Search results for: video encryption
1042 The Effectiveness of Video Modeling Procedures on Request an Item Behavior Children with Autism Spectrum Disorders
Authors: Melih Cattik
Abstract:
The present study investigate effectiveness of video modeling procedures on request an item behavior of children with ASD. Two male and a female children with ASD participated in the study. A multiple baseline across participant single-subject design was used to evaluate the effects of the video modeling procedures on request an item behavior. During baseline, no prompts were presented to participants. In the intervention phase, the teacher gave video model to the participant and than created opportunity for request an item to him/her. When the first participant reached to criterion, the second participant began intervention. This procedure continued till all participants completed intervention. Finally, all three participants learned to request an item behavior. Based upon findings of this study, it will make suggestions to future researches.Keywords: autism spectrum disorders, video modeling procedures, request an item behavior, single subject design
Procedia PDF Downloads 4101041 Symbol Synchronization and Resource Reuse Schemes for Layered Video Multicast Service in Long Term Evolution Networks
Authors: Chung-Nan Lee, Sheng-Wei Chu, You-Chiun Wang
Abstract:
LTE (Long Term Evolution) employs the eMBMS (evolved Multimedia Broadcast/Multicast Service) protocol to deliver video streams to a multicast group of users. However, it requires all multicast members to receive a video stream in the same transmission rate, which would degrade the overall service quality when some users encounter bad channel conditions. To overcome this problem, this paper provides two efficient resource allocation schemes in such LTE network: The symbol synchronization (S2) scheme assumes that the macro and pico eNodeBs use the same frequency channel to deliver the video stream to all users. It then adopts a multicast transmission index to guarantee the fairness among users. On the other hand, the resource reuse (R2) scheme allows eNodeBs to transmit data on different frequency channels. Then, by introducing the concept of frequency reuse, it can further improve the overall service quality. Extensive simulation results show that the S2 and R2 schemes can respectively improve around 50% of fairness and 14% of video quality as compared with the common maximum throughput method.Keywords: LTE networks, multicast, resource allocation, layered video
Procedia PDF Downloads 3901040 Video-Based System for Support of Robot-Enhanced Gait Rehabilitation of Stroke Patients
Authors: Matjaž Divjak, Simon Zelič, Aleš Holobar
Abstract:
We present a dedicated video-based monitoring system for quantification of patient’s attention to visual feedback during robot assisted gait rehabilitation. Two different approaches for eye gaze and head pose tracking are tested and compared. Several metrics for assessment of patient’s attention are also presented. Experimental results with healthy volunteers demonstrate that unobtrusive video-based gaze tracking during the robot-assisted gait rehabilitation is possible and is sufficiently robust for quantification of patient’s attention and assessment of compliance with the rehabilitation therapy.Keywords: video-based attention monitoring, gaze estimation, stroke rehabilitation, user compliance
Procedia PDF Downloads 4261039 Video Based Automatic License Plate Recognition System
Authors: Ali Ganoun, Wesam Algablawi, Wasim BenAnaif
Abstract:
Video based traffic surveillance based on License Plate Recognition (LPR) system is an essential part for any intelligent traffic management system. The LPR system utilizes computer vision and pattern recognition technologies to obtain traffic and road information by detecting and recognizing vehicles based on their license plates. Generally, the video based LPR system is a challenging area of research due to the variety of environmental conditions. The LPR systems used in a wide range of commercial applications such as collision warning systems, finding stolen cars, controlling access to car parks and automatic congestion charge systems. This paper presents an automatic LPR system of Libyan license plate. The performance of the proposed system is evaluated with three video sequences.Keywords: license plate recognition, localization, segmentation, recognition
Procedia PDF Downloads 4641038 Multiplayer Game System for Therapeutic Exercise in Which Players with Different Athletic Abilities Can Participate on an Even Competitive Footing
Authors: Kazumoto Tanaka, Takayuki Fujino
Abstract:
Sports games conducted as a group are a form of therapeutic exercise for aged people with decreased strength and for people suffering from permanent damage of stroke and other conditions. However, it is difficult for patients with different athletic abilities to play a game on an equal footing. This study specifically examines a computer video game designed for therapeutic exercise, and a game system with support given depending on athletic ability. Thereby, anyone playing the game can participate equally. This video-game, to be specific, is a popular variant of balloon volleyball, in which players hit a balloon by hand before it falls to the floor. In this game system, each player plays the game watching a monitor on which the system displays tailor-made video-game images adjusted to the person’s athletic ability, providing players with player-adaptive assist support. We have developed a multiplayer game system with an image generation technique for the tailor-made video-game and conducted tests to evaluate it.Keywords: therapeutic exercise, computer video game, disability-adaptive assist, tailor-made video-game image
Procedia PDF Downloads 5621037 Effect of Video-Based Instructional Strategy on Junior Secondary School Students' Academic Achievement in Social Studies in Ondo State, Nigeria
Authors: Abidoye James Alabi
Abstract:
This study investigated the effect of video-based instructional strategy on junior secondary school academic achievement in social studies. The influence of gender on the academic achievement of student taught with video-based instructional strategy was also examined. The study adopted a pre-test and pro-test control group quasi-experimental design. Simple random sampling technique was used to select 40 students from two schools in Akure town in Ondo State. The researcher developed instructional video package on social studies concept which was used as treatment instrument for the experimental group while the control group was exposed to conventional teaching method. The instruments used in this study are social studies achievement test and instructional video package (IVP). T-test statistic was used to analyse the hypotheses. The findings revealed that experimental group performed better than the control group. It was also shown that gender has no significant effect on students’ academic achievement when exposed to an instructional video package. It was recommended that appropriate training and workshop should be organized by the government for the social studies teachers for effective use of instructional video package in order to enhance teachers productivities and learning among students in secondary schools.Keywords: instructional video package, conventional teaching method, social studies, junior secondary school
Procedia PDF Downloads 4231036 Human Behavior Modeling in Video Surveillance of Conference Halls
Authors: Nour Charara, Hussein Charara, Omar Abou Khaled, Hani Abdallah, Elena Mugellini
Abstract:
In this paper, we present a human behavior modeling approach in videos scenes. This approach is used to model the normal behaviors in the conference halls. We exploited the Probabilistic Latent Semantic Analysis technique (PLSA), using the 'Bag-of-Terms' paradigm, as a tool for exploring video data to learn the model by grouping similar activities. Our term vocabulary consists of 3D spatio-temporal patch groups assigned by the direction of motion. Our video representation ensures the spatial information, the object trajectory, and the motion. The main importance of this approach is that it can be adapted to detect abnormal behaviors in order to ensure and enhance human security.Keywords: activity modeling, clustering, PLSA, video representation
Procedia PDF Downloads 3941035 Recording Video in the CAVE
Authors: Mohamed Mediouni
Abstract:
Evaluating the performance of a simulator in the CAVE has to be confirmed by encouraging people to live the experience of virtual reality. In this paper, a detailed procedure of recording video is presented. Limitations of the experimental device are firstly exposed. Then, solutions for improving this idea are finally described.Keywords: CAVE, stereoscopics, camera, recording
Procedia PDF Downloads 3331034 Viral Advertising: Popularity and Willingness to Share among the Czech Internet Population
Authors: Martin Klepek
Abstract:
This paper presents results of primary quantitative research on viral advertising with focus on popularity and willingness to share viral video among Czech Internet population. It starts with brief theoretical debate on viral advertising, which is used for the comparison of the results. For purpose of collecting data, online questionnaire survey was given to 384 respondents. Statistics utilized in this research included frequency, percentage, correlation and Pearson’s Chi-square test. Data was evaluated using SPSS software. The research analysis disclosed high popularity of viral advertising video among Czech Internet population but implies lower willingness to share it. Significant relationship between likability of viral video technique and age of the viewer was found.Keywords: internet advertising, internet population, promotion, marketing communication, viral advertising, viral video
Procedia PDF Downloads 4741033 Packet Fragmentation Caused by Encryption and Using It as a Security Method
Authors: Said Rabah Azzam, Andrew Graham
Abstract:
Fragmentation of packets caused by encryption applied on the network layer of the IOS model in Internet Protocol version 4 (IPv4) networks as well as the possibility of using fragmentation and Access Control Lists (ACLs) as a method of restricting network access to certain hosts or areas of a network.Using default settings, fragmentation is expected to occur and each fragment to be reassembled at the other end. If this does not occur then a high number of ICMP messages should be generated back towards the source host indicating that the packet is too large and that it needs to be made smaller. This result is also expected when the MTU is changed for certain links between devices.When using ACLs and packet fragments to restrict access to hosts or network segments it is possible that ACLs cannot be set up in this way. If ACLs cannot be setup to allow only fragments then it is a limitation of the hardware’s firmware holding back this particular method. If the ACL on the restricted switch can be set up in such a way to allow only fragments then a connection that forces packets to fragment should be allowed to pass through the ACL. This should then make a network connection to the destination machine allowing data to be sent to and from the destination machine. ICMP messages from the restricted access switch and host should also be blocked from being sent back across the link which will be shown in an SSH session into the switch.Keywords: fragmentation, encryption, security, switch
Procedia PDF Downloads 3371032 Anonymous Editing Prevention Technique Using Gradient Method for High-Quality Video
Authors: Jiwon Lee, Chanho Jung, Si-Hwan Jang, Kyung-Ill Kim, Sanghyun Joo, Wook-Ho Son
Abstract:
Since the advances in digital imaging technologies have led to development of high quality digital devices, there are a lot of illegal copies of copyrighted video content on the internet. Thus, we propose a high-quality (HQ) video watermarking scheme that can prevent these illegal copies from spreading out. The proposed scheme is applied spatial and temporal gradient methods to improve the fidelity and detection performance. Also, the scheme duplicates the watermark signal temporally to alleviate the signal reduction caused by geometric and signal-processing distortions. Experimental results show that the proposed scheme achieves better performance than previously proposed schemes and it has high fidelity. The proposed scheme can be used in broadcast monitoring or traitor tracking applications which need fast detection process to prevent illegally recorded video content from spreading out.Keywords: editing prevention technique, gradient method, luminance change, video watermarking
Procedia PDF Downloads 4571031 Video on Demand (VOD) Industry in Iran: Study of Reasons of Increasing Film and Series Platforms
Authors: Narges Hamidipour
Abstract:
VOD, which stands for "video on demand", is one kind of watching movies and series on web platforms that, by using them, individuals can access lots of video content by paying abonnement. The first platform in Iran was funded in 2014, and in the last 10 years, it has become the main part of the movie and series industry. There are 374 VOD platforms in Iran, but just three of them are in the mainstream. However, in these years, they have been developed and famed in different ways. This article focuses on the reasons for this development in the past years. For the framework, "digital economy", "media industries," and "political economy" have been used with the interview method. In this research, some experts in SATRA (regulatory organization of inclusive audio and video media in Iran), owners or managers of VODs and some others who directly have been in the system conveyed their opinions. By the way, some documents and analysis statistics are invoked to reach complete results.Keywords: digital economy, political economy, VOD, interview, iran
Procedia PDF Downloads 671030 Detection and Tracking for the Protection of the Elderly and Socially Vulnerable People in the Video Surveillance System
Authors: Mobarok Hossain Bhuyain
Abstract:
Video surveillance processing has attracted various security fields transforming it into one of the leading research fields. Today's demand for detection and tracking of human mobility for security is very useful for human security, such as in crowded areas. Accordingly, video surveillance technology has seen a rapid advancement in recent years, with algorithms analyzing the behavior of people under surveillance automatically. The main motivation of this research focuses on the detection and tracking of the elderly and socially vulnerable people in crowded areas. Degenerate people are a major health concern, especially for elderly people and socially vulnerable people. One major disadvantage of video surveillance is the need for continuous monitoring, especially in crowded areas. To assist the security monitoring live surveillance video, image processing, and artificial intelligence methods can be used to automatically send warning signals to the monitoring officers about elderly people and socially vulnerable people.Keywords: human detection, target tracking, neural network, particle filter
