You are previewing International Journal of Mobile Computing and Multimedia Communications (IJMCMC) Volume 6, Issue 2.
O'Reilly logo
International Journal of Mobile Computing and Multimedia Communications (IJMCMC) Volume 6, Issue 2

Book Description

The International Journal of Mobile Computing and Multimedia Communications (IJMCMC) publishes original research papers, state of the art reviews, technical notes, case studies, innovative projects, and book reviews on topics leveraging all aspects of mobile and multimedia computing: from underlying technologies to applications, theory to practice, and servers to networks to devices.The coverage of this journal ranges from innovative topics to research findings to trends analysis on mobile multimedia and related theories, technologies, methods, applications, and services from all engineering, business and organizational perspectives.

This issue contains the following articles:

  • Reconstructing Handwriting Character Font Models with Incorrect Stroke Order
  • Application of WMN-SA Simulation System for Node Placement in Wireless Mesh Networks: A Case Study for a Realistic Scenario
  • An Improved Counter-Forensic Algorithm to Erase the JPEG Compression Artifacts
  • A Local Statistical Information Active Contour Model for Image Segmentation
  • A Distributed and Scalable Solution for Applying Semantic Techniques to Big Data
  • Relay Selection Scheme for Cooperative Communication Systems in Fixed Decode-and-Forward Mode

Table of Contents

  1. Cover
  2. Masthead
  3. Call For Articles
  4. Special Issue on Security and Optimization Techniques for Mobile and Multimedia Computing
  5. Reconstructing Handwriting Character Font Models with Incorrect Stroke Order
    1. ABSTRACT
    2. INTRODUCTION
    3. MODELING HANDWRITING CHARACTERS USING DYNAMIC FONT METHOD
    4. EXPERIMENTAL STUDIES
    5. CONCLUDING REMARKS
    6. REFERENCES
  6. Application of WMN-SA Simulation System for Node Placement in Wireless Mesh Networks:
    1. ABSTRACT
    2. INTRODUCTION
    3. NODE PLACEMENT PROBLEM IN WMNS
    4. PROPOSED AND IMPLEMENTED WMN-SA SYSTEM
    5. SIMULATION RESULTS
    6. CONCLUSION
    7. REFERENCES
  7. An Improved Counter-Forensic Algorithm to Erase the JPEG Compression Artifacts
    1. ABSTRACT
    2. INTRODUCTION
    3. BRIEF REVIEW OF THE JPEG COMPRESSION
    4. ANTI-FORENSIC SCHEME
    5. IMPROVED METHOD BASED ON PARAMETER ADJUSTMENT
    6. EXPERIMENTAL RESULTS
    7. CONCLUSION
    8. ACKNOWLEDGMENT
    9. REFERENCES
  8. A Local Statistical Information Active Contour Model for Image Segmentation
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. LOCAL STATISTICAL INFORMATION (LSI) ACTIVE CONTOUR MODEL
    5. ALGORITHM SUMMARIZATION
    6. EXPERIMENTS
    7. CONCLUSION
    8. ACKNOWLEDGMENT
    9. REFERENCES
  9. A Distributed and Scalable Solution for Applying Semantic Techniques to Big Data
    1. ABSTRACT
    2. INTRODUCTION
    3. RELATED WORK
    4. THE M.A.R.A. FRAMEWORK
    5. PROBLEM STATEMENT
    6. PROBLEM FORMULATION
    7. SOFTWARE ARCHITECTURE
    8. TECHNOLOGICAL STACK
    9. PROOF OF CONCEPT
    10. EXPERIMENTAL RESULTS
    11. CONCLUSION AND FUTURE WORK
    12. ACKNOWLEDGMENT
    13. REFERENCES
  10. Relay Selection Scheme for Cooperative Communication Systems in Fixed Decode-and-Forward Mode
    1. ABSTRACT
    2. INTRODUCTION
    3. COOPERATIVE MODE
    4. RELAY SELECTION SCHEME
    5. SIMULATION AND RESULTS
    6. CONCLUSION
    7. ACKNOWLEDGMENT
    8. REFERENCES
  11. Call For Articles