Conventional content-based recommendation systems use different classifying algorithms to group items into several groups and for each group generate a ranking list of items. An important characteristic of conventiona...
详细信息
It is a common practice for us to skim textual content on a web page. While skimming, we usually skip words or phrases that are not of interest to us and we slow down our speed when the content seems to be of relevanc...
详细信息
In IEEE 802.11 WLANs, a station can associate with more than one access point (AP). Previous algorithms which consider only the received signal strength indicator (RSSI) can cause stations to be associated to a single...
详细信息
ISBN:
(纸本)9781424470426
In IEEE 802.11 WLANs, a station can associate with more than one access point (AP). Previous algorithms which consider only the received signal strength indicator (RSSI) can cause stations to be associated to a single or only a few number of AP. However, it results in an overall network performance degradation. Besides, Hondoff in wireless networks is one of the critical latency. Therefore, a new algorithm is required both to select the most proper access point (AP) and to reduce the handoff latency to support multimedia traffic. In this paper, we propose a new AP selection algorithm which is based on reducing the handoff latency, improving the perceived voice quality (R value), capacity utilization, transmission rate, fairness, hidden nodes and the number of associated stations to an AP. Proposed algorithm works efficiently in the existence of both real-time and non-real-time traffic. Simulation results show improvements on the overall throughput and the perceived voice quality for users.
With the ubiquity of the internet and advances in technology, especially digital consumer electronics, demand for online multimedia services is ever increasing. While it's possible to achieve a great reduction in ...
详细信息
ISBN:
(纸本)9783642164439
With the ubiquity of the internet and advances in technology, especially digital consumer electronics, demand for online multimedia services is ever increasing. While it's possible to achieve a great reduction in bandwidth utilization of multimedia data such as image and video through compression, security still remains a great concern. Traditional cryptographic algorithms/systems for data security are often not fast enough to process the vast amounts of data generated by the rnultimedia applications to meet the realtime constraints. Selective encryption is a new scheme for multimediacontent protection. It Involves encrypting only a portion of the data to reduce computational complexity(the amount of data to encrypt)while preserving a sufficient level of security. To achieve this, many selective encryption schemes are presented in different literatures. One of them is Wavelet Tree Shuffling. In this paper we assess the security of a wavelet tree shuffling encryption scheme.
In content-based Image Retrieval (CBIR), accurately ranking the returned images is of paramount importance, since users consider mostly the topmost results. The typical ranking strategy used by many CBIR systems is to...
详细信息
ISBN:
(纸本)9781605588155
In content-based Image Retrieval (CBIR), accurately ranking the returned images is of paramount importance, since users consider mostly the topmost results. The typical ranking strategy used by many CBIR systems is to employ image content descriptors, so that returned images that are most similar to the query image are placed higher in the rank. While this strategy is well accepted and widely used, improved results may be obtained by combining multiple image descriptors. In this paper we explore this idea, and introduce algorithms that learn to combine information coming from different descriptors. The proposed learning to rank algorithms are based on three diverse learning techniques: Support Vector Machines (CBIR-SVM), Genetic Programming (CBIR-GP), and Association Rules (CBIR-AR). Eighteen image content descriptors(color, texture, and shape information) are used as input and provided as training to the learning algorithms. We performed a systematic evaluation involving two complex and heterogeneous image databases (Corel e Caltech) and two evaluation measures (Precision and MAP). The empirical results show that all learning algorithms provide significant gains when compared to the typical ranking strategy in which descriptors are used in isolation. We concluded that, in general, CBIR-AR and CBIR-GP outperforms CBIR-SVM. A fine-grained analysis revealed the lack of correlation between the results provided by CBIR-AR and the results provided by the other two algorithms, which indicates the opportunity of an advantageous hybrid approach. Copyright 2010 ACM.
Identifying the set of resources that are expected to receive the majority of requests in the near future, namely hot set, is at the basis of most content management strate- gies of any Web-based service. Here we cons...
详细信息
The presence of new technologies on distance education generates a cloud of learning environments with high presence of multimediacontents and mobility capabilities. The widespread use of mobile technologies, digital...
详细信息
Peer to peer based live multimedia streaming systems over the Internet have been gaining popularity these days because they can be easily deployed without router based IP multicast capabilities. However, the peers fre...
详细信息
ISBN:
(纸本)9781424456383
Peer to peer based live multimedia streaming systems over the Internet have been gaining popularity these days because they can be easily deployed without router based IP multicast capabilities. However, the peers frequently join and leave the system so that some peers may experience service disruptions, which degrade the overall quality and reputation of the services. In this situation, a hybrid approach is considered as a viable alternative. In the hybrid approach, the service providers deploy multiple proxies all over the Internet and make them constitute a core tree in the peer to peer system so that the proxies behave as stable nodes that are always on. Thus the system quality can increase. In this paper, we propose a centralized core tree construction scheme based on various optimization algorithms. The scheme focuses on constructing a core tree that maximizes the overall quality of the system. Because the real time multimedia streaming systems have higher QoS requirements than the content distribution such as Akamai, we take into account not only the locations of the proxies but also the topology formed by the proxies. The general framework can obtain a tree for arbitrary performance metrics not only for a specific metric such as minimum delay. Through simulations over diverse scenarios, we show that our optimization based approaches can provide a better core tree than some greedy heuristic approaches.
E-learning involves the use of digital content in the form of text and multimedia elements that are accessed via hyperlinks and also via browser or search engines. The search engines currently available to the learner...
详细信息
Recent two-way collaboration prototypes attempt to improve natural interactivity, correct eye contact and gaze direction, and media sharing using novel configurations of projectors, screens, and video cameras. These s...
详细信息
ISBN:
(纸本)9781424479948
Recent two-way collaboration prototypes attempt to improve natural interactivity, correct eye contact and gaze direction, and media sharing using novel configurations of projectors, screens, and video cameras. These systems are often afflicted by video cross-talk where the content displayed for viewing by the local participant is unintentionally captured by the camera and delivered to the remote participant. Prior attempts to reduce this cross-talk purely in hardware through various forms of multiplexing (e.g., temporal, wavelength (color), polarization) have performance and cost limitations. In this work, careful system characterization and subsequent signal processing algorithms allow us to reduce video cross-talk. The signals themselves are used to detect temporal synchronization offsets which then allow subsequent reduction of the cross-talk signal. Our software-based approach enables the effective use of simpler hardware and optics than prior methods. Results show substantial cross-talk reduction in a system with unsynchronized projector and camera.
暂无评论