Evaluate archiver-s method opitmally

Assignment Help Basic Computer Science
Reference no: EM1369144

The video content analysis department at local startup ThereTube.com has identified certain frames f1, f2,...,fn of a long video sequence V as significant. These frames are to be archived within 5-second video clips, extracted from V at the original resolution. Once the extraction is done, V will be converted to a low-resolution, compressed format and the original discarded, making it impossible to obtain arbitrary frames at the original resolution unless they are parts of the special 5-second clips. Note: there are 24 frames per second in both the original and the clips.

The archiver's job is to determine a set {C1, C2,...,Cm} of 5-second clips (i.e., their starting frames) such that each fi is contained in at least one of the clips, and such that as few clips as possible are used. The archiver's plan is to look first for a maximal group of frames that can all be covered by one clip, capture that clip, check off the frames that have been handled, and then recursively process the rest until all the fi are covered.

(a) You've been hired as an outside consultant to evaluate the archiver's method, in part because the company is interested in automating this phase of the process. Is the archiver's method optimal? If so, give an argument for it. If not, give an example set of frames where it fails, and offer a method that is optimal and explain why it is.

Here is a diagram showing one instance of the problem, with time going left to right. The archiver has used three clips here to cover the 6 special frames.

V-------------------------------------------
f1 f2 f3 f4 f5 f6
C3------ C1------ C2------

Reference no: EM1369144

Questions Cloud

Find the minimum angular velocity : About the axis of the rod.ωA ball of mass m is attached by two strings to a vertical rod. The entire system rotates at constant angular velocity.
Create a customer experience strategy : Include components of customer service model reognized within your text. How would you use them to create a customer experience strategy?
Question on aggregate demand curve : Suppose that aggregate price level is constant, interest rate is fixed, and there are no taxes on foreign trade, how much will the aggregate demand curve shift and in what direction if the following events occur?
Business objectives of owners and managers : Descrbe why the business objectives of owners and managers are likely to diverge. How might owners attempt to ensure that managers act in their interests and not in the managers' own interests?
Evaluate archiver-s method opitmally : You've been hired as the outside consultant to evaluate archiver's method, in part as company is interested in automating this phase of process. Is archiver's method optimal?
What is profit selling price if you make a sell : You do not incur any cost to produce goods you sell and thus your profit equals selling price if you make a sell. Or three sellers do not have any costs either.
Process company contacts : If costs about the same amount per minute for processing with either of the two methods, when should each be used?
Question on expansionary fiscal policy : In an expansionary fiscal policy to overcome current recession, the Federal Government increases its expending to improve the nation's physical infrastructure
Algorithm to keep track of sufficient information : Your algorithm must keep track of sufficient information so that, for any computer Cb it is possible to retrieve in O(n) time a sequence of communications by which Cb could have become infected.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Compare and contrast five design pattern activity

Design Pattern Activity: Prepare a 2-3 page paper comparing and contrasting five of the design patterns . Choose any five from the list. Adapter - helps to reuse an object or method by adapting its interface to a more common one

  Which vulnerability be evaluated for extra controls first

If organization has three information assets to evaluate for risk management as shown in accompanying data, which vulnerability must be evaluated for additional controls first? Which one must be evaluated last?

  What bit pattern will be in memory cell

What bit patterns will be in registers 0, 1, and 2 when the machine halts? What bit pattern will be in the memory cell at address 30 when the machine halts?

  Explaining initial values of cache tags and cache lines

Assuming that the initial values of the cache tags and the cache lines are completely arbitrary, Also, show how the cache tags will change for each of the above steps. You should justify your answer.

  Significant difference of typical salary for system analyst

Is there a significant difference between typical salaries for system analyst, designers, and developers? What is the difference between typical salaries for these different groups?

  Describe how upper is adjusted to allow simpler code to work

Describe how A_upper is adjusted to allow this simpler code to work. (Hint: A_upper requires to be adjusted because A_lower will be sign-extended.)

  Connection between business and information system functions

Give a brief overview/answer of each: Involving individuals with various perspectives in system analysis and design activities and Connection between business and information system functions.

  Build linear models to represent relation advertising-brand

Build linear models to represent the relation between advertising and brand preference for these two groups. What preferences would the models predict for advertising of $60 million?

  Find companies that specialize in computer forensics

What needs clarified? it's plainly stated use google to find 3 companies that specialize in computer forensics of those 3 companies write 2 or 3 paragraphs comparing what each company does.

  How technology contributed to modern theatre

How has technology contributed to modern theatre? If you have seen play or musical recently, analyze how technology contributed to its production.

  Explaining binary normalization shift-and-subtract

Convert input arguments to binary. Binary normalization shift-and-subtract.

  Guidelines to pre-test the designed survey

One of the guidelines is to pre-test the designed survey on a few participants to see what might be unclear or weak in the survey design.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd