The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
MPEG DASH enables OTT delivery of media content to almost any device. From a commercial point of view, dynamic ad insertion plays a crucial role. For broadcasters, content owners and advertisers new opportunities open up as advertisement can be personalized and delivered to any device. We show different approaches for selecting personalized advertisements via ad decision servers. Moreover, we evaluate...
Increasing worldwide adoption of HbbTV (Hybrid Broadcast Broadband TV) and MPEG-DASH enables new opportunities for broadcasters and advertisers. The work described here introduces the technical foundations to allow broadband-delivered (IP) ads into broadcast delivered live content using the standards HbbTV and VAST. IP-delivered display and video ads can overlay or complement instream broadcast ads...
This paper is to present how to design and construct a fractal microstrip dipole antenna using Koch concepts. Multi-frequencies covering in a range from 175 MHz to 1.6 GHz are for example investigated by using different techniques and theoretical design principles of the iteration function system (IFS) and the curve fitting. Simulation and experimental results are shown and analyzed to study how possible...
A Short Message Service (SMS) is a popular mechanism to communicate. However, for an important purpose, a mechanism to protect SMS messages is needed so the SMS messages cannot be easily read by entities who are not permitted to see. Keeping an authentication of messages, and ensuring messages are received by a right entity are also an important aspect. Maintaining confidentiality of messages, by...
Movement of mobile station (MS) affects the signal received from the base transceiver system (BTS). Decreased signal reception conditions, if channel exposed to rain. Rain attenuation as color noise affects signal quality. Special signal quality in mobile networks mainly 3G network signal transmission can be grouped into the drizzling rain, stratiform, medium, heavy convective and storms, have the...
This paper presents a time division multiple access MAC protocol that is specifically designed for applications requiring periodic sensing of the sensor field. Numerical analysis is conducted to investigate the optimum transmission scheduling based on the signal to interference-noise-ratio (SINR) for ground level propagation model applied on wireless chain topology. The optimised transmission schedule...
The increasing number of attacks on computer networks has caused network securities were an important issue since the first network security breaches were discovered in 1980. Currently, the pattern of network attacks becomes more sophisticated and lead to difficulty in detecting the attacks. Failure to prevent the attacks makes privacy, data, and other network resources are threatened. There is numerous...
Crowd simulation is one of the important fields in computer graphics. It helps us develop an understanding of the complexity and the degree of crowd interactions of people in spaces over time. Many techniques have been introduced to simulate crowd, especially in the past few decades. These techniques often focus on emergency situations rather than simulating the more common normal conditions. Simulating...
The articulation between WebRTC and microservices deserves more attention and we argue that it could be highly promising. We illustrate it by the introduction, the analysis and the implementation of an innovative use case dedicated to the development of multimedia statements certified in a fair way. The generic character of this use case allows a rich set of instantiations covering various real life...
In a content-based image retrieval (CBIR) system, retrieval performance depends on the selected feature. Features extracted from images will be compared during the matching process. In this paper, we evaluate the retrieval performance of color-based descriptors derived from DC images. A DC image is a downscaled image generated by extracting the DC components of a JPEG-compressed image. DC images contain...
A wireless multimedia sensor network (WMSN) requires a video encoding system that should be energy-efficient because of its special characteristics: limited power source but long service life without maintenance. Motion estimation plays an important role in predictive coding, which is the key part of video encoding and requires large amount of calculation. In order to reduce the computational complexity...
the rapid growth of image capturing technology has generated the digital images, which have high resolution and large size. In general, the large sized image quality is better because it has higher color intensity, but data transmission is relatively slow or even failing. Image compression can improve the efficiency of storage space and transmission bandwidth usage. However, the image compression,...
Swap file has potentially interesting and rich source of digital evidences. Password, cryptographic key, private data and sensitive data can be found in the swap file. With a simple technique such as string matching, digital evidences can be easily found and identified. There is minimal research on swap file anti-forensics. We found that most of swap file anti-forensics techniques are still vulnerable...
With the advent of new technologies every day and with each technology more bandwidth intensive than the previous, The need for some transformative technology to coop with the bandwidth problem is ever growing. The current technologies like LTE uses MIMO, OFDM and coding techniques that have reached their limits and provide an almost theoretical efficiency but they also in the near future may be uanble...
Spectrum sensing is one of component in cognitive radio (CR). The sensing algorithm that usually used is the matched filter and the energy detector. Because there is a shortage in energy detector, which is very sensitive to noise power uncertainty. Then formed a new method based on the covariance matrix of the received signal. In this paper analysis on cognitive radio spectrum sensing using signal...
As we know, Cognitive Radio comes to improve the underutilization problem of available radio spectrum by using one of its functional called spectrum sensing. In this paper, we compare two methods between Fixed Sample Size Test and Sequential Detection specifically for spectrum sensing using OFDM signals with Gaussian noise. The compared parameter in this simulation is OFDM Average Block (AVB) which...
In recent years inductive power transfer (IPT) has become more and more important. From contactless charging of mobile phones or electric vehicles it will be increasingly seen in consumer electronics. In IPT systems power is contactlessly transferred over an air-gap by strongly coupled coils.
One of the major components of cognitive radio is its ability to detect the availability of unused spectrum. Detection for the presence or absence of the spectrum hole plays a very important role before the frequency spectrum is used. Previous research in the field of spectrum detection for cognitive radio has been done for the distributed detection using energy detector with 2-bit decision but its...
Automatic Speech Recognition (ASR) System is defined as transformation of acoustic speech signals to string of words. This paper presents an approach of ASR system based on isolated word structure using Mel-Frequency Cepstral Coefficients (MFCC's), Dynamic Time Wrapping (DTW) and K-Nearest Neighbor (KNN) techniques. The Mel-Frequency scale used to capture the significant characteristics of the speech...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.