SlideShare a Scribd company logo
Advance Database Management Systems :45
Spatial and Multimedia Databases
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
Slide 24- 2
Spatial and Multimedia Databases
• Spatial Database Concepts
• Multimedia Database Concepts
Slide 24- 3
Spatial Databases
Spatial Database Concepts
• Keep track of objects in a multi-dimensional
space
– Maps
– Geographical Information Systems (GIS)
– Weather
• In general spatial databases are n-dimensional
– This discussion is limited to 2-dimensional spatial
databases
Slide 24- 4
Spatial Databases
Spatial Database Concepts
• Typical Spatial Queries
– Range query: Finds objects of a particular type within a
particular distance from a given location
• E.g., Taco Bells in Pleasanton, CA
– Nearest Neighbor query: Finds objects of a particular type that
is nearest to a given location
• E.g., Nearest Taco Bell from an address in Pleasanton, CA
– Spatial joins or overlays: Joins objects of two types based on
some spatial condition (intersecting, overlapping, within certain
distance, etc.)
• E.g., All Taco Bells within 2 miles from I-680.
Slide 24- 5
Spatial Databases
Spatial Database Concepts
• R-trees
– Technique for typical spatial queries
– Group objects close in spatial proximity on the
same leaf nodes of a tree structured index
– Internal nodes define areas (rectangles) that cover
all areas of the rectangles in its subtree.
• Quad trees
– Divide subspaces into equally sized areas
Slide 24- 6
Multimedia Databases
Multimedia Database Concepts
• In the years ahead multimedia information
systems are expected to dominate our daily lives.
– Our houses will be wired for bandwidth to handle
interactive multimedia applications.
– Our high-definition TV/computer workstations will
have access to a large number of databases, including
digital libraries, image and video databases that will
distribute vast amounts of multisource multimedia
content.
Slide 24- 7
Multimedia Databases
• Types of multimedia data are available in
current systems
– Text: May be formatted or unformatted. For ease
of parsing structured documents, standards like
SGML and variations such as HTML are being
used.
– Graphics: Examples include drawings and
illustrations that are encoded using some
descriptive standards (e.g. CGM, PICT, postscript).
Slide 24- 8
Multimedia Databases
• Types of multimedia data are available in
current systems (contd.)
– Images: Includes drawings, photographs, and so
forth, encoded in standard formats such as
bitmap, JPEG, and MPEG. Compression is built into
JPEG and MPEG.
• These images are not subdivided into components.
Hence querying them by content (e.g., find all images
containing circles) is nontrivial.
– Animations: Temporal sequences of image or
graphic data.
Slide 24- 9
Multimedia Databases
• Types of multimedia data are available in
current systems (contd.)
– Video: A set of temporally sequenced
photographic data for presentation at specified
rates– for example, 30 frames per second.
– Structured audio: A sequence of audio
components comprising note, tone, duration, and
so forth.
Slide 24- 10
Multimedia Databases
• Types of multimedia data are available in
current systems (contd.)
– Audio: Sample data generated from aural
recordings in a string of bits in digitized form.
Analog recordings are typically converted into
digital form before storage.
Slide 24- 11
Multimedia Databases
• Types of multimedia data are available in
current systems (contd.)
– Composite or mixed multimedia data: A
combination of multimedia data types such as
audio and video which may be physically mixed to
yield a new storage format or logically mixed while
retaining original types and formats. Composite
data also contains additional control information
describing how the information should be
rendered.
Slide 24- 12
Multimedia Databases
• Nature of Multimedia Applications:
– Multimedia data may be stored, delivered, and
utilized in many different ways.
– Applications may be categorized based on their
data management characteristics.
Assignment
• Explain the importance of multimedia
databases
Ad

More Related Content

Similar to Adbms 45 spatial and multimedia databases (20)

Multimedia system, Architecture & Databases
Multimedia system, Architecture & DatabasesMultimedia system, Architecture & Databases
Multimedia system, Architecture & Databases
Harshita Ved
 
ch1.pdf
ch1.pdfch1.pdf
ch1.pdf
acornacorn
 
MULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKSMULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKS
Kathirvel Ayyaswamy
 
Multimedia Information Systems in Information Technology
Multimedia Information Systems in Information TechnologyMultimedia Information Systems in Information Technology
Multimedia Information Systems in Information Technology
goldnick18
 
