The document discusses video streaming and content sharing between Android mobile devices and PCs using a peer-to-peer approach without servers. It presents an application that allows live video captured on a mobile device to be streamed and viewed on a nearby PC in real-time over WiFi. Content like images and text can also be shared between devices. The application has uses for social sharing, cooperative work, and assisting elderly/impaired users. It analyzes related works on mobile video streaming and discusses the system design.
Peer To Peer Content Sharing On Wi-Fi Network For Smart PhonesIOSR Journals
This document summarizes a research paper on peer-to-peer content sharing on Wi-Fi networks for smart phones. It discusses using a peer-to-peer model to allow smart phones to share content like videos and photos over Wi-Fi networks without using cellular data or requiring a central server. The proposed system would allow phones to discover each other on the local network, search for files, and download content directly from other peers. This approach aims to reduce costs and bandwidth usage compared to uploading content through cellular networks or wired connections.
Video streaming using wireless multi hop in android phonesIAEME Publication
This document summarizes a research paper on implementing real-time video streaming over multiple wireless hops between Android devices. It proposes a wireless multi-hop video streaming application that allows users to capture live video on their Android devices and share it with nearby users over an ad-hoc wireless mesh network without internet. The application is broken down into a mobile client and routing layer. It implements H.264 video encoding and decoding to compress and transmit video streams over the network using Real-Time Streaming Protocol and Real-Time Transport Protocol to establish connections and control streaming between devices. The paper evaluates the application's performance in various experimental scenarios testing multi-hop video streaming feasibility on Android phones.
A Posteriori Perusal of Mobile ComputingEditor IJCATR
The breakthrough in wireless networking has prompted a new concept of computing, called mobile computing in which users tote
portable
devices have
access to a shared infrastructure, independent of their physical location. Mobile computing is becoming increasingly vital du
e to the
increase in the number of portable computers and the aspiration to have continuous network connectivity to the Internet i
rrespective of the physical
location of the node.
Mobile computing systems
are computing systems that may be readily moved physically and whose computing ability may be
used while they are being moved. Mobile computing has rapidly become a vital new examp
le in today's real world of networked computing systems. It
includes software, hardware and mobile communication. Ranging from wireless laptops to cellular phones and WiFi/Bluetooth
-
enabled PDA‟s to
wireless sensor networks; mobile computing has become ub
iquitous in its influence on our quotidian lives. In this paper various types of mobile
devices are talking and they are inquiring into in details and existing operation systems that are most famed for mentioned d
evices are talking. Another
aim of this pa
per is to point out some of the characteristics, applications, limitations, and issues of mobile computing
A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...vivatechijri
The government of India recently banned Chinese application because of security implication of Indian users data and also with another collaborative aim to lead India to digitalization and self-reliance 'Atmanirbhar Bharat' made the decision to ban the Chinese application from Indian Google Play store. In this list of apps ShareIT and Xender which had become a part of regular activities of many people, used for File transferring purpose. This application was meant for sharing different formats of files among devices. Despite other alternative Indian file sharing applications users faced inconveniences as these application were less satisfactory in comparison with banned apps like the ban of ShareIT and Xender. This paper shows studies of various Indian and non-Indian file/data Transferring applications and a comparative study of the various features provided by them. This paper also focuses on the study of WIFI Direct technology which is used for file sharing, connecting among devices.
A computer network connects multiple computing devices together to allow sharing of resources and communication between devices. There are different types of networks including local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). LANs cover small areas like a home or single building. MANs span larger areas like a city. WANs are the largest type of network and can cross large distances like countries or continents. Networks require both hardware, like cables and networking devices, as well as software to manage communication and sharing of resources according to defined protocols.
For Image Authentication Problem using Encryption Technique and LDPC Source Coding is necessary in Content
Delivery via unsecure medium, Like Peer-To-Peer (P2P) File Sharing. These transferring Digital Files from one Computer to
another. Images are the Most Important Utility of our life. They are used in many applications. There are Two Main Goals of
Image Security: Image Encryption and Authentication. More different encoded versions of the original image available.In
addition, unsecure medium might tamper with the contents.. We propose an efficient, accurate, reliable process using
encryption and LDPC source coding for the image authentication problem. The key idea is to provide a Slepian-Wolf encoded
as authentication data which is encrypted using cryptography key before ready to send. The key used for encryption is usually
independent of the Plain-Image. This can be decoded with side information of an authentic image.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Peer To Peer Content Sharing On Wi-Fi Network For Smart PhonesIOSR Journals
This document summarizes a research paper on peer-to-peer content sharing on Wi-Fi networks for smart phones. It discusses using a peer-to-peer model to allow smart phones to share content like videos and photos over Wi-Fi networks without using cellular data or requiring a central server. The proposed system would allow phones to discover each other on the local network, search for files, and download content directly from other peers. This approach aims to reduce costs and bandwidth usage compared to uploading content through cellular networks or wired connections.
Video streaming using wireless multi hop in android phonesIAEME Publication
This document summarizes a research paper on implementing real-time video streaming over multiple wireless hops between Android devices. It proposes a wireless multi-hop video streaming application that allows users to capture live video on their Android devices and share it with nearby users over an ad-hoc wireless mesh network without internet. The application is broken down into a mobile client and routing layer. It implements H.264 video encoding and decoding to compress and transmit video streams over the network using Real-Time Streaming Protocol and Real-Time Transport Protocol to establish connections and control streaming between devices. The paper evaluates the application's performance in various experimental scenarios testing multi-hop video streaming feasibility on Android phones.
A Posteriori Perusal of Mobile ComputingEditor IJCATR
The breakthrough in wireless networking has prompted a new concept of computing, called mobile computing in which users tote
portable
devices have
access to a shared infrastructure, independent of their physical location. Mobile computing is becoming increasingly vital du
e to the
increase in the number of portable computers and the aspiration to have continuous network connectivity to the Internet i
rrespective of the physical
location of the node.
Mobile computing systems
are computing systems that may be readily moved physically and whose computing ability may be
used while they are being moved. Mobile computing has rapidly become a vital new examp
le in today's real world of networked computing systems. It
includes software, hardware and mobile communication. Ranging from wireless laptops to cellular phones and WiFi/Bluetooth
-
enabled PDA‟s to
wireless sensor networks; mobile computing has become ub
iquitous in its influence on our quotidian lives. In this paper various types of mobile
devices are talking and they are inquiring into in details and existing operation systems that are most famed for mentioned d
evices are talking. Another
aim of this pa
per is to point out some of the characteristics, applications, limitations, and issues of mobile computing
A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...vivatechijri
The government of India recently banned Chinese application because of security implication of Indian users data and also with another collaborative aim to lead India to digitalization and self-reliance 'Atmanirbhar Bharat' made the decision to ban the Chinese application from Indian Google Play store. In this list of apps ShareIT and Xender which had become a part of regular activities of many people, used for File transferring purpose. This application was meant for sharing different formats of files among devices. Despite other alternative Indian file sharing applications users faced inconveniences as these application were less satisfactory in comparison with banned apps like the ban of ShareIT and Xender. This paper shows studies of various Indian and non-Indian file/data Transferring applications and a comparative study of the various features provided by them. This paper also focuses on the study of WIFI Direct technology which is used for file sharing, connecting among devices.
A computer network connects multiple computing devices together to allow sharing of resources and communication between devices. There are different types of networks including local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). LANs cover small areas like a home or single building. MANs span larger areas like a city. WANs are the largest type of network and can cross large distances like countries or continents. Networks require both hardware, like cables and networking devices, as well as software to manage communication and sharing of resources according to defined protocols.
For Image Authentication Problem using Encryption Technique and LDPC Source Coding is necessary in Content
Delivery via unsecure medium, Like Peer-To-Peer (P2P) File Sharing. These transferring Digital Files from one Computer to
another. Images are the Most Important Utility of our life. They are used in many applications. There are Two Main Goals of
Image Security: Image Encryption and Authentication. More different encoded versions of the original image available.In
addition, unsecure medium might tamper with the contents.. We propose an efficient, accurate, reliable process using
encryption and LDPC source coding for the image authentication problem. The key idea is to provide a Slepian-Wolf encoded
as authentication data which is encrypted using cryptography key before ready to send. The key used for encryption is usually
independent of the Plain-Image. This can be decoded with side information of an authentic image.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Mobile technology has advanced rapidly over the past 15 years. It has transformed from simple devices allowing only voice calls to powerful computers that can access the internet, run applications, and perform many daily tasks. The evolution of mobile networks has progressed from 1G analog networks in the 1980s supporting only voice, to 2G digital networks in the 1990s adding text messaging and low-speed data. 3G networks provided increased data speeds around 2000. 4G and 5G networks continue enhancing speeds and capabilities, allowing for real-time video calls, online classes, telemedicine, and more. This technology empowers users with constant connectivity and access to information.
