78190-239-4

Keywords

Article
Publication date: 1 March 1987

Natasha Owen

It is estimated that managers spend more time in meetings than in any other single activity — these will vary from informal discussion or briefing sessions around the workplace to…

Abstract

It is estimated that managers spend more time in meetings than in any other single activity — these will vary from informal discussion or briefing sessions around the workplace to carefully planned formal presentations involving sophisticated audio‐visual support Even in the smallest of organisations, the provision of comfortable, well‐designed and adequately equipped meeting rooms is essential. Not only is the meeting room a prime tool for management, training and selling the organisation's service, it is also the most potent indicator of corporate image and an important element in the overall design brief.

Details

Facilities, vol. 5 no. 3
Type: Research Article
ISSN: 0263-2772

1 – 10 of over 19000