This paper compares video and audio QoE of OFDMA multi-user transmission and reliable groupcast over wireless LAN. We assume video and audio transmission to several terminals simultaneously. As a reliable groupcast me...
详细信息
ISBN:
(数字)9798350364866
ISBN:
(纸本)9798350364873
This paper compares video and audio QoE of OFDMA multi-user transmission and reliable groupcast over wireless LAN. We assume video and audio transmission to several terminals simultaneously. As a reliable groupcast method, we employ Unsolicited Retry, a technique of IEEE 802.11aa GroupCast with Retries. We utilize IEEE 802.11ax for OFDMA transmission. We evaluate application-level QoS by computer simulation. We then assess QoE through a subjective experiment with video and audio streams generated by the output timing obtained from the simulation. We notice that each method has a situation to be applied appropriately.
This paper considers multi-view video and audio transmission on ICN (Information-Centric Networking)/CCN (Content-Centric Networking). Routers in ICN/CCN can cache content. Besides, the capacity of routers' caches...
详细信息
ISBN:
(数字)9798350374537
ISBN:
(纸本)9798350374544
This paper considers multi-view video and audio transmission on ICN (Information-Centric Networking)/CCN (Content-Centric Networking). Routers in ICN/CCN can cache content. Besides, the capacity of routers' caches is finite, so various cache control schemes have been proposed to improve cache efficiency. This paper presents and evaluates a new and suitable control scheme for multi-view video and audio transmission. For this purpose, we construct a network environment with Cefore. We assess application-level QoS (Quality of Service) and QoE (Quality of Experience). We then show the effectiveness of the proposed control scheme.
The security closure of integrated circuits (ICs) is an emerging area of research within the very large scale integration (VLSI) community. Malicious third parties, referred to as "attackers", can employ var...
详细信息
This study is related to a system that enables elderly people to communicate interactively with young people who use existing message exchange services by simply speaking to an avatar on a tablet PC, without having to...
详细信息
Succession planning is important in organization management. It is a strategic level management that involves not only finding the best successor but also including the development program for the successor so that th...
详细信息
ISBN:
(数字)9798331534592
ISBN:
(纸本)9798331534608
Succession planning is important in organization management. It is a strategic level management that involves not only finding the best successor but also including the development program for the successor so that they will be ready for the new prospective position. The integration and collaboration between all related stakeholders are important. Specifically, in succession planning at higher education, key positions play an important role so that institutional operations can run well. In this research, a succession planning model in higher education was built using the Systematic Literature Review(SLR), and the Software Development Lifecycle(SDLC) method was used for the application development, also, to be able to evaluate the implementation of one of the steps of the model, the simulation technique used machine learning (ML) to find the best algorithm for predicting the readiness of potential successors at higher education. Six algorithms were used: Logistic Regression, Decision Tree, K-Nearest Neighbor, Linear Discriminant Analysis, Gaussian Naïve Bayes, and Support Vector Machine. The data prepared for the simulation is based on the factors for the best successor candidate. The results obtained in this research are the succession planning model and the application design, as well as the Support Vector Machine (SVM) algorithm as the best algorithm for predicting the readiness status of successor candidates based on SVM’s accuracy score that is compared to the other algorithm in some variance amounts of data. The Succession Planning Model that is actualized in the application design provides a reference for the higher education institution to implement the Succession Model in their institution.
One of the most popular technologies nowadays is augmented reality (AR). popular technologies in various industries. Many industries have adopted this AR technology, one of which is with the aim of marketing the produ...
详细信息
Batik is an Indonesian world cultural heritage. Batik consists of many kinds of patterns depending on where the batik comes from, Batik-making techniques continue to develop along with technology development. Among th...
详细信息
The intuitive fuzzy set has found important application in decision-making and machine *** enrich and utilize the intuitive fuzzy set,this study designed and developed a deep neural network-based glaucoma eye detectio...
详细信息
The intuitive fuzzy set has found important application in decision-making and machine *** enrich and utilize the intuitive fuzzy set,this study designed and developed a deep neural network-based glaucoma eye detection using fuzzy difference equations in the domain where the retinal images *** image detections are categorized as normal eye recognition,suspected glaucomatous eye recognition,and glaucomatous eye *** degrees associated with weighted values are calculated to determine the level of concentration between the fuzzy partition and the retinal *** proposed model was used to diagnose glaucoma using retinal images and involved utilizing the Convolutional Neural Network(CNN)and deep learning to identify the fuzzy weighted regularization between *** methodology was used to clarify the input images and make them adequate for the process of glaucoma *** objective of this study was to propose a novel approach to the early diagnosis of glaucoma using the Fuzzy Expert System(FES)and Fuzzy differential equation(FDE).The intensities of the different regions in the images and their respective peak levels were *** the peak regions were identified,the recurrence relationships among those peaks were then *** partitioning was done due to varying degrees of similar and dissimilar concentrations in the *** and dissimilar concentration levels and spatial frequency generated a threshold image from the combined fuzzy matrix and *** distinguished between a normal and abnormal eye condition,thus detecting patients with glaucomatous eyes.
Many Internet protocol (IP) lookup algorithms have been formulated to improve network performance. This study reviewed and experimentally evaluated technologies for trie-based methods that reduce memory access, memory...
详细信息
One way to save time and resources in the human recruitment and hiring process is to post open job positions on the Internet, but the overload of applications creates challenges for hiring managers and companies to se...
详细信息
暂无评论