Academic literature on the topic 'Methods of video data transmission'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Methods of video data transmission.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Methods of video data transmission"

1

Kataieva, Yevheniia, and Anton Rebrikov. "URGENCY OF USING HIDDEN DATA TRANSMISSION IN VIDEO FILES." Management of Development of Complex Systems, no. 46 (June 24, 2021): 48–54. http://dx.doi.org/10.32347/2412-9933.2021.46.48-54.

Full text
Abstract:
The article examines the problems of protecting information from unwanted access, which have tried to solve throughout the existence of mankind. Nowadays, the widespread use of electronic means of communication, electronic eavesdropping and fraud, a variety of computer viruses and other electronic hazards, electronic systems place high demands on the protection of information. Thus, the study of digital steganography is an urgent task. There are two main areas of hidden data transmission: cryptography and steganography. The purpose of cryptography is to restrict access to information by encrypting it. Unlike cryptography, steganography allows you to hide the very fact of the presence of hidden data. The study examined the main methods of covert data transmission using computer steganography, namely: the method of using system-reserved areas of digital data formats, methods of hiding information by special formatting of text files, which include the use of word, sentence or paragraph shift, selection certain positions of letters in the text or the use of properties of system fields that are not displayed on the screen, the method of using simulation functions, methods of using unused disk sectors, the method of using redundant media files (audio, photo and video). Currently, due to the growth of information and increasing the bandwidth of communication channels, the issue of hiding information in video sequences is becoming increasingly important. The transmission of digital video in recent years is a typical event and does not arouse suspicion. In the course of the research the peculiarities of hiding information in video files are considered, the comparison of existing algorithms of computer video steganography is made. The task is to develop your own algorithm for embedding information in the blue color channel of video files. The object of research is the transfer of hidden data in digital media files. The subject of research is the transmission of hidden data in the video stream. The purpose of research is to review the subject area, to examine the available methods of embedding information in media files in general and specifically in video files, to identify the advantages and disadvantages of existing algorithms, to develop their own algorithm of video steganography based on previously obtained research results. Research methods - methods of information theory, probability theory and mathematical statistics; methods of digital processing of signals, static images and video files; methods of vector analysis. The results of research - an overview of the features of hiding information in video files, compared existing algorithms of computer video steganography.
APA, Harvard, Vancouver, ISO, and other styles
2

Chavate, Shrikant, and Ravi Mishra. "Efficient Detection of Abrupt Transitions Using Statistical Methods." ECS Transactions 107, no. 1 (April 24, 2022): 6541–52. http://dx.doi.org/10.1149/10701.6541ecst.

Full text
Abstract:
The rapid increment of technological advancements in the field of multimedia stream has piled up data production and consumption in cyberspace in the past two decades. It has prompted a swift increase in data transmission volume and repository size. Video is the most consumed data type on the internet. So, retrieval of selected video clips from the extra-large database of videos is extremely complex. The video shot boundary detection (SBD) is used for retrieval of desired video clips. It also is the fundamental step in video processing, which also was found important for applications like video browsing and indexing. The SBD handles the identification of abrupt and gradual transitions in the video database. In this paper, the statistical methods have implemented to detect the abrupt cuts. This benefitted the advantage of less complexity. The experiments are performed on TRECVID 2007 dataset, and the results obtained with high accuracy in less computational time.
APA, Harvard, Vancouver, ISO, and other styles
3

Et. al., G. Megala,. "State-Of-The-Art In Video Processing: Compression, Optimization And Retrieval." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 5 (April 11, 2021): 1256–72. http://dx.doi.org/10.17762/turcomat.v12i5.1793.

Full text
Abstract:
Video compression plays a vital role in the modern social media networking with plethora of multimedia applications. It empowers transmission medium to competently transfer videos and enable resources to store the video efficiently. Nowadays high-resolution video data are transferred through the communication channel having high bit rate in order to send multiple compressed videos. There are many advances in transmission ability, efficient storage ways of these compressed video where compression is the primary task involved in multimedia services. This paper summarizes the compression standards, describes the main concepts involved in video coding. Video compression performs conversion of large raw bits of video sequence into a small compact one, achieving high compression ratio with good video perceptual quality. Removing redundant information is the main task in the video sequence compression. A survey on various block matching algorithms, quantization and entropy coding are focused. It is found that many of the methods having computational complexities needs improvement with optimization.
APA, Harvard, Vancouver, ISO, and other styles
4

Fadhel, Sabah, Mohd Shafry, and Omar Farook. "Chaos Image Encryption Methods: A Survey Study." Bulletin of Electrical Engineering and Informatics 6, no. 1 (March 1, 2017): 99–104. http://dx.doi.org/10.11591/eei.v6i1.599.

Full text
Abstract:
With increasing dependence on communications over internet and networks, secure data transmission is coming under threat. One of the best solutions to ensure secure data transmissions is encryption. Multiple forms of data, such as text, audio, image, and video can be digitally transmitted, nowadays images being the most popular and old encryption techniques such as: AES,DES,RSA etc., show low security level when used for image encryption. This problem was resolved by using of chaos encryption which is an acceptable form of encryption for image data. The sensitivity to initial conditions and control parameters make chaos encryption suitable for image applications. This study discusses various chaos encryption techniques.
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Yan, Xinheng Wang, and Liqiang Zhao. "Scalable Video Streaming in Wireless Mesh Networks for Education." International Journal of Distance Education Technologies 9, no. 1 (January 2011): 1–20. http://dx.doi.org/10.4018/jdet.2011010101.

Full text
Abstract:
In this paper, a video streaming system for education based on a wireless mesh network is proposed. A wireless mesh network is a self-organizing, self-managing and reliable intelligent network, which allows educators to deploy a network quickly. Video streaming plays an important role in this system for multimedia data transmission. This new system adopts the scalable video coding scheme that enables the video server to deliver layered videos to different user groups. In addition, a quality control method was developed to automatically change the output data rate based on network conditions. Real implementation test results show the proposed methods are effective.
APA, Harvard, Vancouver, ISO, and other styles
6

Czaplewski, Bartosz, and Krzysztof Czaplewski. "Protection of Visual Data Transmission for Vessel Traffic Systems Using Joint Fingerprinting and Decryption Method Based on Modified Hill Cipher." Annual of Navigation 19, no. 2 (December 1, 2012): 5–17. http://dx.doi.org/10.2478/v10367-012-0014-8.

Full text
Abstract:
Abstract Vessel traffic systems provide a high level of safety on coastal waters due to coastal radar stations and industrial cameras transmitting information to traffic supervision centers, as well. To improve a vessel traffic services is very important to ensure the speed and secrecy for the transmission of video images. The paper presents the basic issues of the multimedia data protection by digital watermarking and fingerprinting methods. Main applications for such digital marking were described in the paper as well as its requirements. Furthermore, the importance of multicast transmission for fingerprinting methods was presented by comparing the scalability of methods using only unicast transmissions and methods using multicast transmissions. The paper also presents the greatest threat to fingerprinting methods, which are attacks performed by more than one pirate. These attacks are called collusion attacks. The criteria that should be followed during identifying rogue users taking part in the collusion attack on the security systems has been presented. The paper also contains description of the extended Hillcast method, which belongs to the group of JFD (Joint Fingerprinting and Decryption) methods. The method provides a cryptographic security and digital fingerprinting of multimedia content, while maintaining high scalability. Main purpose of this method is VoD (Video on Demand) service, but it can also be used in vessel traffic supervision systems, such as VTS and AIS. In the last part of paper, there are results of studies which indicate high resistance to most common collusion attacks. Method proposed by authors can enhance the security of visual data transmission in vessel traffic systems.
APA, Harvard, Vancouver, ISO, and other styles
7

Gertsiy, O. "COMPARATIVE ANALYSIS OF COMPACT METHODS REPRESENTATIONS OF GRAPHIC INFORMATION." Collection of scientific works of the State University of Infrastructure and Technologies series "Transport Systems and Technologies" 1, no. 37 (June 29, 2021): 130–43. http://dx.doi.org/10.32703/2617-9040-2021-37-13.

Full text
Abstract:
The main characteristics of graphic information compression methods with losses and without losses (RLE, LZW, Huffman's method, DEFLATE, JBIG, JPEG, JPEG 2000, Lossless JPEG, fractal and Wawelet) are analyzed in the article. Effective transmission and storage of images in railway communication systems is an important task now. Because large images require large storage resources. This task has become very important in recent years, as the problems of information transmission by telecommunication channels of the transport infrastructure have become urgent. There is also a great need for video conferencing, where the task is to effectively compress video data - because the greater the amount of data, the greater the cost of transmitting information, respectively. Therefore, the use of image compression methods that reduce the file size is the solution to this task. The study highlights the advantages and disadvantages of compression methods. The comparative analysis the basic possibilities of compression methods of graphic information is carried out. The relevance lies in the efficient transfer and storage of graphical information, as big data requires large resources for storage. The practical significance lies in solving the problem of effectively reducing the data size by applying known compression methods.
APA, Harvard, Vancouver, ISO, and other styles
8

Al-Rawi, Muhanned. "Data-Aided Carrier Recovery with QPSK Modulation." Scientific Bulletin 24, no. 1 (June 1, 2019): 14–22. http://dx.doi.org/10.2478/bsaft-2019-0002.

Full text
Abstract:
Abstract Digital communication has proven to be the most efficient method of data transmission especially where long distances are involved. This led to the invention of more sophisticated methods of communication ranging from mobile handset communication to more advanced satellite communication. The speeds of passing information have been improving over the years and real time video communication has been made possible with digital devices. Various methods of digital data transmission are employed based on the information to be transmitted. This paper focuses on carrier recovery in digital communication systems, especially those based on Quadrature Phase Shift Keying (QPSK) modulation and demodulation scheme. The design being implemented is that of coherent demodulation for QPSK scheme using SIMULINK design tool. Performance of QPSK is also investigated to make a comparison and the suitability of the scheme to use in digital data transmission applications.
APA, Harvard, Vancouver, ISO, and other styles
9

Rajagopalan, Pradeep, and Sanjay Kumar Gengaiyan. "PRIVACY INFORMATION PROTECTION IN AN ENCRYPTED COMPRESSED H.264 VIDEO BITSTREAM." International Journal of Students' Research in Technology & Management 3, no. 4 (September 27, 2015): 343–45. http://dx.doi.org/10.18510/ijsrtm.2015.349.

Full text
Abstract:
The paper presents that encryption of compressed video bit streams and hiding privacy information to protect videos during transmission or cloud storage. Digital video sometimes needs to be stored and processed in an encrypted format to maintain security and privacy. Here, data hiding directly in the encrypted version of H.264/AVC video stream is approached, which includes the following three parts. By analyzing he property of H.264/AVC codec, the code words of intra prediction modes, the code words of motion vector differences, and the code words of residual coefficients are encrypted with stream ciphers. Then, a data hider may embed additional data in the encrypted domain by using wrapping technique, without knowing the original video content. The paper results shows that used methods provides better performance in terms of computation efficiency, high data security and video quality after decryption. The parameters such as RMSE, PSNR, CC are evaluated to measure its efficiency
APA, Harvard, Vancouver, ISO, and other styles
10

Jiang, Hongxu, Shenglan Li, Huiyong Li, Tingshan Liu, and Jinyuan Lu. "A High-Performance and Hardware-Efficient PCIe Transmission for a Multi-Channel Video Using Command Caching and Dynamic Splicing on FPGA." Journal of Circuits, Systems and Computers 27, no. 04 (December 6, 2017): 1850067. http://dx.doi.org/10.1142/s0218126618500676.

Full text
Abstract:
With the increasing requirements of transmitting larger amounts of diverse video and image data, the PCI express (PCIe) interface has been extensively used in high-speed digital systems for multimedia processing and communication. However, the existing PCIe transmission methods are not efficient to transmit multi-channel videos on FPGA processors, as they waste PCIe bandwidth and hardware resources. In this paper, an efficient PCIe transmission method for multi-channel video is presented on an FPGA processor. First, to reduce the programmed I/O (PIO) write latency, the command caching method is adopted. The traditional DMA descriptors are transformed into DMA commands, which are smaller, and the command buffer is used to store these commands. Second, a dynamic splicing mechanism is proposed for data transmission and commands the scheduling separately. The multi-type data is transmitted concurrently in this dynamic splicing mechanism. Moreover, the adjacent commands are spliced into one command, which reduces the DMA initiation times. Finally, the direct kernel memory access technique and timer self-feedback monitor technique are applied to improve the transmission efficiency and enhance the system reliability. The experimental results show that the transmission efficiency of the proposed method is increased by nearly 30% compared with other conventional methods, and the highest measured transfer rate is 1631 Mbytes/s on write and 1582 Mbytes/s on read, which reaches 84.4% of the theoretical maximum.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Methods of video data transmission"

1

Ліпчанська, Оксана Валентинівна. "Методи обробки та передачі даних для підсистеми інформаційного забезпечення машиніста локомотива." Thesis, Національний технічний університет "Харківський політехнічний інститут", 2019. http://repository.kpi.kharkov.ua/handle/KhPI-Press/41022.

