This document summarizes an architecture called PresenceCloud that is proposed to address scalability issues in mobile presence services for large-scale social networks. PresenceCloud organizes presence server nodes in a quorum-based overlay network with low diameter to efficiently search for users' buddy lists. It employs a one-hop caching strategy where each node caches the user lists of its neighboring nodes to reduce search latency. When a search request is received, the directed search algorithm first checks the local user list and cache, then forwards the remaining search targets to neighboring nodes based on their identifiers to minimize messages. Analysis shows this architecture reduces the communication cost of buddy searches and presence updates to a constant compared to a linear cost for a simple replication approach.
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
A scalable server architecture for mobile presence services in social network...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
Service usage classification with encryptedKamal Spring
The rapid adoption of mobile messaging Apps has enabled us to collect massive amount of encrypted Internet traffic of mobile messaging. The classification of this traffic into different types of in-App service usages can help for intelligent network management, such as managing network bandwidth budget and providing quality of services. Traditional approaches for classification of Internet traffic rely on packet inspection, such as parsing HTTP headers. However, messaging Apps are increasingly using secure protocols, such as HTTPS and SSL, to transmit data. This imposes significant challenges on the performances of service usage classification by packet inspection. To this end, in this paper, we investigate how to exploit encrypted Internet traffic for classifying in-App usages. Specifically, we develop a system, named CUMMA, for classifying service usages of mobile messaging Apps by jointly modeling user behavioral patterns, network traffic characteristics and temporal dependencies. Along this line, we first segment Internet traffic from traffic-flows into sessions with a number of dialogs in a hierarchical way. Also, we extract the discriminative features of traffic data from two perspectives: (i) packet length and (ii) time delay. Next, we learn a service usage predictor to classify these segmented dialogs into single-type usages or outliers.. Indeed, CUMMA enables mobile analysts to identify service usages and analyze end-user in-App behaviors even for encrypted Internet traffic. Finally, the extensive experiments on real-world messaging data demonstrate the effectiveness and efficiency of the proposed method for service usage classification.
Trust Based Content Distribution for Peer-ToPeer Overlay NetworksIJNSA Journal
In peer-to-peer content distribution the lack of a central authority makes authentication difficult. Without authentication, adversary nodes can spoof identity and falsify messages in the overlay. This enables malicious nodes to launch man-in-the-middle or denial-of-service attacks. In this paper, we present a trust based content distribution for peer-to-peer overlay networks, which is built on the trust management scheme. The main concept is, before sending or accepting the traffic, the trust of the peer must be validated. Based on the success of data delivery and searching time, we calculate the trust index of a node. Then the aggregated trust index of the peers whose value is below the threshold value is considered as distrusted and the corresponding traffic is blocked. By simulation results we show that our proposed scheme achieves increased success ratio with reduced delay and drop.
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBSIJNSA Journal
Recent advances in mobile communication and development of sophisticated equipments lead to the wide spread use of Location Based Services (LBS). A major concern for large-scale deployment of LBSs is the potential abuse of their client location data, which may imply sensitive personal information. Protecting location information of the mobile user is challenging because a location itself may reveal user identity. Several schemes have been proposed for location cloaking. In our paper, we propose a generic Enhanced Location Privacy Model (LPM), which describes the concept, the architecture, algorithms and the functionalities for location privacy in LBS. As per the architecture, the system ensures location privacy, without trusting anybody including the peers or LBS servers. The system is fully distributed and evaluation shows its efficiency and high level of privacy with QoS
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
A scalable server architecture for mobile presence services in social network...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
Service usage classification with encryptedKamal Spring
The rapid adoption of mobile messaging Apps has enabled us to collect massive amount of encrypted Internet traffic of mobile messaging. The classification of this traffic into different types of in-App service usages can help for intelligent network management, such as managing network bandwidth budget and providing quality of services. Traditional approaches for classification of Internet traffic rely on packet inspection, such as parsing HTTP headers. However, messaging Apps are increasingly using secure protocols, such as HTTPS and SSL, to transmit data. This imposes significant challenges on the performances of service usage classification by packet inspection. To this end, in this paper, we investigate how to exploit encrypted Internet traffic for classifying in-App usages. Specifically, we develop a system, named CUMMA, for classifying service usages of mobile messaging Apps by jointly modeling user behavioral patterns, network traffic characteristics and temporal dependencies. Along this line, we first segment Internet traffic from traffic-flows into sessions with a number of dialogs in a hierarchical way. Also, we extract the discriminative features of traffic data from two perspectives: (i) packet length and (ii) time delay. Next, we learn a service usage predictor to classify these segmented dialogs into single-type usages or outliers.. Indeed, CUMMA enables mobile analysts to identify service usages and analyze end-user in-App behaviors even for encrypted Internet traffic. Finally, the extensive experiments on real-world messaging data demonstrate the effectiveness and efficiency of the proposed method for service usage classification.
Trust Based Content Distribution for Peer-ToPeer Overlay NetworksIJNSA Journal
In peer-to-peer content distribution the lack of a central authority makes authentication difficult. Without authentication, adversary nodes can spoof identity and falsify messages in the overlay. This enables malicious nodes to launch man-in-the-middle or denial-of-service attacks. In this paper, we present a trust based content distribution for peer-to-peer overlay networks, which is built on the trust management scheme. The main concept is, before sending or accepting the traffic, the trust of the peer must be validated. Based on the success of data delivery and searching time, we calculate the trust index of a node. Then the aggregated trust index of the peers whose value is below the threshold value is considered as distrusted and the corresponding traffic is blocked. By simulation results we show that our proposed scheme achieves increased success ratio with reduced delay and drop.
