Search results for: video encryption
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1122

Search results for: video encryption

1032 Adaptive Multiple Transforms Hardware Architecture for Versatile Video Coding

Authors: T. Damak, S. Houidi, M. A. Ben Ayed, N. Masmoudi

Abstract:

The Versatile Video Coding standard (VVC) is actually under development by the Joint Video Exploration Team (or JVET). An Adaptive Multiple Transforms (AMT) approach was announced. It is based on different transform modules that provided an efficient coding. However, the AMT solution raises several issues especially regarding the complexity of the selected set of transforms. This can be an important issue, particularly for a future industrial adoption. This paper proposed an efficient hardware implementation of the most used transform in AMT approach: the DCT II. The developed circuit is adapted to different block sizes and can reach a minimum frequency of 192 MHz allowing an optimized execution time.

Keywords: adaptive multiple transforms, AMT, DCT II, hardware, transform, versatile video coding, VVC

Procedia PDF Downloads 118
1031 Effect of Educational Information with Video Compact Disc on Anxiety Level in Patients Undergoing Bronchoscopy in Ramathibodi Hospital

Authors: Chariya Laohavich, Viboon Bunsrangsuk

Abstract:

Objective: Bronchoscopy is a common outpatient procedure. The authors compared the patient anxiety level before and after received video-assisted procedural information. Method: One hundred and twenty patients who never received bronchoscopy and scheduled for elective bronchoscopy at outpatient Bronchosope unit at Ramathibodi Hospital, Mahidol University were randomized into control and intervention group. Video-assisted procedural information was given in intervention group. Pre and post procedural anxiety score were recorded and compared between two groups. Paired T-test was used for statistical analysis. Result: There was statistically significant decrease (p < 0.001) for anxiety score in patients who received video assisted procedural information compare with control group. Conclusion: Video-assisted procedural information should be given to patient who will have bronchoscopy to reduce anxiety.

Keywords: anxiety, bronchoscopy, video compact disc (VCD)

Procedia PDF Downloads 322
1030 Going Viral: Constructively Aligning the Use of Digital Video to Effectively Support Faculty Development

Authors: Samuel Olugbenga King

Abstract:

This review article, which is a synthesis of the relevant research literature, focuses on the capabilities of digital video to support, facilitate and enhance faculty development. Based on the literature review, faculty development (i.e., academic or educational development) requires the continued adoption of cohesive, theoretical frameworks to guide research and practice; incorporation of relevant tools from analogous fields, such as teacher professional development; systematic program evaluations; and detailed descriptions of practice to further practice and creative development. A cohesive, five-heuristic framework is subsequently outlined to inform the design and evaluation of the use of digital video, so as to address the barriers to advancing faculty development, as identified through the literature review. Alternative impact evaluation approaches are also described, while the limitations of using digital video for faculty development are highlighted. This paper is therefore conceived as one way to meaningfully leverage the educational affordances of digital video to address some lingering gaps in faculty development.

Keywords: digital video, faculty/educational development, evaluation, scholarship of teaching and learning (SoTL)

Procedia PDF Downloads 322
1029 A Security Cloud Storage Scheme Based Accountable Key-Policy Attribute-Based Encryption without Key Escrow

Authors: Ming Lun Wang, Yan Wang, Ning Ruo Sun

Abstract:

With the development of cloud computing, more and more users start to utilize the cloud storage service. However, there exist some issues: 1) cloud server steals the shared data, 2) sharers collude with the cloud server to steal the shared data, 3) cloud server tampers the shared data, 4) sharers and key generation center (KGC) conspire to steal the shared data. In this paper, we use advanced encryption standard (AES), hash algorithms, and accountable key-policy attribute-based encryption without key escrow (WOKE-AKP-ABE) to build a security cloud storage scheme. Moreover, the data are encrypted to protect the privacy. We use hash algorithms to prevent the cloud server from tampering the data uploaded to the cloud. Analysis results show that this scheme can resist conspired attacks.

Keywords: cloud storage security, sharing storage, attributes, Hash algorithm

Procedia PDF Downloads 351
1028 A Survey on Countermeasures of Cache-Timing Attack on AES Systems

Authors: Settana M. Abdulh, Naila A. Sadalla, Yaseen H. Taha, Howaida Elshoush

Abstract:

Side channel attacks are based on side channel information, which is information that is leaked from encryption systems. This includes timing information, power consumption as well as electromagnetic or even sound leaking which can exploited by an attacker. Implementing side channel attacks are possible if and only if an attacker has access to a cryptosystem. In this case, the attacker can exploit bad implementation in software or hardware which is not controlled by encryption implementer. Thus, he/she will represent a real threat to the security system. Several countermeasures have been proposed to eliminate side channel information vulnerability.Cache timing attack is a special type of side channel attack. Here, timing information is collected and analyzed by an attacker to guess sensitive information such as encryption key or plaintext. This paper reviews the technique applied in this attack and surveys the countermeasures against it, evaluating the feasibility and usability of each. Based on this evaluation, finally we pose several recommendations about using these countermeasures.

Keywords: AES algorithm, side channel attack, cache timing attack, cache timing countermeasure

Procedia PDF Downloads 267
1027 Efficient Video Compression Technique Using Convolutional Neural Networks and Generative Adversarial Network

Authors: P. Karthick, K. Mahesh

Abstract:

Video has become an increasingly significant component of our digital everyday contact. With the advancement of greater contents and shows of the resolution, its significant volume poses serious obstacles to the objective of receiving, distributing, compressing, and revealing video content of high quality. In this paper, we propose the primary beginning to complete a deep video compression model that jointly upgrades all video compression components. The video compression method involves splitting the video into frames, comparing the images using convolutional neural networks (CNN) to remove duplicates, repeating the single image instead of the duplicate images by recognizing and detecting minute changes using generative adversarial network (GAN) and recorded with long short-term memory (LSTM). Instead of the complete image, the small changes generated using GAN are substituted, which helps in frame level compression. Pixel wise comparison is performed using K-nearest neighbours (KNN) over the frame, clustered with K-means, and singular value decomposition (SVD) is applied for each and every frame in the video for all three color channels [Red, Green, Blue] to decrease the dimension of the utility matrix [R, G, B] by extracting its latent factors. Video frames are packed with parameters with the aid of a codec and converted to video format, and the results are compared with the original video. Repeated experiments on several videos with different sizes, duration, frames per second (FPS), and quality results demonstrate a significant resampling rate. On average, the result produced had approximately a 10% deviation in quality and more than 50% in size when compared with the original video.

Keywords: video compression, K-means clustering, convolutional neural network, generative adversarial network, singular value decomposition, pixel visualization, stochastic gradient descent, frame per second extraction, RGB channel extraction, self-detection and deciding system

Procedia PDF Downloads 161
1026 Video Foreground Detection Based on Adaptive Mixture Gaussian Model for Video Surveillance Systems

Authors: M. A. Alavianmehr, A. Tashk, A. Sodagaran

Abstract:

Modeling background and moving objects are significant techniques for video surveillance and other video processing applications. This paper presents a foreground detection algorithm that is robust against illumination changes and noise based on adaptive mixture Gaussian model (GMM), and provides a novel and practical choice for intelligent video surveillance systems using static cameras. In the previous methods, the image of still objects (background image) is not significant. On the contrary, this method is based on forming a meticulous background image and exploiting it for separating moving objects from their background. The background image is specified either manually, by taking an image without vehicles, or is detected in real-time by forming a mathematical or exponential average of successive images. The proposed scheme can offer low image degradation. The simulation results demonstrate high degree of performance for the proposed method.

Keywords: image processing, background models, video surveillance, foreground detection, Gaussian mixture model

Procedia PDF Downloads 486
1025 Performance of High Efficiency Video Codec over Wireless Channels

Authors: Mohd Ayyub Khan, Nadeem Akhtar

Abstract:

Due to recent advances in wireless communication technologies and hand-held devices, there is a huge demand for video-based applications such as video surveillance, video conferencing, remote surgery, Digital Video Broadcast (DVB), IPTV, online learning courses, YouTube, WhatsApp, Instagram, Facebook, Interactive Video Games. However, the raw videos posses very high bandwidth which makes the compression a must before its transmission over the wireless channels. The High Efficiency Video Codec (HEVC) (also called H.265) is latest state-of-the-art video coding standard developed by the Joint effort of ITU-T and ISO/IEC teams. HEVC is targeted for high resolution videos such as 4K or 8K resolutions that can fulfil the recent demands for video services. The compression ratio achieved by the HEVC is twice as compared to its predecessor H.264/AVC for same quality level. The compression efficiency is generally increased by removing more correlation between the frames/pixels using complex techniques such as extensive intra and inter prediction techniques. As more correlation is removed, the chances of interdependency among coded bits increases. Thus, bit errors may have large effect on the reconstructed video. Sometimes even single bit error can lead to catastrophic failure of the reconstructed video. In this paper, we study the performance of HEVC bitstream over additive white Gaussian noise (AWGN) channel. Moreover, HEVC over Quadrature Amplitude Modulation (QAM) combined with forward error correction (FEC) schemes are also explored over the noisy channel. The video will be encoded using HEVC, and the coded bitstream is channel coded to provide some redundancies. The channel coded bitstream is then modulated using QAM and transmitted over AWGN channel. At the receiver, the symbols are demodulated and channel decoded to obtain the video bitstream. The bitstream is then used to reconstruct the video using HEVC decoder. It is observed that as the signal to noise ratio of channel is decreased the quality of the reconstructed video decreases drastically. Using proper FEC codes, the quality of the video can be restored up to certain extent. Thus, the performance analysis of HEVC presented in this paper may assist in designing the optimized code rate of FEC such that the quality of the reconstructed video is maximized over wireless channels.

Keywords: AWGN, forward error correction, HEVC, video coding, QAM

Procedia PDF Downloads 121
1024 The Development of Educational Video Games Aimed at Enhancing Academic Motivation and Learning Among African American Males

Authors: Kenneth Philip Jones

Abstract:

This dissertation investigates the potential of developing educational-based video games to motivate and engage African American males. The study employed a qualitative methodological approach by investigating African American males who are avid video game players and are currently enrolled at a college or university. The participants were individually and collectively video and audio recorded during the interviews and observations. Situated Learning theory analyzed how motivation and engagement can transfer from a video game to an educational context. The research aims to address the disparities in our educational systems when it comes to providing a culture, climate, and atmosphere that will enable the academic development of African American males. The primary objective of the findings is based on the participants’ responses and the data collected to provide recommendations to educators and scholars on how to address the issues that have demoralized African American males in education and provide a platform that will allow for equality in educational development and advancement.

Keywords: video games, motivation, behavioral, learning transfer

Procedia PDF Downloads 84
1023 The Use of Video in Increasing Speaking Ability of the First Year Students of SMAN 12 Pekanbaru in the Academic Year 2011/2012

Authors: Elvira Wahyuni

Abstract:

This study is a classroom action research. The general objective of this study was to find out students’ speaking ability through teaching English by using video and to find out the effectiveness of using video in teaching English to improve students’ speaking ability. The subjects of this study were 34 of the first-year students of SMAN 12 Pekanbaru who were learning English as a foreign language (EFL). Students were given pre-test before the treatment and post-test after the treatment. Quantitative data was collected by using speaking test requiring the students to respond to the recorded questions. Qualitative data was collected through observation sheets and field notes. The research finding reveals that there is a significant improvement of the students’ speaking ability through the use of video in speaking class. The qualitative data gave a description and additional information about the learning process done by the students. The research findings indicate that the use of video in teaching and learning is good in increasing learning outcome.

Keywords: English teaching, fun learning, speaking ability, video

Procedia PDF Downloads 233
1022 Using A Blockchain-Based, End-to-End Encrypted Communication System Between Mobile Terminals to Improve Organizational Privacy

Authors: Andrei Bogdan Stanescu, Robert Stana

Abstract:

Creating private and secure communication channels between employees has become a critical aspect in order to ensure organizational integrity and avoid leaks of sensitive information. With the widespread use of modern methods of disrupting communication between users, real use-cases of advanced encryption mechanisms have emerged to avoid cyber-attackers that are willing to intercept private conversations between critical employees in an organization. This paper aims to present a custom implementation of a messaging application named “Whisper” that uses end-to-end encryption (E2EE) mechanisms and blockchain-related components to protect sensitive conversations and mitigate the risks of information breaches inside organizations. The results of this research paper aim to expand the areas of applicability of E2EE algorithms and integrations with private blockchains in chat applications as a viable method of enhancing intra-organizational communication privacy.

Keywords: end-to-end encryption, mobile communication, cryptography, communication security, data privacy

Procedia PDF Downloads 50
1021 Secret Sharing in Visual Cryptography Using NVSS and Data Hiding Techniques

Authors: Misha Alexander, S. B. Waykar

Abstract:

Visual Cryptography is a special unbreakable encryption technique that transforms the secret image into random noisy pixels. These shares are transmitted over the network and because of its noisy texture it attracts the hackers. To address this issue a Natural Visual Secret Sharing Scheme (NVSS) was introduced that uses natural shares either in digital or printed form to generate the noisy secret share. This scheme greatly reduces the transmission risk but causes distortion in the retrieved secret image through variation in settings and properties of digital devices used to capture the natural image during encryption / decryption phase. This paper proposes a new NVSS scheme that extracts the secret key from randomly selected unaltered multiple natural images. To further improve the security of the shares data hiding techniques such as Steganography and Alpha channel watermarking are proposed.

Keywords: decryption, encryption, natural visual secret sharing, natural images, noisy share, pixel swapping

Procedia PDF Downloads 382
1020 The Effectiveness of Using Video Modeling Procedures on the ipad to Teach Play Skills Children with ASD

Authors: Esra Orum Cattik

Abstract:

This study evaluated the effects of using video modeling procedures on the iPad to teach play skills to children with autism spectrum disorders. A male student with autism spectrum disorders participated in this study. A multiple baseline-across-skills single-subject design was used to evaluate the effects of using video modeling procedures on the iPad. During baseline, no prompts were presented to participants. In the intervention phase, the teacher gave video model on iPad to the first skill and asked play with toys for him. When the first play skill completed the second play skill began intervention. This procedure continued till all three play skill completed intervention. Finally, the participant learned all three play skills to use video modeling presented on the iPad. Based upon findings of this study, suggestions have been made to future researches.

Keywords: autism spectrum disorders, play, play skills, video modeling, single subject design

Procedia PDF Downloads 381
1019 Challenges in Video Based Object Detection in Maritime Scenario Using Computer Vision

Authors: Dilip K. Prasad, C. Krishna Prasath, Deepu Rajan, Lily Rachmawati, Eshan Rajabally, Chai Quek

Abstract:

This paper discusses the technical challenges in maritime image processing and machine vision problems for video streams generated by cameras. Even well documented problems of horizon detection and registration of frames in a video are very challenging in maritime scenarios. More advanced problems of background subtraction and object detection in video streams are very challenging. Challenges arising from the dynamic nature of the background, unavailability of static cues, presence of small objects at distant backgrounds, illumination effects, all contribute to the challenges as discussed here.

Keywords: autonomous maritime vehicle, object detection, situation awareness, tracking

Procedia PDF Downloads 420
1018 Smartphone Video Source Identification Based on Sensor Pattern Noise

Authors: Raquel Ramos López, Anissa El-Khattabi, Ana Lucila Sandoval Orozco, Luis Javier García Villalba

Abstract:

An increasing number of mobile devices with integrated cameras has meant that most digital video comes from these devices. These digital videos can be made anytime, anywhere and for different purposes. They can also be shared on the Internet in a short period of time and may sometimes contain recordings of illegal acts. The need to reliably trace the origin becomes evident when these videos are used for forensic purposes. This work proposes an algorithm to identify the brand and model of mobile device which generated the video. Its procedure is as follows: after obtaining the relevant video information, a classification algorithm based on sensor noise and Wavelet Transform performs the aforementioned identification process. We also present experimental results that support the validity of the techniques used and show promising results.

Keywords: digital video, forensics analysis, key frame, mobile device, PRNU, sensor noise, source identification

Procedia PDF Downloads 405
1017 Performance Evaluation of Routing Protocols for Video Conference over MPLS VPN Network

Authors: Abdullah Al Mamun, Tarek R. Sheltami

Abstract:

Video conferencing is a highly demanding facility now a days in order to its real time characteristics, but faster communication is the prior requirement of this technology. Multi Protocol Label Switching (MPLS) IP Virtual Private Network (VPN) address this problem and it is able to make a communication faster than others techniques. However, this paper studies the performance comparison of video traffic between two routing protocols namely the Enhanced Interior Gateway Protocol(EIGRP) and Open Shortest Path First (OSPF). The combination of traditional routing and MPLS improve the forwarding mechanism, scalability and overall network performance. We will use GNS3 and OPNET Modeler 14.5 to simulate many different scenarios and metrics such as delay, jitter and mean opinion score (MOS) value are measured. The simulation result will show that OSPF and BGP-MPLS VPN offers best performance for video conferencing application.

Keywords: OSPF, BGP, EIGRP, MPLS, Video conference, Provider router, edge router, layer3 VPN

Procedia PDF Downloads 313
1016 A Review of Encryption Algorithms Used in Cloud Computing

Authors: Derick M. Rakgoale, Topside E. Mathonsi, Vusumuzi Malele

Abstract:

Cloud computing offers distributed online and on-demand computational services from anywhere in the world. Cloud computing services have grown immensely over the past years, especially in the past year due to the Coronavirus pandemic. Cloud computing has changed the working environment and introduced work from work phenomenon, which enabled the adoption of technologies to fulfill the new workings, including cloud services offerings. The increased cloud computing adoption has come with new challenges regarding data privacy and its integrity in the cloud environment. Previously advanced encryption algorithms failed to reduce the memory space required for cloud computing performance, thus increasing the computational cost. This paper reviews the existing encryption algorithms used in cloud computing. In the future, artificial neural networks (ANN) algorithm design will be presented as a security solution to ensure data integrity, confidentiality, privacy, and availability of user data in cloud computing. Moreover, MATLAB will be used to evaluate the proposed solution, and simulation results will be presented.

Keywords: cloud computing, data integrity, confidentiality, privacy, availability

Procedia PDF Downloads 87
1015 Evaluation of Cognitive Benefits among Differently Abled Subjects with Video Game as Intervention

Authors: H. Nagendra, Vinod Kumar, S. Mukherjee

Abstract:

In this study, the potential benefits of playing action video game among congenitally deaf and dumb subjects is reported in terms of EEG ratio indices. The frontal and occipital lobes are associated with development of motor skills, cognition, and visual information processing and color recognition. The sixteen hours of First-Person shooter action video game play resulted in the increase of the ratios β/(α+θ) and β/θ in frontal and occipital lobes. This can be attributed to the enhancement of certain aspect of cognition among deaf and dumb subjects.

Keywords: cognitive enhancement, video games, EEG band powers, deaf and dumb subjects

Procedia PDF Downloads 395
1014 Acute Bronchiolitis: Impact of an Educational Video on Mothers’ Knowledge, Attitudes, and Practices

Authors: Atitallah Sofien, Missaoui Nada, Ben Rabeh Rania, Yahyaoui Salem, Mazigh Sonia, Bouyahia Olfa, Boukthir Samir

Abstract:

Introduction: Acute bronchiolitis (AB) is a real public health problem on a global and national scale. Its treatment is most often outpatient. The use of audio-visual supports, such as educational videos, is an innovation in therapeutic education in outpatient treatment. The aim of our study was to evaluate the impact of an educational video on the knowledge, attitudes, and practices of mothers of infants with AB. Methodology: This was a descriptive, analytical, and cross-sectional study with prospective data collection, including mothers of infants with AB. We assessed mothers' knowledge, attitudes, and practices regarding AB, and we created an educational video. We used a questionnaire written in Tunisian Arabic concerning sociodemographic data, mothers' knowledge and attitudes regarding AB, and their opinions on the video, as well as an observation grid to evaluate their practices on the nasopharyngeal unblocking technique. We compared the different parameters before and after watching the video. Results: We noted a statistically significant improvement in mothers' knowledge scores on AB (7.46 in the pre-test versus 14.08 in the post-test; p≤0.05), practices (12.42 in the pre-test versus 18 in the post-test; p≤0.05) and attitudes (5.86 in pre-test versus 9.02 in post-test; p≤0.05). Conclusion: The use of an educational video has a positive impact on the knowledge, practices, and attitudes of mothers towards AB.

Keywords: acute bronchiolitis, therapeutic education, mothers, educational video

Procedia PDF Downloads 36
1013 The Effect of Video Using in Teaching Speaking on Students of Non-Native English Speakers at STIE Perbanas Surabaya

Authors: Kartika Marta Budiana

Abstract:

Low competence in speaking for the students of Non English native speakers have been crucial so far for the teachers in language teaching in Indonesia. This study attempts to explore the effect of video using in teaching speaking onstudents of non-native English speakers at STIE Perbanas Surabaya. This includes investigate the students` attitudes toward the video used in classroom. This is a quantitative research that is an experimental one based on analyses derived the concepts of from teaching speaking and the use of video. There are two classes observed, the experimental and the control one. The experimental consist of 28 students and the control class consists of 25 students. Before the treatment given, both of the group is given the pre-test to check their ability level. Then, after the treatment is given, the post-test is given to the both groups. Then, the students were given treatment how to conduct a meeting that they learnt from a video of business English. The post test was held after they undergone a treatment. The instruments to get the data are the oral test and questionnaire. The data of this study is students` score and from the tests` score it can be seen there is a positive significant difference in the experimental group. The t-test to test hypothesize also shows that it is accepted which said that there is an improvement on the students` speaking competence achievement. In conclusion, the video effects on the significant difference on the students speaking competence achievement.

Keywords: video, teaching, speaking, Indonesia

Procedia PDF Downloads 405
1012 The Chemistry in the Video Game No Man’s Sky

Authors: Diogo Santos, Nelson Zagalo, Carla Morais

Abstract:

No Man’s Sky (NMS) is a sci-fi video game about survival and exploration where players fly spaceships, search for elements, and use them to survive. NMS isn’t a serious game, and not all the science in the game is presented with scientific evidence. To find how players felt about the scientific content in the game and how they perceive the chemistry in it, a survey was sent to NMS’s players, from which were collected answers from 124 respondents from 23 countries. Chemophobia is still a phenomenon when chemistry or chemicals are a subject of discussion, but 68,9% of our respondents showed a positive attitude towards the presence of chemistry in NMS, with 57% stating that playing the video game motivated them to know more about science. 8% of the players stated that NMS often prompted conversations about the science in the video game between them and teachers, parents, or friends. These results give us ideas on how an entertainment game can potentially help scientists, educators, and science communicators reach a growing, evolving, vibrant, diverse, and demanding audience.

Keywords: digital games, science communication, chemistry, informal learning, No Man’s Sky

Procedia PDF Downloads 76
1011 Video-Observation: A Phenomenological Research Tool for International Relation?

Authors: Andreas Aagaard Nohr

Abstract:

International Relations is an academic discipline which is rarely in direct contact with its field. However, there has in recent years been a growing interest in the different agents within and beyond the state and their associated practices; yet some of the research tools with which to study them are not widely used. This paper introduces video-observation as a method for the study of IR and argues that it offers a unique way of studying the complexity of the everyday context of actors. The paper is divided into two main parts: First, the philosophical and methodological underpinnings of the kind of data that video-observation produces are discussed; primarily through a discussion of the phenomenology of Husserl, Heidegger, and Merleau-Ponty. Second, taking simulation of a WTO negotiation round as an example, the paper discusses how the data created can be analysed: in particular with regard to the structure of events, the temporal and spatial organization of activities, rhythm and periodicity, and the concrete role of artefacts and documents. The paper concludes with a discussion of the ontological, epistemological, and practical challenges and limitations that ought to be considered if video-observation is chosen as a method within the field of IR.

Keywords: video-observation, phenomenology, international relations

Procedia PDF Downloads 417
1010 The Role of Video in Teaching and Learning Pronunciation: A Case Study

Authors: Kafi Razzaq Ahmed

Abstract:

Speaking fluently in a second language requires vocabulary, grammar, and pronunciation skills. Teaching the English language entails teaching pronunciation. In professional literature, there have been a lot of attempts to integrate technology into improving the pronunciation of learners. The technique is also neglected in Kurdish contexts, Salahaddin University – Erbil included. Thus, the main aim of the research is to point out the efficiency of using video materials for both language teachers and learners within and beyond classroom learning and teaching environments to enhance student's pronunciation. To collect practical data, a research project has been designed. In subsequent research, a posttest will be administered after each lesson to 100 first-year students at Salahaddin University-Erbil English departments. All students will be taught the same material using different methods, one based on video materials and the other based on the traditional approach to teaching pronunciation. Finally, the results of both tests will be analyzed (also knowing the attitudes of both the teachers and the students about both lessons) to indicate the impact of using video in the process of teaching and learning pronunciation.