Module 6
Module 6Module 6
Module 6
ryanette
 
Unit 4 and 5
Unit 4 and 5Unit 4 and 5
Unit 4 and 5
Guruchellam
 
Current trends in DBMS
Current trends in DBMSCurrent trends in DBMS
Current trends in DBMS
Swatanu Satpathy
 
Hypermedia Systems
Hypermedia SystemsHypermedia Systems
Hypermedia Systems
daniyalqureshi712
 
MultimediaSystem_Sistemamultimedia_.pptx
MultimediaSystem_Sistemamultimedia_.pptxMultimediaSystem_Sistemamultimedia_.pptx
MultimediaSystem_Sistemamultimedia_.pptx
ticipe
 
Mutimedia databases
Mutimedia databasesMutimedia databases
Mutimedia databases
Spoorthi Sham
 
The digital preservation technical context
The digital preservation technical contextThe digital preservation technical context
The digital preservation technical context
Michael Day
 
Creating Media Stories, SSSW July 13
Creating Media Stories, SSSW July 13Creating Media Stories, SSSW July 13
Creating Media Stories, SSSW July 13
Lynda Hardman
 
Television News Search and Analysis with Lucene/Solr
Television News Search and Analysis with Lucene/SolrTelevision News Search and Analysis with Lucene/Solr
Television News Search and Analysis with Lucene/Solr
UCLA Social Sciences Computing
 
Introduction to databasecasmfnbskdfjnfkjsdnsjkdfn
Introduction to databasecasmfnbskdfjnfkjsdnsjkdfnIntroduction to databasecasmfnbskdfjnfkjsdnsjkdfn
Introduction to databasecasmfnbskdfjnfkjsdnsjkdfn
aj01bhisma
 
Multimedia database
Multimedia databaseMultimedia database
Multimedia database
SumitKeshri10
 
Digitization Projects for Small Archives and Museums
Digitization Projects for Small Archives and MuseumsDigitization Projects for Small Archives and Museums
Digitization Projects for Small Archives and Museums
Anna Naruta-Moya
 
Module 1 - Chapter1.pptx
Module 1 - Chapter1.pptxModule 1 - Chapter1.pptx
Module 1 - Chapter1.pptx
SoniaDevi15
 
Mms intro
Mms introMms intro
Mms intro
ryanette
 
Moving forward data centric sciences weaving AI, Big Data & HPC
Moving forward data centric sciences  weaving AI, Big Data & HPCMoving forward data centric sciences  weaving AI, Big Data & HPC
Moving forward data centric sciences weaving AI, Big Data & HPC
Genoveva Vargas-Solar
 
MultiMedia_BASICS_slides.pdf
MultiMedia_BASICS_slides.pdfMultiMedia_BASICS_slides.pdf
MultiMedia_BASICS_slides.pdf
BazilMucunguzi
 
Multimedia system, Architecture & Databases
Multimedia system, Architecture & DatabasesMultimedia system, Architecture & Databases
Multimedia system, Architecture & Databases
Harshita Ved
 
MULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKSMULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKS
Kathirvel Ayyaswamy
 
Multimedia Information Systems in Information Technology
Multimedia Information Systems in Information TechnologyMultimedia Information Systems in Information Technology
Multimedia Information Systems in Information Technology
goldnick18
 
MultimediaSystem_Sistemamultimedia_.pptx
MultimediaSystem_Sistemamultimedia_.pptxMultimediaSystem_Sistemamultimedia_.pptx
MultimediaSystem_Sistemamultimedia_.pptx
ticipe
 
The digital preservation technical context
The digital preservation technical contextThe digital preservation technical context
The digital preservation technical context
Michael Day
 
Creating Media Stories, SSSW July 13
Creating Media Stories, SSSW July 13Creating Media Stories, SSSW July 13
Creating Media Stories, SSSW July 13
Lynda Hardman
 
Introduction to databasecasmfnbskdfjnfkjsdnsjkdfn
Introduction to databasecasmfnbskdfjnfkjsdnsjkdfnIntroduction to databasecasmfnbskdfjnfkjsdnsjkdfn
Introduction to databasecasmfnbskdfjnfkjsdnsjkdfn
aj01bhisma
 
