A new architecture for defining network collaboration in DASH is called SAND. It aims to standardize communication amongst network agents participating in the streaming process. This work produces a novel taxonomy for SAND-based approaches. It places AVS solutions into four categories: (1) Management Architecture (2) Cache-based, (3) Optimization, and (4) Paradigm. Sub-categories of Management Architecture are (a)
Cognitive, (b) Prioritization, and (c) Encoding and Signaling, while sub-categories of Paradigm are (a) SDN-based,
(b) CDN-based, and (c) CCN-based. The approaches representing each category are presented. It is shown that
using the SANDs architecture proves beneficial to approaches adopting it. In recent years Cloud-based strategies for AVS have been an important area of research and industry. This paper elaborates on Cloud-based strategies.
It places current strategies into a taxonomy. The Cloud-based AVS strategies are categorized into (1) Social Awareness,
(2) Cloud-based CDN, (3) Cloud-based Gaming, (4) Cloud-based SDN, (5) File-hosting services, (6)
View synthesis techniques, and (7) Error Concealment techniques. The implementations that exist for the Cloudbased
strategies are discussed. Thus, the advantages of both SAND and Cloud-based approaches for use in DASH based
systems are illustrated.
This document provides a method for optimizing the handover success rate (HOSR) on GSM BSS networks. It analyzes factors that affect HOSR, such as hardware failures, configuration issues, interference and coverage problems. The document describes processes for locating HOSR problems and provides optimization methods, including automatic neighboring cell configuration. Case studies demonstrate issues such as failed handovers due to incorrect BSIC decoding or timer configuration. Logs and traffic data are sources for analyzing HOSR performance.
This document provides guidance on optimizing the uplink-downlink balance in GSM BSS networks. It describes the principles of uplink-downlink balance, including how to evaluate it using measurements like the uplink-downlink level difference. It also identifies factors that can cause imbalance, such as antenna issues, and provides a procedure for analyzing problems and optimization cases. The goal is to achieve balanced uplink and downlink coverage across the cell.
This document provides guidance on optimizing the Call Setup Success Rate (CSSR) in GSM networks. It defines CSSR as the probability of successful calls initiated by mobile stations. The CSSR is calculated based on the Immediate Assignment Success Rate, Assignment Success Rate, and SDCCH Drop Rate. The document describes factors that can influence the CSSR, including issues on the Um, Abis, and A interfaces. It outlines a process for analyzing low CSSR that involves checking whether problems relate to the immediate assignment, SDCCH drop rate, or assignment success rate by using specific measurements and metrics. Optimization methods involve adjusting related configurations based on manuals for those individual KPIs.
This document discusses optimization of RTT delay in GSM BSS networks. It defines RTT delay as the time for a packet to reach its destination and receive a response. Long RTT delays lower bandwidth utilization rates. The document analyzes the Ping process used to measure RTT delay and describes tools for tracing signaling and packets. It identifies factors that contribute to RTT delay in GPRS/EGPRS systems, including system processing delays, transmission delays between network elements, data transfer delays, and delays due to TBF establishment and release. The goal is to minimize these delays to improve bandwidth utilization and response times.
This document provides guidance on optimizing the download rate in GSM networks. It describes analyzing download performance by testing in idle hours and comparing busy versus idle periods. Problems like insufficient channel assignment, high error rates, or abnormal call releases can reduce rates. The document also discusses radio resource management, link quality algorithms, and synchronization mechanisms to improve rates through routine optimization techniques.
This document provides guidance on optimizing mean opinion score (MOS) for GSM base station subsystem (BSS) networks. It discusses factors that affect MOS, such as interference levels and coding rates. Methods are presented for analyzing low MOS problems, including checking interfaces and equipment. The document also covers objective evaluation tools like PESQ and considerations for testing existing networks.
Server-based and Network-assisted Solutions for Adaptive Video StreamingEswar Publications
This document discusses server-based and network-assisted solutions for adaptive video streaming. It begins with an abstract that outlines server-based adaptive streaming is gaining popularity as clients and network devices are not powerful enough to run advanced adaptation algorithms. The document then provides a taxonomy that categorizes adaptive video streaming solutions and focuses on server-based and network-assisted solutions. It discusses various classical computing approaches relevant to server-based solutions such as traffic shaping, video pacing, and rate limiting. The document also proposes a taxonomy of server-based approaches and discusses state-of-the-art solutions for traffic management and protocol/parameter-centric categories. Finally, it discusses network-assisted solutions and recent approaches that show the advantages of using network-
This document provides guidance on optimizing the paging success rate key performance indicator (KPI) in GSM base station subsystem (BSS) networks. It defines paging success rate as the ratio of paging responses received to paging requests sent. The document outlines potential causes of low paging success rates such as hardware faults, transmission problems, parameter misconfiguration, interference, coverage issues, and uplink/downlink imbalance. It then provides detailed analysis and optimization procedures to address each cause. Case studies demonstrate how to resolve real-world paging success rate issues.
This document provides a method for optimizing the handover success rate (HOSR) on GSM BSS networks. It analyzes factors that affect HOSR, such as hardware failures, configuration issues, interference and coverage problems. The document describes processes for locating HOSR problems and provides optimization methods, including automatic neighboring cell configuration. Case studies demonstrate issues such as failed handovers due to incorrect BSIC decoding or timer configuration. Logs and traffic data are sources for analyzing HOSR performance.
This document provides guidance on optimizing the uplink-downlink balance in GSM BSS networks. It describes the principles of uplink-downlink balance, including how to evaluate it using measurements like the uplink-downlink level difference. It also identifies factors that can cause imbalance, such as antenna issues, and provides a procedure for analyzing problems and optimization cases. The goal is to achieve balanced uplink and downlink coverage across the cell.
This document provides guidance on optimizing the Call Setup Success Rate (CSSR) in GSM networks. It defines CSSR as the probability of successful calls initiated by mobile stations. The CSSR is calculated based on the Immediate Assignment Success Rate, Assignment Success Rate, and SDCCH Drop Rate. The document describes factors that can influence the CSSR, including issues on the Um, Abis, and A interfaces. It outlines a process for analyzing low CSSR that involves checking whether problems relate to the immediate assignment, SDCCH drop rate, or assignment success rate by using specific measurements and metrics. Optimization methods involve adjusting related configurations based on manuals for those individual KPIs.
This document discusses optimization of RTT delay in GSM BSS networks. It defines RTT delay as the time for a packet to reach its destination and receive a response. Long RTT delays lower bandwidth utilization rates. The document analyzes the Ping process used to measure RTT delay and describes tools for tracing signaling and packets. It identifies factors that contribute to RTT delay in GPRS/EGPRS systems, including system processing delays, transmission delays between network elements, data transfer delays, and delays due to TBF establishment and release. The goal is to minimize these delays to improve bandwidth utilization and response times.
This document provides guidance on optimizing the download rate in GSM networks. It describes analyzing download performance by testing in idle hours and comparing busy versus idle periods. Problems like insufficient channel assignment, high error rates, or abnormal call releases can reduce rates. The document also discusses radio resource management, link quality algorithms, and synchronization mechanisms to improve rates through routine optimization techniques.
This document provides guidance on optimizing mean opinion score (MOS) for GSM base station subsystem (BSS) networks. It discusses factors that affect MOS, such as interference levels and coding rates. Methods are presented for analyzing low MOS problems, including checking interfaces and equipment. The document also covers objective evaluation tools like PESQ and considerations for testing existing networks.
Server-based and Network-assisted Solutions for Adaptive Video StreamingEswar Publications
This document discusses server-based and network-assisted solutions for adaptive video streaming. It begins with an abstract that outlines server-based adaptive streaming is gaining popularity as clients and network devices are not powerful enough to run advanced adaptation algorithms. The document then provides a taxonomy that categorizes adaptive video streaming solutions and focuses on server-based and network-assisted solutions. It discusses various classical computing approaches relevant to server-based solutions such as traffic shaping, video pacing, and rate limiting. The document also proposes a taxonomy of server-based approaches and discusses state-of-the-art solutions for traffic management and protocol/parameter-centric categories. Finally, it discusses network-assisted solutions and recent approaches that show the advantages of using network-
This document provides guidance on optimizing the paging success rate key performance indicator (KPI) in GSM base station subsystem (BSS) networks. It defines paging success rate as the ratio of paging responses received to paging requests sent. The document outlines potential causes of low paging success rates such as hardware faults, transmission problems, parameter misconfiguration, interference, coverage issues, and uplink/downlink imbalance. It then provides detailed analysis and optimization procedures to address each cause. Case studies demonstrate how to resolve real-world paging success rate issues.
The document provides suggestions to improve DCR (drop call rate) after a swap project. It discusses checking for hardware problems like alarms, VSWR, and resetting sites. It also recommends adjusting cell configuration parameters like power levels, send/receive modes, and neighbor relationships. Finally, it suggests configuring data parameters like coverage, interference, and handover settings by collecting measurements and adjusting values for thresholds, timeouts, and filters. Adjusting these hardware, configuration, and data parameters based on analysis of measurements can help reduce drop calls after a swap.
This document summarizes a research paper on optimizing quality of service (QoS) and analyzing performance in Next Generation Networks (NGN). It discusses how applying QoS technologies from Huawei can improve capacity and QoS in NGN. The optimized NGN is simulated using different codecs and traffic loads. Simulation results show that G.711 provides better voice quality while G.729 allows higher capacity. Analysis of the simulation matches theoretical models. Overall, the optimized NGN can provide both high voice quality and capacity through adaptive use of codecs.
The document provides guidance on optimizing the TCH assignment success rate KPI in GSM networks. It defines TCH assignment success rate and recommends a formula to calculate it. It then describes 9 major factors that can influence the KPI, such as hardware faults, transmission issues, parameter settings, interference, and coverage problems. The document provides procedures to analyze assignment failures, including checking for technical issues, transmission problems, parameter settings, interference, coverage, antenna issues, repeater problems, and mobile device compatibility. Optimization methods are suggested for each type of problem.
The document describes a measurement-based VoIP quality management system that monitors call quality on different network paths and uses this information to select the best path for new calls. It monitors metrics like packet loss and jitter for active calls grouped by network path. Path quality is used to restrict routing of new calls through lower quality paths. The system provides passive monitoring and active routing based on monitored quality.
This document provides an overview of Long Term Evolution (LTE) radio access network planning. It covers LTE fundamentals and key technologies including OFDM, SC-FDMA, frame structure and reference signals. Frequency and spectrum planning includes channel bandwidth, spacing and raster. Link budget and coverage planning outlines propagation parameters, equipment parameters and system reliability factors. Interference and guard band analysis examines interference between TDD systems and spectrum refarming. Network capacity planning defines capacity and limiting factors. The document also provides guidance on U-Net simulation and operation for LTE network planning.
This document provides guidance on optimizing the TCH call drop rate KPI in GSM networks. It defines the TCH call drop rate and recommends formulas for calculating it. It then discusses factors that can affect the TCH call drop rate, such as hardware failures, transmission problems, parameter settings, interference, coverage issues, and antenna problems. The document provides detailed steps for analyzing high TCH call drop rates, including checking hardware, transmissions, software versions, parameter settings, interference, coverage, antenna systems, uplink/downlink balance, and repeaters. It also includes several case studies and recommendations for optimization.
This document lists IEEE projects completed in 2014 and 2015. It includes over 40 projects related to cloud computing, network security, ad hoc and mobile networks, wireless sensor networks, Android projects, data mining, wireless communication, image processing, and J2ME mobile projects. The document provides contact information for technical details about the projects.
The document provides definitions and analysis methods for optimizing the Call Setup Success Rate (CSSR) in GSM networks. It defines the CSSR, lists influencing factors, and describes a three-step analysis and optimization process. The process involves identifying causes of low CSSR related to assignment success rate, immediate assignment success rate, or SDCCH drop rate. An optimization case from Vietnam addresses a difference in core network mechanisms that lowered the CSSR.
This document describes a proposed approach called Resource Allocation with Connection Admission Control (RA-CAC) and Adaptive Rate Scheduling (ARS) to improve quality of service for real-time traffic in WCDMA networks. The RA-CAC algorithm determines the optimal number of users to admit while minimizing call rejection rates. The ARS then adjusts transmission rates of admitted sessions based on feedback to better utilize network resources. Simulation results showed this approach increased delivery ratio, throughput and reduced delays compared to other resource allocation methods.
This document provides an analysis of common problems that can cause poor network coverage in GSM networks. It discusses issues related to engineering quality, network planning and optimization, non-Huawei devices, and equipment faults. The document also provides a troubleshooting process and analyzes typical cases to help engineers identify and resolve coverage problems.
The document provides an overview, definitions, and recommended formulas for calculating the TCH call drop rate KPI. It describes the key signaling procedures and measurement points for analyzing call drops. Furthermore, it discusses nine major factors that can affect the TCH call drop rate, such as hardware failures, transmission problems, parameter settings, interference, coverage issues, and antenna system problems. The document also provides solutions and case studies for optimizing the TCH call drop rate.
This document provides guidance on optimizing call setup time (CST) in GSM networks. It defines CST, lists influencing factors like procedure configuration, parameter settings, routing, and hardware issues. It describes the analysis process and provides optimization methods for each factor. Specific optimization cases are also presented, like long CST due to inconsistent signaling procedures between vendors. The document aims to help operators analyze CST issues and identify optimization solutions.
The document provides guidance on optimizing the TCH congestion rate KPI in GSM networks. It defines TCH congestion rate, discusses its impacts, and identifies potential influencing factors including network capacity, faults, interference, parameter settings, third-party devices, and software versions. The document then outlines an analysis procedure and provides optimization methods addressing each influencing factor, such as traffic balancing, hardware troubleshooting, interference reduction, parameter tuning, and capacity expansion. Example cases are also presented.
The document discusses key performance indicators (KPIs) for GSM base station subsystem (BSS) networks, including the paging success rate KPI. It defines paging success rate, describes factors that affect it such as coverage, interference, and traffic volume. The document also discusses network parameters that impact paging success rate, such as paging times/intervals, paging based on location area versus all cells, and mobility management parameters like T3212. The goal is to understand KPI measurement points and constraints in order to optimize network performance.
This document provides an optimization manual for improving the TCH assignment success rate (KPI) in GSM BSS networks. It defines TCH assignment success rate and lists key factors that influence it, such as hardware faults, interference issues, coverage problems, and parameter settings. The document then describes procedures for analyzing assignment failures, including checking hardware status, transmission quality, and parameter settings. Finally, it provides optimization methods and case studies.
This document discusses network provisioning for multimedia services using traffic aggregation. It covers topics like network provisioning, packet aggregation, traffic engineering, dimensioning, traffic analysis and aggregation. Methods are proposed for optimizing network resource reservations to guarantee delay bounds for aggregated multimedia traffic, including using real video traces and generating synthetic aggregates. Network provisioning scenarios are described for provisioning using real traces, dynamic aggregates, traffic patterns, and optimizing bandwidth utilization.
This document provides a method for optimizing the Handover Success Rate (HOSR) as a key performance indicator for GSM networks. It analyzes factors that affect HOSR on the BSS side and provides troubleshooting steps to quickly locate low HOSR issues. Optimization measures are proposed to improve HOSR and meet requirements for solving handover problems. The document is intended to help optimize network performance and monitor quality.
A CLASS-BASED ADAPTIVE QOS CONTROL SCHEME ADOPTING OPTIMIZATION TECHNIQUE OVE...IJCNCJournal
This work investigates the QoS provisioning of various traffic classes on an SDN-enabled network. We
propose and implement the class-based adaptive QoS control scheme on SDN-enabled network for various
traffic classes, namely VoIP, Video Streaming and File Transfer. The effectiveness of our proposed scheme
is validated by simulation using Mininet and Ryu controller. The procedure to create the simulation
platform and all details relevant to all software used are described step-by-step in detail. The main
performance evaluation metric is the Maximum Number of Traffic Flows admittable with QoS while
Average Throughput, Latency, Jitter, and Packet Loss Rate are maintained at the comparable level of the
existing work in the literature called JMABC [11]. Our simulation results are illustrated with 95%
confidence interval. According to the simulation results, it is obvious that our proposed class-based
adaptive QoS control scheme adopting the optimization technique significantly outperforms the existing
similar QoS provision scheme in terms of the maximum number of the high priority traffic flows (VoIP)
admittable with QoS while the other evaluation metrics are maintained at the same level.
A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...IJCNCJournal
This work investigates the QoS provisioning of various traffic classes on an SDN-enabled network. We propose and implement the class-based adaptive QoS control scheme on SDN-enabled network for various traffic classes, namely VoIP, Video Streaming and File Transfer. The effectiveness of our proposed scheme is validated by simulation using Mininet and Ryu controller. The procedure to create the simulation platform and all details relevant to all software used are described step-by-step in detail. The main performance evaluation metric is the Maximum Number of Traffic Flows admittable with QoS while Average Throughput, Latency, Jitter, and Packet Loss Rate are maintained at the comparable level of the existing work in the literature called JMABC [11]. Our simulation results are illustrated with 95% confidence interval. According to the simulation results, it is obvious that our proposed class-based adaptive QoS control scheme adopting the optimization technique significantly outperforms the existing similar QoS provision scheme in terms of the maximum number of the high priority traffic flows (VoIP) admittable with QoS while the other evaluation metrics are maintained at the same level.
Review on Data Traffic in Real Time for MANETSIRJET Journal
This document discusses different types of data traffic in mobile ad hoc networks (MANETs). It begins by introducing MANETs and some of the key challenges in building them, including dynamic topology and limited bandwidth. It then reviews related work analyzing self-similar variable bit rate (VBR) video traffic and congestion control mechanisms for real-time traffic in MANETs. The main types of data traffic discussed are constant bit rate (CBR), variable bit rate (VBR), and bursty traffic. CBR provides consistent bandwidth but may waste storage, while VBR can optimize quality but requires variable bandwidth. High data traffic loads that exceed network capacity can cause data loss and increased delay.
The document provides suggestions to improve DCR (drop call rate) after a swap project. It discusses checking for hardware problems like alarms, VSWR, and resetting sites. It also recommends adjusting cell configuration parameters like power levels, send/receive modes, and neighbor relationships. Finally, it suggests configuring data parameters like coverage, interference, and handover settings by collecting measurements and adjusting values for thresholds, timeouts, and filters. Adjusting these hardware, configuration, and data parameters based on analysis of measurements can help reduce drop calls after a swap.
This document summarizes a research paper on optimizing quality of service (QoS) and analyzing performance in Next Generation Networks (NGN). It discusses how applying QoS technologies from Huawei can improve capacity and QoS in NGN. The optimized NGN is simulated using different codecs and traffic loads. Simulation results show that G.711 provides better voice quality while G.729 allows higher capacity. Analysis of the simulation matches theoretical models. Overall, the optimized NGN can provide both high voice quality and capacity through adaptive use of codecs.
The document provides guidance on optimizing the TCH assignment success rate KPI in GSM networks. It defines TCH assignment success rate and recommends a formula to calculate it. It then describes 9 major factors that can influence the KPI, such as hardware faults, transmission issues, parameter settings, interference, and coverage problems. The document provides procedures to analyze assignment failures, including checking for technical issues, transmission problems, parameter settings, interference, coverage, antenna issues, repeater problems, and mobile device compatibility. Optimization methods are suggested for each type of problem.
The document describes a measurement-based VoIP quality management system that monitors call quality on different network paths and uses this information to select the best path for new calls. It monitors metrics like packet loss and jitter for active calls grouped by network path. Path quality is used to restrict routing of new calls through lower quality paths. The system provides passive monitoring and active routing based on monitored quality.
This document provides an overview of Long Term Evolution (LTE) radio access network planning. It covers LTE fundamentals and key technologies including OFDM, SC-FDMA, frame structure and reference signals. Frequency and spectrum planning includes channel bandwidth, spacing and raster. Link budget and coverage planning outlines propagation parameters, equipment parameters and system reliability factors. Interference and guard band analysis examines interference between TDD systems and spectrum refarming. Network capacity planning defines capacity and limiting factors. The document also provides guidance on U-Net simulation and operation for LTE network planning.
This document provides guidance on optimizing the TCH call drop rate KPI in GSM networks. It defines the TCH call drop rate and recommends formulas for calculating it. It then discusses factors that can affect the TCH call drop rate, such as hardware failures, transmission problems, parameter settings, interference, coverage issues, and antenna problems. The document provides detailed steps for analyzing high TCH call drop rates, including checking hardware, transmissions, software versions, parameter settings, interference, coverage, antenna systems, uplink/downlink balance, and repeaters. It also includes several case studies and recommendations for optimization.
This document lists IEEE projects completed in 2014 and 2015. It includes over 40 projects related to cloud computing, network security, ad hoc and mobile networks, wireless sensor networks, Android projects, data mining, wireless communication, image processing, and J2ME mobile projects. The document provides contact information for technical details about the projects.
The document provides definitions and analysis methods for optimizing the Call Setup Success Rate (CSSR) in GSM networks. It defines the CSSR, lists influencing factors, and describes a three-step analysis and optimization process. The process involves identifying causes of low CSSR related to assignment success rate, immediate assignment success rate, or SDCCH drop rate. An optimization case from Vietnam addresses a difference in core network mechanisms that lowered the CSSR.
This document describes a proposed approach called Resource Allocation with Connection Admission Control (RA-CAC) and Adaptive Rate Scheduling (ARS) to improve quality of service for real-time traffic in WCDMA networks. The RA-CAC algorithm determines the optimal number of users to admit while minimizing call rejection rates. The ARS then adjusts transmission rates of admitted sessions based on feedback to better utilize network resources. Simulation results showed this approach increased delivery ratio, throughput and reduced delays compared to other resource allocation methods.
This document provides an analysis of common problems that can cause poor network coverage in GSM networks. It discusses issues related to engineering quality, network planning and optimization, non-Huawei devices, and equipment faults. The document also provides a troubleshooting process and analyzes typical cases to help engineers identify and resolve coverage problems.
The document provides an overview, definitions, and recommended formulas for calculating the TCH call drop rate KPI. It describes the key signaling procedures and measurement points for analyzing call drops. Furthermore, it discusses nine major factors that can affect the TCH call drop rate, such as hardware failures, transmission problems, parameter settings, interference, coverage issues, and antenna system problems. The document also provides solutions and case studies for optimizing the TCH call drop rate.
This document provides guidance on optimizing call setup time (CST) in GSM networks. It defines CST, lists influencing factors like procedure configuration, parameter settings, routing, and hardware issues. It describes the analysis process and provides optimization methods for each factor. Specific optimization cases are also presented, like long CST due to inconsistent signaling procedures between vendors. The document aims to help operators analyze CST issues and identify optimization solutions.
The document provides guidance on optimizing the TCH congestion rate KPI in GSM networks. It defines TCH congestion rate, discusses its impacts, and identifies potential influencing factors including network capacity, faults, interference, parameter settings, third-party devices, and software versions. The document then outlines an analysis procedure and provides optimization methods addressing each influencing factor, such as traffic balancing, hardware troubleshooting, interference reduction, parameter tuning, and capacity expansion. Example cases are also presented.
The document discusses key performance indicators (KPIs) for GSM base station subsystem (BSS) networks, including the paging success rate KPI. It defines paging success rate, describes factors that affect it such as coverage, interference, and traffic volume. The document also discusses network parameters that impact paging success rate, such as paging times/intervals, paging based on location area versus all cells, and mobility management parameters like T3212. The goal is to understand KPI measurement points and constraints in order to optimize network performance.
This document provides an optimization manual for improving the TCH assignment success rate (KPI) in GSM BSS networks. It defines TCH assignment success rate and lists key factors that influence it, such as hardware faults, interference issues, coverage problems, and parameter settings. The document then describes procedures for analyzing assignment failures, including checking hardware status, transmission quality, and parameter settings. Finally, it provides optimization methods and case studies.
This document discusses network provisioning for multimedia services using traffic aggregation. It covers topics like network provisioning, packet aggregation, traffic engineering, dimensioning, traffic analysis and aggregation. Methods are proposed for optimizing network resource reservations to guarantee delay bounds for aggregated multimedia traffic, including using real video traces and generating synthetic aggregates. Network provisioning scenarios are described for provisioning using real traces, dynamic aggregates, traffic patterns, and optimizing bandwidth utilization.
This document provides a method for optimizing the Handover Success Rate (HOSR) as a key performance indicator for GSM networks. It analyzes factors that affect HOSR on the BSS side and provides troubleshooting steps to quickly locate low HOSR issues. Optimization measures are proposed to improve HOSR and meet requirements for solving handover problems. The document is intended to help optimize network performance and monitor quality.
A CLASS-BASED ADAPTIVE QOS CONTROL SCHEME ADOPTING OPTIMIZATION TECHNIQUE OVE...IJCNCJournal
This work investigates the QoS provisioning of various traffic classes on an SDN-enabled network. We
propose and implement the class-based adaptive QoS control scheme on SDN-enabled network for various
traffic classes, namely VoIP, Video Streaming and File Transfer. The effectiveness of our proposed scheme
is validated by simulation using Mininet and Ryu controller. The procedure to create the simulation
platform and all details relevant to all software used are described step-by-step in detail. The main
performance evaluation metric is the Maximum Number of Traffic Flows admittable with QoS while
Average Throughput, Latency, Jitter, and Packet Loss Rate are maintained at the comparable level of the
existing work in the literature called JMABC [11]. Our simulation results are illustrated with 95%
confidence interval. According to the simulation results, it is obvious that our proposed class-based
adaptive QoS control scheme adopting the optimization technique significantly outperforms the existing
similar QoS provision scheme in terms of the maximum number of the high priority traffic flows (VoIP)
admittable with QoS while the other evaluation metrics are maintained at the same level.
A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...IJCNCJournal
This work investigates the QoS provisioning of various traffic classes on an SDN-enabled network. We propose and implement the class-based adaptive QoS control scheme on SDN-enabled network for various traffic classes, namely VoIP, Video Streaming and File Transfer. The effectiveness of our proposed scheme is validated by simulation using Mininet and Ryu controller. The procedure to create the simulation platform and all details relevant to all software used are described step-by-step in detail. The main performance evaluation metric is the Maximum Number of Traffic Flows admittable with QoS while Average Throughput, Latency, Jitter, and Packet Loss Rate are maintained at the comparable level of the existing work in the literature called JMABC [11]. Our simulation results are illustrated with 95% confidence interval. According to the simulation results, it is obvious that our proposed class-based adaptive QoS control scheme adopting the optimization technique significantly outperforms the existing similar QoS provision scheme in terms of the maximum number of the high priority traffic flows (VoIP) admittable with QoS while the other evaluation metrics are maintained at the same level.
Review on Data Traffic in Real Time for MANETSIRJET Journal
This document discusses different types of data traffic in mobile ad hoc networks (MANETs). It begins by introducing MANETs and some of the key challenges in building them, including dynamic topology and limited bandwidth. It then reviews related work analyzing self-similar variable bit rate (VBR) video traffic and congestion control mechanisms for real-time traffic in MANETs. The main types of data traffic discussed are constant bit rate (CBR), variable bit rate (VBR), and bursty traffic. CBR provides consistent bandwidth but may waste storage, while VBR can optimize quality but requires variable bandwidth. High data traffic loads that exceed network capacity can cause data loss and increased delay.
Bandwidth Estimation Techniques for Relative ‘Fair’ Sharing in DASHEswar Publications
In the adaptive video streaming (AVS) literature the term fair sharing has been used to describe equal amounts of bandwidth allocated to adaptive client players. However, we argue that even though bandwidth sharing is an important aspect in some problems the same does not apply to AVS. Here the term relative ‘fair’ sharing is more applicable. The reason is that videos have different quality levels and will require differing amounts of the bandwidth to satisfy their needs. A 90% to 10% sharing may be sufficient for two players, one with high demands and the other with low demands. A 50% sharing may lead the player with the high bandwidth demand to get too little of the needed bandwidth resource. In addition, channel conditions may lead to players requiring different amount of bandwidth. Again, the concept of fair sharing has to be extended to relative ‘fair’ sharing for such scenarios. Hence, bandwidth estimation techniques players use to estimate the network bandwidth is very important in segment selection. A player utilizes one of the many techniques to determine what share of the bandwidth it can utilize among competing players. In this paper we explore some of the techniques used in state of-the-art players in their attempt to obtain a ‘fair’ share of the network bandwidth.
Increasing Energy Productivity in Multiple Access Channel by Utilizing Packet...IRJET Journal
The document summarizes a research paper that proposes a scheduling scheme called Round Robin Algorithm (RORB) to optimize energy consumption and improve quality of service in a multiple access channel network utilizing packet dropping. The scheme aims to schedule packets in a timely manner to avoid packet loss. It uses an iterative approach to transmit packets sequentially from nodes to the destination. The paper presents the system design including node registration, packet creation from files, and a central controller that uses RORB to schedule packet transfer from user buffers to a server. It concludes the scheme improves QoS while reducing packet loss through efficient packet scheduling.
Review On Different Feature Extraction AlgorithmsIRJET Journal
This document discusses different feature extraction algorithms that can be used in visual sensor networks (WVSN). It begins by explaining the traditional "compress-then-analyze" approach and introduces the newer "analyze-then-compress" approach. The document then reviews several real-valued and binary feature extraction algorithms such as SIFT, SURF, BRIEF, BRISK, and BinBoost. It proposes a video coding system that uses the BRISK algorithm to extract features, encodes the features using entropy coding, and transmits the data to a base station for matching with stored image data. Diagrams of the proposed system and the BRISK algorithm are also included.
Anonymous Data Sharing in Cloud using Pack AlgorithmIRJET Journal
This document discusses an algorithm called PACK that aims to anonymously share data in the cloud while reducing network redundancy. It does this by having a middleware layer between senders and receivers that routes data through queues, keeping the two parties anonymous. The algorithm chunks data into packets with start and end markers. It determines whether requests are unique or redundant to cache frequently requested data and reduce server load. Evaluations show the receiver-dominated system with the middleware offloads computation from servers, while synchronization eliminates overhead from authentication between senders and receivers. Implementing this traffic redundancy elimination in cloud systems could reduce data costs for cloud service providers.
Design and Implementation of JPEG CODEC using NoCIRJET Journal
This document describes the design and implementation of a JPEG codec using a Network-on-Chip (NoC) structure. It aims to speed up the image transfer process and provide shorter processing times. The key steps are:
1. The JPEG encoding process includes color space conversion, downsampling, block division, discrete cosine transform, quantization, and entropy coding to compress the image.
2. A NoC is used to transmit the compressed image data packets across the chip to reduce latency during transfer.
3. The JPEG decoding process reverses the encoding steps through entropy decoding, dequantization, inverse discrete cosine transform, and image reconstruction to decompress the image for viewing.
IRJET- Securing the Reliable Connectivity among Wireless Body Area Networks w...IRJET Journal
This document presents a proposed approach for securing reliable connectivity and quality of service (QoS) among wireless body area networks (WBANs) using an alliance game theoretic method. It first describes the issues that mobility and increased traffic from multiple WBANs can cause interference and degradation of connectivity and QoS. The proposed method dynamically selects an access point for reliable connectivity between WBANs and the AP. It then forms alliances among WBANs near the AP to schedule packets cooperatively and minimize delay while maximizing throughput using a game theoretic approach. Simulation results show the proposed approach outperforms current methods in terms of various performance metrics.
The document proposes a clustering-based approach to dynamically allocate bandwidth in wireless networks. It extracts student data from a university's course timetable to predict user distributions over time. It then applies K-means clustering to group buildings into wireless nodes based on expected user loads. This clusters student devices and allows wireless nodes to adapt their bandwidth allocation according to predicted user demands at different times. The approach is tested on a university campus network, extracting student data to predict building loads and applying K-means clustering to allocate optimal bandwidth across wireless nodes over time.
Probabilistic Approach to Provisioning of ITV - Amos K.Amos Kohn
This white paper discusses a probabilistic approach to provisioning network and computing resources for delivering interactive TV. It develops a proprietary spreadsheet model to estimate the costs and benefits of deploying an interactive TV streaming processor. The model is based on analyzing user behavior, data packaging into MPEG streams, required bit rates, transport of data over the forward and return paths, necessary processing power, and financial projections to calculate return on investment.
Probabilistic Approach to Provisioning of ITV - By Amos_KohnAmos Kohn
This white paper discusses a probabilistic approach to provisioning network and computing resources for delivering interactive TV. It develops a proprietary spreadsheet model to estimate the costs and benefits of deploying an interactive TV streaming processor. The model is based on analyzing user behavior, data packaging into MPEG streams, required bit rates, forward and return network paths, processing needs, and financial projections to calculate return on investment.
Over recent years there has been a considerable shift, from quality of service (QoS) to quality of experience (QoE), when evaluating video delivery across networks. Hence, we first explore the need for this shift towards user-QoE in the video delivery ecosystem. Further, we investigate major QoE metrics researchers use in the evaluation of DASH users. We point out a huge problem with DASH beginning with its transport layer protocol. DASH utilizes Transmission control protocol (TCP) as the transport layer protocol. Thus, we give an overview of the mechanism of Transmission Control Protocol (TCP) and two mechanisms greatly impacting the streaming process: (1) TCP
congestion mechanism and (2) TCP Fast Start. This leads us to investigate the impact of these TCP mechanisms on DASH players and consequently user-QoE.
IEEE ICC'22_ LEADER_ A Collaborative Edge- and SDN-Assisted Framework for HTT...Reza Farahani
1) The document proposes LEADER, a collaborative edge- and SDN-assisted framework for HTTP adaptive video streaming. LEADER employs virtual network functions with transcoding capabilities at network edges to optimize video streaming quality of experience and network utilization.
2) An SDN controller runs an optimization model to determine the optimal location, action, and approach for fetching client-requested video qualities. A lightweight heuristic approach is also proposed.
3) An evaluation using a large-scale testbed of 250 clients, edge servers, and an SDN controller shows that LEADER improves average video bitrate, reduces quality switches and stalls, and increases perceived quality of experience over non-collaborative and default edge approaches. LE
Machine learning in Dynamic Adaptive Streaming over HTTP (DASH)Eswar Publications
Recently machine learning has been introduced into the area of adaptive video streaming. This paper explores a novel taxonomy that includes six state of the art techniques of machine learning that have been applied to Dynamic Adaptive Streaming over HTTP (DASH): (1) Q-learning, (2) Reinforcement learning, (3) Regression, (4) Classification, (5) Decision Tree learning, and (6) Neural networks.
ENHANCING AND MEASURING THE PERFORMANCE IN SOFTWARE DEFINED NETWORKINGIJCNCJournal
Software Defined Networking (SDN) is a challenging chapter in today’s networking era. It is a network design approach that engages the framework to be controlled or 'altered' adroitly and halfway using programming applications. SDN is a serious advancement that assures to provide a better strategy than displaying the Quality of Service (QoS) approach in the present correspondence frameworks. SDN etymologically changes the lead and convenience of system instruments using the single high state program. It separates the system control and sending functions, empowering the network control to end up specifically. It provides more functionality and more flexibility than the traditional networks. A network administrator can easily shape the traffic without touching any individual switches and services which are needed in a network. The main technology for implementing SDN is a separation of data plane and control plane, network virtualization through programmability. The total amount of time in which user can respond is called response time. Throughput is known as how fast a network can send data. In this paper, we have design a network through which we have measured the Response Time and Throughput comparing with the Real-time Online Interactive Applications (ROIA), Multiple Packet Scheduler, and NOX.
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...Eswar Publications
Remote sensor systems are self sorted out, self-governing, programmed revelation of administrations, exceedingly
versatile, solid, Infrastructure less administration. Predominantly material in the field of debacle, social
insurance. Secure spread of code updates in Wireless Sensor Network is testing assignment. Programming refreshes in Wireless Sensor Networks is accepting huge consideration as of late as it expands the lifetime of the system. Because of the expansive number of hubs, it is illogical to refresh the product physically on account of the size of such arrangements and the physical unavailability of certain sensor hubs. For certain WSN applications, securing the procedure of remote reconstructing is fundamental. For instance, code refreshes in military
applications must be confirmed to maintain a strategic distance from the download of malignant code into conveyed sensor hubs. Also, applications that require protection and obscurity ought not concede code refreshes that can reinvent the WSN to snoop on focuses without authorization. Given the presumption that more bytes transmitted means in a roundabout way more vitality squandered in the spread, vitality proficiency is accomplished by lessening the rate of overhead hash bytes per page.
