{"title":"A Prediction Method of Mobile User Preference Based on the Influence between Users","authors":"Yancui Shi, Jianhua Cao, Congcong Xiong, Xiankun Zhang","doi":"10.1155/2018/8081409","DOIUrl":"https://doi.org/10.1155/2018/8081409","url":null,"abstract":"User preference will be impacted by other users. To accurately predict mobile user preference, the influence between users is introduced into the prediction model of user preference. First, the mobile social network is constructed according to the interaction behavior of the mobile user, and the influence of the user is calculated according to the topology of the constructed mobile social network and mobile user behavior. Second, the influence between users is calculated according to the user’s influence, the interaction behavior between users, and the similarity of user preferences. When calculating the influence based on the interaction behavior, the context information is considered; the context information and the order of user preferences are considered when calculating the influence based on the similarity of user preferences. The improved collaborative filtering method is then employed to predict mobile user preferences based on the obtained influence between users. Finally, the experiment is executed on the real data set and the integrated data set, and the results show that the proposed method can obtain more accurate mobile user preferences than those of existing methods.","PeriodicalId":204253,"journal":{"name":"Int. J. Digit. Multim. Broadcast.","volume":"3 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122731882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey of Standardized Approaches towards the Quality of Experience Evaluation for Video Services: An ITU Perspective","authors":"Debajyoti Pal, Tuul Triyason","doi":"10.1155/2018/1391724","DOIUrl":"https://doi.org/10.1155/2018/1391724","url":null,"abstract":"Over the past few years there has been an exponential increase in the amount of multimedia data being streamed over the Internet. At the same time, we are also witnessing a change in the way quality of any particular service is interpreted, with more emphasis being given to the end-users. Thus, silently there has been a paradigm shift from the traditional Quality of Service approach (QoS) towards a Quality of Experience (QoE) model while evaluating the service quality. A lot of work that tries to evaluate the quality of audio, video, and multimedia services over the Internet has been done. At the same time, research is also going on trying to map the two different domains of quality metrics, i.e., the QoS and QoE domain. Apart from the work done by individual researchers, the International Telecommunications Union (ITU) has been quite active in this area of quality assessment. This is obvious from the large number of ITU standards that are available for different application types. The sheer variety of techniques being employed by ITU as well as other researchers sometimes tends to be too complex and diversified. Although there are survey papers that try to present the current state of the art methodologies for video quality evaluation, none has focused on the ITU perspective. In this work, we try to fill up this void by presenting up-to-date information on the different measurement methods that are currently being employed by ITU for a video streaming scenario. We highlight the outline of each method with sufficient detail and try to analyze the challenges being faced along with the direction of future research.","PeriodicalId":204253,"journal":{"name":"Int. J. Digit. Multim. Broadcast.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129834597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Channel Estimation for OFDM-Based Amplify-and-Forward Cooperative System Using Relay-Superimposed Pilots","authors":"Xianwen He, Gaoqi Dou, Jun Gao","doi":"10.1155/2018/9618147","DOIUrl":"https://doi.org/10.1155/2018/9618147","url":null,"abstract":"For the OFDM-based Amplify-and-Forward cooperative system, a novel relay-superimposed pilot strategy is proposed, where the source pilot symbols are frequency division multiplexed to estimate the cascaded channel while relay pilot sequence is superimposed onto the top of the cooperative data stream for second-hop channel estimation. This method avoids the loss of data rate for additional pilot subcarriers but results in the interference of unknown cooperative data. To remove the interference of cooperative data during the estimation of second-hop channel, the Cooperative Interference Cancelation scheme assisted by cooperative data from direct link is proposed. We derive the approximated lower bound for the MSE of second-hop channel estimation. Simulation results are presented to validate the performance of the proposed schemes.","PeriodicalId":204253,"journal":{"name":"Int. J. Digit. Multim. Broadcast.","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126983443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-Time QoE Monitoring System for Video Streaming Services with Adaptive Media Playout","authors":"Mingfu Li, C. Yeh, Shao-Yu Lu","doi":"10.1155/2018/2619438","DOIUrl":"https://doi.org/10.1155/2018/2619438","url":null,"abstract":"Quality of Experience (QoE) of video streaming services has been attracting more and more attention recently. Therefore, in this work we designed and implemented a real-time QoE monitoring system for streaming services with Adaptive Media Playout (AMP), which was implemented into the VideoLAN Client (VLC) media player to dynamically adjust the playout rate of videos according to the buffer fullness of the client buffer. The QoE monitoring system reports the QoE of streaming services in real time so that network/content providers can monitor the qualities of their services and resolve troubles immediately whenever their subscribers encounter them. Several experiments including wired and wireless streaming were conducted to show the effectiveness of the implemented AMP and QoE monitoring system. Experimental results demonstrate that AMP significantly improves the QoE of streaming services according to the Mean Opinion Score (MOS) estimated by our developed program. Additionally, some challenging issues in wireless streaming have been easily identified using the developed QoE monitoring system.","PeriodicalId":204253,"journal":{"name":"Int. J. Digit. Multim. Broadcast.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130685049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhijun Fang, Jenq-Neng Hwang, X. Huo, H. J. Lee, Joachim Denzler
{"title":"Emergent Techniques and Applications for Big Visual Data","authors":"Zhijun Fang, Jenq-Neng Hwang, X. Huo, H. J. Lee, Joachim Denzler","doi":"10.1155/2017/6468502","DOIUrl":"https://doi.org/10.1155/2017/6468502","url":null,"abstract":"1School of Electronic and Electrical Engineering, Shanghai University of Engineering Science, Shanghai 201620, China 2Department of Electrical Engineering, University of Washington, Seattle, WA 98105, USA 3Stewart School of Industrial and Systems Engineering, Georgia Institute of Technology, Atlanta, GA 30332, USA 4Department of Computer Engineering, Chonbuk National University, Jeonju 54596, Republic of Korea 5Department of Mathematics and Computer Sciences, University of Jena, 07743 Jena, Germany","PeriodicalId":204253,"journal":{"name":"Int. J. Digit. Multim. Broadcast.","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116342263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaojie Duan, Dandan Chen, Jianming Wang, Meichen Shi, Qingliang Chen, He Zhao, Ruixue Zuo, Xiuyan Li, Qi Wang
{"title":"Visual Three-Dimensional Reconstruction of Aortic Dissection Based on Medical CT Images","authors":"Xiaojie Duan, Dandan Chen, Jianming Wang, Meichen Shi, Qingliang Chen, He Zhao, Ruixue Zuo, Xiuyan Li, Qi Wang","doi":"10.1155/2017/3163759","DOIUrl":"https://doi.org/10.1155/2017/3163759","url":null,"abstract":"With the rapid development of CT technology, especially the higher resolution of CT machine and a sharp increase in the amount of slices, to extract and three-dimensionally display aortic dissection from the huge medical image data became a challenging task. In this paper, active shape model combined with spatial continuity was adopted to realize automatic reconstruction of aortic dissection. First, we marked aortic feature points from big data sample library and registered training samples to build a statistical model. Meanwhile, gray vectors were sampled by utilizing square matrix, which set the landmarks as the center. Posture parameters of the initial shape were automatically adjusted by the method of spatial continuity between CT sequences. The contrast experiment proved that the proposed algorithm could realize accurate aorta segmentation without selecting the interested region, and it had higher accuracy than GVF snake algorithm (93.29% versus 87.54% on aortic arch, 94.30% versus 89.25% on descending aorta). Aortic dissection membrane was extracted via Hessian matrix and Bayesian theory. Finally, the three-dimensional visualization of the aortic dissection was completed by volume rendering based on the ray casting method to assist the doctors in clinical diagnosis, which contributed to improving the success rate of the operations.","PeriodicalId":204253,"journal":{"name":"Int. J. Digit. Multim. Broadcast.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121326449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Preferential Diffusion Recommendation Algorithm Based on User's Nearest Neighbors","authors":"Fuguo Zhang, Yehuan Liu, Qinqiao Xiong","doi":"10.1155/2017/1386461","DOIUrl":"https://doi.org/10.1155/2017/1386461","url":null,"abstract":"Recommender system is a very efficient way to deal with the problem of information overload for online users. In recent years, network based recommendation algorithms have demonstrated much better performance than the standard collaborative filtering methods. However, most of network based algorithms do not give a high enough weight to the influence of the target user’s nearest neighbors in the resource diffusion process, while a user or an object with high degree will obtain larger influence in the standard mass diffusion algorithm. In this paper, we propose a novel preferential diffusion recommendation algorithm considering the significance of the target user’s nearest neighbors and evaluate it in the three real-world data sets: MovieLens 100k, MovieLens 1M, and Epinions. Experiments results demonstrate that the novel preferential diffusion recommendation algorithm based on user’s nearest neighbors can significantly improve the recommendation accuracy and diversity.","PeriodicalId":204253,"journal":{"name":"Int. J. Digit. Multim. Broadcast.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127941129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rate-Distortion and Rate-Energy-Distortion Evaluations of Compressive-Sensing Video Coding","authors":"Bingyu Ji, Ran Li, Chang-an Wu","doi":"10.1155/2017/4589124","DOIUrl":"https://doi.org/10.1155/2017/4589124","url":null,"abstract":"Compressive-Sensing Video Coding (CSVC) is a new video coding framework based on compressive-sensing (CS) theory. This paper presents the evaluations on rate-distortion performance and rate-energy-distortion performance of CSVC by comparing it with the popular hybrid video coding standard H.264 and distributed video coding (DVC) system DISCOVER. Experimental results show that CSVC achieves a poor rate-distortion performance when compared with H.264 and DISCOVER, but its rate-energy-distortion performance has a distinct advantage; moreover, its energy consumption of coding is approximately invariant regardless of reconstruction quality. It can be concluded that, with a limited energy budget, CSVC outperforms H.264 and DISCOVER, but its rate-distortion performance still needs improvement.","PeriodicalId":204253,"journal":{"name":"Int. J. Digit. Multim. Broadcast.","volume":"193 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120970041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christian Di Laura, Diego Pajuelo, Guillermo Kemper
{"title":"A Novel Steganography Technique for SDTV-H.264/AVC Encoded Video","authors":"Christian Di Laura, Diego Pajuelo, Guillermo Kemper","doi":"10.1155/2016/6950592","DOIUrl":"https://doi.org/10.1155/2016/6950592","url":null,"abstract":"Today, eavesdropping is becoming a common issue in the rapidly growing digital network and has foreseen the need for secret communication channels embedded in digital media. In this paper, a novel steganography technique designed for Standard Definition Digital Television (SDTV) H.264/AVC encoded video sequences is presented. The algorithm introduced here makes use of the compression properties of the Context Adaptive Variable Length Coding (CAVLC) entropy encoder to achieve a low complexity and real-time inserting method. The chosen scheme hides the private message directly in the H.264/AVC bit stream by modifying the AC frequency quantized residual luminance coefficients of intrapredicted I-frames. In order to avoid error propagation in adjacent blocks, an interlaced embedding strategy is applied. Likewise, the steganography technique proposed allows self-detection of the hidden message at the target destination. The code source was implemented by mixing MATLAB 2010 b and Java development environments. Finally, experimental results have been assessed through objective and subjective quality measures and reveal that less visible artifacts are produced with the technique proposed by reaching PSNR values above 40.0 dB and an embedding bit rate average per secret communication channel of 425 bits/sec. This exemplifies that steganography is affordable in digital television.","PeriodicalId":204253,"journal":{"name":"Int. J. Digit. Multim. Broadcast.","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133600864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Chidambaram, P. Raj, K. Thenmozhi, Rengarajan Amirtharajan
{"title":"Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique","authors":"N. Chidambaram, P. Raj, K. Thenmozhi, Rengarajan Amirtharajan","doi":"10.1155/2016/8789397","DOIUrl":"https://doi.org/10.1155/2016/8789397","url":null,"abstract":"With the rapid rise of the Internet and electronics in people’s life, the data related to it has also undergone a mammoth increase in magnitude. The data which is stored in the cloud can be sensitive and at times needs a proper file storage system with a tough security algorithm. Whereas cloud is an open shareable elastic environment, it needs impenetrable and airtight security. This paper deals with furnishing a secure storage system for the above-mentioned purpose in the cloud. To become eligible to store data a user has to register with the cloud database. This prevents unauthorized access. The files stored in the cloud are encrypted with RSA algorithm and digital fingerprint for the same has been generated through MD5 message digest before storage. The RSA provides unreadability of data to anyone without the private key. MD5 makes it impossible for any changes on data to go unnoticed. After the application of RSA and MD5 before storage, the data becomes resistant to access or modifications by any third party and to intruders of cloud storage system. This application is tested in Amazon Elastic Compute Cloud Web Services.","PeriodicalId":204253,"journal":{"name":"Int. J. Digit. Multim. Broadcast.","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127541649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}