Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010107602 | QA76.575 F66 2006 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Multimedia technologies and the internet are increasingly intrinsic to our daily lives, and into the future will continue to transform the way we live. Multimedia Engineering describes the latest advances in this technology applied to the Internet and WWW. It immerses the reader into the development of many practical internet/ multimedia systems, offering an insight into a range of engineering problems and solutions. It provides a broad coverage of internet/WWW and multimedia processing, as well as transmission and practical applications. Provides an overview of state-of-the-art technologies Addresses commerical, industrial and educational applications and security and privacy issues. Offers a detailed background into how the internet has been used to support multimedia communications Assumes a practical and descriptive problem-solving approach, featuring many worked-through examples Written by widely published authors with years of research in the field
Multimedia Engineering will appeal to graduate and senior undergraduate students in electrical and electronic engineering, industrial, systems & computer engineering. It will also be of interest to electrical, computer and systems engineers and web developers interested in, or already engaged in, this emerging field.
Author Notes
A. C. M. Fong is an associate professor in the School of Computer Engineering, Nanyang Technological University, Singapore, and an accredited imaging scientist who has authored over 60 published papers in journals and conference proceedings
S. C. Hui is an associate professor in the School of Computer Engineering, Nanyang Technological University, Singapore. He received his D. Phil in 1987 from the University of Sussex, UK. He worked in IBM China/Hong Kong Corporation as a system engineer from 1987 to 1990. His current research interests include data mining, Web mining, Semantic Web, intelligent systems, information retrieval, timetabling and scheduling.
Table of Contents
Chapter 1 The Dawn of a New Age - The Information Age | p. 1 |
1 The Information Age and this Book | p. 1 |
2 The Internet, World Wide Web And Multimedia | p. 2 |
2.1 The Internet | p. 2 |
2.1.1 A Brief History of the Internet and Related Networks | p. 2 |
2.1.2 Custodians of the Internet | p. 3 |
2.1.3 Other Networks | p. 4 |
2.1.4 The Success of the Internet | p. 5 |
2.2 The World Wide Web | p. 5 |
2.2.1 A Brief History of the Web | p. 5 |
2.2.2 The Strengths of the Web and Supporting Technologies | p. 6 |
2.3 Multimedia | p. 7 |
3 Organization | p. 8 |
Chapter 2 The Internet As An Information Repository | p. 11 |
1 Introduction | p. 11 |
2 Current Status, Promises And Challenges | p. 12 |
3 Search Engines | p. 14 |
3.1 Indexing | p. 16 |
3.1.1 Crawling | p. 16 |
3.1.2 Storage | p. 19 |
3.2 Retrieval | p. 20 |
3.2.1 Scoring and Ranking | p. 20 |
3.2.2 Query Formulation | p. 21 |
3.2.3 Similarity Measures | p. 23 |
3.2.4 Query Independent Ranking | p. 23 |
3.3 Meta Search Engines | p. 24 |
3.4 Non-Technical Limitations of Search Engine | p. 25 |
4 Personalized Monitoring Services | p. 26 |
4.1 Current Web Monitoring Systems | p. 26 |
4.2 An Alternative Web Monitoring Model | p. 27 |
4.2.1 Block Heading-Tree | p. 28 |
4.2.2 Specification | p. 29 |
