This paper proposes a fitness movement evaluation system using deep learning. The system uses a deep convolutional neural network (CNN) to extract features from pictures of fitness movements. The features are then use...
详细信息
In this paper, we consider multi-view video and audio streaming using MPEG-DASH, which enables to transmit video tailored to the network conditions over HTTP communication. This paper uses HTTP/2 instead of HTTP/1.1, ...
详细信息
ISBN:
(数字)9798350353983
ISBN:
(纸本)9798350353990
In this paper, we consider multi-view video and audio streaming using MPEG-DASH, which enables to transmit video tailored to the network conditions over HTTP communication. This paper uses HTTP/2 instead of HTTP/1.1, which the authors previously used. HTTP/2 manages a series of request-response exchanges called a stream, which is assigned a unique stream ID. We perform a subjective experiment under various network conditions to evaluate application-level QoS and QoE. From the evaluation results, we investigate the effect of the HTTP/2 stream on the video and audio quality of the users in the multi-view video transmission scenario.
This paper considers multi-view video and audio transmission on ICN (Information-Centric Networking)/CCN (Content-Centric Networking). Routers in ICN/CCN can cache content. Besides, the capacity of routers' caches...
详细信息
ISBN:
(数字)9798350374537
ISBN:
(纸本)9798350374544
This paper considers multi-view video and audio transmission on ICN (Information-Centric Networking)/CCN (Content-Centric Networking). Routers in ICN/CCN can cache content. Besides, the capacity of routers' caches is finite, so various cache control schemes have been proposed to improve cache efficiency. This paper presents and evaluates a new and suitable control scheme for multi-view video and audio transmission. For this purpose, we construct a network environment with Cefore. We assess application-level QoS (Quality of Service) and QoE (Quality of Experience). We then show the effectiveness of the proposed control scheme.
The process of educating and learning about the automotive industry is still ongoing, and one of the most effective techniques is the provision of direct practice. Such a system is regarded as effective, albeit with c...
The process of educating and learning about the automotive industry is still ongoing, and one of the most effective techniques is the provision of direct practice. Such a system is regarded as effective, albeit with certain downsides. One of them is the restricted area and time required to conduct the exercise, as well as the significant risk of accidents during vehicle engine assembly. Based on these justifications, Vehicle Engine Assembly Simulation with Virtual Reality (VR) Technology is now available as an alternate means of educating students about the automotive industry, particularly car engine assembly. This concept employs a virtual environment that allows users to perceive the automobile world in real time through an immersive experience. VR allows users to directly disassemble automobile engines. This virtual reality application was created utilizing the Oculus Quest 2 platform and the Unity Game Engine.
The field of the Internet of Medical Things (IoMT) is experiencing significant growth as it involves the integration of medical devices and systems with the internet and various digital technologies. This study provid...
详细信息
VANET (Vehicular Ad Hoc Network) was developed to address the unique challenges of communication in a mobile vehicular environment. This technology can enhance driving safety and traffic control. Moreover, similar pri...
详细信息
Creative problem solving (CPS) is a skill which enables innovation, often times through repeated exploration of an agent’s world. In this work, we investigate methods for life-long creative problem solving (LLCPS), w...
The ROS 2 Navigation Stack (Nav2) has emerged as a widely used software component providing the underlying basis to develop a variety of high-level functionalities. However, when used in outdoor environments such as o...
详细信息
The added value of the information transmitted in a cybernetic environment has resulted in a sophisticated malicious actions scenario aimed at data exfiltration. In situations with advanced actors, like APTs, such act...
详细信息
Data Encryption Standard (DES) is a symmetric encryption algorithm that uses a single key to encrypt and decrypt information. In addition, the cipher text will be hidden inside an image using Stepic. DES Encryption us...
详细信息
暂无评论