Full text
Abstract:
Дисертація на здобуття наукового ступеня кандидата технічних наук за спеціальністю 05.13.05 – комп'ютерні системи та компоненти. – Національний технічний університет "Харківський політехнічний інститут", Харків, 2019. У дисертації вирішена задача розробки методів обробки та передачі даних для підсистеми інформаційного забезпечення машиніста локомотива. На підставі вивчення сучасних методів і засобів обробки і передачі даних на залізничному транспорті встановлено, що існує суперечність між підвищенням швидкості та інтенсивності руху залізничного транспорту, збільшенням кількості аварійно-небезпечних ділянок, ускладненням системи управління залізничним транспортом, підвищенням вимог до якості інформаційного забезпечення машиніста локомотива та застосовуваними математичним апаратом і технологіями управління кодування/декодування. Обґрунтовано вибір технології математичної формалізації на основі мереж масового обслуговування та нейронних мереж. Розроблено концептуальну модель бездротового сегменту підсистеми інформаційного забезпечення машиніста локомотива, яка побудована з використанням технології 4G і враховує тип модуляції QPSK та процедуру перемежіння при передачі кадрів для зниження ймовірності помилкового прийому при забезпеченні високої швидкості передачі даних. Розроблено математичну модель процесу передачі даних по фізичному розподіленому uplink каналу, яка враховує особливості передачі даних відповідно до стандарту LTE в динамічних умовах магістралі залізниці і дозволяє оцінити ймовірносно-часові характеристики процесу передачі даних в підсистемі інформаційного забезпечення машиніста локомотива. Розроблено математичну модель управління доступом до сегменту комп'ютеризованої системи залізничного транспорту, яка враховує особливості передачі даних відповідно до стандарту LTE в динамічних умовах магістралі залізниці. Удосконалено процедуру завадостійкого декодування потокового відео, що передається в бездротовому сегменті 4G мережі підсистеми інформаційного забезпечення машиніста локомотива, що дозволяє підвищити оперативність при передачі даних, скоротити загальну кількість обчислень при декодуванні і звільнити обчислювальні ресурси комп'ютеризованої системи. Розроблено інтелектуальну систему контролю стану небезпечних ділянок залізничного шляху із застосуванням адаптованої згортальної нейронної мережі, що дозволяє підвищити достовірність розпізнавання небезпечних ситуацій на залізничних переїздах і інформувати машиніста в разі виникнення критичної ситуації. Обґрунтовано практичні рекомендації щодо застосування розроблених методів.
The thesis is in candidacy for a scientific degree of candidate of technical sciences in specialty 05.13.05 – computer systems and components. – National Technical University "Kharkiv Polytechnic Institute", Kharkiv, 2019. The thesis solves the problem of developing methods for processing and transmitting data for the locomotive driver's information support subsystem. Based on the study of modern methods and means of processing and transmitting data on railway transport, it is established that there is a contradiction between the increase in the speed and intensity of railway traffic, the increase in the number of emergency areas, the complexity of the railway transport management system, the increase in the requirements for railway transport safety and the applied mathematical apparatus and technologies of coding / decoding. The choice of technology of mathematical formalization based on queuing networks and neural networks is justified. A conceptual model of the wireless segment of the locomotive driver's information support subsystem has been developed, which is built using 4G technology and takes into account the QPSK modulation type and the interleaving procedure for frame transmission to reduce the probability of erroneous reception while ensuring a high data rate. A mathematical model of the process of transmitting video data over a physical distributed uplink channel that takes into account the peculiarities of video data transmission in accordance with the LTE standard under dynamic conditions of the railway main line is developed and allows to estimate a wide range of robabilitytemporal characteristics of the video data transmission process in the locomotive driver's information support subsystem. A mathematical model of access control to the segment of a locomotive driver's information support subsystem has been developed, which takes into account the peculiarities of video data transmission in accordance with the LTE standard in the dynamic conditions of the railway line. The procedure for noiseless decoding of streaming video in the wireless 4G network segment of the locomotive driver’s information support subsystem is improved. It allows to increase efficiency in data transfer, to reduce the total number of calculations during decoding and to release the computing resources of the computerized system. An intelligent system for monitoring the state of dangerous sections of the railway using an adapted convolution neural network has been developed, which makes it possible to increase the reliability of the recognition of dangerous situations at railway crossings and inform the driver in the event of a critical situation. Practical recommendations as for the developed methods application are substantiated.
APA, Harvard, Vancouver, ISO, and other styles
2

Ліпчанська, Оксана Валентинівна. "Методи обробки та передачі даних для підсистеми інформаційного забезпечення машиніста локомотива." Thesis, Національний технічний університет "Харківський політехнічний інститут", 2019. http://repository.kpi.kharkov.ua/handle/KhPI-Press/40900.

