The state of art and review on video streaming
Nowadays, video streaming is very popular around the world, users use video streaming to
watch online movies, education, and do office work. Video streaming is referred to as the …
watch online movies, education, and do office work. Video streaming is referred to as the …
Sunspot number prediction using Gated Recurrent Unit (GRU) algorithm
Sunspot is an area on photosphere layer which is dark-colored. Sunspot is very important to
be researched because sunspot is affected by sunspot numbers, which present the level of …
be researched because sunspot is affected by sunspot numbers, which present the level of …
A two-stage h. 264 based video compression method for automotive cameras
Y Wang, PH Chan, V Donzella - 2022 IEEE 5th international …, 2022 - ieeexplore.ieee.org
With the development of automated vehicles and advanced driver assistance systems, the
compression of the large amount of data generated by the vehicle camera sensors becomes …
compression of the large amount of data generated by the vehicle camera sensors becomes …
Comparison of H. 264 and H. 265
M Jayaratne, LK Gunawardhana… - Engineering and …, 2022 - papers.ssrn.com
Abstract From the Stone Age to the present day, visual communication can be described as
a form of communication that has evolved over various topics, from design to technology. As …
a form of communication that has evolved over various topics, from design to technology. As …
Analysis of Video CODEC Performance Using Different Softphone Applications
DK Yudha, A Ashari - IJCCS (Indonesian Journal of Computing …, 2021 - journal.ugm.ac.id
In a video call there are several components, such as IP phone or softphone, CODEC, and
server. Selection of softphone and CODEC is a consideration in building a video …
server. Selection of softphone and CODEC is a consideration in building a video …
Analysis of perceptual optimization in intra video coding
E Kuyucu - 2024 - open.metu.edu.tr
The aim of perceptually optimized video coding is to maximize compression efficiency by
utilizing the properties of the Human Visual System. In the latest coding standards, such as …
utilizing the properties of the Human Visual System. In the latest coding standards, such as …
The research of streaming compression methods on cloud-rendering systems
D Tang - … on Algorithms, High Performance Computing, and …, 2023 - spiedigitallibrary.org
Nowadays, cloud-rendering systems have attracted the intense interest in the public and
been used in many areas including video games and online education. In this paper, we will …
been used in many areas including video games and online education. In this paper, we will …
[PDF][PDF] PHISHING WEBSITE DETECTION USING MACHINE LEARNING
N Manoj, G Praveen, PA Kumar - ijarst.in
Phishing sites represent a serious gamble to web security since they attempt to get private
data from naïve guests. Specialists have fostered various strategies to recognize phishing …
data from naïve guests. Specialists have fostered various strategies to recognize phishing …
[PDF][PDF] AN INTELLIGENT APPROACH TO IMPROVING THE PERFORMANCE OF THREAT DETECTION IN IOT
VL Chaitanya, S Afrin, B Nikhila, K Sreevani… - ijprems.com
The project focuses on bolstering threat detection efficacy within Internet of Things (IoT)
systems through an intelligent approach. IoT systems, comprising devices, sensors …
systems through an intelligent approach. IoT systems, comprising devices, sensors …
[PDF][PDF] Secure and Efficient Online Fingerprint Authentication Scheme Based on Cloud Computing
MA Kumar, T Mahesh, VR Ganesh, GV Sai, O Diwakar - ijaeast.com
Abstract Background: The e-Finga online fingerprint authentication system, while efficient, is
vulnerable to privacy breaches due to its use of deterministic encryption. Objectives …
vulnerable to privacy breaches due to its use of deterministic encryption. Objectives …