Digitization Projects for Small Archives and Museums
Digitization Projects for Small Archives and MuseumsDigitization Projects for Small Archives and Museums
Digitization Projects for Small Archives and Museums
Anna Naruta-Moya
 
Module 1 - Chapter1.pptx
Module 1 - Chapter1.pptxModule 1 - Chapter1.pptx
Module 1 - Chapter1.pptx
SoniaDevi15
 
Moving forward data centric sciences weaving AI, Big Data & HPC
Moving forward data centric sciences  weaving AI, Big Data & HPCMoving forward data centric sciences  weaving AI, Big Data & HPC
Moving forward data centric sciences weaving AI, Big Data & HPC
Genoveva Vargas-Solar
 
MultiMedia_BASICS_slides.pdf
MultiMedia_BASICS_slides.pdfMultiMedia_BASICS_slides.pdf
MultiMedia_BASICS_slides.pdf
BazilMucunguzi
 

More from Vaibhav Khanna (20)

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
Vaibhav Khanna
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
Vaibhav Khanna
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
Vaibhav Khanna
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
Vaibhav Khanna
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
Vaibhav Khanna
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
Vaibhav Khanna
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication code
Vaibhav Khanna
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
Vaibhav Khanna
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
Vaibhav Khanna
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
Vaibhav Khanna
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
Vaibhav Khanna
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
Vaibhav Khanna
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
Vaibhav Khanna
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
Vaibhav Khanna
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
Vaibhav Khanna
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
Vaibhav Khanna
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbers
Vaibhav Khanna
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
Vaibhav Khanna
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
Vaibhav Khanna
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple des
Vaibhav Khanna
 
Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
Vaibhav Khanna
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
Vaibhav Khanna
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
Vaibhav Khanna
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
Vaibhav Khanna
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
Vaibhav Khanna
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
Vaibhav Khanna
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication code
Vaibhav Khanna
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
Vaibhav Khanna
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
Vaibhav Khanna
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
Vaibhav Khanna
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
Vaibhav Khanna
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
Vaibhav Khanna
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
Vaibhav Khanna
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
Vaibhav Khanna
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
Vaibhav Khanna
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
Vaibhav Khanna
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbers
Vaibhav Khanna
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
Vaibhav Khanna
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
Vaibhav Khanna
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple des
Vaibhav Khanna
 
Ad

Recently uploaded (20)

Hydraulic Modeling And Simulation Software Solutions.pptx
Hydraulic Modeling And Simulation Software Solutions.pptxHydraulic Modeling And Simulation Software Solutions.pptx
Hydraulic Modeling And Simulation Software Solutions.pptx
julia smits
 
Do not let staffing shortages and limited fiscal view hamper your cause
Do not let staffing shortages and limited fiscal view hamper your causeDo not let staffing shortages and limited fiscal view hamper your cause
Do not let staffing shortages and limited fiscal view hamper your cause
Fexle Services Pvt. Ltd.
 
S3 + AWS Athena how to integrate s3 aws plus athena
S3 + AWS Athena how to integrate s3 aws plus athenaS3 + AWS Athena how to integrate s3 aws plus athena
S3 + AWS Athena how to integrate s3 aws plus athena
aianand98
 
How to Troubleshoot 9 Types of OutOfMemoryError
How to Troubleshoot 9 Types of OutOfMemoryErrorHow to Troubleshoot 9 Types of OutOfMemoryError
How to Troubleshoot 9 Types of OutOfMemoryError
Tier1 app
 
Download 4k Video Downloader Crack Pre-Activated
Download 4k Video Downloader Crack Pre-ActivatedDownload 4k Video Downloader Crack Pre-Activated
Download 4k Video Downloader Crack Pre-Activated
Web Designer
 
Serato DJ Pro Crack Latest Version 2025??
Serato DJ Pro Crack Latest Version 2025??Serato DJ Pro Crack Latest Version 2025??
Serato DJ Pro Crack Latest Version 2025??
Web Designer
 
File Viewer Plus 7.5.5.49 Crack Full Version
File Viewer Plus 7.5.5.49 Crack Full VersionFile Viewer Plus 7.5.5.49 Crack Full Version
File Viewer Plus 7.5.5.49 Crack Full Version
raheemk1122g
 
!%& IDM Crack with Internet Download Manager 6.42 Build 32 >
!%& IDM Crack with Internet Download Manager 6.42 Build 32 >!%& IDM Crack with Internet Download Manager 6.42 Build 32 >
!%& IDM Crack with Internet Download Manager 6.42 Build 32 >
Ranking Google
 
Passive House Canada Conference 2025 Presentation [Final]_v4.ppt
Passive House Canada Conference 2025 Presentation [Final]_v4.pptPassive House Canada Conference 2025 Presentation [Final]_v4.ppt
Passive House Canada Conference 2025 Presentation [Final]_v4.ppt
IES VE
 
A Comprehensive Guide to CRM Software Benefits for Every Business Stage
A Comprehensive Guide to CRM Software Benefits for Every Business StageA Comprehensive Guide to CRM Software Benefits for Every Business Stage
A Comprehensive Guide to CRM Software Benefits for Every Business Stage
SynapseIndia
 
Applying AI in Marketo: Practical Strategies and Implementation
Applying AI in Marketo: Practical Strategies and ImplementationApplying AI in Marketo: Practical Strategies and Implementation
Applying AI in Marketo: Practical Strategies and Implementation
BradBedford3
 
Troubleshooting JVM Outages – 3 Fortune 500 case studies
Troubleshooting JVM Outages – 3 Fortune 500 case studiesTroubleshooting JVM Outages – 3 Fortune 500 case studies
Troubleshooting JVM Outages – 3 Fortune 500 case studies
Tier1 app
 
NYC ACE 08-May-2025-Combined Presentation.pdf
NYC ACE 08-May-2025-Combined Presentation.pdfNYC ACE 08-May-2025-Combined Presentation.pdf
NYC ACE 08-May-2025-Combined Presentation.pdf
AUGNYC
 
How I solved production issues with OpenTelemetry
How I solved production issues with OpenTelemetryHow I solved production issues with OpenTelemetry
How I solved production issues with OpenTelemetry
Cees Bos
 
Wilcom Embroidery Studio Crack Free Latest 2025
Wilcom Embroidery Studio Crack Free Latest 2025Wilcom Embroidery Studio Crack Free Latest 2025
Wilcom Embroidery Studio Crack Free Latest 2025
Web Designer
 
Memory Management and Leaks in Postgres from pgext.day 2025
Memory Management and Leaks in Postgres from pgext.day 2025Memory Management and Leaks in Postgres from pgext.day 2025
Memory Management and Leaks in Postgres from pgext.day 2025
Phil Eaton
 
User interface and User experience Modernization.pptx
User interface and User experience  Modernization.pptxUser interface and User experience  Modernization.pptx
User interface and User experience Modernization.pptx
MustafaAlshekly1
 
The-Future-is-Hybrid-Exploring-Azure’s-Role-in-Multi-Cloud-Strategies.pptx
The-Future-is-Hybrid-Exploring-Azure’s-Role-in-Multi-Cloud-Strategies.pptxThe-Future-is-Hybrid-Exploring-Azure’s-Role-in-Multi-Cloud-Strategies.pptx
The-Future-is-Hybrid-Exploring-Azure’s-Role-in-Multi-Cloud-Strategies.pptx
james brownuae
 
Buy vs. Build: Unlocking the right path for your training tech
Buy vs. Build: Unlocking the right path for your training techBuy vs. Build: Unlocking the right path for your training tech
Buy vs. Build: Unlocking the right path for your training tech
Rustici Software
 
Lumion Pro Crack + 2025 Activation Key Free Code
Lumion Pro Crack + 2025 Activation Key Free CodeLumion Pro Crack + 2025 Activation Key Free Code
Lumion Pro Crack + 2025 Activation Key Free Code
raheemk1122g
 
Hydraulic Modeling And Simulation Software Solutions.pptx
Hydraulic Modeling And Simulation Software Solutions.pptxHydraulic Modeling And Simulation Software Solutions.pptx
Hydraulic Modeling And Simulation Software Solutions.pptx
julia smits
 
Do not let staffing shortages and limited fiscal view hamper your cause
Do not let staffing shortages and limited fiscal view hamper your causeDo not let staffing shortages and limited fiscal view hamper your cause
Do not let staffing shortages and limited fiscal view hamper your cause
Fexle Services Pvt. Ltd.
 