Smartphone's usage and their applications become
popular in our society, nowadays. One of the most influential
applications in our social life is the instant messaging application.
LINE messenger is one of the popular instant messaging
applications around Asian country. LINE has about 60 – 70
percent active users per month from 144 million accounts in
Japan, Taiwan, Thailand, and Indonesia. Like most other instant
messengers, LINE services are able to keep their user's personal
files such as text chats, pictures or photos, and video. These files
have the valuables and specific information about the user. In the
law enforcement, this kind of information can be an authentic
evidence to solve crime cases. In this paper will show the ability
of a forensic tool in acquisition digital evidence on Android
device. The work is separated into two tests, the application
analysis acquisition, and full content acquisition. The digital
evidence also has been identified, such as text chats, pictures, the
name of the sender and the recipient, and the chat time
(timestamp).
This document provides an overview of an IoT-based wireless electronic notice board project. The system will allow users to send notices from an Android phone to be displayed on an LCD screen notice board. Key aspects include:
- The main controlling device is a Raspberry Pi processor connected to a WiFi modem and LCD display. Notices sent from an Android app will be received by the WiFi modem and processed/displayed by the Raspberry Pi.
- The objectives are to develop a wireless notice board that can display notices sent from a mobile phone in a timely manner, as well as support sending documents, images, and videos.
- The existing manual notice boards have limitations like being time-consuming to maintain
The document discusses developments in computer networks and communications. It defines a computer network and how interconnected devices can communicate. Mobile computing allows wireless and portable access to networks through devices like laptops and smartphones. The document also describes different types of networks including personal area networks (PANs), virtual private networks (VPNs), wireless local area networks (WLANs), and WiMAX networks for broadband wireless access. New technologies continue to enhance mobile computing and internet access.
1. The document discusses the concept of developing a mobile application for an educational portal to enable e-learning through wireless devices. It aims to allow students to access study materials, take tests, and view evaluation results on their mobile devices.
2. The proposed system would generate analysis of student performance both individually and in groups to help assess learning and share knowledge among peers.
3. The model could be implemented as a massive open online course (MOOC) across multiple institutions to provide interactive study forums and networking opportunities for students.
The document is a module on cell phone forensics from the Computer Hacking Forensic Investigator exam. It discusses hardware and software characteristics of mobile devices, components of cellular networks including base stations and switches, different cellular network technologies, and operating systems for mobile phones. It provides information to familiarize the reader with topics relevant to analyzing data from mobile devices during forensic investigations.
1. Computer networks allow devices to exchange data through connections between nodes using cable or wireless media. The Internet is the best-known computer network.
2. Mobile computing involves mobile devices, communication, and software that allows transmission of data, voice, and video without a fixed connection. Specifications of the ZTE Obsidian phone and mobile computing services and frequencies were discussed.
3. Internet technologies like VoIP and blogs were explained. VoIP allows voice communication over IP networks. Blogs are websites with discrete blog entries displayed in reverse chronological order.
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...Eswar Publications
In recent time the use of communication gadgets (mobile phones, laptop, desktop etc.) and service for online communication between two parties over a long distance has become sine-qua-non. Some criminal minded people are using this online communication method to deceive their prey via proxy communication where individual claiming to be discussing is not really the one. In this paper, we focus on prevention of identity impersonation attacks in an Online Communication System. Peer-peer Audio Visual Communication System is design to enhance security through online communication system by revealing the identity of the communicators and records the communication if necessary. Embedded application system was design for mobile and desktop devices for audio
visual charting using modern IT devices.
Cccnc using content-based filtering in a system of recommendation in the co...Elaine Cecília Gatto
Recommendation systems provide suggestions based on information about the preferences of users. The filtering information is used by recommender systems for the processing of information and suggestions to users and content-based filtering is an approach to filtering information widely used in recommender systems. Content-Based Filtering on analyzing the correlation of the content of items with the profile, suggesting relevant items and discarding the irrelevant. Widely used on the Internet, recommendation systems are being studied for use in the context of Digital TV, there are already several studies in this direction. Just as occurs on the Internet, recommendation systems can be used in Digital TV for recommendation of TV programs, advertising and publicity and also electronic commerce. Thus, the items in the context of digital TV, may be programs, publicity / advertising and the products to be sold. Applying Content Filtering Based on the recommendation of programs, for example, it should correlate the content of these programs with user preferences, which in this scenario are the types of programs he has preferred to watch. This paper presents the studies performed with Content Filtering Based on Data Applied to Digital TV. The studies seek to observe and evaluate how some techniques of content-based filtering can be used in recommendation systems in the context of Digital TV
This document provides an overview of 5G technology and its applications in telecommunications. It discusses the evolution of mobile technologies from 1G to 5G, with each generation offering faster speeds and new capabilities. 5G will provide bandwidth of 1Gbps or higher and allow for unlimited data and call volumes. It will support new services like radio resource management and high altitude platforms. The architecture of 5G networks is described, including the use of an intelligent control system and tunnels to provide network abstraction and routing based on policies. Key features of 5G include high resolution, large bandwidth, advanced billing interfaces, and high quality services.
Police joined an investigation into the theft of a BlackBerry belonging to an attorney in the Ohio Attorney General's office. The theft occurred just hours after inspectors seized computers in the office. Investigators believed the BlackBerry may contain important information, as they doubted the story that it was stolen during a burglary. The attorney changed her statement about the details of the burglary. Inspectors also seized the BlackBerry of a man who temporarily led the Attorney General's office after the resignation of the previous head. The BlackBerry devices were thought to possibly contain information about harassment claims in the office.
Mobile computing allows transmission of data, voice, and video through wireless devices without a fixed connection. It involves mobile communication infrastructure, mobile hardware devices like smartphones and tablets, and mobile software operating systems. The technology has advanced from 1G analog cellular to 2G digital cellular, 3G broadband cellular, 4G high-speed data, and upcoming 5G which will provide wireless internet speeds over 1 Gbps. Mobile computing provides benefits like location flexibility and enhanced productivity but also poses problems regarding security, authentication, health issues, and addiction.
Penetration Testing for Android SmartphonesIOSR Journals
This document discusses penetration testing of three versions of the Android operating system (2.3, 3.2, and 4.2) using an application program and Kali Linux tools. Port scanning and exploits were used to test the security of each version. The results showed that while all versions had improved security over time, version 4.2 was the most secure with the fewest vulnerabilities found during testing. The document concludes that users should take steps to secure their Android devices like using passwords, reviewing permissions, and using antivirus software.
The document discusses smartphone forensics analysis through a case study from Oman. It summarizes the analysis of a smartphone using two forensic tools, Oxygen Forensic Suite and UFED Physical Analyzer, to extract evidence for a case where a person's phone was allegedly hacked and their WhatsApp contacts received messages. The tools found evidence that WhatsApp messages can be sent over Wi-Fi without cellular data, allowing for two possible compromise scenarios: the SIM was removed and Wi-Fi used, or the phone was sold but WhatsApp not deleted and the new owner used Wi-Fi. Comparing evidence across tools helps solve the case.
Wireless information management, a reviewAndrew Olsen
This document summarizes a review article about wireless information management. It begins by discussing the growing use of wireless systems in businesses and the challenges that arise in managing information from different wireless devices. It then examines popular wireless systems like BlackBerry and Bluetooth devices. Next, it outlines trends in wireless devices and networks such as the rise of 3G, WiFi, and Bluetooth. It also discusses challenges in securing wireless information and dealing with different standards. Finally, it stresses the importance of information managers preparing strategies to ensure the security, integrity and reliability of corporate information managed through wireless technologies.
The Assessments and Challenges of LED Generated Data Traffic using Li-Fi Tech...AM Publications
Internet today will be highly integrated with many aspects of our daily needs making it a corner stone in modern life. This dependency increased the demand on having internet services with higher Bandwidth, higher Bit Rates and lower Congestion problems. As a result, more and more applications will be widely realized for Internet based in the future, either in custom or dedicated fashion. As a result, the Light Fidelity (Li-Fi) technology - that is considered in this paper - refers to the technology that can transfer data in a faster reliable way; utilizing Light Emitted Diode (LED) bulb which is the source of illumination. The method of communication is through transfer data pulses instead of radio frequencies signals, thus providing an economic advantage by eliminating the need for complex wireless networks.
The document discusses computer security and threats. It defines computer security as protecting computer systems and information from unwanted access, damage, or modification. It describes three types of computer security: hardware security, software/data security, and network security. It also discusses various threats like viruses, Trojans, hackers, and natural disasters. It provides checklists and security measures like backups, antivirus software, firewalls, and access controls to protect against these threats.
This document summarizes several papers on crowd-sourced video sharing systems. It discusses issues with sharing redundant videos of the same event which uses significant bandwidth and battery. Approaches proposed include on-demand retrieval where metadata is uploaded and videos fetched only when a query matches. The Movisode system allows spatiotemporal queries and uploads metadata instead of full videos to the server. However, it has disadvantages as video retrieval depends on network strength and may be time consuming. Overall, the document reviews techniques for optimizing video storage, sharing and querying to minimize costs and resources.
Role of Living and Surface Anatomy in Current Trends of Medical EducationIJARIIE JOURNAL
This document discusses current trends in teaching living and surface anatomy in medical education. It notes that allocated time for anatomy teaching has decreased in medical schools in recent decades. Living and surface anatomy help students develop clinical skills. New teaching methods like body painting, peer physical examination, medical imaging and virtual anatomy software have been implemented to teach living and surface anatomy due to reduced time and advances in technology. The document reviews the history of teaching living anatomy and compares different teaching methods, emphasizing that living and surface anatomy should be an integral part of medical curricula taught through various innovative strategies.
This document describes a proposed system for an automatic energy meter reading system using an ARM7 microcontroller and GSM technology. The system would automatically send meter readings and load information daily to the electricity provider via SMS. It would also allow the provider to remotely control load disconnection if payment is not made. This would make the meter reading process more efficient and accurate compared to manual readings, while also preventing electricity theft.
This document summarizes a research paper on using k-means clustering to analyze big data. It begins with an introduction to big data and its characteristics. It then discusses related work on big data storage, mining, and analytics. The HACE theorem for defining big data is presented. The k-means clustering algorithm is explained as an efficient method for partitioning big data into groups. The proposed system uses k-means clustering followed by data mining and classification modules. Experimental results on two datasets show that the recursive k-means approach finds clusters closer to the actual number than the iterative approach. In conclusion, clustering is effective for handling big data attributes like heterogeneity and complexity, and k-means distribution helps distribute data into appropriate clusters.
Mobile technology has advanced rapidly over the past 15 years. It has transformed from simple devices allowing only voice calls to powerful computers that can access the internet, run applications, and perform many daily tasks. The evolution of mobile networks has progressed from 1G analog networks in the 1980s supporting only voice, to 2G digital networks in the 1990s adding text messaging and low-speed data. 3G networks provided increased data speeds around 2000. 4G and 5G networks continue enhancing speeds and capabilities, allowing for real-time video calls, online classes, telemedicine, and more. This technology empowers users with constant connectivity and access to information.
Smartphone's usage and their applications become
popular in our society, nowadays. One of the most influential
applications in our social life is the instant messaging application.
LINE messenger is one of the popular instant messaging
applications around Asian country. LINE has about 60 – 70
percent active users per month from 144 million accounts in
Japan, Taiwan, Thailand, and Indonesia. Like most other instant
messengers, LINE services are able to keep their user's personal
files such as text chats, pictures or photos, and video. These files
have the valuables and specific information about the user. In the
law enforcement, this kind of information can be an authentic
evidence to solve crime cases. In this paper will show the ability
of a forensic tool in acquisition digital evidence on Android
device. The work is separated into two tests, the application
analysis acquisition, and full content acquisition. The digital
evidence also has been identified, such as text chats, pictures, the
name of the sender and the recipient, and the chat time
(timestamp).
This document provides an overview of an IoT-based wireless electronic notice board project. The system will allow users to send notices from an Android phone to be displayed on an LCD screen notice board. Key aspects include:
- The main controlling device is a Raspberry Pi processor connected to a WiFi modem and LCD display. Notices sent from an Android app will be received by the WiFi modem and processed/displayed by the Raspberry Pi.
- The objectives are to develop a wireless notice board that can display notices sent from a mobile phone in a timely manner, as well as support sending documents, images, and videos.
- The existing manual notice boards have limitations like being time-consuming to maintain
The document discusses developments in computer networks and communications. It defines a computer network and how interconnected devices can communicate. Mobile computing allows wireless and portable access to networks through devices like laptops and smartphones. The document also describes different types of networks including personal area networks (PANs), virtual private networks (VPNs), wireless local area networks (WLANs), and WiMAX networks for broadband wireless access. New technologies continue to enhance mobile computing and internet access.
1. The document discusses the concept of developing a mobile application for an educational portal to enable e-learning through wireless devices. It aims to allow students to access study materials, take tests, and view evaluation results on their mobile devices.
2. The proposed system would generate analysis of student performance both individually and in groups to help assess learning and share knowledge among peers.
3. The model could be implemented as a massive open online course (MOOC) across multiple institutions to provide interactive study forums and networking opportunities for students.
The document is a module on cell phone forensics from the Computer Hacking Forensic Investigator exam. It discusses hardware and software characteristics of mobile devices, components of cellular networks including base stations and switches, different cellular network technologies, and operating systems for mobile phones. It provides information to familiarize the reader with topics relevant to analyzing data from mobile devices during forensic investigations.
1. Computer networks allow devices to exchange data through connections between nodes using cable or wireless media. The Internet is the best-known computer network.
2. Mobile computing involves mobile devices, communication, and software that allows transmission of data, voice, and video without a fixed connection. Specifications of the ZTE Obsidian phone and mobile computing services and frequencies were discussed.
3. Internet technologies like VoIP and blogs were explained. VoIP allows voice communication over IP networks. Blogs are websites with discrete blog entries displayed in reverse chronological order.
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...Eswar Publications
In recent time the use of communication gadgets (mobile phones, laptop, desktop etc.) and service for online communication between two parties over a long distance has become sine-qua-non. Some criminal minded people are using this online communication method to deceive their prey via proxy communication where individual claiming to be discussing is not really the one. In this paper, we focus on prevention of identity impersonation attacks in an Online Communication System. Peer-peer Audio Visual Communication System is design to enhance security through online communication system by revealing the identity of the communicators and records the communication if necessary. Embedded application system was design for mobile and desktop devices for audio
visual charting using modern IT devices.
Cccnc using content-based filtering in a system of recommendation in the co...Elaine Cecília Gatto
Recommendation systems provide suggestions based on information about the preferences of users. The filtering information is used by recommender systems for the processing of information and suggestions to users and content-based filtering is an approach to filtering information widely used in recommender systems. Content-Based Filtering on analyzing the correlation of the content of items with the profile, suggesting relevant items and discarding the irrelevant. Widely used on the Internet, recommendation systems are being studied for use in the context of Digital TV, there are already several studies in this direction. Just as occurs on the Internet, recommendation systems can be used in Digital TV for recommendation of TV programs, advertising and publicity and also electronic commerce. Thus, the items in the context of digital TV, may be programs, publicity / advertising and the products to be sold. Applying Content Filtering Based on the recommendation of programs, for example, it should correlate the content of these programs with user preferences, which in this scenario are the types of programs he has preferred to watch. This paper presents the studies performed with Content Filtering Based on Data Applied to Digital TV. The studies seek to observe and evaluate how some techniques of content-based filtering can be used in recommendation systems in the context of Digital TV
This document provides an overview of 5G technology and its applications in telecommunications. It discusses the evolution of mobile technologies from 1G to 5G, with each generation offering faster speeds and new capabilities. 5G will provide bandwidth of 1Gbps or higher and allow for unlimited data and call volumes. It will support new services like radio resource management and high altitude platforms. The architecture of 5G networks is described, including the use of an intelligent control system and tunnels to provide network abstraction and routing based on policies. Key features of 5G include high resolution, large bandwidth, advanced billing interfaces, and high quality services.
Police joined an investigation into the theft of a BlackBerry belonging to an attorney in the Ohio Attorney General's office. The theft occurred just hours after inspectors seized computers in the office. Investigators believed the BlackBerry may contain important information, as they doubted the story that it was stolen during a burglary. The attorney changed her statement about the details of the burglary. Inspectors also seized the BlackBerry of a man who temporarily led the Attorney General's office after the resignation of the previous head. The BlackBerry devices were thought to possibly contain information about harassment claims in the office.
Mobile computing allows transmission of data, voice, and video through wireless devices without a fixed connection. It involves mobile communication infrastructure, mobile hardware devices like smartphones and tablets, and mobile software operating systems. The technology has advanced from 1G analog cellular to 2G digital cellular, 3G broadband cellular, 4G high-speed data, and upcoming 5G which will provide wireless internet speeds over 1 Gbps. Mobile computing provides benefits like location flexibility and enhanced productivity but also poses problems regarding security, authentication, health issues, and addiction.
Penetration Testing for Android SmartphonesIOSR Journals
This document discusses penetration testing of three versions of the Android operating system (2.3, 3.2, and 4.2) using an application program and Kali Linux tools. Port scanning and exploits were used to test the security of each version. The results showed that while all versions had improved security over time, version 4.2 was the most secure with the fewest vulnerabilities found during testing. The document concludes that users should take steps to secure their Android devices like using passwords, reviewing permissions, and using antivirus software.
The document discusses smartphone forensics analysis through a case study from Oman. It summarizes the analysis of a smartphone using two forensic tools, Oxygen Forensic Suite and UFED Physical Analyzer, to extract evidence for a case where a person's phone was allegedly hacked and their WhatsApp contacts received messages. The tools found evidence that WhatsApp messages can be sent over Wi-Fi without cellular data, allowing for two possible compromise scenarios: the SIM was removed and Wi-Fi used, or the phone was sold but WhatsApp not deleted and the new owner used Wi-Fi. Comparing evidence across tools helps solve the case.
Wireless information management, a reviewAndrew Olsen
This document summarizes a review article about wireless information management. It begins by discussing the growing use of wireless systems in businesses and the challenges that arise in managing information from different wireless devices. It then examines popular wireless systems like BlackBerry and Bluetooth devices. Next, it outlines trends in wireless devices and networks such as the rise of 3G, WiFi, and Bluetooth. It also discusses challenges in securing wireless information and dealing with different standards. Finally, it stresses the importance of information managers preparing strategies to ensure the security, integrity and reliability of corporate information managed through wireless technologies.
The Assessments and Challenges of LED Generated Data Traffic using Li-Fi Tech...AM Publications
Internet today will be highly integrated with many aspects of our daily needs making it a corner stone in modern life. This dependency increased the demand on having internet services with higher Bandwidth, higher Bit Rates and lower Congestion problems. As a result, more and more applications will be widely realized for Internet based in the future, either in custom or dedicated fashion. As a result, the Light Fidelity (Li-Fi) technology - that is considered in this paper - refers to the technology that can transfer data in a faster reliable way; utilizing Light Emitted Diode (LED) bulb which is the source of illumination. The method of communication is through transfer data pulses instead of radio frequencies signals, thus providing an economic advantage by eliminating the need for complex wireless networks.
The document discusses computer security and threats. It defines computer security as protecting computer systems and information from unwanted access, damage, or modification. It describes three types of computer security: hardware security, software/data security, and network security. It also discusses various threats like viruses, Trojans, hackers, and natural disasters. It provides checklists and security measures like backups, antivirus software, firewalls, and access controls to protect against these threats.
This document summarizes several papers on crowd-sourced video sharing systems. It discusses issues with sharing redundant videos of the same event which uses significant bandwidth and battery. Approaches proposed include on-demand retrieval where metadata is uploaded and videos fetched only when a query matches. The Movisode system allows spatiotemporal queries and uploads metadata instead of full videos to the server. However, it has disadvantages as video retrieval depends on network strength and may be time consuming. Overall, the document reviews techniques for optimizing video storage, sharing and querying to minimize costs and resources.
Role of Living and Surface Anatomy in Current Trends of Medical EducationIJARIIE JOURNAL
This document discusses current trends in teaching living and surface anatomy in medical education. It notes that allocated time for anatomy teaching has decreased in medical schools in recent decades. Living and surface anatomy help students develop clinical skills. New teaching methods like body painting, peer physical examination, medical imaging and virtual anatomy software have been implemented to teach living and surface anatomy due to reduced time and advances in technology. The document reviews the history of teaching living anatomy and compares different teaching methods, emphasizing that living and surface anatomy should be an integral part of medical curricula taught through various innovative strategies.
This document describes a proposed system for an automatic energy meter reading system using an ARM7 microcontroller and GSM technology. The system would automatically send meter readings and load information daily to the electricity provider via SMS. It would also allow the provider to remotely control load disconnection if payment is not made. This would make the meter reading process more efficient and accurate compared to manual readings, while also preventing electricity theft.
This document summarizes a research paper on using k-means clustering to analyze big data. It begins with an introduction to big data and its characteristics. It then discusses related work on big data storage, mining, and analytics. The HACE theorem for defining big data is presented. The k-means clustering algorithm is explained as an efficient method for partitioning big data into groups. The proposed system uses k-means clustering followed by data mining and classification modules. Experimental results on two datasets show that the recursive k-means approach finds clusters closer to the actual number than the iterative approach. In conclusion, clustering is effective for handling big data attributes like heterogeneity and complexity, and k-means distribution helps distribute data into appropriate clusters.
This document discusses failure analysis of bearing cups in drive shaft assemblies. It aims to find a cost-effective solution to eliminate bearing cup cracking during assembly of universal joints. Various heat treatment processes are considered and carbonitriding is identified as the optimal process. It reduces bearing cup failure and manufacturing costs compared to other options like case hardening. A systematic methodology is applied, including understanding the current problem, analysis using wear testing and FEA, and implementing and confirming the effects of carbonitriding as a corrective measure.
This study aimed to correlate knee height with body height and develop regression equations to estimate body height from knee height measurements in subjects from North India. The study measured the body height and knee height of 1000 healthy subjects aged 18 and older. Knee height was found to be positively correlated with body height. Regression analyses were used to generate equations to estimate body height based on knee height, with separate equations for males and females that also included age as a predictor variable. The equations were intended to provide a more accurate estimation of body height that is less affected by age-related changes.
This document summarizes several studies on human resource management (HRM) and employee performance in the banking sector in India. It discusses the main challenges faced by banks, including adapting to changing economic conditions and regulations. Several literature reviews are also summarized that examine topics like HRM best practices, leadership styles, job descriptions, quality of worklife, and organizational effectiveness in banks. Case studies are presented on innovative HRM practices at State Bank of India, including performance appraisal, training programs, and organization development initiatives.
This document provides a literature review on work stress of employees. It discusses how stress has been defined and the sources and types of stress. It reviews signs and symptoms of stress and strategies for coping with stress such as undertaking a stress audit, using scientific inputs, and spreading messages about stress management. The literature review section summarizes 12 previous research studies on topics like occupational stress among different professions, the relationship between emotional intelligence and occupational stress, and the impact of supportive leadership in moderating job stress and performance. The conclusion emphasizes the importance of managing stress and having a positive attitude and lifestyle to deal with distress and improve organizational well-being.
This document describes the establishment of a fibroblast cell line from frozen embryos of Arbor Acre broiler chickens. Key findings include:
1) Fibroblast cells were successfully isolated from fresh and frozen embryos and exhibited typical fibroblast morphology.
2) Cell viability was over 80% after thawing frozen embryos and fibroblasts showed a population doubling time of around 42 hours.
3) Karyotyping showed the cells had a normal diploid chromosome number of 78 for chickens and a high percentage of cells were diploid.
4) Transfection of cells with a fluorescent protein vector showed protein expression and formation of fluorescent colonies over time, indicating the cells could be genetically modified.
This document discusses processing private K-nearest neighbor (KNN) queries over untrusted cloud data. It proposes a framework that uses privacy homomorphism to securely process queries while preserving the privacy of both the data owner and the client submitting queries. The framework divides query processing into node traversal and distance computation steps. It encrypts the data index and uses the cloud to decrypt distances during computation, while preventing any party from accessing the actual query or result distances. The framework allows private querying without revealing sensitive information to the cloud or data owner.
This document discusses environmental biotechnology and traditional Indian approaches to environmental issues. It provides an overview of environmental biotechnology techniques used to treat waste and pollution. It also discusses views from ancient Indian scriptures that emphasize harmony between humans and nature. The document advocates applying insights from Indian philosophy's holistic view of the world to help address modern environmental problems through a balanced approach considering both traditional knowledge and new technologies.
This document discusses the study of nonlinear behavior in vibrating systems. It begins with an abstract that defines vibration and explains why nonlinear models are needed to accurately describe real structures. The document then focuses on optimizing the vibration behavior of an absorber system with two degrees of freedom, a shock absorber, and nonlinear stiffness, subjected to harmonic loads. Both deterministic and stochastic cases are considered to find optimal response envelopes for nonlinear displacements, phases, and forces. Different types of nonlinear vibration isolators are also described, including ultra-low frequency isolators, Euler column isolators, and Gospodnetic-Frisch-Fay beam isolators.
The document discusses using Bayesian inference and Dempster-Shafer theory to establish trust relationships and achieve security in mobile ad hoc networks (MANETs). It proposes combining direct observation using Bayesian inference with indirect observation using Dempster-Shafer theory to calculate trust values for nodes. The approach is tested in simulations using the AODV routing protocol, showing improved packet delivery ratio, throughput, and end-to-end delay compared to existing systems.
This document summarizes a study on the effect of lubrication conditions on surface roughness during facing operations. The study tested different lubrication conditions (dry, semi-dry, wet) using different cutting fluids on three materials (mild steel, aluminum, cast iron) at various cutting speeds. The results showed that lubrication conditions during facing impact the roughness of machined metal surfaces, with optimal cutting fluids providing economic and environmental benefits through improved machining performance.
This document analyzes India's import demand for petroleum during a period of liberalization from 1981 to 2006. It estimates import demand functions using cointegration and error correction modeling approaches. The empirical results suggest there is a long-run equilibrium relationship between petroleum imports, import prices, income, wholesale prices, import duties, and foreign exchange reserves. The study aims to determine if liberalization policies in India impacted the country's petroleum import demand function.
This document summarizes a study on the effect of weld angles on butt weld joint strength. Specimens were made with V-groove weld geometries at included angles of 450, 500, 550, and 600 degrees. Tensile and fatigue tests were conducted on the specimens. The results showed that tensile strength and fatigue life increased with increasing included angle, with 600 degrees performing best. Tensile strength increased up to 76.64% and fatigue life up to 46.15% for the 600 degree angle compared to 450 degrees. Ultrasonic and magnetic testing found no defects in the welds. Therefore, the 600 degree angle provided better strength performance than the 450 degree commonly used.
Carbon fiber is an important material used to make lightweight and strong composite materials. It has high strength and stiffness but is also very lightweight. Carbon fiber composites are used in applications like aerospace structures, wind turbines, sports equipment, and transportation. The manufacturing process of carbon fiber involves spinning a precursor material like polyacrylonitrile (PAN) or pitch into fibers, then stabilizing and carbonizing the fibers at high temperatures to form carbon crystals within tightly bonded atomic structures. The carbon fibers are also treated and coated to improve adhesion with matrix resins and handleability. The resulting carbon fiber composites have advantages like high strength-to-weight ratio, corrosion resistance, fatigue resistance, and design flexibility.
This document proposes an improved steganography approach using color-guided channels in digital images. It begins with an introduction to steganography and discusses how it can be used to hide secret data or messages within cover objects like images, video, or audio files. The proposed method embeds data into a color image's RGB channels. It first converts the secret message to a binary bit stream and compresses it using run length encoding. The data is then embedded directly into the LSBs of some channels and indirectly into other channels by encoding counts. This approach aims to improve the visual quality of the stego image and have higher embedding capacity compared to existing methods.
This document describes the design of a test bench to test the performance of a gearbox. The test bench will allow testing of shift performance, leakage, noise, and shift force in driving and dragging conditions. The test bench design includes a fixture to hold the gearbox, a clamping arrangement, a gear shifting mechanism, and an oil dispensing, extraction and filtration unit. The main components are designed, including motors, shafts, couplings, bearings, timing belts, and the gearbox fixture. The fixture design includes resting blocks, pads and plates to support the gearbox at an angle. A pneumatic clamping cylinder is selected to fix the gearbox. A pneumatic tandem cylinder is used for the gear shifting mechanism
This document summarizes a numerical study of microchannels with internal fins for cooling electronic equipment. Three types of microchannels were studied: square channels with conventional and cross fins, and rectangular channels with conventional fins. Constant heat flux boundary conditions and laminar flow were assumed. Results for average local Nusselt number distribution along the channel length were obtained as a function of fin height ratio. An optimum fin height ratio that maximized heat transfer was found for each microchannel type. Grid independence testing was performed to select the appropriate mesh for the numerical simulations.
This document describes the design and manufacturing of an autonomous cart capable of following a user. The cart uses a Microsoft Kinect sensor to recognize and track users through voice and gesture recognition. An Arduino microcontroller controls the cart's motors to follow the user while avoiding obstacles. Two prototypes were created, with the second using stronger aluminum wheels, an acrylic base, and improved Kinect mounting. The cart aims to autonomously follow a single identified user based on their commands, maintaining distance and navigating obstacles. The document evaluates the cart's stress resistance and ability to meet the objectives of autonomous user following.
Screen sharing between android devicesvikas mishra
This document describes a project to enable screen mirroring between two Android phones. The proposed system allows a user (Presenter) to share their phone screen with another user (Viewer). It uses Wi-Fi Direct for a secure connection between the phones without needing the internet. The system architecture includes modules for registration, sharing images, audio, video and text messages. The system provides applications for entertainment and education while reducing storage usage and securing shared data on a single phone.
VIDEOCONFERENCING WEB APPLICATION FOR CARDIOLOGY DOMAIN USING FLEX/J2EE TECHN...cscpconf
This document describes a videoconferencing system designed for cardiologists using open source technologies. The system was developed using Flex and J2EE frameworks and the Red5 media server. It allows cardiologists at different remote hospitals to hold video conferences to consult experts on patient treatments. Key features included live audio/video streaming, text chat, video recording, and user/room management. The system architecture integrates Flex for the user interface with J2EE for the business logic via AMF remoting. This provides a rich internet application that can support real-time videoconferencing through a web browser.
This document describes a videoconferencing system designed for cardiologists using open source technologies. The system was developed using Flex and J2EE frameworks and the Red5 media server. It allows cardiologists at different remote hospitals to hold video conferences to consult experts on patient treatments. Key features include live audio/video streaming, text chat, video recording, and user/room management. The system architecture integrates Flex for the user interface with J2EE for the business logic via AMF remoting. This provides a rich internet application that can support real-time multimedia communication between multiple users through a standard web browser.
A Comparative Demonstration And Analysis Of File Sharing Applications On Andr...Richard Hogue
This document presents a comparative analysis of three popular file sharing applications on Android mobile devices: SHAREit, Zapya, and Xender. It discusses the growth and usage of each application worldwide, including statistics on the percentage of global smartphone users that employ each app. The document also reviews key features of the apps and identifies some issues, such as lack of encryption, that could pose security risks to files shared using them. It aims to evaluate these three file sharing applications that transfer files via Wi-Fi networks and are widely used by smartphone owners.
A novel adaptive schema to facilitates playback switching technique for video...IJECEIAES
The services of the video on demand (VoD) are currently based on the developments of the technology of the digital video and the network’s high speed. The files of the video are retrieved from many viewers according to the permission, which is given by VoD services. The remote VoD servers conduct this access. A server permits the user to choose videos anywhere/ anytime in order to enjoy a unified control of the video playback. In this paper, a novel adaptive method is produced in order to deliver various facilities of the VoD to all devices that are moving within several networks. This process is performed via mobility modules within the produced method since it applies a seamless playback technique for retrieving the facilities of the VoD through environments of heterogeneous networks. The performance of the simulation is tested for checking clients’ movements through different networks with different sizes and speeds, which are buffered in the storage. It is found to be proven from the results that the handoff latency has various types of rapidity. The method applies smooth connections and delivers various facilities of the VoD. Meantime, the mobile device transfers through different networks. This implies that the system transports video segments easily without encountering any notable effects.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The document describes a proposed Wi-Fi calling system called Wi-Call that allows voice and data communication between Wi-Fi enabled devices on a local area network (LAN) without using an internet or cellular connection. It works by converting voice signals to IP packets and transmitting them over the LAN. The system uses a web application to register users and map their IP addresses so calls can be routed properly within the dynamic IP environment of a LAN. It aims to reduce communication costs for organizations by providing free calling and data transmission within the LAN.
Service Based Content Sharing in the Environment of Mobile Ad-hoc NetworksIOSR Journals
This document discusses service-based content sharing in mobile ad-hoc networks. It proposes a peer-to-peer file sharing system that allows efficient content distribution using low-cost Bluetooth links. Peers discover each other via scanning and share subscribed content in segments over Bluetooth. The system was implemented on Blackberry and Windows Mobile smartphones to test feasibility. Tests showed file transfers were practical between mobile devices using this approach, with segment size having little effect on performance.
This document discusses mobile computing. It begins by defining mobile computing as human-computer interaction that allows transmission of data, voice and video via wireless devices without a fixed connection. It then discusses mobile communication, hardware, and software. For mobile hardware, it describes devices like smartphones, tablets, and PDAs. For mobile software, it discusses how software deals with the characteristics and requirements of mobile applications. It also covers advantages of mobile computing like location flexibility and enhanced productivity, as well as limitations like range/bandwidth and security standards. Overall, the document provides an overview of the key concepts and components of mobile computing.
Vertex – The All in one Web ApplicationIRJET Journal
The document discusses the development of Vertex, an all-in-one web application that integrates social media, music streaming, video streaming, and other applications into a single platform. It aims to improve the user experience by reducing the need to switch between multiple individual applications. The key components of Vertex include a social media app for profiles, posts and messaging, face filters, media playback and controls, and a video streaming app. The integration of these features into one application provides a more seamless experience for users.
Effective Printing Text using Bluetooth Technology from Android Applicationijtsrd
In communication Bluetooth technology is becoming popular standard, in wireless technologies it is one of the most expeditious growing field. It is very facile to utilize and can meet most of todays injuctive authorizations of mobile and personal communication wireless part of this communication is handled by Bluetooth. Between these contrivances it transmits and receives data. While mobile phone is not just a phone these days. there are no of applications used in mobile wireless printing. its quite popular to print from a mobile applications. this paper aims to do that. in market each of printer company has its own printing application. the main aim of this work is to develop only android application for all printers as to implement real time thermal printing from mobile application even through voice command. Leena Nerkar | Ankita Deore | Priyanka Mali | Mayuri Bahikar"Effective Printing Text using Bluetooth Technology from Android Application" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd12915.pdf http://www.ijtsrd.com/engineering/computer-engineering/12915/effective-printing-text-using-bluetooth-technology-from-android-application/leena-nerkar
The ubiquitous and connected nature of camera loaded mobile devices has greatly estimated the value and importance of visual information they capture. Today, sending videos from camera phones uploaded by unknown users is relevant on news networks, and banking customers expect to be able to deposit checks using mobile devices. In this paper we represent Movee, a system that addresses the fundamental question of whether the visual stream exchange by a user has been captured live on a mobile device, and has not been tampered with by an adversary. Movee leverages the mobile device motion sensors and the inherent user movements during the shooting of the video. Movee exploits the observation that the movement of the scene recorded on the video stream should be related to the movement of the device simultaneously captured by the accelerometer. the last decade e-lecturing has become more and more popular. We model the distribution of correlation of temporal noise residue in a forged video as a Gaussian mixture model (GMM). We propose a twostep scheme to estimate the model parameters. Consequently, a Bayesian classifier is used to find the optimal threshold value based on the estimated parameters. Cyrus Deboo | Shubham Kshatriya | Rajat Bhat"Video Liveness Verification" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd12772.pdf http://www.ijtsrd.com/computer-science/other/12772/video-liveness-verification/cyrus-deboo
This document describes the design of a cloud-based mobile social TV system called CloudMoV. CloudMoV allows mobile users to stream live or on-demand videos from various sources and watch them together while chatting. It utilizes cloud computing services like IaaS and PaaS to offer high quality video streaming by encoding videos at different formats and bitrates. The system architecture includes modules like transcoder, reshaper, social cloud and messenger to enable synchronized video viewing and messaging between users. The authors implemented a prototype of CloudMoV on the Amazon EC2 platform and evaluated its performance.
IRJET- Smart Voice based Notice Board using Wi-FiIRJET Journal
This document describes a smart voice-based notice board system using Wi-Fi. The system allows notices to be sent to an electronic display board using voice commands through an Android application. The app converts voice to text then transmits the message via Wi-Fi to the notice board. The system also has the ability to send alert text messages to selected contacts. The purpose is to create a more efficient paperless alternative to traditional paper-based notice boards.
Proximity marketing allows for localized wireless distribution of advertising content to individuals in a particular location who have the necessary receiving equipment. Distribution can be via traditional broadcast or targeted to specific devices known to be in the area, determined by factors like cellular location, Bluetooth/WiFi range, GPS, or NFC chips. Communications may be further targeted to specific groups and can be both time and place specific. Uses include distributing media, information, games, social apps, and advertising.
A Posteriori Perusal of Mobile ComputingEditor IJCATR
This document discusses mobile computing, including its history and characteristics. It describes how mobile computing has evolved from devices with large antennas to communicate simple messages to today's personal computers that can perform most functions wirelessly. The document outlines the key components of mobile computing including hardware, system/application software, and communication mediums. It also describes various mobile computing devices such as personal digital assistants, smartphones, tablet PCs, ultra-mobile PCs, wearable computers, and e-readers.
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
This document discusses the history and characteristics of mobile computing. It describes how mobile computing has evolved from devices with large antennas to transmit simple messages to today's smartphones and laptops with wireless connectivity. The key characteristics of mobile computing include portable hardware like laptops and smartphones, mobile operating systems like Android and Windows, and software applications. Mobile computing allows users access to data from anywhere through wireless communication networks.
This document discusses a voice-controlled robot system with two embedded systems - a master system to control the robot and a slave robot system that responds to voice commands from the master. The systems communicate wirelessly using a protocol like Bluetooth. The slave robot uses Sphinx-4 speech recognition software to understand voice commands. Video, audio and other data can be transmitted between the systems. The paper focuses on the wireless transmission of data between the embedded systems and enhancing voice processing technologies for robot control.
Real Time Head Generation for Video ConferencingIRJET Journal
This document proposes a real-time video synthesis model for video conferencing that reconstructs video at the receiver end to maintain a steady experience. It extracts and retargets motion from sender video frame by frame and synthesizes video on the receiver end using the first image and motion keypoints. This allows it to transfer facial expressions, head poses, and eye movements between videos using less bandwidth than standard H.264 video. The model uses WebRTC for peer-to-peer connections and a first-order motion model to extract and apply motion from one video to another in real-time for live video conferencing.
mumble: Framework for Seamless Message Transfer on SmartphonesAnand Bhojan
This work explores the possibility of transferring data between mobile devices that are nearby each other without the need of pairing, authentication, superuser access and Internet connectivity. Such technology can be used for emergency broadcast, traffic congestion avoidance, IoT, smart city, social and dating systems and games. Except Bluetooth Low Energy technology, there is no other protocol or technology available that allows pairing-free data transfer without Internet connectivity. Bluetooth Low Energy is capable of doing so but at a relatively short range. Using Wi-Fi Direct's Service Broadcast and Discovery, a simple yet novel method is developed which allows for seamless long range (Wi-Fi range) data transfer without Internet connectivity.
The design details of FATS-mumble can be found in the paper (http://www.comp.nus.edu.sg/~bhojan/papers/mumble15.pdf) published in ACM Mobicom 2015 SmartObjects. Please use it for all the references of this mumble project.
The project is open sourced (Github Link): https://github.com/FatsGW/FATS-Mumble.
Demo: http://youtu.be/ACmNYLd2NlI
This document summarizes the design and standardization of a scissor jack to avoid failures in the field. It presents the objectives of modifying the current jack design to improve reliability and reduce costs. It also describes developing a mathematical model for scissor jack design using inputs like vehicle weight and ground clearance. The design process involves modeling the jack in CATIA and developing equations in MATLAB to size components like the power screw, links, and nuts based on applied loads and stresses. Testing procedures are outlined to validate the jack's performance under different load conditions.
This document reviews techniques for emotion recognition from facial expressions. It begins by outlining the general steps of emotion recognition systems as face detection, feature extraction, and classification. Popular techniques discussed include principal component analysis (PCA), local binary patterns (LBP), active appearance models, and Haar classifiers. PCA and LBP were found to provide higher recognition rates. The paper also reviews the Facial Action Coding System and compares the performance of different techniques based on recognition rate. In conclusion, PCA is identified as having the highest recognition rate and performance for emotion recognition.
- The document describes a proposed zigbee-based electronic menu ordering system using an ARM7 microcontroller.
- The system has two sections - a handheld customer section and a main section. The customer section allows selecting menu items via touchscreen and sends the order wirelessly to the main section using zigbee.
- The main section receives orders from multiple customer sections via zigbee, displays orders on an LCD, and sends the data to a PC for billing purposes. The goal is to develop a low-cost wireless ordering system for small restaurants.
1) This document discusses several research papers related to continuous data acquisition algorithms for smart grids using cloud-based technologies and smart meters.
2) It summarizes papers on cloud-based smart metering systems that use standardized communication between smart meters and servers stored in the cloud to optimize energy consumption. Another paper proposes a data collection algorithm that uses energy maps and clustering to reduce energy consumption and increase network lifetime.
3) A third paper discusses utilities using satellites to remotely collect meter data in real-time for accuracy. A final paper presents an algorithm for smart building power consumption scheduling that uses smart meters and dynamic pricing to incentivize shifting usage to low-cost time periods.
1. The document summarizes T.S. Eliot's 1934 work "After Strange Gods" in which he advocates for cultural and religious homogeneity. He argues societies with multiple cultures will become "adulterate" and that a shared religious background is necessary.
2. Eliot discusses his views on tradition, arguing it should not be associated with fixed dogmas but should evolve over time. However, he is criticized for holding anti-Semitic views and an attitude of cultural superiority.
3. The work analyzes Eliot's commentary on various 20th century writers, assessing whether they conform to his ideas of tradition and orthodoxy. Eliot advocates a centralized control of religion, culture,
This document summarizes an experimental investigation of welding distortion in austenitic stainless steel 316 using TIG welding. Taguchi methods were used to design experiments varying welding current, speed, and groove angle at three levels each. Welding was performed and distortion was measured. ANOVA was conducted to determine the significant parameters affecting distortion. Current was found to have the greatest effect on distortion, followed by groove angle, while speed had less influence. The goal of the study was to optimize welding parameters to minimize distortion using Taguchi methods.
This document discusses various load balancing algorithms that can be applied in cloud computing. It begins with an introduction to cloud computing models including infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). It then discusses the goals of load balancing in cloud computing. The main part of the document describes and provides examples of several load balancing algorithms: Round Robin, Opportunistic Load Balancing, Minimum Completion Time, and Minimum Execution Time. For each algorithm, it explains the basic approach and provides an example to illustrate how it works.
This document describes the design and standardization of a toggle jack. It begins with an abstract that outlines the purpose and components of a toggle jack. It then provides background on toggle jacks and their advantages over other jack designs. The main body of the document details the design process, including formulas and sample calculations for sizing the screw, nut, pins, and links based on design loads. It presents a sample design calculation for a 3kN load using medium carbon steel for the screw and phosphor bronze for the nut. Charts of results show stress values remain below allowable limits. The conclusion indicates alloy steel and phosphor bronze is a suitable material combination that keeps stresses within safe limits compared to other materials.
1. Vol-1 Issue-2 2015 IJARIIE-ISSN(O)-2395-4396
1186 www.ijariie.com 344
VIDEO STREAMING AND CONTENT
SHARING USING ANDROID
Vedavathi N
Assistant Professor, Computer Science and Engineering, NIE Institute of Technology, Mysore,
Karnataka, India
ABSTRACT
With the rising penetration of smartphones in the consumer market, mobile multimedia content is becoming the
dominant form of information that people produce and consume on a daily basis. In this paper, wireless video
streaming and content sharing application for mobile phones with the Android operating system is presented. Video
Streaming and Content Sharing is a Peer to Peer technology in which the Android cell phone will be one peer and
the PC will be the other peer of the network. Video streaming application for mobile phones with the Android
operating system allows sharing of live information that is being captured by mobile phone sensors (e.g., camera,
microphone) with computers within the Wi-Fi communication range. The live video is observable on the computer’s
screen. The video streaming which is based on peer-to-peer communication between mobile phone and the PC is
without the use of video processing servers or network infrastructure. Peer-to-peer video streaming from the
cameras on smartphones to people nearby allows users to share what they see. Such streaming can be used in a
variety of applications; in particular in various social network applications including sharing unforgettable
moments with friends , cooperative fieldwork i.e., providing video sharing for teams distributed in a small area,
example, teams of repairmen, and search and rescue teams in disaster areas, and support for health impaired
persons including the elderly. Content sharing can be used for applications like seeing or browsing an image or text
file on Android mobile phone which is stored in a computer. And also, image or text files stored in android mobile
can be moved on to the computer available within Wi-Fi communication range.
Keyword: - Android, Peer-to-Peer, Video Streaming, Content Sharing
1. INTRODUCTION
With the rising penetration of smartphones in the consumer market, mobile multimedia content is becoming the
dominant form of information that people produce and consume on a daily basis. The International
Telecommunication Union’s (ITU) statistics on mobile subscriptions indicates five billion mobile subscriptions for
2010, with a 17% penetration of smartphones in 2009. The rapid adoption of smartphones has created a unique
opportunity for mobile multimedia services for mobile users. Currently a majority of smartphones are equipped with
both hardware and wireless communication that supports real-time video processing [1] and other information
exchange.
1.1 Video Streaming and Content Sharing
Video streaming addresses the problem of transferring video data as a continuous stream. With streaming, the end-
user can start displaying the video data or multimedia data before the entire file has been transmitted. To achieve
this, the bandwidth efficiency and flexibility between video servers and equipment of end-users are very important
and challenging problems. In response to such challenges, a variety of video coding and streaming techniques have
been proposed to provide video streaming services.
2. Vol-1 Issue-2 2015 IJARIIE-ISSN(O)-2395-4396
1186 www.ijariie.com 345
Fig -1: A Typical Video Streaming System
A typical video streaming system is shown in Fig 1, which consists of an encoder, a distribution server with video
storage, a relay server and end-users that receive the video data. The distribution server stores the encoded video
data and begins to distribute data for the client. Users can watch the video whenever and wherever by accessing the
server over the networks. Encoding and distribution is carried out in real time in the case of live distribution and
may not be performed in real time for on-demand type of applications [2].
Video streaming application for mobile phones with the Android operating system allows sharing of live
information captured by mobile phone sensors (e.g., camera, microphone) with others. The video streaming is based
on peer-to-peer communication between mobile phones, i.e. without the use of video processing servers or network
infrastructure.
Peer-to-peer video streaming from the cameras on smartphones to people nearby allows users to share what they see.
Such streaming can be used in a variety of applications, in particular in various social network applications
including sharing unforgettable moments with friends , cooperative fieldwork i.e., providing video sharing for teams
distributed in a small area, example, teams of repairmen, and search and rescue teams in disaster areas, and support
for health impaired persons including the elderly.
Content Sharing is a Peer to Peer technology in which the Mobile will be one peer of the network and the PC will be
the other peer of the network. Many modern handheld devices feature functions of taking pictures, shooting video
clips, or recording audio sounds. However, such devices are usually equipped with small display panels and poor
acoustic equipment. In order to achieve better user experience with high quality panel or audio stereo, users often
need to transfer or copy digital media contents to external powerful devices, like personal computers and home
theater devices. Nevertheless, it can be difficult for users to follow up a series of operations of connection setup and
media content transfer [3].
We can connect two discrete systems in a network and do a peer to peer networking. The information which is
stored in the system can be viewed through the mobile by the users. This makes the users to know the information
and the pictures in the mobile can also be transferred to the system if there is no enough space in the mobile. This
system is used for applications like seeing or browsing a file which is there in a remote computer, storing images
and text taken in the mobile to the home computer.
1.2 Related Work
Abhishek Barve and Pragnesh shah [2] proposed a monitoring scheme prototype based on android smart phone
terminal. By collecting and processing data at server, sending data to smart phone terminal via Web Services, it
reaches the purpose of monitoring the target site anywhere and anytime under the coverage of wireless network and
enhances the flexibility of streaming greatly. In the paper authored by Huifang Sun, Anthony Vetro and Jun Xin [3]
proposed streaming techniques mainly from signal processing perspective. Here, scalable video coding techniques
are reviewed and various video streaming methods are presented. Various network related issues for scalable video
streaming are covered. Also, a specific method of scalable video streaming that is based on regions-of interest is
discussed.
In [4], a wireless multi-hop video streaming application for the Android based mobile devices (including Android
based tablet PCs) has been presented. This application allows users to capture live video using camera on mobile
devices, and to share this video feed with people nearby using a free-of-charge wireless mesh network. Routing
protocols can be installed to facilitate the multi-hop communication to go beyond a single hop. Here an example
3. Vol-1 Issue-2 2015 IJARIIE-ISSN(O)-2395-4396
1186 www.ijariie.com 346
application scenario is depicted in which a person streams live video of a concert to friends nearby over the wireless
mesh network of phones, without being caught by the expensive mobile phone bill. They evaluated the presented
peer-to-peer video streaming application in a variety of experiments. In these experiments it is showed that
feasibility of peer-to-peer video streaming for various generations of Android phones and also evaluated
performance of various video encoding and decoding schemes.
Chih-Lin Hu, Wei-Shun Liao and Yen-Juhuang[5] proposed a design and the development of a mobile media
content sharing mechanism in UPnP-based home network environments. They integrated the WLAN technology
into the UPnP middleware, and noticeably implement an interesting mobile content sharing scenario on a specific
mobile phone platform. In compliance with the DLNA interoperability guideline, a mobile media server which is
able to discover, interconnect with, and transfer media files to other UPnP-/DLNA-compliable devices is developed.
Accordingly, the developed mobile phones and home networked devices can communicate with each other through
UPnP networking. Mobile phones can serve as “temporary” mobile content servers at any time they want to share
stored media contents to be processed directly on external media player devices. As a result, users can conveniently
and effectively share their favorite media contents anywhere and anytime, without need of unfriendly manual
operations of connection setup and data file transfer, in a home network environment where the proposed
mechanism is deployed.
In a work carried out by D. Shiny Irene [5], an Android Application which is kept in cloud, which deals with
accessing the text files in the system and transferring the pictures to the system from anywhere in the world through
the mobile without a centralized server is reported. The mobile will specify the filename and the system will search
the directories for the specified filename, from which the contents can be viewed through the mobile. For this
process, Android application should be developed in the mobile and cloud application has to be developed in the
system. The connection between the mobile and the system is developed using Cloud and Android. The main
requirement is that the system must be switched ON with internet connection enabled and the mobile should have
GPRS connection.
2. SYSTEM ANALYSIS AND DESIGN
Many real-time video streaming and content sharing services between mobile and PC have been proposed. But many
of them adopt the client-server architecture; that is, mobile phones stream live video to centralized processing
servers using the available network infrastructure. Video sharing is then done over the Internet, placing great
dependency on the network infrastructure. Similarly, for content sharing, images, text and other files that need to be
sent or received from the mobile or PC should be available in the centralized server and then need to be accessed.
Infrastructure based networks may not always be available or affordable and Internet Connectivity in Mobile
Sharing is not a reality in mobile Environments. Prior works have examined that the messages can impact network
congestion and power dissipation of small electronic devices.
2.1 Proposed System
In the proposed video streaming application, the streaming is based on peer-to-peer communication between mobile
phone and PC, i.e. without the use of video processing servers or network infrastructure. This system also makes a
person possible to get the contents of the text file as well as images stored in the system from anywhere within the
Wi-Fi range through the mobile. Sometimes there may not be enough memory space in the mobile to save the
pictures taken, at this point of time, the person can transfer the pictures to the system without a centralized server
and carry on taking pictures and can share the text files as well. The system promotes easy accessibility. Easy
accessibility is achieved because Android application processing is more secure.
4. Vol-1 Issue-2 2015 IJARIIE-ISSN(O)-2395-4396
1186 www.ijariie.com 347
Fig -2: System Architecture
The System architecture of the proposed system is as shown in the Fig 2, consisting of Android Mobile phone and
PC connected together using Wi-Fi for the purpose of Video Streaming and Content Sharing.
For the realization of Video Streaming, the various stages are as shown in the Fig 3. When starting the streaming
application, it should go through various stages. Raw video data is retrieved from the camera and then passed to the
encoder, which encodes the data using the selected codec and encoding technique. The encoded video is then
transmitted over-the-air by the Wi-Fi module. At the receiver, when an encoded video is arrived, it is decoded and
displayed.
Fig -3: Stages in Video Streaming
2.2 System Functionality
Main modules of the application are as follows:
User Interface
This Module gives the basic interface for the user to use the application. This should include options for entering the
IP address and register the PC(s) for communication. It provides three other options, “Streaming”, “Upload” and
“Download”.
Register
This Module is designed to establish connection between mobile and PC between which information can be
transmitted or shared. Here, IP address of PC to which video to be streamed is registered. Any number of PC(s) can
be registered.
This module checks whether the video is streamed to the registered and the specified computer and not any other
system. It checks for the same during content sharing.
Streaming
This module enables the application on Android phone to capture video into a sequence of frames. And it streams
the live video feed captured by the mobile phone to the registered computer or computers based on selective
broadcast.
5. Vol-1 Issue-2 2015 IJARIIE-ISSN(O)-2395-4396
1186 www.ijariie.com 348
Upload
This module is responsible for realizing Content Sharing feature of the system. For that purpose IP address of the
PC, with which sharing happens, needs to be entered. Then, the entered IP address is validated and then, any image
or text files available with Android phone can be uploaded on to the PC.
Download
This module also enables us to achieve Content Sharing functionality. Here, the application is able to access any of
the image or text files stored on PC. Again for this to happen, IP address of the PC needs to be entered and
validated.
The flow of functionalities through these modules is as shown in Fig. 4.
Fig- 4: Flow of Functionalities
6. Vol-1 Issue-2 2015 IJARIIE-ISSN(O)-2395-4396
1186 www.ijariie.com 349
3. SYSTEM IMPLEMENTATION AND RESULTS
In this section it is explained how the system is realized as a whole through the implementation of various modules.
Implementation details of all the modules along with the obtained results are depicted in the following sub-sections.
3.1 Language Used
The proposed system is implemented using Java language. Java is a programming language originally developed
by James Gosling at Sun Microsystems (which is now a subsidiary of Oracle Corporation) and released in 1995 as a
core component of Sun Microsystems’ Java platform. The language derives much of its syntax from C and C++ but
has a simpler object model and fewer low-level facilities. Java applications are typically compiled to byte
code (class file) that can run on any Java Virtual Machine (JVM) regardless of computer architecture. Java is a
general-purpose, concurrent, class-based, object-oriented language that is specifically designed to have as few
implementation dependencies as possible. It is intended to let application developers "write once, run anywhere".
Java is currently one of the most popular programming languages in use, and is widely used from application
software to web applications [7].
3.2 Platform
A platform is a crucial element in software development. A platform might be simply defined as “a place to launch
software”. The application has two terminals PC and mobile phone. For PC any platform that allows java
application to be run can be used. Here it is implemented on Microsoft Windows platform for the ease of use. The
platform used for mobile phone is the main highlight i.e. Android Operating System.
3.3 Main GUI of the Application
Once the application deployed on Android phone is opened, the user will get to see the following user interface as
shown in Fig 5. By looking at the GUI, user can use the features implemented in the Application.
Fig- 5: Application User Interface
7. Vol-1 Issue-2 2015 IJARIIE-ISSN(O)-2395-4396
1186 www.ijariie.com 350
3.4 Video Streaming
Once the PC(s) are selected through the Register option, the user has to click the Streaming button of the user
interface. When the Streaming button has been clicked, phone camera will start capturing the video. At the PC end
java application should be running in order to receive the video stream. At this point, the screen shown in Fig 6 will
be on PC window. This window indicates that the PC is ready to receive video.
Fig- 6: Initial Window of Video Streaming
Once the user taps on the Android phone screen, then, the video is observable on PC window. And the mobile
phone will start capturing the video which is observable on the registered PC(s) within the Wi-Fi communication
range as shown in the Fig 7.
Fig- 7: Video Streaming
8. Vol-1 Issue-2 2015 IJARIIE-ISSN(O)-2395-4396
1186 www.ijariie.com 351
3.5 Content Sharing
Content Sharing is achieved through two modules Upload and Download shown in the Fig 5. Upload feature is for
transferring images or text files from Android phone to PC. After the IP address has been specified and the Upload
button has been clicked, the screen as shown in Fig 8 will be seen on Android phone.
Fig- 8: Uploading of Files
Download feature is for transferring images or text files from PC to Android phone. The IP address has to be
entered in order to specify from which PC within Wi-Fi, we wish to access the files. Having entered IP address and
clicked Download button, the following screen Fig.9 will be seen on mobile phone. And, the user has to specify the
filename to be downloaded from the PC and click upon Download button. On successful transfer, a status “File
downloaded successfully” will be displayed on PC window as well as phone screen.
Fig- 9: Downloading files
9. Vol-1 Issue-2 2015 IJARIIE-ISSN(O)-2395-4396
1186 www.ijariie.com 352
4. CONCLUSIONS
Using the peer to peer technology text files and images are retrieved from the system through the mobile and also
are transferred from the mobile to the system with in Wi-Fi range. Streaming of the video, captured using mobile
camera to the PCs located anywhere within Wi-Fi range is implemented through this system. And hence video
streaming and content sharing is achieved.
Thus the video streaming or content sharing does not rely on a traditional network infrastructure (such as the
cellular), or any intermediate servers, hence making the system simpler and easy to use.
In future, Android Application can be kept in cloud, which deals with accessing the text files in the system and
transferring the pictures to the system from anywhere in the world through the mobile without a centralized server.
The mobile will specify the filename and the system will search the directories for the specified filename, from
which the contents can be viewed through the mobile. For this process, Android application should be developed in
the mobile and cloud application has to be developed in the system. The connection between the mobile and the
system is developed using Cloud and Android. The main requirement is that the system must be switched ON with
internet connection enabled and the mobile should have GPRS connection.
For future work it is possible to develop a richer user interface with additional features, such as implementing
multicast over multiple hops and allowing users to record video contents on local SD cards while streaming or
forwarding. If the captured video can be stored onto some back end database, then the application can be used as a
Surveillance System as well.
REFERENCES
[1] ITU. Statistics on global mobile subscriptions. http://www.itu.int/newsroom/press releases/2010/06.html.
[2] Abhishek Barve, Pragnesh shah, “Android based Remote Monitoring System” International Conference in
Recent Trends in Information Technology and Computer Science (2007).
[3] Huifang Sun, Anthony Vetro, Jun Xin. “An Overview of Scalable Video Streaming”, Published in Wireless
Communications and Mobile Computing Vol 7, Issue 2 (2007).
[4] Peizhao Hu, Nick Symons, Jadwiga Indulska, and Marius Portmann, “Share your view: wireless multi-hop
video streaming using Android phones”, PerCom Workshop on Pervasive Wireless Networking, IEEE International
Conference 782-787, Lugano (2012).
[5] Chih-Lin Hu, Wei-Shun Liao and Yen-Ju Huang,“Mobile Media Content Sharing in UPnP-Based Home
Network Environment”, International Symposium on Applications and the Internet Workshops, IEEE conference
publications, 1753-1769, Hiroshima(2008).
[6] D. Shiny Irene, “Video surveillance system and content sharing between pc and Mobile using android”,
International Journal of Computational Linguistics and Natural Language Processing Vol 1 Issue 5 (2012).
[7] Herbert Schildt, Java™: The Complete Reference, Seventh Edition.