Real-Time Disk Scheduling for Multimedia Data Retrieval

Author(s):  
Ray-I. Chang ◽  
Wei-Kuan Shih

The great progresses in computer and network technologies make applications of distributed multimedia ever more popular. Various commercial products have been presented in these years such as electronic commerce, video-on-demand, teleconferencing, tele-medicine, distance education and digital library. The basic architecture of a distributed multimedia system contains three parts—the server subsystem, the network subsystem and the client subsystem, as shown in Figure 1 (Chang, et al., 1997; Chang, 1996; Gemmell and Han, 1994; Rangan and Vin, 1993). Server subsystem: Media data are stored in the storage devices of server subsystem, such as hard disks and CD-ROM, by data placement schemes (Wang, et al., 1997; Lougher and Shepherd, 1993; Vin and Rangan, 1991). When user requests are presented, media data must be retrieved from storage devices to system buffer under pre-specified timing requirements (Tindell and Burns, 1994).

2012 ◽  
Vol 19 (2) ◽  
pp. 5-17
Author(s):  
Bartosz Czaplewski ◽  
Krzysztof Czaplewski

Abstract Vessel traffic systems provide a high level of safety on coastal waters due to coastal radar stations and industrial cameras transmitting information to traffic supervision centers, as well. To improve a vessel traffic services is very important to ensure the speed and secrecy for the transmission of video images. The paper presents the basic issues of the multimedia data protection by digital watermarking and fingerprinting methods. Main applications for such digital marking were described in the paper as well as its requirements. Furthermore, the importance of multicast transmission for fingerprinting methods was presented by comparing the scalability of methods using only unicast transmissions and methods using multicast transmissions. The paper also presents the greatest threat to fingerprinting methods, which are attacks performed by more than one pirate. These attacks are called collusion attacks. The criteria that should be followed during identifying rogue users taking part in the collusion attack on the security systems has been presented. The paper also contains description of the extended Hillcast method, which belongs to the group of JFD (Joint Fingerprinting and Decryption) methods. The method provides a cryptographic security and digital fingerprinting of multimedia content, while maintaining high scalability. Main purpose of this method is VoD (Video on Demand) service, but it can also be used in vessel traffic supervision systems, such as VTS and AIS. In the last part of paper, there are results of studies which indicate high resistance to most common collusion attacks. Method proposed by authors can enhance the security of visual data transmission in vessel traffic systems.


2019 ◽  
Vol 1 (2) ◽  
pp. 193-205
Author(s):  
Ria Andryani ◽  
Edi Surya Negara ◽  
Dendi Triadi

The amount of production data generated by social media opportunities that can be exploited by various parties, both government and private sectors to produce the information. Social media data can be used to know the behavior and public perception of the phenomenon or a particular event. To obtain and analyze social media data needed depth knowledge of Internet technology, social media, databases, data structures, information theory, data mining, machine learning, until the data and information visualization techniques. In this research, social media analysis on a particular topic and the development of prototype devices software used as a tool of social media data retrieval or retrieval of data applications. Social Media Analytics (SMA) aims to make the process of analysis and synthesis of social media data to produce information can be used by those in need. SMA process is done in three stages, namely: Capture, Understand and Present. This research is exploratorily focused on understanding the technology that became the basis of social media using various techniques exist and is already used in the study of social media analytic previously.


Hard drives are the one which needs to be accessed in an efficient manner so that it is feasible to get better recital of the central processing unit. Now a day’s magnetic disks are capable of providing more input output bandwidth yet a huge amount of this bandwidth is lost due to the access time of the hard disk. This paper discusses an analysis of performance of various disk scheduling algorithms with their merits and demerits


2015 ◽  
Vol 10 (2) ◽  
pp. 91-98
Author(s):  
Mikhail Gorodilov ◽  
Boris Dolgovesov ◽  
Ivan Khramtsov ◽  
Aleksandr Radostev

This article is devoted to solving some of the issues of distributed multimedia data display on large screens. In particular, we consider the problem of synchronization of the process of parallel rendering and output of video fragments to the appropriate modules of multiscreen display systems. Proposed synchronization algorithm and its implementation using graphics accelerators, provides visual continuity of dynamic scenes when displayed on a multiscreen. The problems of managing distributed input data stream for multiscreen display are considered.


Author(s):  
Shu-Ching Chen

The exponential growth of the technological advancements has resulted in high-resolution devices, such as digital cameras, scanners, monitors, and printers, which enable the capturing and displaying of multimedia data in high-density storage devices. Furthermore, more and more applications need to live with multimedia data. However, the gap between the characteristics of various media types and the application requirements has created the need to develop advanced techniques for multimedia data management and the extraction of relevant information from multimedia databases. Though many research efforts have been devoted to the areas of multimedia databases and data management, it is still far from maturity. The purpose of this article is to discuss how the existing techniques, methodologies, and tools addressed relevant issues and challenges to enable a better understanding in multimedia databases and data management. The focuses include: (1) how to develop a formal structure that can be used to capture the distinguishing content of the media data in a multimedia database (MMDB) and to form an abstract space for the data to be queried; (2) how to develop advanced content analysis and retrieval techniques that can be used to bridge the gaps between the semantic meaning and low-level media characteristics to improve multimedia information retrieval; and (3) how to develop query mechanisms that can handle complex spatial, temporal, and/or spatio-temporal relationships of multimedia data to answer the imprecise and incomplete queries issued to an MMDB.


Author(s):  
Shiguo Lian

Since the beginning of 1990s, some multimedia standards (Joan, Didier, & Chad, 2003) related to image compression, video compression, or audio compression have been published and widely used. These compression methods reduce media data’s volumes, and save the storage space or transmission bandwidth. After the middle of 1990s, network technology has been rapidly developed and widely spread, which increases the network bandwidth. With the development of network technology and multimedia (image, audio, video, etc.) technology, multimedia data are used more and more widely. In some applications related to politics, economics, militaries, entertainment, or education, multimedia content security becomes important and urgent. Some sensitive data need to be protected against unauthorized users. For example, only the customers paying for a TV program can watch the program online, while other customers cannot watch the content, only the administrator can update (delete, insert, copy, etc.) the TV program in the database, while others cannot modify the content, the TV program released over Internet can be traced, and so forth. Multimedia content protection technology protects multimedia data against the threats coming from unauthorized users, especially in network environment. Generally, protected properties include the confidentiality, integrity, ownership, and so forth. The confidentiality defines that only the authorized users can access the multimedia content, while others cannot know multimedia content. The integrity tells whether media data are modified or not. The ownership shows media data’s owner information that is used to authenticate or trace the distributor. During the past decade, various technologies have been proposed to protect media data, which are introduced in this chapter. Additionally, the threats to multimedia data are presented, the existing protection methods are compared, and some future trends are proposed.


Author(s):  
Zhonghua Yang ◽  
Yanyan Yang ◽  
Yaolin Gu ◽  
Robert Gay

A multimedia system is characterized by the integrated computer-controlled generation, manipulation, presentation, storage, and communication of independent discrete and continuous media data. The presentation of any data and the synchronization between various kinds of media data are the key issues for this integration (Georganas, Steinmetz, & Nakagawa, 1996). Clearly, multimedia systems have to precisely coordinate the relationships among all media that include temporal and spatial relationships. Temporal relationships are the presentation schedule of media, and spatial relationships are the location arrangements of media. Multimedia synchronization is a process of maintaining these relationships by employing appropriate synchronization mechanisms and algorithms. Multimedia synchronization is traditionally challenging, especially in distributed environments.


Author(s):  
Edgar Chávez ◽  
Gonzalo Navarro

The advent of the digital age creates an increasing interest to search for information in large, unstructured repositories containing textual and multimedia data. Retrieval from those repositories requires more powerful query languages, which exceed the querying capabilities of traditional database technologies. The metric space model, described herein, is an extension of the exact searching paradigm aiming to cope with the new requirements.


Sign in / Sign up

Export Citation Format

Share Document