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBSIJNSA Journal
Recent advances in mobile communication and development of sophisticated equipments lead to the wide spread use of Location Based Services (LBS). A major concern for large-scale deployment of LBSs is the potential abuse of their client location data, which may imply sensitive personal information. Protecting location information of the mobile user is challenging because a location itself may reveal user identity. Several schemes have been proposed for location cloaking. In our paper, we propose a generic Enhanced Location Privacy Model (LPM), which describes the concept, the architecture, algorithms and the functionalities for location privacy in LBS. As per the architecture, the system ensures location privacy, without trusting anybody including the peers or LBS servers. The system is fully distributed and evaluation shows its efficiency and high level of privacy with QoS
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...dbpublications
The rapid adoption of mobile
messaging Apps has enabled us to collect massive
amount of encrypted Internet traffic of mobile
messaging. The classification of this traffic into
different types of in-App service usages can help for
intelligent network management, such as managing
network bandwidth budget and providing quality of
services. Traditional approaches for classification of
Internet traffic rely on packet inspection, such as
parsing HTTP headers. However, messaging Apps are
increasingly using secure protocols, such as HTTPS
and SSL, to transmit data. This imposes significant
challenges on the performances of service usage
classification by packet inspection. To this end, in this
paper, we investigate how to exploit encrypted Internet
traffic for classifying in-App usages. Specifically, we
develop a system, named CUMMA, for classifying
service usages of mobile messaging Apps by jointly
modeling user behavioral patterns, network traffic
characteristics, and temporal dependencies. Along this
line, we first segment Internet traffic from trafficflows
into sessions with a number of dialogs in a
hierarchical way. Also, we extract the discriminative
features of traffic data from two perspectives: (i)
packet length and (ii) time delay. Next, we teach a
service usage predictor to classify these segmented
dialogs into single-type usages or outliers. In addition,
we design a clustering Hidden Markov Model (HMM)
based method to detect mixed dialogs from outliers
and decompose mixed dialogs into sub-dialogs of
single-type usage. Indeed, CUMMA enables mobile
analysts to identify service usages and analyze enduser
in-App behaviors even for encrypted Internet
traffic.
FORWARDING OF MULTIPLE MESSAGES TO MULTIPLE DESTINATIONS BY USING MOBILE AGENTS ijdpsjournal
Today in this competitive world where everybody depends on the mobile technology run with the need of possessing mobiles and enjoying the facilities of ease to send messages to their near and dear ones. People need to perform their tasks for informing, contacting and keeping an up to date of whatever is
going around them. One such facility in our mobiles is forwarding of messages to people for fun or for awareness or when we want more number of people to know about something. The proposal is forwarding multiple messages to multiple destinations at the same time. The mobiles have the facility to forward a single message to multiple destinations. The messages can be forwarded using the push approach and the Mobile Agent Client and Mobile Agent Server. Since a mobile agent has certain properties which supports multiple message forwarding but affects the reliability certainly, mobile
agents for sub servers can be a substitute as well. Messages will be selected in an order and the recipients’ numbers are be added. Once the sender toggles the option of ‘send’, the multiple messages selected must be sent to the recipients in the order they are selected to send. It can either be based on the
messages like one by one message must first be sent to the recipients thus all the messages selected reaches the recipient 1 then all the messages will be sent to the next recipient 2 and so on or message 1 is sent to all the recipients and message 2 is sent to all the recipients and so on. Gateways in Mobile Agent
Server can be used for the store and forward technique. If the network is busy and any message is not received by any of the recipient then the Mobile Agent Server will locate the address from the MA Client and establish connectivity again and then forwards the message.
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...Nexgen Technology
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
A Proposal for End-to-End QoS Provisioning in Software-Defined NetworksIJECEIAES
This paper describes a framework application for the control plane of a network infras- tructure; the objective is to feature end-user applications with the capability of requesting at any time a customised end-to-end Quality-of-Service profile in the context of dynamic Service-Level-Agreements. Our solution targets current and future real-time applications that require tight QoS parameters, such as a guaranteed end-to-end delay bound. These applications include, but are not limited to, health-care, mobility, education, manufacturing, smart grids, gaming and much more. We discuss the issues related to the previous Integrated Service and the reason why the RSVP protocol for guaranteed QoS did not take off. Then we present a new signaling and resource reservation framework based on the cutting-edge network controller ONOS. Moreover, the presented system foresees the need of considering the edges of the network, where terminal applications are connected to, to be piloted by distinct logically centralised controllers. We discuss a possible inter-domain communication mechanism to achieve the end-to-end QoS guarantee.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
Content Sharing over Smartphone-Based Delay-Tolerant NetworksIJERA Editor
With the growing number of smartphone end users, peer-to-peer ad hoc content giving is likely to occur often. Thus, new articles sharing mechanisms must be developed since traditional information delivery schemes will not be efficient with regard to content sharing due to the sporadic connectivity between smartphones on the market. To obtain data delivery such challenging environments, researchers include proposed the employment of store-carry-forward methodologies, in which a node stores a communication and holds it until a forwarding prospect arises through an encounter together with other nodes. Most past works in this field have dedicated to the conjecture of whether two nodes could encounter the other, without thinking about the place and also time from the encounter. In this particular paper, we propose to her discover-predict-deliver as a possible efficient articles sharing scheme for delay-tolerant touch screen phone networks. In this proposed scheme, contents are usually shared while using the mobility information of people. Specifically, our strategy employs the mobility understanding algorithm to spot places inside your own home and outdoor.
