Current Issue : January - March Volume : 2016 Issue Number : 1 Articles : 7 Articles
The popular route recommendation and traffic monitoring over the road networks have become important in the location-based\nservices. The schemes to find out the congested routes were proposed by considering the number of vehicles in a road segment.\nHowever, the existing schemes do not consider the features of each road segment such as width, length, and direction in a road\nnetwork. Furthermore, the existing schemes fail to consider the average moving speed of vehicles. Therefore, they can detect the\nincorrect density routes.To overcomesuch problems,we propose a newdiscovering scheme of congested routes through the analysis\nof vehicle trajectories in a road network. The proposed scheme divides each road into segments with different width and length in a\nroad network. And then, the congested road segment is detected through the saturation degree of the road segment and the average\nmoving speed of vehicles in the road segment. Finally, we compute the final congested routes by using a clustering scheme. The\nexperimental results have shown that the proposed scheme can efficiently discover the congested routes in the different directions\nof the roads....
Video event detection is a challenging problem in many applications, such as video surveillance and video content analysis. In this\npaper,we propose a new framework to perceive high-level codewords by analyzing temporal relationship between different channels\nof video features.The low-level vocabulary words are firstly generated after different audio and visual feature extraction. A weighted\nundirected graph is constructed by exploring the Granger Causality between low-level words. Then, a greedy agglomerative graph partitioning\nmethod is used to discover low-level word groups which have similar temporal pattern. The high-level codebooks\nrepresentation is obtained by quantification of low-level words groups. Finally, multiple kernel learning, combined with our high level\ncodewords, is used to detect the video event. Extensive experimental results show that the proposed method achieves preferable\nresults in video event detection....
Supporting high quality multimedia streaming on wireless devices poses several challenges compared to wired networks due to\nthe high variance in network performance encountered in the mobile environment. Although rate adaptation is commonly used in\nmultimedia applications to compensate for fluctuations in network performance, it is a reactive mechanism which is not aware of\nthe frequently changing connectivity that may occur on mobile devices. This paper proposed a performance evaluation model\nfor multimedia streaming applications that is aware of user mobility and network performance. We presented an example of\nmathematical solution to the model and demonstrated the functionality using common mobility and connectivity examples that\nmay be found in an urban environment.The proposed model is evaluated based on this functionality and how it may be used to\nenhance application performance....
Media richness, the degree to which a specific media transmits information in multiple channels, is an important concept as the\nnumber of available multimedia communication methods increases regularly. Individuals differ in their preferences for media\nrichness which may influence their choice of communication multimedia in a given situation. These preferences can influence how\nsuccessful their communication efforts will be. This exploratory study of 299 adults (ages 16ââ?¬â??84) with at least a basic ability to\ncompute examines the relationship between multimedia preference and age, gender, and personality traits. Males and people with\nhigher levels of extraversion and agreeableness were found to have a higher preference for media richness. Age was not a significant\npredictor of media richness preference....
Recently, as the utilization of CCTV (closed circuit television) is emerging as an issue, the studies on CCTV are receiving much\nattention. Accordingly, due to the development of CCTV, CCTV has IP addresses and is connected to network; it is exposed\nto many threats on the existing web environment. In this paper, steganography is utilized to confirm the Data Masquerading\nand Data Modification and, in addition, to strengthen the security; the user information is protected based on PKI (public key\ninfrastructure), SN (serial number), and R value (random number) attributed at the time of login and the user authentication\nprotocol to block non authorized access of malicious user in network CCTV environment was proposed. This paper should be\nappropriate for utilization of user infringement-related CCTV where user information protection-related technology is not applied\nfor CCTV in the future....
The evolution of mobile communication technology has fostered the development of new mobile multimedia applications in various domains. One of the most important applications is mobile commerce (m-commerce), which has an increasing impact in the life of the citizens, and could represent one of the many applications that contribute to the market success of the Internet of Things (IoT). Security and privacy concerns are quite relevant in m-commerce and IoT to protect financial and personal data of the citizens. One of the main issues in mobile commerce is how to ensure the security of the information needed to complete the m-commerce transaction in a distributed environment with different security frameworks. We have to consider that the protection of the m-commerce transactions must also be done to protect the privacy of the customer. In addition, the information of the m-commerce transaction can be fragmented in different files in a distributed m-commerce application, which can undermine the integrity (another security goal) of the transaction. In this article, we describe the design ofa m-commerce framework, where these issues are addressed through a policy based approach, where the access to the m-commerce transaction is regulated by policies. The fragmentation and integrity risks are addressed through the concept of Virtual Objects (VO), which have been defind in the FP7 iCore project. Policies are associated to VOs and distributed across the m-commerce applications. This paper describes the main concepts of VO and the policy based framework and shows how these concepts are applied to m-commerce in various scenarios to evaluate their feasibility. We apply and demonstrate the benefits of the proposed design to specific multimedia use cases of m-commerce where different domains are involved. Such as m-commerce system can be seen a basic underlying payment system for a wide variety of multimedia applications....
Subway tunnel cracks directly reflect the structural integrity of a tunnel, and as such the detection of subway tunnel cracks is always\nan important task in tunnel structure monitoring. This paper presents a convenient, fast, and automated crack detection method\nbased on a wireless multimedia sensor subway tunnel network. This method primarily provides a solution for image acquisition,\nimage detection and identification of cracks. In order to quickly obtain a surface image of the tunnel, we used special train image\nsensor nodes to provide the high speed and high performance processing capability with a large-capacity battery. The proposed\nprocess can significantly reduce the amount of data transmission by compressing the binary image obtained by initial processing\nof the original image.We transferred the data compressed by the sensor to an appropriate station and uploaded them to a database\nwhen the train passes through the station. We also designed a fast, easy to implement fracture identification and detection image\nprocessing algorithm that can solve the image identification and detection problem. In real subway field tests, this method provided\nexcellent performance for subway tunnel crack detection, and recognition....
Loading....