IJSRD - International Journal for Scientific Research & Development| Vol. 4, Issue 06, 2016 | ISSN (online): 2321-0613

نویسنده

  • S. Sabitha
چکیده

Video streaming over wireless (networks) has gained popularity in recent times with the development of heterogeneity networks. The demand and market for video based services is expected to grow substantially in the future. In that network is used for video streaming, the inherent unreliability of frequently results in corrupted video packets and jitter during video playback. Such an aberration is especially pronounced in wireless networks due to the fading and multipath interference impediments in wireless channels. Protocol based video transmission provides reliability at the cost of severely increased delay arising from frequent retransmissions in case of packet error over wireless links and constraints from session and application layers for insequence delivery. These delays are substantially worsened in low SNR (signal-to-noise power ratio) wireless environments. Multiple Protocol connections, which efficiently utilize the bandwidth of the wireless channel, have been demonstrated to yield significantly improved quality of video streaming over wireless channels while enhancing the reliability of video delivery compared to protocols. In this paper we propose new scalable hierarchical adaptive bitrate video coding over heterogeneity network for reliable video transmission over wireless channels while reducing the delay and jitter of video streaming.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

IJSRD - International Journal for Scientific Research & Development| Vol. 4, Issue 03, 2016 | ISSN (online): 2321-0613

A Parallel multiplier using approximate compressors are proposed in this paper. The two new approximate 4-2 compressors are proposes that the simplified compressors have better power consumption than the optimized 4-2 compressor existing designs. These approximate compressors are then used in the restoration module of a Parallel multiplier. Four different schemes for utilizing the proposed appr...

متن کامل

IJSRD - International Journal for Scientific Research & Development| Vol. 4, Issue 10, 2016 | ISSN (online): 2321-0613

several edge recognition strategies have now been planned within the past decades. Many are derived from differential strategies such as for example Sobel, Roberts, Laplacian operators, and therefore on. Nevertheless these calculations are quite sensitive to sound, in order to restrain sound before sensing edges. In this report intensive literature review has been presented in numerous edge rec...

متن کامل

IJSRD - International Journal for Scientific Research & Development| Vol. 4, Issue 02, 2016 | ISSN (online): 2321-0613

This paper describes the cross-talk analysis of high-speed PCB design. Some models using multiple PCB traces above a ground plane having guard traces and vias are taken and the results are obtained from modeling and simulation using Ansoft HFSS software tool and are compared with the experimental results. Reduction techniques of crosstalk are highlighted.

متن کامل

IJSRD - International Journal for Scientific Research & Development| Vol. 4, Issue 04, 2016 | ISSN (online): 2321-0613

Globalization, growing competition and with emergence of new technologies, change shows economic profile of nations & knowledge driven economies have created a scenario where quality is no more a desirable strategy –it has become a survival strategy. Six Sigma is widely used in material & service organizations to enhance quality & to reduce cost but the time has come to move one step further to...

متن کامل

IJSRD - International Journal for Scientific Research & Development| Vol. 4, Issue 03, 2016 | ISSN (online): 2321-0613

As required controlling speed of motors to do control prosthetic arm movement, conventional control method is not reliably control multiple functions together, So, new control strategy is requiring tackling with this difficult problem. In this review paper we survey some recent developments of various methodologies for improvement in settling time and overshoot.

متن کامل

IJSRD - International Journal for Scientific Research & Development| Vol. 4, Issue 06, 2016 | ISSN (online): 2321-0613

Now a day, every sensitive data must be secured. Visual cryptography is a technique to hide the image based secret. In visual cryptography the secret image is encrypted in to shares and at decryption side all shares are superimposed with each other so that secret is revealed. The key feature of visual cryptography is that; no difficult computation is needed at decryption side to decrypt the sec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016