The state of art and review on video streaming

AA Laghari, S Shahid, R Yadav… - Journal of High …, 2023 - content.iospress.com
Nowadays, video streaming is very popular around the world, users use video streaming to
watch online movies, education, and do office work. Video streaming is referred to as the …

Sunspot number prediction using Gated Recurrent Unit (GRU) algorithm

UI Arfianti, DCR Novitasari, N Widodo… - … of Computing and …, 2021 - repository.uinsa.ac.id
Sunspot is an area on photosphere layer which is dark-colored. Sunspot is very important to
be researched because sunspot is affected by sunspot numbers, which present the level of …

A two-stage h. 264 based video compression method for automotive cameras

Y Wang, PH Chan, V Donzella - 2022 IEEE 5th international …, 2022 - ieeexplore.ieee.org
With the development of automated vehicles and advanced driver assistance systems, the
compression of the large amount of data generated by the vehicle camera sensors becomes …

Comparison of H. 264 and H. 265

M Jayaratne, LK Gunawardhana… - Engineering and …, 2022 - papers.ssrn.com
Abstract From the Stone Age to the present day, visual communication can be described as
a form of communication that has evolved over various topics, from design to technology. As …

Analysis of Video CODEC Performance Using Different Softphone Applications

DK Yudha, A Ashari - IJCCS (Indonesian Journal of Computing …, 2021 - journal.ugm.ac.id
In a video call there are several components, such as IP phone or softphone, CODEC, and
server. Selection of softphone and CODEC is a consideration in building a video …

Analysis of perceptual optimization in intra video coding

E Kuyucu - 2024 - open.metu.edu.tr
The aim of perceptually optimized video coding is to maximize compression efficiency by
utilizing the properties of the Human Visual System. In the latest coding standards, such as …

The research of streaming compression methods on cloud-rendering systems

D Tang - … on Algorithms, High Performance Computing, and …, 2023 - spiedigitallibrary.org
Nowadays, cloud-rendering systems have attracted the intense interest in the public and
been used in many areas including video games and online education. In this paper, we will …

[PDF][PDF] PHISHING WEBSITE DETECTION USING MACHINE LEARNING

N Manoj, G Praveen, PA Kumar - ijarst.in
Phishing sites represent a serious gamble to web security since they attempt to get private
data from naïve guests. Specialists have fostered various strategies to recognize phishing …

[PDF][PDF] AN INTELLIGENT APPROACH TO IMPROVING THE PERFORMANCE OF THREAT DETECTION IN IOT

VL Chaitanya, S Afrin, B Nikhila, K Sreevani… - ijprems.com
The project focuses on bolstering threat detection efficacy within Internet of Things (IoT)
systems through an intelligent approach. IoT systems, comprising devices, sensors …

[PDF][PDF] Secure and Efficient Online Fingerprint Authentication Scheme Based on Cloud Computing

MA Kumar, T Mahesh, VR Ganesh, GV Sai, O Diwakar - ijaeast.com
Abstract Background: The e-Finga online fingerprint authentication system, while efficient, is
vulnerable to privacy breaches due to its use of deterministic encryption. Objectives …