Full text
Abstract:
Дисертація на здобуття наукового ступеня кандидата технічних наук за спеціальністю 05.13.05 – комп'ютерні системи та компоненти. – Національний технічний університет "Харківський політехнічний інститут", Харків, 2019. У дисертації вирішена задача розробки методів обробки та передачі даних для підсистеми інформаційного забезпечення машиніста локомотива. На підставі вивчення сучасних методів і засобів обробки і передачі даних на залізничному транспорті встановлено, що існує суперечність між підвищенням швидкості та інтенсивності руху залізничного транспорту, збільшенням кількості аварійно-небезпечних ділянок, ускладненням системи управління залізничним транспортом, підвищенням вимог до якості інформаційного забезпечення машиніста локомотива та застосовуваними математичним апаратом і технологіями управління кодування/декодування. Обґрунтовано вибір технології математичної формалізації на основі мереж масового обслуговування та нейронних мереж. Розроблено концептуальну модель бездротового сегменту підсистеми інформаційного забезпечення машиніста локомотива, яка побудована з використанням технології 4G і враховує тип модуляції QPSK та процедуру перемежіння при передачі кадрів для зниження ймовірності помилкового прийому при забезпеченні високої швидкості передачі даних. Розроблено математичну модель процесу передачі даних по фізичному розподіленому uplink каналу, яка враховує особливості передачі даних відповідно до стандарту LTE в динамічних умовах магістралі залізниці і дозволяє оцінити ймовірносно-часові характеристики процесу передачі даних в підсистемі інформаційного забезпечення машиніста локомотива. Розроблено математичну модель управління доступом до сегменту комп'ютеризованої системи залізничного транспорту, яка враховує особливості передачі даних відповідно до стандарту LTE в динамічних умовах магістралі залізниці. Удосконалено процедуру завадостійкого декодування потокового відео, що передається в бездротовому сегменті 4G мережі підсистеми інформаційного забезпечення машиніста локомотива, що дозволяє підвищити оперативність при передачі даних, скоротити загальну кількість обчислень при декодуванні і звільнити обчислювальні ресурси комп'ютеризованої системи. Розроблено інтелектуальну систему контролю стану небезпечних ділянок залізничного шляху із застосуванням адаптованої згортальної нейронної мережі, що дозволяє підвищити достовірність розпізнавання небезпечних ситуацій на залізничних переїздах і інформувати машиніста в разі виникнення критичної ситуації. Обґрунтовано практичні рекомендації щодо застосування розроблених методів.
The thesis is in candidacy for a scientific degree of candidate of technical sciences in specialty 05.13.05 – computer systems and components. – National Technical University "Kharkiv Polytechnic Institute", Kharkiv, 2019. The thesis solves the problem of developing methods for processing and transmitting data for the locomotive driver's information support subsystem. Based on the study of modern methods and means of processing and transmitting data on railway transport, it is established that there is a contradiction between the increase in the speed and intensity of railway traffic, the increase in the number of emergency areas, the complexity of the railway transport management system, the increase in the requirements for railway transport safety and the applied mathematical apparatus and technologies of coding / decoding. The choice of technology of mathematical formalization based on queuing networks and neural networks is justified. A conceptual model of the wireless segment of the locomotive driver's information support subsystem has been developed, which is built using 4G technology and takes into account the QPSK modulation type and the interleaving procedure for frame transmission to reduce the probability of erroneous reception while ensuring a high data rate. A mathematical model of the process of transmitting video data over a physical distributed uplink channel that takes into account the peculiarities of video data transmission in accordance with the LTE standard under dynamic conditions of the railway main line is developed and allows to estimate a wide range of robabilitytemporal characteristics of the video data transmission process in the locomotive driver's information support subsystem. A mathematical model of access control to the segment of a locomotive driver's information support subsystem has been developed, which takes into account the peculiarities of video data transmission in accordance with the LTE standard in the dynamic conditions of the railway line. The procedure for noiseless decoding of streaming video in the wireless 4G network segment of the locomotive driver’s information support subsystem is improved. It allows to increase efficiency in data transfer, to reduce the total number of calculations during decoding and to release the computing resources of the computerized system. An intelligent system for monitoring the state of dangerous sections of the railway using an adapted convolution neural network has been developed, which makes it possible to increase the reliability of the recognition of dangerous situations at railway crossings and inform the driver in the event of a critical situation. Practical recommendations as for the developed methods application are substantiated.
APA, Harvard, Vancouver, ISO, and other styles
3

Yilmaz, Ayhan. "Robust Video Transmission Using Data Hiding." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/1093509/index.pdf.

Full text
Abstract:
Video transmission over noisy wireless channels leads to errors on video, which degrades the visual quality notably and makes error concealment an indispensable job. In the literature, there are several error concealment techniques based on estimating the lost parts of the video from the available data. Utilization of data hiding for this problem, which seems to be an alternative of predicting the lost data, provides a reserve information about the video to the receiver while unchanging the transmitted bit-stream syntax
hence, improves the reconstruction video quality without significant extra channel utilization. A complete error resilient video transmission codec is proposed, utilizing imperceptible embedded information for combined detecting, resynchronization and reconstruction of the errors and lost data. The data, which is imperceptibly embedded into the video itself at the encoder, is extracted from the video at the decoder side to be utilized in error concealment. A spatial domain error recovery technique, which hides edge orientation information of a block, and a resynchronization technique, which embeds bit length of a block into other blocks are combined, as well as some parity information about the hidden data, to conceal channel errors on intra-coded frames of a video sequence. The errors on inter-coded frames are basically recovered by hiding motion vector information along with a checksum into the next frames. The simulation results show that the proposed approach performs superior to conventional approaches for concealing the errors in binary symmetric channels, especially for higher bit rates and error rates.
APA, Harvard, Vancouver, ISO, and other styles
4

Dissanayake, Maheshi Buddhinee. "Error robust video transmission using redundant data." Thesis, University of Surrey, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.521720.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Walker, Wendy Tolle 1959. "Video data compression for telescience." Thesis, The University of Arizona, 1988. http://hdl.handle.net/10150/276830.

Full text
Abstract:
This paper recommends techniques to use for data compression of video data used to point a telescope and from a camera observing a robot, for transmission from the proposed U.S. Space Station to Earth. The mathematical basis of data compression is presented, followed by a general review of data compression techniques. A technique that has wide-spread use in data compression of videoconferencing images is recommended for the robot observation data. Bit rates of 60 to 400 kbits/sec can be achieved. Several techniques are modelled to find a best technique for the telescope data. Actual starfield images are used for the evaluation. The best technique is chosen on the basis of which model provides the most compression while preserving the important information in the images. Compression from 8 bits per pel to 0.015 bits per pel is achieved.
APA, Harvard, Vancouver, ISO, and other styles
6

Malindi, Phumzile. "Methods for providing rural telemedicine with quality video transmission." Thesis, Cape Peninsula University of Technology, 2007. http://hdl.handle.net/20.500.11838/1197.

Full text
Abstract:
Thesis (DTech (Electrical engineering))--Cape Peninsula University of Technology, Cape Town, 2007
Telemedicine has been identified as a tool to distnllUte medical expertise to medically underserved rural community. However, due to the underdeveloped or non-existent telecommunication infrastructure, which is needed as the platform for telemedicine, the full benefits of telemedicine are yet to be realized in most parts of South Africa and Africa as a whole. This study aims to explore ways on how to provide lP-based lCI system that can be used as a communication platform for telemedicine in rural areas. In order to emulate the onsite face-to-face consultation experience, the rural telemedicine system must be able to provide quality video transmission. Quality video is also important in order for the physician at the distant end to be able to make correct diagnosis. Hence the main focus of this study is on ways ofproviding quality video over lP-based multiservice network. A conceptual model of a rural area network that can be used for rural telemedicine has been deVeloped, and different access technologies that can be used for rural areas are presented. Techniques for compesating IP best effort datagram delivery are provided. Factors that can affect the quality of video transmission on an lP-based packet network are identified, and a holistic approach to mitigate them is proposed. That includes adopting coding techniques that will provide coding efficiency, high quality video that is consistent at high and low bit rates, resilience to transmission errors, scalability, and network friendliness, which will result in perceived quality improvement, highcompression efficiency, and possibility of transportation over different networks. Secondly, it also includes mechanisms to compensate for packet networks idiosyncrasy, especially JP best-effort debilities, in order to meet the latency and jitter requirements of real-time video traffic. For video coding, H.264 is proposed as it meets most of the encoding requirements listed above, and for prioritising and protecting.video traffic from JP network's best-effort debilities a combination of differential services (DiflServ) and multi-protocol label switching (MPLS) have been adopted, where DiflServ is used for traffic classification and MPLS is used for traffic engineering and fast-rerouting in the event of route failure. To verify and validate the proposed solutions, modelling and simulation has been used, where the Network Simulator (NS-2.93) has been used to simulate network functions, and PSNR, VQM score and double stimulus impairment scale (DSIS) have been used for evaluating video quality.
APA, Harvard, Vancouver, ISO, and other styles
7

Tudor-Jones, Gareth. "Concealment algorithms for networked video transmission systems." Thesis, Loughborough University, 1999. https://dspace.lboro.ac.uk/2134/32996.

Full text
Abstract:
This thesis addresses the problem of cell loss when transmitting video data over an ATM network. Cell loss causes sections of an image to be lost or discarded in the interconnecting nodes between the transmitting and receiving locations. The method used to combat this problem is to use a technique called Error Concealment, where the lost sections of an image are replaced with approximations derived from the information in the surrounding areas to the error. This technique does not require any additional encoding, as used by Error Correction. Conventional techniques conceal from within the pixel domain, but require a large amount of processing (2N2 up to 20N2) where N is the dimension of an N×N square block. Also, previous work at Loughborough used Linear Interpolation in the transform domain, which required much less processing, to conceal the error.
APA, Harvard, Vancouver, ISO, and other styles
8

Brauer, David A. "EMBEDDED VIDEO TRANSMISSION IN A CAIS DATA ACQUISITION SYSTEM." International Foundation for Telemetering, 2000. http://hdl.handle.net/10150/608287.

Full text
Abstract:
International Telemetering Conference Proceedings / October 23-26, 2000 / Town & Country Hotel and Conference Center, San Diego, California
Acquiring real-time video data, during flight testing, has become an integral component in aircraft design and performance evaluation. This unique data acquisition capability has been successfully integrated into the JSF (Joint Strike Fighter), CAIS compliant, FTIDAS (Flight Test Instrumentation Data Acquisition System) developed by L-3 Communications Telemetry-East.
APA, Harvard, Vancouver, ISO, and other styles
9

Walker, Thaddeus Owens. "Real-time compressed video transmission across the common data link." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA304462.

Full text
Abstract:
Thesis (M.S. in Electrical Engineering and Electrical Engineer) Naval Postgraduate School, June 1995.
Thesis advisor(s): Murali Tummala, S.B. Shukla. "June 1995." Includes bibliographical references. Also available online.
APA, Harvard, Vancouver, ISO, and other styles
10

Azari, Jian. "Transmission of mixed video, speech and data services over ATM networks." Thesis, University of Essex, 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.333498.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Methods of video data transmission"

1

Bizon, Thomas P. Real-time transmission of digital video using variable-lengthbcoding. [Washington, DC: National Aeronautics and Space Administration, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bizon, Thomas P. Real-time transmission of digital video using variable-lengthbcoding. [Washington, DC: National Aeronautics and Space Administration, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bizon, Thomas P. Real-time transmission of digital video using variable-lengthbcoding. [Washington, DC: National Aeronautics and Space Administration, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Statistical Methods in Video Processing Workshop (2002 Copenhagen, Denmark). Proceedings of the Statistical Methods in Video Processing Workshop. Clayton, Vic: Monash University - Dept. Electrical and Computer Systems Engineering, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

), National Institute of Standards and Technology (U S. Data communication systems and services user-oriented performance measurement methods. Gathersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

National Institute of Standards and Technology (U.S.). Data communication systems and services user-oriented performance measurement methods. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Data communication systems and services user-oriented performance measurement methods. Gathersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Packet video: Modeling and signal processing. Boston: Artech House, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wireless multimedia communications: Networking video, voice, and data. Reading, Mass: Addison-Wesley, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hayes, Jim. Data, voice, and video cabling. 3rd ed. Clifton Park, NY: Delmar/Cengage Learning, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Methods of video data transmission"

1

Hua, Liang, Jiayu Wang, and Xiao Hu. "Research on Real-Time Compression and Transmission Method of Motion Video Data Under Internet of Things." In Advances in Intelligent Systems and Computing, 17–24. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4572-0_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Salomon, David. "Video Compression." In A Guide to Data Compression Methods, 227–39. New York, NY: Springer New York, 2002. http://dx.doi.org/10.1007/978-0-387-21708-6_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Schubert, Falk, Thilo Fath, and Harald Haas. "Coloured Video Code for In-Flight Data Transmission." In Lecture Notes in Computer Science, 42–51. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39402-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhou, Run, Min Xiang, and Yu Liu. "A Video Transmission Control Strategy in Wireless Network." In Smart Communications, Intelligent Algorithms and Interactive Methods, 191–97. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-5164-9_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bommisetty, Reddy Mounika, P. Palanisamy, and Ashish Khare. "Content Based Video Retrieval—Methods, Techniques and Applications." In Studies in Big Data, 81–99. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-75657-4_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Immich, Roger, Eduardo Cerqueira, and Marilia Curado. "Cross-Layer FEC-Based Mechanism for Packet Loss Resilient Video Transmission." In Data Traffic Monitoring and Analysis, 320–36. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36784-7_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chaudhary, Akash Singh, Isha, and D. K. Chaturvedi. "Video-Transmission-Based Condition Monitoring of Solar Panels Using QR Code." In Advances in Data and Information Sciences, 317–27. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-0694-9_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sumanjali, Marusani, R. Sivaraman, A. Sridevi, Amirtharajan Rengarajan, Sundararaman Rajagopalan, and Har Narayan Upadhyay. "Diffusion + Confusion: Chaos-assisted Twofold Cryptosystem for Secure Video Transmission." In Emerging Technologies in Data Mining and Information Security, 145–53. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-9774-9_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, Hang, and Magda El Zarki. "Data Partitioning and Unbalanced Error Protection for H.263 Video Transmission over Wireless Channels." In Multimedia Communications and Video Coding, 451–58. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-1-4613-0403-6_55.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gupta, Nishi, Shikha Gupta, and Satbir Jain. "Efficient Data Transmission in WSN: Techniques and Future Challenges." In Towards Extensible and Adaptable Methods in Computing, 119–29. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-2348-5_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Methods of video data transmission"