S3 + AWS Athena how to integrate s3 aws plus athena
S3 + AWS Athena how to integrate s3 aws plus athenaS3 + AWS Athena how to integrate s3 aws plus athena
S3 + AWS Athena how to integrate s3 aws plus athena
aianand98
 
How to Troubleshoot 9 Types of OutOfMemoryError
How to Troubleshoot 9 Types of OutOfMemoryErrorHow to Troubleshoot 9 Types of OutOfMemoryError
How to Troubleshoot 9 Types of OutOfMemoryError
Tier1 app
 
Download 4k Video Downloader Crack Pre-Activated
Download 4k Video Downloader Crack Pre-ActivatedDownload 4k Video Downloader Crack Pre-Activated
Download 4k Video Downloader Crack Pre-Activated
Web Designer
 
Serato DJ Pro Crack Latest Version 2025??
Serato DJ Pro Crack Latest Version 2025??Serato DJ Pro Crack Latest Version 2025??
Serato DJ Pro Crack Latest Version 2025??
Web Designer
 
File Viewer Plus 7.5.5.49 Crack Full Version
File Viewer Plus 7.5.5.49 Crack Full VersionFile Viewer Plus 7.5.5.49 Crack Full Version
File Viewer Plus 7.5.5.49 Crack Full Version
raheemk1122g
 
!%& IDM Crack with Internet Download Manager 6.42 Build 32 >
!%& IDM Crack with Internet Download Manager 6.42 Build 32 >!%& IDM Crack with Internet Download Manager 6.42 Build 32 >
!%& IDM Crack with Internet Download Manager 6.42 Build 32 >
Ranking Google
 
Passive House Canada Conference 2025 Presentation [Final]_v4.ppt
Passive House Canada Conference 2025 Presentation [Final]_v4.pptPassive House Canada Conference 2025 Presentation [Final]_v4.ppt
Passive House Canada Conference 2025 Presentation [Final]_v4.ppt
IES VE
 
A Comprehensive Guide to CRM Software Benefits for Every Business Stage
A Comprehensive Guide to CRM Software Benefits for Every Business StageA Comprehensive Guide to CRM Software Benefits for Every Business Stage
A Comprehensive Guide to CRM Software Benefits for Every Business Stage
SynapseIndia
 
Applying AI in Marketo: Practical Strategies and Implementation
Applying AI in Marketo: Practical Strategies and ImplementationApplying AI in Marketo: Practical Strategies and Implementation
Applying AI in Marketo: Practical Strategies and Implementation
BradBedford3
 
Troubleshooting JVM Outages – 3 Fortune 500 case studies
Troubleshooting JVM Outages – 3 Fortune 500 case studiesTroubleshooting JVM Outages – 3 Fortune 500 case studies
Troubleshooting JVM Outages – 3 Fortune 500 case studies
Tier1 app
 
NYC ACE 08-May-2025-Combined Presentation.pdf
NYC ACE 08-May-2025-Combined Presentation.pdfNYC ACE 08-May-2025-Combined Presentation.pdf
NYC ACE 08-May-2025-Combined Presentation.pdf
AUGNYC
 
How I solved production issues with OpenTelemetry
How I solved production issues with OpenTelemetryHow I solved production issues with OpenTelemetry
How I solved production issues with OpenTelemetry
Cees Bos
 
Wilcom Embroidery Studio Crack Free Latest 2025
Wilcom Embroidery Studio Crack Free Latest 2025Wilcom Embroidery Studio Crack Free Latest 2025
Wilcom Embroidery Studio Crack Free Latest 2025
Web Designer
 
Memory Management and Leaks in Postgres from pgext.day 2025
Memory Management and Leaks in Postgres from pgext.day 2025Memory Management and Leaks in Postgres from pgext.day 2025
Memory Management and Leaks in Postgres from pgext.day 2025
Phil Eaton
 
User interface and User experience Modernization.pptx
User interface and User experience  Modernization.pptxUser interface and User experience  Modernization.pptx
User interface and User experience Modernization.pptx
MustafaAlshekly1
 
The-Future-is-Hybrid-Exploring-Azure’s-Role-in-Multi-Cloud-Strategies.pptx
The-Future-is-Hybrid-Exploring-Azure’s-Role-in-Multi-Cloud-Strategies.pptxThe-Future-is-Hybrid-Exploring-Azure’s-Role-in-Multi-Cloud-Strategies.pptx
The-Future-is-Hybrid-Exploring-Azure’s-Role-in-Multi-Cloud-Strategies.pptx
james brownuae
 
Buy vs. Build: Unlocking the right path for your training tech
Buy vs. Build: Unlocking the right path for your training techBuy vs. Build: Unlocking the right path for your training tech
Buy vs. Build: Unlocking the right path for your training tech
Rustici Software
 
Lumion Pro Crack + 2025 Activation Key Free Code
Lumion Pro Crack + 2025 Activation Key Free CodeLumion Pro Crack + 2025 Activation Key Free Code
Lumion Pro Crack + 2025 Activation Key Free Code
raheemk1122g
 
Ad

Adbms 45 spatial and multimedia databases

  • 1. Advance Database Management Systems :45 Spatial and Multimedia Databases Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 2. Slide 24- 2 Spatial and Multimedia Databases • Spatial Database Concepts • Multimedia Database Concepts
  • 3. Slide 24- 3 Spatial Databases Spatial Database Concepts • Keep track of objects in a multi-dimensional space – Maps – Geographical Information Systems (GIS) – Weather • In general spatial databases are n-dimensional – This discussion is limited to 2-dimensional spatial databases
  • 4. Slide 24- 4 Spatial Databases Spatial Database Concepts • Typical Spatial Queries – Range query: Finds objects of a particular type within a particular distance from a given location • E.g., Taco Bells in Pleasanton, CA – Nearest Neighbor query: Finds objects of a particular type that is nearest to a given location • E.g., Nearest Taco Bell from an address in Pleasanton, CA – Spatial joins or overlays: Joins objects of two types based on some spatial condition (intersecting, overlapping, within certain distance, etc.) • E.g., All Taco Bells within 2 miles from I-680.
  • 5. Slide 24- 5 Spatial Databases Spatial Database Concepts • R-trees – Technique for typical spatial queries – Group objects close in spatial proximity on the same leaf nodes of a tree structured index – Internal nodes define areas (rectangles) that cover all areas of the rectangles in its subtree. • Quad trees – Divide subspaces into equally sized areas
  • 6. Slide 24- 6 Multimedia Databases Multimedia Database Concepts • In the years ahead multimedia information systems are expected to dominate our daily lives. – Our houses will be wired for bandwidth to handle interactive multimedia applications. – Our high-definition TV/computer workstations will have access to a large number of databases, including digital libraries, image and video databases that will distribute vast amounts of multisource multimedia content.
  • 7. Slide 24- 7 Multimedia Databases • Types of multimedia data are available in current systems – Text: May be formatted or unformatted. For ease of parsing structured documents, standards like SGML and variations such as HTML are being used. – Graphics: Examples include drawings and illustrations that are encoded using some descriptive standards (e.g. CGM, PICT, postscript).
  • 8. Slide 24- 8 Multimedia Databases • Types of multimedia data are available in current systems (contd.) – Images: Includes drawings, photographs, and so forth, encoded in standard formats such as bitmap, JPEG, and MPEG. Compression is built into JPEG and MPEG. • These images are not subdivided into components. Hence querying them by content (e.g., find all images containing circles) is nontrivial. – Animations: Temporal sequences of image or graphic data.
  • 9. Slide 24- 9 Multimedia Databases • Types of multimedia data are available in current systems (contd.) – Video: A set of temporally sequenced photographic data for presentation at specified rates– for example, 30 frames per second. – Structured audio: A sequence of audio components comprising note, tone, duration, and so forth.
  • 10. Slide 24- 10 Multimedia Databases • Types of multimedia data are available in current systems (contd.) – Audio: Sample data generated from aural recordings in a string of bits in digitized form. Analog recordings are typically converted into digital form before storage.
  • 11. Slide 24- 11 Multimedia Databases • Types of multimedia data are available in current systems (contd.) – Composite or mixed multimedia data: A combination of multimedia data types such as audio and video which may be physically mixed to yield a new storage format or logically mixed while retaining original types and formats. Composite data also contains additional control information describing how the information should be rendered.
  • 12. Slide 24- 12 Multimedia Databases • Nature of Multimedia Applications: – Multimedia data may be stored, delivered, and utilized in many different ways. – Applications may be categorized based on their data management characteristics.
  • 13. Assignment • Explain the importance of multimedia databases
  翻译: