An interruption time reduction scheme with prefetch for hybrid video broadcasting environments

Author(s):  
Tomoki Yoshihisa ◽  
Shojiro Nishio
2015 ◽  
Vol 76 (17) ◽  
pp. 17891-17905
Author(s):  
Sung-Bong Jang ◽  
Young-Woong Ko

Author(s):  
Nicolas Girault ◽  
Olivier Smeyers ◽  
Riccardo De Gaudenzi ◽  
Patricia Inigo ◽  
Eric Alberty ◽  
...  

2008 ◽  
Author(s):  
Suzanne de Treville ◽  
Lenos Trigeorgis ◽  
Benjamin Avanzi

Author(s):  
Konstantinos Kardaras ◽  
George I. Lambrou ◽  
Dimitrios Koutsouris

Background: In the new era of wireless communications new challenges emerge including the provision of various services over the digital television network. In particular, such services become more important when referring to the tele-medical applications through terrestrial Digital Video Broadcasting (DVB). Objective: One of the most significant aspects of video broadcasting is the quality and information content of data. Towards that end several algorithms have been proposed for image processing in order to achieve the most convenient data compression. Methods: Given that medical video and data are highly demanding in terms of resources it is imperative to find methods and algorithms that will facilitate medical data transmission with ordinary infrastructure such as DVB. Results: In the present work we have utilized a quantization algorithm for data compression and we have attempted to transform video signal in such a way that would transmit information and data with a minimum loss in quality and succeed a near maximum End-user approval. Conclusions: Such approaches are proven to be of great significance in emergency handling situations, which also include health care and emergency care applications.


Author(s):  
Keith M. Martin

This chapter considers eight applications of cryptography. These essentially act as case studies relating to all the previous material. For each application, we identify the security requirements, the application constraints, the choice of cryptography used, and the ways that the keys are managed. We begin with the SSL/TLS protocols used to secure Internet communications. We then examine the cryptography used in W-Fi networks, showing that early cryptographic design mistakes have subsequently been corrected. We then examine the evolving cryptography used to secure mobile telecommunications. This is followed by a discussion of the cryptography that underpins the security of payment card transactions. We look at the cryptography of video broadcasting and identity cards. We then examine the cryptography behind the Tor project, which use cryptography to support anonymous communication on the Internet. Finally, we examine the clever cryptographic design of Bitcoin, showing how use of cryptography can facilitate digital currency.


Sign in / Sign up

Export Citation Format

Share Document