Skip to:Content
|
Bottom
Cover image for Multimedia engineering : a practical guide for internet implementation
Title:
Multimedia engineering : a practical guide for internet implementation
Personal Author:
Publication Information:
New York, NY : John Wiley & Sons, 2006
ISBN:
9780470030196

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010107602 QA76.575 F66 2006 Open Access Book Book
Searching...

On Order

Summary

Summary

Multimedia technologies and the internet are increasingly intrinsic to our daily lives, and into the future will continue to transform the way we live. Multimedia Engineering describes the latest advances in this technology applied to the Internet and WWW. It immerses the reader into the development of many practical internet/ multimedia systems, offering an insight into a range of engineering problems and solutions. It provides a broad coverage of internet/WWW and multimedia processing, as well as transmission and practical applications. Provides an overview of state-of-the-art technologies Addresses commerical, industrial and educational applications and security and privacy issues. Offers a detailed background into how the internet has been used to support multimedia communications Assumes a practical and descriptive problem-solving approach, featuring many worked-through examples Written by widely published authors with years of research in the field

Multimedia Engineering will appeal to graduate and senior undergraduate students in electrical and electronic engineering, industrial, systems & computer engineering. It will also be of interest to electrical, computer and systems engineers and web developers interested in, or already engaged in, this emerging field.


Author Notes

A. C. M. Fong is an associate professor in the School of Computer Engineering, Nanyang Technological University, Singapore, and an accredited imaging scientist who has authored over 60 published papers in journals and conference proceedings

S. C. Hui is an associate professor in the School of Computer Engineering, Nanyang Technological University, Singapore. He received his D. Phil in 1987 from the University of Sussex, UK. He worked in IBM China/Hong Kong Corporation as a system engineer from 1987 to 1990. His current research interests include data mining, Web mining, Semantic Web, intelligent systems, information retrieval, timetabling and scheduling.


