Beyond-5G(B5G)aims to meet the growing demands of mobile traffic and expand the communication space.Considering that intelligent applications to B5G wireless communications will involve security issues regarding user ...Beyond-5G(B5G)aims to meet the growing demands of mobile traffic and expand the communication space.Considering that intelligent applications to B5G wireless communications will involve security issues regarding user data and operational data,this paper analyzes the maximum capacity of the multi-watermarking method for multimedia signal hiding as a means of alleviating the information security problem of B5G.The multiwatermarking process employs spread transform dither modulation.During the watermarking procedure,Gram-Schmidt orthogonalization is used to obtain the multiple spreading vectors.Consequently,multiple watermarks can be simultaneously embedded into the same position of a multimedia signal.Moreover,the multiple watermarks can be extracted without affecting one another during the extraction process.We analyze the effect of the size of the spreading vector on the unit maximum capacity,and consequently derive the theoretical relationship between the size of the spreading vector and the unit maximum capacity.A number of experiments are conducted to determine the optimal parameter values for maximum robustness on the premise of high capacity and good imperceptibility.展开更多
The development of digital technology has brought about a substantial evolution in the multimedia field.The use of generative technologies to produce digital multimedia material is one of the newer developments in thi...The development of digital technology has brought about a substantial evolution in the multimedia field.The use of generative technologies to produce digital multimedia material is one of the newer developments in this field.The“Digital Generative Multimedia Tool Theory”(DGMTT)is therefore presented in this theoretical postulation by Timothy Ekeledirichukwu Onyejelem and Eric Msughter Aondover.It discusses and describes the principles behind the development and deployment of generative tools in multimedia creation.The DGMTT offers an all-encompassing structure for comprehending and evaluating the fundamentals and consequences of generative tools in the production of multimedia content.It provides information about the creation and use of these instruments,thereby promoting developments in the digital media industry.These tools create dynamic and interactive multimedia content by utilizing machine learning,artificial intelligence,and algorithms.This theory emphasizes how crucial it is to comprehend the fundamental ideas and principles of generative tools in order to use them efficiently when creating digital media content.A wide range of industries,including journalism,advertising,entertainment,education,and the arts,can benefit from the practical use of DGMTT.It gives artists the ability to use generative technologies to create unique and customized multimedia content for its viewers.展开更多
Recent advances in wireless mobile computing, digital library, and distributed multimedia technologies are stimulating the development of mobile multimedia digital library systems ( M2DLS) that allow mobile clients ...Recent advances in wireless mobile computing, digital library, and distributed multimedia technologies are stimulating the development of mobile multimedia digital library systems ( M2DLS) that allow mobile clients to access multimedia material anywhere and anytime over a cellular radio network. This paper addresses the problem of providing synchronized multimedia retrieval in these sys- tems. An efficient inter-media synchronization scheme called wireless prioritized feedback (WPF) for mobile multimedia on-demand retrieval in digital library systems over CDMA cellular radio networks in the absence of synchronized clocks is presented. In the WPF scheme, base stations use preferential lightweight message called feedback units transmitted by mobile mediaphones to detect and correct asynchronies. The algorithm is described with pseudo code, and experiments are described to demonstrate the efficiency of WPF.展开更多
With the development of social economy,the multimedia and network teaching is more and more important in college English teaching,especially in vocational college.It can not only help students to give full play to the...With the development of social economy,the multimedia and network teaching is more and more important in college English teaching,especially in vocational college.It can not only help students to give full play to their collective consciousness and make our English course be full of vitality,but also make the amount of information in class redoubled.For the multimedia and network teaching,there're some problems in English teaching.So the multimedia and network teaching has both necessities and problems.展开更多
For the current foreign language teaching, using multimedia technology has become a necessity in information age. The modernization of computer has paved a new way of deepening teaching reform and improving teaching e...For the current foreign language teaching, using multimedia technology has become a necessity in information age. The modernization of computer has paved a new way of deepening teaching reform and improving teaching efficiency and quality. With the computer technology applied in education, language teachers have witnessed dramatic changes in the ways that languages are taught. Multimedia technology applied in English teaching has been considered to be a more effective medium, which represents an inevitable trend of applied linguistics.展开更多
Advanced English is a key course for English majors in advanced stage.This paper first proposes the problems in tradi tional advanced English teaching.Then it explains the theoretical basis and finally the paper state...Advanced English is a key course for English majors in advanced stage.This paper first proposes the problems in tradi tional advanced English teaching.Then it explains the theoretical basis and finally the paper states advantages of multimedia teach ing in Advanced English.展开更多
Providing highly efficient underwater transmission of mass multimedia data is challenging due to the particularities of the underwater environment. Although there are many schemes proposed to optimize the underwater a...Providing highly efficient underwater transmission of mass multimedia data is challenging due to the particularities of the underwater environment. Although there are many schemes proposed to optimize the underwater acoustic network communication protocols, from physical layer, data link layer, network layer to transport layer, the existing routing protocols for underwater wireless sensor network(UWSN) still cannot well deal with the problems in transmitting multimedia data because of the difficulties involved in high energy consumption, low transmission reliability or high transmission delay. It prevents us from applying underwater multimedia data to real-time monitoring of marine environment in practical application, especially in emergency search, rescue operation and military field. Therefore, the inefficient transmission of marine multimedia data has become a serious problem that needs to be solved urgently. In this paper, A Layered Load Balance Routing Protocol(L2-LBMT) is proposed for underwater multimedia data transmission. In L2-LBMT, we use layered and load-balance Ad Hoc Network to transmit data, and adopt segmented data reliable transfer(SDRT) protocol to improve the data transport reliability. And a 3-node variant of tornado(3-VT) code is also combined with the Ad Hoc Network to transmit little emergency data more quickly. The simulation results show that the proposed protocol can balance energy consumption of each node, effectively prolong the network lifetime and reduce transmission delay of marine multimedia data.展开更多
Fog computing is introduced to relieve the problems triggered by the long distance between the cloud and terminal devices. In this paper, considering the mobility of terminal devices represented as mobile multimedia u...Fog computing is introduced to relieve the problems triggered by the long distance between the cloud and terminal devices. In this paper, considering the mobility of terminal devices represented as mobile multimedia users(MMUs) and the continuity of requests delivered by them, we propose an online resource allocation scheme with respect to deciding the state of servers in fog nodes distributed at different zones on the premise of satisfying the quality of experience(QoE) based on a Stackelberg game. Specifically, a multi-round of a predictably\unpredictably dynamic scheme is derived from a single-round of a static scheme. The optimal allocation schemes are discussed in detail, and related experiments are designed. For simulations, comparing with non-strategy schemes, the performance of the dynamic scheme is better at minimizing the cost used to maintain fog nodes for providing services.展开更多
Nowadays,healthcare applications necessitate maximum volume of medical data to be fed to help the physicians,academicians,pathologists,doctors and other healthcare professionals.Advancements in the domain of Wireless ...Nowadays,healthcare applications necessitate maximum volume of medical data to be fed to help the physicians,academicians,pathologists,doctors and other healthcare professionals.Advancements in the domain of Wireless Sensor Networks(WSN)andMultimediaWireless Sensor Networks(MWSN)are tremendous.M-WMSN is an advanced form of conventional Wireless Sensor Networks(WSN)to networks that use multimedia devices.When compared with traditional WSN,the quantity of data transmission in M-WMSN is significantly high due to the presence of multimedia content.Hence,clustering techniques are deployed to achieve low amount of energy utilization.The current research work aims at introducing a new Density Based Clustering(DBC)technique to achieve energy efficiency inWMSN.The DBC technique is mainly employed for data collection in healthcare environment which primarily depends on three input parameters namely remaining energy level,distance,and node centrality.In addition,two static data collector points called Super Cluster Head(SCH)are placed,which collects the data from normal CHs and forwards it to the Base Station(BS)directly.SCH supports multi-hop data transmission that assists in effectively balancing the available energy.Adetailed simulation analysiswas conducted to showcase the superior performance of DBC technique and the results were examined under diverse aspects.The simulation outcomes concluded that the proposed DBC technique improved the network lifetime to a maximum of 16,500 rounds,which is significantly higher compared to existing methods.展开更多
The multimedia synchronization is used to coordinate the timing of each multimedia object in the multimedia system. After studying different multimedia synchronization systems that have been published, an Interactive ...The multimedia synchronization is used to coordinate the timing of each multimedia object in the multimedia system. After studying different multimedia synchronization systems that have been published, an Interactive Synchronization multimedia based on Petri Nets model (ISPN) is proposed in this paper. The system is capable of describing the dynamic timing actions of multimedia objects vividly as well as controlling them interactively to maintain the system level synchronization balance.展开更多
Rapid penetration of small customized wireless devices and enormous growth of wireless communication technologies has already set the stage for large-scale deployment of wireless sensor networks. Offering precise qual...Rapid penetration of small customized wireless devices and enormous growth of wireless communication technologies has already set the stage for large-scale deployment of wireless sensor networks. Offering precise quality of service (QoS) for multimedia transmission over sensor networks has not received significant attention. However offering some better QoS for wireless multimedia over sensor networks raises significant challenges. In this paper, we propose an adaptive Cross-Layer multi-channel QoS-MAC protocol to support energy-efficient, high throughput, and reliable data transmission in Wireless Multimedia Sensor Network (WMSNs). Our proposed protocol use benefit of TDMA and CSMA/CA to adaptively assign channels and timeslots to active multimedia sensor nodes in clusters. Simulations show that the proposed system achieves the performance objectives of WMSNs with increased network throughput at the cost of a small control and energy overhead.展开更多
The paper elaborates the features and superiority of applying multimedia technology to aquatic organisms in a Science and Life Technology course. The augmented reality application of multimedia technology in aquatic o...The paper elaborates the features and superiority of applying multimedia technology to aquatic organisms in a Science and Life Technology course. The augmented reality application of multimedia technology in aquatic organisms’ instruction has its own features, teaching information capacity, interactive user interface. The paper concludes the superiority of Unity and Vuforia AR instruction from five perspectives;meanwhile, the paper elaborates its disadvantages. An AR-based instruction attitude questionnaire was conducted at the end of the experiment to obtain learners’ perspectives of the system. Learners in AR approach demonstrate higher motivation and concentrate their attention on the learning tasks. Learners showed more positive attitude in willingness to use the AR-based instruction to improve learning interests. This study provided insights for better understanding the design, theory and practice of e-learning through augmented reality technology.展开更多
Initially as an extension of cloud computing, fog computing has been inspiring new ideas about moving computing tasks to the edge of networks. In fog, we often repeat the procedure of placing services because of the g...Initially as an extension of cloud computing, fog computing has been inspiring new ideas about moving computing tasks to the edge of networks. In fog, we often repeat the procedure of placing services because of the geographical distribution of mobile users. We may not expect a fixed demand and supply relationship between users and service providers since users always prefer nearby service with less time delay and transmission consumption. That is, a plug-and-play service mode is what we need in fog. In this paper, we put forward a dynamic placement strategy for fog service to guarantee the normal service provision and optimize the Quality of Service (QoS). The simulation results show that our strategy can achieve better performance under metrics including energy consumption and end-to-end latency. Moreover, we design a real Plug-and-Play Fog (PnPF) based on Raspberry Pi and OpenWrt to provide fog services for wireless multimedia networks.展开更多
A novel encryption model is proposed. It combines encryption process with compression process, and realizes compression and encryption at the same time. The model's feasibility and security are analyzed in detail. An...A novel encryption model is proposed. It combines encryption process with compression process, and realizes compression and encryption at the same time. The model's feasibility and security are analyzed in detail. And the relationship between its security and compression ratio is also analyzed.展开更多
To cope with privacy leakage caused by multimedia outsourcing and sharing,data provenance is used to analyze leaked multimedia and provide reactive accountability.Existing schemes of multimedia provenance are based on...To cope with privacy leakage caused by multimedia outsourcing and sharing,data provenance is used to analyze leaked multimedia and provide reactive accountability.Existing schemes of multimedia provenance are based on watermarking protocols.In an outsourcing scenario,existing schemes face two severe challenges:1)when data leakage occurs,there exists a probability that data provenance results can be repudiated,in which case data provenance tracking fails;and 2)when outsourced data are shared,data encryption transfer causes key management burden outside the schemes,and privacy leakage threatens users.In this paper,we propose a novel data provenance scheme with an improved LUT-based fingerprinting protocol,which integrates an asymmetric watermarking protocol,robust watermark algorithm and homomorphic encryption and digital signatures to achieve full non-repudiation provenance.We build an in-scheme stream cipher to protect outsourced multimedia data from privacy leakage and complicated key management.Our scheme is also lightweight and easy to deploy.Extensive security and performance analysis compares our scheme with the state of the art.The results show that our scheme has not only better provenance security and data confidentiality but also higher efficiency for multimedia outsourcing,sharing and provenance.展开更多
Multimedia big data brings tremendous challenges as well as opportunities for multimedia applications/services. In this paper, we present a survey and tutorial for multimedia big data. After discussing the characteris...Multimedia big data brings tremendous challenges as well as opportunities for multimedia applications/services. In this paper, we present a survey and tutorial for multimedia big data. After discussing the characteristics of multimedia big data such as human-centricity, multimodality, heterogeneity, unprecedented volume, and so on, this paper provides an overview of the state-of-the-art of multimedia big data, reviews the latest related technologies, and discusses the technical challenges. We conclude this paper with a discussion of open problems and future directions.展开更多
In recent years, the application of the Internet of Things (IoT) has become an emerging business. The most important concept of next-generation network for providing a common global IT platform is combining seamless...In recent years, the application of the Internet of Things (IoT) has become an emerging business. The most important concept of next-generation network for providing a common global IT platform is combining seamless networks and networked things, objects or sensors. Also, wireless body area networks (WBANs) are becoming mature with the widespread usage of the IoT. In order to support WBAN, the platform, scenario and emergency service are necessary due to the sensors in WBAN being related to wearer's life. The sensors on the body detect a lot of information about bioinformatics and medical signals, such as heartbeat and blood. Thus, the integration of IoT and network communication in daily life is important. However, there is not only a lack of common fabric for integrating IoT with current Internet and but also no emergency call process in the current network communication envi-ronment. To overcome such situations, the prototype of integrating IoT and emergency call process is discussed. A simulated boot-strap platform to provide the discussion of open challenges and solutions for deploying IoT in Internet and the emergency commu-nication system are analyzed by using a service of 3GPP IP multimedia subsystem. Finally, the prototype for supporting WBAN with emergence service is also addressed and the performance results are useful to service providers and network operators that they can estimate their migration to IoT by referring to this experience and experiment results. Furthermore, the queuing model used to achieve the performance of emergency service in IMS and the delay time of the proposed model is analyzed.展开更多
This paper presents a system with real-time classification of human movements based on smartphone mounted on the waist. The built-in tri-accelerometer was utilized to collect the information of body motion. At the sam...This paper presents a system with real-time classification of human movements based on smartphone mounted on the waist. The built-in tri-accelerometer was utilized to collect the information of body motion. At the same time, the smartphone is able to classify the data for activity recognition. By our algorithm, body motion can be classified into five different patterns: vertical activity, lying, sitting or static standing, horizontal activity and fall. It alarms falling by Multimedia Messaging Service (MMS) with map of suspected fall location, GPS coordinate and time etc. If a fall was suspected, an automatic MMS would be sent to preset people. The major advantage of the proposed system is the novel application of smartphone which already have the necessary sensors and can monitor fall ubiquitously without any additional devices.展开更多
基金funded by The National Natural Science Foundation of China under Grant(No.62273108,62306081)The Youth Project of Guangdong Artificial Intelligence and Digital Economy Laboratory(Guangzhou)(PZL2022KF0006)+3 种基金The National Key Research and Development Program of China(2022YFB3604502)Special Fund Project of GuangzhouScience and Technology Innovation Development(202201011307)Guangdong Province Industrial Internet Identity Analysis and Construction Guidance Fund Secondary Node Project(1746312)Special Projects in Key Fields of General Colleges and Universities in Guangdong Province(2021ZDZX1016).
文摘Beyond-5G(B5G)aims to meet the growing demands of mobile traffic and expand the communication space.Considering that intelligent applications to B5G wireless communications will involve security issues regarding user data and operational data,this paper analyzes the maximum capacity of the multi-watermarking method for multimedia signal hiding as a means of alleviating the information security problem of B5G.The multiwatermarking process employs spread transform dither modulation.During the watermarking procedure,Gram-Schmidt orthogonalization is used to obtain the multiple spreading vectors.Consequently,multiple watermarks can be simultaneously embedded into the same position of a multimedia signal.Moreover,the multiple watermarks can be extracted without affecting one another during the extraction process.We analyze the effect of the size of the spreading vector on the unit maximum capacity,and consequently derive the theoretical relationship between the size of the spreading vector and the unit maximum capacity.A number of experiments are conducted to determine the optimal parameter values for maximum robustness on the premise of high capacity and good imperceptibility.
文摘The development of digital technology has brought about a substantial evolution in the multimedia field.The use of generative technologies to produce digital multimedia material is one of the newer developments in this field.The“Digital Generative Multimedia Tool Theory”(DGMTT)is therefore presented in this theoretical postulation by Timothy Ekeledirichukwu Onyejelem and Eric Msughter Aondover.It discusses and describes the principles behind the development and deployment of generative tools in multimedia creation.The DGMTT offers an all-encompassing structure for comprehending and evaluating the fundamentals and consequences of generative tools in the production of multimedia content.It provides information about the creation and use of these instruments,thereby promoting developments in the digital media industry.These tools create dynamic and interactive multimedia content by utilizing machine learning,artificial intelligence,and algorithms.This theory emphasizes how crucial it is to comprehend the fundamental ideas and principles of generative tools in order to use them efficiently when creating digital media content.A wide range of industries,including journalism,advertising,entertainment,education,and the arts,can benefit from the practical use of DGMTT.It gives artists the ability to use generative technologies to create unique and customized multimedia content for its viewers.
基金Project supported by National Natural Science Foundation of China (Grant No .60221120146) , National Basic Research Pro-gram of China ( Grant No . 973 -G1999032704) , and National Grand Fundamental Post Doctor Research of China (Grant No .2003034146)
文摘Recent advances in wireless mobile computing, digital library, and distributed multimedia technologies are stimulating the development of mobile multimedia digital library systems ( M2DLS) that allow mobile clients to access multimedia material anywhere and anytime over a cellular radio network. This paper addresses the problem of providing synchronized multimedia retrieval in these sys- tems. An efficient inter-media synchronization scheme called wireless prioritized feedback (WPF) for mobile multimedia on-demand retrieval in digital library systems over CDMA cellular radio networks in the absence of synchronized clocks is presented. In the WPF scheme, base stations use preferential lightweight message called feedback units transmitted by mobile mediaphones to detect and correct asynchronies. The algorithm is described with pseudo code, and experiments are described to demonstrate the efficiency of WPF.
文摘With the development of social economy,the multimedia and network teaching is more and more important in college English teaching,especially in vocational college.It can not only help students to give full play to their collective consciousness and make our English course be full of vitality,but also make the amount of information in class redoubled.For the multimedia and network teaching,there're some problems in English teaching.So the multimedia and network teaching has both necessities and problems.
文摘For the current foreign language teaching, using multimedia technology has become a necessity in information age. The modernization of computer has paved a new way of deepening teaching reform and improving teaching efficiency and quality. With the computer technology applied in education, language teachers have witnessed dramatic changes in the ways that languages are taught. Multimedia technology applied in English teaching has been considered to be a more effective medium, which represents an inevitable trend of applied linguistics.
文摘Advanced English is a key course for English majors in advanced stage.This paper first proposes the problems in tradi tional advanced English teaching.Then it explains the theoretical basis and finally the paper states advantages of multimedia teach ing in Advanced English.
基金supported by the National Natural Science Foundation of China (No.61401413)the Digital Home Industry Cluster Oriented Technology Service Innovation Pilot Project in 2015
文摘Providing highly efficient underwater transmission of mass multimedia data is challenging due to the particularities of the underwater environment. Although there are many schemes proposed to optimize the underwater acoustic network communication protocols, from physical layer, data link layer, network layer to transport layer, the existing routing protocols for underwater wireless sensor network(UWSN) still cannot well deal with the problems in transmitting multimedia data because of the difficulties involved in high energy consumption, low transmission reliability or high transmission delay. It prevents us from applying underwater multimedia data to real-time monitoring of marine environment in practical application, especially in emergency search, rescue operation and military field. Therefore, the inefficient transmission of marine multimedia data has become a serious problem that needs to be solved urgently. In this paper, A Layered Load Balance Routing Protocol(L2-LBMT) is proposed for underwater multimedia data transmission. In L2-LBMT, we use layered and load-balance Ad Hoc Network to transmit data, and adopt segmented data reliable transfer(SDRT) protocol to improve the data transport reliability. And a 3-node variant of tornado(3-VT) code is also combined with the Ad Hoc Network to transmit little emergency data more quickly. The simulation results show that the proposed protocol can balance energy consumption of each node, effectively prolong the network lifetime and reduce transmission delay of marine multimedia data.
基金supported by the National Natural Science Foundation of China under grant No. 61501080, 61572095, 61871064, and 61877007
文摘Fog computing is introduced to relieve the problems triggered by the long distance between the cloud and terminal devices. In this paper, considering the mobility of terminal devices represented as mobile multimedia users(MMUs) and the continuity of requests delivered by them, we propose an online resource allocation scheme with respect to deciding the state of servers in fog nodes distributed at different zones on the premise of satisfying the quality of experience(QoE) based on a Stackelberg game. Specifically, a multi-round of a predictably\unpredictably dynamic scheme is derived from a single-round of a static scheme. The optimal allocation schemes are discussed in detail, and related experiments are designed. For simulations, comparing with non-strategy schemes, the performance of the dynamic scheme is better at minimizing the cost used to maintain fog nodes for providing services.
文摘Nowadays,healthcare applications necessitate maximum volume of medical data to be fed to help the physicians,academicians,pathologists,doctors and other healthcare professionals.Advancements in the domain of Wireless Sensor Networks(WSN)andMultimediaWireless Sensor Networks(MWSN)are tremendous.M-WMSN is an advanced form of conventional Wireless Sensor Networks(WSN)to networks that use multimedia devices.When compared with traditional WSN,the quantity of data transmission in M-WMSN is significantly high due to the presence of multimedia content.Hence,clustering techniques are deployed to achieve low amount of energy utilization.The current research work aims at introducing a new Density Based Clustering(DBC)technique to achieve energy efficiency inWMSN.The DBC technique is mainly employed for data collection in healthcare environment which primarily depends on three input parameters namely remaining energy level,distance,and node centrality.In addition,two static data collector points called Super Cluster Head(SCH)are placed,which collects the data from normal CHs and forwards it to the Base Station(BS)directly.SCH supports multi-hop data transmission that assists in effectively balancing the available energy.Adetailed simulation analysiswas conducted to showcase the superior performance of DBC technique and the results were examined under diverse aspects.The simulation outcomes concluded that the proposed DBC technique improved the network lifetime to a maximum of 16,500 rounds,which is significantly higher compared to existing methods.
基金Supported by the National Natural Science Foundation of China (60572100)
文摘The multimedia synchronization is used to coordinate the timing of each multimedia object in the multimedia system. After studying different multimedia synchronization systems that have been published, an Interactive Synchronization multimedia based on Petri Nets model (ISPN) is proposed in this paper. The system is capable of describing the dynamic timing actions of multimedia objects vividly as well as controlling them interactively to maintain the system level synchronization balance.
文摘Rapid penetration of small customized wireless devices and enormous growth of wireless communication technologies has already set the stage for large-scale deployment of wireless sensor networks. Offering precise quality of service (QoS) for multimedia transmission over sensor networks has not received significant attention. However offering some better QoS for wireless multimedia over sensor networks raises significant challenges. In this paper, we propose an adaptive Cross-Layer multi-channel QoS-MAC protocol to support energy-efficient, high throughput, and reliable data transmission in Wireless Multimedia Sensor Network (WMSNs). Our proposed protocol use benefit of TDMA and CSMA/CA to adaptively assign channels and timeslots to active multimedia sensor nodes in clusters. Simulations show that the proposed system achieves the performance objectives of WMSNs with increased network throughput at the cost of a small control and energy overhead.
文摘The paper elaborates the features and superiority of applying multimedia technology to aquatic organisms in a Science and Life Technology course. The augmented reality application of multimedia technology in aquatic organisms’ instruction has its own features, teaching information capacity, interactive user interface. The paper concludes the superiority of Unity and Vuforia AR instruction from five perspectives;meanwhile, the paper elaborates its disadvantages. An AR-based instruction attitude questionnaire was conducted at the end of the experiment to obtain learners’ perspectives of the system. Learners in AR approach demonstrate higher motivation and concentrate their attention on the learning tasks. Learners showed more positive attitude in willingness to use the AR-based instruction to improve learning interests. This study provided insights for better understanding the design, theory and practice of e-learning through augmented reality technology.
基金supported by JSPS KAKENHI Grant Numbers JP16K00117, JP19K20250 and KDDI Foundation
文摘Initially as an extension of cloud computing, fog computing has been inspiring new ideas about moving computing tasks to the edge of networks. In fog, we often repeat the procedure of placing services because of the geographical distribution of mobile users. We may not expect a fixed demand and supply relationship between users and service providers since users always prefer nearby service with less time delay and transmission consumption. That is, a plug-and-play service mode is what we need in fog. In this paper, we put forward a dynamic placement strategy for fog service to guarantee the normal service provision and optimize the Quality of Service (QoS). The simulation results show that our strategy can achieve better performance under metrics including energy consumption and end-to-end latency. Moreover, we design a real Plug-and-Play Fog (PnPF) based on Raspberry Pi and OpenWrt to provide fog services for wireless multimedia networks.
基金supported by the National Natural Science Foundation of China(60903197)the Major State Basic Research Development Program of China(2007CB310800)+1 种基金the Major Research Plan of the National Natural Science Foundation of China (90718006)the Foundation of Key Laboratory of Aerospace Information Security and Trust Computing Ministry of Education.
文摘A novel encryption model is proposed. It combines encryption process with compression process, and realizes compression and encryption at the same time. The model's feasibility and security are analyzed in detail. And the relationship between its security and compression ratio is also analyzed.
基金The authors would like to thank the anonymous referees for their valuable comments and helpful suggestions.The work is supported by the National Key Research and Development Program of China(No.2016YFB0800402)the National Natural Science Foundation of China(No.U1405254,No.U1536207).
文摘To cope with privacy leakage caused by multimedia outsourcing and sharing,data provenance is used to analyze leaked multimedia and provide reactive accountability.Existing schemes of multimedia provenance are based on watermarking protocols.In an outsourcing scenario,existing schemes face two severe challenges:1)when data leakage occurs,there exists a probability that data provenance results can be repudiated,in which case data provenance tracking fails;and 2)when outsourced data are shared,data encryption transfer causes key management burden outside the schemes,and privacy leakage threatens users.In this paper,we propose a novel data provenance scheme with an improved LUT-based fingerprinting protocol,which integrates an asymmetric watermarking protocol,robust watermark algorithm and homomorphic encryption and digital signatures to achieve full non-repudiation provenance.We build an in-scheme stream cipher to protect outsourced multimedia data from privacy leakage and complicated key management.Our scheme is also lightweight and easy to deploy.Extensive security and performance analysis compares our scheme with the state of the art.The results show that our scheme has not only better provenance security and data confidentiality but also higher efficiency for multimedia outsourcing,sharing and provenance.
基金supported in part by the Na tional Natural Science Foundation of China (NO. 61401004, 61271233, 60972038)Plan of introduction and cultivation of university leading talents in Anhui (No.gxfxZ D2016013)+3 种基金the Natural Science Foundation of the Higher Education Institutions of Anhui Province, China (No. KJ2010B357)Startup Project of Anhui Normal University Doctor ScientificResearch (No.2016XJJ129)the US Nation al Science Foundation under grants CNS1702957 and ACI-1642133the Wireless Engineering Research and Education Center at Auburn University
文摘Multimedia big data brings tremendous challenges as well as opportunities for multimedia applications/services. In this paper, we present a survey and tutorial for multimedia big data. After discussing the characteristics of multimedia big data such as human-centricity, multimodality, heterogeneity, unprecedented volume, and so on, this paper provides an overview of the state-of-the-art of multimedia big data, reviews the latest related technologies, and discusses the technical challenges. We conclude this paper with a discussion of open problems and future directions.
基金partly funded by Ministry of Science and Technology of R.O.C. under grants no.NSC 101-2221-E-197008-MY3
文摘In recent years, the application of the Internet of Things (IoT) has become an emerging business. The most important concept of next-generation network for providing a common global IT platform is combining seamless networks and networked things, objects or sensors. Also, wireless body area networks (WBANs) are becoming mature with the widespread usage of the IoT. In order to support WBAN, the platform, scenario and emergency service are necessary due to the sensors in WBAN being related to wearer's life. The sensors on the body detect a lot of information about bioinformatics and medical signals, such as heartbeat and blood. Thus, the integration of IoT and network communication in daily life is important. However, there is not only a lack of common fabric for integrating IoT with current Internet and but also no emergency call process in the current network communication envi-ronment. To overcome such situations, the prototype of integrating IoT and emergency call process is discussed. A simulated boot-strap platform to provide the discussion of open challenges and solutions for deploying IoT in Internet and the emergency commu-nication system are analyzed by using a service of 3GPP IP multimedia subsystem. Finally, the prototype for supporting WBAN with emergence service is also addressed and the performance results are useful to service providers and network operators that they can estimate their migration to IoT by referring to this experience and experiment results. Furthermore, the queuing model used to achieve the performance of emergency service in IMS and the delay time of the proposed model is analyzed.
文摘This paper presents a system with real-time classification of human movements based on smartphone mounted on the waist. The built-in tri-accelerometer was utilized to collect the information of body motion. At the same time, the smartphone is able to classify the data for activity recognition. By our algorithm, body motion can be classified into five different patterns: vertical activity, lying, sitting or static standing, horizontal activity and fall. It alarms falling by Multimedia Messaging Service (MMS) with map of suspected fall location, GPS coordinate and time etc. If a fall was suspected, an automatic MMS would be sent to preset people. The major advantage of the proposed system is the novel application of smartphone which already have the necessary sensors and can monitor fall ubiquitously without any additional devices.