The proceedings contain 31 papers. The special focus in this conference is on Model and Data Engineering. The topics include: Playing with state-based models for designing better algorithms;some issues in modeling use...
ISBN:
(纸本)9783319115863
The proceedings contain 31 papers. The special focus in this conference is on Model and Data Engineering. The topics include: Playing with state-based models for designing better algorithms;some issues in modeling user behavior data in systems of engagement;automated failure analysis in model checking based on data mining;a model-driven methodology approach for developing a repository of models;towards a generic framework for the initialization and the observation of socio-environmental models;context-aware verification of a cruise-control system;a multi-agent based approach for composite web services simulation;model-driven generation of multi-user and multi domain choreographies for staging in multiple virtual world platforms;adapting aerial root classifier missing data processor in data stream decision tree classification;leveraging concepts and semantic relationships for language model based document retrieval;a full service approach for multimediacontent retrieval;ontology-based user modeling for handicraft woman recommendation;stability assess based on enhanced information content similarity measure for ontology enrichment;algebraic graph transformations for merging ontologies;analysis of trajectory ontology inference complexity over domain and temporal rules;ontology-based context-aware SLA management for cloud computing;mapping XML documents using complex SQL data types;replicated convergent data containers;a novel multidimensional model for the OLAP on documents;scalable spectral clustering with weighted pagerank;efficient algorithm to approximate values with non-uniform spreads inside a histogram bucket;modeling a smart home for elderly;theme identification in RDF graphs and an xquery based model transformation language.
In this paper we present novel quality adaptation mechanisms using Scalable Video Coding (SVC) over Peer-to-Peer (P2P) Video-on-Demand (VoD) systems. Quality adaptation in the VoD streaming system P2P is done in two p...
详细信息
In this paper we present novel quality adaptation mechanisms using Scalable Video Coding (SVC) over Peer-to-Peer (P2P) Video-on-Demand (VoD) systems. Quality adaptation in the VoD streaming system P2P is done in two phases. First using Layer Level Initialization (LLI) strategy, an initial quality is selected based on the peer's static resources, for example screen resolution, bandwidth and device power. After streaming starts, another set of algorithms called the Layer Level Adjustment (LLA) is used to adapt the video quality to various dynamic parameters of the peers (memory, energy consumption) and the system (block availability, throughput). LLI and LLA are evaluated on Quality of Service (QoS) metrics of layer level SVC using Peersim and JSVM Simulators. Finally, we have ensured perfectly the best QoS for streamable SVC layers by our proposed algorithms which maximize flexibility SVC while taking impact of different resources consumption and affects resilience of P2P streaming systems into consideration.
For OFDM channels, we propose a content-aware subcarrier allocation scheme for multiuser video transmission that maximizes user perceived quality while minimizing power consumption. The scheme utilizes utility functio...
详细信息
For OFDM channels, we propose a content-aware subcarrier allocation scheme for multiuser video transmission that maximizes user perceived quality while minimizing power consumption. The scheme utilizes utility function-based genetic algorithms to solve the multi-objective optimization problem. It significantly outperforms existing methods in terms of perceived quality and consumed power.
Improvement and development of handheld devices such as tablets or smartphones opens new possibilities for them to be used in DTV environment. Handheld devices' proliferation has modified the way users watch and p...
详细信息
Improvement and development of handheld devices such as tablets or smartphones opens new possibilities for them to be used in DTV environment. Handheld devices' proliferation has modified the way users watch and perceive TV. Giving users more control over their TV and easier access to additional information from their handheld devices is the focus of this paper. In this paper remote DTV content presentation like live TV, EPG and playback of multimediacontent is presented. The paper also presents remote DTV content control such as remote controller with mouse pad and keyboard, EPG control and browsing of media server.
Advances in the digital content transmission have been extremely increased in the past few years. In addition, the security and privacy issues of the transmitted data have increasingly an important concern in multimed...
详细信息
Advances in the digital content transmission have been extremely increased in the past few years. In addition, the security and privacy issues of the transmitted data have increasingly an important concern in multimedia technology. In this paper, we propose applicable and secure video encryption algorithm. This makes secure video encryption feasible for realtime application. The proposed algorithm concentrates in general on the symmetric key cryptographic technique. Characteristically, the multimedia technology which has been usually used by public users is resulting in a key exchange problem and normally a trusted intermediate authority takes this responsibility. In this paper, we have proposed a novel video encryption algorithm based on the speaker voice to generate a public key which eliminates the need for a trusted third party for key exchange. The generated public key from the speaker's voice is used to encrypt of the transferred digital multimedia over the open communication channel (i.e. Internet). The experimental results showed that the proposed algorithm is very secure and has on average only 5.4 ms of encryption time per frame, which is significantly smaller compared to the state of the art secure video encryption algorithms.
With the rapid development of wireless technology, it is of increasing interest to support various services in wireless LANs. access control and load balancing are employed to meet the different QoS requirements of di...
详细信息
The Unmanned Aerial Vehicle (UAV) has become increasingly affordable in the market and has been reduced to smaller sizes, providing an entry level UAV for any beginner. For this paper we have utilized the GoPro action...
详细信息
The Unmanned Aerial Vehicle (UAV) has become increasingly affordable in the market and has been reduced to smaller sizes, providing an entry level UAV for any beginner. For this paper we have utilized the GoPro action camera as the chosen camera, since DJI has an established gimbal for it and also the fact that the GoPro setup is considered the entry level, which is available to anyone and also produces good quality. Recent research collaboration has identified built heritage in Malaysia with a scope of being built after the nation's independence between 1957 and 1970. Three buildings from this category were shot with the UAV, the National Mosque, Tun Abdul Razak Apartments or famously known as the Pekeliling Flats, and the Rifle Range Flats in Penang. This research will present the utilization of UAV in documenting a built heritage, its challenges in operating the machine, and documenting the sites. This study also briefly describes how aerial videography can be beneficial for visualization artists. In addition to aerial capturing, one aspect of built heritage documentation deals with e-reconstruction including digital drawings, 3D modeling, virtual reality, etc. This can be achieved by using existing visual materials as a reference to generate a virtualized version of the building. In some points visualization artist needs full access to the building, as existing reference images are insufficient. But as mentioned above, sometimes access is limited to terms and conditions mostly related to safety. In this situation one of the best alternatives is to use UAV drones. Aerial videography can be beneficial for visualization artists, first as the reference, and secondly to be combined with virtualized materials for augmented reality purposes as the land where flats were located on, will be covered by newly built skyscrapers in the near future.
In the era of big data, the use of formal models and techniques to represent and manage information is a necessary task to implement efficient intelligent information systems. In this paper we propose a complete frame...
详细信息
In the era of big data, the use of formal models and techniques to represent and manage information is a necessary task to implement efficient intelligent information systems. In this paper we propose a complete framework to annotate and categorize images. Our approach is based on multimedia ontologies organized following a formal model to represent knowledge. Our ontologies use multimedia data and linguistic properties to bridge the gap between the target semantic classes and the available low-level multimedia descriptors. The multimedia features are automatically extracted using algorithms based on MPEG-7 standard. The informative image content is annotated with semantic information extracted from our ontologies and the categories are dynamically built by means of a general knowledge base. Experimental results show the efficiency of our approach in the annotation and classification tasks using a combination of textual and visual components.
As the world becomes evermore connected and instrumented, decision-makers have ever more rapid access to ever changing and growing streams of data - but this makes the decision-maker's problems ever more complex a...
详细信息
As the world becomes evermore connected and instrumented, decision-makers have ever more rapid access to ever changing and growing streams of data - but this makes the decision-maker's problems ever more complex as well, because it is impossible to learn everything in the time frame in which decisions must be made. What the decision-maker must do, therefore, is to discover in real time what is relevant in the enormous stream of data and use the relevant information to make good decisions. This talk presents a systematic framework and associated algorithms that enable a decision-maker to do this. The algorithms we propose yield strong performance guarantees for both the long run and the short run. The applications are numerous and include patient monitoring, online recommendation systems, social networks, targeted advertisement, surveillance, network security, finance etc.
In upcoming technologies multiprocessors are used for the efficient performance improvement. The multi processor system on chip is the complex embedded system used in multimedia applications for the resource utilizati...
详细信息
In upcoming technologies multiprocessors are used for the efficient performance improvement. The multi processor system on chip is the complex embedded system used in multimedia applications for the resource utilization and simultaneous accessing. The MPSoC is the processor which uses the n number of resources such as peripherals, devices and processing elements for the improvisation of speed and performance which in turn reduces the execution time and energy dissipation. In general we use the offchip memory which has the cache in order to reduce the time of data fetch. In off chip memory access they use the decoupled approach where the partitioning and allocation of tasks to processor are done separately. Scratch Pad Memory is the fast on-chip memory which is the part of integrated chip memory (RAM). The SPM is the on-chip memory which can be used for the integration approach of task scheduling and memory partitioning. The integrated approach uses heuristics algorithm which increases the performance but when data needed is not available it leads to cache conflict. Thus the cache conflict is also been resolved by the use of segmented LRU algorithm. By the use of these two algorithms the execution cycle time is been reduced which can be evaluated using various benchmarks.
暂无评论