Table of Contents

G. HongB. Fong
Chapter 1 The Dawn of a New Age - The Information Agep. 1
1 The Information Age and this Bookp. 1
2 The Internet, World Wide Web And Multimediap. 2
2.1 The Internetp. 2
2.1.1 A Brief History of the Internet and Related Networksp. 2
2.1.2 Custodians of the Internetp. 3
2.1.3 Other Networksp. 4
2.1.4 The Success of the Internetp. 5
2.2 The World Wide Webp. 5
2.2.1 A Brief History of the Webp. 5
2.2.2 The Strengths of the Web and Supporting Technologiesp. 6
2.3 Multimediap. 7
3 Organizationp. 8
Chapter 2 The Internet As An Information Repositoryp. 11
1 Introductionp. 11
2 Current Status, Promises And Challengesp. 12
3 Search Enginesp. 14
3.1 Indexingp. 16
3.1.1 Crawlingp. 16
3.1.2 Storagep. 19
3.2 Retrievalp. 20
3.2.1 Scoring and Rankingp. 20
3.2.2 Query Formulationp. 21
3.2.3 Similarity Measuresp. 23
3.2.4 Query Independent Rankingp. 23
3.3 Meta Search Enginesp. 24
3.4 Non-Technical Limitations of Search Enginep. 25
4 Personalized Monitoring Servicesp. 26
4.1 Current Web Monitoring Systemsp. 26
4.2 An Alternative Web Monitoring Modelp. 27
4.2.1 Block Heading-Treep. 28
4.2.2 Specificationp. 29
4.2.3 Extractionp. 31
4.2.4 Detectionp. 33
4.2.5 Notificationp. 34
4.3 The Web Information Monitoring System (WIM)p. 35
5 Storage and Retrieval of Visual Datap. 37
5.1 Imagesp. 37
5.1.1 Visual Cuesp. 38
5.1.2 Non-Visual Cuesp. 39
5.1.3 Application of Artificial Intelligence (AI)p. 39
5.2 Videosp. 42
5.2.1 Application of AIp. 42
6 Case Study: Discovery Monitoring of Web Publicationsp. 44
6.1 Discovery of Web Scientific Publicationsp. 44
6.1.1 CiteSeerp. 45
6.1.2 PubSearch's Citation Databasep. 45
6.1.3 The PubSearch Systemp. 47
6.1.4 Application of AI to PubSearchp. 48
6.1.5 Retrieval of Scientific Publications Using PubSearchp. 49
6.2 Monitoring of Scientific Publicationsp. 50
6.2.1 Analysis of Web Publication Index Pagesp. 51
6.2.2 Monitoring of Web Publication Index Pagesp. 52
6.2.3 Pub Watcher System Implementationp. 53
6.2.4 Pub Watcher Retrievalp. 54
7 Further Advancementsp. 55
7.1 Semantic Webp. 55
7.2 Human-Centric Query Processingp. 56
7.2.1 Textual Queriesp. 56
7.2.2 Multimedia Data Processingp. 57
7.3 Intelligent Agentsp. 58
Chapter 3 The Internet As A Communications Mediump. 63
1 Introductionp. 63
2 Internet Communication Protocolsp. 65
2.1 Transmission Control Protocol (TCP)p. 66
2.2 User Datagram Protocol (UDP)p. 66
2.3 Real-time Transport Protocol (RTP)p. 67
2.3.1 RTP Data Transfer Protocolp. 67
2.3.2 RTP Control Protocol (RTCP)p. 67
2.4 Hypertext Transport Protocol (HTTP)p. 67
2.5 Real-Time Streaming Protocol (RTSP)p. 68
2.6 Illustrationp. 68
2.6.1 Discussionp. 69
3 Electronic Mailp. 70
3.1 Email Protocolsp. 70
3.2 Email Systemsp. 71
3.2.1 Proprietary Email Systemsp. 71
3.2.2 Web-based Email Systemsp. 71
4 Online Presence Notification and Instant Messagingp. 72
4.1 Current Online Presence Notification Approachesp. 72
4.1.1 Exchange Server Approachp. 72
4.1.2 Electronic Mail Approachp. 73
4.1.3 Discussionp. 74
4.2 Instant Messaging Systemsp. 75
4.2.1 Some Popular Public IMSp. 75
4.2.2 Discussionp. 77
4.3 The Online Presence Notification Protocolp. 77
4.3.1 Architecture Modelp. 78
4.3.2 Security Featuresp. 79
4.3.3 Communication Processesp. 80
4.4 Online Presence Notification Systemp. 81
4.4.1 System Architecturep. 81
4.4.2 Comparison of OPNS with other Systemsp. 83
