Multimodal Analysis in Multimedia Using Symbolic Kernels

Author(s):  
Hrishikesh B. Aradhye ◽  
Chitra Dorai

The rapid adoption of broadband communications technology, coupled with ever-increasing capacity-to-price ratios for data storage, has made multimedia information increasingly more pervasive and accessible for consumers. As a result, the sheer volume of multimedia data available has exploded on the Internet in the past decade in the form of Web casts, broadcast programs, and streaming audio and video. However, indexing, search, and retrieval of this multimedia data is still dependent on manual, text-based tagging (e.g., in the form of a file name of a video clip). However, manual tagging of media content is often bedeviled by an inadequate choice of keywords, incomplete and inconsistent terms used, and the subjective biases of the annotator introduced in his or her descriptions of content adversely affecting accuracy in the search and retrieval phase. Moreover, manual annotation is extremely time-consuming, expensive, and unscalable in the face of ever-growing digital video collections. Therefore, as multimedia get richer in content, become more complex in format and resolution, and grow in volume, the urgency of developing automated content analysis tools for indexing and retrieval of multimedia becomes easily apparent.

Author(s):  
Shirley Ann Becker

Telemedicine is broadly defined as the use of information and communications technology to provide medical information and services (Perednia & Allen, 1995). Telemedicine offers an unprecedented means of bringing healthcare to anyone regardless of geographic remoteness. It promotes the use of ICT for healthcare when physical distance separates the provider from the patient (Institute of Medicine, 1996). In addition, it provides for real-time feedback, thus eliminating the waiting time associated with a traditional healthcare visit. Telemedicine has been pursued for over three decades as researchers, healthcare providers, and clinicians search for a way to reach patients living in remote and isolated areas (Norris, 2001). Early implementation of telemedicine made use of the telephone in order for healthcare providers and patients to interact. Over time, fax machines were introduced along with interactive multimedia, thus supporting teleconferencing among participants. Unfortunately, many of the early telemedicine projects did not survive because of high costs and insurmountable barriers associated with the use of technology. Telemedicine has been resurrected during the last decade as a means to help rural healthcare facilities. Advances in information and communications technology have initiated partnerships between rural healthcare facilities and larger ones. The Internet in particular has changed the way in which medical consultations can be provided (Coiera, 1997). Personal computers (PCs) and supporting peripherals, acting as clients, can be linked to medical databases residing virtually in any geographic space. Multimedia data types, video, audio, text, imaging, and graphics promote the rapid diagnosis and treatment of casualties and diseases. Innovations in ICT offer unprecedented healthcare opportunities in remote regions throughout the world. Mobile devices using wireless connectivity are growing in popularity as thin clients that can be linked to centralized or distributed medical-data sources. These devices provide for local data storage of medical data, which can be retrieved and sent back to a centralized source when Internet access becomes available. Those working in nomadic environments are connected to data sources that in the past were inaccessible due to a lack of telephone and cable lines. For the military, paramedics, social workers, and other healthcare providers in the field, ICT advances have removed technology barriers that made mobility difficult if not impossible. Personal digital assistants (PDAs)1 are mobile devices that continue to grow in popularity. PDAs are typically considered more usable for multimedia data than smaller wireless devices (e.g., cell phones) because of larger screens, fully functional keyboards, and operating systems that support many desktop features. Over the past several years, PDAs have become far less costly than personal-computing technology. They are portable, lightweight, and mobile when compared to desktop computers. Yet, they offer similar functionality scaled back to accommodate the differences in user-interface designs, data transmission speed, memory, processing power, data storage capacity, and battery life.


2021 ◽  
pp. 20-32
Author(s):  
admin admin ◽  

Recently, the security of heterogeneous multimedia data becomes a very critical issue, substantially with the proliferation of multimedia data and applications. Cloud computing is the hidden back-end for storing heterogeneous multimedia data. Notwithstanding that using cloud storage is indispensable, but the remote storage servers are untrusted. Therefore, one of the most critical challenges is securing multimedia data storage and retrieval from the untrusted cloud servers. This paper applies a Shamir Secrete-Sharing scheme and integrates with cloud computing to guarantee efficiency and security for sensitive multimedia data storage and retrieval. The proposed scheme can fully support the comprehensive and multilevel security control requirements for the cloud-hosted multimedia data and applications. In addition, our scheme is also based on a source transformation that provides powerful mutual interdependence in its encrypted representation—the Share Generator slices and encrypts the multimedia data before sending it to the cloud storage. The extensive experimental evaluation on various configurations confirmed the effectiveness and efficiency of our scheme, which showed excellent performance and compatibility with several implementation strategies.


Author(s):  
Ping Lin ◽  
K. Selçuk Candan

The cost of creating and maintaining software and hardware infrastructures for delivering web services led to a notable trend toward the use of application service providers (ASPs) and, more generally, distributed application hosting services (DAHSs). The emergence of enabling technologies, such as J2EE and .NET, has contributed to the acceleration of this trend. DAHSs rent out Internet presence, computation power, and data storage space to clients with infrastructural needs. Consequently, they are cheap and effective outsourcing solutions for achieving increased service availability and scalability in the face of surges in demand. However, ASPs and DAHSs operate within the complex, multi-tiered, and open Internet environment and, hence, they introduce many security challenges that have to be addressed effectively to convince customers that outsourcing their IT needs is a viable alternative to deploying complex infrastructures locally. In this chapter, we provide an overview of typical security challenges faced by DAHSs, introduce dominant security mechanisms available at the different tiers in the information management hierarchy, and discuss open challenges


2012 ◽  
Vol 25 (0) ◽  
pp. 148
Author(s):  
Marcia Grabowecky ◽  
Emmanuel Guzman-Martinez ◽  
Laura Ortega ◽  
Satoru Suzuki

Watching moving lips facilitates auditory speech perception when the mouth is attended. However, recent evidence suggests that visual attention and awareness are mediated by separate mechanisms. We investigated whether lip movements suppressed from visual awareness can facilitate speech perception. We used a word categorization task in which participants listened to spoken words and determined as quickly and accurately as possible whether or not each word named a tool. While participants listened to the words they watched a visual display that presented a video clip of the speaker synchronously speaking the auditorily presented words, or the same speaker articulating different words. Critically, the speaker’s face was either visible (the aware trials), or suppressed from awareness using continuous flash suppression. Aware and suppressed trials were randomly intermixed. A secondary probe-detection task ensured that participants attended to the mouth region regardless of whether the face was visible or suppressed. On the aware trials responses to the tool targets were no faster with the synchronous than asynchronous lip movements, perhaps because the visual information was inconsistent with the auditory information on 50% of the trials. However, on the suppressed trials responses to the tool targets were significantly faster with the synchronous than asynchronous lip movements. These results demonstrate that even when a random dynamic mask renders a face invisible, lip movements are processed by the visual system with sufficiently high temporal resolution to facilitate speech perception.


Author(s):  
Chotirat “Ann” Ratanamahatana ◽  
Eamonn Keogh ◽  
Vit Niennattrakul

After the generation of multimedia data turning digital, an explosion of interest in their data storage, retrieval, and processing, has drastically increased in the database and data mining community. This includes videos, images, and handwriting, where we now have higher expectations in exploiting these data at hand. We argue however, that much of this work’s narrow focus on efficiency and scalability has come at the cost of usability and effectiveness. Typical manipulations are in some forms of video/image processing, which require fairly large amounts for storage and are computationally intensive. In this work, we will demonstrate how these multimedia data can be reduced to a more compact form, that is, time series representation, while preserving the features of interest, and can then be efficiently exploited in Content-Based Image Retrieval. We also introduce a general framework that learns a distance measure with arbitrary constraints on the warping path of the Dynamic Time Warping calculation. We demonstrate utilities of our approach on both classification and query retrieval tasks for time series and other types of multimedia data including images, video frames, and handwriting archives. In addition, we show that incorporating this framework into the relevance feedback system, a query refinement can be used to further improve the precision/recall by a wide margin.


2011 ◽  
pp. 119-122
Author(s):  
Sonali Ajankar ◽  
Sanjay Nalbalwar ◽  
Z. A. Usmani

2013 ◽  
Vol 68 (1) ◽  
pp. 488-507 ◽  
Author(s):  
Wei Kuang Lai ◽  
Yi-Uan Chen ◽  
Tin-Yu Wu ◽  
Mohammad S. Obaidat

1997 ◽  
Author(s):  
Setsuko Murata ◽  
Shigetaro Iwatsu ◽  
Masahiro Ueno ◽  
Nobuyoshi Izawa ◽  
Katsunori Ishii

2014 ◽  
Vol 1 (1) ◽  
Author(s):  
Sylvain Néron ◽  
Daniel Handel

This workshop will focus on clinical demonstrations of hypnotic suggestion through metaphors for self-regulation improvements, pain relief, palliation of symptoms, and amelioration of hope in the face of advanced or progressive illness. These materials were designed (Néron and Handel, In Press) for health care professionals who use – or may decide to use – clinical hypnosis in their professional work with patients. The role of adjunctive hypnotic therapy in cancer care is to help manage distressing symptoms and to give the sufferer a sense of control via mind-body regulation. Physicians and health care professionals can integrate personalized hypnotic approaches in order to help patients regulate physiological functions, alleviate pain, enhance the release of tension, reframe hope, facilitate new levels of personal adjustments, and promote or restore healing spiritual experiences.The workshop will include case-based, video clip demonstrations to cover the following topic areas: a) addressing patients’ misconceptions about hypnosis, b) establishing appropriate clinical goals, c) using hypnotic techniques in different medical settings, d) developing quick ways of reaching a hypnotic state, e) teaching self-hypnosis, f) preparing for medical procedures, g) reframing hope, and h) promoting healing spiritual experiences.Objectives: Participants will be introduced to ways of: a) Integrating guided clinical hypnosis procedures at bedside and in several medical contexts. b) Empowering the sufferer by teaching him or her how to use self-hypnosis for symptom relief and for addressing their existential issues.ReferenceNéron, S., and Handel, D. Hypnotic Approaches in Cancer and Palliative Care. Quebec: Presses de l’Université du Québec, In Press.


Sign in / Sign up

Export Citation Format

Share Document