Wednesday 26 August 2015

Chapter 3: Image File Formats

Multimedia Technology

Chapter 3: Image File Formats


This chapter discusses various Image file formats, JPG, GIF, PNG, TIF, Difference between JPG vs GIF vs PNG.

Lecture Contents:

  • Graphical Raster Devices
  • Popular file Formats
  • Graphical Image File Format (GIFF)
  • JPEG / JPG
  •  JPEG vs GIF
  • Portable Graphics Network (PNG)
  • Comparision between JPG vs. PNG
  • Tagged Image file Format (TIFF)
  • Exchange Image File (EXIF)
  • System Dependent File Formats

GIF (GIF87A, GIF89A)

 Graphics Interchange Format (GIF) devised by the UNISYS Corp. And Compuserve, initially for transmitting graphical images over phone lines via modems.
GIF standard is limited to only 8-bit (256) colour images, suitable for images with few distinctive colours (e.g., graphics drawing). One byte per pixel.
GIF reduces colors to 256 (256 from 224 colors). Uses a colour map of 256 possible RGB values, contained in file. Only the 8 bit index is transmitted for each pixel that contains the closest match color to the original one.
Supports interlacing. - successive display of pixels in widely-spaced rows by a 4-pass display process.

 JPEG / JPG

JPEG: The most important current standard for image compression.
A standard for photographic image compression created by the Joint Photographics Experts Group
• Takes advantage of limitations in the human vision system to achieve high rates of compression.
•JPEG allows the user to set a desired level of quality, or compression ratio (input divided by output).
• Lossy compression which allows user to set the desired level of quality/ compression.

PNG

PNG stands for Portable Network Graphics (PNG). The PNG format is intended as a replacement for GIF in the WWW and in image editing.
GIF uses LZW compression, which is patented by Unisys. All uses of GIF may have to pay royalties to Unisys - PNG contains no patented technology.
PNG uses unpatented zip technology for compression
Provides transparency using alpha value.
2 Dimensional interlacing.  

TIFF

Tagged Image File Format (TIFF), stores many different types of images
(e.g., monochrome, greyscale, 8-bit & 24-bit RGB, etc.) –> tagged
• The support for attachment of additional information (referred to as \tags") provides a great deal of flexibility.
• Developed by the Aldus Corp. in the 1980’s and later supported by the Microsoft
The most important tag is a format signifier: what type of compression etc. is in use in the stored image.
• TIFF is a lossless format (but now a new JPEG tag allows one to opt for JPEG compression).
• It does not provide any major advantages over JPEG and is not as user controllable it appears to be declining in popularity

EXIF ( NOW NEF)

 (Exchang  Image File) is an image format for digital cameras:
1. Compressed EXIF _les use the baseline JPEG format.
2. A variety of tags (many more than in TIFF) are available to facilitate higher quality printing, since information about the camera and picture-taking conditions (flash, exposure, light source, white balance, type of scene, etc.) can be stored and used by printers for possible color correction algorithms.
3. The EXIF standard also includes specification of file format for audio that accompanies digital images. As well, it also supports tags for information needed for conversion to FlashPix (initially developed by Kodak).


Chapter 3_ Images File Formats

Chapter 4, Color in Images and Video

Multimedia Technology

Chapter 4, Color in Images and Video



Contents Of Lecture

  • Color Science: Light and Spectra
  •  Spectrophotometer
  • Human Vision
  • Color
  • The Eye
  • Color Blindness
  • RGB - Additive Color
  • HSB Model
  • CMYK Model
  • Printing Press Process
  • Color Gamut
  • CLUT OR Palette
  • History Of Colour
  • Properties and Attributes of Color 

  Color, Color properties, history of Color, RGB, CMYK 


RED
(High Voltage, I am Available, Only you can see, I will tease you, don’t touch me)
       Fire
       Blood
       Energy
       War
       Danger
       Strength
       Power
       Passion
       Love
       Desire
       Anger

Light red represents joy, passion, sensitivity, and love. Pink signifies romance, love, and friendship. It denotes feminine qualities and passiveness.

Dark red is associated with vigor, willpower, rage, anger, leadership, courage, longing, malice, and wrath.
 
Brown suggests stability and denotes masculine qualities.
Reddish brown is associated with harvest and fall


Orange (Creativity, Attraction, success you will get,  Young)
—Joy
—Sunshine
—enthusiasm
—Fascination
—happiness
—Creativity
—determination 
•attraction
•success
•encouragement
•stimulation 
Dark orange can mean deceit and distrust.
Red-orange corresponds to desire, pleasure, domination, aggression, and thirst for action.
Gold evokes the feeling of prestige. The meaning of gold is illumination, wisdom, and wealth. Gold often symbolizes high quality.


Yellow (Sunshine, New Dawn, Intellect, Happiness)
  warming effect
  arouses cheerfulness
  generates muscle energy
  honor
  loyalty
  cowardice
  Dull (dingy) yellow represents caution, decay, sickness, and jealousy.
Light yellow is associated with intellect, freshness, and joy.


Green (Nature, healing power, hope )
  Growth
  Harmony
  Freshness
  Fertility
  Emotion Safety
  Pure Money
  hope

Dark green is associated with ambition, greed, and jealousy.
Yellow-green can indicate sickness, cowardice, discord, and jealousy.
Aqua is associated with emotional healing and protection.
Olive green is the traditional color of peace

Blue (Future, Dream, Depth Stability)
  trust
  Loyalty
  Wisdom
  Confidence
  intelligence
  faith
  Truth
  Heaven
  Sea
  Sky
  Ocean Depth

Light blue is associated with health, healing, tranquility, understanding, and softness.
Dark blue represents knowledge, power, integrity, and seriousness.


Purple (Power, Nobility, Luxury, can’t beat me)
  Wealth
  Extravagance
  Wisdom
  Dignity
  Independence
  Creativity
  Mystery
  Magic
  Royalty
  Artificial

Light purple evokes romantic and nostalgic feelings.
Dark purple evokes gloom and sad feelings. It can cause frustration.


White (God, Pure, Truth, Mother, I will be there for you)
  Goodness
  Innocence
  Purity
  color of perfection
  Safety
  Cleanliness
  Spirit
  Coolness
  Hospitals
  Doctors
  Sterility


What ever it takessss , whatever heart breakssss, I will be right there waiting for you. La..la.lala……lalalala
(a song…)

Black (Death, Evil)
  Power
  Elegance
  Formality
  Death
  Evil
  Mystery
  Fear
  Black holes
  Negative strength and  authority
  Grief
  Sorrow
  Pain

I will destroy you, break you, give you pain, not leave you alone


 

New Website For Lecture Notes

Zeeshan Academy - Website

Hello Dear friends and Students.

I have set-up another website for easily access and downloading of my Class Lectures and Slides.
kindly see the link below. I will try to upload notes on this blog also.

This is an Online Free Academy which provides free resources and training through Video Lectures, Notes and Tutorials all provided digitally to the students. This academy is specially targeted for the students of Pakistan and thus most of the lectures are in URDU and SINDHI along with various lectures in English also. 

Currently we are working on various subjects including Computer Graphics, Animation, MAYA, 3Ds Max, MEL (Maya Embedded Language), Multimedia Technology, and Java Programming.
This academy is formed by Zeeshan Bhatti, a PhD student and researcher in the discipline of Information Technology at Kulliyyah of information and Communication Technology, International Islamic University Malaysia (IIUM) and LECTURER at Institute of Information and Communication Technology, University of Sindh, Jamshoro, Pakistan.

https://sites.google.com/site/drzeeshanacademy

https://sites.google.com/site/drzeeshanacademy


Wednesday 19 August 2015

Installing Multiple OS with dual Boot

Installing Windows 8 with Dual Boot.

In this lecture, We would cover Creating Partition and installing OS on separate partition to run multiple operating systems. We would learn how to install Windows 8 as a dual boot operating system along with any previous version of windows OS.
Typically the process starts with creating a an additional partition on your hard disk. To create the additional partition on your disk, Locate Disk management tool in your control panel. Then, in next step you need to Shrink the c: drive to create partitions. Now specify the size of new partition, and click shrink. 

NOTE: FOR WINDOWS 8, MINIMUM REQUIRED SIZE IS 20 GB.

Now follow the steps on the partition wizard.  MAKE SURE TO USE ALL THE AVAILABLE SPACE FOR THE NEW PARTITION. Use  the default drive letter which is shown to you, as this is highly Recommended. Please also keep in view, that the partition format for windows 8 MUST be of NTFS type, otherwise windows 8 will not install in FAT file system.
    • Creating Partitions on Windows
  • Setting Partitions Format
  • Installing Windows from USB or DVD
  • Choose Multiple Operating Systems
  •   Finalizing Installation

INSTALLING WINDOWS FROM USB OR DVD

Insert USB pen drive or DVD in system and reboot your computer.
At start up, press f2, or f9,or f10, or what ever is the key to launch BIOS. From Bios Change your boot order to USB, or DVD drive, Save and Quit Boot manager.If asked press any key to boot from USB or DVD drive.
CLICK INSTALL NOW TO BEGIN. and now simple follow the  instruction.

For detailed step by step instruction, see the presentation below.

Lecture: 1 - Installing Windows 7

Installing Windows 7

Basic Step by Step Guide

This is the first lecture from the course System Administration, in this lecture we will learn the basic process of how to install Windows 7 on any computer. In this lecture we will cover following topics
  • Planning the Installation
  • 32-bit or 64-bit Version
  • Type of Installation
  • Beginning the Installation Process
  • The Installation Process
  • Choose Custom or Upgrade option
  • Creating Hard disk Partitions
  • Finalizing the Installation

PLANNING THE INSTALLATION

 Planning for your Windows 7 installation:
  • Check System Requirements
  • Check Hardware and Software Compatibility
  • Determine Disk Partitioning Options
  • Complete a Pre-Installation Checklist

Microsoft states the minimum recommended specs for Windows 7:
  • 1 GHz 32-bit or 64-bit processor
  • 1 GB of system memory
  • 16 GB of available disk space
  • Support for DirectX 9 graphics with 128 MB memory (to enable the Aero theme)
  • DVD-R/W Drive
  • Internet access (to activate and get updates)

 32-BIT OR 64-BIT VERSION?

The Windows 7 installation disc package includes both 32-bit and 64-bit versions of Windows 7.
Basically, the 64-bit version of Windows handles large amounts of random access memory (RAM) more effectively than a 32-bit system. So if you plan on using Windows 7 on a computer with more than 3 GB or RAM, I would strongly suggest using the 64-bit version.
Most programs designed for the 32-bit version of Windows will work on the 64-bit version of Windows

Note:
Either way, you cannot use an existing 32-bit version of a previous OS to perform an in-place upgrade to a 64-bit version of Windows 7, and you'll need to format and install a fresh copy.
Also, you cannot use an existing 64-bit version of a previous OS to perform an in-place upgrade to a 32-bit version of Windows 7.

TYPE OF INSTALLATION

 Basically, there are 2 approaches to installing Windows 7:

Upgrade (In-place upgrade) - This option replaces your current version of Windows with Windows 7, and keeps your files, settings, and programs in place on your computer.

Custom ("fresh" installation) - This option replaces your current version of Windows with Windows 7, but doesn't preserve your files, settings, and programs. It's sometimes referred to as a clean installation for that reason.

As always, a fresh installation is much better and I strongly recommend taking that track.


 BEGINNING THE INSTALLATION PROCESS

To follow the installation, follow the step by step given in my lecture Slides below


Session 1_Lecture 1 - Installing Windows 7

Network Configuration: Lecture 6 - Peer to Peer Network

System Administration

Module 2:  Lecture 6:

Network Configuration: Peer to Peer Network

Sharing Files In Windows 7 and XP

Sharing folders between two Windows 7 machines with the new Home Group feature is an easy process, but the Home Group feature is not compatible with Vista or XP.  For this tutorial we are using Windows 7 and XP Professional SP3 connected through a basic wireless router.

  • First make sure both machines are
    •     members of the same Workgroup
    •    which by default is named WORKGROUP.
 
  • On the Windows 7 machine go into Control Panel \ All Control Panel Items \ Network and Sharing Center then click on Change advanced sharing settings.
You will want to verify the following settings under Advanced Sharing Settings for the Home or Work and Public profile.

Network Configuration: Ledcture 4 - Internet Explorer Settings

System Administration

Module 2, Lecture 4

Network Configuration: Internet Explorer Settings


In this lecture we will be discussing  how to setup
  • Internet Explorer Settings. 
  • General Settings of IE
  • Browser Security Settings 
  • Dial-up Connection Settings
  • LAN Connection Settings

Network Configuration: Lecture 5 - Peer to Peer Network

System Administration

Module 2: Lecture 5:

Network Configuration: Peer to Peer Network

Creating Peer-to-Peer Network between two PCs

What is Local Area Connection
 LAN (Local Area Network) card will automatically install when you setup windows 7.
LAN connection is required when you want to share your pc with others in your Home Group.
Supposes you have two Laptop/Pc and you want to connect them for some purpose say playing multiplayer games  or to access another Pc ,just setup Local Area Connection.
You can connect your Pc to your friends Pc no meter how far the distance, using LAN with Straight Cable connection.


 In Advance Network Sharing Settings

 There are two Network types:
  • For Home or work Network,
  • Turn on Network Discovery
  • Turn on file and printer sharing
  • Turn on public folder sharing.....
  • Enable file sharing for device........
  • Allow windows to manage.
For Public or all Network Types
  • Turn on Network Discovery
  • Turn on file and printer sharing
  • Turn on public folder sharing.....
  • Enable file sharing for device........
  • Turn off password protected sharing.

 IP address

Click Use the following IP address

IP address: Give your IP address i.e.
       PC-1 = 192.168.0.10
       PC-2 = 192.168.0.11


Subnet mask: Just press tab it will automatically generate.
    (Default-255.255.255.0)

Subnet mask has to be same for both computers.
  • Click use the following DNS server address and leave it blank.( no need to set IP here)
  • Click ok.

 Test the connection by pinging. You can do this by typing ping 192.168.0.10 or whichever is the IP of PC, in the command prompt

 Enable Internet sharing

 In Ethernet properties window, under the Sharing tab, enable both options to share internet between both Pcs.

Now you can use Internet from both PC-1 and PC-2 from a single connection.
Note: You can also setup password protected internet sharing, if you insist for the advance sharing options discussed earlier.

File Sharing

 After connecting the two PCs with LAN cable, now go to Explorer and double click on Network icon, to find the PCs that has shared some files, and you can access it like a normal disk drive.

 Converting your laptop into WI-FI router

 Connectify is an easy to use software router for Windows computers that utilizes your PC’s built in Wi-Fi card to wirelessly share any available Internet connection with friends, co-workers, and mobile devices

 Download and install a free copy of Connectify.(Click Here to Download)

Look for the Connectify logo in your notification tray and open it.

Give your network a name in the "WiFi Name" field. Type your choice of password in the "Passphrase" field. Choose the Ethernet connection you wish to share in the "Internet" drop down menu. Note that you can also share an incoming wireless connection.

Press the "Hotspot On" button to start sharing.

 Using Bluetooth to transfer files

  1.  Turn On Bluetooth/WiFI from laptop, a Bluetooth notification icon will appear in your system tray.
  2. Right Click on it to access Settings
  3. Make sure you have turned Discovery On (It allow others to see your computer)
  4. Switch On the Bluetooth on the mobile device.
To transfer files from PC to Mobile

There are different methods by which you can send files.
You have the option of selecting the tray icon and then select Send a file or alternatively you can Right Click on the file and select Send To. Both the method sending files may or may not be available with every Bluetooth system.

 1. Hit Win + R, type in fsquirt and hit Ok.

Hit Browse for searching the device and select your device in the next window.
Module 2_Lecture 5 - Network Configuration - Peer to Peer Network

Network Configuration: Lecture 3 - LAN Setup

System Administration

Module 2: Lecture 3:

Network Configuration: LAN Setup

10BaseT Ethernet Setup

To connect a 10BaseT Ethernet network:
  • Install a network interface card (NIC) into each computer (host)
  • Connect each NIC to a hub or switch, using unshielded twisted pair (UTP) cabling
Hub:
  • Every frame received by a hub is reproduced on all of it’s ports
Switch (or Cable/DSL Router):
  • Every frame received by a switch is examined, and the correct port is determined for the frame
  • A Cable/DSL also provides network address translation (NAT)

LAN network cable connection

Generally LAN cables are called Unshielded Twisted Pair. There are two cable systems.
  • Straight cable.
  • Crossed cable.
The straight and crossed cable systems are shown below:

 802.11g Wireless Setup

 To setup a 802.11g wireless network:
  • Install an 802.11g (or 802.11b) NIC into each host
  • Plug a wireless router or base station into your Internet connection (e.g. cable modem)
  • Configure the SSID and security protocols on the wireless router and each of the NICs
    • e.g. WPA encryption, and specify the key

  Ad Hoc Wireless Networks

 If you have only a few hosts (2-3), you can create an ad hoc network
  • This type of network does not have a base station (or wireless router)
  • The hosts communicate directly with one another

 Wireless Networks Comment

A wireless network connection is often not useful for a desktop PC
  • For this reason, wireless routers typically contain a few Ethernet ports
  • It is typical to have desktop PCs wired, and notebooks and PDAs will have wireless
  • e.g. Notebooks with 802.11g and PDAs with 802.11b

 Packet Sniffers

 Packet sniffers are a useful tool for exploration of networking
  • They can also be used by network programmers to diagnose packet format errors
They typically examine many protocols
  • This includes the header informationm e.g. Wireless, Ethernet, TCP/IP, HTTP
Some common packet sniffers are:
  • Ethereal (Linux/Mac/Windows, multi-protocol)
  • TCPDump (Linux/Windows, TCP/IP)
  • Kismet (Linux, wireless)

 Ethereal Tutorial

Here is how to sniff packets using Ethereal:
  • Start Ethereal
  • Select the correct network interface
  • Start capturing packets, stop when done
  • Select a packet from the list
  • Examine the packet hierarchy and header information, such as:
    • Ethernet or wireless frame headers
    • IP datagram headers
    • TCP datagram headers
    • SMTP message

Module 2_Lecture 3 - Network Configuration - LAN Setup

Network Configuration: Lecture 2 - Troubleshooting Network

System Administration

Module 2:  Lecture 2:

Network Configuration: Troubleshooting Networks

 Troubleshooting Networks

How to Determine Network Configuration or Hardware Problems
A network admin’s job is not just to set up a network, but maintain it
  • Thus, if anything goes wrong, the admin should track down the problem somehow
  • The problem may be a configuration error, which the admin should fix
  • The problem may be a hardware failure, which can only be fixed by repairing or replacing the hardware
  • Nevertheless, the admin must determine which hardware has failed, so this can happen
 A Typical Scenario :
A user calls up the network admin, saying their network connection is down
  • For most non-technical users, even this clear of a statement of the problem might not be possible
  • A network admin will eventually figure at least this much out from the user’s comments

Step 1: Test Local Connectivity


First, an admin will try to connect to a local computer
           cmd% ping frankie.csfac8.uwindsor.ca
          ping: unknown host frankie.csfac8.uwindsor.ca
This could mean DNS servers are unavailable
  • The admin should check the DNS server addresses, and the servers

Next, the admin will make sure the IP address works
      cmd% ping 137.207.140.93
     Destination host unreachable.
     Destination host unreachable.
     Destination host unreachable.


This could mean no connectivity
  • The admin should check the configuration settings (ipconfig, netconfig, network-admin)
  • However, if the ping command responds from a router that a host is unreachable, the node may actually be unreachable, or the address may not be bound
Obviously, we have connectivity since the router sent a message to us

 How Ping Works

Ping works by sending an ICMP Echo Request to the destination. The destination sends back an ICMP Echo Reply to the host. The host records the round trip time, and repeats the process a few times.

 A Problem With Ping

 ICMP Echo Requests are often disabled in some networks
  • This is due to denial of service attacks that use ICMP Echo Request/Reply
In these networks, ping will not work

 Step 2: Test Remote Connectivity

 First, an admin will try to connect to a local computer
              cmd% ping www.google.ca
             ping: unknown host www.google.ca

This could be a routing problem
  • Most likely the routing problem is within the organization
  • The network administrator should check the route using the traceroute (traceroute, tracert) command

Testing Routes

 The traceroute command can give the logical addresses of each router in a route
  • It may also tell you if there is a problem with the route
In Windows (2000/XP):
           tracert www.google.ca

In Linux/Solaris:
          traceroute www.google.ca

 How Does Traceroute Work?

Traceroute sends either a UDP or ICMP Echo packet to the destination
  • Initially, the hop limit is set to 1, which causes the first router to drop the packet
    • Routers, however, will respond with an ICMP Time Exceeded error message, which contains the router’s IP address
    • The process is repeated a few times to get a few round trip times
    • The domain name of the IP address is found (for convenience of the network admin)
  • Next, the process is repeated with a hop limit of 2
    • Then 3, 4, etc. until the destination host is reached

 The Windows Network Diagnostic Commands

 Ipconfig

Ipconfig is a Console Command which can be issued to the Command Line Interpreter (or command prompt) to display the network settings currently assigned to any or all network adapters in the machine. This command can be utilized to verify a network connection as well as to verify your network settings.

 Netstat

Displays active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP protocols), and IPv6 statistics (for the IPv6, ICMPv6, TCP over IPv6, and UDP over IPv6 protocols). Used without parameters, netstat displays active TCP connections.

Tracert

The tracert command is used to visually see a network packet being sent and received and the amount of hops required for that packet to get to its destination.
Users with Microsoft Windows 2000 and Windows XP who need additional information network latency and network loss should also consider using the patching command.

Ping

Helps in determining TCP/IP Networks IP address as well as determine issues with the network and assists in resolving them.

Pathping

Provides information about network latency and network loss at intermediate hops between a source and destination. Pathping sends multiple Echo Request messages to each router between a source and destination over a period of time and then computes results based on the packets returned from each router.

Nslookup

Displays information that you can use to diagnose Domain Name System (DNS) infrastructure. Before using this tool, you should be familiar with how DNS works. The Nslookup command-line tool is available only if you have installed the TCP/IP protocol.






Module 2_Lecture 2 - Network Configuration - Troubleshooting Networks

Network Configuration: Lecture 1 - TCP/IP

System Administration

Module 2:  Lecture 1:

Network Configuration: TCP/IP Configuration

TCP/IP  configuration,

Step 1: From the Start menu, right-click Network, then select Properties.
 
Figure: Result: The Network and Sharing Center displays.

OR
right-click on the Network Icon inn the system tray and select “Open network and Sharing Center” option

Changing LAN card settings

 On the left-hand side of the window, click the Change adapter settings link.
Result: The Network Connections window displays.

Right click on the correct Local Area Connection, then select Properties.
Result: The Local Area Connection Properties window displays.

Select Internet Protocol Version 4 (TCP/IPv4) so that it is highlighted, then click the Properties button.


Result: The Internet Protocol Version 4 (TCP/IPv4) Properties window displays.
Note: Do not un-check the box; doing so will disable the Internet Protocol and prevent connection to the Internet.

From the General tab, verify that Obtain an IP address automatically and Obtain DNS server address automatically are selected.
Click the Advanced button.
Result: The Advanced TCP/IP Settings window displays.

Change IP setting

From the IP Settings tab, verify the following: Under IP addresses, DHCP Enabled is listed.
Under Default gateways, nothing is listed. Automatic metric is checked



Change DNS setting

From the DNS tab, verify the following:

The DNS server addresses box is empty.

Append primary and connection specific DNS suffixes is selected.

Append parent suffixes of the primary DNS suffix is checked.

Register this connection’s addresses in DNS is checked.

Append these DNS suffixes (in order) is not selected



Change WINS setting

 From the WINS tab, verify the following:
The WINS addresses box is empty.
Enable LMHOSTS lookup is checked.
Default: Use NetBIOS setting from the DHCP server is selected.


Click the OK button to close the Advanced TCP/IP Settings window.



From the Alternate Configuration tab, verify that Automatic private IP address is selected.




 Click the OK button to close the Internet Protocol Version 4 (TCP/IPv4) Properties window.
You will be prompted to restart the computer.


 

Featured post

Addmision are open

  Offering Professional Courses in the field of  Multimedia, Animation and Graphics