Ask Question, Ask an Expert


Ask Computer Engineering Expert

problem 1) Describe what do you understand by multimedia document architecture? Also describe what are ODA and OMF?

b) Describe the features of QT.

problem 2)a) State and describe goals and objectives of Multimedia.

b) What is authoring tool? Describe any one authoring tool used in multimedia.

problem 3)a) Describe BMP file format in detail.

b) describe what do you undertand by Image Enhancement? Describe the concept by point processing.

problem 4)a) describe the different factors that influence the brightness of a pixel in an image.

b) What is Compression? Describe the various types of Compressions used in multimedia.

problem 5)a) Describe MPEG audio file with its frame Buffer.

b) Describe in brief basic component of an audio system.

problem 6)a) What are MIDI messages? Distinguish between Channel Message and System Message.

b) describe following terms with reference to audio-

i) Sampling theorem

ii) Quantization

problem 7)a) What do you understand by text compression? Describe how Huffman coding technique is used for text compression.

b) Describe the features of H.263.

problem 8)a) How encoding on a DVD-audio is different from that on a CD-audio. Also describe the architecture of DVD.

b) Describe in brief Video Recording System.

problem 9)a) What is VRML? Describe the applications of VRML with the help of suitable ex.

b) Why does it takes four nodes to make a simple object in VRML?

problem 10)a) Describe Virtual Reality chair used in VR-Applications.

b) What is the use of DEF and USE in VRML? Are there any disadvantages of using DEF and USE for reuse?

problem 11)a) Describe how atmospheric effects can be introduced in 3D Animation.

b) prepare a short note on- 2D Animation.

problem 12)a) Describe principles of animation with ex.

b) Describe Key frames and tweening in animation.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95595

Have any Question? 

Related Questions in Computer Engineering

Suppose a chosen-ciphertext attacker cannot recover the

Suppose a chosen-ciphertext attacker cannot recover the secret decryption key loran encryption scheme. Does this mean the encryption scheme is secure? Consider a symmetric-key cryptosystem in which cryptographic keys are ...

The following is a dump of an sctp general header in

The following is a dump of an SCTP general header in hexadecimal format. 04320017 00000001 00000000 a. What is the source port number? b. What is the destination port number? c. What is the value of the verification tag? ...

1 what is a project plan list what a project plan can

1. What is a project plan? List what a project plan can accomplish. 2. What is the value of a statement of vision and objectives? Why is it needed before a project plan is developed?

Using english text and patterns determine the average

Using English text and patterns determine the average behavior of the pattern searching algorithm in (Implement a version of the current pattern searching algorithm that counts the number of times a given pattern occurs ...

1 differentiate between access and authorization2 what are

1. Differentiate between access and authorization. 2. What are the bene fits of authorization? 3. Why is it dif fi cult to implement distributed authorization? 4. Discuss the merits and demerits of centralized and decent ...

1what are the fundamental object oriented concepts2what is

1.What are the fundamental object oriented concepts? 2.What is inheritance? 3.What is abstraction? 4.What is polymorphism and what are its benefits? 5.What is encapsulation?

1 how is an sts multiplexer different from an adddrop

1. How is an STS multiplexer different from an add/drop multiplexer since both can add signals together? 2. What is the relationship between STS signals and OC signals? 3. What is the purpose of the pointer in the line o ...

1 redesign the ticketcounterclass to implement a generic

1. Redesign the TicketCounterClass to implement a generic simulation class from which a user can derive their own simulation classes. 2. Design, implement, and test a computer program to simulate the checkout at a grocer ...

Assume that the variables f g h i j are assigned to

Assume that the variables f, g, h, i, j are assigned to registers $s0 through $s4. Assume that the base address of the A and B are in the registers $s6 and $s7. What would the MIPS assembly code be for the following C st ...

1 assume a private internet uses a protocol suite totally

1. Assume a private internet uses a protocol suite totally different from the TCP/ IP protocol suite. Can this internet still use the services of UDP or TCP as an end-to-end vehicle of message communication? 2. Can you e ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro