...VIDEO DATA MINING Pooja Gupta Department of Computer Science Jaypee Institute of Information Technology, NOIDA, U.P. ABSTRACT In recent years, advanced digital capturing technology has made digital data grow rapidly. Knowledge discovery from massive amounts of multimedia data, so-called multimedia mining, has been the focus of attention over the past few years. Typically, a video can be viewed as a series of images, which contains a lot of various concepts. Even though the annotation for the individual image frame is in effect, any concept in the image frames still cannot represent the complete video. The aim of the paper is to allow users to obtain their desired videos by submitting her/his interested video clips, without considering the identification of the query terms and applying an efficient indexing technique for searching videos present in large multimedia repositories. Keywords Video data mining, multimedia repository, index table, query clip. 1. INTRODUCTION Data mining is the process of posing various queries and extracting useful and often previously unknown and unexpected information, patterns, and trends from large quantities of data, generally stored in databases[1]. These data could be accumulated over a long period of time or they could be large data sets accumulated simultaneously from heterogeneous sources. Video mining is considered as...
Words: 2310 - Pages: 10
...◆ 3D Rendering in the Cloud ˇ c Martin D. Carroll, Ilija Hadzi´ , and William A. Katsak Many modern applications and window systems perform three-dimensional (3D) rendering. For a cloud system to support such applications, that 3D rendering must be performed in the cloud, because the end-user equipment cannot be relied upon to contain the necessary rendering hardware. All systems that perform 3D rendering in the cloud are faced with two fundamental and related problems: 1) How to enable an arbitrary number of users to produce rendered pixel streams, and 2) how to transfer those pixel streams out of the server’s frame buffers and into one or more encoders, for transmission to the user. We have implemented a new form of display virtualization that solves both of these problems in a low-level and transparent manner. Using our display virtualization (which we call the virtual cathode ray tube controller (VCRTC)), the cloud system can support an arbitrary number of pixel streams (bounded only by memory and bandwidth resources), and it can dynamically associate those streams with encoders. VCRTCs are completely transparent to the applications: No application needs to be modified, recompiled, or even relinked to use VCRTCs. Because they are low-level and transparent, VCRTCs are also a general mechanism with utility beyond cloud systems. © 2012 Alcatel-Lucent. Introduction Three-dimensional rendering is the process of transforming a model of a three-dimensional (3D) scene...
Words: 7263 - Pages: 30
...WORK Interim Report by Group No 33 AUTHORED BY Abdul Basit Shaikh (CE-091) Shujaw Muhammad (CE-077) Irsa Komal (CE-104) Ali Hassan Hussaini (CE-093) Table of Contents INTROUCTION ......................................................................................................................2-4 INDUSTIAL FORMWORK ................................................................................. 2 STUDY SCOPE & OBJECTIVES ........................................................................... 4 METHODOLOGY OF STUDY............................................................................... 4 STUDY DESIGN ................................................................................................................ 5-6 RESEARCH DESIGN .................................................................................................... 5 METHODS OF DATA COLLECTION ......................................................... 5 DATA SOURCES ............................................................................................................. 6 SUMMARY........................................................................................................................................ 7 WORK DONE TO DATE ...................................................................................... 7 REMAINING WORK .................................................................................................. 7 1 INTRODUCTION TO INDUSTRIAL FORMWORK There is...
Words: 1219 - Pages: 5
...pgloor@mit.edu Wei Lo Computer Science and Technology department Zhejiang University, Hangzhou, P.R. China Shannon Provost McCombs School of Business, University of Texas at Austin Austin, TX, USA Summary Research into human dynamical systems has long sought to identify robust signals for human behavior. We have discovered a series of social network-based indicators that are reliable predictors of team creativity and collaborative innovation. We extract these signals from electronic records of interpersonal interactions, including e-mail, and face-to-face interaction measured via sociometric badges. The first of these signals is Rotating Leadership, measuring the degree to which, over time, actors in a team vary in how central they are to team’s communication network’s structure. The second is Rotating Contribution, which measures the degree to which, over time, actors in a team vary in the ratio of communications they distribute versus receive. The third is Prompt Response Time, which measures, over time, the responsiveness of actors to one another’s communications. Finally, we demonstrate the predictive utility of these signals in a variety of contexts, showing them to be robust to various methods of evaluating innovation. Introduction In this paper we introduce a series of longitudinal, network-based measures of social interaction patterns that predict collaborative innovation. Innovation is a universal, emergent human behavior. According to noted evolutionary...
Words: 2758 - Pages: 12
...COMMUNICATIONS, VOL. 18, NO. 3, MARCH 2000 535 Performance Analysis of the IEEE 802.11 Distributed Coordination Function Giuseppe Bianchi Abstract—Recently, the IEEE has standardized the 802.11 protocol for Wireless Local Area Networks. The primary medium access control (MAC) technique of 802.11 is called distributed coordination function (DCF). DCF is a carrier sense multiple access with collision avoidance (CSMA/CA) scheme with binary slotted exponential backoff. This paper provides a simple, but nevertheless extremely accurate, analytical model to compute the 802.11 DCF throughput, in the assumption of finite number of terminals and ideal channel conditions. The proposed analysis applies to both the packet transmission schemes employed by DCF, namely, the basic access and the RTS/CTS access mechanisms. In addition, it also applies to a combination of the two schemes, in which packets longer than a given threshold are transmitted according to the RTS/CTS mechanism. By means of the proposed model, in this paper we provide an extensive throughput performance evaluation of both access mechanisms of the 802.11 protocol. Index Terms—802.11, collision avoidance, CSMA, performance evaluation. I. INTRODUCTION N recent years, much interest has been involved in the design of wireless networks for local area communication [1], [2]. Study group 802.11 was formed under IEEE Project 802 to recommend an international standard for Wireless Local Area Networks (WLAN’s). The final version of...
Words: 8526 - Pages: 35
...SMash: Secure Component Model for Cross-Domain Mashups on Unmodified Browsers Frederik De Keukelaere, Sumeer Bhola, Michael Steiner, Suresh Chari, Sachiko Yoshihama {eb41704, sachikoy}@jp.ibm.com, {sbhola, msteiner, schari}@us.ibm.com IBM Tokyo Research Laboratory, Kanagawa, Japan; IBM T.J. Watson Research Center, New York, USA ABSTRACT Mashup applications mix and merge content (data and code) from multiple content providers in a user’s browser, to provide high-value web applications that can rival the user experience provided by desktop applications. Current browser security models were not designed to support such applications and they are therefore implemented with insecure workarounds. In this paper, we present a secure component model, where components are provided by different trust domains, and can interact using a communication abstraction that allows ease of specification of a security policy. We have developed an implementation of this model that works currently in all major browsers, and addresses challenges of communication integrity and frame-phishing. An evaluation of the performance of our implementation shows that this approach is not just feasible but also practical. The technology discussed in this paper allows mutually mistrusting client-side components to communicate safely without any modifications to current browsers, and hence has the potential to achieve immediate and widespread adoption. Categories and Subject Descriptors: D.2.0 [General]: Protection...
Words: 10150 - Pages: 41
... Report by: Goh Jun Long 1304777D Kong Yee Ling Dayna 1304006H Lee Ju Wen Gwen 1301177J Queenie Lee Jia Jing 1302431J Seah Li Yi 1306152H Wee Jie Xin 1305450G |Contents Page | |Table of Contents |Page | |3 Brainstorm Ideas | | |Illustration of final selected concepts |1 | |Window display |2 | |Backdrop |2 | |Focal Point |2 | |Complementary Design |2 | |Storefront |3 | |Interior Display ...
Words: 1489 - Pages: 6
...Introduction to Multimedia Systems This Page Intentionally Left Blank Introduction to Multimedia Systems Editors Gaurav Bhatnagar Shikha Mehta Sugata Mitra Centre for Research in Cognitive Systems (CRCS) NIITUd. New Delhi, India ACADEMIC PRESS A Harcourt Science and Technology Company San Diego San Francisco New York Boston London Sydney Tokyo Cover art: © 2001 John Foxx Images This book is printed on acid-free paper, w Copyright © 2002 by ACADEMIC PRESS All Rights Reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Requests for permission to make copies of any part of the work should be mailed to: Permissions Department, Harcourt Inc., 6277 Sea Harbor Drive, Orlando, Florida 32887-6777 Explicit permission from Academic Press is not required to reproduce a maximum of two figures or tables from an Academic Press chapter in another scientific or research publication provided that the material has not been credited to another source and that full credit to the Academic Press chapter is given. Academic Press A division of Harcourt, Inc. 525 B Street, Suite 1900, San Diego, Cahfomia 92101-4495, USA http://www.academicpress.com Academic Press Harcourt Place, 32 Jamestown Road, London NWl 7BY, UK http ://www. academicpress...
Words: 60427 - Pages: 242
...BUSN460 Senior Project Final Report and Presentation Guide Overview: The object of this course and this project is to provide you with a realistic situation that you are likely to face in the real world business environment. You'll be working with limited information, limited support from your client, within a limited time frame - and yet, you have to get up to speed in a new area quickly, and make informed professional recommendations based on your research and analysis. You and your team have been hired by CanGo as consultants to help them improve their fast-growing business. The management team at CanGo is busy, not entirely organized and somewhat overwhelmed by their success. They are looking to you as an objective, intelligent, experienced business person - and to your combined experience as a team to help them figure out what they should do in several areas of their business. CanGo can provide very little guidance to you - if they knew what they were doing they wouldn't have asked you for help! CanGo is your customer, and they are paying you a great deal of money, so the tone of your work on the project should be that of information addressed to the Board of Directors of this company, and it should be the best professional work of your (academic) career. You should approach this project as if your job depended on it - as if it were paying your mortgage and grocery bill. This project is your new job. In previous courses you have been given specific guidelines, templates...
Words: 1716 - Pages: 7
...Almost all digital files can be used for steganography, but the formats of file that are more suitable are those with a high degree of redundancy. Redundancy can be defined as object bits that provide accuracy far greater than necessary for the object’s use and demonstration. The repetitive bits of an object are those bits that can be altered without the alteration being detected easily. Image and video files especially comply with this requirement, while research has also uncovered other file manuscripts that can be used for data hiding. This paper is mainly concentrating about image and video as carriers and their performance analysis based on its PSR and MSE...
Words: 4083 - Pages: 17
...CIS 534 - Advanced Network Security Design 1 CIS 534 Advanced Network Security Design CIS 534 - Advanced Network Security Design 2 Table of Contents Toolwire Lab 1:Analyzing IP Protocols with Wireshark ........................................................................ 6 Introduction ............................................................................................................................................. 6 Learning Objectives ................................................................................................................................ 6 Tools and Software ................................................................................................................................. 7 Deliverables ............................................................................................................................................. 7 Evaluation Criteria and Rubrics ........................................................................................................... 7 Hands-On Steps ....................................................................................................................................... 8 Part 1: Exploring Wireshark ............................................................................................................... 8 Part 2: Analyzing Wireshark Capture Information .......................................................................... 12 Lab #1 - Assessment Worksheet...
Words: 48147 - Pages: 193
...Constructivism, that shapes the look of the current digital world (e.g. the Internet). Professor Simon Cook of Duke University, in his recent paper, Late Victorian Visual Reasoning and a Modern History of Vision, argues that Manovich overlooks the importance of the Victorian period in influencing the aesthetics of our present digital design. Cook bases his argument on the concept of an orderly and well-catalogued Internet, as if the system had been developed in nineteenth century Britain. However, due to the chaotic, disorganized and ever-changing look of the digital world, the argument of a Victorian based system is flawed. The late nineteenth century does not have the impact Cook believes it does, whereas Manovich remains on track in his original argument. Still, Manovich’s ideas can only be regarded on a temporary basis, because the face of the digital world has changed drastically since its development, and will continue to in the near future. Before exploring the look of the current digital world, it is first important to look at its physical development. I will concentrate mainly on the Internet and the more recent phenomena of the World Wide Web, although software look also has a significant role. This concentration follows from my prediction of the future look of computers, which will be more web-based. This will be shown later in the paper. Although the current digital world is mostly visual, it was not always designed to be this...
Words: 2335 - Pages: 10
... | | |Business Research | Copyright © 2011 by University of Phoenix. All rights reserved. Course Description This course evaluates the process of conducting business research for improving decision making within an organization. Students will learn to apply an understanding of commonly employed business research techniques to improve a situation, solve a problem, or change a process. Other topics include problem framing, data collection, data analysis, and data presentation. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Cooper, D., & Schindler, P. (2011). Business research methods (11th ed.). New York, NY: McGraw-Hill/Irwin. All electronic materials are available on the student...
Words: 1594 - Pages: 7
...Journal of Theoretical and Applied Electronic Commerce Research ISSN 0718–1876 Electronic Version VOL 6 / ISSUE 2 / AUGUST 2011 / 31-49 © 2011 Universidad de Talca - Chile This paper is available online at www.jtaer.com DOI: 10.4067/S0718-18762011000200005 A Co-Evolution Model of Competitive Mobile Platforms: Technoeconomic Perspective Perambur Neelakanta1 and Raef Yassin2 Florida Atlantic University, Department of Computer and Electrical Engineering & Computer Science, 1 neelakan@fau.edu, 2 yassin@fau.edu Received 13 January 2011; received in revised form 10 April 2011; accepted 18 May 2011 Abstract A model depicting competitive technoeconomics of business structures specific to mobile-platforms is developed. The underlying co-evolution of large, competing enterprises of mobile-platforms that face customerchurning due to application-preferences and pricing structures in the deregulated ambient is viewed in the perspectives of nonlinear logistic systems akin to that of biological ecosystems. Relevant considerations are decided by and embodied with several stochastically-interacting subsystems. Hence, the temporal dynamics of competition/co-evolution of known competitors in the mobile-platform market, like Android, Symbian and iPhone is depicted by a novel model posing dichotomy of prey-predator flip-flops in the market; and, an asymptotic projection of ex post computations of underlying technoeconomics into the ex ante region would correspond to futuristic forecasts...
Words: 11617 - Pages: 47
...Pallavi Asrodia, Hemlata Patel / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 3, May-Jun 2012, pp.854-856 Network Traffic Analysis Using Packet Sniffer Pallavi Asrodia*, Hemlata Patel** *(Computer Science, dept., Jawaharlal Institute of Technology, Borawan, Khargone (M.P.) India.) ** (Computer Science, dept., Jawaharlal Institute of Technology, Borawan, Khargone (M.P.) India) ABSTRACT In the past five decades computer networks have kept up growing in size, complexity and, overall, in the number of its users as well as being in a permanent evolution. Hence the amount of network traffic flowing over their nodes has increased drastically. With the development and popularization of network Technology, the management, maintenance and monitoring of network is Important to keep the network smooth and improve Economic efficiency. For this purpose packet sniffer is used. Packet sniffing is important in network monitoring to troubleshoot and to log network. Packet sniffers are useful for analyzing network traffic over wired or wireless networks. This paper focuses on the basics of packet sniffer; it’s working Principle which used for analysis Network traffic. Keywords- Packet capture, Traffic analysis, Libpcap, Network Monitoring, NIC, Promiscuous mode, Berkeley Packet Filter, Network analyzer, Packet sniffer. unresponsive to those packets do not belong to themselves by just ignoring. However, if the network interface...
Words: 2215 - Pages: 9