Voice over IP End-to-End Delay Measurements
Issue:
Volume 4, Issue 4, August 2015
Pages:
85-89
Received:
29 May 2015
Accepted:
27 June 2015
Published:
8 July 2015
Abstract: VoIP refers to a method of transmission of voice data over IP networks rather than using traditional circuit PSTN (Public Switched Telephone Networks ).In this paper the researcher discusses about VoIP, about the design issues of RTP/RTCP (real-time transport/real time control protocol), how to measure packet losses at the sender and receiver side and also inter-arrival delay and delay variation (Jitter) , how the receiver and sender sends reports about the sender , how one-way end-to-end delay is measured, and explains the functionalities of static and dynamic jitter buffers and describe how Cisco routers are used to measure packet losses and round trip delays for IP-SLA (Service level agreement).
Abstract: VoIP refers to a method of transmission of voice data over IP networks rather than using traditional circuit PSTN (Public Switched Telephone Networks ).In this paper the researcher discusses about VoIP, about the design issues of RTP/RTCP (real-time transport/real time control protocol), how to measure packet losses at the sender and receiver side ...
Show More
A Novel Hybrid Method for Face Recognition Based on 2d Wavelet and Singular Value Decomposition
Vahid Haji Hashemi,
Abdorreza Alavi Gharahbagh
Issue:
Volume 4, Issue 4, August 2015
Pages:
90-94
Received:
15 June 2015
Accepted:
26 June 2015
Published:
8 July 2015
Abstract: An efficient face recognition system using eigen values of wavelet transform as feature vectors and radial basis function (RBF) neural network as classifier is presented. The face images are decomposed by 2-level two-dimensional (2-D) wavelet transformation.The wavelet coefficients obtained from the wavelet transformation are averaged for finding centers of features. In train process, four output of wavelet transform is analyzed and all eigenvalues of these images is obtained. At next step, the maximum 10 eigenvalues of wavelet sub images is stored as feature. Based on four sub images of wavelet transform and 10 eigenvalues of each sub image, the length of feature vector is 40. After obtaining features, in the train process for each person a center that has minimum Euclidean distance from all features is selected using RBF function. In fact the features are recognized by a RBF network. For a new input face image, firstly the feature vector is computed and then the distance (error) of this new vector with all centers of all persons is checked. The minimum distance is selected as target face. The proposed method on Essex face database and resultsshowed that the proposed method provide better recognition rates with low computational complexity.
Abstract: An efficient face recognition system using eigen values of wavelet transform as feature vectors and radial basis function (RBF) neural network as classifier is presented. The face images are decomposed by 2-level two-dimensional (2-D) wavelet transformation.The wavelet coefficients obtained from the wavelet transformation are averaged for finding c...
Show More
Dependable Community-Cloud Framework for Smartphones
Arnold Adimabua Ojugo,
Fidelis Obukowho Aghware,
Rume Elizabeth Yoro,
Mary Oluwatoyin Yerokun,
Andrew Okonji Eboka,
Christiana Nneamaka Anujeonye,
Fidelia Ngozi Efozia
Issue:
Volume 4, Issue 4, August 2015
Pages:
95-103
Received:
11 July 2015
Accepted:
21 July 2015
Published:
5 August 2015
Abstract: Cloud computing enable users to access ubiquitous, on-demand, convenient and shared resource (apps and storage) – as rapidly released by a provider with minimal managed effort. The increased growth of user access to mobile smartphones from 42.5% in 2013 to 78.9% by 2013 and the advent of Androids has made smartphones a preferred choice over PCs due to its design, portability, speed, functionality and Internet access ease – all of which continues to pose significant risk to user data security with high vulnerability to attacks. With its implication to work related functions and biz issues, it exposes sensitive data to adversaries. The study thus, describes a support tool named PushCloud that lets users account the ability to sign-in and perform backup functions on contacts, messages, picture files, documents, videos and recorded voice amongst others. Its other benefit is in the fact that it pools together cloud service providers and allows users a cross platform with minimal price difference. The system helps address security related issue from a user’s end via AES-256 encryption on an integrated cloud model, explores its storage capability to guarantee data recovery with a remote server (BDC) for back- and front-end data storage ease.
Abstract: Cloud computing enable users to access ubiquitous, on-demand, convenient and shared resource (apps and storage) – as rapidly released by a provider with minimal managed effort. The increased growth of user access to mobile smartphones from 42.5% in 2013 to 78.9% by 2013 and the advent of Androids has made smartphones a preferred choice over PCs due...
Show More