Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem1. describe with the aid of appropriate exs the differentiation between ‘Data’ and ‘Information’.

problem2. A digital image is an array of pixels, where each pixel has a colour. There are several colour spaces which are used in different image editing software. One of them is known as HSV. What does HSV stand for?

problem3. describe briefly each of three components.

problem4. Define the term ‘Multimedia database’. What are its major strength and weaknesses?

problem5. What is ‘stream media application’? List two major drawbacks of these types of application.

problem6. Stream media applications, such as image data are highly ‘unstructured’. What is meant by this term? Describe any three metadata attributes which can be used to overcome this problem and to facilitate retrieval from media collections or libraries.

problem7. In Multimedia Databases the simplest, though far from efficient retrieval strategy is to search for the requested data serially, from the first item, until one finds the requested data or until the whole collection has been searched. A much more efficient strategy is to develop a set of indexes to facilitate data retrieval.

i) When is it more efficient to use indexing in searching data items?

ii) On what factor(s) should these indexes be based?

iii) List and briefly describe four (4) types of indexes that can be created and used for media data.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95509

Have any Question? 


Related Questions in Computer Engineering

1 what drawbacks to symmetric and asymmetric encryption are

1. What drawbacks to symmetric and asymmetric encryption are resolved by using a hybrid method like Diffie Hellman? 2. What is steganography, and what can it be used for? 3. Which security protocols are predominantly use ...

1 what are the pros and cons of out-of-band network

1. What are the pros and cons of out-of-band network management versus in-band network management? 2. A network management system can communicate with a managed device using a request-response protocol or a trap mechanis ...

1 describe the critical characteristics of information how

1. Describe the critical characteristics of information. How are they used in the study of computer security? 2. Identify the six components of an information system. Which are most directly affected by the study of comp ...

1 show a pipeline execution diagram for the third iteration

1. Show a pipeline execution diagram for the third iteration of this loop, from the cycle in which we fetch the first instruction of that iteration up to (but not including) the cycle in which we can fetch the first inst ...

Describe how exactly you would perform a collision search

Describe how exactly you would perform a collision search to find a pair x1, x2, such that h(x1) = h(x2) for a given hash function h. What are the memory requirements for this type of search if the hash function has an o ...

1 what is social engineering why do security experts worry

1. What is social engineering? Why do security experts worry about social engineering? What is the best way to deal with social engineering? 2. Humanware is a cause of security threat. Discuss why this is so. 3. Discuss ...

1 write a program to find the sum of the first n natural

1. Write a program to find the sum of the first n natural numbers, where the value of n is provided by the user. 2. Write a program to find the sum of the cubes of the first n natural numbers where the value of n is prov ...

An inverted page table can be used to further optimize

An inverted page table can be used to further optimize space and time. How many PTEs are needed to store the page table? Assuming a hash table implementation, what are the common case and worst case numbers of memory ref ...

1 does the rapid development of computer technology put any

1. Does the rapid development of computer technology put any strain on the existing criteria for updates? 2. Study and compare TCSEC, ITSEC, and CC assurance levels. 3. Trace the evolution of the security evaluation crit ...

1 it is said that unix uses access control lists does the

1. It is said that UNIX uses access control lists. Does the UNIX model include capabilities as well as access control lists? 2. Suppose a user wishes to edit the file xyzzy in a capability-based system. How can he be sur ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro