The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper aims to connect social media from disparate sources on the Internet by building a common topic space in-between, using which cross domain media recommendations can be realized on the web. The topic space is built and updated in real time by extending the Latent Dirichlet Allocation (LDA) model to cater to streaming online data. Our topical model, named Online Streaming LDA (OSLDA), is able...
Immersive, end-to-end applications using mixed multimedia data pose new requirements to the underlying network architecture. These requirements are related to two distinct categories of content delivery. Starting from the overlaying principles of the Future Internet Architecture, the network overlay principles and the Content Delivery Network approach we define our proposed architecture based on two...
Members of the health care workforce and health care practitioner organizations are amongst those who make use of micro-blogging services such as Twitter, to share news and updates. In this paper we propose a system to gauge across the health system and in particular in relation to the practitioners whom make use of this media system, based upon URLs tweeted and shared, what are the current topics...
Smart devices have deeply modified the user consumption expectations getting used to rich interactive experiences around new media services. In this emerging landscape, TV rises as the central media device integrating the home network ecosystem. In the race to create more dynamic and customizable content, computer generated 3D graphics get a prominent position combined with video and audio to provide...
To provide VoIP traffic with message authentication and confidentiality, Secure Real Time Protocol (SRTP) and a media keying protocol are needed. SDP Security Description (SDES) is the most widely deployed keying protocol. It also needs Transport Layer Secure (TLS) over the VoIP signal protocol (SIP), known as SIPS. However, from several previous studies, SIPS can be compromised; then cause further...
Social networking become an essential part of life in both personal as well as professional relationships. We, therefore implement the pattern analysis of connections in a social media network. For more effective and faster connection suggestions on social networking websites we need to analyze connected networks on the basis of clustering and adaptive decision boundary techniques. The connection...
Mass traffic evacuations during Hurricanes Rita and Katrina demonstrated limitations of static planning-based evacuation models based on data from historical events. Evacuation dynamics are complex due to the number of people and vehicles, road networks, the uncertainty and perception of the event, public safety advisories, and human decisions regarding evacuation routes and behaviors. We describe...
Despite the ever expanding forms of digital entertainment, there are still Television (TV, telly) shows and events that create an audience desire to be part of a mass shared experience. In the past direct inter-audience interaction of such events has been restricted to either a shared location at the time of broadcast or later discussions amongst friends and colleagues often described as ‘water cooler...
Digital streaming Internet applications such as online gaming, multimedia playback, presentations, news feeds, and stock quotes involve end-users with very low tolerance for high latency, low data rates, and playback interruption. To protect such delay-sensitive streams against malicious attacks, security mechanisms need to be designed to efficiently process long sequence of bits. We study the problem...
The authors introduced the development and conception of data warehouse and database and research the relationship between database and data warehouse, and have studied the difference between their technology. At last discuss the combination and application of the database,and date warehouse technology.
Virtualization based cloud computing hosts networked applications in virtual machines (VMs), and provides each VM the desired degree of performance isolation using resource isolation mechanisms. Existing isolation solutions address heavily on resource proportionality such as CPU, memory and I/O bandwidth, but seldom focus on resource provisioning rate. Even the VM is allocated with adequate resources,...
A novel Internet media distribution system based on overlay multicast was studied and implemented. In the system, the nodes build the multicast route with a tree-first strategy and maintain the topology with an active strategy. In order to run the routing and topology algorithm effectively, a series of messages and protocols are designed as the core in the system. The implementation of the multicast...
The public nature of user generated content on social media platforms offers the possibility for trend monitoring as an insight into the topics that attract the attention of a large fraction of users. While Google Trends and Twitter have already been recognized as a valuable source of trend information by the practitioners and scholars, at the moment there are no practical implementations or research...
This article proposes an agent-based real-time monitoring system for large scale peer-to-peer video streaming platforms which provides traffic, user receiving quality and system information through web-based presentation. The information is useful for helping service providers to assess the system performance as well as the quality of the streaming service. The monitored information is also stored...
Water is both space and media at one and the same time. However, using only our human senses, we can hardly read the information that it carries. Augmenting this reality with the use of computer vision integrated into a biomonitoring system, we are able to read the water quality, at least as data values, in real time. In the art and science project fleabag, the data values relating to water quality...
In this paper will be explained implementation and simulation of the NGN model in the field of PSTN with high traffic load. For the first time, this simulation will be done using OPNET simulation having designed all needed elements in hierarchial manner. OPNET model enables us to simulate the scenarios of creation, establishment and disconnection of calls. This design is conducted in order to simulate...
This paper presents our research on the feasibility of extracting Twitter users' interests for suggesting serendipitous connections using natural language processing (NLP) technology. Defined by Andel [1] as the art of making an unsought finding, serendipity has a positive role in scientific research and people's daily lives. Applications that facilitate serendipity would bring various benefits to...
This paper researches on IMS multimedia sharing service modes. Multimedia sharing service allows service users to share multimedia in a variety of multimedia sharing modes with one or more IMS multimedia sharing service users through IMS multimedia service system (but not limited to) using an IMS multimedia sharing client. This paper concretely studies and designs the functions and service flows for...
An enormous volume of security-relevant information is present on the Web, for instance in the content produced each day by millions of bloggers worldwide, but discovering and making sense of these data is very challenging. This paper considers the problem of exploring and analyzing the Web to realize three fundamental objectives: 1.) security-relevant information is covery, 2.) target situational...
This paper presents a novel, low-cost, real-time adaptive multimedia environment for home-based upper extremity rehabilitation of stroke survivors. The primary goal of this system is to provide an interactive tool with which the stroke survivor can sustain gains achieved within the clinical phase of therapy and increase the opportunity for functional recovery. This home-based mediated system has low...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.