2,034 research outputs found
FORTRAN programs for calculating lower ionosphere electron densities and collision frequencies from rocket data
FORTRAN programs for calculating lower ionosphere electron densities and collision frequencie
Facebook (A)Live? Are Live Social Broadcasts Really Broadcasts?
The era of live-broadcast is back but with two major changes. First, unlike
traditional TV broadcasts, content is now streamed over the Internet enabling
it to reach a wider audience. Second, due to various user-generated content
platforms it has become possible for anyone to get involved, streaming their
own content to the world. This emerging trend of going live usually happens via
social platforms, where users perform live social broadcasts predominantly from
their mobile devices, allowing their friends (and the general public) to engage
with the stream in real-time. With the growing popularity of such platforms,
the burden on the current Internet infrastructure is therefore expected to
multiply. With this in mind, we explore one such prominent platform - Facebook
Live. We gather 3TB of data, representing one month of global activity and
explore the characteristics of live social broadcast. From this, we derive
simple yet effective principles which can decrease the network burden. We then
dissect global and hyper-local properties of the video while on-air, by
capturing the geography of the broadcasters or the users who produce the video
and the viewers or the users who interact with it. Finally, we study the social
engagement while the video is live and distinguish the key aspects when the
same video goes on-demand. A common theme throughout the paper is that, despite
its name, many attributes of Facebook Live deviate from both the concepts of
live and broadcast.Comment: Published at The Web Conference 2018 (WWW 2018). Please cite the WWW
versio
HDL Design 2e10-1 Peta Bits Per Second (P.b.p.s) P.R.B.S I.P Core Generator for Ultra High Speed Wireless Communication Products
The Design is mainly Intended for High Speed Random Frequency Carrier Wave Generator of 1 P.b.p.s Baud Data Rate using 2e10-1 Tapped P.R.B.S Pattern Sequence. The P.R.B.S is Designed by using L.F.S.R Linear Feed Back Shift Register & XOR Gate with Specific Tapping Points as per C.C.I.T.T I.T.U Standards. R.T.L Design Architecture Implemented by using V.H.D.L &/ Verilog H.D.L, Programming & Debugging Done by using Spartan III F.P.G.A Kit. Transmission done through this carrier frequency. Propagation Carrier Done either Serially / Parallel lines I/O.
DOI: 10.17762/ijritcc2321-8169.15083
Where is in a Name? A Survey of Mobility in Information-Centric Networks
Host mobility has been a long standing challenge in the current Internet architecture. Huge proportions of traffic are now attributed to mobile devices [1]; however, despite this promi-nence, mobility often remains a badly handled concept. Some have recently argued that the main reason for this lies in its choice of what to name [2]. The Internet Protocol (IP
A Hybrid Cryptographic System for Secured Device to Device Communication
It is general fact that even after enormous expansion of wireless communication there are still dead regions that hampers the effective communication. With exponential rise in the smart phones, a new layer of communication has evolved that could address the concerns of dead regions and capacity barriers. D2D is the evolving communication technology which focuses on short distance hops between the public devices to reach the destination. The major drawback of this technology is that most of the devices are public hence trustworthiness of the entire channel needs to be addressed in order to make it a viable solution. In this paper, we introduce a novel hybrid cryptographic approach that could address multiple eavesdroppers’ scenario. This approach incorporates both Huffman coding and Binary coding to enhance the crypto benefits for the information transmitted over D2D channel that consists of several public devices. The dual-crypto nature of the proposed algorithm offers higher efficiency, better security and improved key transmission. Thus, the proposed hybrid cryptographic approach is robust in nature while easy and simple to operate. In addition, the proposed approach could recover the original information without any distortion from the encrypted data making the approach lossless in nature. Further simulation results prove that the proposed offers confidentiality to the transmitted to data while addressing the network capacity crunch
- …