• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Yang Haiyan, Chen Jia, Ma Cuixia, He Lili, Teng Dongxing, Dai Guozhong, Wang Hong'an. Constructing Technology for Hypervideo Based on Sketch Interface[J]. Journal of Computer Research and Development, 2011, 48(2): 289-295.
Citation: Yang Haiyan, Chen Jia, Ma Cuixia, He Lili, Teng Dongxing, Dai Guozhong, Wang Hong'an. Constructing Technology for Hypervideo Based on Sketch Interface[J]. Journal of Computer Research and Development, 2011, 48(2): 289-295.

Constructing Technology for Hypervideo Based on Sketch Interface

More Information
  • Published Date: February 14, 2011
  • Due to videos temporally varying nature, it is difficult for user to capture video main content at a glance. Constructing a hypervideo always depends on complex computer vision techniques. It leads to high cognitive load and complicated operations to users. Traditional operations based on time bar or video frame sequence provide ways to interact with video, but it still inconvenient for users to edit or navigate videos according to video semantic flexibly. In order to solve these problems, a novel method based on sketch is proposed with the purpose of providing natural and efficient interaction for hypervideo construction. Due to the properties of abstract and vague, sketch is very suitable to describe and enrich video content, and can bridge the gap between low level features and high semantics. In this paper, we analyze complex semantic relation between different video resources and divide sketch into two types according to different level of video semantic to assist hypervideo construction. Two key problems about sketch creation are resolved. One is sketch similarity matching, the other is fusion of sketch and video. Finally, an example of application is given to illustrate how to realize efficient hypervideo construction by sketch based video semantic representation.
  • Related Articles

    [1]Xue Kaiping, Chen Ke, Ni Dan, Zhang Hong, Hong Peilin. Survey of MPTCP-Based Multipath Transmission Optimization[J]. Journal of Computer Research and Development, 2016, 53(11): 2512-2529. DOI: 10.7544/issn1000-1239.2016.20150589
    [2]Zhang Chen, Duan Zhenhua, Tian Cong, Yu Bin. Modeling, Verification and Test of Interactive Behaviors in Distributed Software Systems[J]. Journal of Computer Research and Development, 2015, 52(7): 1604-1619. DOI: 10.7544/issn1000-1239.2015.20140244
    [3]Huang Liang, Feng Dengguo, Lian Yifeng, Chen Kai. Artificial-Neural-Network-Based DDoS Defense Effectiveness Evaluation[J]. Journal of Computer Research and Development, 2013, 50(10): 2100-2108.
    [4]Cai Hongyun, Tian Junfeng, Li Zhen, and He Lihui. Trust Model Based on Trust Area and Evaluation Credibility[J]. Journal of Computer Research and Development, 2011, 48(11): 2131-2138.
    [5]Li Zhoujun, Chen Shikun. Survey on QBF Evaluation Algorithms[J]. Journal of Computer Research and Development, 2011, 48(5): 811-822.
    [6]Luo Qing, Lin Yaping. Heuristic Traversal Path Algorithm Based on Linear Aggregation in Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2010, 47(11): 1919-1927.
    [7]Luo Hao and Zeng Huaxin. Design and Implementation of a Distributed Multi-Point Concurrent Test System[J]. Journal of Computer Research and Development, 2009, 46(6): 920-926.
    [8]Fan Limin, Feng Dengguo, Zhou Yongbin. A Fuzzy-Based Randomness Evaluation Model for Block Cipher[J]. Journal of Computer Research and Development, 2008, 45(12): 2095-2101.
    [9]Wu Zhendong and Li Shanping. A Topology Control Algorithm Based on Link Reliability and Multi-Path for Sensor Networks[J]. Journal of Computer Research and Development, 2007, 44(2): 216-222.
    [10]Chi Lihua, Liu jie, and Hu Qingfeng. Evaluation and Test for Scalability of Numerical Parallel Computation[J]. Journal of Computer Research and Development, 2005, 42(6): 1073-1078.

Catalog

    Article views (628) PDF downloads (555) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return