Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
83,098 result(s) for "Multimedia communications"
Sort by:
PoCH: automatic HDL code generator tool for Polar channel coding decoders in multimedia communication systems
Polar codes are a class of block codes which are widely used in communication networks. Polar codes have been utilized in the fifth generation of enhanced mobile broadband systems (5G) due to their performance in error correction and also their low instinct complexity in implementation. However when they come in very large blocks, their efficient implementation in reasonable time is challenging. The automatic code generator (ACG) tools are useful and essential in these cases, when the design process should be error prone and time consuming. This paper presents an error prone and fast ACG tool to generate the VHDL description code at gate level for Polar decoders in multimedia communication systems according to user adjusted parameters including code-length, code-rate and quantization width, called PoCH tool. The PoCH constructs the Polar decoder using the design SNR and Bhattacharyya parameters which are set by the user, or are provided by a file consisting of the frozen bits location. The PoCH can generate the Polar decoder for four famous algorithms including SC, SSC, Fast-SSC and Fast-SSC + BiREP algorithms. To validate the performance of the PoCH tool, the block counts is presented for each generated code for various code-length, code-rate and Bhattacharyya parameters. Finally, the time consumed by the tool to generate Polar channel decoders for each algorithm is compared.
Cryptographic and parallel hash function based on cross coupled map lattices suitable for multimedia communication security
Cryptographic hash functions can map data of arbitrary size to data of fixed size (hash values), which can be used in a wide range of multimedia applications for communication security, such as integrity protection, message authentication and digital signature. In this paper, we present a cryptographic and parallel chaotic hash function based on the cross coupled map lattices for multimedia communication security. More specifically, we first utilize the piecewise linear chaotic map with secret keys to generate initial parameter sequence for the cross coupled map lattices and an initial hash value. Then, we extend the original message into a message matrix to enhance the correlation of message characters. Next, we process each of the message blocks in the matrix in parallel as the space domain input of the cross coupled map lattices and the initial parameters as the time domain input to generate intermediate hash values. After all message blocks are processed in parallel, the final h-bit hash value is obtained by logical operations with the initial and intermediate hash values. Finally, we evaluate the performance of the proposed hash function in terms of uniform distribution of hash values, sensitivity of the hash value to subtle changes of the original message, secret keys, and images, confusion and diffusion properties, collision tests, efficiency of computation speed. The cryptanalytic results demonstrate that the proposed hash algorithm has statistical properties with B̄=64.0022\\(\\bar {B} = 64.0022\\) and P = 50.0017%, collision resistance with d = 85.3944, average computation speed of 132.0 Mbps, and better statistical performance compared with existing chaotic hash functions, which are suitable for multimedia communication security.
A traffic anomaly detection approach in communication networks for applications of multimedia medical devices
Anomalous or unnormal multimedia medical devices are to yield anomaly network traffic and affect the diagnosis about medical issues. How to find anomaly network traffic is significantly important for normal applications of multimedia medical devices. This paper studies traffic anomaly detection problem in large-scale communication networks with multimedia medical devices. We employ empirical mode decomposition method and wavelet packet transform to propose an accurate detection method to capture it. Firstly, we use the wavelet packet transform to pre-treat network traffic. Network traffic is decomposed into multiple narrowband signals exhibiting more detailed features of network traffic. Secondly, the empirical mode decomposition method is utilized to divide these narrowband signals into the intrinsic mode function at different scales, in time and time-frequency domains. We calculate the spectral kurtosis value of the intrinsic mode function at these different scales to remove false components of the empirical mode decomposition. As a result, we can obtain new time and time-frequency signals which highlight the hidden nature of anomaly network traffic. Thirdly, we perform the reconstruction of empirical mode decompositions and wavelet packet transforms for the above time and time-frequency signals to attain a series of new time signals. Then we can find and diagnose abnormal network traffic. Simulation results show that our method is effective and promising.
Multi-focus images fusion via residual generative adversarial network
Recently, most existing learning-based fusion methods are not fully end-to-end, which still predict the decision map and recover the fused image by the refined decision map. However, in practice, these methods are hard to predict the decision map precisely. Inaccurate prediction further degrades the performance of fusing, resulting in edge blurring and artefacts. This paper proposes an end-to-end multi-focus image fusion model based on conditional generative adversarial network (MFFGAN). In MFFGAN, we introduce a pioneering use of the conditional generative adversarial network to the field of image fusion. Moreover, we introduce the simple and efficient relativistic discriminator to our network, so the network converges faster. More importantly, MFFGAN is fully trained in this adversarial relationship to produce visually perceptive images that contain rich texture information and avoid the post-processing phase. Considering the detailed information of source images, we introduce the widely used perceptual loss to improve fused image performance. Thanks to the element-wise fusion criterion, our model can conveniently and efficiently fuse multiple images. Additionally, extensive experimental results show that the proposed model achieves excellent performance in subjective and objective evaluations.
Multimedia comprehension
\"Multimedia messages use combinations of texts, pictures, maps, and graphs as tools for communication. This book provides a synthesis of theory and research about how people comprehend multimedia. It adopts the perspectives of cognitive psychology, semiotics, anthropology, linguistics, education, and art. Its central idea is that information displays can be categorized into two different but complementary forms of representations, which service different purposes in human cognition and communication. Specific interaction between these representations enhances comprehension, thinking, and problem solving, as illustrated by numerous examples. Multimedia Comprehension is written for a broad audience with no special prior knowledge. It is of interest to everyone trying to understand how people comprehend multimedia, from scholars and students in psychology, communication, and education, to web- and interface-designers and instructors\"-- Provided by publisher.
Graphic Style Transfer Technology in Multimedia Communication: An Application of Deep Residual Adaptive Networks in Graphic Design
With the rapid development of wireless network technology and the rapid popularity of portable smart terminals, multimedia communication based on images and videos has become the favorite way of communication in the new era. Image style transfer technology is one of the research directions that has attracted much attention in the field of multimedia communication. To achieve the diversification of images and ease of use in the multimedia communication process, this paper researches the multimedia network communication technology and image style transfer technology. By combining visual style transfer technology and depth residual adaptive network technology in multimedia communication technology, the redesign and creation of graphics can be carried out effectively. The resulting graphics can meet the needs of the art creators and the technique provides higher creative efficiency, excellent peak model signal-to-noise ratio and structural similarity performance, and output levels that meet the basic needs compared to traditional manual design. The method can be effectively used in urban building appearance design and art creation and has good theoretical and practical research value.