Current Search: Furht, Borko (x)
View All Items
Pages
- Title
- Evaluation of 3DTV service using asymmetirc view coding based in MPEG-2.
- Creator
- Furht, Borko, Kalva, Hari, Christodoulou, Lakis
- Abstract/Description
-
This paper presents the results of the 3DTV quality evaluation on autostereoscopic displays using asymmetric view coding. Asymmetric view coding encodes the stereo views with different quality. It has been shown that the human visual system is able to compensate for this asymmetric view quality and present a good quality 3D video. Asymmetric video coding can be exploited to reduce the bandwidth requirements for 3DTV services. The key factors that affect the asymmetric video coding are the...
Show moreThis paper presents the results of the 3DTV quality evaluation on autostereoscopic displays using asymmetric view coding. Asymmetric view coding encodes the stereo views with different quality. It has been shown that the human visual system is able to compensate for this asymmetric view quality and present a good quality 3D video. Asymmetric video coding can be exploited to reduce the bandwidth requirements for 3DTV services. The key factors that affect the asymmetric video coding are the compression algorithms, the human visual system, and the 3D display.
Show less - Date Issued
- 2007-05-07 - 2007-05-09
- PURL
- http://purl.flvc.org/fcla/dt/358266
- Subject Headings
- MPEG (Video coding standard), Three-dimensional display systems., Video compression., Digital video.
- Format
- Document (PDF)
- Title
- Complexity reduction tools for MPEG-2 to H.264 video transcoding.
- Creator
- Furht, Borko, Kalva, Hari, Petljanski, Branko
- PURL
- http://purl.flvc.org/fcla/dt/332412
- Subject Headings
- Digital video., Video recording --Standards., MPEG (Video coding standard)., Digital communications.
- Format
- Document (PDF)
- Title
- Application of video error resilience techniques for mobile broadcast multicast services (MBMS).
- Creator
- Furht, Borko, Praveenkumar, Sanigepalli, Kalva, Hari
- Abstract/Description
-
With data throughput for mobile devices constantly increasing, services such as video broadcast and multicast are becoming feasible. The 3GPP (3rd Generation Partnership Project) committee is currently working on a standard for mobile broadcast and multicast services (MBMS). MBMS is expected to enable easier deployment of video and multimedia services on 3G networks. We present an overview of the standard including the proposed architecture and requirements focusing on radio aspects. We...
Show moreWith data throughput for mobile devices constantly increasing, services such as video broadcast and multicast are becoming feasible. The 3GPP (3rd Generation Partnership Project) committee is currently working on a standard for mobile broadcast and multicast services (MBMS). MBMS is expected to enable easier deployment of video and multimedia services on 3G networks. We present an overview of the standard including the proposed architecture and requirements focusing on radio aspects. We discuss the issue of video error resilience in such services that is critical to maintain consistent quality for terminals. The error resilience techniques currently used in video streamingservices are not suitable for MBMS services. We analyze the error resilience techniques that are applicable within the context of MBMS standard and present our early research in this area.
Show less - Date Issued
- 2004-12-13 - 2004-12-15
- PURL
- http://purl.flvc.org/fcla/dt/347823
- Subject Headings
- Multimedia systems., Broadcasting --Technological innovations., Wireless communication systems., Multimedia communications.
- Format
- Document (PDF)
- Title
- A improved video codec supporting error resilience and resource adaptation.
- Creator
- Furht, Borko, Sanigepalli, Praveen, Kalva, Hari
- Date Issued
- 2005-01-8 - 2005-01-12
- PURL
- http://purl.flvc.org/fcla/dt/351015
- Subject Headings
- MPEG (Video coding standard), Digital video., Mobile communication systems.
- Format
- Document (PDF)
- Title
- Design issues for interactive television systems.
- Creator
- Furht, Borko, Kalra, Deven, Kitson, Frederick L., Rodriquez, Arturo A., Wall, William E.
- Date Issued
- 1995
- PURL
- http://purl.flvc.org/fcla/dt/341753
- Subject Headings
- Multimedia systems., Broadcasting --Technological innovations.
- Format
- Document (PDF)
- Title
- Video identification using video tomography.
- Creator
- Furht, Borko, Kalva, Hari, Leon, Gustavo, Yellamraju, Sivakiran
- Date Issued
- 2009
- PURL
- http://purl.flvc.org/fcla/dt/347362
- Subject Headings
- Multimedia systems --Security measures., Digital watermarks., Digital video.
- Format
- Document (PDF)
- Title
- Densely-centered uniform P-search: A fast motion estimation algorithm.
- Creator
- Greenberg, Joshua H., Florida Atlantic University, Furht, Borko
- Abstract/Description
-
Video compression technology promises to be the key to the transmission of motion video. A number of techniques have been introduced in the past few years, particularly that developed by the Motion Picture Experts Group (MPEG). The MPEG algorithm uses Motion Estimation to reduce the amount of data that is stored for each frame. Motion Estimation uses a reference frame as a codebook for a modified Vector Quantization process. While an exhaustive search for Motion Estimation Vectors is time...
Show moreVideo compression technology promises to be the key to the transmission of motion video. A number of techniques have been introduced in the past few years, particularly that developed by the Motion Picture Experts Group (MPEG). The MPEG algorithm uses Motion Estimation to reduce the amount of data that is stored for each frame. Motion Estimation uses a reference frame as a codebook for a modified Vector Quantization process. While an exhaustive search for Motion Estimation Vectors is time-consuming, various fast search algorithms have been developed. These techniques are surveyed, and the theoretical framework for a new search algorithm is developed: Densely-Centered Uniform P-Search. The time complexity of Densely-Centered Uniform P-Search is comparable to other popular Motion Estimation techniques, and shows superior results on a variety of motion video sources.
Show less - Date Issued
- 1996
- PURL
- http://purl.flvc.org/fcla/dt/15286
- Subject Headings
- Image processing--Digital techniques, Data compression (Telecommunication)
- Format
- Document (PDF)
- Title
- Performance study of FDDI HSMM-LAN protocol for distributed multimedia traffic.
- Creator
- Digavally, Srinivas., Florida Atlantic University, Furht, Borko
- Abstract/Description
-
Over the past ten years, Client/Server computing has had a powerful impact on the way businesses deal with information technology. Client/Server computing has enhanced user's productivity, revolutionized computer networking, and restructured the computer industry. Today, another new technology is poised to impact business computing in an equally dramatic way. Networked Multimedia computer applications will significantly affect users and network managers and have a tremendous impact on...
Show moreOver the past ten years, Client/Server computing has had a powerful impact on the way businesses deal with information technology. Client/Server computing has enhanced user's productivity, revolutionized computer networking, and restructured the computer industry. Today, another new technology is poised to impact business computing in an equally dramatic way. Networked Multimedia computer applications will significantly affect users and network managers and have a tremendous impact on computing and network infrastructures. This thesis explores the areas of high speed networking for multimedia applications. Focusing primarily on the FDDI technology we model a high speed FDDI multimedia LAN model and developed typical multimedia traffic models to aid in case study of the FDDI HSMM-LAN networks. FFOL, the Follow On Standards currently in the ANSI standards committee, discuss Network Architectures that include a gigabit backbone network for FDDI and FDDI II networks, making them an attractive and cost effective option to the customer.
Show less - Date Issued
- 1997
- PURL
- http://purl.flvc.org/fcla/dt/15391
- Subject Headings
- Multimedia systems, Fiber Distributed Data Interface (Computer network standard), Local area networks (Computer networks)
- Format
- Document (PDF)
- Title
- Using color image processing techniques to improve the performance of content-based image retrieval systems.
- Creator
- Costa, Fabio Morais., Florida Atlantic University, Furht, Borko
- Abstract/Description
-
A Content-Based Image Retrieval (CBIR) system is a mechanism intended to retrieve a particular image from a large image repository without resorting to any additional information about the image. Query-by-example (QBE) is a technique used by CBIR systems where an image is retrieved from the database based on an example given by the user. The effectiveness of a CBIR system can be measured by two main indicators: how close the retrieved results are to the desired image and how fast we got those...
Show moreA Content-Based Image Retrieval (CBIR) system is a mechanism intended to retrieve a particular image from a large image repository without resorting to any additional information about the image. Query-by-example (QBE) is a technique used by CBIR systems where an image is retrieved from the database based on an example given by the user. The effectiveness of a CBIR system can be measured by two main indicators: how close the retrieved results are to the desired image and how fast we got those results. In this thesis, we implement some classical image processing operations in order to improve the average rank of the desired image, and we also implement two object recognition techniques to improve the subjective quality of the best ranked images. Results of experiments show that the proposed system outperforms an equivalent CBIR system in QBE mode, both from the point of view of precision as well as recall.
Show less - Date Issued
- 2001
- PURL
- http://purl.flvc.org/fcla/dt/12870
- Subject Headings
- Image processing--Digital techniques, Imaging systems--Image quality, Information storage and retrieval systems
- Format
- Document (PDF)
- Title
- A hybrid color‐based foreground object detection method for automated marine surveillance.
- Creator
- Furht, Borko, Kalva, Hari, Marques, Oge, Culibrk, Dubravko, Socek, Daniel
- Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/358420
- Subject Headings
- Computer vision., Automatic tracking., Digital video., Image processing., Optical pattern recognition.
- Format
- Document (PDF)
- Title
- New approaches to encryption and steganography for digital videos.
- Creator
- Furht, Borko, Socek, Daniel, Kalva, Hari, Magliveras, Spyros S., Marques, Oge, Culibrk, Dubravko
- Date Issued
- 2007
- PURL
- http://purl.flvc.org/fcla/dt/337435
- Subject Headings
- Multimedia systems --Security measures., Digital video., Digital watermarking., Data encryption (Computer science) --Technological innovations., Cryptography.
- Format
- Document (PDF)
- Title
- Cloud-based Skin Lesion Diagnosis System using Convolutional Neural Networks.
- Creator
- Akar, Esad, Furht, Borko, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Skin cancer is a major medical problem. If not detected early enough, skin cancer like melanoma can turn fatal. As a result, early detection of skin cancer, like other types of cancer, is key for survival. In recent times, deep learning methods have been explored to create improved skin lesion diagnosis tools. In some cases, the accuracy of these methods has reached dermatologist level of accuracy. For this thesis, a full-fledged cloud-based diagnosis system powered by convolutional neural...
Show moreSkin cancer is a major medical problem. If not detected early enough, skin cancer like melanoma can turn fatal. As a result, early detection of skin cancer, like other types of cancer, is key for survival. In recent times, deep learning methods have been explored to create improved skin lesion diagnosis tools. In some cases, the accuracy of these methods has reached dermatologist level of accuracy. For this thesis, a full-fledged cloud-based diagnosis system powered by convolutional neural networks (CNNs) with near dermatologist level accuracy has been designed and implemented in part to increase early detection of skin cancer. A large range of client devices can connect to the system to upload digital lesion images and request diagnosis results from the diagnosis pipeline. The diagnosis is handled by a two-stage CNN pipeline hosted on a server where a preliminary CNN performs quality check on user requests, and a diagnosis CNN that outputs lesion predictions.
Show less - Date Issued
- 2018
- PURL
- http://purl.flvc.org/fau/fd/FA00013150
- Subject Headings
- Skin Diseases--diagnosis, Skin--Cancer--Diagnosis, Diagnosis--Methodology, Neural networks, Cloud computing
- Format
- Document (PDF)
- Title
- Context-based Image Concept Detection and Annotation.
