The audio and video synchronization plays an important role in speech recognition and multimedia communication. The audio-video sync is a quite significant problem in live video conferencing. It is due to use of various hardware components which introduces variable delay and software environments. The objective of the synchronization is used to preserve the temporal alignment between the audio and video signals. This paper proposes the audio-video synchronization using spreading codes delay measurement technique. The performance of the proposed method made on home database and achieves 99% synchronization efficiency. The audio-visual
signature technique provides a significant reduction in audio-video sync problems and the performance analysis of audio and video synchronization in an effective way. This paper also implements an audio- video synchronizer and analyses its performance in an efficient manner by synchronization efficiency, audio-video time drift and audio-video delay parameters. The simulation result is carried out using mat lab simulation tools and simulink. It is automatically estimating and correcting the timing relationship between the audio and video signals and maintaining the Quality of Service.
If aiming to be the next Bell Labs sounds ambitious, it is. Yet that is the mission of SignalWire. We will hear about the digital tools they have created, along with those still in development, which aim to build remote communication in invisible ways. Their applications range from the karaoke bar to the military - anywhere people wish to find more natural and collaborative remote communication.
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
If aiming to be the next Bell Labs sounds ambitious, it is. Yet that is the mission of SignalWire. We will hear about the digital tools they have created, along with those still in development, which aim to build remote communication in invisible ways. Their applications range from the karaoke bar to the military - anywhere people wish to find more natural and collaborative remote communication.
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
COMPARISON OF CINEPAK, INTEL, MICROSOFT VIDEO AND INDEO CODEC FOR VIDEO COMPR...ijma
The file size and picture quality are factors to be considered for streaming, storage and transmitting videos
over networks. This work compares Cinepak, Intel, Microsoft Video and Indeo Codec for video
compression. The peak signal to noise ratio is used to compare the quality of such video compressed using
AVI codecs. The most widely used objective measurement by developers of video processing systems is
Peak Signal-to-Noise Ratio (PSNR). Peak Signal to Noise Ration is measured on a logarithmic scale and
depends on the mean squared error (MSE) between an original and an impaired image or video, relative to
(2n-1)2.
COMPARISON OF CINEPAK, INTEL, MICROSOFT VIDEO AND INDEO CODEC FOR VIDEO COMPR...ijma
The file size and picture quality are factors to be considered for streaming, storage and transmitting videos
over networks. This work compares Cinepak, Intel, Microsoft Video and Indeo Codec for video
compression. The peak signal to noise ratio is used to compare the quality of such video compressed using
AVI codecs. The most widely used objective measurement by developers of video processing systems is
Peak Signal-to-Noise Ratio (PSNR). Peak Signal to Noise Ration is measured on a logarithmic scale and
depends on the mean squared error (MSE) between an original and an impaired image or video, relative to
(2n-1)2.
COMPARISON OF CINEPAK, INTEL, MICROSOFT VIDEO AND INDEO CODEC FOR VIDEO COMPR...ijma
The file size and picture quality are factors to be considered for streaming, storage and transmitting videos
over networks. This work compares Cinepak, Intel, Microsoft Video and Indeo Codec for video
compression. The peak signal to noise ratio is used to compare the quality of such video compressed using
AVI codecs. The most widely used objective measurement by developers of video processing systems is
Peak Signal-to-Noise Ratio (PSNR). Peak Signal to Noise Ration is measured on a logarithmic scale and
depends on the mean squared error (MSE) between an original and an impaired image or video, relative to
(2n-1)2.
Previous research done regarding assessing of video quality has been mainly by the use of subjective
methods, and there is still no standard method for objective assessments. Although it has been considered
that compression might not be significant in future as storage and transmission capabilities improve, but at
low bandwidths compression makes communication possible.
COMPARISON OF CINEPAK, INTEL, MICROSOFT VIDEO AND INDEO CODEC FOR VIDEO COMPR...ijma
The file size and picture quality are factors to be considered for streaming, storage and transmitting videos
over networks. This work compares Cinepak, Intel, Microsoft Video and Indeo Codec for video
compression. The peak signal to noise ratio is used to compare the quality of such video compressed using
AVI codecs. The most widely used objective measurement by developers of video processing systems is
Peak Signal-to-Noise Ratio (PSNR). Peak Signal to Noise Ration is measured on a logarithmic scale and
depends on the mean squared error (MSE) between an original and an impaired image or video, relative to
(2n-1)2.
Previous research done regarding assessing of video quality has been mainly by the use of subjective
methods, and there is still no standard method for objective assessments. Although it has been considered
that compression might not be significant in future as storage and transmission capabilities improve, but at
low bandwidths compression makes communication possible
Comparison of Cinepak, Intel, Microsoft Video and Indeo Codec for Video Compr...ijma
The file size and picture quality are factors to be considered for streaming, storage and transmitting videos
over networks. This work compares Cinepak, Intel, Microsoft Video and Indeo Codec for video
compression. The peak signal to noise ratio is used to compare the quality of such video compressed using
AVI codecs. The most widely used objective measurement by developers of video processing systems is
Peak Signal-to-Noise Ratio (PSNR). Peak Signal to Noise Ration is measured on a logarithmic scale and
depends on the mean squared error (MSE) between an original and an impaired image or video, relative to
(2n-1)2.
Previous research done regarding assessing of video quality has been mainly by the use of subjective
methods, and there is still no standard method for objective assessments. Although it has been considered
that compression might not be significant in future as storage and transmission capabilities improve, but at
low bandwidths compression makes communication possible.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Video communications is growing in use. Its adoption by larger and larger audiences will require IT managers and service providers to validate their networks for video communication. This presentation will explain the various problems affecting video quality and the ways in which video quality analysis can assist fleshing out these problems from networks.
VIDEO QUALITY ASSESSMENT USING LAPLACIAN MODELING OF MOTION VECTOR DISTRIBUTI...sipij
Video/Image quality assessment (VQA/IQA) is fundamental in various fields of video/image processing.
VQA reflects the quality of a video as most people commonly perceive. This paper proposes a reducedreference
mobile VQA, in which one-dimensional (1-D) motion vector (MV) distributions are used as
features of videos. This paper focuses on reduction of data size using Laplacian modeling of MV
distributions because network resource is restricted in the case of mobile video. The proposed method is
more efficient than the conventional methods in view of the computation time, because the proposed quality
metric decodes MVs directly from video stream in the parsing process rather than reconstructing the
distorted video at a receiver. Moreover, in view of data size, the proposed method is efficient because a
sender transmits only 28 parameters. We adopt the Laplacian distribution for modeling 1-D MV
histograms. 1-D MV histograms accumulated over the whole video sequences are used, which is different
from the conventional methods that assess each image frame independently. For testing the similarity
between MV histogram of reference and distorted videos and for minimizing the fitting error in Laplacian
modeling process, we use the chi-square method. To show the effectiveness of our proposed method, we
compare the proposed method with the conventional methods with coded video clips, which are coded
under varying bit rate, image size, and frame rate by H.263 and H.264/AVC. Experimental results show
that the proposed method gives the performance comparable with the conventional methods, especially, the
proposed method requires much lower transmission data.
Multilayer bit allocation for video encodingIJMIT JOURNAL
Video compression approach removes spatial and temporal redundancy based on the signal statistical correlation. Bit allocation technique adopts a visual distortion model for a better rate visual distortion video coding. Visual distortion model uses both motion and the texture structures in the video sequences. The existing video coding mechanisms reduces the bit rate for video coding. However to get better video compression ratio there is a need for multilayer compression technique. In this paper we proposed a multilayer bit allocation video coding mechanism. The proposed model reduces the bit allocation for video coding by retaining the same video quality. The experimental results using the proposed model reduced the bit rate by 3% to 4%. The result are promising. Finally we conclude with conclusion and future work.
Content-Based Image Retrieval (CBIR) systems have been used for the searching of relevant images in various research areas. In CBIR systems features such as shape, texture and color are used. The extraction of features is the main step on which the retrieval results depend. Color features in CBIR are used as in the color histogram, color moments, conventional color correlogram and color histogram. Color space selection is used to represent the information of color of the pixels of the query image. The shape is the basic characteristic of segmented regions of an image. Different methods are introduced for better retrieval using different shape representation techniques; earlier the global shape representations were used but with time moved towards local shape representations. The local shape is more related to the expressing of result instead of the method. Local shape features may be derived from the texture properties and the color derivatives. Texture features have been used for images of documents, segmentation-based recognition,and satellite images. Texture features are used in different CBIR systems along with color, shape, geometrical structure and sift features.
The cyber attacks have become most prevalent in the past few years. During this time, attackers have discovered new vulnerabilities to carry out malicious activities on the internet. Both the clients and the servers have been victimized by the attackers. Clickjacking is one of the attacks that have been adopted by the attackers to deceive the innocuous internet users to initiate some action. Clickjacking attack exploits one of the vulnerabilities existing in the web applications. This attack uses a technique that allows cross domain attacks with the help of userinitiated clicks and performs unintended actions. This paper traces out the vulnerabilities that make a website vulnerable to clickjacking attack and proposes a solution for the same.
Due to the availability of complicated devices in industry, models for consumers at lower cost of resources are developed. Home Automation systems have been developed by several researchers. The limitations of home automation includes complexity in architecture, higher costs of the equipment, interface inflexibility. In this paper as we have proposed, the working protocol of PIC 16F72 technology is which is secure, cost efficient, flexible that leads to the development of efficient home automation systems. The system is operational to control various home appliances like fans, Bulbs, Tube light. The following paper describes about components used and working of all components connected. The home automation system makes use of Android app entitled “Home App” which gives
flexibility and easy to use GUI.
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
E-learning plays an important role in providing required and well formed knowledge to a learner. The medium of e- learning has achieved advancement in various fields such as adaptive e-learning systems. The need for enhancing e-learning semantically can enhance the retrieval and adaptability of the learning curriculum. This paper provides a semantically enhanced module based e-learning for computer science programme on a learnercentric perspective. The learners are categorized based on their proficiency for providing personalized learning environment for users. Learning disorders on the platform of e-learning still require lots of research. Therefore, this paper also provides a personalized assessment theoretical model for alphabet learning with learning objects for
children’s who face dyslexia.