1

Qian, L., D. L. Jones, K. Ramchandran, and S. Appadwedula. "A general joint source-channel matching method for wireless video transmission." In Proceedings DCC'99 Data Compression Conference (Cat. No. PR00096). IEEE, 1999. http://dx.doi.org/10.1109/dcc.1999.755691.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Roh, Jae-Sung, Ki-Sung Kang, and Sung-Joon Cho. "Mixed video/data transmission over indoor wireless channels using unequal error protection method." In Visual Communications and Image Processing 2000, edited by King N. Ngan, Thomas Sikora, and Ming-Ting Sun. SPIE, 2000. http://dx.doi.org/10.1117/12.386606.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nunome, Toshiro, and Takuya Ishida. "Video transmission and presentation methods for multi-view video and audio IP transmission." In 2014 8th International Conference on Signal Processing and Communication Systems (ICSPCS). IEEE, 2014. http://dx.doi.org/10.1109/icspcs.2014.7021064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kezan, Z., D. Percin, and B. Zovko-Cihlar. "Linearization methods in digital video signal transmission." In 47th International Symposium ELMAR, 2005. IEEE, 2005. http://dx.doi.org/10.1109/elmar.2005.193676.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lemos, Nikita, Kavita Sonawane, and Bidisha Roy. "Secure data transmission using video." In 2015 Eighth International Conference on Contemporary Computing (IC3). IEEE, 2015. http://dx.doi.org/10.1109/ic3.2015.7346684.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Balaji, R., and G. Naveen. "Secure data transmission using video Steganography." In 2011 IEEE International Conference on Electro/Information Technology (EIT 2011). IEEE, 2011. http://dx.doi.org/10.1109/eit.2011.5978601.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Suzuki, Toshiaki, Mariko Yamada, Takehiro Urano, Keiro Muro, and Toshiyuki Odaka. "Personalized MPEG2 Video-Data Transmission System." In 2008 3rd International Conference on internet and Web Applications and Services (ICIW). IEEE, 2008. http://dx.doi.org/10.1109/iciw.2008.35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sen, Subhabrata, Jayanta K. Dey, James F. Kurose, John A. Stankovic, and Don Towsley. "Streaming CBR transmission of VBR stored video." In Voice, Video, and Data Communications, edited by V. Michael Bove, Jr., Barbara Derryberry, Clifford R. Holliday, Louis S. Lome, Vishal Markandey, Andrew G. Tescher, and Bhaskaran Vasudev. SPIE, 1998. http://dx.doi.org/10.1117/12.300913.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jimenez-Rodriguez, Leandro, Francesc Auli-Llinas, Michael W. Marcellin, and Joan Serra-Sagrista. "Pre-encoded JPEG2000 Video Transmission in a Video-on-Demand Scenario." In 2011 Data Compression Conference (DCC). IEEE, 2011. http://dx.doi.org/10.1109/dcc.2011.64.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Nejati, Negar, Homayoun Yousefi'zadeh, and Hamid Jafarkhani. "Wireless Video Transmission: A Distortion-Optimal Approach." In 2008 Data Compression Conference DCC. IEEE, 2008. http://dx.doi.org/10.1109/dcc.2008.49.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Methods of video data transmission"

1

Sandeep, Bhushan, Huang Xin, and Xiao Zongwei. A comparison of regional anesthesia techniques in patients undergoing of video-assisted thoracic surgery: A network meta-analysis. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, February 2022. http://dx.doi.org/10.37766/inplasy2022.2.0003.

Full text
Abstract:
Review question / Objective: Although video-assisted thoracoscopic surgery is a minimally invasive surgical technique, the pain remains moderate to severe. We comprehensively compared the regional anesthesia methods for postoperative analgesia in patients undergoing video-assisted thoracoscopic surgery. Eligibility criteria: All published full-article RCTs comparing the analgesic efficacy of investigated regional anesthesia technique or comparative blocks in adult patients undergoing any VATS were eligible for inclusion. There were no language restrictions. Moreover, we also excluded case reports, non-RCT studies, incomplete clinical trials, and any trials used multiple nerve blocks. We also excluded any conference abstracts which could not offer enough information about the study design, or by data request to the author.
APA, Harvard, Vancouver, ISO, and other styles
2

Daudelin, Francois, Lina Taing, Lucy Chen, Claudia Abreu Lopes, Adeniyi Francis Fagbamigbe, and Hamid Mehmood. Mapping WASH-related disease risk: A review of risk concepts and methods. United Nations University Institute for Water, Environment and Health, December 2021. http://dx.doi.org/10.53328/uxuo4751.

Full text
Abstract:
The report provides a review of how risk is conceived of, modelled, and mapped in studies of infectious water, sanitation, and hygiene (WASH) related diseases. It focuses on spatial epidemiology of cholera, malaria and dengue to offer recommendations for the field of WASH-related disease risk mapping. The report notes a lack of consensus on the definition of disease risk in the literature, which limits the interpretability of the resulting analyses and could affect the quality of the design and direction of public health interventions. In addition, existing risk frameworks that consider disease incidence separately from community vulnerability have conceptual overlap in their components and conflate the probability and severity of disease risk into a single component. The report identifies four methods used to develop risk maps, i) observational, ii) index-based, iii) associative modelling and iv) mechanistic modelling. Observational methods are limited by a lack of historical data sets and their assumption that historical outcomes are representative of current and future risks. The more general index-based methods offer a highly flexible approach based on observed and modelled risks and can be used for partially qualitative or difficult-to-measure indicators, such as socioeconomic vulnerability. For multidimensional risk measures, indices representing different dimensions can be aggregated to form a composite index or be considered jointly without aggregation. The latter approach can distinguish between different types of disease risk such as outbreaks of high frequency/low intensity and low frequency/high intensity. Associative models, including machine learning and artificial intelligence (AI), are commonly used to measure current risk, future risk (short-term for early warning systems) or risk in areas with low data availability, but concerns about bias, privacy, trust, and accountability in algorithms can limit their application. In addition, they typically do not account for gender and demographic variables that allow risk analyses for different vulnerable groups. As an alternative, mechanistic models can be used for similar purposes as well as to create spatial measures of disease transmission efficiency or to model risk outcomes from hypothetical scenarios. Mechanistic models, however, are limited by their inability to capture locally specific transmission dynamics. The report recommends that future WASH-related disease risk mapping research: - Conceptualise risk as a function of the probability and severity of a disease risk event. Probability and severity can be disaggregated into sub-components. For outbreak-prone diseases, probability can be represented by a likelihood component while severity can be disaggregated into transmission and sensitivity sub-components, where sensitivity represents factors affecting health and socioeconomic outcomes of infection. -Employ jointly considered unaggregated indices to map multidimensional risk. Individual indices representing multiple dimensions of risk should be developed using a range of methods to take advantage of their relative strengths. -Develop and apply collaborative approaches with public health officials, development organizations and relevant stakeholders to identify appropriate interventions and priority levels for different types of risk, while ensuring the needs and values of users are met in an ethical and socially responsible manner. -Enhance identification of vulnerable populations by further disaggregating risk estimates and accounting for demographic and behavioural variables and using novel data sources such as big data and citizen science. This review is the first to focus solely on WASH-related disease risk mapping and modelling. The recommendations can be used as a guide for developing spatial epidemiology models in tandem with public health officials and to help detect and develop tailored responses to WASH-related disease outbreaks that meet the needs of vulnerable populations. The report’s main target audience is modellers, public health authorities and partners responsible for co-designing and implementing multi-sectoral health interventions, with a particular emphasis on facilitating the integration of health and WASH services delivery contributing to Sustainable Development Goals (SDG) 3 (good health and well-being) and 6 (clean water and sanitation).
APA, Harvard, Vancouver, ISO, and other styles
3

Bates, C. Richards, Melanie Chocholek, Clive Fox, John Howe, and Neil Jones. Scottish Inshore Fisheries Integrated Data System (SIFIDS): Work package (3) final report development of a novel, automated mechanism for the collection of scallop stock data. Edited by Mark James and Hannah Ladd-Jones. Marine Alliance for Science and Technology for Scotland (MASTS), 2019. http://dx.doi.org/10.15664/10023.23449.

Full text
Abstract:
[Extract from Executive Summary] This project, aimed at the development of a novel, automated mechanism for the collection of scallop stock data was a sub-part of the Scottish Inshore Fisheries Integrated Data Systems (SIFIDS) project. The project reviewed the state-of-the-art remote sensing (geophysical and camera-based) technologies available from industry and compared these to inexpensive, off-the -shelf equipment. Sea trials were conducted on scallop dredge sites and also hand-dived scallop sites. Data was analysed manually, and tests conducted with automated processing methods. It was concluded that geophysical acoustic technologies cannot presently detect individual scallop but the remote sensing technologies can be used for broad scale habitat mapping of scallop harvest areas. Further, the techniques allow for monitoring these areas in terms of scallop dredging impact. Camera (video and still) imagery is effective for scallop count and provide data that compares favourably with diver-based ground truth information for recording scallop density. Deployment of cameras is possible through inexpensive drop-down camera frames which it is recommended be deployed on a wide area basis for further trials. In addition, implementation of a ‘citizen science’ approach to wide area recording is suggested to increase the stock assessment across the widest possible variety of seafloor types around Scotland. Armed with such data a full, statistical analysis could be completed and data used with automated processing routines for future long-term monitoring of stock.
APA, Harvard, Vancouver, ISO, and other styles
4

Kiianovska, N. M. The development of theory and methods of using cloud-based information and communication technologies in teaching mathematics of engineering students in the United States. Видавничий центр ДВНЗ «Криворізький національний університет», December 2014. http://dx.doi.org/10.31812/0564/1094.

Full text
Abstract:
The purpose of the study is the analysis of the development of the theory and methods of ICT usage while teaching higher mathematics engineering students in the United States. It was determined following tasks: to analyze the problem source, to identify the state of its elaboration, to identify key trends in the development of theory and methods of ICT usage while teaching higher mathematics engineering students in the United States, the object of study – the use of ICT in teaching engineering students, the research methods are: analysis of scientific, educational, technical, historical sources; systematization and classification of scientific statements on the study; specification, comparison, analysis and synthesis, historical and pedagogical analysis of the sources to establish the chronological limits and implementation of ICT usage in educational practice of U.S. technical colleges. In article was reviewed a modern ICT tools used in learning of fundamental subjects for future engineers in the United States, shown the evolution and convergence of ICT learning tools. Discussed experience of the «best practices» using online ICT in higher engineering education at United States. Some of these are static, while others are interactive or dynamic, giving mathematics learners opportunities to develop visualization skills, explore mathematical concepts, and obtain solutions to self-selected problems. Among ICT tools are the following: tools to transmit audio and video data, tools to collaborate on projects, tools to support object-oriented practice. The analysis leads to the following conclusion: using cloud-based tools of learning mathematic has become the leading trend today. Therefore, university professors are widely considered to implement tools to assist the process of learning mathematics such properties as mobility, continuity and adaptability.
APA, Harvard, Vancouver, ISO, and other styles
5

Ghanim, Murad, Joe Cicero, Judith K. Brown, and Henryk Czosnek. Dissection of Whitefly-geminivirus Interactions at the Transcriptomic, Proteomic and Cellular Levels. United States Department of Agriculture, February 2010. http://dx.doi.org/10.32747/2010.7592654.bard.

Full text
Abstract:
Our project focuses on gene expression and proteomics of the whitefly Bemisia tabaci (Gennadius) species complex in relation to the internal anatomy and localization of expressed genes and virions in the whitefly vector, which poses a major constraint to vegetable and fiber production in Israel and the USA. While many biological parameters are known for begomovirus transmission, nothing is known about vector proteins involved in the specific interactions between begomoviruses and their whitefly vectors. Identifying such proteins is expected to lead to the design of novel control methods that interfere with whitefly-mediated begomovirus transmission. The project objectives were to: 1) Perform gene expression analyses using microarrays to study the response of whiteflies (B, Q and A biotypes) to the acquisition of begomoviruses (Tomato yellow leaf curl (TYLCV) and Squash leaf curl (SLCV). 2) Construct a whitefly proteome from whole whiteflies and dissected organs after begomovirus acquisition. 3) Validate gene expression by q-RTPCR and sub-cellular localization of candidate ESTs identified in microarray and proteomic analyses. 4) Verify functionality of candidate ESTs using an RNAi approach, and to link these datasets to overall functional whitefly anatomical studies. During the first and second years biological experiments with TYLCV and SLCV acquisition and transmission were completed to verify the suitable parameters for sample collection for microarray experiments. The parameters were generally found to be similar to previously published results by our groups and others. Samples from whole whiteflies and midguts of the B, A and Q biotypes that acquired TYLCV and SLCV were collected in both the US and Israel and hybridized to B. tabaci microarray. The data we analyzed, candidate genes that respond to both viruses in the three tested biotypes were identified and their expression that included quantitative real-time PCR and co-localization was verified for HSP70 by the Israeli group. In addition, experiments were undertaken to employ in situ hybridization to localize several candidate genes (in progress) using an oligonucleotide probe to the primary endosymbiont as a positive control. A proteome and corresponding transcriptome to enable more effective protein identification of adult whiteflies was constructed by the US group. Further validation of the transmission route of begomoviruses, mainly SLCV and the involvement of the digestive and salivary systems was investigated (Cicero and Brown). Due to time and budget constraints the RNAi-mediated silencing objective to verify gene function was not accomplished as anticipated. HSP70, a strong candidate protein that showed over-expression after TYLCV and SLCV acquisition and retention by B. tabaci, and co-localization with TYLCV in the midgut, was further studies. Besides this protein, our joint research resulted in the identification of many intriguing candidate genes and proteins that will be followed up by additional experiments during our future research. To identify these proteins it was necessary to increase the number and breadth of whitefly ESTs substantially and so whitefly cDNAs from various libraries made during the project were sequenced (Sanger, 454). As a result, the proteome annotation (ID) was far more successful than in the initial attempt to identify proteins using Uniprot or translated insect ESTs from public databases. The extent of homology shared by insects in different orders was surprisingly low, underscoring the imperative need for genome and transcriptome sequencing of homopteran insects. Having increased the number of EST from the original usable 5500 generated several years ago to >600,000 (this project+NCBI data mining), we have identified about one fifth of the whitefly proteome using these new resources. Also we have created a database that links all identified whitefly proteins to the PAVEdb-ESTs in the database, resulting in a useful dataset to which additional ESTS will be added. We are optimistic about the prospect of linking the proteome ID results to the transcriptome database to enable our own and other labs the opportunity to functionally annotate not only genes and proteins involved in our area of interest (whitefly mediated transmission) but for the plethora of other functionalities that will emerge from mining and functionally annotating other key genes and gene families in whitefly metabolism, development, among others. This joint grant has resulted in the identification of numerous candidate proteins involved in begomovirus transmission by B. tabaci. A next major step will be to capitalize on validated genes/proteins to develop approaches to interfere with the virus transmission.
APA, Harvard, Vancouver, ISO, and other styles
6

Hart, Carl R., D. Keith Wilson, Chris L. Pettit, and Edward T. Nykaza. Machine-Learning of Long-Range Sound Propagation Through Simulated Atmospheric Turbulence. U.S. Army Engineer Research and Development Center, July 2021. http://dx.doi.org/10.21079/11681/41182.

Full text
Abstract:
Conventional numerical methods can capture the inherent variability of long-range outdoor sound propagation. However, computational memory and time requirements are high. In contrast, machine-learning models provide very fast predictions. This comes by learning from experimental observations or surrogate data. Yet, it is unknown what type of surrogate data is most suitable for machine-learning. This study used a Crank-Nicholson parabolic equation (CNPE) for generating the surrogate data. The CNPE input data were sampled by the Latin hypercube technique. Two separate datasets comprised 5000 samples of model input. The first dataset consisted of transmission loss (TL) fields for single realizations of turbulence. The second dataset consisted of average TL fields for 64 realizations of turbulence. Three machine-learning algorithms were applied to each dataset, namely, ensemble decision trees, neural networks, and cluster-weighted models. Observational data come from a long-range (out to 8 km) sound propagation experiment. In comparison to the experimental observations, regression predictions have 5–7 dB in median absolute error. Surrogate data quality depends on an accurate characterization of refractive and scattering conditions. Predictions obtained through a single realization of turbulence agree better with the experimental observations.
APA, Harvard, Vancouver, ISO, and other styles
7

Anderson, Gerald L., and Kalman Peleg. Precision Cropping by Remotely Sensed Prorotype Plots and Calibration in the Complex Domain. United States Department of Agriculture, December 2002. http://dx.doi.org/10.32747/2002.7585193.bard.

Full text
Abstract:
This research report describes a methodology whereby multi-spectral and hyperspectral imagery from remote sensing, is used for deriving predicted field maps of selected plant growth attributes which are required for precision cropping. A major task in precision cropping is to establish areas of the field that differ from the rest of the field and share a common characteristic. Yield distribution f maps can be prepared by yield monitors, which are available for some harvester types. Other field attributes of interest in precision cropping, e.g. soil properties, leaf Nitrate, biomass etc. are obtained by manual sampling of the filed in a grid pattern. Maps of various field attributes are then prepared from these samples by the "Inverse Distance" interpolation method or by Kriging. An improved interpolation method was developed which is based on minimizing the overall curvature of the resulting map. Such maps are the ground truth reference, used for training the algorithm that generates the predicted field maps from remote sensing imagery. Both the reference and the predicted maps are stratified into "Prototype Plots", e.g. 15xl5 blocks of 2m pixels whereby the block size is 30x30m. This averaging reduces the datasets to manageable size and significantly improves the typically poor repeatability of remote sensing imaging systems. In the first two years of the project we used the Normalized Difference Vegetation Index (NDVI), for generating predicted yield maps of sugar beets and com. The NDVI was computed from image cubes of three spectral bands, generated by an optically filtered three camera video imaging system. A two dimensional FFT based regression model Y=f(X), was used wherein Y was the reference map and X=NDVI was the predictor. The FFT regression method applies the "Wavelet Based", "Pixel Block" and "Image Rotation" transforms to the reference and remote images, prior to the Fast - Fourier Transform (FFT) Regression method with the "Phase Lock" option. A complex domain based map Yfft is derived by least squares minimization between the amplitude matrices of X and Y, via the 2D FFT. For one time predictions, the phase matrix of Y is combined with the amplitude matrix ofYfft, whereby an improved predicted map Yplock is formed. Usually, the residuals of Y plock versus Y are about half of the values of Yfft versus Y. For long term predictions, the phase matrix of a "field mask" is combined with the amplitude matrices of the reference image Y and the predicted image Yfft. The field mask is a binary image of a pre-selected region of interest in X and Y. The resultant maps Ypref and Ypred aremodified versions of Y and Yfft respectively. The residuals of Ypred versus Ypref are even lower than the residuals of Yplock versus Y. The maps, Ypref and Ypred represent a close consensus of two independent imaging methods which "view" the same target. In the last two years of the project our remote sensing capability was expanded by addition of a CASI II airborne hyperspectral imaging system and an ASD hyperspectral radiometer. Unfortunately, the cross-noice and poor repeatability problem we had in multi-spectral imaging was exasperated in hyperspectral imaging. We have been able to overcome this problem by over-flying each field twice in rapid succession and developing the Repeatability Index (RI). The RI quantifies the repeatability of each spectral band in the hyperspectral image cube. Thereby, it is possible to select the bands of higher repeatability for inclusion in the prediction model while bands of low repeatability are excluded. Further segregation of high and low repeatability bands takes place in the prediction model algorithm, which is based on a combination of a "Genetic Algorithm" and Partial Least Squares", (PLS-GA). In summary, modus operandi was developed, for deriving important plant growth attribute maps (yield, leaf nitrate, biomass and sugar percent in beets), from remote sensing imagery, with sufficient accuracy for precision cropping applications. This achievement is remarkable, given the inherently high cross-noice between the reference and remote imagery as well as the highly non-repeatable nature of remote sensing systems. The above methodologies may be readily adopted by commercial companies, which specialize in proving remotely sensed data to farmers.
APA, Harvard, Vancouver, ISO, and other styles
8

Instrumentation, methods of flood-data collection and transmission, and evaluation of streamflow-gaging network in Indiana. US Geological Survey, 1994. http://dx.doi.org/10.3133/wri914051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography