The strong revenue growth of the item purchasing business model in the mobile social games in Japan has caught the attention of both researchers and industry. The examination of revenue generation in mobile social gam...
详细信息
The strong revenue growth of the item purchasing business model in the mobile social games in Japan has caught the attention of both researchers and industry. The examination of revenue generation in mobile social games exposes perception-based business engineering. User perception of values, social portfolio of values, and operation-based value creation using social stream mining create new methodology of service engineering. The author comes to recognize the lack of consumer-side perspective in the research of service engineering. In order to compensate this missing part, the author proposes a two-layer view model of service engineering that covers consumer-side aspects.
To manipulate a large video database, effective video indexing and retrieval are required. A large number of video retrieval algorithms have been presented for frame wise user query or video content query, whereas few...
详细信息
To manipulate a large video database, effective video indexing and retrieval are required. A large number of video retrieval algorithms have been presented for frame wise user query or video content query, whereas few video-sequence matching algorithms have been investigated. In this paper, we propose an efficient algorithm for video sequence matching using the modified Hausdorff distance and the directed divergence of histograms between successive frames. To effectively match the video sequences with a low computational load, we use the key frames extracted by the cumulative directed divergence and compare the set of key frames using the modified Hausdorff distance. Experimental results with color video sequences show that the proposed algorithms for video sequence matching yield better performance than conventional algorithms such as histogram difference, histogram intersection, and chi-square test methods.
content centric storage refers to a paradigm where applications access data objects through information about their content, rather than their path in a hierarchical structure. The application does not need any knowle...
详细信息
ISBN:
(纸本)9781467307086
content centric storage refers to a paradigm where applications access data objects through information about their content, rather than their path in a hierarchical structure. The application does not need any knowledge about the data store organization, or the place in a storage hierarchy. Rather, the application is able to query for the desired content based on metadata associated with the data objects. We illustrate the need for content centric storage and access through an example from a media production application. Our approach for building an industrial-capable content centric storage employs a cloud storage technology where metadata is treated as first class citizen and extends this technology with an API layer that manages and leverages metadata regarding content.
This paper dealt with several security aspects in multimediasystems. The possible threads of various attacks are summarized and described. The methods focused on the intrusion detection and protection, the tools that...
详细信息
This paper dealt with several security aspects in multimediasystems. The possible threads of various attacks are summarized and described. The methods focused on the intrusion detection and protection, the tools that manage the trusted use of digital media content (Digital Rights Management -DRM), as well as approaches for user's data privacy are also presented in the paper. Within HBB-Next architectural concept the Security Manager (SM) architectural component was proposed. This component is responsible for the management of multi-factor authentication, authorization, and policy enforcement for “multifactor levels” and for profile data access control.
Integrating resources in e learning systems and providing smoothly cross-system access can highly extend the learning range and improve learning efficiency. In this paper we made an attempt to establish an e-learning ...
详细信息
Integrating resources in e learning systems and providing smoothly cross-system access can highly extend the learning range and improve learning efficiency. In this paper we made an attempt to establish an e-learning cloud. By reviewing the architecture of traditional e-learning system and concept of cloud computing, we proposed the idea of constructing e-learning cloud to enable e-learning resource sharing without the limitations of cross-system access. By using critical technologies, Self-Organizing network, Intelligence Resource access Control Policy Various, cloud computing services and Negotiation-based content Provider, e-learning cloud implements an integration of different pedagogical approaches to learning cross-system.
Sharing and publishing images and photos have become the trend of nowadays (social networks, messengers, etc.). Providing appropriate techniques to preserve privacy and protect content of sensitive and private images ...
详细信息
Sharing and publishing images and photos have become the trend of nowadays (social networks, messengers, etc.). Providing appropriate techniques to preserve privacy and protect content of sensitive and private images is an essential need. In this paper, we present a novel security model for image content protection. In our model, we provide dynamic security rules based on first order logic to express constraints that can be applied to contextual information as well as low level features of images. We finally discuss a set of experiments and studies carried out to evaluate the proposed approach.
Notice of Violation of IEEE Publication Principles "Hybrid Recommender systems: content-Boosted Collaborative Filtering for Improved Recommendations" by Vipul Vekariya and G.R. Kulkarni in Proceedings of the...
Notice of Violation of IEEE Publication Principles "Hybrid Recommender systems: content-Boosted Collaborative Filtering for Improved Recommendations" by Vipul Vekariya and G.R. Kulkarni in Proceedings of the 2012 International conference on Communication systems and Network Technologies (CSNT), 2012, pp. 649-653 After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles. This paper contains large portions of text from the papers cited below. The text and figures were copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission. "Hybrid Collaborative Filtering and content-Based Filtering for Improved Recommender System" by Kyung-Yong Jung, Dong-Hyun Park and Jung-Hyun Lee in Lecture Notes in Computer Science, 2004, Volume 3036/2004, Springer, pp. 295-302 "A Hybrid Approach for Movie Recommendation" by George Lekakos and Petros Caravelas in multimedia Tools and Applications, Volume 36, Numbers 1-2, January 2008, Springer, pp. 55-70 "Hybrid Recommender systems: Survey and Experiments" by Robin Burke in User Modeling and User-Adapted Interaction, Volume 12 Issue 4, November 2002, pp. 331-370 "content-Boosted Collaborative Filtering for Improved Recommendations" by Prem Melville, Raymond J. Mooney, Ramadass Nagarajan in the Proceedings of the 2002 American Association for Artificial Intelligence, pp. 187 - 192 Recommender systems represent user preferences for the purpose of suggesting items to purchase or examine. They have become fundamental applications in electronic commerce and information access, providing suggestions that effectively prune large information spaces so that users are directed toward those items that best meet their needs and preferences. A variety of techniques have been proposed for performing recommendation, including content-based, collaborat
Nonvolatile memories (NVMs) such as flash memories play a significant role in meeting the data storage requirements of today's computation activities. The rapid increase of storage density for NVMs however brings ...
详细信息
ISBN:
(纸本)9781467350501
Nonvolatile memories (NVMs) such as flash memories play a significant role in meeting the data storage requirements of today's computation activities. The rapid increase of storage density for NVMs however brings reliability issues due to closer alignment of adjacent cells on chip, and more levels that are programmed into a cell. We propose a new method for error correction, which uses the random access capability of NVMs and the redundancy that inherently exists in information content. Although it is theoretically possible to remove the redundancy via data compression, existing source coding algorithms do not remove all of it for efficient computation. We propose a method that can be combined with existing storage solutions for text files, namely content-assisted decoding. Using the statistical properties of words and phrases in the text of a given language, our decoder identifies the location of each subcodeword representing some word in a given input noisy codeword, and flips the bits to compute a most likely word sequence. The decoder can be adapted to work together with traditional ECC decoders to keep the number of errors within the correction capability of traditional decoders. The combined decoding framework is evaluated with a set of benchmark files.
Automatic adult video detection is a problem of interest to many organizations around the world. The aim is to restrict the easy access of underage youngsters to such potentially harmful material. Most of the existing...
详细信息
Automatic adult video detection is a problem of interest to many organizations around the world. The aim is to restrict the easy access of underage youngsters to such potentially harmful material. Most of the existing techniques are mere extensions of image categorization approaches. In this paper we propose a video genre classification technique tuned specifically for adult content detection by considering cinematographic principles. Spatial and temporal simple features are used with machine learning algorithms to perform the classification into two classes: adult and non-offensive video material. Shot duration and camera motion, are the temporal domain features, and skin detection and color histogram are the spatial domain ones. Using two data sets of 7 and 15 hours of video material, our experiments comparing two different SVM classifiers achieved an accuracy of 94.44%.
User-centric services present a new paradigm in next generation networks. The IP multimedia Subsystem (IMS) is an access-independent IP based service control architecture proposing a new platform for user-centric serv...
详细信息
ISBN:
(纸本)9781467309202
User-centric services present a new paradigm in next generation networks. The IP multimedia Subsystem (IMS) is an access-independent IP based service control architecture proposing a new platform for user-centric services. Security and data privacy aspects observe a lot of attention in the IMS global objectives. Besides the authentication solutions proposed by the third Generation Partnership Project (3GPP), research contributions consider authentication protocols and mechanisms to enforce the security and to enhance users' access personalization for IMS based services. Performance is an important factor to be considered when designing authentication protocols. In this paper we use Open BCMP queuing network as a mathematical model to evaluate the performance of an authentication method aiming to personalize each user access. We also propose an algorithm based on clustering to improve the performance of the authentication solution. Through BCMP modeling, we present and analyze the performance of the proposed authentication solution as a first step, and then we show the performance improvement of this solution when applying the clustering algorithm.
暂无评论