Advanced search

Showing result 1 - 5 of 10 essays matching the above criteria.

  1. 1. Representation of History in Assassin’s Creed

    University essay from Lunds universitet/Intermediala studier

    Author : Hassan Taher; [2020]
    Keywords : Assassin’s Creed; Remediation; Video Game Culture; Video Game Studies; Intermediality; Video Games; Media Technology; Cultural Sciences;

    Abstract : In this essay, I have analysed the video game franchise Assassin’s Creed and looked at it from an intermedial standpoint, where I have also focused on the educational qualities Assassin’s Creed can provide players. By applying Lars Elleström’s theories of intermediality and multimodality I have explained different parts of what builds up certain video games and how they are different from other media. READ MORE

  2. 2. Evaluating Voice over IP phone implementation on a freescale Cortex A9 processor running Linux using open source SIP and WebRTC

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Eric Sjögren; [2016]
    Keywords : ;

    Abstract : Voice over IP (VoIP) is a methodology that refers to the delivery of multimedia and voice sessions over an Internet connection and it provides an alternative to regular voice calls using phone lines, usually referred to as the Public Switched Telephone Network (PSTN). Web Real-Time Communication (WebRTC) is an API denition for browser-to-browser VoIP applications; the denition acts as a foundation for applications using voice, video, chat, and P2P le sharing in a browser environment without the need of either internal or external plugins. READ MORE

  3. 3. Securing Safebook : Secure Data Access Control and Key Management for Safebook

    University essay from KTH/Radio Systems Laboratory (RS Lab)

    Author : Waqas Liaqat Ali; [2013]
    Keywords : User Privacy; Access Control; Distributed Social Networks; Key Management; Användarnas Privatliv; Atkomstkontroll; Distribuerade Sociala Nätverk; Nyckelhantering;

    Abstract : Online social networks have become a fast and efficient way of sharing information and experiences. Over the past few years the trend of using social networks has drastically increased with an enormous amount of users’ private contents injected into the providers’ data centers. READ MORE

  4. 4. Independent Domain of Symmetric Encryption using Least SignificantBit : Computer Vision, Steganography and Cryptography Techniques

    University essay from Högskolan Dalarna/Datateknik

    Author : Bhupathi Rajan Guruswamy Aarumugam; [2011]
    Keywords : Image watermarking; LSB; Vigenere Square; AI Techniques; Computer Vision; Steganography and Cryptography;

    Abstract : The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. READ MORE

  5. 5. Diameter service creation investigation and HSS evaluation

    University essay from KTH/Kommunikationssystem, CoS

    Author : Petter Lindgren; [2010]
    Keywords : Diameter; HSS; IMS; service creation;

    Abstract : With a prospect of creating a new generation of cellular networks using IP based communication, service providers, operators and developers have created the IP Multimedia Subsystem (IMS). Which with a more open architecture than older cellular networks will make it more like the internet in terms of service creation. READ MORE