The modeling of multimedia and especially the semantic gap between the visual features and semantic concepts become an important domain due to the quantity of visual digital content, which speedily grows. In this pape...
详细信息
ISBN:
(纸本)9781424459179;9780769539676
The modeling of multimedia and especially the semantic gap between the visual features and semantic concepts become an important domain due to the quantity of visual digital content, which speedily grows. In this paper, the analysis and semantic annotation of images are studied. The development of methods for colour image annotations based on learning represents the main contribution of the paper. The developed algorithms generate semantic pattern rules that identify high-level image concepts. A semantic pattern rule is a combination of images' region patterns that identifies semantic concepts. Our methods are not limited to any specific domain and they can be applied in any field.
Source authentication is necessary in many multicast applications, especially in the real-time applications such as stream-video and online-news. In these applications, we should assure that all the packets received a...
详细信息
Source authentication is necessary in many multicast applications, especially in the real-time applications such as stream-video and online-news. In these applications, we should assure that all the packets received are from the same legal source and this can be done efficiently. In this paper, we propose an efficient scheme to decrease both communication cost and computation cost of source authentication. Owing to packets may arrive in an irregular sequence, so we consider checking its real order of content. After all, there are some analyses about comparing the efficiency and costs with other researches.
Modern digital rights management (DRM) systems recognize that users want to play content on multiple devices - the (authorized) domain. However, the concept of domain is often too rigid: typically, the domain size is ...
详细信息
Modern digital rights management (DRM) systems recognize that users want to play content on multiple devices - the (authorized) domain. However, the concept of domain is often too rigid: typically, the domain size is limited, and it is hard to remove a device and add another. It is even harder to transfer content between domains, and to lend it to friends. This paper analyses the current situation and proposes to introduce logical domains, which support logical operations such as union and intersection. Together with user input on how to adapt his domain, this allows for enough flexibility to keep users happy, and the content secure.
E-learning involves the use of digital content in the form of text and multimedia elements that are accessed via hyperlinks and also via browser or search engines. The search engines currently available to the learner...
详细信息
ISBN:
(纸本)9781424471966;9780769540627
E-learning involves the use of digital content in the form of text and multimedia elements that are accessed via hyperlinks and also via browser or search engines. The search engines currently available to the learners are as offered by Acrobat Reader or Google which employ basic search-by-word-matching algorithms and present outputs in linear fashion based on occurrence in the text or arranged hierarchically by popularity or frequency of being accessed. This research aims to improve the meaningfulness of the search results which other systems focused on specifying the context of the search as offered by Yahoo, and the development of the semantic web as in wiki. These methods improve the search results but need further refinements to be truly effective in the e-learning environment. Thus, this study proposes the use of the exceptional representation of learning strategies based on domain ontology and multi-agent systems (MAS).
The proceedings contain 15 papers. The topics discussed include: discriminative genre-independent audio-visual scene change detection;a random walk through human behavior;flexible user interface for efficient content-...
The proceedings contain 15 papers. The topics discussed include: discriminative genre-independent audio-visual scene change detection;a random walk through human behavior;flexible user interface for efficient content-based video surveillance retrieval: design and evaluation;an automated object-level video editing tool;ImageSeeker: a content-based image retrieval system;extraction of salient regions of interest using visual attention models;research on subjective stereoscopic image quality assessment;image quality assessment in multimedia applications;document description: what works for images should also work for text?;an annotation database for multimedia scientific data;a model of multimodal fusion for medical applications;and binary and nonbinary description of hypointensity for search and retrieval of brain MR images.
In IEEE 802.11 WLANs, a station can associate with more than one access point (AP). Previous algorithms which consider only the received signal strength indicator (RSSI) can cause stations to be associated to a single...
In IEEE 802.11 WLANs, a station can associate with more than one access point (AP). Previous algorithms which consider only the received signal strength indicator (RSSI) can cause stations to be associated to a single or only a few number of AP. However, it results in an overall network performance degradation. Besides, Hondoff in wireless networks is one of the critical issues for delay sensitive applications due to the high handoff latency. Therefore, a new algorithm is required both to select the most proper access point (AP) and to reduce the handoff latency to support multimedia traffic. In this paper, we propose a new AP selection algorithm which is based on reducing the handoff latency, improving the perceived voice quality (R value), capacity utilization, transmission rate, fairness, hidden nodes and the number of associated stations to an AP. Proposed algorithm works efficiently in the existence of both real-time and non-real-time traffic. Simulation results show improvements on the overall throughput and the perceived voice quality for users.
Building a large-scale digital preservation archives system (LDPAS) for long-term access is a challenging endeavor. The three most significant system requirements contributing to that challenge are the scalability of ...
详细信息
ISBN:
(纸本)9781424458820
Building a large-scale digital preservation archives system (LDPAS) for long-term access is a challenging endeavor. The three most significant system requirements contributing to that challenge are the scalability of the system, accommodation of heterogeneous digital holdings, and the evolvability of both the constituting technologies and the data formats in storage. The amount of digital-born materials requiring long-term preservation and access is overwhelming due to the fast pace of information technology and its widespread utilization in government, business corporations, academic institutions, and the general public. Compounding to the data volume challenge is the heterogeneity of the data, which range from the products of office automation and geospatial images, to multimedia artifacts. Storing and preserving digital objects must be accomplished in a way that allows access to the objects independently of the platform technology and software applications used to create these objects. As the technologies change rapidly, the LDPAS must accommodate the changes to its benefit, while also increasing in scale. A successful LDPAS must be able to adapt to the two-fold evolutionary demands. The evolution of the system software with time is the norm in any large-scale long-term system. But, even more important is the system's capability to cope with the evolution of the very software applications that generated the digital objects archived within it. In this paper, we propose an architecture of a system of content Servers, which can scale with the data volume growth, continually sustain evolution in the face of technological change, and provide different levels of service to the different kinds of users accessing the LDPAS. We describe the concept, components and services of a content Server in the context of digital archiving, service-oriented architecture (SOA) and the Open Archive Information System (OAIS) reference model. Several possible deployment configurations ar
In this paper, we propose a novel multi-label image annotation for image retrieval based on annotated keywords. For multi-label image annotation, a bi-coded genetic algorithm is employed to select optimal feature subs...
详细信息
ISBN:
(纸本)9781424466016;9780769540085
In this paper, we propose a novel multi-label image annotation for image retrieval based on annotated keywords. For multi-label image annotation, a bi-coded genetic algorithm is employed to select optimal feature subsets and corresponding optimal weights for every one vs. one SVM classifiers. After an unlabelled image is segmented into several regions with image segmentation algorithm, pre-trained SVMs are used to annotate each region, final label is obtained by merging all the region labels. A novel annotation refinement approach based on PageRank is proposed to get rid of irrelevant labels. Based on multi-label of image, image retrieval system provides keyword-based image retrieval service. Multi-labels can provide abundant descriptions for image content in semantic level, and experiment results shows the multi-label annotation algorithm can improve precision and recall of image retrieval.
In this paper, we present a novel method of steganography system based on CDMA (Code Division Multiple access) approach having regard to perceptibility of stego-image. Also additional extraction algorithms were design...
详细信息
In this paper, we present a novel method of steganography system based on CDMA (Code Division Multiple access) approach having regard to perceptibility of stego-image. Also additional extraction algorithms were designed due to enhancing of secret message decomposition. As it will be shown later, aptly imposed features of CDMA techniques are in consonance with imperatives claimed upon steganography systems.
In this paper, it presents an effective caching algorithm based on random access with the finite storage size in distributed server architecture for networked video services. Under the general video traffic condition,...
详细信息
In this paper, it presents an effective caching algorithm based on random access with the finite storage size in distributed server architecture for networked video services. Under the general video traffic condition, it is observed that the storage size and total popular contents of edge video server affect the performance of the total video sever system, and channel bandwidth between edge video servers and central video servers also is the key factor. To consider this fact, we design an effective edge caching algorithm to select the positions of content based on user random access in distributed server's architecture. Finally, experimental results are provided to show the superior performance of the proposed algorithm.
暂无评论