• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 188
  • 30
  • 22
  • 19
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • Tagged with
  • 285
  • 285
  • 112
  • 48
  • 47
  • 42
  • 37
  • 34
  • 33
  • 30
  • 26
  • 25
  • 24
  • 23
  • 21
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
231

CHURCH IN CONNECTION: IGREJA, SHOW MIDIÁTICO E JUVENTUDE / Church in connection: church, media show and youth.

Sahium, Pedro Fernando 20 February 2018 (has links)
Submitted by admin tede (tede@pucgoias.edu.br) on 2018-04-16T19:05:05Z No. of bitstreams: 1 PEDRO FERNANDO SAHIUM.pdf: 3914519 bytes, checksum: 2bea552bec05dbb5d9bffd656dbdd8a5 (MD5) / Made available in DSpace on 2018-04-16T19:05:05Z (GMT). No. of bitstreams: 1 PEDRO FERNANDO SAHIUM.pdf: 3914519 bytes, checksum: 2bea552bec05dbb5d9bffd656dbdd8a5 (MD5) Previous issue date: 2018-02-20 / From its beginning, Protestantism in Brazil shows changes in the expression of faith that were brought in to the tropical land as well as changes on the religious field where this faith is currently inserted. The church in Connection (CC) disconnected from a church that sprouted from a division of Brazilian Presbyterianism. As advised by many historians, it is best to refer to Protestantisms instead Protestantism due to such internal diversity of this line of Christianity. The Church originated from Presbyterian Church of Brazil, that was a result from the union of the churches Presbyterian independent and Cristian Presbyterian. The Church Connection is a Brazilian Institution that got inspiration from the Modus Operandi of Church by the Glades, located in USA. The Church has implemented special programs and special organization as well as a unique event preparations that include spectacular services in movie like ambient and best media resources. This plan is to gain the market of religious young adults, in doing so, the Church Connection has welcomed almost one thousand participants to it’s Sunday services in three years (2014-2016) as well of a portion of young adults from other evangelical churches. The Church avoids practices that may include magical practices such as cures, or use of spiritual gifts often used by the Pentecostals or Neo-Pentecostals. The Church uses techniques of Multimedia system and the performance by its leaders to produce exciting theme services that are plentiful innovations. The Church aims to get closer to de daily routine of young adults by offering Applications on the Smartphones and a constant presence on the electronic Medias. The members of the Church are part of a well-organized institution that every Sunday presents them with a new show of entertainment that deeply pleases them. This spectacular renewed event, mediated by its technicality and religiosity, however, goes beyond pure entertainment, and the relational triad: religion/entertainment/ youth, presents an important axle of significance and anchorage in a world of programed infant like behavior, individualism and impersonal exchanges. The Church opted to offer a show to the youth and in its complete package of services it is also included a possibility of anchoring in a fluid world. / Desde a entrada do protestantismo no Brasil, percebem-se as mudanças dessa expressão de fé religiosa trazidas para terras tropicais, até as mudanças no campo religioso, em que essa fé se insere atualmente. A igreja Church in Connection (CC) se desconectou de uma igreja que surgiu do desmembramento do presbiterianismo brasileiro. Como já salientaram historiadores da religião, é melhor falar em protestantismos ao invés de protestantismo, dada a diversidade interna dessa vertente do cristianismo. A Church se originou da igreja Presbiteriana Renovada do Brasil (IPRB) que, por sua vez, foi resultado da união das igrejas Presbiteriana Independente (IPI) e Igreja Cristã Presbiteriana (ICP). A Church in Connection é uma instituição brasileira que se inspirou no modus operandi de outra igreja, esta nos Estados Unidos, a Church By the Glades (CBG). Com um catálogo de programações e de organização especialmente preparada para o nicho jovem do mercado religioso, incluindo cultos espetaculares com ambiência de cinema e fazendo largo uso das mídias eletrônicas, a Church em três anos de funcionamento (2014-2016) angariou quase mil participantes nos seus cultos dominicais e envolveu a parcela jovem oriunda de outras igrejas do campo evangélico. Distanciando-se de práticas mágicas como as de cura, ou do uso de dons espirituais, a exemplo das igrejas pentecostais e neopentecostais, a Church usa das técnicas do Sistema Multimídia e da performance dos seus líderes para produzir cultos temáticos, animados, diferentes e repletos de novidades. Com aplicativos de Internet de uso nos smartphones e presença permanente nas mídias eletrônicas, a Church se aproxima do cotidiano experiencial dos jovens. Os fiéis da igreja se veem envolvidos numa instituição empresarial bem organizada, que apresenta a cada domingo um show novo para entretenimento e delírio dos frequentadores. Contudo, esse espetáculo renovado, por meio de um corpo técnico e religioso, vai além de puro entretenimento, e a tríade relacional de religião, show midiático e juventude apresenta importante eixo gerador de sentido e de ancoragem num mundo de infantilização programada, de individualismo e fluxos impessoais. A Church optou por oferecer o espetáculo à juventude e no pacote completo dos seus serviços está inclusa a possibilidade de ancoragem num mundo fluído.
232

Modelling 802.11 networks for multimedia applications

Dao, Trong Nghia, Electrical Engineering & Telecommunications, Faculty of Engineering, UNSW January 2008 (has links)
This thesis is concerned with the development of new mathematical models for the IEEE 802.11??s access mechanisms, with a particular focus on DCF and EDCA. Accurate mathematical models for the DCF and EDCA access mechanisms provide many benefits, such as improved performance analysis, easier network capacity planning, and robust network design. A feature that permeates the work presented in this thesis is the application of our new models to network environments where both saturated and non-saturated traffic sources are present. The scenario in which multiple traffic sources are present is more technically challenging, but provides for a more realistic setting. Our first contribution is the development of a new Markov model for non-saturated DCF in order to predict the network throughput. This model takes into account several details of the protocol that have been hitherto neglected. In addition, we apply a novel treatment of the packet service time within our model. We show how the inclusion of these effects provides more accurate predictions of network throughput than earlier works. Our second contribution is the development of a new analytical model for EDCA, again in order to predict network throughput. Our new EDCA model is based on a replacement of the normal AIFS parameter of EDCA with a new parameter more closely associated with DCF. This novel procedure allows EDCA to be viewed as a modified multi-mode version of DCF. Our third contribution is the simultaneous application of our new Markov models to both the non-saturated and the saturated regime. Hitherto, network throughput predictions for these regimes have required completely separate mathematical models. The convergence property of our model in the two regimes provides a new method to estimate the network capacity of the network. Our fourth contribution relates to predictions for the multimedia capacity of 802.11 networks. Our multimedia capacity analysis, which is based on modifications to our Markov model, is new in that it can be applied to a broad range of quality of service requirements. Finally, we highlight the use of our analysis in the context of emerging location-enabled networks.
233

Multimedia transaction tracking from a mutual distrust perspective.

Wong, Angela S. L. January 2007 (has links)
In this thesis, we present a novel, elegant and simple method for secure transaction authentication and non-repudiation for trading multimedia content. Multimedia content can be video, images, text documents, music, or any form of digital signal, however here we will focus particular on still images with application to video. We will provide proof that not only can receiving parties within a transaction be untrustworthy, but the owner, or members within an owning party, also cannot be trusted. Known as the insider attack, this attack is particularly prevalent in multimedia transactions. Thus the focus of the thesis is on the prevention of piracy, with particular emphasis on the case where the owner of a document is assumed to be capable of deceit, placing the system under the assumption of mutual distrust. We will introduce a concept called staining, which will be used to achieve authentication and non-repudiation. Staining is composed of two key components: (1) public-key cryptography; and (2) steganographic watermarking. The idea is to watermark a multimedia document after encryption, thereby introducing a stain on the watermark. This stain is due to the non-commutative nature of the scheme, so that decryption will be imperfect, leaving a residue of the cryptographic process upon the watermark. Essentially, secrets from the owner (the watermark) and the receiver (the cryptographic key) are entangled rather than shared, as in most schemes. We then demonstrate our method using image content and will test several different common cryptographic systems with a spread-spectrum type watermark. Watermarking and cryptography are not usually combined in such a manner, due to several issues such as the rigid nature of cryptography. Contrary to the expectation that there will be severe distortions caused to the original document, we show that such an entanglement is possible without destroying the document under protection. We will then attack the most promising combination of systems by introducing geometric distortions such as rotation and cropping, as well as compressing the marked document, to demonstrate that such a method is robust to typical attacks. / http://proxy.library.adelaide.edu.au/login?url= http://library.adelaide.edu.au/cgi-bin/Pwebrecon.cgi?BBID=1297339 / Thesis (Ph.D.) - University of Adelaide, School of Electrical and Electronic Engineering, 2007
234

Q-Fabric: System Support for Continuous Online Quality Management

Poellabauer, Christian 12 April 2004 (has links)
The explosive growth in networked systems and applications and the increase in device capabilities (as evidenced by the availability of inexpensive multimedia devices) enable novel complex distributed applications, including video conferencing, on-demand computing services, and virtual environments. These applications' need for high performance, real-time, or reliability requires the provision of Quality of Service (QoS) guarantees along the path of information exchange between two or more communicating systems. Execution environments that are prone to dynamic variability and uncertainty make QoS provision a challenging task, e.g., changes in user behavior, resource requirements, resource availabilities, or system failures are difficult or even impossible to predict. Further, with the coexistence of multiple adaptation techniques and resource management mechanisms, it becomes increasingly important to provide an integrated or cooperative approach to distributed QoS management. This work's goals are the provision of system-level tools needed for the efficient integration of multiple adaptation approaches available at different layers of a system (e.g., application-level, operating system, or network) and the use of these tools such that distributed QoS management is performed efficiently with predictable results. These goals are addressed constructively and experimentally with the Q-Fabric architecture, which provides the required system-level mechanisms to efficiently integrate multiple adaptation techniques. The foundation of this integration is the event-based communication implemented by it, realizing a loosely-coupled group communication approach frequently found in multi-peer applications. Experimental evaluations are performed in the context of a mobile multimedia application, where the focus is directed toward efficient energy consumption on battery-operated devices. Here, integration is particularly important to prevent multiple energy management techniques found on modern mobile devices to negate the energy savings of each other.
235

Quality of service support for progressive video transmission over Internet

Kim, Minjung 01 December 2003 (has links)
No description available.
236

A System for Using Perceiver Input to Vary the Quality of Generative Multimedia Performances

Jeff, Byron A. 15 September 2005 (has links)
Generative Multimedia (GM) applications are an increasingly popular way to implement interactive media performances. Our contributions include creating a metric for evaluating Generative Multimedia performances, designing a model for accepting perceiver preferences, and using those preferences to adapt GM performances. The metric used is imprecision, which is the ratio of the actual computation time of a GM element to the computation time of a complete version of that GM element. By taking a perceiver's preferences into account when making adaptation decisions, applications can produce GM performances that meet soft real-time and resource constraints while allocating imprecision to the GM elements the perceiver least cares about. Compared to other approaches, perceiver-directed imprecision best allocates impreciseness while minimizing delay.
237

Elastic Algorithms for Region of Interest Video Compression, with Application to Mobile Telehealth

Rao, Sira 17 August 2007 (has links)
Video is the most demanding modality from the viewpoints of bandwidth, computational complexity, and resolution. Thus, there has been limited progress in the field of mobile video technology. In the research, the focus is on elastic wireless video technology, and its adaptation to diagnostic application requirements in real-time clinical assessment. It is important and timely to apply wireless video technology to real-time remote diagnosis of emergent medical events. This premise comes from initial successes in telehealth based on wired networks. The enablement of mobility (for the physician and/or the patient) by wireless communication will be a next major step, but this advance will depend on definitive and compelling demonstrations of reliability. Thus, an important goal of the research is to develop a complete methodology that will be embraced by physicians. Acute pediatric asthma has been identified as a domain where this new capability will be highly welcome. The research uses flexible and interactive algorithms for Region-of-Interest (ROI) processing. ROI processing is a useful approach to achieve the optimal balance in the quality-bandwidth tradeoff characteristic of visual communication services. The notion of ROI has been traditionally used mostly for foreground-background separation in scene rendering and manipulation, and only more recently for variably quality compression. Even when the latter goal is considered, quality criteria have been ad-hoc and at best useful for video conferencing, given that the medical domain has its own fidelity criteria. The research thus focuses on the design of an elastic ROI-based compression paradigm with medical diagnosis as a central criterion. The research describes the methodology to achieve elasticity through rate control algorithms at the encoder. An elastic non-parametric approach is proposed that uses a priori user-specified video quality information, quantifies this information, and incorporates this into the encoder in the form of region-quality mappings. This method is compared to a parametric bit allocation approach that is based on region-features and a set of tuning weights. A number of videos of actual patients were filmed and used as the video database for the developed algorithms. In testing the elastic non-parametric and parametric algorithms, both objective measures in the form of Peak Signal to Noise Ratio (PSNR), and subjective evaluations were used. Thus, in this work, the focus is on domain relevance of the algorithms developed, as opposed to network related issues such as packet losses. This is justified in that these may have broader value with other applications, and continuation of this work will include realistic network conditions. To summarize, the research shows the usefulness of ROI processing as a means of achieving a gain (in a bits per pixel sense) over uniform compression at the same bitrate. It also shows how quantifying a notion of functionally lossless video quality diagnostically lossless video quality in a video-based telehealth system, in a bits per pixel sense is useful from an applications and bitrate perspective. Finally, a combination of these two concepts is advantageous i.e. diagnostically lossless ROI video quality is achievable over bitrate limited channels.
238

Mixed-initiative multimedia for mobile devices: design of a semantically relevant low latency system for news video recommendations

Lee, Jeannie Su Ann 12 July 2010 (has links)
The increasing ubiquity of networked mobile devices such as cell phones and PDAs has created new opportunities for the transmission and display of multimedia content. However, any mobile device has inherent resource constraints: low network bandwidth, small screen sizes, limited input methods, and low commitment viewing. Mobile systems that provide information display and access thus need to mitigate these various constraints. Despite progress in information retrieval and content recommendation, there has been less focus on issues arising from a network-oriented and mobile perspective. This dissertation investigates a coordinated design approach to networked multimedia on mobile devices, and considers the abovementioned system perspectives. Within the context of accessing news video on mobile devices, the goal is to provide a cognitively palatable stream of videos and a seamless, low-latency user experience. Mixed-initiative---a method whereby intelligent services and users collaborate efficiently to achieve the user's goals, is the cornerstone of the system design and integrates user relevance feedback with a content recommendation engine and a content- and network-aware video buffer prefetching technique. These various components have otherwise been considered independently in other prior system designs. To overcome limited interactivity, a mixed-initiative user interface was used to present a sequence of news video clips to the user, along with operations to vote-up or vote-down a video to indicate its relevance. On-screen gesture equivalents of these operations were also implemented to reduce user interface elements occupying the screen. Semantic relevancy was then improved by extracting and indexing the content of each video clip as text features, and using a Na"ive Bayesian content recommendation strategy that harnessed the user relevance feedback to tailor the subsequent video recommendations. With the system's knowledge of relevant videos, a content-aware video buffer prefetching scheme was then integrated, using the abovementioned feedback to lower the user perceived latency on the client-end. As an information retrieval system consists of many interacting components, a client-server video streaming model is first developed for clarity and simplicity. Using a CNN news video clip database, experiments were then conducted using this model to simulate user scenarios. As the aim of improving semantic relevancy sometimes opposes user interface tools for interactivity and user perceived latency, a quantitative evaluation was done to observe the tradeoffs between bandwidth, semantic relevance, and user perceived latency. Performance tradeoffs involving semantic relevancy and user perceived latency were then predicted. In addition, complementary human user subjective tests are conducted with actual mobile phone hardware running on the Google Android platform. These experiments suggest that a mixed-initiative approach is helpful for recommending news video content on a mobile device for overcoming the mobile limitations of user interface tools for interactivity and client-end perceived latency. Users desired interactivity and responsiveness while viewing videos, and were willing to sacrifice some content relevancy in order gain lower perceived latency. Recommended future work includes expanding the content recommendation to incorporate viewing data from a large population, and the creation of a global hybrid content-based and collaborative filtering algorithm for better results. Also, based on existing user behaviour, users were reluctant to provide more input than necessary. Additional user experiments can be designed to quantify user attention and interest during video watching on a mobile device, and for better definition and incorporation of implicit user feedback.
239

Modelling 802.11 networks for multimedia applications

Dao, Trong Nghia, Electrical Engineering & Telecommunications, Faculty of Engineering, UNSW January 2008 (has links)
This thesis is concerned with the development of new mathematical models for the IEEE 802.11??s access mechanisms, with a particular focus on DCF and EDCA. Accurate mathematical models for the DCF and EDCA access mechanisms provide many benefits, such as improved performance analysis, easier network capacity planning, and robust network design. A feature that permeates the work presented in this thesis is the application of our new models to network environments where both saturated and non-saturated traffic sources are present. The scenario in which multiple traffic sources are present is more technically challenging, but provides for a more realistic setting. Our first contribution is the development of a new Markov model for non-saturated DCF in order to predict the network throughput. This model takes into account several details of the protocol that have been hitherto neglected. In addition, we apply a novel treatment of the packet service time within our model. We show how the inclusion of these effects provides more accurate predictions of network throughput than earlier works. Our second contribution is the development of a new analytical model for EDCA, again in order to predict network throughput. Our new EDCA model is based on a replacement of the normal AIFS parameter of EDCA with a new parameter more closely associated with DCF. This novel procedure allows EDCA to be viewed as a modified multi-mode version of DCF. Our third contribution is the simultaneous application of our new Markov models to both the non-saturated and the saturated regime. Hitherto, network throughput predictions for these regimes have required completely separate mathematical models. The convergence property of our model in the two regimes provides a new method to estimate the network capacity of the network. Our fourth contribution relates to predictions for the multimedia capacity of 802.11 networks. Our multimedia capacity analysis, which is based on modifications to our Markov model, is new in that it can be applied to a broad range of quality of service requirements. Finally, we highlight the use of our analysis in the context of emerging location-enabled networks.
240

Robust digital watermarking of multimedia objects

Gupta, Gaurav January 2008 (has links)
Thesis (PhD)--Macquarie University, Division of Information and Communication Sciences, Department of Computing, 2008. / Bibliography: p. 144-153. / Introduction -- Background -- Overview of watermarking -- Natural language watermarking -- Software watermarking -- Semi-blind and reversible database watermarking -- Blind and reversible database watermarking -- Conclusion and future research -- Bibliography. / Digital watermarking has generated significant research and commercial interest in the past decade. The primary factors contributing to this surge are widespread use of the Internet with improved bandwidth and speed, regional copyright loopholes in terms of legislation; and seamless distribution of multimedia content due to peer-to-peer file-sharing applications. -- Digital watermarking addresses the issue of establishing ownership over mul-timedia content through embedding a watermark inside the object. Ideally, this watermark should be detectable and/or extractable, survive attacks such as digital reproduction and content-specific manipulations such as re-sizing in the case of images, and be invisible to the end-user so that the quality of the content is not degraded significantly. During detection or extraction, the only requirements should be the secret key and the watermarked multimedia object, and not the original un-marked object or the watermark inserted. Watermarking scheme that facilitate this requirement are categorized as blind. In recent times, reversibility of watermark has also become an important criterion. This is due to the fact that reversible watermarking schemes can provided security against secondary watermarking attacks by using backtracking algorithms to identify the rightful owner. A watermarking scheme is said to be reversible if the original unmarked object can be regenerated from the watermarked copy and the secret key. / This research covers three multimedia content types: natural language documents, software, and databases; and discusses the current watermarking scenario, challenges, and our contribution to the field. We have designed and implemented a natural language watermarking scheme that uses the redundancies in natural languages. As a result, it is robust against general attacks against text watermarks. It offers additional strength to the scheme by localizing the attack to the modified section and using error correction codes to detect the watermark. Our first contribution in software watermarking is identification and exploitation of weaknesses in branch-based software watermarking scheme proposed in [71] and the software watermarking algorithm we present is an improvised version of the existing watermarking schemes from [71]. Our scheme survives automated debugging attacks against which the current schemes are vulnerable, and is also secure against other software-specific attacks. We have proposed two database watermarking schemes that are both reversible and therefore resilient against secondary watermarking attacks. The first of these database watermarking schemes is semi-blind and requires the bits modified during the insertion algorithm to detect the watermark. The second scheme is an upgraded version that is blind and therefore does not require anything except a secret key and the watermarked relation. The watermark has a 89% probability of survival even when almost half of the data is manipulated. The watermarked data in this case is extremely useful from the users' perspective, since query results are preserved (i.e., the watermarked data gives the same results for a query as the nmarked data). -- The watermarking models we have proposed provide greater security against sophisticated attacks in different domains while providing sufficient watermark-carrying capacity at the same time. The false-positives are extremely low in all the models, thereby making accidental detection of watermark in a random object almost negligible. Reversibility has been facilitated in the later watermarking algorithms and is a solution to the secondary watermarking attacks. We shall address reversibility as a key issue in our future research, along with robustness, low false-positives and high capacity. / Mode of access: World Wide Web. / xxiv, 156 p. ill. (some col.)

Page generated in 0.0519 seconds