Design and Implementation of New Future Television Cloud Computing
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2014, Vol 13, Issue 9
Abstract
A design and implementation of new future TV Cloud Computing (ClComp) for international systems integration and bridging the gap between linear broadcast, information technology and Internet Protocol of television and mobile television is presented to help Authorized Groups (AuthGs) reach and engage audiences on any television screen. . The cloud design is applied to the Egyptian Radio and Television Union (ERTU). The applications, security, efficiency, flexibility, greater agility, less expenditure and to overcome geographic limitations which are the solution of the cloud are introduced to compete in a global market. The design and evaluation steps are addressed to insure the reliability and compatibility of cloud to the desired targets. A software package for audio watermarking has been presented as an example for its application to ensure protection, in case of saving, and security, in case of transmission of the media through the proposed cloud. The package contains many visual tests such as probability, spectrum, power and scatter diagrams to enable user to quickly investigate the content. All this application was done to suit the web–based where many departments can get benefit from anywhere and anytime according to department request and cloud polices.
Authors and Affiliations
Salwa M. Serag Eldin, Salah A. Khamis, Prof. Abdel-Aziz Ibrahim Mahmoud Hassan, Mohammed A. Alsharqawy
Privacy and Security Issues In Mobile Social Networking and in Modern Shopping Experience
Future shopping applications collect basic profile information of the person and provide great service on recommending books, electronics and other products based on user profile, previous shopping history and relationsh...
Fuzzy Weighted Ordered Weighted Average-Gaussian Mixture Model for Feature Reduction
Feature reduction finds the optimal feature subset using machine learning techniques and evaluation criteria. Some of the irrelevant features are existed in the real-world datasets that should be removed by using the mul...
A Survey On Cloud Computing and Its Benefits
Cloud computing is an increasingly popular paradigm for accessing computing resources. In practice, cloud service providers tend to offer services that can be grouped into three categories: software as a service, platfor...
Enhanced Cloud Security using Hybrid Mechanism of RSA, AES and Blowfish Data Encryption with Secure OTP
Cloud Computing has become one of the most talked about technologies in recent times and has got lots of attention from media as well as analysts because it is offering lots of opportunities. Enterprises have been determ...
Intrusion Detection Techniques based on Cross Layer For Wireless Local Area Networks
In this paper, we propose to design a cross-layer based intrusion detection technique for wireless networks. In this technique a combined weight value is computed from the Received Signal Strength (RSS) and Time Taken fo...