scholarly journals IDENTIFICATION OF MULTIMEDIA CONTENT BASED ON DIGITAL OBJECT ARCHITECTURE

Telecom IT ◽  
2019 ◽  
Vol 7 (2) ◽  
pp. 85-95
Author(s):  
V. Zelenov ◽  
I. Shustov ◽  
R. Kirichek ◽  
A. Borodin

Research subject. The article is devoted to the method of identification of multimedia content based on digital object architecture and a stand which demonstrates the work of the method. Method. The principle of identification data division and injecting data parts in random order to a different area of the file is considered. The analysis of existing solutions is performed. Core results. Stand for identification of multimedia content based on digital object architecture have been developed. This stand can write identifier to the multimedia file and read from it. Practical relevance. The developed stand for identification of multimedia content based on digital object architecture can be used to protect digital content from piracy.

Telecom IT ◽  
2020 ◽  
Vol 8 (3) ◽  
pp. 55-62
Author(s):  
D. Vorobyova ◽  
A. Koucheryavy

Research subject. The article is devoted to analysis of related works and perspective investigation areas to coverage in the wireless sensor networks. Method. System analysis. Core results. The identification of development perspectives of a coverage in the wireless sensor networks. Practical relevance. The results of the article can be used by scientific organizations when planning the development of telecommunication networks, as well as universities in the educational process.


Author(s):  
Christopher Francique

This study sought to identify the perceptions of faculty in utilizing Microsoft PowerPoint as an authoring tool. This research posited that Microsoft PowerPoint has some multimedia authoring features and can possibly be used as a single-point multimedia authoring tool for faculty to utilize to create multimedia content for courses that they teach. However, PowerPoint is traditionally used as a presentation software, and despite its multimedia authoring capabilities, faculty may not be aware or even willing to use such features, having grown accustomed to their traditional use of the software. Nonetheless, from this study, it confirms that faculty are biased to seeing PowerPoint as a presentation tool. However, the study revealed that despite the initial myopia and limitations, post-intervention, participants showed a keen interest in using PowerPoint beyond the realm of presentations.


Author(s):  
Layth Alasafi ◽  
Tuna Göksu ◽  
Ammar Albayati

The transition from analog technologies to digital technologies has increased the ever-growing concern for protection and authentication of digital content and data. Owners of digital content of any type are seeking and exploring new technologies for the protection of copyrighted multimedia content. Multimedia protection has become an issue in recent years, and to deal with this issue, researchers are continuously searching for and exploring new effective and efficient technologies. This thesis study has been prepared in order to increase the invisibility and durability of invisible watermarking by using the multilayer Discrete Wavelet Transform (DWT) in the frequency plane and embedding two marks into an image for the purpose of authentication and copyright when digital content travels through an unsecured channel. A novel watermarking algorithm has been proposed based on five active positions and on using two marks. In addition to the extraction process, watermarking images will be subjected to a set of attack tests. The evaluation criteria have been the bases of assessing the value of SNR, PNSR, MAE and RMSE for both the watermarking images and the watermarking images after attacks, followed by the invisibility of the watermarking being measured before and after the attacks. Our lab results show high robustness and high quality images obtaining value for both SNR and PNSR.


Telecom IT ◽  
2019 ◽  
Vol 7 (1) ◽  
pp. 21-30
Author(s):  
S. Vladimirov

Research subject. The article presents the results of comparing different 8-bit error-correcting codes by their probabilistic characteristics. Method. Simulation was performed to determine the probabilistic characteristics of 8-bit error-correcting codes. The principles of their coding and decoding are considered. Core results. The probabilistic characteristics of 8-bit error-correcting codes are identified and presented. Recommendations for their application are developed depending on the structure of the using transmission system. Practical relevance. The application of the considered codes for the construction of transmission systems on devices with limited computing resources is proposed. The applicability of these codes in the development of application layer byte protocols that require the use of forward error correction mechanisms in communication channels is noted.