- Creator
- Zolghadr, Esfandiar, Furht, Borko, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Scene understanding attempts to produce a textual description of visible and latent concepts in an image to describe the real meaning of the scene. Concepts are either objects, events or relations depicted in an image. To recognize concepts, the decision of object detection algorithm must be further enhanced from visual similarity to semantical compatibility. Semantically relevant concepts convey the most consistent meaning of the scene. Object detectors analyze visual properties (e.g., pixel...
Show moreScene understanding attempts to produce a textual description of visible and latent concepts in an image to describe the real meaning of the scene. Concepts are either objects, events or relations depicted in an image. To recognize concepts, the decision of object detection algorithm must be further enhanced from visual similarity to semantical compatibility. Semantically relevant concepts convey the most consistent meaning of the scene. Object detectors analyze visual properties (e.g., pixel intensities, texture, color gradient) of sub-regions of an image to identify objects. The initially assigned objects names must be further examined to ensure they are compatible with each other and the scene. By enforcing inter-object dependencies (e.g., co-occurrence, spatial and semantical priors) and object to scene constraints as background information, a concept classifier predicts the most semantically consistent set of names for discovered objects. The additional background information that describes concepts is called context. In this dissertation, a framework for building context-based concept detection is presented that uses a combination of multiple contextual relationships to refine the result of underlying feature-based object detectors to produce most semantically compatible concepts. In addition to the lack of ability to capture semantical dependencies, object detectors suffer from high dimensionality of feature space that impairs them. Variances in the image (i.e., quality, pose, articulation, illumination, and occlusion) can also result in low-quality visual features that impact the accuracy of detected concepts. The object detectors used to build context-based framework experiments in this study are based on the state-of-the-art generative and discriminative graphical models. The relationships between model variables can be easily described using graphical models and the dependencies and precisely characterized using these representations. The generative context-based implementations are extensions of Latent Dirichlet Allocation, a leading topic modeling approach that is very effective in reduction of the dimensionality of the data. The discriminative contextbased approach extends Conditional Random Fields which allows efficient and precise construction of model by specifying and including only cases that are related and influence it. The dataset used for training and evaluation is MIT SUN397. The result of the experiments shows overall 15% increase in accuracy in annotation and 31% improvement in semantical saliency of the annotated concepts.
Show less - Date Issued
- 2016
- PURL
- http://purl.flvc.org/fau/fd/FA00004745, http://purl.flvc.org/fau/fd/FA00004745
- Subject Headings
- Computer vision--Mathematical models., Pattern recognition systems., Information visualization., Natural language processing (Computer science), Multimodal user interfaces (Computer systems), Latent structure analysis., Expert systems (Computer science)
- Format
- Document (PDF)
- Title
- Virtualization techniques for mobile systems.
- Creator
- Jaramillo, David, Furht, Borko, Agarwal, Ankur, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In current mobile system environment there is a large gap in the use of smart phones for personal and enterprise use due to required enterprise security policies, privacy concerns as well as freedom of use. In the current environment, data-plans on mobile systems have become so wide spread that the rate of adaptation of data plans for every day customers has far outpaced the ability for enterprises to keep up with existing secure enterprise infrastructures. Most of the enterprises require...
Show moreIn current mobile system environment there is a large gap in the use of smart phones for personal and enterprise use due to required enterprise security policies, privacy concerns as well as freedom of use. In the current environment, data-plans on mobile systems have become so wide spread that the rate of adaptation of data plans for every day customers has far outpaced the ability for enterprises to keep up with existing secure enterprise infrastructures. Most of the enterprises require/provide the access of emails and other official information on smart platforms which presents a big challenge for the enterprise in securing their systems. Therefore due to the security issues and policies imposed by the enterprise in using the same device for dual purpose (personal and enterprise), the consumers often lose their individual freedom and convenience at the cost of security. Few solutions have been successful addressing this challenge. One effective way is to partition the mobile device such that the enterprise system access and its information are completely separated from the personal information. Several approaches are described and presented for mobile virtualization that creates a secure and secluded environment for enterprise information while allowing the user to access their personal information. A reference architecture is then presented that allows for integration with existing enterprise mobile device management systems and at the same time providing a light weight solution for containerizing mobile applications. This solution is then benchmarked with several of the existing mobile virtualization solutions.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/fau/fd/FA0004028
- Subject Headings
- Mobile communication systems, Virtual computer systems
- Format
- Document (PDF)
- Title
- Adaptive two-level watermarking for binary document images.
- Creator
- Muharemagic, Edin., Florida Atlantic University, Furht, Borko, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In our society, large volumes of documents are exchanged on a daily basis. Since documents can easily be scanned, modified and reproduced without any loss in quality, unauthorized use and modification of documents is of major concern. An authentication watermark embedded into a document as an invisible, fragile mark can be used to detect illegal document modification. However, the authentication watermark can only be used to determine whether documents have been tampered with, and additional...
Show moreIn our society, large volumes of documents are exchanged on a daily basis. Since documents can easily be scanned, modified and reproduced without any loss in quality, unauthorized use and modification of documents is of major concern. An authentication watermark embedded into a document as an invisible, fragile mark can be used to detect illegal document modification. However, the authentication watermark can only be used to determine whether documents have been tampered with, and additional protection may be needed to prevent unauthorized use and distribution of those documents. A solution to this problem is a two-level, multipurpose watermark. The first level watermark is an authentication mark used to detect document tampering, while the second level watermark is a robust mark, which identifies the legitimate owner and/or user of specific document. This dissertation introduces a new adaptive two-level multipurpose watermarking scheme suitable for binary document images, such as scanned text, figures, engineering and road maps, architectural drawings, music scores, and handwritten text and sketches. This watermarking scheme uses uniform quantization and overlapped embedding to add two watermarks, one robust and the other fragile, into a binary document image. The two embedded watermarks serve different purposes. The robust watermark carries document owner or document user identification, and the fragile watermark confirms document authenticity and helps detect document tampering. Both watermarks can be extracted without accessing the original document image. The proposed watermarking scheme adaptively selects an image partitioning block size to optimize the embedding capacity, the image permutation key to minimize watermark detection error, and the size of local neighborhood in which modification candidate pixels are scored to minimize visible distortion of watermarked documents. Modification candidate pixels are scored using a novel, objective metric called the Structural Neighborhood Distortion Measure (SNDM). Experimental results confirm that this watermarking scheme, which embeds watermarks by modifying image pixels based on their SNDM scores, creates smaller visible document distortion than watermarking schemes which base watermark embedding on any other published pixel scoring method. Document tampering is detected successfully and the robust watermark can be detected even after document tampering renders the fragile watermark undetectable.
Show less - Date Issued
- 2004
- PURL
- http://purl.flvc.org/fau/fd/FADT12113
- Subject Headings
- Data encryption (Computer science), Computer security, Digital watermarking, Data protection, Image processing--Digital techniques, Watermarks
- Format
- Document (PDF)
- Title
- Application of wavelets to image and video coding.
- Creator
- Zolghadr, Esfandiar, Florida Atlantic University, Furht, Borko, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In this thesis we applied wavelet transforms to image and video coding. First, a survey of various wavelets and their features is presented, including continuous, discrete, and orthogonal wavelets. Theories and concepts underlying one and two-dimensional wavelet transforms are introduced and compared to Fourier transform and sub-band coding. The core of the thesis is the implementation of two-dimensional and three-dimensional codec architectures and their application to coding images and...
