Skip to main content

Books in Multimedia

    • Quality of Experience Paradigm in Multimedia Services

      • 1st Edition
      • November 16, 2017
      • Muhammad Sajid Mushtaq + 1 more
      • English
      • Hardback
        9 7 8 1 7 8 5 4 8 1 0 9 3
      • eBook
        9 7 8 0 0 8 1 0 1 1 7 3 7
      The analysis of QoE is not an easy task, especially for multimedia services, because all the factors (technical and non-technical) that directly or indirectly influence the user-perceived quality have to be considered. This book describes different methods to investigate users’ QoE from the viewpoint of technical and non-technical parameters using multimedia services. It discusses the subjective methods for both controlled and uncontrolled environments. Collected datasets are used to analyze users’ profiles, which sheds light on key factors to help network service providers understand end-users’ behavior and expectations. Important adaptive video streaming technologies are discussed that run on unmanaged networks to achieve certain QoS features. The authors present a scheduling method to allocate resources to the end-user based on users’ QoE and optimizes the power efficiency of users’ device for LTE-A. Lastly, two key aspects of 5G networks are presented: QoE using multimedia services (VoIP and video), and power-saving model for mobile device and virtual base station.
    • Formative Assessment, Learning Data Analytics and Gamification

      • 1st Edition
      • May 9, 2016
      • Santi Caballé + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 6 3 7 2
      • eBook
        9 7 8 0 1 2 8 0 3 6 6 7 9
      Formative Assessment, Learning Data Analytics and Gamification: An ICT Education discusses the challenges associated with assessing student progress given the explosion of e-learning environments, such as MOOCs and online courses that incorporate activities such as design and modeling. This book shows educators how to effectively garner intelligent data from online educational environments that combine assessment and gamification. This data, when used effectively, can have a positive impact on learning environments and be used for building learner profiles, community building, and as a tactic to create a collaborative team. Using numerous illustrative examples and theoretical and practical results, leading international experts discuss application of automatic techniques for e-assessment of learning activities, methods to collect, analyze, and correctly visualize learning data in educational environments, applications, benefits and challenges of using gamification techniques in academic contexts, and solutions and strategies for increasing student participation and performance.
    • Securing Social Media in the Enterprise

      • 1st Edition
      • August 11, 2015
      • Henry Dalziel
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 1 8 0 2
      • eBook
        9 7 8 0 1 2 8 0 4 1 9 6 3
      Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defenses for these attacks, and provides a roadmap for best practices to secure and manage social media within the enterprise.
    • Texturing and Modeling

      • 1st Edition
      • May 19, 2014
      • David S. Ebert
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 5 9 4 0
      • eBook
        9 7 8 1 4 8 3 2 9 7 0 2 6
      Congratulations to Ken Perlin for his 1997 Technical Achievement Award from the Academy of Motion Picture Arts and Science Board of Governors, given in recognition of the development of "Turbulence", Perlin Noise, a technique discussed in this book which is used to produce natural appearing textures on computer-generated surfaces for motion picture visual effects. Dr. Perlin joins Darwyn Peachey (co-developer of RenderMan(R), also discussed in the book) in being honored with this prestigious award.
    • Managing Image Collections

      • 1st Edition
      • February 3, 2011
      • Margot Note
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 5 9 9 2
      • eBook
        9 7 8 1 7 8 0 6 3 0 5 6 4
      This book explores issues surrounding all aspects of visual collection management, taken from real-world experience in creating management systems and digitizing core content. Readers will gain the knowledge to manage the digitization process from beginning to end, assess and define the needs of their particular project, and evaluate digitization options. Additionally, they will select strategies which best meet current and future needs, acquire the knowledge to select the best images for digitization, and understand the legal issues surrounding digitization of visual collections.
    • Digital Media Processing