Agriculture plays an important role in the economy of our country. Over 58 percent of the rural households depend on the agriculture sector as their means of livelihood. Agriculture is one of the major contributors to Gross Domestic Product(GDP). Seeds are the soul of agriculture. This application helps in reducing the time for the researchers as well as farmers to know the seedling parameters. The application helps the farmers to know about the percentage of seedlings that will grow and it is very essential in estimating the yield of that particular crop. Manual calculation may lead to some error, to minimize that error, the developed app is used. The scientist and farmers require the app to know about the physiological seed quality parameters and to take decisions regarding their farming activities. In this article a desktop app for seed germination percentage and vigour index calculation are developed in PHP scripting language.
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
Competition among adaptive video streaming players severely diminishes user-QoE. When players compete at a bottleneck link many do not obtain adequate resources. This imbalance eventually causes ill effects such as screen flickering and video stalling. There have been many attempts in recent years to overcome some of these problems. However, added to the competition at the bottleneck link there is also the possibility of varying network bandwidth which can make the situation even worse. This work focuses on such a situation. It evaluates current heuristic adaptive video players at a bottleneck link with time-varying bandwidth conditions. Experimental setup includes the TAPAS player and emulated network conditions. The results show PANDA outperforms FESTIVE, ELASTIC and the Conventional players.
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
Security and Performance aspects of cloud computing are the major issues which have to be tended to in Cloud Computing. Intrusion is one such basic and imperative security problem for Cloud Computing. Consequently, it is essential to create an Intrusion Detection System (IDS) to detect both inside and outside assaults with high detection precision in cloud environment. In this paper, cloud intrusion detection system at hypervisor layer is developed and assesses to detect the depraved activities in cloud computing environment. The cloud intrusion detection system uses a hybrid algorithm which is a fusion of WLI- FCM clustering algorithm and Back propagation artificial Neural Network to improve the detection accuracy of the cloud intrusion detection system. The proposed system is implemented and compared with K-means and classic FCM. The DARPA’s KDD cup dataset 1999 is used for simulation. From the detailed performance analysis, it is clear that the proposed system is able to detect the anomalies with high detection accuracy and low false alarm rate.
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
This report present the outcome of an investigative research conducted to examine the modu-operandi of academic staff union of polytechnics (ASUP) YabaTech. The investigation covered the logistics and cost implication for spreading union activities among members. It was discovered that cost of management and dissemination of information to members was at high side, also logistics problem constitutes to loss of information in transit hence cut away some members from union activities. To curtail the problem identified, we proposed the
design of secure and dynamic website for spreading union activities among members and public. The proposed system was implemented using HTML5 technology, interface frameworks like Bootstrap and j query which enables the responsive feature of the application interface. The backend was designed using PHPMYSQL. It was discovered from the evaluation of the new system that cost of managing information has reduced considerably, and logistic problems identified in the old system has become a forgotten issue.
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
Nowadays organizations are using information systems for optimizing processes in order to increase coordination and interoperability across the organizations. Since Oil and Gas Industry is one of the large industries in whole of the world, there is a need to compatibility of its Information Systems (IS) which consists three categories of systems: Field IS, Plant IS and Enterprise IS to create interoperability and approach the
optimizing processes as its result. In this paper we introduce the different models of information systems integration, identify the types of information systems that are using in the upstream and downstream sectors of petroleum industry, and finally based on expert’s opinions will identify a suitable model for information systems integration in this industry.
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
This work illustrates the AOMDV routing protocol. Its ancestor, the AODV routing protocol is also described. This tutorial demonstrates how forward and reverse paths are created by the AOMDV routing protocol. Loop free paths formulation is described, together with node and link disjoint paths. Finally, the performance of the AOMDV routing protocol is investigated along link and node disjoint paths. The WSN with the AOMDV routing protocol using link disjoint paths is better than the WSN with the AOMDV routing protocol using node disjoint paths for energy consumption.
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
To identify the importance of node of a network, several centralities are used. Majority of these centrality measures are dominated by components' degree due to their nature of looking at networks’ topology. We propose a centrality to identification model, bridging centrality, based on information flow and topological aspects. We apply bridging centrality on real world networks including the transportation network and show that the nodes distinguished by bridging centrality are well located on the connecting positions between highly connected regions. Bridging centrality can discriminate bridging nodes, the nodes with more information flowed through them and locations between highly connected regions, while other centrality measures cannot.
Now a days we are living in an era of Information Technology where each and every person has to become IT incumbent either intentionally or unintentionally. Technology plays a vital role in our day to day life since last few decades and somehow we all are depending on it in order to obtain maximum benefit and comfort. This new era equipped with latest advents of technology, enlightening world in the form of Internet of Things (IoT). Internet of things is such a specified and dignified domain which leads us to the real world scenarios where each object can perform some task while communicating with some other objects. The world with full of devices, sensors and other objects which will communicate and make human life far better and easier than ever. This paper provides an overview of current research work on IoT in terms of architecture, a technology used and applications. It also highlights all the issues related to technologies used for IoT, after the literature review of research work. The main purpose of this survey is to provide all the latest technologies, their corresponding
trends and details in the field of IoT in systematic manner. It will be helpful for further research.
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
In past couple of decades, there is immediate growth in field of agricultural technology. Utilization of proper method of irrigation by drip is very reasonable and proficient. A various drip irrigation methods have been proposed, but they have been found to be very luxurious and dense to use. The farmer has to maintain watch on irrigation schedule in the conventional drip irrigation system, which is different for different types of crops. In remotely monitored embedded system for irrigation purposes have become a new essential for farmer to accumulate his energy, time and money and will take place only when there will be requirement of water. In this approach, the soil test for chemical constituents, water content, and salinity and fertilizer requirement data collected by wireless and processed for better drip irrigation plan. This paper reviews different monitoring systems and proposes an automatic monitoring system model using Wireless Sensor Network (WSN) which helps the farmer to improve the yield.
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
With the advent of cloud computing the big data has emerged as a very crucial technology. The certain type of cloud provides the consumers with the free services like storage, computational power etc. This paper is intended to make use of infrastructure as a service where the storage service from the public cloud providers is going to leveraged by an individual or organization. The paper will emphasize the model which can be used by anyone without any cost. They can store the confidential data without any type of security issue, as the data will be altered
in such a way that it cannot be understood by the intruder if any. Not only that but the user can retrieve back the original data within no time. The proposed security model is going to effectively and efficiently provide a robust security while data is on cloud infrastructure as well as when data is getting migrated towards cloud infrastructure or vice versa.
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
The financial services industry is experiencing rapid changes in services delivery and channels usage, and financial companies and users of financial services are looking at new technologies as they emerge and deciding whether or not to embrace them and the new opportunities to save and manage enormous time, cost and stress.
There is no doubt about the favourable and manifold impact of technology on e-banking as pictured in this review paper, almost all banks are with the least and most access e-banking Technological equipments like ATMs and Cards. On the other Hand cheap and readily available technology has opened a favourable competition in ebanking services business with a lot of wide range competitors competing with Commercial Banks in Cameroon in providing digital financial services.
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
Attribute or feature selection plays an important role in the process of data mining. In general the data set contains more number of attributes. But in the process of effective classification not all attributes are relevant.
Attribute selection is a technique used to extract the ranking of attributes. Therefore, this paper presents a comparative evaluation study of classification algorithms before and after attribute selection using Waikato Environment for Knowledge Analysis (WEKA). The evaluation study concludes that the performance metrics of the classification algorithm, improves after performing attribute selection. This will reduce the work of processing irrelevant attributes.
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
In today’s world migration of people from rural areas to urban areas is quite common. Health care services are one of the most challenging aspect that is must require to the people with abnormal health. Advancements in the technologies lead to build the smart homes, which contains various sensor or smart meter devices to automate the process of other electronic device. Additionally these smart meters can be able to capture the daily activities of the patients and also monitor the health conditions of the patients by mining the frequent patterns and
association rules generated from the smart meters. In this work we proposed a model that is able to monitor the activities of the patients in home and can send the daily activities to the corresponding doctor. We can extract the frequent patterns and association rules from the log data and can predict the health conditions of the patients and can give the suggestions according to the prediction. Our work is divided in to three stages. Firstly, we used to record the daily activities of the patient using a specific time period at three regular intervals. Secondly we applied the frequent pattern growth for extracting the association rules from the log file. Finally, we applied k means clustering for the input and applied Bayesian network model to predict the health behavior of the patient and precautions will be given accordingly.
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the
cloud. Present, in every organization has trusted the web, however, the information must flow but not hold the
data. Therefore, all customers have to use the cloud. While the cloud progressing info by securing-protocols. Third
party observing and certain circumstances directly stale in flow and kept of packets in the virtual private cloud.
Global security statistics in the year 2017, hacking sensitive information in cloud approximately maybe 75.35%,
and the world security analyzer said this calculation maybe reached to 100%. For this cause, this proposed
research work concentrates on Authentication-Message-Digest-Key with authentication in routing the Network as
a Service of packets in OSPF (Open Shortest Path First) implementing Cloud with GNS3 has tested them to
securing from attackers.
Microstrip patch antennas are recently used in wireless detection applications due to their low power consumption, low cost, versatility, field excitation, ease of fabrication etc. The microstrip patch antennas are also called as printed antennas which is suffer with an array elements of antenna and narrow bandwidth. To overcome the above drawbacks, Flame Retardant Material is used as the substrate. Rectangular shape of microstrip patch antenna with FR4 material as the substrate which is more suitable for the explosive detection applications. The proposed printed antenna was designed with the dimension of 60 x 60 mm2. FR-4 material has a dielectric constant value of 4.3 with thickness 1.56 mm, length and width 60 mm and 60 mm respectively. One side of the substrate contains the ground plane of dimensions 60 x60 mm2 made of copper and the other side of the substrate contains the patch which have dimensions 34 x 29 mm2 and thickness 0.03mm which is also made of copper. RMPA without slot, Vertical slot RMPA, Double horizontal slot RMPA and Centre slot RMPA structures were
designed and the performance of the antennas were analysed with various parameters such as gain, directivity, Efield, VSWR and return loss. From the performance analysis, double horizontal slot RMPA antenna provides a better result and it provides maximum gain (8.61dB) and minimum return loss (-33.918dB). Based on the E-field excitation value the SEMTEX explosive material is detected and it was simulated using CST software.
Bandwidth Estimation Techniques for Relative ‘Fair’ Sharing in DASHEswar Publications
In the adaptive video streaming (AVS) literature the term fair sharing has been used to describe equal amounts of bandwidth allocated to adaptive client players. However, we argue that even though bandwidth sharing is an important aspect in some problems the same does not apply to AVS. Here the term relative ‘fair’ sharing is more applicable. The reason is that videos have different quality levels and will require differing amounts of the bandwidth to satisfy their needs. A 90% to 10% sharing may be sufficient for two players, one with high demands and the other with low demands. A 50% sharing may lead the player with the high bandwidth demand to get too little of the needed bandwidth resource. In addition, channel conditions may lead to players requiring different amount of bandwidth. Again, the concept of fair sharing has to be extended to relative ‘fair’ sharing for such scenarios. Hence, bandwidth estimation techniques players use to estimate the network bandwidth is very important in segment selection. A player utilizes one of the many techniques to determine what share of the bandwidth it can utilize among competing players. In this paper we explore some of the techniques used in state of-the-art players in their attempt to obtain a ‘fair’ share of the network bandwidth.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Performance Analysis of Audio and Video Synchronization using Spreaded Code Delay Measurement Technique
1. Int. J. Advanced Networking and Applications
Volume: 10 Issue: 01 Pages: 3728-3734 (2018) ISSN: 0975-0290
3728
Performance Analysis of Audio and Video
Synchronization using Spreaded Code Delay
Measurement Technique
A.Thenmozhi
PG scholar, Department of ECE, Anna University, Chennai
Email: thenmozhi94.a@gmail.com
Dr.P.Kannan
Professor & HOD, Department of ECE, Anna University, Chennai
Email: deepkannan@yahoo.co.in
-------------------------------------------------------------------ABSTRACT---------------------------------------------------------------
The audio and video synchronization plays an important role in speech recognition and multimedia
communication. The audio-video sync is a quite significant problem in live video conferencing. It is due to use of
various hardware components which introduces variable delay and software environments. The objective of the
synchronization is used to preserve the temporal alignment between the audio and video signals. This paper
proposes the audio-video synchronization using spreading codes delay measurement technique. The performance
of the proposed method made on home database and achieves 99% synchronization efficiency. The audio-visual
signature technique provides a significant reduction in audio-video sync problems and the performance analysis
of audio and video synchronization in an effective way. This paper also implements an audio- video synchronizer
and analyses its performance in an efficient manner by synchronization efficiency, audio-video time drift and
audio-video delay parameters. The simulation result is carried out using mat lab simulation tools and simulink. It
is automatically estimating and correcting the timing relationship between the audio and video signals and
maintaining the Quality of Service.
Keywords-Audio spreading codes, Hamming distance correlation, Spectrograph, Synchronization, Video spreading
codes.
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: April 17, 2018 Date of Acceptance: June 23, 2018
--------------------------------------------------------------------------------------------------------------------------------------------------
1. INTRODUCTION
The Audio and Video synchronization is defined as the
relative temporal distinction between the sound (audio)
and image (video) during the transmission and reception.
It is also known as audio-video sync, A/V sync and
Audio/Video sync. Lip synchronization (lip sync or lip
synch) refers to the voice is synchronized with lip
movements. Human can able to detect the distinction
between the audio and corresponding video presentation
less than 100ms in lip sync problem. The lip sync becomes
a significant problem in the digital television industry,
filming, music, video games and multimedia application.
It is corrected and maintained by audio-video
synchronizers. In multimedia technology, the audio and
video synchronization plays an important role in
synchronizing audio and video streams. With the
advancement of interactive multimedia application,
distinct multimedia services like content on demand
services, visual collaboration, video telephony, distance
education and E-learning are in huge demand. In
multimedia system applications, audio-visual streams are
saved, transmitted, received and broadcasted. During an
interaction time, the timing relations between audio-video
streams have to be conserved in order to provide the finest
perceptual quality.
2. PROPOSED METHODOLOGY
The proposed framework is automatically measuring and
maintaining the perfect synchronization between audio
and video using audio-visual spreading codes. Fig.1.
shows the proposed framework for audio and video
synchronization based on audio-visual spreading codes.
During transmission, the audio and video signals are
processed individually. The audio spreading code is
extracted from the spectrograph of the input audio which
is broken up into chunks. The spectrogram is the visual
way of representing the spectrum of sounds and it can be
used to display the spoken word phonetically. It is also
called spectral waterfalls, voice grams or voiceprints. The
video spreading code is computed by the absolute
difference the consecutive video frames where the input
video is broken up into video frames and finally to attain a
coarse absolute difference image. The audio-visual
signature or A/V sync signature based on content and
don’t change excessively. It is an authentication
mechanism and formed by taking hash of the original
audio-video streams. The robust hash filters the little
changes in the signal processing and reduces the audio-
visual spreading code sizes. It is based on the difference
between the successive audio and video frames. Within the
communication network, the audio-video streams
encounter different signal processing namely audio
2. Int. J. Advanced Networking and Applications
Volume: 10 Issue: 01 Pages: 3728-3734 (2018) ISSN: 0975-0290
3729
compression, video compression, format conversion, audio
down sampling, video down sampling etc.., and their
relative temporal alignment between audio and video
signals may be altered.
Fig.1. Audio-Video sync using audio-visual spreading codes.
Fig.2 Audio – Video Synchronizer
At the detection, the processed audio and video codes are
extracted from the processed audio and video streams.
During synchronization, the processed audio and video
Video
Extract Input video
spreading codes
Extract Input audio
spreading codes
Network
Extract
Processed video
spreading codes
Extract
Processed audio
spreading codes
Spreading codes
comparison
(Hamming
distance video
correlation)
Spreading codes
comparison
(Hamming
distance audio
correlation)
Time
Alignment
(A/V Sync
adjust)
EstimateDelay
EstimateDelay
Key
Audio
Key
A/V
Sync
Key
Key
Low pass
Filter
Video
Signal source
Low pass
Filter
Audio Analog to
Digital converter
Synchronizer
(A/V Sync)
Audio Analog to
Digital converter
Audio
Signal source
Audio signal
Video signal
Delay line
Delay line
3. Int. J. Advanced Networking and Applications
Volume: 10 Issue: 01 Pages: 3728-3734 (2018) ISSN: 0975-0290
3730
spreading codes are compared with the corresponding
input audio and video signatures using Hamming distance
correlation. The output of the Hamming distance is used to
estimate the temporal misalignment between the audio-
visual streams. Finally the measured delays are used to
correct the relative misalignment between audio-visual
streams.
The test content used for the performance assessment of
the system consisted of A/V clips of a variety of content
types such as scripted dramas; animation program, music
concert, news programs, sports and lives music. The input
audio and video is taken from the recorded dataset for the
audio and video synchronization. The input video is
divided into frames. A low-pass filter (LPF) is a filter that
passes low frequency signals & attenuates high frequency
signals by the cutoff frequency. It prevents the high
pitches and removes the short-term fluctuations in the
audio – video signals. It also produces the smoother form
of a signal.
An analog-to-digital converter (ADC) converts an input
analog voltage or current to a digital magnitude of the
voltage or current. It converts a continuous time and
continuous amplitude analog signal to a discrete time and
a discrete amplitude signal. The delay line produces a
specific delay in the audio and video signal transmission
path. The Synchronizer is a variable audio delay used to
correct and maintain the audio and video
synchronization or timing.
3. EXPERIMENTAL RESULTS
A/V CONTENT
The test content used for the performance assessment of
the system consisted of 5 seconds A/V clips of a variety of
content types such as scripted dramas, talk programs,
sports and live music. Fig.3, shows the input audio and
video is taken from the recorded dataset for the audio and
video synchronization. The frame number is given as the
input for synchronization purpose.
Fig.3. Input audio and video.
VIDEO FRAME
The input video is divided into frames for generating the
video spreading codes. The input video is divided into 30
frames/seconds. There are totally 74 frame are available in
the input video frame. Fig.4, shows the frame conversion
of the input video.
Fig.4. The frame conversion.
AUDIO SPREADING CODES GENERATION
The audio spreading code is primarily based on the coarse
representation of the spectrograph onto random vectors.
Fig.5, shows the audio spreading codes generation using
spectrograph.
Fig.5. The audio spreading codes extraction using
spectrogram.
VIDEO SPREADING CODES GENERATION
The video spreading code is based on coarse illustration of
the distinction image between two consecutive. Fig.6,
shows the video spreading codes generation.
Fig.6. The video spreading codes generation.
HAMMING VIDEO AND HAMMING AUDIO
The Hamming distance correlation is used to calculate the
temporal misalignment between audio-visual streams and
the quality of the audio-video synchronization can be
4. Int. J. Advanced Networking and Applications
Volume: 10 Issue: 01 Pages: 3728-3734 (2018) ISSN: 0975-0290
3731
measured. Fig.7, shows the hamming video and Fig.8,
shows the hamming audio.
Fig.7. The hamming video.
Fig.8. The hamming audio.
Table.1 The hamming distance for video and audio.
INPUT
IMAGE
ENCODE
IMAGE
HAMMING
VIDEO
HAMMING
AUDIO
1010 1010 0 1
1010 1010 0 1
1010 1010 0 1
1010 1010 1 1
1110 1110 0 1
1010 1010 0 1
1010 1010 0 1
1110 1110 0 1
1110 1101 2 1
1010 1010 0 1
1110 1110 0 1
1110 1010 1 1
1001 1001 0 1
1001 1001 0 1
1010 1100 2 1
1001 1101 1 1
1110 1110 0 1
1110 1110 0 1
1011 1001 1 1
1000 1000 0 1
1000 1000 0 1
1011 1010 1 1
1011 1011 0 1
From the Table 4.1, it is inferred that the hamming
distance for the video and audio. Hamming code is a set of
error-correction code s that can be used to detect and
correct bit errors. It is used to find the misalignment
between the audio and video streams.
TIME ALIGNMENT
The estimated relative misalignment is used to achieve the
same alignment between the audio and video streams that
was present before processing. It aligns the audio and
video frame in an appropriate manner. Fig.9, shows the
relative time alignment between the audio and video
stream. It decodes the corresponding video frame that is
given as input in Fig. 3.3 with proper time alignment
between the input and processed video frames. Fig.10,
shows the decoded input video frame.
Fig.9. The audio-video stream time alignment.
Fig.10. The decoded video frame.
AUDIO – VIDEO SYNCHRONIZATION
Fig.11, shows the audio and video synchronization using
signature. The A/V sync using spreading codes provides
perfect synchronization between the corresponding audio
and video streams. Finally, the reliability measures along
with the estimated delays can be used to detect or correct
the relative misalignment between the A/V streams. It can
detect and maintain the audio - video sync accuracy.
5. Int. J. Advanced Networking and Applications
Volume: 10 Issue: 01 Pages: 3728-3734 (2018) ISSN: 0975-0290
3732
Fig.11. The audio – video synchronization.
AV SIGNALS
The test content used for the performance assessment of
the system consisted of 5 seconds A/V clips. Fig. 12,
shows the input audio is taken from the recorded dataset
for the audio and video synchronization and every 10 msec
for audio.
Fig.12 Input audio signal.
Fig.13 Input video signal.
Fig. 13, shows the input video is taken from the recorded
dataset for the audio and video synchronization. Every
video frame plays 3 msec. The input video is divided into
50 frames/seconds. There are totally 74 frame are
available in the input video.
NOISE REMOVAL
Fig.14 shows the audio low pass filtered output. The filter
allows the frequencies below the cut off frequency but the
high frequencies in the input signal are attenuated.
Fig.14 Audio Low passes filter output.
Fig.15 Video Low passes filter output.
Fig.15 shows the video low pass filtered output. The filter
allows the frequencies below the cut off frequency but the
high frequencies in the input signal are attenuated.
ANALOG TO DIGITAL CONVERSION
Fig. 16 Audio Analog to Digital converter.
Fig.16 shows the audio analog to digital converter output.
ADC converts the analog audio signal into digital
representing the amplitude of the voltage.
Fig.17 Video Analog to Digital converter.
6. Int. J. Advanced Networking and Applications
Volume: 10 Issue: 01 Pages: 3728-3734 (2018) ISSN: 0975-0290
3733
Fig.17 shows the video analog to digital converter output.
ADC converts the analog video signal into digital
representing the amplitude of the voltage.
A/V SYNCHRONIZATION
The objective of the synchronization is to line up both
the audio and video signals that are processed individually.
Fig. 18 A/V signal Synchronization.
Fig.18 shows the A/V signal synchronization. It aligns
both audio and video signals. The synchronization is
guaranteeing that the audio and video streams matched
after processing.
4. PERFORMANCE ANALYSIS OF AUDIO-
VIDEO SYNCHRONIZATION
SYNCHRONIZATION EFFICIENCY
The Synchronization efficiency is the process of
establishing consistency among A/V content from a source
to a processed or target A/V content storage in percentage.
If the synchronization efficiency is high, then the audio
and video are perfectly synchronized. Otherwise the audio
and video synchronization will be poor. It is expressed as
𝛈=Pout/Pin (1)
Where,
𝛈 = the Synchronization Efficiency.
Pout = the synchronized A/V stream.
Pin = the unsynchronized A/V stream.
AUDIO–VIDEO TIME DRIFT
The Time drift is defined as the amount of time the audio
departs from perfect synchronization with the video where
a positive number indicates the audio leads the video while
the negative number indicates the audio lags the video.
The audio – video time drift can be represented as
tA/V = tr - tp (2)
Where,
tA/V = A/V Time drift.
tr = Source time.
tp = deviation time.
AUDIO TO VIDEO DELAY
The Audio to Video Delay is referred as the relative time
alignment delay between the audio and video streams. The
amount of the visual data is much bigger than audio data
and the delays which are generated to the audio and video
streams are typically unequal. The solution to audio to
video delay is to add fixed delays to match the video
delay. Finally, the estimated delays are used to correct the
relative misalignment between the audio and video
streams. The A/V delay is given as
D = t ± t0 (3)
Where,
D = The Audio – Video delay.
t = the audio/video time.
t0 = the extra audio/video time.
Table.2.Performance analysis for audio and video
synchronization.
PARAMETERS A/V CONTENT
Synchronization
Efficiency
99 %
Audio and video sync time
drift
16 ms
Audio to video delay 16 ms
From the Table.2, it is inferred that the audio and video
synchronization parameter. The synchronization efficiency
is very high. The audio – video sync time drift and audio
to video delay are very less.
5. CONCLUSION
Thus the audio and video synchronization using spreading
codes technique was implemented and their performances
were analyzed sufficiently and appropriately. The
proposed system would automatically estimate and
preserve the perfect synchronization between the audio
and video streams and it would maintain the perceptual
quality of audio and video. This method provides high-
quality accuracy and low computational complexity. The
experimental test results were shown the guarantee and
quite simple process applicable for the real world
multimedia application and offline applications. This
method is suitable for content distribution network,
communication network and traditional broadcast
networks. In future work, the proposed framework will be
developed with modified structures to provide vast
improvement in real time application. Improvement of
future work may also include improvement of the
signature matching and thus increase the synchronization
rate. Also we want to automate the detection of time drift
to achieve a completely unsupervised synchronization
process.
7. Int. J. Advanced Networking and Applications
Volume: 10 Issue: 01 Pages: 3728-3734 (2018) ISSN: 0975-0290
3734
6. ACKNOWLEDGMENT
At first, I thank Lord Almighty to give knowledge to
complete the survey. I would like to thank my professors,
colleagues, family and friends who encouraged and helped
us in preparing this paper.
REFERENCES
[1] Alka Jindal, Sucharu Aggarwal, “Comprehensive
overview of various lip synchronization
techniques” IEEE International transaction on
Biometrics and Security technologies, 2008.
[2] Anitha Sheela.k, Balakrishna Gudla, Srinivasa
Rao Chalamala, Yegnanarayana.B, “Improved lip
contour extraction for visual speech recognition”
IEEE International transaction on Consumer
Electronics,pp.459-462, 2015.
[3] N. J. Bryan, G. J. Mysore and P. Smaragdis,
“Clustering and synchronizing multicamera video
via landmark cross-correlation,” in IEEE
International Conference on Acoustics, Speech
and Signal Processing (ICASSP), March 2012,
pp. 2389–2392.
[4] Claus Bauer, Kent Terry, Regunathan
Radhakrishnan, “Audio and video signature for
synchronization” IEEE International conference
on Multimedia and Exposition Community
(ICME), pp.1549-1552, 2008.
[5] N. Dave, N. M. Patel. "Phoneme and Viseme
based Approach for Lip Synchronization.",
International Journal of Signal Processing,
Image Processing and Pattern Recognition, pp.
385-394, 2014.
[6] Dragan Sekulovski, Hans Weda, Mauro Barbieri
and Prarthana Shrestha, “Synchronization of
Multiple Camera Videos Using Audio-Visual
Features,” in IEEE Transactions On Multimedia,
Vol. 12, No. 1, January 2010.
[7] Fumei Liu, Wenliang, Zeliang Zhang, “Review of
the visual feature extraction research” IEEE 5th
International Conference on software
Engineering and Service Science, pp.449-452,
2014.
[8] Josef Chalaupka, Nguyen Thein Chuong, “Visual
feature extraction for isolated word visual only
speech recognition of Vietnamese” IEEE 36th
International conference on Telecommunication
and signal processing (TSP), pp.459-463, 2013.
[9] K. Kumar, V. Libal, E. Marcheret, J. Navratil,
G.Potamianos and G. Ramaswamy, “Audio-
Visual speech synchronization detection using a
bimodal linear prediction model”. in Computer
Vision and Pattern Recognition Workshops,
2009, p. 54.
[10]Laszlo Boszormenyi, Mario Guggenberger,
Mathias Lux, “Audio Align-synchronization of
A/V streams based on audio data” IEEE
International journal on Multimedia, pp.382-383,
2012.
[11]Y. Liu, Y. Sato, “Recovering audio-to-video
synchronization by audiovisual correlation
analysis”. in Pattern Recognition, 2008, p. 2.
[12]C. Lu and M. Mandal, “An efficient technique for
motion-based view-variant video sequences
synchronization,” in IEEE International
Conference on Multimedia and Expo, July 2011,
pp. 1–6.
[13]Luca Lombardi, Waqqas ur Rehman Butt, “A
survey of automatic lip reading approaches”
IEEE 8th
International Conference Digital
Information Management (ICDIM), pp.299-302,
2013.
[14]Namrata Dave, “A lip localization based visual
feature extraction methods” An International
journal on Electrical and computer Engineering,
vol.4, no.4, December 2015.
[15]P. Shrstha, M. Barbieri, and H. Weda,
“Synchronization of multi-camera video
recordings based on audio,” in Proceedings of the
15th international conference on Multimedia
2007, pp.545–548.
Author Details
A. Thenmozhi (S.Anbazhagan)
completed B.E (Electronics and
Communication Engineering) in 2016
from Anna University, Chennai. She has
published 2 papers in National and
International Conference proceedings. Her area of interest
includes Electronic System Design, Signal Processing,
Image Processing and Digital Communication.
Dr. P. Kannan (Pauliah Nadar
Kannan) received the B.E. degree from
Manonmaniam Sundarnar University,
Tirunelveli, India, in 2000, the M.E.
degree from the Anna University,
Chennai, India, in 2007, and the Ph.D
degree from the Anna University Chennai, Tamil Nadu,
India, in 2015. He has been Professor with the Department
of Electronics and Communication Engineering, PET
Engineering College Vallioor, Tirunelveli District, Tamil
Nadu, India. His current research interests include
computer vision, biometrics, and Very Large Scale
Integration Architectures.