Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
This book presents extensive research on the quality of 360° video perceived by users with HMDs. The book aims to develop a set of standard guidelines for the systematic visual quality assessment of 360° videos. Firstly, conventional subjective test methods such as Absolute Category Rating (ACR) and Double Stimulus Impairment Scale (DSIS) are applied to evaluate video quality, alongside the Modified ACR (M-ACR) method newly proposed. Building on the reliability and general applicability of the procedure across different tests, a methodological framework for 360° video quality assessment is then presented. The author also analyzes simulator sickness to investigate the impact of different influencing factors. The insights gained on simulator sickness related to 360° video contribute to a better understanding of this particular use case of VR and can help to improve comfort among users by suggesting improvements in the technical specifications of 360° video and HMD technology and thusimproving QoE.
This book studies the security of Physical Unclonable Functions (PUFs) based on the Arbiter PUF design, with a focus on so-called modeling attacks. The author shows the insecurity of several designs and proposes a novel construction that is proven to be immune against attacks known in scientific literature. The book explores designs of variants and compositions of the Arbiter PUF, which was introduced as a CMOS-compatible, electrical PUF design, and has received a lot of research attention, albeit being insecure with respect to modeling attacks. After revisiting modeling attacks on the Arbiter PUF and XOR Arbiter PUF, the author demonstrates attacks against the Lightweight Secure XOR Arbiter PUF, Feed-Forward Arbiter PUF, and the Interpose PUF. He then introduces two novel PUF designs, the Beli PUF and the LP-PUF, and analyzes their security against modeling attacks. The book concludes by showing how the LP-PUF is resilient against currently known modeling attacks.
This book provides an overview of concepts and challenges in intis investigated using structural equation modeling. The conveyed understanding of gaming QoE, empirical eraction quality in the domain of cloud gaming services. The author presents a unified evaluation approach by combining quantitative subjective assessment methods in a concise way. The author discusses a measurement tool, Gaming Input Quality Scale (GIPS), that assesses the interaction quality of such a service available. Furthermore, the author discusses a new framework to assess gaming Quality of Experience (QoE) using a crowdsourcing approach. Lastly, based on a large dataset including dominant network and encoding conditions, the evaluation method is investigated using structural equation modeling. The conveyed understanding of gaming QoE, empirical findings, and models presented in this book should be of particular interest to researchers working in the fields of quality and usability engineering, as well as service providers and network operators.
This book presents the development of a gaming quality model to predict the gaming Quality of Experience (QoE) of players that could be used for planning the network service or quality monitoring of cloud gaming services. The author presents a model that is developed following a modular structure approach that keeps the different types of impairments separately. The book shows how such a modular structure allows developing a sustainable model as each component can be updated by advances in that specific research area or technology. The presented gaming quality model takes into account two modules of video quality and input quality. The latter considers the interactivity aspects of gaming. The video quality module offers a series of models that differ depending on the level of access to the video stream information, allowing high flexibility for service providers regarding the positions of measuring points within their system. In summary, the present book focuses on (1) creation of multiple image/video and cloud gaming quality datasets, (2) development of a gaming video classification, and (3) development of a series of gaming QoE models to predict the gaming QoE depending on the level of access to the video stream information.
This book provides a new multi-method, process-oriented approach towards speech quality assessment, which allows readers to examine the influence of speech transmission quality on a variety of perceptual and cognitive processes in human listeners.
This book provides an in-depth investigation on the psychological phenomenon "reactance" in the context of Human-Computer Interaction (HCI). Topics include relevance of reactance on HCI, triggers for reactance, consequences of reactance, measurement of reactance, and countermeasures to reactance.
This work aims at understanding behavior around location information, including why users share such information, why they protect the data, and what kind of other factors influence the decision to behave in a certain way.
This book discusses the fusion of mobile and WiFi network data with semantic technologies and diverse context sources for offering semantically enriched context-aware services in the telecommunications domain.It presents the OpenMobileNetwork as a platform for providing estimated and semantically enriched mobile and WiFi network topology data using the principles of Linked Data. This platform is based on the OpenMobileNetwork Ontology consisting of a set of network context ontology facets that describe mobile network cells as well as WiFi access points from a topological perspective and geographically relate their coverage areas to other context sources.The book also introduces Linked Crowdsourced Data and its corresponding Context Data Cloud Ontology, which is a crowdsourced dataset combining static location data with dynamic context information. Linked Crowdsourced Data supports the OpenMobileNetwork by providing the necessary context data richness for more sophisticated semantically enriched context-aware services.Various application scenarios and proof of concept services as well as two separate evaluations are part of the book. As the usability of the provided services closely depends on the quality of the approximated network topologies, it compares the estimated positions for mobile network cells within the OpenMobileNetwork to a small set of real-world cell positions. The results prove that context-aware services based on the OpenMobileNetwork rely on a solid and accurate network topology dataset. The book also evaluates the performance of the exemplary Semantic Tracking as well as Semantic Geocoding services, verifying the applicability and added value of semantically enriched mobile and WiFi network data.
This book investigates the susceptibility of intrinsic physically unclonable function (PUF) implementations on reconfigurable hardware to optical semi-invasive attacks from the chip backside. It explores different classes of optical attacks, particularly photonic emission analysis, laser fault injection, and optical contactless probing.
This book reviews research towards perceptual quality dimensions of synthetic speech, compares these findings with the state of the art, and derives a set of five universal perceptual quality dimensions for TTS signals. In addition, different techniques for the instrumental quality assessment of TTS signals are introduced, reviewed and tested.
The improvement affects the prediction of dialogue metrics that are related to dialogue efficiency and dialogue effectiveness.Furthermore, the book describes a parameter-based data model, as well as a related framework.
The book presents revealing findings from a field study on communicating interactivity, a laboratory on analysing visual attention, a field study on mid-air gestures, and a field study on using mid-air gestures to select items on interactive public displays.
Due to the need for at least two independent precise faults in a single pairing computation, it has not been taken seriously either.Based on these two attacks, the book demonstrates that the assessment of physical attack complexity is error-prone, and as such cryptography should not rely on it.
This work addresses the evaluation of the human and the automatic speaker recognition performances under different channel distortions caused by bandwidth limitation, codecs, and electro-acoustic user interfaces, among other impairments.
This book presents guidelines for a future device type: a tablet that allows ergonomic front- and back-of-device interaction.
This book treats the topic of extending the adaptive filtering theory in the context of massive multichannel systems by taking into account a priori knowledge of the underlying system or signal.
This book shows how networking research and quality engineering can be combined to successfully manage the transmission quality when speech and video telephony is delivered in heterogeneous wireless networks.
For this aim, it introduces a novel personality assessment questionnaire and presents the results of extensive labeling sessions to annotate the speech data with personality assessments. Based on a database built on the questionnaire, the book presents models to tell apart different personality types or classes from speech automatically.
Exhaustive and empirically validated, this taxonomy of qualitative aspects of multimodal interaction includes an evaluative questionnaire, a breakdown of factors influencing modality choice, models for comparing perceived and actual quality, and much more.
The detector reveals stealthy peripheral-based attacks on the host's main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only measures intermittently.
The book redefines the experimental paradigms of using EEG in the area of quality assessment so that they better suit the requirements of standard subjective quality testing, and presents experimental protocols and stimuli that have been adjusted accordingly.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.