4.2.3 Extraction | p. 31 |
4.2.4 Detection | p. 33 |
4.2.5 Notification | p. 34 |
4.3 The Web Information Monitoring System (WIM) | p. 35 |
5 Storage and Retrieval of Visual Data | p. 37 |
5.1 Images | p. 37 |
5.1.1 Visual Cues | p. 38 |
5.1.2 Non-Visual Cues | p. 39 |
5.1.3 Application of Artificial Intelligence (AI) | p. 39 |
5.2 Videos | p. 42 |
5.2.1 Application of AI | p. 42 |
6 Case Study: Discovery Monitoring of Web Publications | p. 44 |
6.1 Discovery of Web Scientific Publications | p. 44 |
6.1.1 CiteSeer | p. 45 |
6.1.2 PubSearch's Citation Database | p. 45 |
6.1.3 The PubSearch System | p. 47 |
6.1.4 Application of AI to PubSearch | p. 48 |
6.1.5 Retrieval of Scientific Publications Using PubSearch | p. 49 |
6.2 Monitoring of Scientific Publications | p. 50 |
6.2.1 Analysis of Web Publication Index Pages | p. 51 |
6.2.2 Monitoring of Web Publication Index Pages | p. 52 |
6.2.3 Pub Watcher System Implementation | p. 53 |
6.2.4 Pub Watcher Retrieval | p. 54 |
7 Further Advancements | p. 55 |
7.1 Semantic Web | p. 55 |
7.2 Human-Centric Query Processing | p. 56 |
7.2.1 Textual Queries | p. 56 |
7.2.2 Multimedia Data Processing | p. 57 |
7.3 Intelligent Agents | p. 58 |
Chapter 3 The Internet As A Communications Medium | p. 63 |
1 Introduction | p. 63 |
2 Internet Communication Protocols | p. 65 |
2.1 Transmission Control Protocol (TCP) | p. 66 |
2.2 User Datagram Protocol (UDP) | p. 66 |
2.3 Real-time Transport Protocol (RTP) | p. 67 |
2.3.1 RTP Data Transfer Protocol | p. 67 |
2.3.2 RTP Control Protocol (RTCP) | p. 67 |
2.4 Hypertext Transport Protocol (HTTP) | p. 67 |
2.5 Real-Time Streaming Protocol (RTSP) | p. 68 |
2.6 Illustration | p. 68 |
2.6.1 Discussion | p. 69 |
3 Electronic Mail | p. 70 |
3.1 Email Protocols | p. 70 |
3.2 Email Systems | p. 71 |
3.2.1 Proprietary Email Systems | p. 71 |
3.2.2 Web-based Email Systems | p. 71 |
4 Online Presence Notification and Instant Messaging | p. 72 |
4.1 Current Online Presence Notification Approaches | p. 72 |
4.1.1 Exchange Server Approach | p. 72 |
4.1.2 Electronic Mail Approach | p. 73 |
4.1.3 Discussion | p. 74 |
4.2 Instant Messaging Systems | p. 75 |
4.2.1 Some Popular Public IMS | p. 75 |
4.2.2 Discussion | p. 77 |
4.3 The Online Presence Notification Protocol | p. 77 |
4.3.1 Architecture Model | p. 78 |
4.3.2 Security Features | p. 79 |
4.3.3 Communication Processes | p. 80 |
4.4 Online Presence Notification System | p. 81 |
4.4.1 System Architecture | p. 81 |
4.4.2 Comparison of OPNS with other Systems | p. 83 |
5 Internet Telephony | p. 84 |
5.1 Overview of an Internet Telephony System | p. 85 |
5.2 Using Java for Platform Independence | p. 86 |
5.3 Internet Java Phone | p. 87 |
5.4 Performance Comparison | p. 88 |
5.4.1 CPU Usage | p. 89 |
5.4.2 Connection Method | p. 90 |
5.4.3 Downloading Speed | p. 90 |
6 Video Data Transmission | p. 91 |
6.1 Video Streaming | p. 93 |
6.2 Quality of Service Issues | p. 94 |
6.3 Application-layer QoS Control | p. 95 |
6.3.1 Congestion Control | p. 95 |
6.3.2 ErrorControl | p. 96 |
6.4 Adaptive Transmission and Recovery Mechanism | p. 98 |
6.4.1 Packet Loss Analysis | p. 98 |
6.4.2 Rate Control | p. 99 |
6.4.3 Video Data Stream Determination | p. 101 |
6.4.4 Adaptive Error Control | p. 102 |
6.4.5 Example of ATRM Application | p. 104 |
7 Desktop Videoconferencing | p. 106 |
7.1 The ITU H.3xx Standards | p. 107 |
