All Technical papers articles – Page 7
-
Technical Papers
Tone mapping influences the bit-rate and the bit depth
HDR will need a higher bit-rate because of its minimum quantisation and the fact that the images have much more details in the highlights and shadows.
-
Technical Papers
Beyond HEVC: video coding standardisation
Though High Efficiency Video Coding (HEVC) is still in its take-up phase, it is foreseeable that even better compression will be needed in the future.
-
Technical Papers
Automatic sound source localisation for object-based audio recording
The ORPHEUS research project aims to invent new workflows for producing, broadcasting and playing back object-oriented audio content.
-
Technical Papers
Enhanced next generation audio for live sports broadcast
Sports broadcasters benefit from a more adaptive scenebased audio capture and rendering, commonly referred to as Next Generation Audio (NGA).
-
Technical Papers
ORPHEUS audio project
Object-based media is a revolutionary approach for creating and deploying interactive, personalised, scalable and immersive content.
-
Technical Papers
Characterisation of processing artifacts in HDR
The new Ultra High Definition (UHD) TV standards define a container which allows content creators to offer the consumer a much more immersive visual experience.
-
Technical Papers
An end-to-end approach for delivering data-driven stories
With the sheer scale of digital information now available, many journalists have recently started using data in order to tell compelling stories.
-
Technical Papers
Big data for journalism and enhanced business analytics
Big data has become mainstream with the recent evolution of cloud infrastructures, data gathering and intelligence algorithms.
-
Technical Papers
AI in media and making security smarter
Artificial Intelligence technology develops in the media space, its application in security must focus on more than closing gaps and locking down assets.
-
Technical Papers
Real-Time semantic enrichment of video streams in the age of big data
AgileRAI, a framework for searching, organising and accessing multimedia data in a fast and semantic-driven way.
-
Technical Papers
Integrating forensic watermarking into adaptive streaming workflow
Forensic watermarking is a process of embedding a unique identifier for each streaming video session into the video content.
-
Technical Papers
Immersive VR for live action video
The advent of high-resolution head-mounted displays (HMDs) enables new applications for virtual and augmented reality.
-
Technical Papers
Wireless links for 8K Super Hi-Vision
The Super Hi-Vision (8K) regular broadcasting through broadcasting satellite will start in 2018.
-
Technical Papers
8K/HLG broadcasting camera system
The first NHK 8K camera employed 4K image sensors, the second model used an 8K single-chip colour image sensor offering compatibility with digital cinema lenses.
-
Technical Papers
ITU-R study group 6 for the future of broadcasting
Leading the international standardisation of the end-to-end broadcasting chain from the production of programmes to their ultimate delivery to the audience.
-
Technical Papers
5G technology for live production
A new emerging 5G technology with phased array antennas was used for the contribution of live TV documentary broadcast in Norway.
-
Technical Papers
Perspectives of TV convergence towards 5G
The new eMBMS systems characteristics are well aligned to the technical requirements coming from the broadcast sector for TV services.
-
Technical Papers
360 cinematic literacy: A case study
360 degree film making necessitates a new language for storytelling, the case study is based on material from two user studies on a 360 video profile of an artist.
-
Technical Papers
Enhanced TV service over 3GPP MBMS
The release of 3GPP to enable viable mobile and terrestrial TV services with the integration of rooftop antenna reception and existing TV receivers is a major milestone.
-
Technical Papers
Cyber defence 2017: Deter, detect and defend
The working methodology of attackers and defining a sample strategy that can be used to deter, detect and successfully defend against cyber attacks.