Show moreIn this thesis we applied wavelet transforms to image and video coding. First, a survey of various wavelets and their features is presented, including continuous, discrete, and orthogonal wavelets. Theories and concepts underlying one and two-dimensional wavelet transforms are introduced and compared to Fourier transform and sub-band coding. The core of the thesis is the implementation of two-dimensional and three-dimensional codec architectures and their application to coding images and videos, respectively. We studied performance of the wavelet codec by comparing it to DCT and JPEG coding techniques. We applied these techniques for compression of a variety of test images and videos. We also analyzed the adaptability and scalability of 2D and 3D codec. Experimental results, presented in the thesis, illustrate the superior performance of wavelets compared to other coding techniques.
Show less - Date Issued
- 2003
- PURL
- http://purl.flvc.org/fcla/dt/13050
- Subject Headings
- Wavelets (Mathematics), Image compression, JPEG (Image coding standard)
- Format
- Document (PDF)
- Title
- Content-based image retrieval using relevance feedback.
- Creator
- Marques, Oge, Florida Atlantic University, Furht, Borko, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This dissertation presents the results of research that led to the development of a complete, fully functional, image search and retrieval system with relevance feedback capabilities, called MUSE (MUltimedia SEarch and Retrieval Using Relevance Feedback). Two different models for searching for a target image using relevance feedback have been proposed, implemented, and tested. The first model uses a color-based feature vector and employs a Bayesian learning algorithm that updates the...
Show moreThis dissertation presents the results of research that led to the development of a complete, fully functional, image search and retrieval system with relevance feedback capabilities, called MUSE (MUltimedia SEarch and Retrieval Using Relevance Feedback). Two different models for searching for a target image using relevance feedback have been proposed, implemented, and tested. The first model uses a color-based feature vector and employs a Bayesian learning algorithm that updates the probability of each image in the database being the target based on the user's actions. The second model uses cluster analysis techniques, a combination of color-, texture-, and edge(shape)-based features, and a novel approach to learning the user's goals and the relevance of each feature for a particular search. Both models follow a purely content-based image retrieval paradigm. The search process is based exclusively on image contents automatically extracted during the (off-line) feature extraction stage. Moreover, they minimize the number and complexity of required user's actions, in contrast with the complexity of the underlying search and retrieval engine. Results of experiments show that both models exhibit good performance for moderate-size, unconstrained databases and that a combination of the two outperforms any of them individually, which is encouraging. In the process of developing this dissertation, we also implemented and tested several image features and similarity measurement combinations. The result of these tests---performed under the query-by-example (QBE) paradigm---served as a reference in the choice of which features to use in the relevance feedback mode and confirmed the difficulty in encoding the understanding of image similarity into a combination of features and distances without human assistance. Most of the code written during the development of this dissertation has been encapsulated into a multifunctional prototype that combines image searching (with or without an example), browsing, and viewing capabilities and serves as a framework for future research in the subject.
Show less - Date Issued
- 2001
- PURL
- http://purl.flvc.org/fcla/dt/11954
- Subject Headings
- Information storage and retrieval systems, Image processing--Digital techniques, Feedback control systems
- Format
- Document (PDF)
- Title
- Disk I/O scheduling techniques for multimedia systems.
- Creator
- Sommers, Daniel R., Florida Atlantic University, Furht, Borko, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The home computer user represents a significant portion of the multimedia market. To the home user, multimedia is the ability to play, edit and even create movies (video and sound) on his home computer system. While there are many studies that concentrate on large multimedia servers which support hundreds (even thousands) of simultaneous users, there are very few that focus attention on the home computer configuration. This thesis presents the mechanisms for generating, compressing,...
Show moreThe home computer user represents a significant portion of the multimedia market. To the home user, multimedia is the ability to play, edit and even create movies (video and sound) on his home computer system. While there are many studies that concentrate on large multimedia servers which support hundreds (even thousands) of simultaneous users, there are very few that focus attention on the home computer configuration. This thesis presents the mechanisms for generating, compressing, transmitting and decompressing multimedia data as a framework for the long-term storage and retrieval of multimedia data on disk drives. After developing the framework, the thesis presents an in-depth design and analysis of a disk-based multimedia storage system, proposes a scheduling algorithm for data retrieval (DAN-SCAN) and presents the results of a simulation of the algorithm.
Show less - Date Issued
- 1996
- PURL
- http://purl.flvc.org/fcla/dt/15235
- Subject Headings
- Multimedia systems, Disk access (Computer science), Computer storage devices, Data disk drives
- Format
- Document (PDF)
- Title
- Novel Techniques in Genetic Programming.
- Creator
- Fernandez, Thomas, Furht, Borko, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Three major problems make Genetic Programming unfeasible or impractical for real world problems. The first is the excessive time complexity.In nature the evolutionary process can take millions of years, a time frame that is clearly not acceptable for the solution of problems on a computer. In order to apply Genetic Programming to real world problems, it is essential that its efficiency be improved. The second is called overfitting (where results are inaccurate outside the training data). In a...
Show moreThree major problems make Genetic Programming unfeasible or impractical for real world problems. The first is the excessive time complexity.In nature the evolutionary process can take millions of years, a time frame that is clearly not acceptable for the solution of problems on a computer. In order to apply Genetic Programming to real world problems, it is essential that its efficiency be improved. The second is called overfitting (where results are inaccurate outside the training data). In a paper[36] for the Federal Reserve Bank, authors Neely and Weller state “a perennial problem with using flexible, powerful search procedures like Genetic Programming is overfitting, the finding of spurious patterns in the data. Given the well-documented tendency for the genetic program to overfit the data it is necessary to design procedures to mitigate this.” The third is the difficulty of determining optimal control parameters for the Genetic Programming process. Control parameters control the evolutionary process. They include settings such as, the size of the population and the number of generations to be run. In his book[45], Banzhaf describes this problem, “The bad news is that Genetic Programming is a young field and the effect of using various combinations of parameters is just beginning to be explored.” We address these problems by implementing and testing a number of novel techniques and improvements to the Genetic Programming process. We conduct experiments using data sets of various degrees of difficulty to demonstrate success with a high degree of statistical confidence.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fau/fd/FA00012570
- Subject Headings
- Evolutionary programming (Computer science), Genetic algorithms, Genetic programming (Computer science)
- Format
- Document (PDF)
- Title
- Techniques for improving the capacity of video on demand systems.
- Creator
- Kalva, Hari., Florida Atlantic University, Furht, Borko, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis presents a survey of multimedia networks and the techniques to improve the capacity of video on demand systems. A survey was conducted and comparative evaluation was done to determine the multimedia capabilities of various networks. Video on demand is an electronic video rental system in which clients request and play videos on-demand. Video on-demand system can be implemented over an existing cable TV network or an upgraded ADSL network. The two techniques used to improve the...
Show moreThis thesis presents a survey of multimedia networks and the techniques to improve the capacity of video on demand systems. A survey was conducted and comparative evaluation was done to determine the multimedia capabilities of various networks. Video on demand is an electronic video rental system in which clients request and play videos on-demand. Video on-demand system can be implemented over an existing cable TV network or an upgraded ADSL network. The two techniques used to improve the capacity of video on-demand systems are segmentation and multicasting. Segmentation consists of dividing the video into several fixed length segments, and then transmitting the segments at regular intervals instead of transmitting the video continuously. With multicasting, more than one user requesting the same video are served by a single video stream. Multicasting further assumes that each subscriber has a limited storage space, so same video segments can be multicast to subscribers simultaneously even if the requests for a video are not synchronous.
Show less - Date Issued
- 1994
- PURL
- http://purl.flvc.org/fcla/dt/15112
- Subject Headings
- Video recording, Multimedia systems, Interactive multimedia
- Format
- Document (PDF)