7.1.1 H.320 | p. 107 |
7.1.2 H.321 | p. 107 |
7.1.3 H.323 | p. 107 |
7.1.4 H.324 | p. 109 |
7.1.5 H.310 | p. 109 |
7.1.6 Summary of H.3xx Standards | p. 109 |
7.2 Session Initiation Protocol (SIP) | p. 110 |
8 Unified Messaging | p. 111 |
8.1 Personal Communicator | p. 112 |
8.1.1 Application-based Personal Communicator | p. 112 |
8.1.2 Web-based Personal Communicator | p. 113 |
8.2 Real-Time Communication Services | p. 114 |
8.2.1 Open Application Interface for Service Negotiation | p. 115 |
8.2.2 Example of Communication Module: Instant Messaging | p. 118 |
Chapter 4 Internet Security | p. 125 |
1 Introduction | p. 125 |
2 Internet Security - An Overview | p. 126 |
2.1 Web Server Related Security | p. 126 |
2.2 Software Security | p. 130 |
3 Practical Approaches | p. 131 |
3.1 Access Security | p. 131 |
3.2 Transfer Security | p. 132 |
3.3 Cryptography | p. 134 |
3.3.1 Practical Security Mechanisms | p. 135 |
3.4 Commercial Solutions | p. 137 |
3.4.1 Application Scenario | p. 138 |
3.4.2 Other Practical Issues with Cryptographic-based Approaches | p. 141 |
4 Security for Java - An Internet Java Phone Example | p. 142 |
4.1 Java Security Architecture | p. 144 |
4.2 Applet Security Restrictions | p. 146 |
4.2.1 Network Restrictions | p. 147 |
4.2.2 Library Loading Restrictions | p. 147 |
4.2.3 System Property Restrictions | p. 147 |
4.2.4 Other Restrictions | p. 147 |
4.3 Overcoming Security Restrictions | p. 148 |
4.3.1 Customized Security Manager | p. 149 |
4.3.2 Code Signing | p. 150 |
5 Biometrics for Identity Authentication - Multi-view Facial Analysis | p. 156 |
5.1 The Need for an Effective Distance Measure | p. 156 |
5.2 The Significance-Based Multi-View Hausdorff Distance | p. 158 |
5.3 An Experimental System | p. 159 |
5.4 System Performance | p. 161 |
Chapter 5 Internet Privacy | p. 165 |
1 Introduction | p. 165 |
2 Web Content Filtering Methods and Tools - A Survey | p. 166 |
2.1 Current Methods | p. 166 |
2.1.1 PICS | p. 166 |
2.1.2 URL Blocking | p. 167 |
2.1.3 Keyword Filtering | p. 168 |
2.1.4 Intelligent Content Analysis | p. 168 |
2.2 Current Systems | p. 168 |
2.2.1 Performance Analysis | p. 170 |
3 An Effective Web Content Filtering System | p. 171 |
3.1 Analysis of the Target Web Pages | p. 172 |
3.1.1 Page Layout | p. 172 |
3.1.2 PICS Usage | p. 173 |
3.1.3 Indicative Key Terms in Textual Context | p. 173 |
3.1.4 Statistical Analysis | p. 174 |
3.2 System Implementation | p. 176 |
3.2.1 Feature Extraction | p. 177 |
3.2.2 Preprocessing | p. 177 |
3.2.3 Transformation | p. 177 |
3.2.4 Neural Network (NN) Model Generation | p. 177 |
3.2.5 Category Assignment | p. 178 |
3.2.6 Categorization | p. 178 |
3.2.7 Meta Data Checking | p. 178 |
3.3 Performance Analysis | p. 178 |
Chapter 6 Commercial And Industrial Applications | p. 183 |
1 Introduction | p. 183 |
2 Virtual Electronic Trading For B2b E-Commerce | p. 185 |
2.1 Survey of b2b E-commerce Systems | p. 185 |
2.2 The VET system | p. 188 |
2.3 VET System Components | p. 189 |
2.3.1 User Interfaces | p. 189 |
2.3.2 Advertising | p. 190 |
2.3.3 Catalogue Browser/Search Engine | p. 190 |
2.3.4 Negotiation Management | p. 191 |
2.3.5 Ordering Management | p. 193 |
2.3.6 Payment Engine | p. 194 |
2.3.7 After-Sale Service and Dispute Resolution | p. 194 |
2.3.8 Security | p. 194 |
2.3.9 Discussion | p. 195 |
3 Web-based Customer Technical Support | p. 195 |
3.1 Customer Service Database | p. 196 |
3.2 Data mining for Machine Fault Diagnosis | p. 197 |
3.3 Machine Fault Diagnosis over the WWW | p. 199 |
3.4 Performance Evaluation | p. 201 |
4 Knowledge Discovery for Managerial Decisions | p. 202 |
4.1 Seven-Step Process for Knowledge Discovery | p. 203 |
4.2 Establish Mining Goals | p. 204 |
4.3 Select Data | p. 204 |
4.4 Preprocess Data | p. 205 |
4.5 Transform Data | p. 206 |
4.6 Store Data | p. 206 |
4.7 Mine Data | p. 206 |
4.7.1 Summarization | p. 208 |
4.7.2 Association | p. 209 |
4.7.3 Classification | p. 211 |
4.7.4 Prediction | p. 211 |
4.7.5 Clustering | p. 211 |
4.8 Evaluate Mining Results | p. 212 |
5 Web-based Intelligent Surveillance System | p. 213 |
5.1 Design Objectives and Related Systems | p. 213 |
5.2 System Overview and Major Components | p. 215 |
5.2.1 Monitor Node | p. 215 |
5.2.2 Monitoring Server | p. 217 |
5.2.3 Exchange Server | p. 218 |
5.2.4 Monitoring Client | p. 219 |
5.3 Monitoring Process | p. 219 |
5.4 Technical Challenges and Solutions | p. 222 |
5.4.1 Security | p. 222 |
5.4.2 Compression Standards | p. 223 |
5.4.3 Internet Communications Protocols | p. 223 |
5.4.4 QoS Control for Video Transmission | p. 223 |
5.4.5 Video Sequence Analysis | p. 224 |
Chapter 7 Implementing and Delivering Internet and Multimedia Projects | p. 231 |
1 Introduction | p. 231 |
2 Process Modelling and Lifecycle | p. 232 |
2.1 Waterfall Model | p. 232 |
2.2 Spiral Model | p. 233 |
2.3 Prototyping Model | p. 233 |
2.4 Incremental and Iterative Development | p. 234 |
3 Project Planning and Management | p. 235 |
3.1 Identify Your Business Objectives and Target Audience | p. 235 |
3.2 Analyse the Requirements and Build Domain Knowledge | p. 236 |
3.3 Document Your Project Plan | p. 236 |
3.4 Build the Development Team | p. 236 |
3.5 Review Your Current Standards and Procedures | p. 237 |
3.6 Identify Project Sponsors and Business Partners | p. 237 |
3.7 Adopt Just-in-Time Training Approach | p. 237 |
3.8 Track the Progress | p. 237 |
3.9 Sales and Marketing | p. 237 |
4 Design, Implementation and Testing | p. 237 |
4.1 Designing User Interface | p. 238 |
4.2 Designing the Database | p. 238 |
4.3 Getting User Feedback | p. 238 |
4.4 Security | p. 239 |
4.5 Reliability Growth Testing | p. 239 |
4.6 Enabling Tools and Technologies | p. 240 |
5 Measurements | p. 241 |
5.1 Identifying Metrics: Goal Question Measurement (GQM) Approach | p. 241 |
5.2 Software Metrics | p. 243 |
5.2.1 Schedule | p. 243 |
5.2.2 Effort and Cost | p. 243 |
5.2.3 Measuring Process: Trend Analysis | p. 244 |
5.2.4 Organization Level Measurement: Capability Maturity Model | p. 245 |
5.3 Continuous Improvement | p. 246 |
6 Conclusion | p. 246 |
Chapter 8 From E-Commerce to M-Commerce | p. 249 |
1 Electronic Commerce | p. 249 |
2 Going Mobile | p. 250 |
3 Marketing and Mobility | p. 253 |
4 Providing Reliable M-commerce Service is Challenging | p. 255 |
4.1 Security | p. 255 |
4.1.1 Service Set Identifier (SSID) | p. 256 |
4.1.2 Authentication | p. 256 |
4.1.3 Frequency Hopping | p. 256 |
4.2 Reliability | p. 257 |
4.2.1 Atmospheric Absorption | p. 257 |
4.2.2 Noise | p. 257 |
4.2.3 Multipath Fading | p. 258 |
4.3 Effects of Rain | p. 259 |
4.4 Modulation Schemes | p. 261 |
5 Chapter Summary | p. 261 |
Appendix A Popular Colour Models | p. 263 |
Appendix B Glossary | p. 267 |
Index | p. 271 |