Results 41 to 50 of about 2,484,228 (241)

Peer-to-Peer Multicasting Inspired by Huffman Coding

open access: yesJournal of Computer Networks and Communications, 2013
Stringent QoS requirements of video streaming are not addressed by the delay characteristics of highly dynamic peer-to-peer (P2P) networks. To solve this problem, a novel locality-aware method for choosing optimal neighbors in live streaming multicast ...
Bartosz Polaczyk   +2 more
doaj   +1 more source

An Ingenious Design of a High Performance-Low Complexity Image Compressor for Wireless Capsule Endoscopy

open access: yesSensors, 2020
Wireless Capsule Endoscopy is a state-of-the-art technology for medical diagnoses of gastrointestinal diseases. The amount of data produced by an endoscopic capsule camera is huge.
Ioannis Intzes   +2 more
doaj   +1 more source

TEXT COMPRESSION ALGORITHMS - A COMPARATIVE STUDY [PDF]

open access: yesICTACT Journal on Communication Technology, 2011
Data Compression may be defined as the science and art of the representation of information in a crisply condensed form. For decades, Data compression has been one of the critical enabling technologies for the ongoing digital multimedia revolution. There
S. Senthil, L. Robert
doaj  

An improved security and message capacity using AES and Huffman coding on image steganography

open access: yesTELKOMNIKA (Telecommunication Computing Electronics and Control), 2019
Information security is very important and has been widely implemented. Cryptography and steganography are two common methods that can be implemented to secure and conceal the information. In this research, the proposed AES algorithm for cryptography and
C. A. Sari   +3 more
semanticscholar   +1 more source

Orbital Angular Momentum Multiplexed Free-Space Optical Communication Systems Based on Coded Modulation

open access: yesApplied Sciences, 2018
In this paper, we experimentally investigate the turbulence mitigation methods in free-space optical communication systems based on orbital angular momentum (OAM) multiplexing.
Zhen Qu, Ivan B. Djordjevic
doaj   +1 more source

Cryptanalysis of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables [PDF]

open access: yes, 2007
This paper studies the security of a recently-proposed MPEG-video encryption scheme based on secret Huffman tables. Our cryptanalysis shows that: 1) the key space of the encryption scheme is not sufficiently large against divide-and-conquer (DAC) attack ...
A. Uhl   +10 more
core   +3 more sources

Agricultural Diversification at the Margin. Strategies and Determinants in Italian Mountain and Remote Areas

open access: yesAgribusiness, EarlyView.
ABSTRACT This paper explores the convergence in on‐farm diversification strategies of agricultural holdings, between remote areas and more central ones. Using Italian farm‐level data, we explore the determinants of diversification strategies across farms.
Gianluca Grilli   +2 more
wiley   +1 more source

A new data embedding method for mpeg layer III audio steganography [PDF]

open access: yes, 2016
A new method of MP3 steganography is proposed with emphasis on increasing the steganography capacity of the carrier medium. This paper proposes a data embedding algorithm to hide more information for compressed bitstream of MP3 audio files. The sign bits
Bazyar, M., Sudirman, R.
core   +1 more source

Chatting Towards Inclusivity: A Digital Approach to Inclusion Action Plans and Leader Development

open access: yesHuman Resource Management, EarlyView.
ABSTRACT Inclusion is a cornerstone of success for organizations and society, yet inclusion is not guaranteed. Building on inclusive leadership research and relational models theory, we argue that inclusion cannot manifest without systematic effort and planning by leaders.
Vindhya Singh   +4 more
wiley   +1 more source

Secure Data Transmission in Video Format Based on LSB and Huffman Coding

open access: yesInternational Journal of Image Graphics and Signal Processing, 2020
—The growth of needing to transmit bit amount of data through the internet in secure format encourage the research for steganography technique, especially in video file.
Shwe Sin Myat Than
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy