Applying 4K, (Ultra HD) Real-time video streaming via the internet network, with low bitrate and low latency, is the challenge this paper addresses. Compression technology and transfer links are the important elements that influence video quality. So, to deliver video over the internet or another fixed capacity medium, it is essential to compress the video to more controllable bitrates (customarily in the 1-20 Mbps range). In this study, the video quality is examined using the H.265/HEVC compression standard, and the relationship between quality of video and bitrate flow is investigated using various constant rate factors, GOP patterns, quantization parameters, RC-lookahead, and other types of video motion sequences. The ultra-high-definition video source is used, down sampled and encoded at multiple resolutions of (3480x2160), (1920x1080), (1280x720), (704x576), (352x288), and (176x144). To determine the best H265 feature configuration for each resolution experiments were conducted that resulted in a PSNR of 36 dB at the specified bitrate. The resolution is selected by delivery (encoder resource) based on the end-user application. While video streaming adapted to the available bandwidth is achieved via embedding a controller with MPEG DASH protocol at the client-side. Video streaming Adaptation methods allow the delivery of content that is encoded at different representations of video quality and bitrate and then dividing each representation into chunks of time. Through this paper, we propose to utilize HTTP/2 as a protocol to achieve low latency video streaming focusing on live streaming video avoiding the problem of HTTP/1.
The main objective of this work is to propose a new routing protocol for wireless sensor network employed to serve IoT systems. The routing protocol has to adapt with different requirements in order to enhance the performance of IoT applications. The link quality, node depth and energy are used as metrics to make routing decisions. Comparison with other protocols is essential to show the improvements achieved by this work, thus protocols designed to serve the same purpose such as AODV, REL and LABILE are chosen to compare the proposed routing protocol with. To add integrative and holistic, some of important features are added and tested such as actuating and mobility. These features are greatly required by some of IoT applications and im
... Show MoreIn this paper, a Modified Weighted Low Energy Adaptive Clustering Hierarchy (MW-LEACH) protocol is implemented to improve the Quality of Service (QoS) in Wireless Sensor Network (WSN) with mobile sink node. The Quality of Service is measured in terms of Throughput Ratio (TR), Packet Loss Ratio (PLR) and Energy Consumption (EC). The protocol is implemented based on Python simulation. Simulation Results showed that the proposed protocol provides better Quality of Service in comparison with Weighted Low Energy Cluster Hierarchy (W-LEACH) protocol by 63%.
The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MoreThe strong cryptography employed by PGP (Pretty Good Privacy) is one of the best available today. The PGP protocol is a hybrid cryptosystem that combines some of the best features of both conventional and public-key cryptography. This paper aim to improve PGP protocol by combined between the Random Genetic algorithm, NTRU (N-th degree Truncated polynomial Ring Unit) algorithm with PGP protocol stages in order to increase PGP protocol speed, security, and make it more difficult in front of the counterfeiter. This can be achieved by use the Genetic algorithm that only generates the keys according to the Random Genetic equations. The final keys that obtained from Genetic algorithm were observed to be purely random (according to the randomne
... Show MoreCopyright hacking and piracy have increased as the Internet has grown in popularity and access to multimedia material has increased. Security, property protection, and authentication have all been achieved via watermarking techniques. This paper presents a summary of some recent efforts on video watermarking techniques, with an emphasis on studies from 2018 to 2022, as well as the various approaches, achievements, and attacks utilized as testing measures against these watermarking systems. According to the findings of this study, frequency-domain watermarking techniques are more popular and reliable than spatial domain watermarking approaches. Hybrid DCT and DWT are the two most used techniques and achieve good results in the fi
... Show MoreShot boundary detection is the process of segmenting a video into basic units known as shots by discovering transition frames between shots. Researches have been conducted to accurately detect the shot boundaries. However, the acceleration of the shot detection process with higher accuracy needs improvement. A new method was introduced in this paper to find out the boundaries of abrupt shots in the video with high accuracy and lower computational cost. The proposed method consists of two stages. First, projection features were used to distinguish non boundary transitions and candidate transitions that may contain abrupt boundary. Only candidate transitions were conserved for next stage. Thus, the speed of shot detection was improved by r
... Show MoreBackground: Elastomeric chains are one of the most commonly used force delivery systems. They have the ability to exert a continuous force, convenience of use, compatibility to oral environment and cost effectiveness but one of the inherited disadvantages is force degradation. Materials and methods: This in vitro study was designed to evaluate the effect of alcohol presence in mouthwashes on force decay of different configurations of clear elastomeric chains from (Ortho Technology company) which are: closed , short and long under the effect of time at (Initial, 1, 2, 3 and 4 weeks) intervals with exposure to different chemical solutions. A total (540) modules of elastomeric chains of three different types (long, short and closed) trans
... Show MoreThe follower of the art of Arabic calligraphy accurately identifies three prominent dimensions that have framed the dimensions of this art, the functional dimension and the aesthetic dimension, the last of which is the expressive dimension, as it is an art that does not exhaust its aesthetic and indicative purposes because of its possibilities and characteristics that help it to form with any entity designed by calligrapher, with the expressive dimension of the most important of those The dimensions that can be studied within multiple variables, the most important of which are the significance of the text, the spatial and formal organization of the calligraphic functions and the power of the idea from which the calligraphic formation eme
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show More