Results 71 to 80 of about 2,040 (197)

TrustCall: A Trust Computation Model for Web Conversational Services

open access: yesIEEE Access, 2017
Web conversational services are exposed to several threats in which the social context between communicating participants is manipulated. Cybercrimes based on identity misrepresentation to obtain sensitive information are on the rise.
Ibrahim Tariq Javed   +2 more
doaj   +1 more source

REAL TIME ONLINE EXAM PROCTORING SYSTEM IN HIGHER EDUCATION USING WEBRTC TECHNOLOGY

open access: yesJurnal Teknik Informatika (Jutif)
The low level of trust in online exam results from students is a major problem because it is difficult to monitor whether test takers are taking the exam honestly according to their own abilities. Even though it has been assisted by the presence of video
Mychael Maoeretz Engel   +1 more
semanticscholar   +1 more source

Adaptive Multi-Hop P2P Video Communication: A Super Node-Based Architecture for Conversation-Aware Streaming

open access: yesInformation
This paper proposes a multi-hop peer-to-peer (P2P) video streaming architecture designed to support dynamic, conversation-aware communication. The primary contribution is a decentralized system built on WebRTC that eliminates reliance on a central media ...
Jiajing Chen, Satoshi Fujita
doaj   +1 more source

TOWARDS IMPLEMENTATION OF THE FOG COMPUTING CONCEPT INTO THE GEOSPATIAL DATA INFRASTRUCTURES

open access: yesInterCarto. InterGIS, 2016
The information technologies and Global Network technologies in particular are developing very quickly. According to this, the problem remains actual that incorporates implementation issues for the general-purpose technologies into the information ...
E. A. Panidi
doaj   +1 more source

WebRTC Swarms: Decentralized, Incentivized, and Privacy-Preserving Signaling with Designated Verifier Zero-Knowledge Authentication

open access: yesFuture Internet
Real-time peer-to-peer communication in web browsers typically relies on centralized signaling servers, creating single points of failure, privacy vulnerabilities, and censorship risks.
Rafał Skowroński
doaj   +1 more source

Low-Latency Autonomous Surveillance in Defense Environments: A Hybrid RTSP-WebRTC Architecture with YOLOv11

open access: yesComputers
This article presents the Intelligent Monitoring System (IMS), an AI-assisted, low-latency surveillance platform designed for defense environments. The study addresses the need for real-time autonomous situational awareness by integrating high-speed ...
Juan José Castro-Castaño   +6 more
doaj   +1 more source

Tree-Based Architecture for Enabling Live Interaction in Massive Online Events

open access: yesIEEE Access
Massive online and hybrid events have become important during and after the COVID-19 pandemic. These events aim to replicate live experiences by maintaining interaction between the speakers and the audience.
Carlos Arriaga   +2 more
doaj   +1 more source

LEVERATE WEBRTC FOR ONLINE CLASS

open access: yes, 2021
The proponent started this project during the pandemic, where the face-toface class is prohibited to prevent the spread of coronavirus (Covid-19). The proponent thinks of a way how to conduct an online conference call that is secured, easy to use, and low-cost solution because currently, the client is using Zoom freetier that has a limited 40 minutes ...
openaire   +1 more source

Abnormal sound detection method for coal mine belt conveyors based on convolutional autoencoder

open access: yesGong-kuang zidonghua
To address the issue of insufficient abnormal sound samples for coal mine belt conveyors, which makes it difficult for training models to recognize anomalies, an abnormal sound detection method for coal mine belt conveyors based on Convolutional ...
SHEN Long   +4 more
doaj   +1 more source

WebRTC-based MOSR remote control of mobile manipulators. [PDF]

open access: yesInt J Intell Robot Appl, 2023
Tiberkak A, Hentout A, Belkhir A.
europepmc   +1 more source

Home - About - Disclaimer - Privacy