Stefan Münker and Alexander Roesler from Myth to Standard Practice and a History of the Internet

Total Page:16

File Type:pdf, Size:1020Kb

Stefan Münker and Alexander Roesler from Myth to Standard Practice and a History of the Internet Stefan Münker and Alexander Roesler From myth to standard practice And a history of the Internet When in the mid Nineties, the Internet set off on its path to success, expectations were high - too high. So, even before most people knew how to use a browser or surf on the digital network, a myth was born: the myth of a new and wonderful world in which you could go beyond the limits of space and time to create the places of utopian visions and bring them to life. As the technology of the world of the net progressed, it became possible, but also necessary, to break the myth’s spell1. And that’s just one aspect. Despite the fact that the inventions of the wheel, writing, printing machines, the steam engine or the telephone may have been more important in terms of the history of civilization, it is still true that up until now no medium like the Internet has generated such a high number of important changes and technical innovations; and its success story is far from over. The other aspect is this: new cultural practices – whose key words are e-mail, chat etc. – have emerged and influence previous ones. We communicate in a different way, we have faster access to information, and we move in new and different ways in a world that actually appears to have become smaller, or in any event to have undergone a transformation in media terms. Today, for many of us, the INTERnational NETwork is part of our daily lives: it is an engine that fuels economic growth and scientific progress, a tool for social and political commerce, a means for artistic and literary works, an agora, a darkroom, a laboratory, an archive and a search engine. Above all it represents an irreversible process. Instead of nurturing illusory expectations, nowadays users make straightforward practical requests of this technology and its (continual) developments, and expect competence, flexibility and creativity. Life and commerce in an electronic environment visibly represent common practice for entire communities and for mankind in general, even outside of the digital sphere. The truth is that what has happened depends paradoxically on the strength of the myth. Its utopian tales of possible conquests of cyber space, paralleling them to the colonization of a new and far-away continent brimming with unexpected opportunities, liberated the initial energy needed for the enormous technological and economical 1 S. Münker / A. Roesler (ed.), Mythos Internet, .Suhrkamp 1997. efforts that have led to the establishment of the Internet as a medium that works globally and that can be used by the masses. Energy that is all-important for its future development. But despite the fact that these Utopias can provide us with an incentive, they have not let themselves be transformed into standard practice. The latest social sphere to have suffered enormous losses was the economy. Even the so-called rational experts of the economy’s local and global players, after an initial hesitation, in the end believed in the almost too optimistic promises of the market and read too much into them, attempting to capitalize on them, and to a certain extent ended up paying dearly for them. The mistakes made in economic evaluations are typical. Even though, in this era of globalisation, the Internet is no doubt an efficient medium and is able to generate profits for e-commerce, it can quite rightly be confirmed that with the Internet, Marx’s words “all peoples mingle in the network of the world market” has reached its digital level (Haug 619). However, the euphoric visions of the so-called “new” market, also known as the other one, have not succeeded in integrating with the existing economic system: what exists is actually a single market. Ironically the bankruptcy of the Internet start-up companies and the collapse of shares such as Dotcom provide more information about how the stock market works than how Internet works. And despite everything, once the initial media hubbub had subsided, the Internet was shelved as a mere myth, a bit like throwing the baby away with the dirty water. In the same way as the myth and the Enlightenment are linked dialectically, the utopian potential promised by the myth is in actual fact intertwined with the practical use of the network. Brief history of the Internet “Where you are makes no difference”, “you will find what you are looking for”. The Internet makes promises such as these to draw us users into its spell. A promise that talks about uniting the memory capacity of a digital machine with the possibility of transcribing electronic media in truth does sound like the Utopia of successful globalisation. It tells us that: everything is always there, each one of us is always understood. What each of us says, is revealed by the statistics (that given the rapid growth are almost always out of date before they are even published): if five years ago the number of users was estimated to be around 50-60 million, today, in 2001, the number has risen to around 400 million. There are estimated to be around 110 million hosts, which simply means computers that have a personal Internet address. In August 2001, only half of the population of Germany had access to the Internet. Users spent most of their time simply surfing the net, participating in on-line auctions and looking for bargains on the second-hand sites, amusing themselves in the numerous chat rooms or with multiplayer video games. The most common uses of the net, apart from e-mail which is the most popular and attractive feature of this new medium, are downloading of a variety of different types of data, online banking and shopping, holiday reservations, the use of various services by public enterprises, such as trading shares and securities, and, last but not least, visiting pornographic sites. Just as the triumphant march of the Internet, from the mid Nineties on, was consumed in an impetuous and spectacular way, setting up the connection of the network of networks has dragged itself slowly and imperceptibly over the course of a long period of time: The responsibility for the birth of Internet can be attributed in a certain sense to the Sputnik, or more precisely the fear of the USA of losing the struggle for universal supremacy after the Soviet rocket made its blissful trip around the world. Because of this, at the end of the Fifties, the Pentagon gave life, amongst other things, to a new research group, the so- called Advanced Research Project Agency, abbreviated to ARPA. A decade later, the struggle in space was temporarily resolved, with the moon landing of Apollo 11, in favour of the Americans, who were just about to suffer a new humiliation, this time on a bigger scale given that they were the leading world power: the retreat from Vietnam. For this reason, Arpa’s scientists developed a decentralised network, named Arpanet, whose strategic aim was to connect up computers at different military bases, so that communication could not be interrupted even in the event of a nuclear attack. The outcome of this historical-media development was the transformation of the computer from calculator to means of communication, something that, according to Arpa documentation, took place thanks to the then director J.C.R. Licklider. In autumn ’69 Arpanet went online in collaboration with the University of California in Los Angeles, the Stanford Research Institute, the University of Utah and the University of California in Santa Barbara. The number of universities connected rose rapidly as they started to discover the advantages of the network, above those strictly linked to military and strategic circles, for those interested in exchanging scientific information. Consequently, the technical possibilities of the network continually progressed. This is how, for example, in 1971, the File-Transfer-Protocol made it possible to exchange data between individual computers; Telnet enabled direct access to another computer connected to the network; and finally, thanks to the user@host convention, Internet’s electronic mail (e- mail) service was programmed. In 1973, Transmission Control Protocol (TCP) gave a decisive boost to further development: the connection between different networks and, with the later addition of Internet Protocol (IP) to TCP, the network officially received its name. In 1978 the Arpanet experiment finally reached its conclusion, even though the Arpanet itself was closed down only in 1990. In parallel to further developments of the technical possibilities of Internet, additional networks were created in the Eighties, on the basis of the Bulletin Board System (BBS), some were private such as FidoNet in 1983 or in 1985, the Whole Earth ‘Lectronic Link (WELL), and others were commercial, such as Computerserve and AOL, that worked without being connected to Internet for a brief initial period. When in 1989 Computerserve started to dominate in Internet, the idea of independent networks disappeared de facto. From the end of the Eighties, the Internet started to envelop the globe with its network. Despite this, for several years, it was relatively unfamiliar to the general public; also because it was truly difficult to use. The solution to the problem, that launched the real boom of the Internet, was the invention of Tim Berners-Lee at the Swiss Research Centre CERN in 1991: the Word Wide Web. The network therefore became suitable for multimedia use and was warmly welcomed by the global information society, already omnipresent at that time. In the meantime the three letters WWW have almost become a synonym of the Internet and hardly anybody remembers the times of network pioneers when there were no images or sounds, when the pilot programs that surfed on the sea of data had beautiful names such as Gopher, Veronica or Archie… The rest of the story is common knowledge: the Internet developed in three stages starting from the strategic experiments of the American army, then through an international communication plan set up by university researchers, and finally to the commercialisation of this means of communication, for many nowadays used as a sort of “means of daily assistance”.
Recommended publications
  • History of the Internet-English
    Sirin Palasri Steven Huter ZitaWenzel, Ph.D. THE HISTOR Y OF THE INTERNET IN THAILAND Sirin Palasri Steven G. Huter Zita Wenzel (Ph.D.) The Network Startup Resource Center (NSRC) University of Oregon The History of the Internet in Thailand by Sirin Palasri, Steven Huter, and Zita Wenzel Cover Design: Boonsak Tangkamcharoen Published by University of Oregon Libraries, 2013 1299 University of Oregon Eugene, OR 97403-1299 United States of America Telephone: (541) 346-3053 / Fax: (541) 346-3485 Second printing, 2013. ISBN: 978-0-9858204-2-8 (pbk) ISBN: 978-0-9858204-6-6 (English PDF), doi:10.7264/N3B56GNC ISBN: 978-0-9858204-7-3 (Thai PDF), doi:10.7264/N36D5QXN Originally published in 1999. Copyright © 1999 State of Oregon, by and for the State Board of Higher Education, on behalf of the Network Startup Resource Center at the University of Oregon. This work is licensed under a Creative Commons Attribution- NonCommercial 3.0 Unported License http://creativecommons.org/licenses/by-nc/3.0/deed.en_US Requests for permission, beyond the Creative Commons authorized uses, should be addressed to: The Network Startup Resource Center (NSRC) 1299 University of Oregon Eugene, Oregon 97403-1299 USA Telephone: +1 541 346-3547 Email: [email protected] Fax: +1 541-346-4397 http://www.nsrc.org/ This material is based upon work supported by the National Science Foundation under Grant No. NCR-961657. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.
    [Show full text]
  • Telecommunications Infrastructure for Electronic Delivery 3
    Telecommunications Infrastructure for Electronic Delivery 3 SUMMARY The telecommunications infrastructure is vitally important to electronic delivery of Federal services because most of these services must, at some point, traverse the infrastructure. This infrastructure includes, among other components, the Federal Government’s long-distance telecommunications program (known as FTS2000 and operated under contract with commercial vendors), and computer networks such as the Internet. The tele- communications infrastructure can facilitate or inhibit many op- portunities in electronic service delivery. The role of the telecommunications infrastructure in electronic service delivery has not been defined, however. OTA identified four areas that warrant attention in clarifying the role of telecommunications. First, Congress and the administration could review and update the mission of FTS2000 and its follow-on contract in the context of electronic service delivery. The overall perform- ance of FTS2000 shows significant improvement over the pre- vious system, at least for basic telephone service. FTS2000 warrants continual review and monitoring, however, to assure that it is the best program to manage Federal telecommunications into the next century when electronic delivery of Federal services likely will be commonplace. Further studies and experiments are needed to properly evaluate the benefits and costs of FTS2000 follow-on options from the perspective of different sized agencies (small to large), diverse Federal programs and recipients, and the government as a whole. Planning for the follow-on contract to FTS2000 could consider new or revised contracting arrangements that were not feasible when FTS2000 was conceived. An “overlapping vendor” ap- proach to contracting, as one example, may provide a “win-win” 57 58 I Making Government Work situation for all parties and eliminate future de- national infrastructure will be much stronger if bates about mandatory use and service upgrades.
    [Show full text]
  • Snapshot: a Self-Calibration Protocol for Camera Sensor Networks
    Snapshot: A Self-Calibration Protocol for Camera Sensor Networks Xiaotao Liu, Purushottam Kulkarni, Prashant Shenoy and Deepak Ganesan Department of Computer Science University of Massachusetts, Amherst, MA 01003 Email: {xiaotaol, purukulk, shenoy, dganesan}@cs.umass.edu Abstract— A camera sensor network is a wireless network of are based on the classical Tsai method—they require a set cameras designed for ad-hoc deployment. The camera sensors of reference points whose true locations are known in the in such a network need to be properly calibrated by determin- physical world and use the projection of these points on the ing their location, orientation, and range. This paper presents Snapshot, an automated calibration protocol that is explicitly camera image plane to determine camera parameters. Despite designed and optimized for camera sensor networks. Snapshot the wealth of research on calibration in the vision community, uses the inherent imaging abilities of the cameras themselves for adapting these techniques to sensor networks requires us to pay calibration and can determine the location and orientation of a careful attention to the differences in hardware characteristics camera sensor using only four reference points. Our techniques and capabilities of sensor networks. draw upon principles from computer vision, optics, and geometry and are designed to work with low-fidelity, low-power camera First, sensor networks employ low-power, low-fidelity cam- sensors that are typical in sensor networks. An experimental eras such as the CMUcam [16] or Cyclops [11] that have evaluation of our prototype implementation shows that Snapshot coarse-grain imaging capabilities; at best, a mix of low- yields an error of 1-2.5 degrees when determining the camera end and a few high-end cameras can be assumed in such orientation and 5-10cm when determining the camera location.
    [Show full text]
  • The Future of the Internet and How to Stop It the Harvard Community Has
    The Future of the Internet and How to Stop It The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters. Jonathan L. Zittrain, The Future of the Internet -- And How to Citation Stop It (Yale University Press & Penguin UK 2008). Published Version http://futureoftheinternet.org/ Accessed July 1, 2016 4:22:42 AM EDT Citable Link http://nrs.harvard.edu/urn-3:HUL.InstRepos:4455262 This article was downloaded from Harvard University's DASH Terms of Use repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http://nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms- of-use#LAA (Article begins on next page) YD8852.i-x 1/20/09 1:59 PM Page i The Future of the Internet— And How to Stop It YD8852.i-x 1/20/09 1:59 PM Page ii YD8852.i-x 1/20/09 1:59 PM Page iii The Future of the Internet And How to Stop It Jonathan Zittrain With a New Foreword by Lawrence Lessig and a New Preface by the Author Yale University Press New Haven & London YD8852.i-x 1/20/09 1:59 PM Page iv A Caravan book. For more information, visit www.caravanbooks.org. The cover was designed by Ivo van der Ent, based on his winning entry of an open competition at www.worth1000.com. Copyright © 2008 by Jonathan Zittrain. All rights reserved. Preface to the Paperback Edition copyright © Jonathan Zittrain 2008. Subject to the exception immediately following, this book may not be reproduced, in whole or in part, including illustrations, in any form (beyond that copying permitted by Sections 107 and 108 of the U.S.
    [Show full text]
  • Trojans and Malware on the Internet an Update
    Attitude Adjustment: Trojans and Malware on the Internet An Update Sarah Gordon and David Chess IBM Thomas J. Watson Research Center Yorktown Heights, NY Abstract This paper continues our examination of Trojan horses on the Internet; their prevalence, technical structure and impact. It explores the type and scope of threats encountered on the Internet - throughout history until today. It examines user attitudes and considers ways in which those attitudes can actively affect your organization’s vulnerability to Trojanizations of various types. It discusses the status of hostile active content on the Internet, including threats from Java and ActiveX, and re-examines the impact of these types of threats to Internet users in the real world. Observations related to the role of the antivirus industry in solving the problem are considered. Throughout the paper, technical and policy based strategies for minimizing the risk of damage from various types of Trojan horses on the Internet are presented This paper represents an update and summary of our research from Where There's Smoke There's Mirrors: The Truth About Trojan Horses on the Internet, presented at the Eighth International Virus Bulletin Conference in Munich Germany, October 1998, and Attitude Adjustment: Trojans and Malware on the Internet, presented at the European Institute for Computer Antivirus Research in Aalborg, Denmark, March 1999. Significant portions of those works are included here in original form. Descriptors: fidonet, internet, password stealing trojan, trojanized system, trojanized application, user behavior, java, activex, security policy, trojan horse, computer virus Attitude Adjustment: Trojans and Malware on the Internet Trojans On the Internet… Ever since the city of Troy was sacked by way of the apparently innocuous but ultimately deadly Trojan horse, the term has been used to talk about something that appears to be beneficial, but which hides an attack within.
    [Show full text]
  • Autofocus for a Digtal Camera Using Spectrum Analysis
    AUTOFOCUS FOR A DIGTAL CAMERA USING SPECTRUM ANALYSIS By AHMED FAIZ ELAMIN MOHAMMED INDEX NO. 084012 Supervisor Dr. Abdelrahman Ali Karrar THESIS SUBMITTED TO UNIVERSITY OF KHARTOUM IN PARTIAL FULFILMENT FOR THE DEGREE OF B.Sc. (HON) IN ELECTRICAL AND ELECTRONICS ENGINEERING (CONTROL ENGINEERING) FACULTY OF ENGINEERING DEPARTMENT OF ELECTRICAL AND ELECTRONICS ENGINEERING JULY 2013 DICLARATION OF ORIGINALITY I declare that this report entitled “AUTOFOCUS FOR A DIGTAL CAMERA USING SPECTRU ANALYSIS “is my own work except as cited in the references. The report has not been accepted for any degree and is not being submitted concurrently in Candidature for any degree or other award. Signature: _________________________ Name: _________________________ Date: _________________________ I DEDICATION To my Mother To my Father To all my great Family II ACKNOWLEDGEMENT Thanks first and foremost to God Almighty who guided me in my career to seek knowledge. I am heartily thankful to my parents who helped me, encouraged me, always going to support me and stand close to me at all times. All thanks and appreciation and respect to my supervisor Dr. Abd- Elrahman Karrar for his great supervisory, and his continued support and encouragement. Many thanks to my colleague Mazin Abdelbadia for his continued diligence and patience to complete this project successfully. Finally, all thanks to those who accompanied me and helped me during my career to seek knowledge. III ABSTRACT The purpose of a camera system is to provide the observer with image information. A defocused image contains less information than a focused one. Therefore, focusing is a central problem in such a system.
    [Show full text]
  • How to Turn Your Smartphone Into a Second Webcam by Julien Bobroff, Frédéric Bouquet, Jeanne Parmentier and Valentine Duru Numerical Set Up
    How to turn your smartphone into a second webcam by Julien Bobroff, Frédéric Bouquet, Jeanne Parmentier and Valentine Duru Numerical set up • Download the Iriun app on your smartphone: - via Google Play (android) => Iriun 4K Webcam for PC and Mac - via Apple Store (iOS) => Iriun Webcam for PC and Mac • Download the Iriun software on your computer; make sure to select the version that fits your operating system: - https://iriun.com/ Physical set up • Use your imagination to make your smartphone stand above your writing surface! Old books, small storage rack, old legos… The possibilities are endless! Start • Make sure both your smartphone and your computer are connected to the same WiFi network • Launch the Iriun app on your smartphone and the Iriun software on your computer: the Iriun window on your computer should be streaming the video captured by your smartphone Uses - On Collaborate: open the Collaborate side bar on the bottom right corner of your screen, click on “share content”, then on “share webcam” and select “Iriun Webcam”; - On Zoom: you can share the video stream captured by your smartphone camera by clicking on “shared screen”, and then selecting “2nd webcam content” in the “advanced” tab; Nb: if you have more than 2 webcams and the wrong one is initially displayed, just click on “switch webcam” on the upper left corner of your screen, until Iriun webcam is displayed. - On OBS: you can now add your smartphone webcam as a source in your scenes => Beneath the “sources” window, click on “+” and select “video capture device”, then select the device “Iriun Webcam”.
    [Show full text]
  • Copyrighted Material
    Index AAAS (American Association for adolescence Mali; Mauritania; the Advancement of Science), identity development among, Mozambique; Namibia; 91 306 Nigeria; Rwanda; Senegal; Aakhus, M., 178 identity practices of boys, 353 South Africa; Tanzania; Aarseth, Espen, 292n revelation of personal Uganda; Zambia abbreviations, 118, 120, 121, 126, information by, 463 African-Americans, 387 127, 133, 134 psychological framework of, 462 identity practices of adolescent ABC (American Broadcasting advertising, 156, 329, 354, 400, boys, 353 Company), 413, 416 415, 416, 420–1 political discussion, 174 ABC (Australian Broadcasting banner, 425 African Global Information Commission), 420 elaborate and sophisticated, 409 Infrastructure Gateway Aboriginal people, 251, 253, porn, 428 Project, see Leland 257–8, 262, 263 revenues, 417, 418, 419, 435 age, 280, 431, 432 abusive imageries, 431 Advertising Age, 417 porn images, 433 accessibility, 13, 50–1, 53, 424 aesthetics, 391, 425, 428, 430, agency, 44, 53, 55, 62, 312 balancing security and, 278 434 conditioned and dominated by control of, 388 alternative, 427 profit, 428 increasing, 223 digital, 407 technologically enhanced, 195 limited, 26 familiar, 435 AHA (American Historical private, 94 games designer, 75 Association), 86 public, 94, 95 play and, 373 Ahmed, Sara, 286–7, 288 see also Internet access promotional, 409 AILLA (Archive of the Indigenous accountability, 151, 191, 199, Afghanistan, 205 Languages of Latin America), 207, 273, 276, 277 AFHCAN (Alaska Federal 263 balancing privacy and, 278 Healthcare
    [Show full text]
  • Remote Duel Set up Guide Webcam Gooseneck Smartphone Holder Method
    Remote Duel Set Up Guide Remote Duel Set up Guide There are many options for putting together a Remote Duel set up; we’ve listed a handful below using the devices you already have or are relatively inexpensive. This guide will also give some suggestions on how to set up one’s field and video frame for Remote Dueling. Webcam The simplest option is to use a USB webcam designed for computers or the webcam built into the computer. Most programs will recognize the application as a webcam and can be used to record the field. Gooseneck Smartphone Holder Method A “Gooseneck Smartphone Holder” is an extendible arm that attaches to a table via a mount and depending on the model of the device, holds a smartphone at the end of the arm. ©2020 Studio Dice/SHUEISHA, TV TOKYO, KONAMI Page | 1 Remote Duel Set Up Guide Example of a typical set up. Be sure to follow the manufacturer’s instructions correctly If the arm is obstructing too much of the monitor, we recommend moving the monitor to a safe position ©2020 Studio Dice/SHUEISHA, TV TOKYO, KONAMI Page | 2 Remote Duel Set Up Guide Tripod and Smartphone Mount Method Tripods can be used to place the smartphone above the field. Larger tripods can be placed on the floor, and smaller tripods can be placed on the table. It is recommended to get a tripod that can swivel and tilt to quickly adjust the image on the screen. Most tripods do not include a smartphone‐mount, so it may be necessary to obtain a tripod‐compatible smartphone‐mount.
    [Show full text]
  • A Peer-To-Peer Internet for the Developing World SAIF, CHUDHARY, BUTT, BUTT, MURTAZA
    A Peer-to-Peer Internet for the Developing World SAIF, CHUDHARY, BUTT, BUTT, MURTAZA Research Article A Peer-to-Peer Internet for the Developing World Umar Saif Abstract [email protected] Users in the developing world are typically forced to access the Internet at a Associate Professor fraction of the speed achievable by a standard v.90 modem. In this article, we Department of Computer Science, LUMS present an architecture to enable ofºine access to the Internet at the maxi- Opposite Sector U, DHA mum possible speed achievable by a standard modem. Our proposed architec- Lahore 54600 ture provides a mechanism for multiplexing the scarce and expensive interna- Pakistan tional Internet bandwidth over higher bandwidth P2P (peer-to-peer) dialup ϩ92 04 205722670, Ext. 4421 connections within a developing country. Our system combines a number of architectural components, such as incentive-driven P2P data transfer, intelli- Ahsan Latif Chudhary gent connection interleaving, and content-prefetching. This article presents a Research Associate detailed design, implementation, and evaluation of our dialup P2P data trans- Department of Computer fer architecture inspired by BitTorrent. Science, LUMS Opposite Sector U, DHA Lahore 54600 Pakistan 1. Introduction The “digital divide” between the developed and developing world is un- Shakeel Butt derscored by a stark discrepancy in the Internet bandwidth available to Research Associate end-users. For instance, while a 2 Mbps ADSL link in the United States Department of Computer costs around US$40/month, a 2 Mbps broadband connection in Pakistan Science, LUMS costs close to US$400/month. Opposite Sector U, DHA The reasons for the order of magnitude difference in end-user band- Lahore 54600 Pakistan width in the developed and the developing world are threefold: • Expensive International Bandwidth: Developing countries often Nabeel Farooq Butt have to pay the full cost of a link to a hub in a developed country, Research Associate making the cost of broadband Internet connections inherently ex- Department of Computer pensive for ISPs.
    [Show full text]
  • Copyrighted Material
    1 Evolution from 2G over 3G to 4G In the past 15 years, fixed line and wireless telecommunication as well as the Internet have developed both very quickly and very slowly depending on how one looks at the domain. To set current and future developments into perspective, the first chapter of this book gives a short overview of major events that have shaped these three sectors in the previous one-and-a-half decades. While the majority of the developments described below took place in most high-tech countries, local factors and national regulation delayed or accelerated events. Therefore, the time frame is split up into a number of periods and specific dates are only given for country-specific examples. 1.1 First Half of the 1990s – Voice-centric Communication Fifteen years ago, in 1993, Internet access was not widespread and most users were either studying or working at universities or in a few select companies in the IT industry. At this time, whole universities were connected to the Internet with a data rate of 9.6 kbit/s. Users had computers at home but dial-up to the university network was not yet widely used. Distributed bulletin board networks such as the Fidonet [1] were in widespread use by the few people who were online then. It can therefore be said that telecommunication 15 years ago was mainly voice-centric from a mass market point of view. An online telecom news magazine [2] gives a number of interesting figures on pricing around that time, when the telecom monopolies where still in place in most European countries.
    [Show full text]
  • Emotion Recognition Using Discrete Cosine Transform and Discrimination Power Analysis
    International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February-2016 130 ISSN 2229-5518 Emotion Recognition using discrete cosine transform and discrimination power analysis Shikha Surendran Dept. of Electronics and Communication MIT, Anjarakandy, Kannur Kerala [email protected] ABSTRACT 1. INTRODUCTION The paper states the technique of recognizing A persons face changes according to emotion using facial expressions is a central emotions or internal states of the person. Face is a element in human interactions. Discrete cosine natural and powerful communication tool. transform (DCT) is a powerful transform to Analysis of facial expressions through moves of extract proper features for face recognition. The face muscles leads to various applications. Facial proposed technique uses video input as input expression recognition plays a significant role in image taken through the webcam in real time on Human Computer Interaction systems. Humans which discrete cosine transform is performed. can understand and interpret each other’s facial After applying DCT to the entire face images, changes and use this understanding to response some of the coefficients are selected to construct and communicate. A machine capable of feature vectors. Most of the conventional meaningful and responsive communication is one approaches select coefficients in a zigzag manner of the main focuses in robotics. There are many or by zonal masking. In some cases, the low- other areas which benefit from the advances in frequency coefficients are discarded in order to facial expression analysis such as psychiatry, compensate illumination variations. Since the psychology, educational software, video games, discrimination power of all the coefficients is not animations, lie detection or other practical real- the same and some of them are discriminant than time applications.
    [Show full text]