This paper evaluates the QoE of video and audio transmission over a full-duplex wireless LAN with interference traffic through a computer simulation and a subjective experiment. We employ a simulation environment with...
This paper evaluates the QoE of video and audio transmission over a full-duplex wireless LAN with interference traffic through a computer simulation and a subjective experiment. We employ a simulation environment with a pair of audiovisual transmission and reception terminals and a pair of interference traffic transmission and reception ones. We investigate the effect of the transmission rate of interference traffic and communication distance in a wireless channel on the output quality of the video and audio stream at the reception terminal. We perform a subjective experiment with the output timing of video and audio obtained by the simulation.
This paper investigates the effect of bitrate control methods on QoE of multi-view video and audio streaming with MPEG-DASH. We adopt three bitrate control methods for conventional single-view video streaming to the M...
This paper investigates the effect of bitrate control methods on QoE of multi-view video and audio streaming with MPEG-DASH. We adopt three bitrate control methods for conventional single-view video streaming to the MVV-A system with MPEG-DASH. We conduct a subjective experiment changing available network bandwidth and investigate the effect of the methods on QoE.
Reservoir Computing (RC) is a computational model in which a trained readout layer interprets the dynamics of a component called a reservoir that is excited by external input stimuli. The reservoir is often constructe...
详细信息
This paper considers video and audio transmission in ICN (Information-Centric Networking) CCN (Content- Centric Networking), in which each intermediate node can cache content. LCE (Leave Copy Everywhere) has been know...
详细信息
ISBN:
(数字)9781665471039
ISBN:
(纸本)9781665471046
This paper considers video and audio transmission in ICN (Information-Centric Networking) CCN (Content- Centric Networking), in which each intermediate node can cache content. LCE (Leave Copy Everywhere) has been known as a generic cache decision policy. However, because LCE caches at all the intermediate nodes, the cache of intermediate nodes can be duplicated. Therefore, various cache decision policies that eliminate redundancy have been proposed. In this paper, we evaluate the effect of the cache decision policies on QoE of video and audio transmission in ICN/CCN. We assess application-level QoS using a computer simulation with a tree network and QoE by means of subjective experiment.
In this paper, we consider multi-view video and audio streaming using MPEG-DASH, which enables to transmit video tailored to the network conditions over HTTP communication. This paper uses HTTP/2 instead of HTTP/1.1, ...
详细信息
ISBN:
(数字)9798350353983
ISBN:
(纸本)9798350353990
In this paper, we consider multi-view video and audio streaming using MPEG-DASH, which enables to transmit video tailored to the network conditions over HTTP communication. This paper uses HTTP/2 instead of HTTP/1.1, which the authors previously used. HTTP/2 manages a series of request-response exchanges called a stream, which is assigned a unique stream ID. We perform a subjective experiment under various network conditions to evaluate application-level QoS and QoE. From the evaluation results, we investigate the effect of the HTTP/2 stream on the video and audio quality of the users in the multi-view video transmission scenario.
This paper compares video and audio QoE of OFDMA multi-user transmission and reliable groupcast over wireless LAN. We assume video and audio transmission to several terminals simultaneously. As a reliable groupcast me...
详细信息
ISBN:
(数字)9798350364866
ISBN:
(纸本)9798350364873
This paper compares video and audio QoE of OFDMA multi-user transmission and reliable groupcast over wireless LAN. We assume video and audio transmission to several terminals simultaneously. As a reliable groupcast method, we employ Unsolicited Retry, a technique of IEEE 802.11aa GroupCast with Retries. We utilize IEEE 802.11ax for OFDMA transmission. We evaluate application-level QoS by computer simulation. We then assess QoE through a subjective experiment with video and audio streams generated by the output timing obtained from the simulation. We notice that each method has a situation to be applied appropriately.
This paper considers multi-view video and audio transmission on ICN (Information-Centric Networking)/CCN (Content-Centric Networking). Routers in ICN/CCN can cache content. Besides, the capacity of routers' caches...
详细信息
ISBN:
(数字)9798350374537
ISBN:
(纸本)9798350374544
This paper considers multi-view video and audio transmission on ICN (Information-Centric Networking)/CCN (Content-Centric Networking). Routers in ICN/CCN can cache content. Besides, the capacity of routers' caches is finite, so various cache control schemes have been proposed to improve cache efficiency. This paper presents and evaluates a new and suitable control scheme for multi-view video and audio transmission. For this purpose, we construct a network environment with Cefore. We assess application-level QoS (Quality of Service) and QoE (Quality of Experience). We then show the effectiveness of the proposed control scheme.
In persuasive negotiation dialogues, agents, with different interests and goals, exchange proposals that are supported by rhetorical arguments such as threats, rewards, or appeals. The aim of this thesis is to investi...
详细信息
ISBN:
(纸本)9781510855076
In persuasive negotiation dialogues, agents, with different interests and goals, exchange proposals that are supported by rhetorical arguments such as threats, rewards, or appeals. The aim of this thesis is to investigate such dialogue systems, where agents can generate rhetorical arguments in order to try to persuade their opponents, and can also construct counter-arguments, which depend on the type of the previously received argument The main contributions of this work are (i) a persuasive negotiation model that supports this kind of dialogue and (ii) the study the notion of acceptability of these kinds of arguments according to the Dung's definitions.
Choosing the ideal spot to set up an Access Point (AP) in a given plant is no simple task. This paper proposes a mathematical model and computational solution to the following problem: given the plant of an indoor env...
详细信息
Choosing the ideal spot to set up an Access Point (AP) in a given plant is no simple task. This paper proposes a mathematical model and computational solution to the following problem: given the plant of an indoor environment, a number of reception points and properly characterized obstacles, locate where the access point should be installed, so as to minimize the propagation losses within the environment and ensure a minimum signal level in all receivers. The model proposed differs from others in the literature by treating each obstacle individually and taking into account the material from which it is made. The proposed design minimizes the sum of the attenuations of the signal generated by the AP as the signal traverses the fewest possible obstacles whose attenuation is large (e.g., concrete walls and metal cabinets). To validate the proposed model simulations were performed in an indoor environment with a certain distribution of obstacles of different kinds. The experiments show that the location of the access point varies significantly in the environment according to the materials composing the obstacles. In the most critical case, with obstacles made of concrete, the optimization algorithm could find no location for the AP so that all receptors received a minimum signal level to establish a connection.
This study investigates significant patterns of violence against women in Pernambuco using Self-Organizing Maps (SOM) and the Apriori algorithm. The methodology includes trend analysis, clustering, and association rul...
详细信息
ISBN:
(数字)9798350374575
ISBN:
(纸本)9798350374582
This study investigates significant patterns of violence against women in Pernambuco using Self-Organizing Maps (SOM) and the Apriori algorithm. The methodology includes trend analysis, clustering, and association rule mining, utilizing data from the Ministério da Mulher covering 2015 to 2021. The exploratory data analysis identified demographic, temporal, and spatial trends in violence. SOM was employed for dimensionality reduction and clustering, revealing three clusters representing 5.24%, 19.68%, and 75.08% of the dataset, respectively. The Apriori algorithm was applied to yearly subsets of each cluster to uncover relevant association patterns. Our findings highlight key characteristics and temporal dynamics of violence, supporting the development of targeted interventions and support systems.
暂无评论