863 resultados para MULTIMEDIA
Resumo:
By 2015, with the proliferation of wireless multimedia applications and services (e.g., mobile TV, video on demand, online video repositories, immersive video interaction, peer to peer video streaming, and interactive video gaming), and any-time anywhere communication, the number of smartphones and tablets will exceed 6.5 billion as the most common web access devices. Data volumes in wireless multimedia data-intensive applications and mobile web services are projected to increase by a factor of 10 every five years, associated with a 20 percent increase in energy consumption, 80 percent of which is multimedia traffic related. In turn, multimedia energy consumption is rising at 16 percent per year, doubling every six years. It is estimated that energy costs alone account for as much as half of the annual operating expenditure. This has prompted concerted efforts by major operators to drastically reduce carbon emissions by up to 50 percent over the next 10 years. Clearly, there is an urgent need for new disruptive paradigms of green media to bridge the gap between wireless technologies and multimedia applications.
Resumo:
To cope with the rapid growth of multimedia applications that requires dynamic levels of quality of service (QoS), cross-layer (CL) design, where multiple protocol layers are jointly combined, has been considered to provide diverse QoS provisions for mobile multimedia networks. However, there is a lack of a general mathematical framework to model such CL scheme in wireless networks with different types of multimedia classes. In this paper, to overcome this shortcoming, we therefore propose a novel CL design for integrated real-time/non-real-time traffic with strict preemptive priority via a finite-state Markov chain. The main strategy of the CL scheme is to design a Markov model by explicitly including adaptive modulation and coding at the physical layer, queuing at the data link layer, and the bursty nature of multimedia traffic classes at the application layer. Utilizing this Markov model, several important performance metrics in terms of packet loss rate, delay, and throughput are examined. In addition, our proposed framework is exploited in various multimedia applications, for example, the end-to-end real-time video streaming and CL optimization, which require the priority-based QoS adaptation for different applications. More importantly, the CL framework reveals important guidelines as to optimize the network performance
Resumo:
The 5G network infrastructure is driven by the evolution of today's most demanding applications. Already, multimedia applications such as on-demand HD video and IPTV require gigabit- per-second throughput and low delay, while future technologies include ultra HDTV and machine-to-machine communication. Mm-Wave technologies such as IEEE 802.15.3c and IEEE 802.11ad are ideal candidates to deliver high throughput to multiple users demanding differentiated QoS. Optimization is often used as a methodology to meet throughput and delay constraints. However, traditional optimization techniques are not suited to a mixed set of multimedia applications. Particle swarm optimization (PSO) is shown as a promising technique in this context. Channel-time allocation PSO (CTA-PSO) is successfully shown here to allocate resource even in scenarios where blockage of the 60 GHz signal poses significant challenges.
Resumo:
PURPOSE: To study the effect of multimedia education on acceptance of comprehensive eye examinations (CEEs), critical for detecting glaucoma and diabetic eye disease, among rural Chinese patients using a randomized, controlled design.
METHODS: Patients aged ≥40 years were recruited from 52 routine clinic sessions (26 intervention, 26 control) conducted at seven rural hospitals in Guangdong, China. Subjects answered demographic questionnaires, were tested on knowledge about CEEs and chronic eye disease, and were told the cost of examination (range US$0-8). At intervention sessions, subjects were cluster-randomized to view a 10-minute video on the value of CEEs and retested. Control subjects were not retested. Trial outcomes were acceptance of CEEs (primary outcome) and final knowledge scores (secondary outcome).
RESULTS: At baseline, >70% (p = 0.70) of both intervention (n = 241, 61.2 ± 12.3 years) and control (n = 218, 58.4 ± 11.7 years) subjects answered no knowledge questions correctly, but mean scores on the test (maximum 5 points) increased by 1.39 (standard deviation 0.12) points (p < 0.001) after viewing the video. Intervention (73.0%) and control (72.9%) subjects did not differ in acceptance of CEEs (p > 0.50). In mixed-effect logistic regression models, acceptance of CEEs was associated with availability of free CEEs (odds ratio 18.3, 95% confidence interval 1.32-253.0), but not group assignment or knowledge score. Acceptance was 97.5% (79/81) when free exams were offered.
CONCLUSIONS: Education increased knowledge about but not acceptance of CEEs, which was generally high. Making CEEs free could further increase acceptance.
Resumo:
In this paper we give an overview of current investigations into the incorporation of cutting edge technologies within the Higher Education teaching domain. In particular, the role of audio is discussed through a number of case studies. The paper then concludes with a discussion of the authors' plans to incorporate audio and video content as supplementary course material for a technical undergraduate module
Resumo:
Maintaining a high level of data security with a low impact on system performance is more challenging in wireless multimedia applications. Protocols that are used for wireless local area network (WLAN) security are known to significantly degrade performance. In this paper, we propose an enhanced security system for a WLAN. Our new design aims to decrease the processing delay and increase both the speed and throughput of the system, thereby making it more efficient for multimedia applications. Our design is based on the idea of offloading computationally intensive encryption and authentication services to the end systems’ CPUs. The security operations are performed by the hosts’ central processor (which is usually a powerful processor) before delivering the data to a wireless card (which usually has a low-performance processor). By adopting this design, we show that both the delay and the jitter are significantly reduced. At the access point, we improve the performance of network processing hardware for real-time cryptographic processing by using a specialized processor implemented with field-programmable gate array technology. Furthermore, we use enhanced techniques to implement the Counter (CTR) Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) and the CTR protocol. Our experiments show that it requires timing in the range of 20–40 μs to perform data encryption and authentication on different end-host CPUs (e.g., Intel Core i5, i7, and AMD 6-Core) as compared with 10–50 ms when performed using the wireless card. Furthermore, when compared with the standard WiFi protected access II (WPA2), results show that our proposed security system improved the speed to up to 3.7 times.
Resumo:
A Work Project, presented as part of the requirements for the Award of a Masters Degree in Finance from the NOVA – School of Business and Economics
Resumo:
The purpose of the present case – and accompanying Teaching Notes – is to better understand the spin-off of PT Multimédia, by Portugal Telecom, after receiving a Public Takeover Offer from Sonaecom, in 2006. The Government and the Competition Authority had never looked in a serious way at PT’s dominant position and the lack of room for competition in the TMT sector – PT was the owner of both the cable and copper networks, having access to privileged information from its competitors with control over the wholesale and retail businesses. In 2006, the company received a takeover offer from Sonaecom, the TMT subsidiary from the Portuguese conglomerate Sonae. The offer was voted and rejected by a majority of PT shareholders, but the whole process triggered several recommendations from the regulatory bodies. As a result, PT divested its cable business with the spin-off of PT Multimédia, giving birth to a new competitor and a totally different landscape in the telecommunications sector in Portugal.
Resumo:
Tesis (Maestría en Ciencias de la Administración con Especialidad en Sistemas) UANL
Resumo:
Tesis (Maestro en Ciencias de la Ingeniería con Especialidad en Telecomunicaciones) - Universidad Autónoma de Nuevo León, 2002
Resumo:
PériCulture est le nom d'un projet de recherche à l'Université de Montréal qui fait partie d'un projet plus vaste basé à l'Université de Sherbrooke. Ce dernier visait à former un réseau de recherche pour la gestion du contenu culturel numérique canadien. L'objectif général de la recherche de PériCulture était d'étudier les méthodes d'indexation de contenus culturels non textuels sur le Web, plus spécifiquement des images. Les résultats de la recherche présentés ici s'appuient sur des travaux précédents en indexation d'images et en indexation automatique (de texte), par l'étude des propriétés du texte associé à des images dans un environnement réseau. Le but était de comprendre la façon dont le texte associé à des images sur des pages Web (appelé péritexte) peut être exploité pour indexer les images correspondantes. Nous avons étudié cette question dans le contexte de pages Web sélectionnées, c'est à dire : des pages de contenu culturel canadien contenant des objets multimédia auxquels était associé du texte (plus que simplement les noms de fichiers et les légendes) et qui étaient bilingues (anglais et français). Nous avons identifié les mots-clés utiles à l'indexation situés à proximité de l'objet décrit. Les termes d'indexation potentiels ont été identifiés dans diverses balises HTML et dans le texte intégral (chacun étant considéré comme une source différente de péritexte). Notre étude a révélé qu'un grand nombre de termes d'indexation utiles sont disponibles dans le péritexte de nombreux sites Web ayant un contenu culturel, et ce péritexte de différentes sources a une utilité variable dans la recherche d’information. Nos résultats suggèrent que ces termes peuvent être exploités de différentes manières dans les systèmes de recherche d’information pour améliorer les résultats de recherche.