Telecom IT ◽  
2020 ◽  
Vol 8 (4) ◽  
pp. 83-92
Author(s):  
A Vybornova

This article is dedicated to the overview and analysis of the existing approaches to the controller placement problem for the multi-controller Software Defined Networks (SDN) with a focus on the swarm intelligence methods. For this purpose, the controller placement problem is defined, as well as possible optimization functions and constraints. Research subject of this article is a controller placement problem for the multi-controller SDN. As a research method a comparative analysis is used. Core results of the work is a comparison of different approaches based on the different optimality criteria and constraints. Practical relevance of the work is that the results can be used in the SDN design and optimization.


Telecom IT ◽  
2021 ◽  
Vol 8 (4) ◽  
pp. 1-9
Author(s):  
T. Nzinga ◽  
A. Koucheryavy

Research subject. The article is devoted to the analysis of the development of telecommunication net-works in the Republic of Angola and the prospects for their development Method. System analysis. Core results. Determination of promising areas of research in the development of communication net-works in terms of their creation in sparsely populated and hard-to-reach areas. Practical relevance. The results of the article can be used to modernize the telecommunication network of the Republic of Angola.


Author(s):  
Wahyu Teja Kusuma ◽  
Ahmad Afif Supianto ◽  
Herman Tolle

The weakness of the research on developing Marker Based Augmented Reality applications found is using small digital content. Weakness is caused by the area of view of Augmented Reality cameras is limited by the placement of markers that are affordable to the user's hand. This study reproducing large digital objects by cutting large digital objects into many pieces. But to keep continuity accuracy between digital object pieces, this study aims to modify the grid method to become a vertex marker. Vertex marker is produced by removing the edge and using the vertex to place the marker. Vertex markers inherit the advantages of the Grid method. Therefore, vertex markers can be used to reproduce large digital objects accurately and can be reached by hand when displayed. The aim of this study is to measure the accuracy of the grid method that has been modified into a marker. The fundamental contributions and advantages of the vertex marker are innovations in the field of Marker Based Augmented Reality research.


This article prepared with three main objectives, first it is to review the large size of multimedia file protection, second for ownership identification of the multimedia content and finally for implementing this setup for cloud based setup instead of web based service architecture. Therefore many of the infrastructure developed for multimedia content to enable the security against the file handling services for managing the better ownership identification. On private and/or public clouds, the device can be deployed. Our framework has two new components: (i) method of producing 3-D image signatures, and (ii) distributed multimedia object matching engine. The signature method produces stable and accurate 3-D video signatures capturing the depth signals in those videos as well as computationally efficient processing and comparison and having limited space. The corresponding distributed engine is highly scalable and designed to support different multimedia objects. We have introduced and deployed the proposed system on two clouds such as private and amazon based clouds.


Telecom IT ◽  
2020 ◽  
Vol 8 (3) ◽  
pp. 94-101
Author(s):  
E. Kalyashov

Research subject. The article reviews ways of constructing face recognition systems based on standard modules. Method. The study is based on comparison of performance and recognition quality of various pipelines. Core results. Values of reached recognition quality and dependencies from a type of original data are presented. Practical relevance. The results could be used while implementing various face recognition system pipelines.


Telecom IT ◽  
2020 ◽  
Vol 8 (3) ◽  
pp. 20-26
Author(s):  
M. A. M. Al-Sweity ◽  
A. Volkov ◽  
A. Muthanna

Research subject. The article provides an overview of 5G and V2X technologies, which are key in the implementation of the concept of infrastructure for self-driving cars, since they will be used to exchange and transfer information between infrastructure facilities, pedestrians, other cars and networks. Requirements for the implementation of V2X technology. Core results. The article provides an overview of technologies for the implementation of V2X, and also describes in detail the equipment of unmanned vehicles using the example of various large companies and describes the operation of components responsible for recognition, such as cameras, lidars and radars. Practical relevance. The results obtained can be used in the framework of practical research and development in the field of integrating V2X technologies in the 5G / IMT-2020 network and beyond.


Sign in / Sign up

Export Citation Format

Share Document