Procedia PDF Downloads 1661029 The Role of Instruction in Knowledge Construction in Online Learning
Authors: Soo Hyung Kim
Abstract:
Two different learning approaches were suggested: focusing on factual knowledge or focusing on the embedded meaning in the statements. Each way of learning has positive effects on different question categories, where factual knowledge helps more with simple fact questions, and searching for meaning in given information helps learn causal relationship and the embedded meaning. To test this belief, two groups of learners (12 male and 39 female adults aged 18-37) watched a ten-minute long Youtube video about various factual events of American history, their meaning, and the causal relations of the events. The fact group was asked to focus on factual knowledge in the video, and the meaning group was asked to focus on the embedded meaning in the video. After watching the video, both groups took multiple-choice questions, which consisted of 10 questions asking the factual knowledge addressed in the video and 10 questions asking embedded meaning in the video, such as the causal relationship between historical events and the significance of the event. From ANCOVA analysis, it was found that the factual knowledge showed higher performance on the factual questions than the meaning group, although there was no group difference on the questions about the meaning between the two groups. The finding suggests that teacher instruction plays an important role in learners constructing a different type of knowledge in online learning.Keywords: factual knowledge, instruction, meaning-based knowledge, online learning
Procedia PDF Downloads 1351028 The Impact of Temporal Impairment on Quality of Experience (QoE) in Video Streaming: A No Reference (NR) Subjective and Objective Study
Authors: Muhammad Arslan Usman, Muhammad Rehan Usman, Soo Young Shin
Abstract:
Live video streaming is one of the most widely used service among end users, yet it is a big challenge for the network operators in terms of quality. The only way to provide excellent Quality of Experience (QoE) to the end users is continuous monitoring of live video streaming. For this purpose, there are several objective algorithms available that monitor the quality of the video in a live stream. Subjective tests play a very important role in fine tuning the results of objective algorithms. As human perception is considered to be the most reliable source for assessing the quality of a video stream, subjective tests are conducted in order to develop more reliable objective algorithms. Temporal impairments in a live video stream can have a negative impact on the end users. In this paper we have conducted subjective evaluation tests on a set of video sequences containing temporal impairment known as frame freezing. Frame Freezing is considered as a transmission error as well as a hardware error which can result in loss of video frames on the reception side of a transmission system. In our subjective tests, we have performed tests on videos that contain a single freezing event and also for videos that contain multiple freezing events. We have recorded our subjective test results for all the videos in order to give a comparison on the available No Reference (NR) objective algorithms. Finally, we have shown the performance of no reference algorithms used for objective evaluation of videos and suggested the algorithm that works better. The outcome of this study shows the importance of QoE and its effect on human perception. The results for the subjective evaluation can serve the purpose for validating objective algorithms.Keywords: objective evaluation, subjective evaluation, quality of experience (QoE), video quality assessment (VQA)
Procedia PDF Downloads 6021027 Radio Frequency Identification Encryption via Modified Two Dimensional Logistic Map
Authors: Hongmin Deng, Qionghua Wang
Abstract:
A modified two dimensional (2D) logistic map based on cross feedback control is proposed. This 2D map exhibits more random chaotic dynamical properties than the classic one dimensional (1D) logistic map in the statistical characteristics analysis. So it is utilized as the pseudo-random (PN) sequence generator, where the obtained real-valued PN sequence is quantized at first, then applied to radio frequency identification (RFID) communication system in this paper. This system is experimentally validated on a cortex-M0 development board, which shows the effectiveness in key generation, the size of key space and security. At last, further cryptanalysis is studied through the test suite in the National Institute of Standards and Technology (NIST).Keywords: chaos encryption, logistic map, pseudo-random sequence, RFID
