In response to the growing demand for low-latency video streaming, this paper presents a demonstration of a hybrid unicast-broadcast video delivery system that combines 5G terrestrial broadcasting with over-the-top (O...
详细信息
ISBN:
(数字)9783903176669
ISBN:
(纸本)9798331505158
In response to the growing demand for low-latency video streaming, this paper presents a demonstration of a hybrid unicast-broadcast video delivery system that combines 5G terrestrial broadcasting with over-the-top (OTT) streaming methods. The demonstration features a scalable setup with an interactive dashboard, allowing users to experiment with various configurations and observe key metrics such as bandwidth usage, packet loss, buffer size, and live latency in real-time. Key techniques include Low-Latency DASH (LL-DASH) for HTTP Adaptive Streaming (HAS), packet recovery (PR) and Forward Error Correction (FEC) for reliability, Temporal Layer Injection (TLI) for enhanced quality, and Common Media Application Format (CMAF) with Chunked Transfer Encoding (CTE) for reduced latency. The demonstration shows that this scalable hybrid approach can effectively reduce unicast bandwidth to nearly 0 Mb/s in scenarios without packet loss on the broadcast network, and achieve similar bandwidth reductions in lossy broadcast networks with appropriate Forward Error Correction (FEC) settings, while maintaining a live latency lower than 1 second. These results demonstrate the system's potential for optimizing multimedia delivery, significantly reducing unicast bandwidth while maintaining low-latency streaming.
This paper proposes a visualization method for the mixed type of high-dimension and low sample-size (HDLSS) data. The data consists of both numerical and categorical data with respect to quantitative and qualitative v...
详细信息
This paper proposes a visualization method for the mixed type of high-dimension and low sample-size (HDLSS) data. The data consists of both numerical and categorical data with respect to quantitative and qualitative variables, and the number of variables is much larger than the number of objects. The proposed method can treat both types of data simultaneously in a lower dimensional space. From this, we can compare the two kinds of features obtained from the two types of data in the lower dimensional space. In addition, since this visualization can be obtained based on the mathematical theory of metric multidimensional scaling, the comparability is mathematically guaranteed. As a numerical example, we show how the devices used by students to perform activities of reading, writing, listening, and speaking English texts of different lengths are related to their English test scores. In this case, the choice of device is obtained as qualitative data, and the test scores are obtained as quantitative data. In order to visually obtain these relationships, the two must be mathematically comparable in the same low-dimensional space. With the proposed method, we have achieved this and shown that it is possible to interpret the relationship between the two.
Detection. Watermarking techniques can be classified based on various criteria, such as visibility, fragility, application domain, and extraction methods. However, their performance degrades against certain forgery at...
详细信息
ISBN:
(数字)9798331519513
ISBN:
(纸本)9798331519520
Detection. Watermarking techniques can be classified based on various criteria, such as visibility, fragility, application domain, and extraction methods. However, their performance degrades against certain forgery attacks due to specific algorithmic loopholes. To deal with this issue, an in-depth performance evaluation and gap analysis of the latest invisible image watermarking schemes is presented in this paper. Then we propose an enhancement in terms of defining and using secret keys for the process of watermarking to improve temper detection and its localization against forgery attacks. First comprehensive testing is conducted regarding the imperceptibility and temper detection capability of these watermarking schemes against copy-paste, object deletion, text addition, and collage attacks. This testing results in finding the security weaknesses against collage attacks. Finally, we implemented the proposed enhancement and illustrated improved results up-to 99% in terms of localizing forgery detection in certain scenarios of collage attacks enhancement.
Supersymmetry provides a new paradigm for transformation optics. We experimentally demonstrate broadband continuous supersymmetric transformation by designing a novel metamaterial on a Si platform for advanced control...
详细信息
ISBN:
(纸本)9781957171258
Supersymmetry provides a new paradigm for transformation optics. We experimentally demonstrate broadband continuous supersymmetric transformation by designing a novel metamaterial on a Si platform for advanced control of the spatial characteristics of light.
