Skip to main content

Books in Multimedia

    • Quality of Experience Paradigm in Multimedia Services

      • 1st Edition
      • November 16, 2017
      • Muhammad Sajid Mushtaq + 1 more
      • English
      • Hardback
        9 7 8 1 7 8 5 4 8 1 0 9 3
      • eBook
        9 7 8 0 0 8 1 0 1 1 7 3 7
      The analysis of QoE is not an easy task, especially for multimedia services, because all the factors (technical and non-technical) that directly or indirectly influence the user-perceived quality have to be considered. This book describes different methods to investigate users’ QoE from the viewpoint of technical and non-technical parameters using multimedia services. It discusses the subjective methods for both controlled and uncontrolled environments. Collected datasets are used to analyze users’ profiles, which sheds light on key factors to help network service providers understand end-users’ behavior and expectations. Important adaptive video streaming technologies are discussed that run on unmanaged networks to achieve certain QoS features. The authors present a scheduling method to allocate resources to the end-user based on users’ QoE and optimizes the power efficiency of users’ device for LTE-A. Lastly, two key aspects of 5G networks are presented: QoE using multimedia services (VoIP and video), and power-saving model for mobile device and virtual base station.
    • Formative Assessment, Learning Data Analytics and Gamification

      • 1st Edition
      • May 9, 2016
      • Santi Caballé + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 6 3 7 2
      • eBook
        9 7 8 0 1 2 8 0 3 6 6 7 9
      Formative Assessment, Learning Data Analytics and Gamification: An ICT Education discusses the challenges associated with assessing student progress given the explosion of e-learning environments, such as MOOCs and online courses that incorporate activities such as design and modeling. This book shows educators how to effectively garner intelligent data from online educational environments that combine assessment and gamification. This data, when used effectively, can have a positive impact on learning environments and be used for building learner profiles, community building, and as a tactic to create a collaborative team. Using numerous illustrative examples and theoretical and practical results, leading international experts discuss application of automatic techniques for e-assessment of learning activities, methods to collect, analyze, and correctly visualize learning data in educational environments, applications, benefits and challenges of using gamification techniques in academic contexts, and solutions and strategies for increasing student participation and performance.
    • Securing Social Media in the Enterprise

      • 1st Edition
      • August 11, 2015
      • Henry Dalziel
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 1 8 0 2
      • eBook
        9 7 8 0 1 2 8 0 4 1 9 6 3
      Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defenses for these attacks, and provides a roadmap for best practices to secure and manage social media within the enterprise.
    • Texturing and Modeling

      • 1st Edition
      • May 19, 2014
      • David S. Ebert
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 5 9 4 0
      • eBook
        9 7 8 1 4 8 3 2 9 7 0 2 6
      Congratulations to Ken Perlin for his 1997 Technical Achievement Award from the Academy of Motion Picture Arts and Science Board of Governors, given in recognition of the development of "Turbulence", Perlin Noise, a technique discussed in this book which is used to produce natural appearing textures on computer-generated surfaces for motion picture visual effects. Dr. Perlin joins Darwyn Peachey (co-developer of RenderMan(R), also discussed in the book) in being honored with this prestigious award.
    • Managing Image Collections

      • 1st Edition
      • February 3, 2011
      • Margot Note
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 5 9 9 2
      • eBook
        9 7 8 1 7 8 0 6 3 0 5 6 4
      This book explores issues surrounding all aspects of visual collection management, taken from real-world experience in creating management systems and digitizing core content. Readers will gain the knowledge to manage the digitization process from beginning to end, assess and define the needs of their particular project, and evaluate digitization options. Additionally, they will select strategies which best meet current and future needs, acquire the knowledge to select the best images for digitization, and understand the legal issues surrounding digitization of visual collections.
    • Digital Media Processing

      • 1st Edition
      • May 20, 2010
      • Hazarathaiah Malepati
      • English
      • Paperback
        9 7 8 1 8 5 6 1 7 6 7 8 1
      • eBook
        9 7 8 0 0 8 0 9 5 7 1 9 7
      Multimedia processing demands efficient programming in order to optimize functionality. Data, image, audio, and video processing, some or all of which are present in all electronic devices today, are complex programming environments. Optimized algorithms (step-by-step directions) are difficult to create but can make all the difference when developing a new application.This book discusses the most current algorithms available that will maximize your programming keeping in mind the memory and real-time constraints of the architecture with which you are working. A wide range of algorithms is covered detailing basic and advanced multimedia implementations, along with, cryptography, compression, and data error correction. The general implementation concepts can be integrated into many architectures that you find yourself working with on a specific project. Analog Devices' BlackFin technology is used for examples throughout the book.
    • Presentations for Librarians

      • 1st Edition
      • January 31, 2008
      • Lee Hilyer
      • English
      • Hardback
        9 7 8 1 8 4 3 3 4 3 0 4 2
      • Paperback
        9 7 8 1 8 4 3 3 4 3 0 3 5
      • eBook
        9 7 8 1 7 8 0 6 3 1 2 2 6
      Recent research on learning from multimedia presentations has indicated that the current way many people prepare their slide presentations may actually hinder learning. Considering the ubiquity of the PowerPoint presentation in business and in education, presenters should be concerned whether or not their audience members are effectively receiving the information they wish to impart. This issue is of special import for librarians who teach, as they often must convey complex information in a very limited amount of time. Combining the best evidence on multimedia learning with real-world practical guidelines, this book aims to provide novice and expert presenters alike with the tools they need to ensure an effective, learner-centred presentation.
    • How to Cheat at Windows System Administration Using Command Line Scripts

      • 1st Edition
      • October 9, 2006
      • Pawan K Bhardwaj
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 1 0 5 1
      • eBook
        9 7 8 0 0 8 0 5 0 8 2 6 9
      How to Cheat at Windows Systems Administrators using Command Line Scripts teaches system administrators hundreds of powerful, time-saving tips for automating daily system administration tasks using Windows command line scripts. With every new version of Windows, Microsoft is trying to ease the administration jobs by adding more and more layers of graphical user interface (GUI) or configuration wizards (dialog boxes). While these ‘wizards’ are interactive and make the administrator’s job easier, they are not always the most convenient and efficient way to accomplish the everyday administration tasks. These wizards are time consuming and, at times, may seem a bit confusing. The purpose of the book is to teach administrators how to use command-line scripts to complete everyday administration jobs, solve recurring network problems and at the same time improve their efficiency.
    • Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security

      • 1st Edition
      • November 8, 2006
      • T. Bradley
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 1 1 4 3
      • eBook
        9 7 8 0 0 8 0 5 0 5 8 9 3
      Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the content for a site that has over 600,000 page views per month and a weekly newsletter with 25,000 subscribers, Tony has learned how to talk to people, everyday people, about computer security. Intended for the security illiterate, Essential Computer Security is a source of jargon-less advice everyone needs to operate their computer securely.
    • Google Talking

      • 1st Edition
      • December 13, 2006
      • Johnny Long + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 0 5 5 9
      • eBook
        9 7 8 0 0 8 0 4 8 8 8 7 5
      Nationwide and around the world, instant messaging use is growing, with more than 7 billion instant messages being sent every day worldwide, according to IDC. comScore Media Metrix reports that there are 250 million people across the globe--and nearly 80 million Americans--who regularly use instant messaging as a quick and convenient communications tool. Google Talking takes communication to the next level, combining the awesome power of Text and Voice! This book teaches readers how to blow the lid off of Instant Messaging and Phone calls over the Internet.This book will cover the program “Google Talk” in its entirety. From detailed information about each of its features, to a deep-down analysis of how it works. Also, we will cover real techniques from the computer programmers and hackers to bend and tweak the program to do exciting and unexpected things.