2,427 research outputs found
Recommended from our members
Error resilient video transcoding for robust inter-network communications using GPRS
A novel fully comprehensive mobile video communications
system is proposed in this paper. This system exploits
the useful rate management features of the video transcoders and
combines them with error resilience for transmissions of coded
video streams over general packet radio service (GPRS) mobileaccess
networks. The error-resilient video transcoding operation
takes place at a centralized point, referred to as a video proxy,
which provides the necessary output transmission rates with the
required amount of robustness. With the use of this proposed
algorithm, error resilience can be added to an already compressed
video stream at an intermediate stage at the edge of two or more
different networks through two resilience schemes, namely the
adaptive intra refresh (AIR) and feedback control signaling (FCS)
methods. Both resilience tools impose an output rate increase
which can also be prevented with the proposed novel technique in
this paper. Thus, an error-resilient video transcoding scheme is
presented to give robust video outputs at near target transmission
rates that only require the same number of GPRS timeslots as
the nonresilient schemes. Moreover, an ultimate robustness is
also accomplished with the combination of the two resilience
algorithms at the video proxy. Extensive computer simulations
demonstrate the effectiveness of the proposed system
Recommended from our members
Effective video multicast over wireless internet
With the rapid growth of wireless networks and great success of Internet video, wireless video services are expected to be widely deployed in the near future. As different types of wireless networks are converging into all IP networks, i.e., the Internet, it is important to study video delivery over the wireless Internet. This paper proposes a novel end-system based adaptation protocol calledWireless Hybrid Adaptation Layered Multicast (WHALM) protocol for layered video multicast over wireless Internet. In WHALM the sender dynamically collects bandwidth distribution from the receivers and uses an optimal layer rate allocation mechanism to reduce the mismatches between the coarse-grained layer subscription levels and the heterogeneous and dynamic rate requirements from the receivers, thus maximizing the degree of satisfaction of all the receivers in a multicast session. Based on sampling theory and theory of probability, we reduce the required number of bandwidth feedbacks to a reasonable degree and use a scalable feedback mechanism to control the feedback process practically. WHALM is also tuned to perform well in wireless networks by integrating an end-to-end loss differentiation algorithm (LDA) to differentiate error losses from congestion losses at the receiver side. With a series of simulation experiments over NS platform, WHALM has been proved to be able to greatly improve the degree of satisfaction of all the receivers while avoiding congestion collapse on the wireless Internet
A support vector machine approach for detection and localization of transmission errors within standard H.263++ decoders
Wireless multimedia services are increasingly becoming popular boosting the need for better quality-of-experience (QoE) with minimal costs. The standard codecs employed by these systems remove spatio-temporal redundancies to minimize the bandwidth required. However, this increases the exposure of the system to transmission errors, thus presenting a significant degradation in perceptual quality of the reconstructed video sequences. A number of mechanisms were investigated in the past to make these codecs more robust against transmission errors. Nevertheless, these techniques achieved little success, forcing the transmission to be held at lower bit-error rates (BERs) to guarantee acceptable quality. This paper presents a novel solution to this problem based on the error detection capabilities of the transport protocols to identify potentially corrupted group-of-blocks (GOBs). The algorithm uses a support vector machine (SVM) at its core to localize visually impaired macroblocks (MBs) that require concealment within these GOBs. Hence, this method drastically reduces the region to be concealed compared to state-of-the-art error resilient strategies which assume a packet loss scenario. Testing on a standard H.263++ codec confirms that a significant gain in quality is achieved with error detection rates of 97.8% and peak signal-to-noise ratio (PSNR) gains of up to 5.33 dB. Moreover, most of the undetected errors provide minimal visual artifacts and are thus of little influence to the perceived quality of the reconstructed sequences.peer-reviewe
A Survey of multimedia streaming in wireless sensor networks: progress, issues and design challenges
Advancements in Complementary Metal Oxide Semiconductor (CMOS) technology
have enabled Wireless Sensor Networks (WSN) to gather, process and transport
multimedia (MM) data as well and not just limited to handling ordinary scalar
data anymore. This new generation of WSN type is called Wireless Multimedia
Sensor Networks (WMSNs). Better and yet relatively cheaper sensors that are
able to sense both scalar data and multimedia data with more advanced
functionalities such as being able to handle rather intense computations easily
have sprung up. In this paper, the applications, architectures, challenges and
issues faced in the design of WMSNs are explored. Security and privacy issues,
over all requirements, proposed and implemented solutions so far, some of the
successful achievements and other related works in the field are also
highlighted. Open research areas are pointed out and a few solution suggestions
to the still persistent problems are made, which, to the best of my knowledge,
so far have not been explored yet
Wireless industrial monitoring and control networks: the journey so far and the road ahead
While traditional wired communication technologies have played a crucial role in industrial monitoring and control networks over the past few decades, they are increasingly proving to be inadequate to meet the highly dynamic and stringent demands of today’s industrial applications, primarily due to the very rigid nature of wired infrastructures. Wireless technology, however, through its increased pervasiveness, has the potential to revolutionize the industry, not only by mitigating the problems faced by wired solutions, but also by introducing a completely new class of applications. While present day wireless technologies made some preliminary inroads in the monitoring domain, they still have severe limitations especially when real-time, reliable distributed control operations are concerned. This article provides the reader with an overview of existing wireless technologies commonly used in the monitoring and control industry. It highlights the pros and cons of each technology and assesses the degree to which each technology is able to meet the stringent demands of industrial monitoring and control networks. Additionally, it summarizes mechanisms proposed by academia, especially serving critical applications by addressing the real-time and reliability requirements of industrial process automation. The article also describes certain key research problems from the physical layer communication for sensor networks and the wireless networking perspective that have yet to be addressed to allow the successful use of wireless technologies in industrial monitoring and control networks
A Review of Error Resilience Techniques in Video Streaming
Abstract-Delivering video data of satisfactory quality over unreliable networks -such as the internet or wireless networks -is a demanding area which has received significant attention of the research community over the past few years. Given the fact that packet loss is inevitable and therefore the presence of errors granted, the effort is directed towards limiting the effect of these errors. A number of techniques have been developed to address this issue. This paper aims to summarize the most significant approaches for: error resilience, error concealment and joint encoder-decoder error control techniques, and to provide a thorough discussion of the benefits and drawbacks of these error control methods. Furthermore, two case studies of error resilience utilization are presented, namely Ad-hoc networks and Multimedia Broadcast Multiple Services (MBMS)
Resilient Digital Video Transmission over Wireless Channels using Pixel-Level Artefact Detection Mechanisms
Recent advances in communications and video coding technology have brought multimedia communications into everyday life, where a variety of services and applications are being integrated within different devices such that multimedia content is provided everywhere and on any device. H.264/AVC provides a major advance on preceding video coding standards obtaining as much as twice the coding efficiency over these standards (Richardson I.E.G., 2003, Wiegand T. & Sullivan G.J., 2007). Furthermore, this new codec inserts video related information within network abstraction layer units (NALUs), which facilitates the transmission of H.264/AVC coded sequences over a variety of network environments (Stockhammer, T. & Hannuksela M.M., 2005) making it applicable for a broad range of applications such as TV broadcasting, mobile TV, video-on-demand, digital media storage, high definition TV, multimedia streaming and conversational applications. Real-time wireless conversational and broadcast applications are particularly challenging as, in general, reliable delivery cannot be guaranteed (Stockhammer, T. & Hannuksela M.M., 2005). The H.264/AVC standard specifies several error resilient strategies to minimise the effect of transmission errors on the perceptual quality of the reconstructed video sequences. However, these methods assume a packet-loss scenario where the receiver discards and conceals all the video information contained within a corrupted NALU packet. This implies that the error resilient methods adopted by the standard operate at a lower bound since not all the information contained within a corrupted NALU packet is un-utilizable (Stockhammer, T. et al., 2003).peer-reviewe
- …