Modern video streaming services require quality assurance of the presented audiovisual material. Quality assurance mechanisms allow streaming platforms to provide quality levels that are considered sufficient to yield user satisfaction, with the least possible amount of data transferred. A variety of measures and approaches have been developed to control video quality, e.g., by adapting it to network conditions. These include objective matrices of the quality and thresholds identified by means of subjective perceptual judgments. The former group of matrices has recently gained the attention of (multi) media researchers. They call this area of study “Quality of Experience” (QoE). In this paper, we present a theoretical model based on review of previous QoE’s models. We argue that most of them represent the bottom-up approach to modeling. Such models focus on describing as many variables as possible, but with a limited ability to investigate the causal relationship between them; therefore, the applicability of the findings in practice is limited. To advance the field, we therefore propose a structural, top-down model of video QoE that describes causal relationships among variables. This novel top-down model serves as a practical guide for structuring QoE experiments, ensuring the incorporation of influential factors in a confirmatory manner.
Abstract This paper aims to provide objective quality metrics assessment for cloud gaming using machine learning algorithms. Three classification algorithms (i.e., Random Forest, Random Three and J-48) have been used for the development of models for objective quality assessment of two metrics: blurriness and blockiness. The results indicate that Random Forest has the best performance in this experimental case of objective quality metrics assessment for cloud gaming. Future research activities will cover comparison of a broad range of objective quality metrics and machine learning algorithms while using larger dataset to enhance the results significance.
Quality of experience (QoE) is a multidimensional concept that has been in the focus of the research community for quite some time, especially after the rapid development of information and communication technology (ICT). It has been examined in many contexts (web, telecommunications, economy, medicine, etc.), for different media types (text, audio, video, augmented/virtual reality, etc.) and systems in various domains. Given that logistics and transport is a potent ICT-based domain for research activity in the future, in order to ease and improve the investigation of QoE in the contexts of logistics and transport, we aim to sum the recommendations and lessons learned for the investigation of QoE on the basis of our existing research. These suggestions cover how to treat the concept of QoE and relate it to other fields, techniques and environments to examine and treat QoE, as well as future technologies that need to be included. We provide insight into how these challenges can affect examination of QoE in logistics and transport and discuss ways to overcome them.
Digital transformation is unstoppable and ongoing process that affects all segments of our everyday lives such as healthcare, banking and finance systems, public administration, or postal and logistics systems. One of the main engines of this process, among many, is the use of cryptocurrencies. Both of these concepts are usually addressed from the firm perspective, but they should be considered from the individual’s perspective as well. Cryptocurrencies recently face increased cyber security threats, thereby affecting the digital transformation and posing additional challenges to it. Therefore, this paper gives a brief overview of security threats and challenges characteristic for cryptocurrency technology today and discusses what can be expected tomorrow. We provide insight how these challenges can affect digital transformation process and propose ways to increase the level of protection for both individuals and organizations.
The fifth generation of mobile telecommunications (5G) is one of the most important novelties of our times due to its influence on the economy and society. The advent of 5G networks and services expands the security threats landscape and requires the implementation of adequate countermeasures. This paper presents a brief overview of 5G security threats and countermeasures from operators’ perspective. The aim is to contribute to the 5G cybersecurity knowledge collection and dissemination by summarizing the key findings and identifying next steps.
ABSTRACT Background Deployment of modern assistive technologies is one of the major trends. The main objective is the provisioning of the effectiveness and cost-estimation model for deploying assistive technology solutions in elderly care intended for evaluation and showing specificity to the costs and associated benefits of providing smart technological solutions for seniors. Methods The model uses demographic projections taken from Eurostat for EU countries and the disability incidence from the annual report of the Ministry of Labour and Social Affairs of the Czech Republic as an input. The model was implemented in the software Stella Professional dedicated to system dynamics modelling. Results In relation to the combination of five assistive devices for the elderly the optimal solution the cost savings are 37.8% or182 billion CZK, cumulatively in the simulated time period 2021–2060. The model allows adjustments regarding price levels of various countries through the caregivers’ wage. Obtained results showed robustness of the model to this uncertainty as percentage savings varied only from 37.6% to 39.8%, a mere 2.2% difference. Conclusion With respect to the ongoing demographic transition, the need to employ smart device solutions should further increase and their price could decline. The highest savings will come from countries with higher wages for carers.
Abstract In the process of designing a system, it is necessary to identify potential threats to that system and to include appropriate countermeasures. The process that helps in finding problems in the initial phase of the system design is the threat modeling. Creating a threat model consists of several steps and there are many tools that can help in automating the procedure. This article deals with the threat analysis for an Ambient Assisted Living (AAL) system based on Wireless Sensor Network (WSN), whose main function is to provide information for carers in order to provide the best possible help to the elderly and disabled. We have identified and analysed 99 potential threats to the considered system, where Denial of Service (DoS) resulted in being the most represented class of threats. After conducting the threat assessment, the obtained results showed that the majority of threats are high-risk and justified the use of threat modeling in the design phase, since they can be utilized in further system development stages.
Nema pronađenih rezultata, molimo da izmjenite uslove pretrage i pokušate ponovo!
Ova stranica koristi kolačiće da bi vam pružila najbolje iskustvo
Saznaj više