      • 1st Edition
      • May 20, 2010
      • Hazarathaiah Malepati
      • English
      • Paperback
        9 7 8 1 8 5 6 1 7 6 7 8 1
      • eBook
        9 7 8 0 0 8 0 9 5 7 1 9 7
      Multimedia processing demands efficient programming in order to optimize functionality. Data, image, audio, and video processing, some or all of which are present in all electronic devices today, are complex programming environments. Optimized algorithms (step-by-step directions) are difficult to create but can make all the difference when developing a new application.This book discusses the most current algorithms available that will maximize your programming keeping in mind the memory and real-time constraints of the architecture with which you are working. A wide range of algorithms is covered detailing basic and advanced multimedia implementations, along with, cryptography, compression, and data error correction. The general implementation concepts can be integrated into many architectures that you find yourself working with on a specific project. Analog Devices' BlackFin technology is used for examples throughout the book.
    • Presentations for Librarians

      • 1st Edition
      • January 31, 2008
      • Lee Hilyer
      • English
      • Hardback
        9 7 8 1 8 4 3 3 4 3 0 4 2
      • Paperback
        9 7 8 1 8 4 3 3 4 3 0 3 5
      • eBook
        9 7 8 1 7 8 0 6 3 1 2 2 6
      Recent research on learning from multimedia presentations has indicated that the current way many people prepare their slide presentations may actually hinder learning. Considering the ubiquity of the PowerPoint presentation in business and in education, presenters should be concerned whether or not their audience members are effectively receiving the information they wish to impart. This issue is of special import for librarians who teach, as they often must convey complex information in a very limited amount of time. Combining the best evidence on multimedia learning with real-world practical guidelines, this book aims to provide novice and expert presenters alike with the tools they need to ensure an effective, learner-centred presentation.
    • Wireshark & Ethereal Network Protocol Analyzer Toolkit

      • 1st Edition
      • December 18, 2006
      • Jay Beale + 2 more
      • English
      • eBook
        9 7 8 0 0 8 0 5 0 6 0 1 2
      Ethereal is the #2 most popular open source security tool used by system administrators and security professionals. This all new book builds on the success of Syngress’ best-selling book Ethereal Packet Sniffing.Wireshark & Ethereal Network Protocol Analyzer Toolkit provides complete information and step-by-step Instructions for analyzing protocols and network traffic on Windows, Unix or Mac OS X networks. First, readers will learn about the types of sniffers available today and see the benefits of using Ethereal. Readers will then learn to install Ethereal in multiple environments including Windows, Unix and Mac OS X as well as building Ethereal from source and will also be guided through Ethereal’s graphical user interface. The following sections will teach readers to use command-line options of Ethereal as well as using Tethereal to capture live packets from the wire or to read saved capture files. This section also details how to import and export files between Ethereal and WinDump, Snort, Snoop, Microsoft Network Monitor, and EtherPeek. The book then teaches the reader to master advanced tasks such as creating sub-trees, displaying bitfields in a graphical view, tracking requests and reply packet pairs as well as exclusive coverage of MATE, Ethereal’s brand new configurable upper level analysis engine. The final section to the book teaches readers to enable Ethereal to read new Data sources, program their own protocol dissectors, and to create and customize Ethereal reports.
    • Google Talking

      • 1st Edition
      • December 13, 2006
      • Johnny Long + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 0 5 5 9
      • eBook
        9 7 8 0 0 8 0 4 8 8 8 7 5
      Nationwide and around the world, instant messaging use is growing, with more than 7 billion instant messages being sent every day worldwide, according to IDC. comScore Media Metrix reports that there are 250 million people across the globe--and nearly 80 million Americans--who regularly use instant messaging as a quick and convenient communications tool. Google Talking takes communication to the next level, combining the awesome power of Text and Voice! This book teaches readers how to blow the lid off of Instant Messaging and Phone calls over the Internet.This book will cover the program “Google Talk” in its entirety. From detailed information about each of its features, to a deep-down analysis of how it works. Also, we will cover real techniques from the computer programmers and hackers to bend and tweak the program to do exciting and unexpected things.
    • Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security

      • 1st Edition
      • November 8, 2006
      • T. Bradley
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 1 1 4 3
      • eBook
        9 7 8 0 0 8 0 5 0 5 8 9 3
      Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the content for a site that has over 600,000 page views per month and a weekly newsletter with 25,000 subscribers, Tony has learned how to talk to people, everyday people, about computer security. Intended for the security illiterate, Essential Computer Security is a source of jargon-less advice everyone needs to operate their computer securely.