SlideShare a Scribd company logo
1 of 27
Introduction  Principles of Multimedia Systems Sethserey SAM Computer Science Department
`
Multimedia System ,[object Object],[object Object],[object Object]
Challenges of Multimedia Computing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Multimedia is Multidisciplinary Image, audio, speech processing Computer vision, pattern recognition Computer networks, operating system Human computer  interaction Computer graphics Multimedia computing
Example Multimedia Systems  Real Estate  in MIT’s Project Athena
Example Multimedia Systems Chronoscope  in MIT’s Project Athena
Example Multimedia Systems Navigation   Learning Environment  in MIT’s Project Athena
Example Multimedia Systems Photosynth of Microsoft Live Labs.
Multimedia Computing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data Compression Raw image takes about 6M bytes (without header information) 24k bytes with jpeg, Q=50
“JPEG” Illustration r g b Transform to frequency domain Quantization Lossless compression … 0010001 …. decoder r’ g’ b’ u v
Media Processing and Analysis ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Tracking Object by Image Matching
Multiple Object Tracking  Toys Squash Lab Double Squash
Finding Objects in Clutter
Object Recognition David G. Lowe,  "Object recognition from local scale-invariant features,"  ICCV99.
Posture Detection in Images Template Image
Dealing with Multiple Objects
 
Finding Action Clusters in Image Database
Finding Action Clusters (con’t)
Action Recognition video1 video2 Ramanan, D., Forsyth, D. A., Zisserman, A. " Strike a Pose: Tracking People by Finding Stylized Poses. "  Computer Vision and Pattern Recognition  (CVPR), San Diego, CA, June 2005. video3
Media Delivery ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Multimedia Database and Indexing ,[object Object],[object Object],[object Object]
Useful Resources ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Q & A

More Related Content

What's hot

Cloud-Based Multimedia Content Protection System
Cloud-Based   Multimedia   Content  Protection  SystemCloud-Based   Multimedia   Content  Protection  System
Cloud-Based Multimedia Content Protection Systemreshma reshu
 
Machine Learning Meetup SOF: Intro to ML
Machine Learning Meetup SOF: Intro to MLMachine Learning Meetup SOF: Intro to ML
Machine Learning Meetup SOF: Intro to MLImagga Technology
 
A robust watermarking algorithm based on image normalization and dc coefficients
A robust watermarking algorithm based on image normalization and dc coefficientsA robust watermarking algorithm based on image normalization and dc coefficients
A robust watermarking algorithm based on image normalization and dc coefficientsHarshal Ladhe
 
ESWC SS 2013 - Monday Keynote Stefan Decker: From Linked Data to Networked Kn...
ESWC SS 2013 - Monday Keynote Stefan Decker: From Linked Data to Networked Kn...ESWC SS 2013 - Monday Keynote Stefan Decker: From Linked Data to Networked Kn...
ESWC SS 2013 - Monday Keynote Stefan Decker: From Linked Data to Networked Kn...eswcsummerschool
 
KIoT - Kit for the internet of things
KIoT - Kit for the internet of thingsKIoT - Kit for the internet of things
KIoT - Kit for the internet of thingscarlo zapponi
 
Internet of Things: Concepts and Technologies
Internet of Things: Concepts and TechnologiesInternet of Things: Concepts and Technologies
Internet of Things: Concepts and TechnologiesPayamBarnaghi
 
An Approach for Securing Voice Communication via Image Watermarking Technique
An Approach for Securing Voice Communication via Image Watermarking TechniqueAn Approach for Securing Voice Communication via Image Watermarking Technique
An Approach for Securing Voice Communication via Image Watermarking TechniqueCSCJournals
 
IoT-Lite: A Lightweight Semantic Model for the Internet of Things
IoT-Lite:  A Lightweight Semantic Model for the Internet of ThingsIoT-Lite:  A Lightweight Semantic Model for the Internet of Things
IoT-Lite: A Lightweight Semantic Model for the Internet of ThingsPayamBarnaghi
 

What's hot (9)

Cloud-Based Multimedia Content Protection System
Cloud-Based   Multimedia   Content  Protection  SystemCloud-Based   Multimedia   Content  Protection  System
Cloud-Based Multimedia Content Protection System
 
Machine Learning Meetup SOF: Intro to ML
Machine Learning Meetup SOF: Intro to MLMachine Learning Meetup SOF: Intro to ML
Machine Learning Meetup SOF: Intro to ML
 
A robust watermarking algorithm based on image normalization and dc coefficients
A robust watermarking algorithm based on image normalization and dc coefficientsA robust watermarking algorithm based on image normalization and dc coefficients
A robust watermarking algorithm based on image normalization and dc coefficients
 
Mc 004
Mc 004Mc 004
Mc 004
 
ESWC SS 2013 - Monday Keynote Stefan Decker: From Linked Data to Networked Kn...
ESWC SS 2013 - Monday Keynote Stefan Decker: From Linked Data to Networked Kn...ESWC SS 2013 - Monday Keynote Stefan Decker: From Linked Data to Networked Kn...
ESWC SS 2013 - Monday Keynote Stefan Decker: From Linked Data to Networked Kn...
 
KIoT - Kit for the internet of things
KIoT - Kit for the internet of thingsKIoT - Kit for the internet of things
KIoT - Kit for the internet of things
 
Internet of Things: Concepts and Technologies
Internet of Things: Concepts and TechnologiesInternet of Things: Concepts and Technologies
Internet of Things: Concepts and Technologies
 
An Approach for Securing Voice Communication via Image Watermarking Technique
An Approach for Securing Voice Communication via Image Watermarking TechniqueAn Approach for Securing Voice Communication via Image Watermarking Technique
An Approach for Securing Voice Communication via Image Watermarking Technique
 
IoT-Lite: A Lightweight Semantic Model for the Internet of Things
IoT-Lite:  A Lightweight Semantic Model for the Internet of ThingsIoT-Lite:  A Lightweight Semantic Model for the Internet of Things
IoT-Lite: A Lightweight Semantic Model for the Internet of Things
 

Similar to Introduction

Multimediaexercise
MultimediaexerciseMultimediaexercise
MultimediaexerciseRony Mohamed
 
Emerging database technology multimedia database
Emerging database technology   multimedia databaseEmerging database technology   multimedia database
Emerging database technology multimedia databaseSalama Al Busaidi
 
AI-MiguelGonzalez.pdf
AI-MiguelGonzalez.pdfAI-MiguelGonzalez.pdf
AI-MiguelGonzalez.pdfFIWARE
 
Chapter 1-Introduction to Media-Past, Present and Future.ppt
Chapter 1-Introduction to Media-Past, Present and Future.pptChapter 1-Introduction to Media-Past, Present and Future.ppt
Chapter 1-Introduction to Media-Past, Present and Future.pptVasanthiMuniasamy2
 
VIZBI 2015 Tutorial: Cytoscape, IPython, Docker, and Reproducible Network Dat...
VIZBI 2015 Tutorial: Cytoscape, IPython, Docker, and Reproducible Network Dat...VIZBI 2015 Tutorial: Cytoscape, IPython, Docker, and Reproducible Network Dat...
VIZBI 2015 Tutorial: Cytoscape, IPython, Docker, and Reproducible Network Dat...Keiichiro Ono
 
Intrusive Images, Neural Mechanisms, And Treatment...
Intrusive Images, Neural Mechanisms, And Treatment...Intrusive Images, Neural Mechanisms, And Treatment...
Intrusive Images, Neural Mechanisms, And Treatment...Angie Lee
 
Strata 2017 (San Jose): Building a healthy data ecosystem around Kafka and Ha...
Strata 2017 (San Jose): Building a healthy data ecosystem around Kafka and Ha...Strata 2017 (San Jose): Building a healthy data ecosystem around Kafka and Ha...
Strata 2017 (San Jose): Building a healthy data ecosystem around Kafka and Ha...Shirshanka Das
 
Building a healthy data ecosystem around Kafka and Hadoop: Lessons learned at...
Building a healthy data ecosystem around Kafka and Hadoop: Lessons learned at...Building a healthy data ecosystem around Kafka and Hadoop: Lessons learned at...
Building a healthy data ecosystem around Kafka and Hadoop: Lessons learned at...Yael Garten
 
Science Big, Science Connected
Science Big, Science ConnectedScience Big, Science Connected
Science Big, Science ConnectedDeepak Singh
 
DIP Using Image Encryption and XOR Operation Affine Transform
DIP Using Image Encryption and XOR Operation Affine TransformDIP Using Image Encryption and XOR Operation Affine Transform
DIP Using Image Encryption and XOR Operation Affine Transformiosrjce
 
Redundancy avoidance for big data in data centers a conventional neural netwo...
Redundancy avoidance for big data in data centers a conventional neural netwo...Redundancy avoidance for big data in data centers a conventional neural netwo...
Redundancy avoidance for big data in data centers a conventional neural netwo...nexgentechnology
 
Evaluation Of Proposed Design And Necessary Corrective Action
Evaluation Of Proposed Design And Necessary Corrective ActionEvaluation Of Proposed Design And Necessary Corrective Action
Evaluation Of Proposed Design And Necessary Corrective ActionSandra Arveseth
 

Similar to Introduction (20)

Multimediaexercise
MultimediaexerciseMultimediaexercise
Multimediaexercise
 
Emerging database technology multimedia database
Emerging database technology   multimedia databaseEmerging database technology   multimedia database
Emerging database technology multimedia database
 
Unit 1
Unit 1Unit 1
Unit 1
 
AI-MiguelGonzalez.pdf
AI-MiguelGonzalez.pdfAI-MiguelGonzalez.pdf
AI-MiguelGonzalez.pdf
 
Guru_poster
Guru_posterGuru_poster
Guru_poster
 
Chapter 1-Introduction to Media-Past, Present and Future.ppt
Chapter 1-Introduction to Media-Past, Present and Future.pptChapter 1-Introduction to Media-Past, Present and Future.ppt
Chapter 1-Introduction to Media-Past, Present and Future.ppt
 
2018 learning approach-digitaltrends
2018 learning approach-digitaltrends2018 learning approach-digitaltrends
2018 learning approach-digitaltrends
 
VIZBI 2015 Tutorial: Cytoscape, IPython, Docker, and Reproducible Network Dat...
VIZBI 2015 Tutorial: Cytoscape, IPython, Docker, and Reproducible Network Dat...VIZBI 2015 Tutorial: Cytoscape, IPython, Docker, and Reproducible Network Dat...
VIZBI 2015 Tutorial: Cytoscape, IPython, Docker, and Reproducible Network Dat...
 
Intrusive Images, Neural Mechanisms, And Treatment...
Intrusive Images, Neural Mechanisms, And Treatment...Intrusive Images, Neural Mechanisms, And Treatment...
Intrusive Images, Neural Mechanisms, And Treatment...
 
Emerging Technologies 3.0
Emerging Technologies 3.0Emerging Technologies 3.0
Emerging Technologies 3.0
 
Strata 2017 (San Jose): Building a healthy data ecosystem around Kafka and Ha...
Strata 2017 (San Jose): Building a healthy data ecosystem around Kafka and Ha...Strata 2017 (San Jose): Building a healthy data ecosystem around Kafka and Ha...
Strata 2017 (San Jose): Building a healthy data ecosystem around Kafka and Ha...
 
Building a healthy data ecosystem around Kafka and Hadoop: Lessons learned at...
Building a healthy data ecosystem around Kafka and Hadoop: Lessons learned at...Building a healthy data ecosystem around Kafka and Hadoop: Lessons learned at...
Building a healthy data ecosystem around Kafka and Hadoop: Lessons learned at...
 
Science Big, Science Connected
Science Big, Science ConnectedScience Big, Science Connected
Science Big, Science Connected
 
Information_Systems
Information_SystemsInformation_Systems
Information_Systems
 
B017250715
B017250715B017250715
B017250715
 
DIP Using Image Encryption and XOR Operation Affine Transform
DIP Using Image Encryption and XOR Operation Affine TransformDIP Using Image Encryption and XOR Operation Affine Transform
DIP Using Image Encryption and XOR Operation Affine Transform
 
Deep dive in to modern it technology
Deep dive in to modern it technologyDeep dive in to modern it technology
Deep dive in to modern it technology
 
Redundancy avoidance for big data in data centers a conventional neural netwo...
Redundancy avoidance for big data in data centers a conventional neural netwo...Redundancy avoidance for big data in data centers a conventional neural netwo...
Redundancy avoidance for big data in data centers a conventional neural netwo...
 
Interaction Paradigms
Interaction ParadigmsInteraction Paradigms
Interaction Paradigms
 
Evaluation Of Proposed Design And Necessary Corrective Action
Evaluation Of Proposed Design And Necessary Corrective ActionEvaluation Of Proposed Design And Necessary Corrective Action
Evaluation Of Proposed Design And Necessary Corrective Action
 

More from Kh Ravy

7. evalution of interactive system
7. evalution of interactive system7. evalution of interactive system
7. evalution of interactive systemKh Ravy
 
6. io device
6. io device6. io device
6. io deviceKh Ravy
 
5. ergonomic of www interface
5. ergonomic of www interface5. ergonomic of www interface
5. ergonomic of www interfaceKh Ravy
 
4. ergonomic of wimp interface
4. ergonomic of wimp interface4. ergonomic of wimp interface
4. ergonomic of wimp interfaceKh Ravy
 
Planification de projet de gestion de concours
Planification de  projet  de gestion de concoursPlanification de  projet  de gestion de concours
Planification de projet de gestion de concoursKh Ravy
 
Multimedia outline
Multimedia outlineMultimedia outline
Multimedia outlineKh Ravy
 
Concept ofinternet web_f2010211
Concept ofinternet web_f2010211Concept ofinternet web_f2010211
Concept ofinternet web_f2010211Kh Ravy
 

More from Kh Ravy (9)

Love u
Love uLove u
Love u
 
7. evalution of interactive system
7. evalution of interactive system7. evalution of interactive system
7. evalution of interactive system
 
6. io device
6. io device6. io device
6. io device
 
5. ergonomic of www interface
5. ergonomic of www interface5. ergonomic of www interface
5. ergonomic of www interface
 
4. ergonomic of wimp interface
4. ergonomic of wimp interface4. ergonomic of wimp interface
4. ergonomic of wimp interface
 
Planification de projet de gestion de concours
Planification de  projet  de gestion de concoursPlanification de  projet  de gestion de concours
Planification de projet de gestion de concours
 
Lec2
Lec2Lec2
Lec2
 
Multimedia outline
Multimedia outlineMultimedia outline
Multimedia outline
 
Concept ofinternet web_f2010211
Concept ofinternet web_f2010211Concept ofinternet web_f2010211
Concept ofinternet web_f2010211
 

Recently uploaded

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Recently uploaded (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Introduction