The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Video streaming over the internet for new 3D immersive media such as Virtual Reality and 360-degree videos has drawn great attention from both consumers and researchers in recent years. One of the biggest challenges in streaming such 3D media is the high bandwidth demands. While traditional 2D video streaming is still dominating network peak traffic, new inventions are accelerating the adoption of...
With the progress of technology and widespread use of internet, the data has become digital. It is getting easier day by day to copy, modify and transform digital data / applications into another form. The term of digital rights management (DRM) has been suggested to limit the use of data in digital media and to protect copyrights. Different architectures / technologies are used to provide DRM. In...
This paper presents signaling architecture models and protocol procedures for SDN-based wireless access networks with Media Independent Management (MIM) capabilities. Three models are described for the framework of SDN and MIM controls, which are decoupled interworking, loosely-coupled integration, and tightly-coupled integration between SDN and MIM controls.
Many BitTorrent clients are using these networks as a video-on-demand service, taking advantage of the popularity and the enormity of the collection of media available. However, it is a common sense that transforming the swarms into an on-demand media service causes serious damage to the overall network performance, given that streamer clients modify the method of downloading determined in the protocol...
The rapid growth in market demands for high-quality, state-of-the-art, and reliable communication services increases the amount of session-control signaling, which is mainly based on the Session Initiation Protocol (SIP). Many research activities dealing with the Quality of Service (QoS) have been focused on media-related service components, whereas signaling-related service components have received...
With the increasing of mobile devices, Device-to-Device(D2D) communication is considered as a promising technology for achieving direct communication of devices. But the security issues still remain to be solved. In this paper, We utilize D2D communication between UEs in proximity to share epidemic media contents. We propose a Secure Content Sharing Protocol(SCSP) that combine with the credibility...
We examined if interactions with remote controlled plush media (stuffed animals) have different emotional impacts from those with video call applications. We compared autonomic reactions to interaction between them by the analyses of heart rate and heart rate variability.
This paper describes a flexible multimedia stack which provides media content from number of different streaming protocols. The main goal is to facilitate and accelerate integration with different TV and Set Top Box platforms. Presented solution can be used on Android as well as on Linux based systems. Advantages of this solution are unified data flow and processing of media data. It provides elementary...
Live media streaming applications are increasingly popular, with services such as Twitch.tv and YouNow being used by millions of people. Deploying such services on the cloud can be very expensive, as the cost is proportional to the amount of data transferred to the users. However, adopting a much less costly peer-to-peer (P2P) solution may reduce the overall quality-of-service (QoS) experienced by...
In this paper, the suboptimal control problem is addressed for a class of discrete time-varying systems subjected to the stochastic communication protocol (SCP). The measurements provided by the sensors are transmitted through the communication channel and then fed into the controller. The SCP is utilized to select the sensor getting access to the communication media. In presence of the nonlinearities,...
In Compressive Sensing (CS)-based cryptographic mechanisms, the measurement matrix is treated as a secret key (secret CS-matrix), so that the encryption and/or the generation of authentication codes are performed during the compressed sampling process. If the secret CS-matrix is used once for each signal, only the key management is required for the effective use of CS-based cryptographic operations...
Designers tend to have repetitive design strategy in the process without notices. The elements setting the interactive function is to conform the user requirement and it can improve the user experiences. Although it has many information recorded on the paper, but via the think-aloud we can find out many implicit information. Then, we can go through the sketch to understand how we define the visualize...
Despite the importance of rigorous testing data for evaluating face recognition algorithms, all major publicly available faces-in-the-wild datasets are constrained by the use of a commodity face detector, which limits, among other conditions, pose, occlusion, expression, and illumination variations. In 2015, the NIST IJB-A dataset, which consists of 500 subjects, was released to mitigate these constraints...
A cloud server spent a lot of time, energy and money to train a Viola-Jones type object detector [1] with high accuracy. Clients can upload their photos to the cloud server to find objects. However, the client does not want the leakage of the content of his/her photos. In the meanwhile, the cloud server is also reluctant to leak any parameters of the trained object detectors. 10 years ago, Avidan...
Given the prevalence of social media websites, one challenge facing computer vision researchers is to devise methods to search for persons of interest among the billions of shared photos on these websites. Despite significant progress in face recognition, searching a large collection of unconstrained face images remains a difficult problem. To address this challenge, we propose a face search system...
Many BitTorrent (BT) clients are using these BT networks as a video-on-demand service, taking advantage of the popularity and the large collection of media available. However, transforming the swarms into an on-demand media service can cause serious damage to the overall network performance. In this paper, we propose a methodology, using the concepts of Entropy, and present a Spy BitTorrent client...
Device-to-device (D2D) communication has been widely studied to improve network performance and been considered as a potential technological component for the next generation communication. As Quality of Experience (QoE) is the major determining factor for the media service, we aim at promoting user's QoE Mean of Score (MOS) value for dynamic cellular networks. In this paper, we focus on the problem...
The broadcasting industry has recently begun to adopt statistical multiplexing based network platform in their workflow to support professional live audio/video (AV) transmission instead of the Time Division Multiplexing (TDM) based system. These audio-over-packet switched systems require a carefully designed and managed network to ensure key quality measures of the real-time (RT) media, such as low...
IP telephony has evolved following a structure inherited from traditional telephony, that is, a relay-based, station to station model. This philosophy has deeply influenced the evolution of the traditional support protocols, SIP/SDP. However, with the emergence of an embedded form of voice and video communications, supported by new platforms such as WebRTC, other models for user communications become...
Internet of things in broader sense and importance on protocols, technologies and application along related issues, is a collection of application and information mining system to naturally find and assembled data from web archives and administrations which can be in organized, unstructured or semi-organized form. Accuracy and relevance of information extracting from the internet is the most significant...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.