Keywords: video, pronunciation, teaching, learning

Procedia PDF Downloads 78
1009 Online Versus Face-To-Face – How Do Video Consultations Change The Doctor-Patient-Interaction

Authors: Markus Feufel, Friederike Kendel, Caren Hilger, Selamawit Woldai

Abstract:

Since the corona pandemic, the use of video consultation has increased remarkably. For vulnerable groups such as oncological patients, the advantages seem obvious. But how does video consultation potentially change the doctor-patient relationship compared to face-to-face consultation? Which barriers may hinder the effective use of this consultation format in practice? We are presenting first results from a mixed-methods field study, funded by Federal Ministry of Health, which will provide the basis for a hands-on guide for both physicians and patients on how to improve the quality of video consultations. We use a quasi-experimental design to analyze qualitative and quantitative differences between face-to-face and video consultations based on video recordings of N = 64 actual counseling sessions (n = 32 for each consultation format). Data will be recorded from n = 32 gynecological and n = 32 urological cancer patients at two clinics. After the consultation, all patients will be asked to fill out a questionnaire about their consultation experience. For quantitative analyses, the counseling sessions will be systematically compared in terms of verbal and nonverbal communication patterns. Relative frequencies of eye contact and the information exchanged will be compared using 𝝌2 -tests. The validated questionnaire MAPPIN'Obsdyad will be used to assess the expression of shared decision-making parameters. In addition, semi-structured interviews will be conducted with n = 10 physicians and n = 10 patients experienced with video consultation, for which a qualitative content analysis will be conducted. We will elaborate the comprehensive methodological approach we used to compare video vs. face-to-face consultations and present first evidence on how video consultations change the doctor-patient interaction. We will also outline possible barriers of video consultations and best practices on how they may be overcome. Based on the results, we will present and discuss recommendations outlining best practices for how to prepare and conduct high-quality video consultations from the perspective of both physicians and patients.

Keywords: video consultation, patient-doctor-relationship, digital applications, technical barriers

Procedia PDF Downloads 112
1008 The Effectiveness of Video Modeling Procedures on Request an Item Behavior Children with Autism Spectrum Disorders

Authors: Melih Cattik

Abstract:

The present study investigate effectiveness of video modeling procedures on request an item behavior of children with ASD. Two male and a female children with ASD participated in the study. A multiple baseline across participant single-subject design was used to evaluate the effects of the video modeling procedures on request an item behavior. During baseline, no prompts were presented to participants. In the intervention phase, the teacher gave video model to the participant and than created opportunity for request an item to him/her. When the first participant reached to criterion, the second participant began intervention. This procedure continued till all participants completed intervention. Finally, all three participants learned to request an item behavior. Based upon findings of this study, it will make suggestions to future researches.

Keywords: autism spectrum disorders, video modeling procedures, request an item behavior, single subject design

Procedia PDF Downloads 375
1007 Application of Modulo-2 Arithmetic in Securing Communicated Messages throughout the Globe

Authors: Ejd Garba, Okike Benjamin

Abstract:

Today, the word encryption has become very popular even among non-computer professionals. There is no doubt that some works have been carried out in this area, but more works need to be done. Presently, most of the works on encryption is concentrated on the sender of the message without paying any attention to the message recipient. However, it is a good practice if any message sent to someone is received by the particular person whom the message is sent to. This work seeks to ensure that at the receiving end of the message, there is a security to ensure that the recipient computes a key that would enable the encrypted message to be accessed. This key would be in form of password. This would make it possible for a given message to be sent to several people at the same time. When this happens, it is only those people who computes the key correctly that would be given the opportunity to access even the encrypted message, which can in turn be decrypted using the appropriate key.

Keywords: arithmetic, cyber space, modulo-2, information security

Procedia PDF Downloads 280
1006 Parameter Selection for Computationally Efficient Use of the Bfvrns Fully Homomorphic Encryption Scheme

Authors: Cavidan Yakupoglu, Kurt Rohloff

Abstract:

In this study, we aim to provide a novel parameter selection model for the BFVrns scheme, which is one of the prominent FHE schemes. Parameter selection in lattice-based FHE schemes is a practical challenges for experts or non-experts. Towards a solution to this problem, we introduce a hybrid principles-based approach that combines theoretical with experimental analyses. To begin, we use regression analysis to examine the parameters on the performance and security. The fact that the FHE parameters induce different behaviors on performance, security and Ciphertext Expansion Factor (CEF) that makes the process of parameter selection more challenging. To address this issue, We use a multi-objective optimization algorithm to select the optimum parameter set for performance, CEF and security at the same time. As a result of this optimization, we get an improved parameter set for better performance at a given security level by ensuring correctness and security against lattice attacks by providing at least 128-bit security. Our result enables average ~ 5x smaller CEF and mostly better performance in comparison to the parameter sets given in [1]. This approach can be considered a semiautomated parameter selection. These studies are conducted using the PALISADE homomorphic encryption library, which is a well-known HE library. The abstract goes here.

Keywords: lattice cryptography, fully homomorphic encryption, parameter selection, LWE, RLWE

Procedia PDF Downloads 117
1005 Symbol Synchronization and Resource Reuse Schemes for Layered Video Multicast Service in Long Term Evolution Networks

Authors: Chung-Nan Lee, Sheng-Wei Chu, You-Chiun Wang

Abstract:

LTE (Long Term Evolution) employs the eMBMS (evolved Multimedia Broadcast/Multicast Service) protocol to deliver video streams to a multicast group of users. However, it requires all multicast members to receive a video stream in the same transmission rate, which would degrade the overall service quality when some users encounter bad channel conditions. To overcome this problem, this paper provides two efficient resource allocation schemes in such LTE network: The symbol synchronization (S2) scheme assumes that the macro and pico eNodeBs use the same frequency channel to deliver the video stream to all users. It then adopts a multicast transmission index to guarantee the fairness among users. On the other hand, the resource reuse (R2) scheme allows eNodeBs to transmit data on different frequency channels. Then, by introducing the concept of frequency reuse, it can further improve the overall service quality. Extensive simulation results show that the S2 and R2 schemes can respectively improve around 50% of fairness and 14% of video quality as compared with the common maximum throughput method.

Keywords: LTE networks, multicast, resource allocation, layered video

Procedia PDF Downloads 361
1004 Video-Based System for Support of Robot-Enhanced Gait Rehabilitation of Stroke Patients

Authors: Matjaž Divjak, Simon Zelič, Aleš Holobar

Abstract:

We present a dedicated video-based monitoring system for quantification of patient’s attention to visual feedback during robot assisted gait rehabilitation. Two different approaches for eye gaze and head pose tracking are tested and compared. Several metrics for assessment of patient’s attention are also presented. Experimental results with healthy volunteers demonstrate that unobtrusive video-based gaze tracking during the robot-assisted gait rehabilitation is possible and is sufficiently robust for quantification of patient’s attention and assessment of compliance with the rehabilitation therapy.

Keywords: video-based attention monitoring, gaze estimation, stroke rehabilitation, user compliance

Procedia PDF Downloads 393
1003 Video Based Automatic License Plate Recognition System

Authors: Ali Ganoun, Wesam Algablawi, Wasim BenAnaif

Abstract:

Video based traffic surveillance based on License Plate Recognition (LPR) system is an essential part for any intelligent traffic management system. The LPR system utilizes computer vision and pattern recognition technologies to obtain traffic and road information by detecting and recognizing vehicles based on their license plates. Generally, the video based LPR system is a challenging area of research due to the variety of environmental conditions. The LPR systems used in a wide range of commercial applications such as collision warning systems, finding stolen cars, controlling access to car parks and automatic congestion charge systems. This paper presents an automatic LPR system of Libyan license plate. The performance of the proposed system is evaluated with three video sequences.

Keywords: license plate recognition, localization, segmentation, recognition

Procedia PDF Downloads 434