5 Internet Telephonyp. 84
5.1 Overview of an Internet Telephony Systemp. 85
5.2 Using Java for Platform Independencep. 86
5.3 Internet Java Phonep. 87
5.4 Performance Comparisonp. 88
5.4.1 CPU Usagep. 89
5.4.2 Connection Methodp. 90
5.4.3 Downloading Speedp. 90
6 Video Data Transmissionp. 91
6.1 Video Streamingp. 93
6.2 Quality of Service Issuesp. 94
6.3 Application-layer QoS Controlp. 95
6.3.1 Congestion Controlp. 95
6.3.2 ErrorControlp. 96
6.4 Adaptive Transmission and Recovery Mechanismp. 98
6.4.1 Packet Loss Analysisp. 98
6.4.2 Rate Controlp. 99
6.4.3 Video Data Stream Determinationp. 101
6.4.4 Adaptive Error Controlp. 102
6.4.5 Example of ATRM Applicationp. 104
7 Desktop Videoconferencingp. 106
7.1 The ITU H.3xx Standardsp. 107
7.1.1 H.320p. 107
7.1.2 H.321p. 107
7.1.3 H.323p. 107
7.1.4 H.324p. 109
7.1.5 H.310p. 109
7.1.6 Summary of H.3xx Standardsp. 109
7.2 Session Initiation Protocol (SIP)p. 110
8 Unified Messagingp. 111
8.1 Personal Communicatorp. 112
8.1.1 Application-based Personal Communicatorp. 112
8.1.2 Web-based Personal Communicatorp. 113
8.2 Real-Time Communication Servicesp. 114
8.2.1 Open Application Interface for Service Negotiationp. 115
8.2.2 Example of Communication Module: Instant Messagingp. 118
Chapter 4 Internet Securityp. 125
1 Introductionp. 125
2 Internet Security - An Overviewp. 126
2.1 Web Server Related Securityp. 126
2.2 Software Securityp. 130
3 Practical Approachesp. 131
3.1 Access Securityp. 131
3.2 Transfer Securityp. 132
3.3 Cryptographyp. 134
3.3.1 Practical Security Mechanismsp. 135
3.4 Commercial Solutionsp. 137
3.4.1 Application Scenariop. 138
3.4.2 Other Practical Issues with Cryptographic-based Approachesp. 141
4 Security for Java - An Internet Java Phone Examplep. 142
4.1 Java Security Architecturep. 144
4.2 Applet Security Restrictionsp. 146
4.2.1 Network Restrictionsp. 147
4.2.2 Library Loading Restrictionsp. 147
4.2.3 System Property Restrictionsp. 147
4.2.4 Other Restrictionsp. 147
4.3 Overcoming Security Restrictionsp. 148
4.3.1 Customized Security Managerp. 149
4.3.2 Code Signingp. 150
5 Biometrics for Identity Authentication - Multi-view Facial Analysisp. 156
5.1 The Need for an Effective Distance Measurep. 156
5.2 The Significance-Based Multi-View Hausdorff Distancep. 158
5.3 An Experimental Systemp. 159
5.4 System Performancep. 161
Chapter 5 Internet Privacyp. 165
1 Introductionp. 165
2 Web Content Filtering Methods and Tools - A Surveyp. 166
2.1 Current Methodsp. 166
2.1.1 PICSp. 166
2.1.2 URL Blockingp. 167
2.1.3 Keyword Filteringp. 168
2.1.4 Intelligent Content Analysisp. 168
2.2 Current Systemsp. 168
2.2.1 Performance Analysisp. 170
3 An Effective Web Content Filtering Systemp. 171
3.1 Analysis of the Target Web Pagesp. 172
3.1.1 Page Layoutp. 172
3.1.2 PICS Usagep. 173
3.1.3 Indicative Key Terms in Textual Contextp. 173
3.1.4 Statistical Analysisp. 174
3.2 System Implementationp. 176
3.2.1 Feature Extractionp. 177
3.2.2 Preprocessingp. 177
3.2.3 Transformationp. 177
3.2.4 Neural Network (NN) Model Generationp. 177
3.2.5 Category Assignmentp. 178
3.2.6 Categorizationp. 178
3.2.7 Meta Data Checkingp. 178
3.3 Performance Analysisp. 178
Chapter 6 Commercial And Industrial Applicationsp. 183
1 Introductionp. 183
2 Virtual Electronic Trading For B2b E-Commercep. 185
2.1 Survey of b2b E-commerce Systemsp. 185
2.2 The VET systemp. 188
2.3 VET System Componentsp. 189
2.3.1 User Interfacesp. 189
2.3.2 Advertisingp. 190
2.3.3 Catalogue Browser/Search Enginep. 190
2.3.4 Negotiation Managementp. 191
2.3.5 Ordering Managementp. 193
2.3.6 Payment Enginep. 194
2.3.7 After-Sale Service and Dispute Resolutionp. 194
2.3.8 Securityp. 194
2.3.9 Discussionp. 195
3 Web-based Customer Technical Supportp. 195
3.1 Customer Service Databasep. 196
3.2 Data mining for Machine Fault Diagnosisp. 197
3.3 Machine Fault Diagnosis over the WWWp. 199
3.4 Performance Evaluationp. 201
4 Knowledge Discovery for Managerial Decisionsp. 202
4.1 Seven-Step Process for Knowledge Discoveryp. 203
4.2 Establish Mining Goalsp. 204
4.3 Select Datap. 204
4.4 Preprocess Datap. 205
4.5 Transform Datap. 206
4.6 Store Datap. 206
4.7 Mine Datap. 206
4.7.1 Summarizationp. 208
4.7.2 Associationp. 209
4.7.3 Classificationp. 211
4.7.4 Predictionp. 211
4.7.5 Clusteringp. 211
4.8 Evaluate Mining Resultsp. 212
5 Web-based Intelligent Surveillance Systemp. 213
5.1 Design Objectives and Related Systemsp. 213
5.2 System Overview and Major Componentsp. 215
5.2.1 Monitor Nodep. 215
5.2.2 Monitoring Serverp. 217
5.2.3 Exchange Serverp. 218
5.2.4 Monitoring Clientp. 219
5.3 Monitoring Processp. 219
5.4 Technical Challenges and Solutionsp. 222
5.4.1 Securityp. 222
5.4.2 Compression Standardsp. 223
5.4.3 Internet Communications Protocolsp. 223
5.4.4 QoS Control for Video Transmissionp. 223
5.4.5 Video Sequence Analysisp. 224
Chapter 7 Implementing and Delivering Internet and Multimedia Projectsp. 231
1 Introductionp. 231
2 Process Modelling and Lifecyclep. 232
2.1 Waterfall Modelp. 232
2.2 Spiral Modelp. 233
2.3 Prototyping Modelp. 233
2.4 Incremental and Iterative Developmentp. 234
3 Project Planning and Managementp. 235
3.1 Identify Your Business Objectives and Target Audiencep. 235
3.2 Analyse the Requirements and Build Domain Knowledgep. 236
3.3 Document Your Project Planp. 236
3.4 Build the Development Teamp. 236
3.5 Review Your Current Standards and Proceduresp. 237
3.6 Identify Project Sponsors and Business Partnersp. 237
3.7 Adopt Just-in-Time Training Approachp. 237
3.8 Track the Progressp. 237
3.9 Sales and Marketingp. 237
4 Design, Implementation and Testingp. 237
4.1 Designing User Interfacep. 238
4.2 Designing the Databasep. 238
4.3 Getting User Feedbackp. 238
4.4 Securityp. 239
4.5 Reliability Growth Testingp. 239
4.6 Enabling Tools and Technologiesp. 240
5 Measurementsp. 241
5.1 Identifying Metrics: Goal Question Measurement (GQM) Approachp. 241
5.2 Software Metricsp. 243
5.2.1 Schedulep. 243
5.2.2 Effort and Costp. 243
5.2.3 Measuring Process: Trend Analysisp. 244
5.2.4 Organization Level Measurement: Capability Maturity Modelp. 245
5.3 Continuous Improvementp. 246
6 Conclusionp. 246
Chapter 8 From E-Commerce to M-Commercep. 249
1 Electronic Commercep. 249
2 Going Mobilep. 250
3 Marketing and Mobilityp. 253
4 Providing Reliable M-commerce Service is Challengingp. 255
4.1 Securityp. 255
4.1.1 Service Set Identifier (SSID)p. 256
4.1.2 Authenticationp. 256
4.1.3 Frequency Hoppingp. 256
4.2 Reliabilityp. 257
4.2.1 Atmospheric Absorptionp. 257
4.2.2 Noisep. 257
4.2.3 Multipath Fadingp. 258
4.3 Effects of Rainp. 259
4.4 Modulation Schemesp. 261
5 Chapter Summaryp. 261
Appendix A Popular Colour Modelsp. 263
Appendix B Glossaryp. 267
Indexp. 271
Go to:Top of Page