Management of data backup and restore in case of emergency is a crucial process in every organization. This paper discusses an effective database recovery technique called Point In Time Recovery (PITR) in postgreSQL d...
详细信息
Various analytical methods for diverse data have been proposed with the evolution of information technology. This study focuses on relational data, comprising information on relationships between objects. Although sev...
详细信息
ISBN:
(数字)9798331504120
ISBN:
(纸本)9798331504137
Various analytical methods for diverse data have been proposed with the evolution of information technology. This study focuses on relational data, comprising information on relationships between objects. Although several studies have focused on the relationships between objects, only a few have utilized attribute information. The conventional study proposed analyzing relational data with attribute information using a latent structure model. However, the model assumes that both attribute information and relational data are generated by a single latent variable. Furthermore the model does not effectively handle missing values in relational data. Therefore, in this study, we modify the conventional latent structure analysis model for relational data with attribute information, which assumes that latent variables have various types of structures, and derived a method for estimating its parameters. In addition, we apply the proposed model to cases when the relational data contain missing values. The effectiveness of our proposed method is demonstrated through simulation experiments on synthetic dataset.
With the popularity of e-learning,personalization and ubiquity have become important aspects of online *** make learning more personalized and ubiquitous,we propose a learner model for a query-based personalized learn...
详细信息
With the popularity of e-learning,personalization and ubiquity have become important aspects of online *** make learning more personalized and ubiquitous,we propose a learner model for a query-based personalized learning recommendation *** contextual attributes characterize a learner,but considering all of them is costly for a ubiquitous learning *** this paper,a set of optimal intrinsic and extrinsic contexts of a learner are identified for learner modeling.A total of 208 students are ***(Decision Making Trial and Evaluation Laboratory)technique is used to establish the validity and importance of the identified contexts and find the interdependency among *** acquiring methods of these contexts are also *** the basis of these contexts,the learner model is designed.A layered architecture is presented for interfacing the learner model with a query-based personalized learning recommendation *** a ubiquitous learning scenario,the necessary adaptive decisions are identified to make a personalized recommendation to a learner.
There is an increasing interest in hardware accelerators, both in academia and industry. The industry invests in application-level accelerators, like Graphics Processing Units (GPUs) or Field programmable Gate Array (...
详细信息
ISBN:
(纸本)9781665464642
There is an increasing interest in hardware accelerators, both in academia and industry. The industry invests in application-level accelerators, like Graphics Processing Units (GPUs) or Field programmable Gate Array (FPGA) accelerators connected to the PCIe bus. Hardware accelerators outperform general purpose Central Processing Units (CPUs) in terms of power consumption and performance. Hardware accelerators seek to optimize arithmetic operations, since it is the heart of the computation circuitry in different algorithms and applications. In this context, posit is proposed to replace IEEE Standard 754-2008 floating point and offers more efficient arithmetic units in terms of accuracy and Power-Performance-Area (PPA) matrix. In this paper, we introduce a low power Verilog HDL design and implementation of Posit Arithmetic Unit (PAU) for efficient hardware accelerators. Our regular proposed PAU is synthesized on Xilinx ZYNQ-7000. The results show34% area improvement and 14% power saving, while our compact PAU achieves 25% area reduction and 45% power saving.
作者:
Almeida, Miguel A.S.de Almeida, J.M.M.M.Coelho, Luís C.C.INESC TEC
Institute of Systems and Computer Engineering Technology and Science Department of Physics Faculty of Sciences University of Porto Rua do Campo Alegre Porto4169-007 Portugal Department of Physics
School of Sciences and Technology University of Trás-os-Montes e Alto Douro Vila Real5001-801 Portugal
An optical fiber sensor for hydrogen detection is presented. It is based on processed fiber Bragg gratings coated with palladium thin films where its expansion due to the hydrogen adsorption is monitored as strain mea...
详细信息
暂无评论