Currently, there are several wireless networks deployed around the world. Examples include cellular networks, metropolitan area networks and wireless local area networks. Given the heterogeneity of the existing networ...
详细信息
ISBN:
(纸本)9781467315203
Currently, there are several wireless networks deployed around the world. Examples include cellular networks, metropolitan area networks and wireless local area networks. Given the heterogeneity of the existing network technologies, the diversity of mobile applications, and user requirements, ensuring service continuity for a mobile user when changing different access network becomes a mandatory aspect. The aim of this work is to study and analyse a solution based on the IEEE802.21 standard, to enable interoperability between different networks. The assessment takes place in a context of mobility between WiFi and WiMAX networks. The network simulator NS2 is used during this study.
With explosive growth of digital data and users wanting to outsource the data, there is great need for securely storing the data and utilization of storage space. Data deduplication eliminates redundant data from the ...
详细信息
ISBN:
(纸本)9789811078712;9789811078705
With explosive growth of digital data and users wanting to outsource the data, there is great need for securely storing the data and utilization of storage space. Data deduplication eliminates redundant data from the storage and, thereby reducing the backup window, improves the efficiency of storage space and utilization of network bandwidth. multimedia data such as images and videos are a good choice for deduplication, as it is one of the most frequent shared types of data found on data storage. A conventional secure deduplication employs exact data deduplication which is too rigid for multimedia data. Perceptually similar data maintain human visual perception and consume a lot of storage space. The proposed approach provides a framework for secure fuzzy deduplication for multimedia data and further strengthens the security by integrating proof of retrieval and proof of ownership protocols.
multimedia services are usually selected and composed for processing, analyzing and transporting multimedia data over the Internet for end-users. The selection of these services is often performed based on their reput...
详细信息
ISBN:
(纸本)9780819469908
multimedia services are usually selected and composed for processing, analyzing and transporting multimedia data over the Internet for end-users. The selection of these services is often performed based on their reputation, which is usually computed based on the feedback provided by the users. The users' feedback bears many problems including the low incentive for providing ratings and the bias towards positive or negative ratings. To overcome the dependency on the user's feedback, this paper presents a method that dynamically computes the reputation of a multimedia service based on its association with other multimedia services in a composition task. The degree of association between any two services is computed by utilizing the statistics of how often they have been composed together, which is used in our method to show the evolution of reputation over a period of time. The experimental results demonstrate the utility of the proposed method.
Current multimedia group presentation environments such as video conference systems, remote presentation and shared workspaces are typically developed as self-contained applications, i.e. without much support from ope...
详细信息
With the rapid development of Internet technology, a new architecture named Content-Centric networking (CCN) has emerged recently. With powerful abilities of data caching and multicast, it has been increasingly popula...
详细信息
ISBN:
(纸本)9781509026289
With the rapid development of Internet technology, a new architecture named Content-Centric networking (CCN) has emerged recently. With powerful abilities of data caching and multicast, it has been increasingly popular especially for multimedia applications. However, service markup, in-network caching and routing are not inherently addressed in CCN. In this paper, we make an attempt at filling this gap by designing an ontology-based semantic service markup for CCN. Two components which are Service Identifier (SID) and Service Behavior Description (SBD) are presented in order to decouple the service entity with its original physical location, making it possible for service discovery and caching in CCN environments. Detailed designs are introduced, and a case study of an online multimediaconference system is presented to validate the effectiveness of our approach.
recently, multimedia becomes increasingly popular for the users of ad hoc networks. To support multimedia and real-time application the study of QoS issues in MANETs is essential. MANETs can provide efficiently multim...
详细信息
ISBN:
(纸本)9781424437566
recently, multimedia becomes increasingly popular for the users of ad hoc networks. To support multimedia and real-time application the study of QoS issues in MANETs is essential. MANETs can provide efficiently multimedia users with the required mobility. Development in multimedia and ad hoc networking has spurred rapidly growing research interested in multimedia delivery over ad hoc networks. Designing ad hoc networks which support multimedia applications is considered as a hard task. In this article, we present a labor that demonstrate that ad hoc networks support video streaming and present the analysis done by OPNET environment. We will talk in this article about routing protocols [12] in ad hoc networks used in multimedia and real time application and also review the QoS. Using simulation we conclude with the comparative Analysis of Ad Hoc networks routing protocols (AODV, DSR, OLSR, TORA, and GRP) for multimedia Streaming. The result of simulations already done demonstrate that in ad hoc networks we have good quality of video streaming.
To achieve a fault-tolerant distributed systems, checkpoint-recovery has been researched and many protocols have been designed. A global checkpoint taken by the protocols have to be consistent. For conventional data c...
详细信息
ISBN:
(纸本)0769509525
To achieve a fault-tolerant distributed systems, checkpoint-recovery has been researched and many protocols have been designed. A global checkpoint taken by the protocols have to be consistent. For conventional data communication network, a global checkpoint is defined consistent if there is neither orphan nor lost message. For a multimedia communication network, there are different requirements such as large-size massages, lime-constrained failure free execution and allowance of certain amount of lost packers. This paper proposes a new criteria of consistent global checkpoints for supporting multimedia communication network. in addition, a checkpoint protocol with QoS based consistency is designed and applied to MPEG-2 data transmission.
With the advent of social networks and cloud computing, the amount of multimedia data produced and communicated within social networks is rapidly increasing. In the mean time, social networking platform based on cloud...
详细信息
ISBN:
(纸本)9781479965137
With the advent of social networks and cloud computing, the amount of multimedia data produced and communicated within social networks is rapidly increasing. In the mean time, social networking platform based on cloud computing has made multimedia big data sharing in social network easier and more efficient. The growth of social multimedia, as demonstrated by social networking sites such as Facebook and YouTube, combined with advances in multimedia content analysis, underscores potential risks for malicious use such as illegal copying, piracy, plagiarism, and misappropriation. Therefore, secure multimedia sharing and traitor tracing issues have become critical and urgent in social network. In this paper, we propose a scheme for implementing the Tree-Structured Harr (TSH) transform in a homomorphic encrypted domain for fingerprinting using social network analysis with the purpose of protecting media distribution in social networks. The motivation is to map hierarchical community structure of social network into tree structure of TSH transform for JPEG2000 coding, encryption and fingerprinting. Firstly, the fingerprint code is produced using social network analysis. Secondly, the encrypted content is decomposed by the TSH transform. Thirdly, the content is fingerprinted in the TSH transform domain. At last, the encrypted and fingerprinted contents are delivered to users via hybrid multicast-unicast. The use of fingerprinting along with encryption can provide a double-layer of protection to media sharing in social networks. Theory analysis and experimental results show the effectiveness of the proposed scheme.
multimedia on demand, such as VoD and AoD, has popularized with the development of network technology in these years. The storage system of multimedia on demand has some special requirements. A new double level granul...
详细信息
ISBN:
(纸本)0769529097
multimedia on demand, such as VoD and AoD, has popularized with the development of network technology in these years. The storage system of multimedia on demand has some special requirements. A new double level granularity for storage devices is presented in this paper. It integrates the virtues of coarse granularity and fine granularity. It's a good tradeoff between coarse and fine granularity.
Mine multimedia rescue communication has the paroxysmal of time, uncertainty of place, complicacy of condition and multiformity of information, which has more strict requirements. Mine multimedia rescue communication ...
详细信息
ISBN:
(纸本)9781424413119
Mine multimedia rescue communication has the paroxysmal of time, uncertainty of place, complicacy of condition and multiformity of information, which has more strict requirements. Mine multimedia rescue communication system adopts an integration of MPEG4, VOIP, TCP/IP and self-organizing technology etc. It is carried by the rescue workers, and the system adopts a cooperation method of wireless communication and wire communication to transmit information. The distance of transmission is 10 similar to 20km. We adopt wireless self-organizing wirelike networks to connect the disaster scene and the underground base with 250kbps velocity of propagation. A SDSL twisted-pair is used between the underground base and the ground center with 1.5Mbps velocity of propagation. The facilities have the following function: Display, save and replay the audio-visual data of the entire rescue process;Achieve multi-user talk;Collect surroundings parameter of the mine including temperature, oxygen, CO and CH4. All of the information could be provided for analyzing the cause of the disaster. In addition, the facilities can give an alarm when the parameters go beyond limited The work time of the system can last for more than 8 hours. The pictures of practical video are given in the paper.
暂无评论