Online Social Networking has gained tremendous popularity amongst the masses. It is usual for the users
of Online Social Networks (OSNs) to share information with friends however they lose privacy. Privacy has
become an important concern in online social networks. Users are unaware of the privacy risks involved
when they share their sensitive information in the network.[1] One of the fundamental challenging issues is
measurement of privacy .It is hard for social networking sites and users to make and adjust privacy settings
to protect privacy without practical and effective way to quantify , measure and evaluate privacy. In this
paper, we discussed Privacy Index (PIDX) which is used to measure a user’s privacy exposure in a social
network. We have also described and calculated the Privacy Quotient (PQ) i.e. a metric to measure the
privacy of the user’s profile using the naive approach. [2] The users should be aware of their privacy
quotient and should know where they stand in the privacy measuring scale. At last we have proposed a
model that will ensure privacy in the unstructured data. It will utilize the Item Response Theory model to
measure the privacy leaks in the messages and text that is being posted by the users of the online social
networking sites.
This paper presents a distributed software mobile agent framework for media access. The
access and delivery of media is enhanced by an agent architecture framework that
utilizesmobile agent characteristics to provide access and delivery of media. Migrating agents
to the media source and destination devices enables the framework to discover the properties of
devices and media within networks dynamically. The mobile agents in this framework make
decisions and work together to enable access and delivery of media through the transcoding of
media based on the properties of the data path and device constraints.
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONSIJCNC
The trust and reputation models were introduced to restrain the impacts caused by rational but selfish
peers in P2P streaming systems. However, these models face with two major challenges from dishonest
feedback and strategic altering behaviors. To answer these challenges, we present a global trust model
based on network community, evaluation correlations, and punishment mechanism. We also propose a
two-layered overlay to provide the function of peers’ behaviors collection and malicious detection.
Furthermore, we analysis several security threats in P2P streaming systems, and discuss how to defend
with them by our trust mechanism. The simulation results show that our trust framework can successfully
filter out dishonest feedbacks by using correlation coefficients. It can effectively defend against the
security threats with good load balance as well.
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
This paper is an attempt to base on auctions which
presents a frame work for the secure multi-party decision
protocols. In addition to the implementations which are very
light weighted, the main focus is on synchronizing security
features for avoiding agreements manipulations and reducing
the user traffic. Through this paper one can understand that
this different auction protocols on top of the frame work can
be collaborated using mobile devices. This paper present the
negotiation between auctioneer and the proffered and this
negotiation shows that multiparty security is far better than
the existing system.
Hybrid Periodical Flooding in Unstructured Peer-to-Peer NetworksZhenyun Zhuang
ICPP 2003
Blind flooding is a popular search mechanism used
current commercial P2P systems because of its simplicity. However, blind flooding among peers or super-peers causes large volume of unnecessary traffic although the response time is short. Some improved statistics-based search mechanisms can reduce the traffic volume but also significantly shrink the query coverage range. In some search mechanisms, not all peers may be reachable creating the so-called partial coverage
problem. Aiming at alleviating the partial coverage problem and reducing the unnecessary traffic, we propose an efficient and adaptive search mechanism, Hybrid Periodical Flooding (HPF). HPF retains the advantages of statistics-based search mechanisms, alleviates the partial coverage problem, and provides the flexibility to adaptively adjust different parameters to
meet different performance requirements. The effectiveness of HPF is demonstrated through simulation studies.
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...dbpublications
The rapid adoption of mobile
messaging Apps has enabled us to collect massive
amount of encrypted Internet traffic of mobile
messaging. The classification of this traffic into
different types of in-App service usages can help for
intelligent network management, such as managing
network bandwidth budget and providing quality of
services. Traditional approaches for classification of
Internet traffic rely on packet inspection, such as
parsing HTTP headers. However, messaging Apps are
increasingly using secure protocols, such as HTTPS
and SSL, to transmit data. This imposes significant
challenges on the performances of service usage
classification by packet inspection. To this end, in this
paper, we investigate how to exploit encrypted Internet
traffic for classifying in-App usages. Specifically, we
develop a system, named CUMMA, for classifying
service usages of mobile messaging Apps by jointly
modeling user behavioral patterns, network traffic
characteristics, and temporal dependencies. Along this
line, we first segment Internet traffic from trafficflows
into sessions with a number of dialogs in a
hierarchical way. Also, we extract the discriminative
features of traffic data from two perspectives: (i)
packet length and (ii) time delay. Next, we teach a
service usage predictor to classify these segmented
dialogs into single-type usages or outliers. In addition,
we design a clustering Hidden Markov Model (HMM)
based method to detect mixed dialogs from outliers
and decompose mixed dialogs into sub-dialogs of
single-type usage. Indeed, CUMMA enables mobile
analysts to identify service usages and analyze enduser
in-App behaviors even for encrypted Internet
traffic.
FORWARDING OF MULTIPLE MESSAGES TO MULTIPLE DESTINATIONS BY USING MOBILE AGENTS ijdpsjournal
Today in this competitive world where everybody depends on the mobile technology run with the need of possessing mobiles and enjoying the facilities of ease to send messages to their near and dear ones. People need to perform their tasks for informing, contacting and keeping an up to date of whatever is
going around them. One such facility in our mobiles is forwarding of messages to people for fun or for awareness or when we want more number of people to know about something. The proposal is forwarding multiple messages to multiple destinations at the same time. The mobiles have the facility to forward a single message to multiple destinations. The messages can be forwarded using the push approach and the Mobile Agent Client and Mobile Agent Server. Since a mobile agent has certain properties which supports multiple message forwarding but affects the reliability certainly, mobile
agents for sub servers can be a substitute as well. Messages will be selected in an order and the recipients’ numbers are be added. Once the sender toggles the option of ‘send’, the multiple messages selected must be sent to the recipients in the order they are selected to send. It can either be based on the
messages like one by one message must first be sent to the recipients thus all the messages selected reaches the recipient 1 then all the messages will be sent to the next recipient 2 and so on or message 1 is sent to all the recipients and message 2 is sent to all the recipients and so on. Gateways in Mobile Agent
Server can be used for the store and forward technique. If the network is busy and any message is not received by any of the recipient then the Mobile Agent Server will locate the address from the MA Client and establish connectivity again and then forwards the message.
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...Nexgen Technology
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
A Proposal for End-to-End QoS Provisioning in Software-Defined NetworksIJECEIAES
This paper describes a framework application for the control plane of a network infras- tructure; the objective is to feature end-user applications with the capability of requesting at any time a customised end-to-end Quality-of-Service profile in the context of dynamic Service-Level-Agreements. Our solution targets current and future real-time applications that require tight QoS parameters, such as a guaranteed end-to-end delay bound. These applications include, but are not limited to, health-care, mobility, education, manufacturing, smart grids, gaming and much more. We discuss the issues related to the previous Integrated Service and the reason why the RSVP protocol for guaranteed QoS did not take off. Then we present a new signaling and resource reservation framework based on the cutting-edge network controller ONOS. Moreover, the presented system foresees the need of considering the edges of the network, where terminal applications are connected to, to be piloted by distinct logically centralised controllers. We discuss a possible inter-domain communication mechanism to achieve the end-to-end QoS guarantee.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
Content Sharing over Smartphone-Based Delay-Tolerant NetworksIJERA Editor
With the growing number of smartphone end users, peer-to-peer ad hoc content giving is likely to occur often. Thus, new articles sharing mechanisms must be developed since traditional information delivery schemes will not be efficient with regard to content sharing due to the sporadic connectivity between smartphones on the market. To obtain data delivery such challenging environments, researchers include proposed the employment of store-carry-forward methodologies, in which a node stores a communication and holds it until a forwarding prospect arises through an encounter together with other nodes. Most past works in this field have dedicated to the conjecture of whether two nodes could encounter the other, without thinking about the place and also time from the encounter. In this particular paper, we propose to her discover-predict-deliver as a possible efficient articles sharing scheme for delay-tolerant touch screen phone networks. In this proposed scheme, contents are usually shared while using the mobility information of people. Specifically, our strategy employs the mobility understanding algorithm to spot places inside your own home and outdoor.
Online Social Networking has gained tremendous popularity amongst the masses. It is usual for the users
of Online Social Networks (OSNs) to share information with friends however they lose privacy. Privacy has
become an important concern in online social networks. Users are unaware of the privacy risks involved
when they share their sensitive information in the network.[1] One of the fundamental challenging issues is
measurement of privacy .It is hard for social networking sites and users to make and adjust privacy settings
to protect privacy without practical and effective way to quantify , measure and evaluate privacy. In this
paper, we discussed Privacy Index (PIDX) which is used to measure a user’s privacy exposure in a social
network. We have also described and calculated the Privacy Quotient (PQ) i.e. a metric to measure the
privacy of the user’s profile using the naive approach. [2] The users should be aware of their privacy
quotient and should know where they stand in the privacy measuring scale. At last we have proposed a
model that will ensure privacy in the unstructured data. It will utilize the Item Response Theory model to
measure the privacy leaks in the messages and text that is being posted by the users of the online social
networking sites.
This paper presents a distributed software mobile agent framework for media access. The
access and delivery of media is enhanced by an agent architecture framework that
utilizesmobile agent characteristics to provide access and delivery of media. Migrating agents
to the media source and destination devices enables the framework to discover the properties of
devices and media within networks dynamically. The mobile agents in this framework make
decisions and work together to enable access and delivery of media through the transcoding of
media based on the properties of the data path and device constraints.
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONSIJCNC
The trust and reputation models were introduced to restrain the impacts caused by rational but selfish
peers in P2P streaming systems. However, these models face with two major challenges from dishonest
feedback and strategic altering behaviors. To answer these challenges, we present a global trust model
based on network community, evaluation correlations, and punishment mechanism. We also propose a
two-layered overlay to provide the function of peers’ behaviors collection and malicious detection.
Furthermore, we analysis several security threats in P2P streaming systems, and discuss how to defend
with them by our trust mechanism. The simulation results show that our trust framework can successfully
filter out dishonest feedbacks by using correlation coefficients. It can effectively defend against the
security threats with good load balance as well.
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
This paper is an attempt to base on auctions which
presents a frame work for the secure multi-party decision
protocols. In addition to the implementations which are very
light weighted, the main focus is on synchronizing security
features for avoiding agreements manipulations and reducing
the user traffic. Through this paper one can understand that
this different auction protocols on top of the frame work can
be collaborated using mobile devices. This paper present the
negotiation between auctioneer and the proffered and this
negotiation shows that multiparty security is far better than
the existing system.
Hybrid Periodical Flooding in Unstructured Peer-to-Peer NetworksZhenyun Zhuang
ICPP 2003
Blind flooding is a popular search mechanism used
current commercial P2P systems because of its simplicity. However, blind flooding among peers or super-peers causes large volume of unnecessary traffic although the response time is short. Some improved statistics-based search mechanisms can reduce the traffic volume but also significantly shrink the query coverage range. In some search mechanisms, not all peers may be reachable creating the so-called partial coverage
problem. Aiming at alleviating the partial coverage problem and reducing the unnecessary traffic, we propose an efficient and adaptive search mechanism, Hybrid Periodical Flooding (HPF). HPF retains the advantages of statistics-based search mechanisms, alleviates the partial coverage problem, and provides the flexibility to adaptively adjust different parameters to
meet different performance requirements. The effectiveness of HPF is demonstrated through simulation studies.
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
Reducing Corrosion Rate by Welding DesignIJERD Editor
The paper addresses the importance of welding design to prevent corrosion at steel. Welding is
used to join pipe, profiles at bridges, spindle, and a lot more part of engineering construction. The
problems happened associated with welding are common issues in these fields, especially corrosion.
Corrosion can be reduced with many methods, they are painting, controlling humidity, and also good
welding design. In the research, it can be found that reducing residual stress on the welding can be
solved in corrosion rate reduction problem.
Preheating on 500oC and 600oC give better condition to reduce corosion rate than condition after
preheating 400oC. For all welding groove type, material with 500oC and 600oC preheating after 14 days
corrosion test is 0,5%-0,69% lost. Material with 400oC preheating after 14 days corrosion test is 0,57%-0,76%
lost.
Welding groove also influence corrosion rate. X and V type welding groove give better condition to reduce
corrosion rate than use 1/2V and 1/2 X welding groove. After 14 days corrosion test, the samples with
X welding groove type is 0,5%-0,57% lost. The samples with V welding groove after 14 days corrosion test is
0,51%-0,59% lost. The samples with 1/2V and 1/2X welding groove after 14 days corrosion test is 0,58%-
0,71% lost.
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
- Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or
bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam
with the help of open source technologies. Emphasis in human activity recognition is given on the pose
estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web
camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to
the user on how to play a particular game using gestures and what are the various kinds of gestures that can be
performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by
instructing the user to place his component in a red box in about 10 seconds after the short documentary before
the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like
miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a
place where the user is to perform only gestures to start playing the game. At any point of time the user can call
off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It
was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could
relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could
also be achieved thus resulting in a disruptive growth to the advertising firms.
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
-LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region[5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits.
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region [5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits. The supported simulation
is done through PSIM 6.0 software tool
Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio
waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME
(Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF)
operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power
amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna
along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location,
visibility of Moon at both the stations and other vital data to acquire real time position of moon.
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
Simple Sequence Repeats (SSR), also known as Microsatellites, have been extensively used as
molecular markers due to their abundance and high degree of polymorphism. The nucleotide sequences of
polymorphic forms of the same gene should be 99.9% identical. So, Microsatellites extraction from the Gene is
crucial. However, Microsatellites repeat count is compared, if they differ largely, he has some disorder. The Y
chromosome likely contains 50 to 60 genes that provide instructions for making proteins. Because only males
have the Y chromosome, the genes on this chromosome tend to be involved in male sex determination and
development. Several Microsatellite Extractors exist and they fail to extract microsatellites on large data sets of
giga bytes and tera bytes in size. The proposed tool “MS-Extractor: An Innovative Approach to extract
Microsatellites on „Y‟ Chromosome” can extract both Perfect as well as Imperfect Microsatellites from large
data sets of human genome „Y‟. The proposed system uses string matching with sliding window approach to
locate Microsatellites and extracts them.
Importance of Measurements in Smart GridIJERD Editor
- The need to get reliable supply, independence from fossil fuels, and capability to provide clean
energy at a fixed and lower cost, the existing power grid structure is transforming into Smart Grid. The
development of a smart energy distribution grid is a current goal of many nations. A Smart Grid should have
new capabilities such as self-healing, high reliability, energy management, and real-time pricing. This new era
of smart future grid will lead to major changes in existing technologies at generation, transmission and
distribution levels. The incorporation of renewable energy resources and distribution generators in the existing
grid will increase the complexity, optimization problems and instability of the system. This will lead to a
paradigm shift in the instrumentation and control requirements for Smart Grids for high quality, stable and
reliable electricity supply of power. The monitoring of the grid system state and stability relies on the
availability of reliable measurement of data. In this paper the measurement areas that highlight new
measurement challenges, development of the Smart Meters and the critical parameters of electric energy to be
monitored for improving the reliability of power systems has been discussed.
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
One of the major environmental concerns is the disposal of the waste materials and utilization of
industrial by products. Lime stone quarries will produce millions of tons waste dust powder every year. Having
considerable high degree of fineness in comparision to cement this material may be utilized as a partial
replacement to cement. For this purpose an experiment is conducted to investigate the possibility of using lime
stone powder in the production of SCC with combined use GGBS and how it affects the fresh and mechanical
properties of SCC. First SCC is made by replacing cement with GGBS in percentages like 10, 20, 30, 40, 50 and
by taking the optimum mix with GGBS lime stone powder is blended to mix in percentages like 5, 10, 15, 20 as
a partial replacement to cement. Test results shows that the SCC mix with combination of 30% GGBS and 15%
limestone powder gives maximum compressive strength and fresh properties are also in the limits prescribed by
the EFNARC.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Leading Change strategies and insights for effective change management pdf 1.pdf
International Journal of Engineering Research and Development
1. International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 10, Issue 8 (August 2014), PP.58-63
Ascendable Architecture for Wandering Services in
Social Networks
1Potturi Reshma, 2Dr.B.Srinivasarao
1PG Student, 2Professor & HOD, Department of CSE Dhanekula Institute of
Engineering & Technology Ganguru, Vijayawada-39
Abstract:- A mobile ubiquity services is an important element of cloud computing environments, for the reason
it keeps an up-to-date list of presence information of mobile user. If presence updates occur often the number of
messages distributed by presence server may lead to scalability problem and buddy list search problem in large-scale
mobile presence services. To overcome the scalability problem proposed an efficient and ascendable
server architecture called presence cloud. It organizes the presence server in to quorum based server-server
architecture for efficient searching. When a mobile user joins a network or internet, presence cloud searches the
presence information. It also achieves small constant search latency by the directed search algorithm and one-hop
caching strategy. Anatomize the performance of presence cloud in terms of search cost and search
58
satisfaction level, without compromising each other.
Keywords:- Mobile ubiquity services, presence cloud, one-hop cache, latency, buddy list.
I. INTRODUCTION
Instant messaging (IM) and internet chat communication have seen enormous growth over the last
several years. Mobile devices and cloud computing environments can provide presence-enabled applications,
i.e., social network applications/services, worldwide. Facebook, Twitter Foursquare, Google Latitude, buddy
cloud and Mobile Instant Messaging (MIM) are examples of presence-enabled applications that have grown
rapidly in the last decade. Social network services are changing the ways in which participants engage with their
friends on the Internet. The sharing of basic presence information can result in a large volume of traffic as users
log on or off throughout the life of a presence session, especially for users with large numbers of contacts (e.g.,
the author of this document has over 1,700 contacts in his presence-enabled contact list). The volume is
increased by communication of information beyond basic on-off network availability, such as availability (e.g.,
"away" and "do not disturb"). The volume is further increased if the presence "transport" is used to
communicate information such as device capabilities, geolocation, mood, activity, even the music to which a
user is listening. A mobile presence service is an essential component of social network services in cloud
computing environments. The key function of a mobile presence service is to maintain up-to-date list of
presence information of all mobile users. The presence information includes details about a mobile user’s
location, availability, activity, device capability, and preferences. The service must also bind the user’s ID to
his/her current presence information, as well as retrieve and subscribe to changes in the presence information of
the user’s friends. In social network services, each mobile user has a friend list, typically called a buddy list,
which contains the contact information of other users that he/she wants to communicate with. The mobile user’s
status is broadcast automatically to each person on the buddy list whenever he/she transits from one status to the
other. For example, when a mobile user logs into a social network application, such as an IM system, through
his/her mobile device, the mobile presence service searches for and notifies everyone on the user’s buddy list.
To maximize a mobile presence service’s search speed and minimize the notification time, most presence
services use server cluster technology. To improve the efficiency of the search operation, PresenceCloud
requires a caching strategy to replicate presence information of users. In order to adapt to changes in the
presence of users, the caching strategy should be asynchronous and not require expensive mechanisms for
distributed agreement. In PresenceCloud, each PS node maintains a user list of presence information of the
attached users, and it is responsible for caching the user list of each node in its PS list, in other words, PS nodes
only replicate the user list at most one hop away from itself. The cache is updated when neighbours establish
connections to it, and periodically updated with its neighbours. Therefore, when a PS node receives a query, it
can respond not only with matches from its own user list, but also provide matches from its caches that are the
user lists offered by all of its neighbours. In this section, we describe previous researches on presence services,
and survey the presence service of existing systems. Well known commercial IM systems leverage some form of
centralized clusters to provide presence services. Jennings III et al. presented taxonomy of different features and
functions supported by the three most popular IM systems, AIM, Microsoft MSN and Yahoo! Messenger. The
authors also provided an overview of the system architectures and observed that the systems use client-server-
2. Ascendable Architecture For Wandering Services In Social Networks
based architectures. Skype, a popular voice over IP application, utilizes the Global Index (GI) technology to
provide a presence service for users. GI is a multi-tiered network architecture where each node maintains full
knowledge of all available users. Since Skype is not an open protocol, it is difficult to determine how GI
technology is used exactly. Moreover, Xiao et al. analyzed the traffic of MSN and AIM system. They found that
the presence information is one of most messaging traffic in instant messaging systems. In, authors shown that
the largest message traffic in existing presence services is buddy NOTIFY messages. Recently, there is an
increase amount of interest in how to design a peer-to-peer SIP. P2PSIP has been proposed to remove the
centralized server, reduce maintenance costs, and prevent failures in server-based SIP deployment. To maintain
presence information, P2PSIP clients are organized in a DHT system, rather than in a centralized server.
However, the presence service architectures of Jabber and P2PSIP are distributed, the buddy-list search problem
we defined later also could affect such distributed systems. It is noted that few articles in discuss the scalability
issues of the distributed presence server architecture. Saint Andre analyzes the traffic generated as a result of
presence information between users of inter-domains that support the XMPP. Houri et al. Show that the amount
of presence traffic in SIMPLE can be extremely heavy, and they analyze the effect of a large presence system on
the memory and CPU loading. Those works in study related problems and developing an initial set of guidelines
for optimizing inter-domain presence traffic and present DHT-based presence server architecture.
II. DESIGN OF PRESENCECLOUD
The past few years has seen a veritable frenzy of research activity in Internet-scale object searching
field, with many designed protocols and proposed algorithms. Most of the previous algorithms are used to
address the fixed object searching problem in distributed systems for different intentions. However, people are
nomadic, the mobile presence information is more mutable and dynamic; anew design of mobile presence
services is needed to address the buddy-list search problem, especially for the demand of mobile social network
applications. PresenceCloud is used to construct and maintain distributed server architecture and can be used to
efficiently query the system for buddy list searches. Presence Cloud consists of three main components that are
run across a set of presence servers. In the design of Presence Cloud, the ideas of P2P systems and present a
particular design for mobile presence services
has been refined. The three key components of Presence Cloud are summarized below:
Presence Cloud server overlay: It organizes presence servers based on the concept of grid quorum
system. So, the server overlay of PresenceCloud has a balanced load property and a two-hop diameter
node degrees, where n is the number of presence servers.
One-hop caching strategy: It is used to reduce the number of transmitted messages and accelerate query
speed. All presence servers maintain caches for the buddies offered by their immediate neighbours.
Directed buddy search: It is based on the directed search strategy. PresenceCloud ensures an one-hop
search, it yields a small constant search latency on average.
59
2.1 Presence Cloud Overview
The primary abstraction exported by our PresenceCloud issued a scalable server architecture for mobile
presence services, and can be used to efficiently search the desired buddy lists. We illustrated a simple overview
of Presence Cloud in Fig. 1. In the mobile Internet, a mobile user can access the Internet and make a data
connection to Presence Cloud via 3G or Wifi services. After the mobile user joins and authenticates
himself/herself to the mobile presence service, the mobile user is determinately directed to one of Presence
Servers in the Presence Cloud by using the Secure Hash Algorithm, such as SHA-1. The mobile user opens a
TCP connection to the Presence Server (PSnode) for control message transmission, particularly for the presence
information. After the control channel is established, the mobile user sends a request to the connected PSnode
for his/her buddy list searching. Our PresenceCloud shall do an efficient searching operation and return the
presence information of the desired buddies to the mobile user. Now, we discuss the three components of
Presence-Cloud in detail below.
Fig 1. Architecture for presence cloud
2.2 Presence Cloud Server Over relay
The Presence Cloud server overlay construction algorithm organizes the PS nodes into a server-to-server
overlay, which provides a good low-diameter overlay property. The low-diameter property ensures that a
PS node only needs two hops to reach any other PS nodes.
3. Ascendable Architecture For Wandering Services In Social Networks
Fig 1. A perspective of Presence Cloud Server Overlay
Algorithm1. Presence Cloud Stabilization algorithm
1: /* periodically verify PS node n’s pslist */
2: Definition:
3: pslist: set of the current PS list of this PS node, n
4: pslist[].connection: the current PS node in pslist
5: pslist[].id: identifier of the correct connection in pslist
6: node.id: identifier of PS node node
7: Algorithm:
8: r Sizeof(pslist)
9: for i = 1 to r do
10: node pslist[i].connection
11: if node.id ≠pslist[i].id then
12: /* ask node to refresh n’s PS list entries */
13: findnodeFind_CorrectPSNode(node)
14: if findnode=nil then
15: pslist[i].connectionRandomNode(node)
16: else
17: pslist[i].connectionfindnode
18: end if
19: else
20: /* send a heartbeat message */
21: bfailedSendHeartbeatmsg(node)
22: if bfailed= true then
23: pslist[i].connectionRandomNode(node)
24: end if
25: end if
26: end for
60
4. Ascendable Architecture For Wandering Services In Social Networks
Our algorithm is fault tolerance design. At each PS node, a simple Stabilization () process periodically
contacts existing PS nodes to maintain the PS list. The Stabilization () process is elaborately presented in the
Algorithm. When a PS node joins, it obtains its PS list by contacting a root. However, if a PS node n detects
failed PS nodes in its PS list, it needs to establish new connections with existing PS nodes. In our algorithm, n
should pick a random PS node that is in the same column or row as the failed PS node.
61
2.3 One-hop caching strategy
To improve the efficiency of the search operation, Presence Cloud requires a caching strategy to
replicate presence information of users. In order to adapt to changes in the presence of users, the caching
strategy should be asynchronous and not require expensive mechanisms for distributed agreement. In Presence
Cloud, each PS node maintains a user list of presence information of the attached users, and it is responsible for
caching the user list of each node in its PS list, in other words, PS nodes only replicate the user list at most one
hop away from itself. The cache is updated when neighbours establish connections to it, and periodically
updated with its neighbours. Therefore, when a PS node receives a query, it can respond not only with matches
from its own user list, but also provide matches from its caches that are the user lists offered by all of its
neighbours.
2.4 Directed buddy search
We contend that minimizing searching response time is important to mobile presence services. Thus,
the buddy list searching algorithm of Presence Cloud coupled with the two-hop overlay and one-hop caching
strategy ensures that Presence Cloud can typically provide swift responses for a large number of mobile users.
First, by organizing PS nodes in a server-to-server overlay network, we can therefore use one-hop search exactly
for queries and thus reduce the network traffic without significant impact on the search results. Second, by
capitalizing the one-hop caching that maintains the user lists of its neighbours, we improve response time by
increasing the chances of finding buddies. Clearly, this mechanism both reduces the network traffic and
response time. Based on the mechanism, the population of mobile users can be retrieved by a broadcasting
operation in any PS node in the mobile presence service. Moreover, the broadcasting message can be
piggybacked in a buddy search message for saving the cost.
Directed buddy search algorithm:
1. A mobile user logins PresenceCloud and decides the associated PS node, q.
2. The user sends a Buddy List Search Message, B to the PS node q.
3. When the PS node q receives a B, then retrieves each bi from B and searches its user list and one-hop cache
to respond to the coming query. And removes the responded buddies’ from B.
4. If B = nil, the buddy list search operation is done.
5. Otherwise, if B =nil, the PS node q should hash each remaining identifier in B to obtain a grid ID,
respectively.
6. Then, the PS node q aggregates these b(g) to become a new B(j), for each g Sj. Here, PS node j is the
intersection node of Sq intersection Sg. And sends the new B(j) to PS node j.
5. Ascendable Architecture For Wandering Services In Social Networks
Fig 2. Directed buddy search
When a PS node 4 receives a Buddy List Search Message, B (1; 2; 3; 4; 5; 6; 7; 8; 9), from a mobile user,
PSnode 4 first searches its local user list and the buddy cache, and then it responds these searched buddies to the
mobile user and removes these searched buddies from B. These removed buddies include the user lists of PS
node {1,4,5,6,7}.
Then, PS node 4 can aggregates b and b to become a new Bð6Þ and sends the new B to PS node 6.
Note that the ps list Id of PS node 6 is {3,4,5,9}. Here, PS node 4 also aggregates b and b to become a new and
sends the new Bð5Þ to PSnode 5. However, due to the one-hop caching strategy, PS node 6 has a buddy cache
that contains these user lists of PSnode {3,9}, PS node 6 can expeditiously respond the buddy search message .
Consequently, the directed searching combined with both previous two mechanisms, including Presence Cloud
server overlay and one-hop caching strategy, can reduce the number of searching messages sent.
Our caching strategy does not require expensive overhead for presence consistency among PS nodes. When a
mobile user changes its presence information, either because it leaves Presence Cloud, or due to failure, the
responded PS node can disseminate its new presence to other neighbouring PS nodes for getting updated
quickly.
III. COST ANALYSIS
A cost analysis of the communication cost of PresenceCloud in terms of the number of messages
required to search the buddy information of a mobile user. Note that how to reduce the number of inter server
communication messages is the most important metric in mobile presence service issues. The buddy-list search
problem can be solved by a brute-force search algorithm, which simply searches all the PS nodes in the mobile
presence service. In a simple mesh-based design, the algorithm replicates all the presence information at each
PS node; hence its search cost, denote by QMesh, is only one message. On the other hand, the system needs n _
1 messages to replicate a user’s presence information to all PS nodes, where n is the number of PS nodes. The
communication cost of searching buddies and replicating presence information can be formulated as Mcost =
QMesh +RMesh, where RMesh is the communication cost of replicating presence information to all PS nodes.
Accordingly, we have Mcost = O(n).
In the analysis of Presence Cloud, we assume that the mobile users are distributed equally among all
the PSnodes, which is the worst case of the performance of Presence- Cloud. Here, the search cost of Presence
Cloud is denoted as Qp, which is messages for both searching buddy lists and replicating presence information.
Because search message and replica message can be combined into one single message, the communication cost
of replicating, Rp (0).
It is straight forward to know that the communication cost of searching buddies and replicating
presence information in Presence Cloud is Pcost .However, in Presence Cloud, a PS node not only searches a
buddy list and replicates presence information, but also notifies users in the buddy list about the new presence
event. Let b be the maximum number of buddies of a mobile user. Thus, the worst case is when none of the
buddies are registered with the PS nodes reached by the search messages and each user on the buddy list is
62
6. Ascendable Architecture For Wandering Services In Social Networks
located on different PS nodes. Since Presence Cloud must reply every online user on the buddy list individually,
it is clear that extra b messages must be transmitted. In the worst case, it needs other messages When all mobile
users are distributed equally among the PS nodes, which is considered to be the worst case, the Pcost.
IV. CONCLUSION
A scalable server architecture that supports mobile presence services in large-scale social network
services. Presence Cloud achieves low search latency and enhances the performance of mobile presence
services. Total number of buddy search messages increases substantially with the user arrival rate and the
number of presence servers. The growth of social network applications and mobile device computing capacity to
explore the user satisfaction both on mobile presence services or mobile devices. Presence Cloud could
certificate the presence server every time when the presence server joins to Presence Cloud. The results of that
Presence Cloud achieve performance gains in the search cost without compromising search satisfaction.
REFRENCES
[1]. R.B. Jennings, E.M. Nahum, D.P. Olshefski, D. Saha, Z.-Y. Shae, and C. Waters, “A Study of Internet
Instant Messaging and ChatProtocols,” IEEE Network, vol. 20, no. 6, pp. 16-21, July/Aug. 2006.
[2]. Z. Xiao, L. Guo, and J. Tracey, x“Understanding Instant Messaging Traffic Characteristics,” Proc.
IEEE 27th Int’l Conf. Distributed Computing Systems (ICDCS), 2007.
[3]. Chi, R. Hao, D. Wang, and Z.-Z. Cao, “IMS Presence Server:aTraffic Analysis and Performance
Modelling,” Proc. IEEE Int’Conf. Network Protocols (ICNP), 2008.
[4]. Instant Messaging and Presence Protocol IETF Working Group, http:
//www.ietf.org/html.charters/impp-charter.html, 2012.
P.Reshma did her B.Tech in cse, jntu Kakinada and pursuing her
M.Tech in CSE from Dhanekula Institute of engg. And technology,
jntu kakinada. Her area interest is moblile computing and software
engg.
Dr.B.srinivasarao did his B.Tech in CSE form Nagarjuna
University,M.Tech in CSE from JNTU Anantapur and PhD in CSE
from Acharya Nagarjuna University . Currently working as
Professor and HOD in Dhanekula Institute of engg. And
Technology.
63