Results (47)
Search Parameters:
Keyword: StreamEfficient Deep Learning-Based Viewport Estimation for 360-Degree Video Streaming
While Virtual reality is becoming more popular, 360-degree video transmission over the Internet is challenging due to the video bandwidth. Viewport Adaptive Streaming (VAS) was proposed to reduce the network capacity demand of 360-degree video by transmitting lower quality video for the parts of the video that are not in the current viewport. Understanding how…
Read MoreEnhanced Dynamic Cross Layer Mechanism for real time HEVC Streaming over Vehicular Ad-hoc Networks (VANETs)
Various applications have helped make vehicular Ad-hoc network communication a reality. Real-time applications, for example, need broadcasting in high video quality with minimal latency. The new High-Efficiency Video Coding (HEVC) has shown great promise for real-time video transmission through Vehicle Ad-hoc Networks due to its high compression level. These networks, on the other hand, have…
Read MoreEnhancing Decision Trees for Data Stream Mining
Data stream gained obvious attention by research for years. Mining this type of data generates special challenges because of their unusual nature. Data streams flows are continuous, infinite and with unbounded size. Because of its accuracy, decision tree is one of the most common methods in classifying data streams. The aim of classification is to…
Read MoreData Stream Summary in Big Data Context: Challenges and Opportunities
With the advent of Big Data, we are witnessing a rapid and varied production of huge amounts of sequential data that can have multiple dimensions, we speak of data streams. The characteristics of these data streams make their processing and storage very difficult and at the same time reduce the possibilities of querying them a…
Read MoreOptimized Multi-Core Parallel Tracking for Big Data Streaming Applications
Efficient real-time clustering is a relevant topic in big data streams. Data stream clustering needs necessarily a short time execution frame with bounded memory utilizing a one-scan process. Because of the massive volumes and dynamics of data streams, parallel clustering solutions are urgent. This paper presents a new approach for this trend, with advantages to…
Read MoreQoE-aware Bandwidth Allocation for Multiple Video Streaming Players over HTTP and SDN
For many years, the most popular technique for Internet video streaming is hypertext transfer protocol-based adaptive streaming, known as HAS (HTTP Adaptive Streaming). However, a seamless viewing experience can not be just simply guaranteed by HAS only. In the management network, the adaptation of HAS copes with a huge challenge since client- driven schemes lead…
Read MoreFast Stream Cipher based Chaos Neural Network for Data Security in CAN Bus
Vehicle systems are controlled by embedded electronic devices called electronic control units (ECUs). These ECUs are connected together with network protocols. The Controller Area Network (CAN) protocol is widely implemented due to its high fault tolerance. However, the CAN is a serial broadcast bus, and it has no protection against security threats. In this paper,…
Read MoreStream Cipher by Reed-Solomon Codes
Stream cipher can be used in constrained environments to provide information security and reduce energy expense at data transmission. In this paper, it is shown that Reed-Solomon (RS) code can be used to implement stream cipher, which is widely used for error corrections of data in transmission and storages. The proposed stream cipher combines the…
Read MoreCyclical Wave Bolt for Sound Waves in a Gas Stream
This article is devoted to the problem of blocking the propagation of sound in a gas stream. This can be useful in the problems of pipeline acoustics and the design of automotive silencers, when it is necessary to ensure the opacity of the boundary (cross section of the pipe) for sound simultaneously with the free…
Read MoreThree-Pass Protocol Implementation in Vigenere Cipher Classic Cryptography Algorithm with Keystream Generator Modification
Vigenere Cipher is one of the classic cryptographic algorithms and included into symmetric key cryptography algorithm, where to encryption and decryption process use the same key. Vigenere Cipher has the disadvantage that if key length is not equal to the length of the plaintext, then the key will be repeated until equal to the plaintext…
Read MorePrivate 5G MIMO for Cable TV IP Broadcasting
Private 5G utilization by cable TV is expected to be an alternative to wired services, especially for multi-dwelling units and rural communal TV receiving areas. On the other hand, the 100 MHz of the sub-6 frequency band for private 5G is not sufficient for cable TV services consisting of multi-channel broadcasting and Internet, and some…
Read MoreHardware and Secure Implementation of Enhanced ZUC Steam Cipher Based on Chaotic Dynamic S-Box
Despite the development of the Internet and wired networks such as fiber optics, mobile networks remain the most used thanks to the mobility they offer to the user. However, data protection in these networks is more complex because of the radio channels they use for transmission. Hence,there is a need to find more sophisticated data…
Read MoreTrue Random Number Generator Implemented in ReRAM Crossbar Based on Static Stochasticity of ReRAMs
True Random Number Generators (TRNG) find applications in various fields, especially hardware security. We suggest a TRNG that exploits the intrinsic static stochasticity of Resistive Switching Random Access Memories (ReRAMs) to generate random bits. Other suggested designs use stochasticity in the switching mechanism, which requires high precision over input voltage and time. In the proposed…
Read MoreEnhancing Cloud Security: A Comprehensive Framework for Real-Time Detection, Analysis and Cyber Threat Intelligence Sharing
Cloud computing has emerged as a pivotal component of contemporary IT systems, affording organizations the agility and scalability required to meet the ever-changing demands of business. However, this technological evolution has introduced a new era of cybersecurity challenges, as attackers employ increasingly sophisticated strategies to breach cloud networks. Such breaches can have far-reaching consequences, including…
Read MoreTransmission of the CAP Protocol through the ISDB-T Standard
Early warning systems have had a significant impact on society by providing timely information to mitigate the effects of natural disasters. To enhance early warning capabilities, researchers are exploring the use of digital terrestrial television systems to broadcast alerts across large urban and rural areas. In this research project, the aim is to integrate the…
Read MoreA Self-Adaptive Routing Algorithm for Real-Time Video Transmission in VANETs
Given the strict Quality of Experience (QoE) and Quality of Service (QoS) criteria for video transmission, such as delivery ratio, transmission delay, and mean opinion Score (MOS), video streaming is one of the hardest challenges in Vehicular Ad-Hoc Networks (VANETs). Additionally, VANET attributes, including environmental impediments, fluctuating vehicle density, and highly dynamic topology, have an…
Read MoreSecured Multi-Layer Blockchain Framework for IoT Aggregate Verification
Technologies designed for digital provenance, especially the Internet of Things (IoT) and blockchain, may allow for security, transparency, and traceability in the global supply chain. However, upstream nodes in the supply chain that work for large-scale production suppliers are not considered. In addition, most IoT blockchain systems adopt an ID-based signature scheme that may affect…
Read MoreAcoustic Scene Classifier Based on Gaussian Mixture Model in the Concept Drift Situation
The data distribution used in model training is assumed to be similar with that when the model is applied. However, in some applications, data distributions may change over time. This situation is called the concept drift, which might decrease the model performance because the model is trained and evaluated in different distributions. To solve this…
Read MoreQuantum Secure Lightweight Cryptography with Quantum Permutation Pad
Quantum logic gates represent certain quantum operations to perform quantum computations. Of those quantum gates, there is a category of classical behavior gates called quantum permutation gates. As a quantum algorithm, quantum permutation pad or QPP consists of multiple quantum permutation gates to be implemented both in a quantum computing system as a quantum circuit…
Read MorePerformance of Vertical Axis Wind Turbine Type of Slant Straight Blades
There is no doubt that energy is one of the most important requirements of life, and its importance increases with the passage of time, and this is what make countries to harness the capabilities and scientists in developing energy systems of all kinds, one of the most important energy systems these days is what is…
Read MoreActivity-Based Cost Estimation Model for The Extrusion of Variant Aluminum Profiles
A competitive manufacturing environment dictates to be conscious of the real cost of production to increase profitability, to have a precise cost estimation, and to avoid cost distortion. Activity-Based Costing (ABC) is one choice to achieve these objectives. This paper aims to build an ABC method, consequently, to explore its application for a local Aluminum…
Read MoreA Review of Plastic Waste Management Practices: What Can South Africa Learn?
Municipal Solid Waste (MSW) is composed of items that are discarded or disposed of daily including paper, plastics, glass, metals, used gadgets, paint and old furniture. The plastic waste stream has proven to be problematic to manage sustainably on a global scale. Various researchers are trying to come up with innovative ways of alleviating the…
Read MoreActual Traffic Based Load-Aware Dynamic Point Selection for LTE-Advanced System
Coordinated MultiPoint (CoMP) has been introduced for LTE-Advanced system to overcome the inter-cell interference problems and enhance the signal quality of cell-edge UEs (User Equipments). With such concept, the overall system performance should be improved considerably to support the significantly increasing amount of demand on data transmission via mobile communication that happens nowadays. Dynamic Point…
Read MoreA Hybrid NMF-AttLSTM Method for Short-term Traffic Flow Prediction
In view of the current short-term traffic flow prediction methods that fail to fully consider the spatial correlation of traffic flow, and fail to make full use of historical data features, resulting in low prediction accuracy and poor robustness. Therefore, in paper, combining Non-negative Matrix Factorization (NMF) and LSTM model Based on Attention Mechanism (AttLSTM),…
Read MoreEvaluation the Effects of Climate Change on the Flow of the Arkansas River – United States
The behavior of rivers’ hydrology and flow under changing climate has been an objective of interest for long time. In this study the impacts of climate change on streamflow of the Arkansas River will be investigated. The paper is an extension of work originally presented in ASET conference in Dubai. The Arkansas River is a…
Read More