Procedia PDF Downloads 4021026 High Level Synthesis of Canny Edge Detection Algorithm on Zynq Platform
Authors: Hanaa M. Abdelgawad, Mona Safar, Ayman M. Wahba
Abstract:
Real-time image and video processing is a demand in many computer vision applications, e.g. video surveillance, traffic management and medical imaging. The processing of those video applications requires high computational power. Therefore, the optimal solution is the collaboration of CPU and hardware accelerators. In this paper, a Canny edge detection hardware accelerator is proposed. Canny edge detection is one of the common blocks in the pre-processing phase of image and video processing pipeline. Our presented approach targets offloading the Canny edge detection algorithm from processing system (PS) to programmable logic (PL) taking the advantage of High Level Synthesis (HLS) tool flow to accelerate the implementation on Zynq platform. The resulting implementation enables up to a 100x performance improvement through hardware acceleration. The CPU utilization drops down and the frame rate jumps to 60 fps of 1080p full HD input video stream.Keywords: high level synthesis, canny edge detection, hardware accelerators, computer vision
Procedia PDF Downloads 4801025 Security in Resource Constraints: Network Energy Efficient Encryption
Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy
Abstract:
Wireless nodes in a sensor network gather and process critical information designed to process and communicate, information flooding through such network is critical for decision making and data processing, the integrity of such data is one of the most critical factors in wireless security without compromising the processing and transmission capability of the network. This paper presents mechanism to securely transmit data over a chain of sensor nodes without compromising the throughput of the network utilizing available battery resources available at the sensor node.Keywords: hybrid protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node data processing, Z-MAC
Procedia PDF Downloads 1451024 Testimonials from Nurses: A Video Presentation to Motivate Freshmen to Pursue their Nursing Career
Authors: Rachell Denise S. Concepcion, Chantelle Vianca D. L. Cobarrubias, Kimberly B. Coloma, Celina Renee R. Colorado, Charlene S. Constantino, Huette Iris C. Consulta
Abstract:
AIMS: This study determined the effect of motivational video in increasing the level of self-motivation among first year nursing students to pursue their nursing career. METHODS: A quantitative quasi experimental one-group pretest-posttest research design was used and purposive sampling technique was utilized. Motivation for Choosing Nursing as a Career Questionnaire was used in determining the level of motivation before and after using the motivational video. The of motivational video entitled, “Testimonials from Nurses” was used as the intervention wherein testimonials from successful Thomasian nursing graduates was considered and viewed by the students in order to inspire them to take nursing as their career. The subjects are nursing students who obtained a score ranging from 21-40 in the questionnaire. Before the viewing, the researchers provided a brief introduction and background to enable the participants to fully understand the contents. After which, debriefing was done. The data gathered was analyzed using the Paired T-Test using SPSS version 21.0. The Pre-test and Post-test scores were compared, which further statistically, differentiated by mean, standard deviation and t-test scores. Results: The t-test value is -17.221 and p value of 0.00 < 0.05 which indicates that there is a statistically significant change in the level of self-motivation of first year nursing students before and after viewing the motivational video. Conclusion: It was therefore concluded that motivational video entitled, “Testimonials From Nurses is an effective intervention in increasing the level of self-motivation of first year nursing students to pursue their nursing career.Keywords: motivational video, freshmen, self-motivation, nursing career
Procedia PDF Downloads 3401023 Image Steganography Using Least Significant Bit Technique
Authors: Preeti Kumari, Ridhi Kapoor
Abstract:
In any communication, security is the most important issue in today’s world. In this paper, steganography is the process of hiding the important data into other data, such as text, audio, video, and image. The interest in this topic is to provide availability, confidentiality, integrity, and authenticity of data. The steganographic technique that embeds hides content with unremarkable cover media so as not to provoke eavesdropper’s suspicion or third party and hackers. In which many applications of compression, encryption, decryption, and embedding methods are used for digital image steganography. Due to compression, the nose produces in the image. To sustain noise in the image, the LSB insertion technique is used. The performance of the proposed embedding system with respect to providing security to secret message and robustness is discussed. We also demonstrate the maximum steganography capacity and visual distortion.Keywords: steganography, LSB, encoding, information hiding, color image
Procedia PDF Downloads 4751022 Video Compression Using Contourlet Transform
Authors: Delara Kazempour, Mashallah Abasi Dezfuli, Reza Javidan
Abstract:
Video compression used for channels with limited bandwidth and storage devices has limited storage capabilities. One of the most popular approaches in video compression is the usage of different transforms. Discrete cosine transform is one of the video compression methods that have some problems such as blocking, noising and high distortion inappropriate effect in compression ratio. wavelet transform is another approach is better than cosine transforms in balancing of compression and quality but the recognizing of curve curvature is so limit. Because of the importance of the compression and problems of the cosine and wavelet transforms, the contourlet transform is most popular in video compression. In the new proposed method, we used contourlet transform in video image compression. Contourlet transform can save details of the image better than the previous transforms because this transform is multi-scale and oriented. This transform can recognize discontinuity such as edges. In this approach we lost data less than previous approaches. Contourlet transform finds discrete space structure. This transform is useful for represented of two dimension smooth images. This transform, produces compressed images with high compression ratio along with texture and edge preservation. Finally, the results show that the majority of the images, the parameters of the mean square error and maximum signal-to-noise ratio of the new method based contourlet transform compared to wavelet transform are improved but in most of the images, the parameters of the mean square error and maximum signal-to-noise ratio in the cosine transform is better than the method based on contourlet transform.Keywords: video compression, contourlet transform, discrete cosine transform, wavelet transform
Procedia PDF Downloads 4461021 The Developing of Teaching Materials Online for Students in Thailand
Authors: Pitimanus Bunlue
Abstract:
The objectives of this study were to identify the unique characteristics of Salaya Old market, Phutthamonthon, Nakhon Pathom and develop the effective video media to promote the homeland awareness among local people and the characteristic features of this community were collectively summarized based on historical data, community observation, and people’s interview. The acquired data were used to develop a media describing prominent features of the community. The quality of the media was later assessed by interviewing local people in the old market in terms of content accuracy, video, and narration qualities, and sense of homeland awareness after watching the video. The result shows a 6-minute video media containing historical data and outstanding features of this community was developed. Based on the interview, the content accuracy was good. The picture quality and the narration were very good. Most people developed a sense of homeland awareness after watching the video also as well.Keywords: audio-visual, creating homeland awareness, Phutthamonthon Nakhon Pathom, research and development
Procedia PDF Downloads 2931020 Constructivist Design Approaches to Video Production for Distance Education in Business and Economics
Authors: C. von Essen
Abstract:
This study outlines and evaluates a constructivist design approach to the creation of educational video on postgraduate business degree programmes. Many online courses are tapping into the educational affordances of video, as this form of online learning has the potential to create rich, multimodal experiences. And yet, in many learning contexts video is still being used to transmit instruction to passive learners, rather than promote learner engagement and knowledge creation. Constructivism posits the notion that learning is shaped as students make connections between their experiences and ideas. This paper pivots on the following research question: how can we design educational video in ways which promote constructivist learning and stimulate analytic viewing? By exploring and categorizing over two thousand educational videos created since 2014 for over thirty postgraduate courses in business, economics, mathematics and statistics, this paper presents and critically reflects on a taxonomy of video styles and features. It links the pedagogical intent of video – be it concept explanation, skill demonstration, feedback, real-world application of ideas, community creation, or the cultivation of course narrative – to specific presentational characteristics such as visual effects including diagrammatic and real-life graphics and aminations, commentary and sound options, chronological sequencing, interactive elements, and presenter set-up. The findings of this study inform a framework which captures the pedagogical, technological and production considerations instructional designers and educational media specialists should be conscious of when planning and preparing the video. More broadly, the paper demonstrates how learning theory and technology can coalesce to produce informed and pedagogical grounded instructional design choices. This paper reveals how crafting video in a more conscious and critical manner can produce powerful, new educational design.Keywords: educational video, constructivism, instructional design, business education
Procedia PDF Downloads 2381019 Motion Estimator Architecture with Optimized Number of Processing Elements for High Efficiency Video Coding
Authors: Seongsoo Lee
Abstract:
Motion estimation occupies the heaviest computation in HEVC (high efficiency video coding). Many fast algorithms such as TZS (test zone search) have been proposed to reduce the computation. Still the huge computation of the motion estimation is a critical issue in the implementation of HEVC video codec. In this paper, motion estimator architecture with optimized number of PEs (processing element) is presented by exploiting early termination. It also reduces hardware size by exploiting parallel processing. The presented motion estimator architecture has 8 PEs, and it can efficiently perform TZS with very high utilization of PEs.Keywords: motion estimation, test zone search, high efficiency video coding, processing element, optimization
Procedia PDF Downloads 3651018 Design, Development by Functional Analysis in UML and Static Test of a Multimedia Voice and Video Communication Platform on IP for a Use Adapted to the Context of Local Businesses in Lubumbashi
Authors: Blaise Fyama, Elie Museng, Grace Mukoma
Abstract:
In this article we present a java implementation of video telephony using the SIP protocol (Session Initiation Protocol). After a functional analysis of the SIP protocol, we relied on the work of Italian researchers of University of Parma-Italy to acquire adequate libraries for the development of our own communication tool. In order to optimize the code and improve the prototype, we used, in an incremental approach, test techniques based on a static analysis based on the evaluation of the complexity of the software with the application of metrics and the number cyclomatic of Mccabe. The objective is to promote the emergence of local start-ups producing IP video in a well understood local context. We have arrived at the creation of a video telephony tool whose code is optimized.Keywords: static analysis, coding complexity metric mccabe, Sip, uml
Procedia PDF Downloads 1201017 Analysis of Football Fans Perception of the Video Assistant Referee System
Authors: David Yartel, Johnmark Ampomah Mensah Fobi, Ernest Yeboah Acheampong, Sintim Musah
Abstract:
Football has gone through a series of technological reforms targeted at improving the game for its audience. Yet, promote sanity of the game led to the introduction of the video assistant referee (VAR) to ‘check’ or ‘review’ an incident to clarify incidents and communicate the outcome to the referee and the fans. This is to reduce controversies regarding incidents on the pitch of play. In this study, we seek to survey the views of football fans to understand their perception of the video assistant referee, whether it has brought sanity or reduce the uncertainty regarding the decisions after reviews. The exploratory study focuses on 420 fans arbitrarily sampled on the university campuses to answer questionnaires based on the introduction of the video assistant referee. Results show that the VAR has interrupted the flow of the game, dropping passion, increased controversies including decisions from the referees’ call room leading to ensuing fans conflict, especially when it is against their team and vice versa. The study concludes by addressing some of their concerns as the VAR has come to minimise perceptions of incidents and engender fairness for teams.Keywords: football fans, football incidents, football match, video assistant referee, technology
Procedia PDF Downloads 1441016 Potential Usefulness of Video Lectures as a Tool to Improve Synchronous and Asynchronous the Online Education
Authors: Omer Shujat Bhatti, Afshan Huma
Abstract:
Online educational system were considered a great opportunity for distance learning. In recent days of COVID19 pandemic, it enable the continuation of educational activities at all levels of education, from primary school to the top level universities. One of the key considered element in supporting the online educational system is video lectures. The current research explored the usefulness of the video lectures delivered to technical students of masters level with a focus on MSc Sustainable Environmental design students who have diverse backgrounds in the formal educational system. Hence they were unable to cope right away with the online system and faced communication and understanding issues in the lecture session due to internet and allied connectivity issues. Researcher used self prepared video lectures for respective subjects and provided them to the students using Youtube channel and subject based Whatsapp groups. Later, students were asked about the usefulness of the lectures towards a better understanding of the subject and an overall enhanced learning experience. More than 80% of the students appreciated the effort and requested it to be part of the overall system. Data collection was done using an online questionnaire which was prior briefed to the students with the purpose of research. It was concluded that video lectures should be considered an integral part of the lecture sessions and must be provided prior to the lecture session, ensuring a better quality of delivery. It was also recommended that the existing system must be upgraded to support the availability of these video lectures through the portal. Teachers training must be provided to help develop quality video content ensuring that is able to cover the content and courses taught.Keywords: video lectures, online distance education, synchronous instruction, asynchronous communication
Procedia PDF Downloads 1171015 Object Trajectory Extraction by Using Mean of Motion Vectors Form Compressed Video Bitstream
Authors: Ching-Ting Hsu, Wei-Hua Ho, Yi-Chun Chang
Abstract:
Video object tracking is one of the popular research topics in computer graphics area. The trajectory can be applied in security, traffic control, even the sports training. The trajectory for sports training can be utilized to analyze the athlete’s performance without traditional sensors. There are many relevant works which utilize mean shift algorithm with background subtraction. This kind of the schemes should select a kernel function which may affect the accuracy and performance. In this paper, we consider the motion information in the pre-coded bitstream. The proposed algorithm extracts the trajectory by composing the motion vectors from the pre-coded bitstream. We gather the motion vectors from the overlap area of the object and calculate mean of the overlapped motion vectors. We implement and simulate our proposed algorithm in H.264 video codec. The performance is better than relevant works and keeps the accuracy of the object trajectory. The experimental results show that the proposed trajectory extraction can extract trajectory form the pre-coded bitstream in high accuracy and achieve higher performance other relevant works.Keywords: H.264, video bitstream, video object tracking, sports training
Procedia PDF Downloads 4281014 Encryption Image via Mutual Singular Value Decomposition
Authors: Adil Al-Rammahi
Abstract:
Image or document encryption is needed through e- government data base. Really in this paper we introduce two matrices images, one is the public, and the second is the secret (original). The analyses of each matrix is achieved using the transformation of singular values decomposition. So each matrix is transformed or analyzed to three matrices say row orthogonal basis, column orthogonal basis, and spectral diagonal basis. Product of the two row basis is calculated. Similarly the product of the two column basis is achieved. Finally we transform or save the files of public, row product and column product. In decryption stage, the original image is deduced by mutual method of the three public files.Keywords: image cryptography, singular values decomposition
Procedia PDF Downloads 4391013 Model Estimation and Error Level for Okike’s Merged Irregular Transposition Cipher
Authors: Okike Benjamin, Garba E. J. D.
Abstract:
The researcher has developed a new encryption technique known as Merged Irregular Transposition Cipher. In this cipher method of encryption, a message to be encrypted is split into parts and each part encrypted separately. Before the encrypted message is transmitted to the recipient(s), the positions of the split in the encrypted messages could be swapped to ensure more security. This work seeks to develop a model by considering the split number, S and the average number of characters per split, L as the message under consideration is split from 2 through 10. Again, after developing the model, the error level in the model would be determined.Keywords: merged irregular transposition, error level, model estimation, message splitting
Procedia PDF Downloads 314