Effective Access Point Selection for improving Throughput in Wireless LANEswar Publications
In recent years, WLANs are widely deployed everywhere due to the low-cost and easy installation. Selecting the best access point is the major research problem. The stations in the network should get associate with the suitable access points that results in higher throughput. In IEEE 802.11 wireless networks, the simple association strategy is to get associate to the AP with the strongest RSSI value, which may cause load imbalance and may eventually leads to traffic overhead. Access point selection is still a critical problem.So, a new metric or combination of metrics has to be derived that facilitates the effective selection of an AP to achieve better throughput.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Content-Based Image Retrieval (CBIR) systems have been used for the searching of relevant images in various research areas. In CBIR systems features such as shape, texture and color are used. The extraction of features is the main step on which the retrieval results depend. Color features in CBIR are used as in the color histogram, color moments, conventional color correlogram and color histogram. Color space selection is used to represent the information of color of the pixels of the query image. The shape is the basic characteristic of segmented regions of an image. Different methods are introduced for better retrieval using different shape representation techniques; earlier the global shape representations were used but with time moved towards local shape representations. The local shape is more related to the expressing of result instead of the method. Local shape features may be derived from the texture properties and the color derivatives. Texture features have been used for images of documents, segmentation-based recognition,and satellite images. Texture features are used in different CBIR systems along with color, shape, geometrical structure and sift features.
This document discusses clickjacking attacks, which hijack users' clicks to perform unintended actions. It provides an overview of clickjacking, describes different types of attacks, and analyzes vulnerabilities that make websites susceptible. Experiments are conducted on a sample social networking site, applying various clickjacking techniques. Potential defenses are tested, including X-Frame-Options headers and frame busting code. A proposed solution detects transparent iframes to warn users and check for hidden mouse pointers to mitigate cursorjacking. Analysis of top Jammu and Kashmir websites found most were vulnerable, while browser behavior studies showed varying support for defenses.
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
The audio and video synchronization plays an important role in speech recognition and multimedia communication. The audio-video sync is a quite significant problem in live video conferencing. It is due to use of various hardware components which introduces variable delay and software environments. The objective of the synchronization is used to preserve the temporal alignment between the audio and video signals. This paper proposes the audio-video synchronization using spreading codes delay measurement technique. The performance of the proposed method made on home database and achieves 99% synchronization efficiency. The audio-visual
signature technique provides a significant reduction in audio-video sync problems and the performance analysis of audio and video synchronization in an effective way. This paper also implements an audio- video synchronizer and analyses its performance in an efficient manner by synchronization efficiency, audio-video time drift and audio-video delay parameters. The simulation result is carried out using mat lab simulation tools and simulink. It is automatically estimating and correcting the timing relationship between the audio and video signals and maintaining the Quality of Service.
Due to the availability of complicated devices in industry, models for consumers at lower cost of resources are developed. Home Automation systems have been developed by several researchers. The limitations of home automation includes complexity in architecture, higher costs of the equipment, interface inflexibility. In this paper as we have proposed, the working protocol of PIC 16F72 technology is which is secure, cost efficient, flexible that leads to the development of efficient home automation systems. The system is operational to control various home appliances like fans, Bulbs, Tube light. The following paper describes about components used and working of all components connected. The home automation system makes use of Android app entitled “Home App” which gives
flexibility and easy to use GUI.
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
E-learning plays an important role in providing required and well formed knowledge to a learner. The medium of e- learning has achieved advancement in various fields such as adaptive e-learning systems. The need for enhancing e-learning semantically can enhance the retrieval and adaptability of the learning curriculum. This paper provides a semantically enhanced module based e-learning for computer science programme on a learnercentric perspective. The learners are categorized based on their proficiency for providing personalized learning environment for users. Learning disorders on the platform of e-learning still require lots of research. Therefore, this paper also provides a personalized assessment theoretical model for alphabet learning with learning objects for
children’s who face dyslexia.
Agriculture plays an important role in the economy of our country. Over 58 percent of the rural households depend on the agriculture sector as their means of livelihood. Agriculture is one of the major contributors to Gross Domestic Product(GDP). Seeds are the soul of agriculture. This application helps in reducing the time for the researchers as well as farmers to know the seedling parameters. The application helps the farmers to know about the percentage of seedlings that will grow and it is very essential in estimating the yield of that particular crop. Manual calculation may lead to some error, to minimize that error, the developed app is used. The scientist and farmers require the app to know about the physiological seed quality parameters and to take decisions regarding their farming activities. In this article a desktop app for seed germination percentage and vigour index calculation are developed in PHP scripting language.
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
Competition among adaptive video streaming players severely diminishes user-QoE. When players compete at a bottleneck link many do not obtain adequate resources. This imbalance eventually causes ill effects such as screen flickering and video stalling. There have been many attempts in recent years to overcome some of these problems. However, added to the competition at the bottleneck link there is also the possibility of varying network bandwidth which can make the situation even worse. This work focuses on such a situation. It evaluates current heuristic adaptive video players at a bottleneck link with time-varying bandwidth conditions. Experimental setup includes the TAPAS player and emulated network conditions. The results show PANDA outperforms FESTIVE, ELASTIC and the Conventional players.
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
Security and Performance aspects of cloud computing are the major issues which have to be tended to in Cloud Computing. Intrusion is one such basic and imperative security problem for Cloud Computing. Consequently, it is essential to create an Intrusion Detection System (IDS) to detect both inside and outside assaults with high detection precision in cloud environment. In this paper, cloud intrusion detection system at hypervisor layer is developed and assesses to detect the depraved activities in cloud computing environment. The cloud intrusion detection system uses a hybrid algorithm which is a fusion of WLI- FCM clustering algorithm and Back propagation artificial Neural Network to improve the detection accuracy of the cloud intrusion detection system. The proposed system is implemented and compared with K-means and classic FCM. The DARPA’s KDD cup dataset 1999 is used for simulation. From the detailed performance analysis, it is clear that the proposed system is able to detect the anomalies with high detection accuracy and low false alarm rate.
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
This report present the outcome of an investigative research conducted to examine the modu-operandi of academic staff union of polytechnics (ASUP) YabaTech. The investigation covered the logistics and cost implication for spreading union activities among members. It was discovered that cost of management and dissemination of information to members was at high side, also logistics problem constitutes to loss of information in transit hence cut away some members from union activities. To curtail the problem identified, we proposed the
design of secure and dynamic website for spreading union activities among members and public. The proposed system was implemented using HTML5 technology, interface frameworks like Bootstrap and j query which enables the responsive feature of the application interface. The backend was designed using PHPMYSQL. It was discovered from the evaluation of the new system that cost of managing information has reduced considerably, and logistic problems identified in the old system has become a forgotten issue.
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
Nowadays organizations are using information systems for optimizing processes in order to increase coordination and interoperability across the organizations. Since Oil and Gas Industry is one of the large industries in whole of the world, there is a need to compatibility of its Information Systems (IS) which consists three categories of systems: Field IS, Plant IS and Enterprise IS to create interoperability and approach the
optimizing processes as its result. In this paper we introduce the different models of information systems integration, identify the types of information systems that are using in the upstream and downstream sectors of petroleum industry, and finally based on expert’s opinions will identify a suitable model for information systems integration in this industry.
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
This work illustrates the AOMDV routing protocol. Its ancestor, the AODV routing protocol is also described. This tutorial demonstrates how forward and reverse paths are created by the AOMDV routing protocol. Loop free paths formulation is described, together with node and link disjoint paths. Finally, the performance of the AOMDV routing protocol is investigated along link and node disjoint paths. The WSN with the AOMDV routing protocol using link disjoint paths is better than the WSN with the AOMDV routing protocol using node disjoint paths for energy consumption.
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
To identify the importance of node of a network, several centralities are used. Majority of these centrality measures are dominated by components' degree due to their nature of looking at networks’ topology. We propose a centrality to identification model, bridging centrality, based on information flow and topological aspects. We apply bridging centrality on real world networks including the transportation network and show that the nodes distinguished by bridging centrality are well located on the connecting positions between highly connected regions. Bridging centrality can discriminate bridging nodes, the nodes with more information flowed through them and locations between highly connected regions, while other centrality measures cannot.
Now a days we are living in an era of Information Technology where each and every person has to become IT incumbent either intentionally or unintentionally. Technology plays a vital role in our day to day life since last few decades and somehow we all are depending on it in order to obtain maximum benefit and comfort. This new era equipped with latest advents of technology, enlightening world in the form of Internet of Things (IoT). Internet of things is such a specified and dignified domain which leads us to the real world scenarios where each object can perform some task while communicating with some other objects. The world with full of devices, sensors and other objects which will communicate and make human life far better and easier than ever. This paper provides an overview of current research work on IoT in terms of architecture, a technology used and applications. It also highlights all the issues related to technologies used for IoT, after the literature review of research work. The main purpose of this survey is to provide all the latest technologies, their corresponding
trends and details in the field of IoT in systematic manner. It will be helpful for further research.
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
In past couple of decades, there is immediate growth in field of agricultural technology. Utilization of proper method of irrigation by drip is very reasonable and proficient. A various drip irrigation methods have been proposed, but they have been found to be very luxurious and dense to use. The farmer has to maintain watch on irrigation schedule in the conventional drip irrigation system, which is different for different types of crops. In remotely monitored embedded system for irrigation purposes have become a new essential for farmer to accumulate his energy, time and money and will take place only when there will be requirement of water. In this approach, the soil test for chemical constituents, water content, and salinity and fertilizer requirement data collected by wireless and processed for better drip irrigation plan. This paper reviews different monitoring systems and proposes an automatic monitoring system model using Wireless Sensor Network (WSN) which helps the farmer to improve the yield.
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
With the advent of cloud computing the big data has emerged as a very crucial technology. The certain type of cloud provides the consumers with the free services like storage, computational power etc. This paper is intended to make use of infrastructure as a service where the storage service from the public cloud providers is going to leveraged by an individual or organization. The paper will emphasize the model which can be used by anyone without any cost. They can store the confidential data without any type of security issue, as the data will be altered
in such a way that it cannot be understood by the intruder if any. Not only that but the user can retrieve back the original data within no time. The proposed security model is going to effectively and efficiently provide a robust security while data is on cloud infrastructure as well as when data is getting migrated towards cloud infrastructure or vice versa.
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
The financial services industry is experiencing rapid changes in services delivery and channels usage, and financial companies and users of financial services are looking at new technologies as they emerge and deciding whether or not to embrace them and the new opportunities to save and manage enormous time, cost and stress.
There is no doubt about the favourable and manifold impact of technology on e-banking as pictured in this review paper, almost all banks are with the least and most access e-banking Technological equipments like ATMs and Cards. On the other Hand cheap and readily available technology has opened a favourable competition in ebanking services business with a lot of wide range competitors competing with Commercial Banks in Cameroon in providing digital financial services.
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
Attribute or feature selection plays an important role in the process of data mining. In general the data set contains more number of attributes. But in the process of effective classification not all attributes are relevant.
Attribute selection is a technique used to extract the ranking of attributes. Therefore, this paper presents a comparative evaluation study of classification algorithms before and after attribute selection using Waikato Environment for Knowledge Analysis (WEKA). The evaluation study concludes that the performance metrics of the classification algorithm, improves after performing attribute selection. This will reduce the work of processing irrelevant attributes.
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
In today’s world migration of people from rural areas to urban areas is quite common. Health care services are one of the most challenging aspect that is must require to the people with abnormal health. Advancements in the technologies lead to build the smart homes, which contains various sensor or smart meter devices to automate the process of other electronic device. Additionally these smart meters can be able to capture the daily activities of the patients and also monitor the health conditions of the patients by mining the frequent patterns and
association rules generated from the smart meters. In this work we proposed a model that is able to monitor the activities of the patients in home and can send the daily activities to the corresponding doctor. We can extract the frequent patterns and association rules from the log data and can predict the health conditions of the patients and can give the suggestions according to the prediction. Our work is divided in to three stages. Firstly, we used to record the daily activities of the patient using a specific time period at three regular intervals. Secondly we applied the frequent pattern growth for extracting the association rules from the log file. Finally, we applied k means clustering for the input and applied Bayesian network model to predict the health behavior of the patient and precautions will be given accordingly.
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the
cloud. Present, in every organization has trusted the web, however, the information must flow but not hold the
data. Therefore, all customers have to use the cloud. While the cloud progressing info by securing-protocols. Third
party observing and certain circumstances directly stale in flow and kept of packets in the virtual private cloud.
Global security statistics in the year 2017, hacking sensitive information in cloud approximately maybe 75.35%,
and the world security analyzer said this calculation maybe reached to 100%. For this cause, this proposed
research work concentrates on Authentication-Message-Digest-Key with authentication in routing the Network as
a Service of packets in OSPF (Open Shortest Path First) implementing Cloud with GNS3 has tested them to
securing from attackers.
Microstrip patch antennas are recently used in wireless detection applications due to their low power consumption, low cost, versatility, field excitation, ease of fabrication etc. The microstrip patch antennas are also called as printed antennas which is suffer with an array elements of antenna and narrow bandwidth. To overcome the above drawbacks, Flame Retardant Material is used as the substrate. Rectangular shape of microstrip patch antenna with FR4 material as the substrate which is more suitable for the explosive detection applications. The proposed printed antenna was designed with the dimension of 60 x 60 mm2. FR-4 material has a dielectric constant value of 4.3 with thickness 1.56 mm, length and width 60 mm and 60 mm respectively. One side of the substrate contains the ground plane of dimensions 60 x60 mm2 made of copper and the other side of the substrate contains the patch which have dimensions 34 x 29 mm2 and thickness 0.03mm which is also made of copper. RMPA without slot, Vertical slot RMPA, Double horizontal slot RMPA and Centre slot RMPA structures were
designed and the performance of the antennas were analysed with various parameters such as gain, directivity, Efield, VSWR and return loss. From the performance analysis, double horizontal slot RMPA antenna provides a better result and it provides maximum gain (8.61dB) and minimum return loss (-33.918dB). Based on the E-field excitation value the SEMTEX explosive material is detected and it was simulated using CST software.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Introduction of Cybersecurity with OSS at Code Europe 2024
SAND and Cloud-based Strategies for Adaptive Video Streaming
1. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 03 Pages: 3400-3410 (2017) ISSN: 0975-0290
3400
SAND and Cloud-based Strategies for Adaptive
Video Streaming
Koffka Khan
Department of Computing and Information Technology The University of the West Indies, Trinidad and Tobago, W.I
Email: koffka.khan@gmail.com
Wayne Goodridge
Department of Computing and Information Technology The University of the West Indies, Trinidad and Tobago, W.I
Email : wayne.goodridge@sta.uwi.edu.com
-------------------------------------------------------------------ABSTRACT---------------------------------------------------------------
A new architecture for defining network collaboration in DASH is called SAND. It aims to standardize
communication amongst network agents participating in the streaming process. This work produces a novel
taxonomy for SAND-based approaches. It places AVS solutions into four categories: (1) Management Architecture
(2) Cache-based, (3) Optimization, and (4) Paradigm. Sub-categories of Management Architecture are (a)
Cognitive, (b) Prioritization, and (c) Encoding and Signaling, while sub-categories of Paradigm are (a) SDN-based,
(b) CDN-based, and (c) CCN-based. The approaches representing each category are presented. It is shown that
using the SANDs architecture proves beneficial to approaches adopting it. In recent years Cloud-based strategies
for AVS have been an important area of research and industry. This paper elaborates on Cloud-based strategies.
It places current strategies into a taxonomy. The Cloud-based AVS strategies are categorized into (1) Social-
Awareness, (2) Cloud-based CDN, (3) Cloud-based Gaming, (4) Cloud-based SDN, (5) File-hosting services, (6)
View synthesis techniques, and (7) Error Concealment techniques. The implementations that exist for the Cloud-
based strategies are discussed. Thus, the advantages of both SAND and Cloud-based approaches for use in DASH-
based systems are illustrated.
Keywords - DASH; SAND; Adaptive; video; streaming; SDN; optimization; cache; CDN; Encoding; Signaling;
Cloud; Social-Awareness; Gaming.
---------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: Nov 01, 2017 Date of Acceptance: Nov 24, 2017
---------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
This work provides a body of work that builds on an
AVS taxonomy presented in Section II. It provides a
detailed review on current state of the art solutions in
server- and network-assisted AVS. After the taxonomy is
given a discussion on SAND-based AVS techniques is
portrayed in Section III. This is followed by a taxonomy of
SAND-based approaches to DASH in Section IV. SAND-
based approaches are then illustrated in Section V. Section
VI gives a discussion of Cloud-based AVS strategies.
Section VII presents a taxonomy of Cloud-based
approaches AVS techniques. Cloud-based strategies are
shown in Section VIII. Finally, the conclusion is given in
Section IX.
II. AVS TAXONOMY
This work categorizes AVS into five types: (1) Client-
based, (2) Server-based, (3) Network-assisted, (4) SAND-
based, and (5) Cloud-based, cf. Figure 1. However, only
SAND-based and Cloud-based solutions are discussed.
Another paper talks about Server-based and Network-
assisted solutions.
Fig. 1. AVS taxonomy
2. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 03 Pages: 3400-3410 (2017) ISSN: 0975-0290
3401
III. DISCUSSION OF SAND-BASED AVS
TECHNIQUES
Aside works which propose possible implementations of
networked-assisted HAS, there are also efforts to
standardize DASH-based technology [58], [9], [61]. The
MPEG group is developing an extension of the Dynamic
Adaptive Streaming over HTTP (DASH) standard, called
Server and Network Assisted DASH (SAND) [47]. The
extension provides guidelines about the communication
between network nodes and the features that the network-
assisted framework should possess— for example, the
system should be resilient to clients that ignore the
network assistance. Standardization efforts certainly
motivate the development of network-assisted systems and
contribute to prepare future deployments [8].
The aim of the Server and Network Assisted DASH
(SAND) amendment [46] is to make DASH clients aware
of networks and vice versa. This improves DASH content
delivery in networks. SAND will define the signaling
protocols and messages to be exchanged between DASH-
aware network elements [39] [13], but the actual decision
algorithms will be left out of the standard [37]. The SAND
approach uses a standard signaling plane [33] [43]. This is
required to enable active cooperation between network
elements. Based on network state and client states in
context, the SAND architecture (cf. Figure 2) allow a
network element to trigger a control mechanism such as
quality adaptation [30] [41], flow prioritization [5] [29]
[24], or bandwidth reservation [7]. This is achieved by
using asynchronous network-to-client and network-to-
network communication of quality-related assisting
information.
The essential concept in SAND is a functional network
entity, called DASH Aware Network Element (DANE)
[1], which can understand and collect the HAS session
related content and to provide HAS clients with assisting
parameters to enhance the service delivery.
Fig. 2. SAND architecture [1].
This work consists of four sections. Section IV presents
the Taxonomy of SAND-based approaches to DASH.
Section V gives examples of the approaches defined in the
taxonomy.
IV. TAXONOMY OF SAND-BASED
APPROACHES TO DASH
The SAND-based AVS solutions are categorized into (1)
Management Architecture (2) Cache-based, (3)
Optimization, and (4) Paradigm. These categories are
shown on Figure 3. Sub-categories of Management
Architecture are (a) Cognitive, (b) Prioritization, and (c)
Encoding and Signaling. Sub-categories of Paradigm are
(a) SDN-based, (b) CDN-based, and (c) CCN-based.
Fig. 3. SAND-based AVS taxonomy.
V. SAND- BASED APPROACHES
This review of SAND-based approaches includes those
inspired by SAND and actual implementations. It should
be noted that SAND is an adaptive video streaming
architecture so that both inspired and direct
implementations may or may not include all the features
included in the architecture.
A.Management Architecture
1. Cognitive
Authors in [38] propose enhancements to the video bitrate
adaptation solution of adaptive HTTP streaming by
defining two network-assisted adaptation approaches (cf.
Figure 4). These are based on a cognitive network
management architecture. The architecture supports (1)
enhanced network service awareness and (2) distributed
control over video bitrate adaptation. Experiments to test
the presented bandwidth management concepts are
conducted in a testbed environment. This includes
prototypes of the proposed algorithms, signaling
framework, and video streaming service supporting
MPEG-DASH. In further work the authors propose
3. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 03 Pages: 3400-3410 (2017) ISSN: 0975-0290
3402
enhancements to adaptive video streaming over HTTP
using a wireless bandwidth management architecture in
[37] (cf. Figure 5). Additional network-side control
information is provided by a distributed control
architecture over video bitrate adaptation to video clients.
This assists them in their decision-making. The
architecture and distributed decision algorithms are
network and service aware. This is enabled by a cross-
layer signaling framework. Their MPEGDASH based
testbed implementation is used to test the architecture. It
also studies the performance in the context of two
network-assisted video adaptation use cases. By analyzing
the results, it was shown that the proposed solution gives
benefits against a state-of-the-art client-side approach.
Fig. 4. Architecture for network-assisted adaptive video
streaming [38].
Fig. 5. The network-assisted adaptive video streaming
testbed and the SOM map used in the WLAN AP's status
classification [37].
2. Prioritization
To reduce video freezes the authors in [40] propose an
Open flow based framework (cf. Figure 6). The
framework’s aim is to increase clients’ QoE. Prioritized
delivery of HAS segments is enabled by the Openflow-
controller. This is based on feedback collected from both
the network devices and the clients. An attempt is made to
reduce the effects introduced by prioritization on the
bandwidth estimation of the clients. A method is used
which inform the clients about the prioritization status of
the downloaded segments. This is done without any
additional overhead being placed on the network. In case
of prioritized delivery, the estimated bandwidth is
corrected by using this information. The approach is
evaluated by emulation. Evaluation is done under varying
network conditions. The approach is compared to state-of-
the-art heuristics. It is shown under several multi-client
scenarios, that the proposed approach can reduce freezes
up to 75%.
Fig. 6. Logical sequence diagram of the proposed solution
[40].
3. Encoding and Signaling
An energy-aware dynamic encoding control for MPEG-
DASH live streaming is given in [49] (cf. Figure 6). The
method proves beneficial when representations are
unpopular, or the network is under congestion. Messages
between client and encoding server are utilized to achieve
these dynamics. This is based on the MPEG standard
initiative Server and Network Assisted DASH (SAND). It
was shown experimentally that the dynamic encoding
control signaling can reduce energy consumption in the
server, and create storage savings. Thus, server costs are
decreased.
Fig. 4. Signaling in the advanced CDN
architecture [49].
B.Cache-based
The benefits of a Cache Friendly HAS system (CF-DASH)
is investigated in [3]. It aims to improve the caching
efficiency in mobile networks. Another goal is to sustain
the quality of experience (QoE) of mobile clients. A set of
observations are presented to motivate the work
undertaken. This is done on a large number of clients
requesting HAS contents. The CF-Dash system is
implemented on a developed testbed implementation. CF-
dash is evaluated based on trace-driven simulations and
testbed experiments. The rate adaptation logic is given in
Figure 7. The validation results based on the simulations
on real HAS traffic show that CF-DASH achieves a
significant gain in hit-ratio within ranges of 15% up to
50%.
4. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 03 Pages: 3400-3410 (2017) ISSN: 0975-0290
3403
C.Optimization
Several network-assisted streaming approaches are
investigated by [7] that rely on active cooperation between
video streaming applications and the network (cf. Figure
8). A Video Control Plane (VCP) that enforces Video
Quality Fairness (VQF) is built. The VCP works among
concurrent video flows generated by heterogeneous client
devices. A max-min fairness optimization [60] [34]
problem is solved at runtime in order to achieve the VCP
over VQF. The optimal solution is compared based on (1)
allocating network bandwidth slices to video flows, and
(2) guiding video players in the video bitrate selection.
QoE-related metrics used to access the performance of
VCP include (a) Video Quality Fairness [20], (b) video
quality [42], and (c) switching frequency [2] [31] [48].
Fig. 5. CF-Dash: rate adaptation logic [3].
Fig. 6. The considered network-assisted SAND-
based approaches [7].
D.Paradigm
1. SDN-based
An in-network QoE measurement framework (IQMF) that
provides QoE monitoring for HAS streams as a service is
introduced in [14] (cf. Figure 7). The framework leverages
Software Defined Networking. The control plane
functionality is streamlined for nonintrusive quality
monitoring [36]. It offers a closed control loop for QoE-
aware service management. IQMF adopts two specifically
designed QoE metrics. These metrics are used to capture
the user experience of HAS streams. The specific metrics
are related to video fidelity [27] [11] [59] and switching
impact [45] [44]. A pan-European SDN testbed is used.
This testbed demonstrates how IQMF can be used as a
foundation for in-network QoE measurement and service
optimization.
Fig. 7. SAND-based QoE Measurement
Framework (IQMF) [14].
A networking architecture based on the Software Defined
Networking (SDN [51]) paradigm is illustrated in [23] (cf.
Figure 8). Two mechanisms for adaptation assistance is
provided by controllers in the network: (a) explicitly
signaling target bitrates to DASH players, and (b) dynamic
traffic control in the network. This is possible as the
controllers have a broad overview on the network activity.
The mechanisms are evaluated based on how much each
5. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 03 Pages: 3400-3410 (2017) ISSN: 0975-0290
3404
contribute to the delivery of a stable, high quality stream.
The architecture improves the quality of experience
(QoE). The video bitrate is doubled, and quality switches
are reduced. This DASH-aware networking can be used at
internet service providers (ISP), network administrators,
and end-users to configure their networks to their desired
requirements.
Fig. 8. DASH aware SDN architecture that separates data
plane (network infrastructure) from control plane (network
management and application controllers). The mixed-
dashed line indicates a communication channel between
DASH player and Service Manager [23].
2. CDN-based
An advanced Content Delivery Network (CDN [35])
solution for enhancing the delivery and caching of
adaptive HTTP-based video streaming is proposed in [19]
(cf. Figure 9). A testbed implementation of the proposed
system is also illustrated. It utilizes (1) open source
components, and (2) a standardized MPEG-DASH based
video streaming solution. The proposed CDN management
features and the associated signaling are inspired by the
upcoming MPEG standard for Server and Network
assisted DASH (SAND) [19]. The experimental evaluation
results attest the benefits of the proposed solution. It
enhances MPEGDASH delivery in CDNs for the selected
test cases.
An advanced Content Delivery Network (CDN) solution
for enhancing the delivery of adaptive HTTP-based video
streaming is introduced in [18]. The implementations
showcase intelligent and scalable CDN testbeds. These are
based on intelligent CDN management functionalities and
scalable CDN architecture. The upcoming MPEG standard
for Server and Network assisted DASH (SAND) gives
inspiration for the intelligent CDN management
functionalities and the associated signaling. Lightweight
service virtualization allows dynamic scaling and
balancing of available resources according to the current
needs make the scalable CDN architecture possible. A
scenario where end-users are streaming MPEG-DASH
video from the advanced CDN is illustrated. It features (a)
intelligent CDN management, and (2) monitoring
functionalities. These dynamically (1) add or remove
virtualized edge servers, and (2) reroute end-users based
on the resource needs and the location of end-users. A
more balanced traffic load within the network and better
Quality of Experience (QoE) for end-users is achieved.
Fig. 9. Signaling in the advanced CDN architecture. [19].
3. CCN-based
A new internet architecture such as Content Centric
Network (CCN [28]) is proposed to enhance DASH
streaming in [22] (cf. Figure 10). With its in-network
caching salient feature, this architecture, improves Quality
of Experience (QoE) from consumer side. Advantages of
the proposed approach are (1) it reduces delays [56], and
(2) increases throughput [32] by providing the requested
video segment from a near point to the end user. However,
the main disadvantage is that there are oscillations issues
induced by caching with DASH. The newly proposed
Network-Assisted Strategy (NAS) is based-on traffic
shaping and request prediction. It aims to improve DASH
flows by investigating the new internet architecture CCN.
Fig. 10. SAND-CCN architecture [22].
VI. DISCUSSION OF CLOUD-BASED AVS
TECHNIQUES
Over the last few years, there has been an increased
number of applications that have “migrated to the cloud”,
and new cloud-based applications that have become
popular [52]. The most famous cloud-based media
services include Youtube, Daily motion, Microsoft Azure
and Putlocker [62]. Cloud computing provides not only
high computation power but also huge amount of storage
space, so that it enables end users to utilize best services
without having an expensive and complex architecture at
their side. However, cloud architecture suffers from
transmission degradations, especially transmission errors
and security threats in cloud networks [62].
6. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 03 Pages: 3400-3410 (2017) ISSN: 0975-0290
3405
Similar motivations that have driven mobile enterprise
cloud services are also driving adoption of mobile
consumer cloud services: the ability to access media from
anywhere: any device, platform, and network [52]. Cloud
computing, with its elasticity, offers a way to match the
users demand by dynamically scaling the allocated
resources and by using a pay-as-you-go charging model
without the need of large upfront capital investments [10].
Despite the desperate efforts of network operators to
enhance the wireless link bandwidth (e.g., 3G/4G), the
soaring video traffic demands from mobile users are
rapidly overwhelming the wireless link capacity [54].
It is crucial to improve the Quality of Service (QoS) of
mobile video streaming while utilizing the networking and
computing resources efficiently [54]. It is desirable that
the network infrastructure supports some means to provide
Quality of Service (QoS) for multimedia traffic. To this
effect, the Internet Engineering Task Force (IETF) has
explored several QoS architectures, but none has been
truly successful and globally implemented [12]. There is a
guaranteed need for tools and techniques for modelling,
simulating, analyzing, planning, provisioning and
monitoring real-time service oriented applications
deployed within clouds of virtualized computing, storage
and video networking environments.
Media delivery is predominately accomplished via a
content distribution network (CDN), which is a large
distributed system of servers deployed in multiple data
centers, serving contents to end users with high
availability and high performance (e.g., fast response, high
throughput) [55]. Content Delivery Networks (CDNs) are
employed to provide a scalable and reliable video
streaming services [10].
In the mobile cloud gaming scenarios, the resource-
demanding game logics (e.g., state update and graphics
rendering) are performed on cloud servers and the players
receive the encoded streaming video via mobile devices
(e.g., smart phone and iPad) [57]. Delivering high-quality
cloud gaming experience is challenging, mainly because:
1) modern computer games are mostly resource hungry; 2)
the real-time nature of games imposes stringent deadline;
and 3) gamers have high expectations on different aspects
of gaming experience. More specifically, gamers ask for
both high-quality game scenes and low response delay,
where: 1) the quality of game scenes is measured by
metrics like resolutions, frame rates, fidelities, and 3-D
effect levels and 2) the response delay refers to the time
difference between the time when a gamer triggers an
input and the time when the client renders the
corresponding effect. Concurrently achieving both high-
quality scenes and fast responses consumes a huge amount
of computation and network resources [21]. File streaming
allows gamers to start playing games after a small subset
of files has been downloaded, while the remaining files are
streamed in the background [21].
Crowd sourcing was first introduced in 2005 by Merriam-
Webster as a way to obtain resources by collecting
contributions from crowds of people, instead of employees
or suppliers, particularly in the online community. Since
then, crowdsourcing has been attempted as the method for
various tasks and applications. Over the past three years,
crowd sourced live streaming have emerged too, with a
series of real world platforms being available in the
market, such as Youtube Live, Azubu.tv, Hitbox.tv, Daily
motion Games, and Ustream, to name but a few [50].
This work consists of four sections. Section VII presents
the Taxonomy of Cloud-based strategies to DASH.
Section VIII gives examples of the approaches defined in
the taxonomy.
VII. TAXONOMY OF CLOUD-BASED
APPROACHES
The Cloud-based AVS strategies are categorized into (1)
Social-Awareness, (2) Cloud-based CDN, (3) Cloud-based
Gaming, (4) Cloud-based SDN, (5) File-hosting services,
(6) View synthesis techniques, and (7) Error Concealment
techniques. These categories are shown on Figure 11.
Fig. 11. Cloud-based AVS taxonomy
VIII. CLOUD- BASED STRATEGIES
A. Social-Awareness
Authors in [49] propose AMES-Cloud. This is a new
mobile video streaming framework. It has two main parts:
(1) adaptive mobile video streaming (AMoV), and (2)
efficient social video sharing (ESoV). A private agent is
afforded to each mobile user to provide efficient video
streaming services. AMoV lets her private agent
adaptively adjust her streaming flow with a scalable video
coding technique for a given user. This is based on the
feedback of link quality. ESoV monitors the social
7. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 03 Pages: 3400-3410 (2017) ISSN: 0975-0290
3406
network interactions among mobile users. This is similar
to AMoV. It then uses private agents to prefetch video
content in advance. The performance of the AMES-Cloud
framework is demonstrated. It is shown experimentally
that the private agents in the clouds can effectively provide
the adaptive streaming, and perform video sharing (i.e.,
prefetching) based on the social network analysis.
Authors in [54] propose and discuss a framework to
improve the quality of video services. They target mobile
users. The framework includes two parts: (1) cloud-
assisted adaptive video streaming, and (2) social-aware
video prefetching. A scalable video coding technique
based on the feedback of link condition is used for each
active mobile user. The video quality (bit rate) is
adaptively adjusted by a private agent. The private agent is
constructed in the cloud center. The online social network
interactions among mobile users are monitored by the
cloud-based agents. This ensures that videos shared among
users will be effectively prefetched in advance. A
prototype implementation of the framework is used to test
the adaptability of the video streaming and the
effectiveness of the social-aware prefetching supported by
cloud computing.
Authors in [21] study the problem of optimally adapting
ongoing cloud gaming sessions. Their goal is to maximize
the gamer experience in dynamic environments. The
considered problem is quite challenging because: 1) gamer
experience is subjective and hard to quantify; 2) the
existing open-source cloud gaming platform does not
support dynamic reconfigurations of video codecs; and 3)
the resource allocation among concurrent gamers leaves a
huge room to optimize. The authors rigorously address
these three challenges by: 1) conducting a crowdsourced
user study over the live Internet for an empirical gaming
experience model; 2) enhancing the cloud gaming
platform to support frame rate and bitrate adaptation on-
the-fly; and 3) proposed optimal yet efficient algorithms to
maximize the overall gaming experience or ensure the
fairness among gamers. Extensive trace-driven simulations
were conducted. It demonstrates the merits of the proposed
algorithms and implementation. Simulation results show
that the proposed efficient algorithms: 1) outperform the
baseline algorithms by up to 46% and 30%; 2) run fast and
scale to large (≥8000 gamers) problems; and 3) achieve
the user-specified optimization criteria, such as
maximizing average gamer experience or maximizing the
minimum gamer experience. The resulting cloud gaming
platform can be leveraged by many researchers,
developers, and gamers.
Authors in [17] present a generic AVS cloud-based
framework. It utilizes powerful and elastic cloud
computing services. These services are used for
crowdsourced live streaming. However, the framework
works with heterogeneous broadcasters and viewers. It
jointly considers the viewer satisfaction and the service
availability/pricing. These metrics are based on the geo-
distributed cloud resources for transcoding. We develop an
optimal scheduler for allocating cloud instances with no
regional constraints. The framework is then extended to
accommodate regional constraints. In addition, a series of
practical enhancements is discussed. These include: (a)
popularity forecasting, (b) initialization latency, and (c)
viewer feedbacks. These solutions have been evaluated
under diverse networks and cloud system configurations.
Parameter settings were also given. The superiority of the
design was confirmed with trace-driven simulations.
Planetlab-based experiments were offered as giving
further practical hints toward real-world migration.
B.Cloud-based CDN
Authors in [10] focus on the design of a control plane for
cloud-based adaptive video streaming delivery networks.
It employs feedback control techniques. A dynamical
Resource Allocation Controller is designed. The controller
throttles the number of virtual machines in a Cloud-based
CDN. The goal is to minimize the distribution costs, and
provide the highest video quality to the user. Results are
obtained via experiments. These indicate that the resource
allocation controller is able to significantly decrease
distribution costs. In addition, it provides a high video
quality to the user.
Authors in [26] study a QoE-driven mobile edge caching
placement optimization problem. It is targeted for dynamic
adaptive video streaming environments that properly takes
into account (1) the different rate distortion (R-D)
characteristics of videos, and (2) the coordination among
distributed edge servers. Then, the aggregate average
video distortion reduction of all users is maximized. This
is done by the optimal caching placement of
representations for multiple videos. At the same time the
additional cost of representation downloading from the
base station is minimized. This maximization and
minimization is subject not only to the storage capacity
constraints of the edge servers, but also to the transmission
and initial startup delay constraints of the users. The
proposed optimization problem is formulated as an integer
linear program (ILP). It provides the performance upper
bound. In addition, a practically feasible cost benefit
greedy algorithm is developed. This is taken as a
submodular maximization problem with a set of knapsack
constraints. The proposed algorithm has polynomial
computational complexity and a theoretical lower bound
on its performance. Simulation results were collected. The
proposed algorithm can achieve a near-optimal
performance with very low time complexity. Thus, the
proposed optimization framework reveals the caching
performance upper bound for general adaptive video
streaming systems. The proposed algorithm provides some
design guidelines for the edge servers to select the cached
representations in practice. This is based on both the video
popularity and content information.
Authors in [4] present an integer linear program (ILP) for
cloud-based CDN AVS. It maximizes the average user
quality of experience (QoE). A heuristic algorithm is
proposed that can scale to large number of videos and
users. Two new datasets are introduced: (a) one
characterizing a popular live streaming provider (Twitch),
and (2) another characterizing the computing resources
needed to transcode a video. Realistic test scenarios are set
up. The performance of the optimal ILP solution is
compared with current industry standards. It shows that
8. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 03 Pages: 3400-3410 (2017) ISSN: 0975-0290
3407
the latter are sub-optimal. The importance of the type of
video on the optimal streaming preparation is shown by
the solution of the ILP. The proposed heuristic can
efficiently satisfy a time varying demand with an almost
constant amount of computing resources by taking
advantage of this.
C.Cloud-based Gaming
Authors in [52] propose a rendering adaptation technique.
It can dynamically vary the richness and complexity of
graphic rendering depending on the network and cloud
computing constraints. Thus, it impacts both the bit rate of
the rendered video (this needs to be streamed back from
the cloud server to the mobile device), and the
computation load on the Cloud Mobile Gaming (CMG)
servers. Experiments were conducted on a cellular
network. These demonstrate that the proposed technique
can significantly improve user experience. It also ensures
scalability of the CMG approach in terms of both network
bandwidth and server computational need.
Authors in [57] propose an online video frame selection
algorithm. It minimizes the total distortion. This is based
on: (1) the network status, (2) input video data, and (3)
delay constraint. In addition, researchers introduce an
unequal FEC coding scheme. It provides differentiated
protection for Intra (I) and Predicted (P) frames with low-
latency cost. The proposed APHIS framework can
appropriately filter video frames. It adjusts data protection
levels to optimize the quality of High-frame-rate (HFR)
video streaming. Extensive emulations in Exata involving
HFR video encoded with H.264 codec was conduct.
Experimental results were obtained via simulation. It was
shown that APHIS outperforms the reference transmission
schemes in terms of (a) video peak signal-to-noise ratio,
(b) end-to-end delay, and (c) goodput. APHIS was
recommended for delivering HFR video streaming in
mobile cloud gaming systems.
Authors in [16] focus on how to automatically tune the
video quality to meet with the available network resources.
In doing so it increases the user’s video quality. The server
stores several streams at different quality and resolution
then switches among them during the play back to match
user bandwidth and CPU. The proposed approach is
compared to traditional streaming techniques. It shows
better performance in term of Frame Rate (FR) switching.
The FR remains unchanged. In addition, the resolution of
the video matches the available bandwidth at the terminal.
D.Cloud-based SDN
An adaptive Software Defined Networking (SDN)-based
architecture running on Cloud Mobile Media (CMM) is
proposed in [15]. It estimates MOS using a statistical
method. This method is based on Factor Analysis (FA).
Consequently, the SDN controller will be able to schedule
different actions. The MOS estimation is based on
different measured variables throughout the CMM
infrastructure. The accuracy of the estimated MOS is
tested experimentally against well-known publicly
available video quality algorithms.
E. File-hosting services
Vsync is a framework for cloud based video
synchronization, which is introduced in [6]. It is targeted
for mobile devices. A video content is streamed using (1) a
cloud-based real-time transcoding, and (2) a transmission
framework to provide smooth video quality. It is built over
prediction models for video transcoding sessions. In
addition, it uses a QoE based adaptive video streaming
protocol. Vsync is able to obtain the improvements of 37
to 80% when compared to other schemes. Experimental
evaluations were done using a dataset on a pool of 220K
video clips.
F.View synthesis techniques
An improved DASH-based IMVS scheme over wireless
networks is proposed in [62]. The main contributions are
twofold: (1) the scheme allows virtual views to be
generated at either the cloud-based server or the client,
which adaptively selects the optimal approach based on
the network condition together with the cost of the cloud,
and (2) scalable video coding is used in our system. NS3
are used to run simulations. It demonstrates the advantage
of the proposed scheme over the existing approach with
client based view synthesis and single-layer video coding.
G.Error Concealment techniques
Authors in [50] proposes a time-efficient and quality
oriented Error Concealment (EC) method. The proposed
method considers H.265/HEVC based intra-encoded
videos. This is then used for the estimation of whole intra-
frame loss. The recovery of Motion Vectors (MVs) of a
lost frame in real-time is the main emphasis in the
proposed approach. A bigger block size and searching in
parallel are both considered to boost up the search process
for the lost MVs. Simulation results are carried out. It
clearly shows that the proposed method outperforms the
traditional Block Matching Algorithm (BMA). This is by
approximately 2.5 dB. The Frame Copy (FC) outperforms
the BMB by up to 12 dB at a packet loss rate of 1%, 3%,
and 5% with different Quantization Parameters (QPs). The
BMA is outperformed by the proposed approach by
approximately 1788 seconds.
IX. CONCLUSION
SAND-based approaches to DASH have certain
advantages over traditional client- or proxy-based
approaches. It is proposed that the sharing of information
among client and network devices enhances the streaming
process. This work produces a novel taxonomy for SAND-
based approaches. It places AVS solutions into four
categories: (1) Management Architecture (2) Cache-based,
(3) Optimization, and (4) Paradigm. Sub-categories of
Management Architecture are (a) Cognitive, (b)
Prioritization, and (c) Encoding and Signaling, while sub-
categories of Paradigm are (a) SDN-based, (b) CDN-
based, and (c) CCN-based. The approaches representing
each category are presented. It is shown that using the
SANDs architecture proves beneficial to approaches
adopting it.
Cloud-based strategies for AVS have been an important
area of research and industry. This paper elaborates on
Cloud-based strategies. It places current strategies into a
taxonomy. The Cloud-based AVS strategies are
categorized into (1) Social-Awareness, (2) Cloud-based
CDN, (3) Cloud-based Gaming, (4) Cloud-based SDN, (5)
9. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 03 Pages: 3400-3410 (2017) ISSN: 0975-0290
3408
File-hosting services, (6) View synthesis techniques, and
(7) Error Concealment techniques. The implementations
that exist for the Cloud-based strategies are discussed.
Thus, the advantages of both SAND and Cloud-based
approaches for use in DASH-based systems are illustrated.
REFERENCES
[1] “The State of MPEG-DASH 2015 - Streaming Media
Magazine.” [Online]. Available:
http://www.streamingmedia.com/Articles/ReadArticle
.aspx?ArticleID=102826&PageNum=2. [Accessed:
13-May-2017].
[2] Altaf, Muhammad, Farman Ali Khan, Nadia Qadri,
Mohammed Ghanbari, and Sandra E. Dudley.
"Adaptive robust video broadcast via satellite."
Multimedia Tools and Applications 76, no. 6 (2017):
7785-7801.
[3] Aouini, Zied, Mamadou Tourad Diallo, Ali Gouta,
Anne-Marie Kermarrec, and Yannick Lelouedec.
"Improving caching efficiency and quality of
experience with CF-Dash." In Proceedings of
Network and Operating System Support on Digital
Audio and Video Workshop, p. 61. ACM, 2014.
[4] Aparicio-Pardo, Ramon, Karine Pires, Alberto Blanc,
and Gwendal Simon. "Transcoding live adaptive
video streams at a massive scale in the cloud." In
Proceedings of the 6th ACM Multimedia Systems
Conference, pp. 49-60. ACM, 2015.
[5] Bagci, K. Tolga, Kemal E. Sahin, and A. Murat
Tekalp. "Queue-allocation optimization for adaptive
video streaming over software defined networks with
multiple service-levels." In Image Processing (ICIP),
2016 IEEE International Conference on, pp. 1519-
1523. IEEE, 2016.
[6] Baik, Eilwoo, Amit Pande, Zizhan Zheng, and Prasant
Mohapatra. "VSync: Cloud based video streaming
service for mobile devices." In Computer
Communications, IEEE INFOCOM 2016-The 35th
Annual IEEE International Conference on, pp. 1-9.
IEEE, 2016.
[7] Cofano, Giuseppe, Luca De Cicco, Thomas Zinner,
Anh Nguyen-Ngoc, Phuoc Tran-Gia, and Saverio
Mascolo. "Design and Performance Evaluation of
Network-assisted Control Strategies for HTTP
Adaptive Streaming." ACM Transactions on
Multimedia Computing, Communications, and
Applications (TOMM) 13, no. 3s (2017): 42.
[8] D'Aronco, Stefano, Laura Toni, and Pascal Frossard.
"Price-Based Controller for Utility-Aware HTTP
Adaptive Streaming." IEEE MultiMedia 24, no. 2
(2017): 20-29.
[9] De Cicco, Luca, and Saverio Mascolo. "An adaptive
video streaming control system: Modeling, validation,
and performance evaluation." IEEE/ACM
Transactions on Networking (TON) 22, no. 2 (2014):
526-539.
[10]De Cicco, Luca, Saverio Mascolo, and Dario
Calamita. "A resource allocation controller for cloud-
based adaptive video streaming." In Communications
Workshops (ICC), 2013 IEEE International
Conference on, pp. 723-727. IEEE, 2013.
[11]Du, Haipeng, Qinghua Zheng, Weizhan Zhang, and
Yunhui Huang. "LTE-EMU: A High Fidelity LTE
Cellar Network Testbed for Mobile Video
Streaming." Mobile Networks and Applications 22,
no. 3 (2017): 454-463.
[12]Egilmez, Hilmi E., S. Tahsin Dane, K. Tolga Bagci,
and A. Murat Tekalp. "OpenQoS: An OpenFlow
controller design for multimedia delivery with end-to-
end Quality of Service over Software-Defined
Networks." In Signal & Information Processing
Association Annual Summit and Conference
(APSIPA ASC), 2012 Asia-Pacific, pp. 1-8. IEEE,
2012.
[13]Fajardo, Jose Oscar, Ianire Taboada, and Fidel
Liberal. "Improving content delivery efficiency
through multi-layer mobile edge adaptation." IEEE
Network 29, no. 6 (2015): 40-46.
[14]Farshad, Arsham, Panagiotis Georgopoulos, Matthew
Broadbent, Mu Mu, and Nicholas Race. "Leveraging
SDN to provide an in-network QoE measurement
framework." In Computer Communications
Workshops (INFOCOM WKSHPS), 2015 IEEE
Conference on, pp. 239-244. IEEE, 2015.
[15]García-Pineda, Miguel, Santiago Felici-Castell, and
Jaume Segura-García. "Adaptive SDN-based
architecture using QoE metrics in live video
streaming on Cloud Mobile Media." In Software
Defined Systems (SDS), 2017 Fourth International
Conference on, pp. 100-105. IEEE, 2017.
[16]Gharsallaoui, Rahma, Mohamed Hamdi, and Tai-
Hoon Kim. "Video streaming strategy based on
feedback control loop theory in cloud platform." In
Ubiquitous and Future Networks (ICUFN), 2017
Ninth International Conference on, pp. 854-859.
IEEE, 2017.
[17]He, Qiyun, Jiangchuan Liu, Chonggang Wang, and
Bo Li. "Coping with heterogeneous video contributors
and viewers in crowdsourced live streaming: A cloud-
based approach." IEEE Transactions on Multimedia
18, no. 5 (2016): 916-928.
[18]Heikkinen, Antti, Janne Vehkaperä, Toni Mäki, and
Mikko Myllyniemi. "Dynamic and intelligent sand-
enabled cdn management." In Proceedings of the 7th
International Conference on Multimedia Systems, p.
35. ACM, 2016.
[19]Heikkinen, Antti, Tiia Ojanperä, and Janne
Vehkaperä. "Dynamic cache optimization for DASH
clients in content delivery networks." In Consumer
Communications & Networking Conference (CCNC),
2016 13th IEEE Annual, pp. 980-983. IEEE, 2016.
[20]Hemmati, Mahdi. "New Bandwidth Allocation
Methods to Provide Quality-of-Experience Fairness
for Video Streaming Services." PhD diss., Université
d'Ottawa/University of Ottawa, 2017.
[21]Hong, Hua-Jun, Chih-Fan Hsu, Tsung-Han Tsai,
Chun-Ying Huang, Kuan-Ta Chen, and Cheng-Hsin
Hsu. "Enabling adaptive cloud gaming in an open-
source cloud gaming platform." IEEE Transactions on
10. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 03 Pages: 3400-3410 (2017) ISSN: 0975-0290
3409
Circuits and Systems for Video Technology 25, no. 12
(2015): 2078-2091.
[22]Jmal, Rihab, Gwendal Simon, and Lamia Chaari.
"Network-assisted strategy for dash over CCN." In
Multimedia and Expo (ICME), 2017 IEEE
International Conference on, pp. 13-18. IEEE, 2017.
[23]Kleinrouweler, Jan Willem, Sergio Cabrero, and
Pablo Cesar. "Delivering stable high-quality video:
An SDN architecture with dash assisting network
elements." In Proceedings of the 7th International
Conference on Multimedia Systems, p. 4. ACM,
2016.
[24]Kumar, Satish, Santhosh Sriram, Arnab Sarkar, and
Arijit Sur. "A three level adaptive video streaming
framework over LTE." In Systems, Man, and
Cybernetics (SMC), 2016 IEEE International
Conference on, pp. 002442-002447. IEEE, 2016.
[25]Lai, Cheng-Jia, Wenyi Wang, and Shih-cheng Stan
Yang. "Adaptive marking for WRED with intra-flow
packet priorities in network queues." U.S. Patent
9,680,760, issued June 13, 2017.
[26]Li, Chenglin, Laura Toni, Junni Zou, Hongkai Xiong,
and Pascal Frossard. "QoE-Driven Mobile Edge
Caching Placement for Adaptive Video Streaming."
IEEE Transactions on Multimedia (2017).
[27]Lievens, Jan, Adrian Munteanu, Danny De
Vleeschauwer, and Werner Van Leekwijck.
"Perceptual video quality assessment in HTTP
adaptive streaming." In Consumer Electronics
(ICCE), 2015 IEEE International Conference on, pp.
72-73. IEEE, 2015.
[28]Liu, Yaning, Joost Geurts, Jean-Charles Point, Stefan
Lederer, Benjamin Rainer, Christopher Muller,
Christian Timmerer, and Hermann Hellwagner.
"Dynamic adaptive streaming over CCN: a caching
and overhead analysis." In Communications (ICC),
2013 IEEE International Conference on, pp. 3629-
3633. IEEE, 2013.
[29]Mahindra, Rajesh, Mohammad Khojastepour,
Sampath Rangarajan, and Jiasi Chen. "Scheduling
framework for adaptive video delivery over cellular
networks." U.S. Patent 9,338,693, issued May 10,
2016.
[30]Mangla, Tarun, Nawanol Theera-Ampornpunt,
Mostafa Ammar, Ellen Zegura, and Saurabh Bagchi.
"Video through a crystal ball: effect of bandwidth
prediction quality on adaptive streaming in mobile
environments." In Proceedings of the 8th International
Workshop on Mobile Video, p. 1. ACM, 2016.
[31]Mangla, Tarun, Nawanol Theera-Ampornpunt,
Mostafa Ammar, Ellen Zegura, and Saurabh Bagchi.
"Video through a crystal ball: effect of bandwidth
prediction quality on adaptive streaming in mobile
environments." In Proceedings of the 8th International
Workshop on Mobile Video, p. 1. ACM, 2016.
[32]Menkovski, V., and A. Liotta. "Intelligent control for
adaptive video streaming." In Consumer Electronics
(ICCE), 2013 IEEE International Conference on, pp.
127-128. IEEE, 2013.
[33]Metzger, Florian, Eirini Liotou, Christian Moldovan,
and Tobias Hoßfeld. "TCP video streaming and
mobile networks: Not a love story, but better with
context." Computer Networks 109 (2016): 246-256.
[34]Mu, Mu, Matthew Broadbent, Arsham Farshad,
Nicholas Hart, David Hutchison, Qiang Ni, and
Nicholas Race. "A scalable user fairness model for
adaptive video streaming over SDN-assisted future
networks." IEEE Journal on Selected Areas in
Communications 34, no. 8 (2016): 2168-2184.
[35]Munaretto, Daniele, Fabio Giust, Gerald Kunzmann,
and Michele Zorzi. "Performance analysis of dynamic
adaptive video streaming over mobile content delivery
networks." In Communications (ICC), 2014 IEEE
International Conference on, pp. 1053-1058. IEEE,
2014.
[36]Nguyen, Duy-Huy, Hang Nguyen, and Eric Renault.
"A new non-intrusive model for measuring volte
quality based on wideband e-model."
Communications on Applied Electronics 5, no. 8
(2016): 8.
[37]Ojanpera, Tiia, and Heli Kokkoniemi-Tarkkanen.
"Experimental Evaluation of a Wireless Bandwidth
Management System for Multiple DASH Clients." In
Global Communications Conference (GLOBECOM),
2016 IEEE, pp. 1-7. IEEE, 2016.
[38]Ojanperä, Tiia, and Heli Kokkoniemi-Tarkkanen.
"Wireless bandwidth management for multiple video
clients through network-assisted DASH." In World of
Wireless, Mobile and Multimedia Networks
(WoWMoM), 2016 IEEE 17th International
Symposium on A, pp. 1-3. IEEE, 2016.
[39]Oyman, Ozgur. "Dash-aware network application
function (d-naf)." U.S. Patent Application 14/653,779,
filed December 23, 2013.
[40]Petrangeli, Stefano, Tim Wauters, Rafael Huysegems,
Tom Bostoen, and Filip De Turck. "Network-based
dynamic prioritization of HTTP adaptive streams to
avoid video freezes." In Integrated Network
Management (IM), 2015 IFIP/IEEE International
Symposium on, pp. 1242-1248. IEEE, 2015.
[41]Rainer, Benjamin, Stefan Petscharnig, Christian
Timmerer, and Hermann Hellwagner. "Statistically
Indifferent Quality Variation: An Approach for
Reducing Multimedia Distribution Cost for Adaptive
Video Streaming Services." IEEE Transactions on
Multimedia 19, no. 4 (2017): 849-860.
[42]Raj, L. Arun, Dhananjay Kumar, H. Iswarya, S.
Aparna, and A. Srinivasan. "Adaptive video streaming
over HTTP through 4G wireless networks based on
buffer analysis." EURASIP Journal on Image and
Video Processing 2017, no. 1 (2017): 41.
[43]Ramakrishna, M., and A. K. Karunakar. "SIP and
SDP based content adaptation during real-time video
streaming in Future Internets." Multimedia Tools and
Applications 76, no. 20 (2017): 21171-21191.
[44]Rodríguez, Demóstenes Z., Zhou Wang, Renata L.
Rosa, and Graça Bressan. "The impact of video-
quality-level switching on user quality of experience
in dynamic adaptive streaming over HTTP."
11. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 03 Pages: 3400-3410 (2017) ISSN: 0975-0290
3410
EURASIP Journal on Wireless Communications and
Networking 2014, no. 1 (2014): 216.
[45]Staelens, Nicolas, Jonas De Meulenaere, Maxim
Claeys, Glenn Van Wallendael, Wendy Van den
Broeck, Jan De Cock, Rik Van de Walle, Piet
Demeester, and Filip De Turck. "Subjective quality
assessment of longer duration video sequences
delivered over HTTP adaptive streaming to tablet
devices." IEEE Transactions on Broadcasting 60, no.
4 (2014): 707-714.
[46]Thomas, Emmanuel, M. O. van Deventer, Thomas
Stockhammer, Ali C. Begen, and Jeroen Famaey.
"Enhancing MPEG DASH performance via server and
network assistance." (2015): 8-8.
[47]Thomas, Emmanuel, M. O. van Deventer, Thomas
Stockhammer, Ali C. Begen, M-L. Champel, and
Ozgur Oyman. "Applications and deployments of
server and network assisted DASH (SAND)." (2016):
22-8.
[48]Trevisan, Martino, Idilio Drago, and Marco Mellia.
"Impact of Access Speed on Adaptive Video
Streaming Quality: A Passive Perspective." In
Proceedings of the 2016 workshop on QoE-based
Analysis and Management of Data Communication
Networks, pp. 7-12. ACM, 2016.
[49]Uitto, Mikko, and Antti Heikkinen. "SAND-assisted
encoding control for energy-aware MPEG-DASH live
streaming." In Software, Telecommunications and
Computer Networks (SoftCOM), 2016 24th
International Conference on, pp. 1-5. IEEE, 2016.
[50]Usman, Muhammad, Xiangjian He, Kin-Man Lam,
Min Xu, Syed Mohsin Matloob Bokhari, and Jinjun
Chen. "Frame interpolation for cloud-based mobile
video streaming." IEEE Transactions on Multimedia
18, no. 5 (2016): 831-839.
[51]Van Adrichem, Niels LM, Christian Doerr, and
Fernando A. Kuipers. "Opennetmon: Network
monitoring in openflow software-defined networks."
In Network Operations and Management Symposium
(NOMS), 2014 IEEE, pp. 1-8. IEEE, 2014.
[52]Wang, Shaoxuan, and Sujit Dey. "Adaptive mobile
cloud computing to enable rich mobile multimedia
applications." IEEE Transactions on Multimedia 15,
no. 4 (2013): 870-883.
[53]Wang, Xiaofei, Min Chen, Ted Taekyoung Kwon,
LaurenceT Yang, and Victor CM Leung. "AMES-
cloud: A framework of adaptive mobile video
streaming and efficient social video sharing in the
clouds." IEEE Transactions on Multimedia 15, no. 4
(2013): 811-820..
[54]Wang, Xiaofei, Ted Kwon, Yanghee Choi, Haiyang
Wang, and Jiangchuan Liu. "Cloud-assisted adaptive
video streaming and social-aware video prefetching
for mobile users." IEEE wireless communications 20,
no. 3 (2013): 72-79.
[55]Wen, Yonggang, Xiaoqing Zhu, Joel JPC Rodrigues,
and Chang Wen Chen. "Cloud mobile media:
Reflections and outlook." IEEE transactions on
multimedia 16, no. 4 (2014): 885-902.
[56]Wu, Jiyan, Chau Yuen, Ngai-Man Cheung, and
Junliang Chen. "Delay-constrained high definition
video transmission in heterogeneous wireless
networks with multi-homed terminals." IEEE
Transactions on Mobile Computing 15, no. 3 (2016):
641-655.
[57]Wu, Jiyan, Chau Yuen, Ngai-Man Cheung, Junliang
Chen, and Chang Wen Chen. "Enabling adaptive
high-frame-rate video streaming in mobile cloud
gaming applications." IEEE Transactions on Circuits
and Systems for Video Technology 25, no. 12 (2015):
1988-2001.
[58]Xie, Xiufeng, Xinyu Zhang, Swarun Kumar, and Li
Erran Li. "pistream: Physical layer informed adaptive
video streaming over lte." In Proceedings of the 21st
Annual International Conference on Mobile
Computing and Networking, pp. 413-425. ACM,
2015.
[59]Xue, Jingteng, Dong-Qing Zhang, Heather Yu, and
Chang Wen Chen. "Assessing quality of experience
for adaptive HTTP video streaming." In Multimedia
and Expo Workshops (ICMEW), 2014 IEEE
International Conference on, pp. 1-6. IEEE, 2014.
[60]Yin, Xiaoqi, Mihovil Bartulović, Vyas Sekar, and
Bruno Sinopoli. "On the efficiency and fairness of
multiplayer HTTP-based adaptive video streaming."
In American Control Conference (ACC), 2017, pp.
4236-4241. IEEE, 2017.
[61]Yin, Xiaoqi, Vyas Sekar, and Bruno Sinopoli.
"System and Method for Dynamic Adaptive Video
Streaming Using Model Predictive Control." U.S.
Patent Application 15/082,444, filed March 28, 2016.
[62]Zhao, Mincheng, Xiangyang Gong, Jie Liang, Jia
Guo, Wendong Wang, Xirong Que, and Shiduan
Cheng. "A cloud-assisted DASH-based scalable
interactive multiview video streaming framework." In
Picture Coding Symposium (PCS), 2015, pp. 221-226.
IEEE, 2015.
Authors Biography
Koffka Khan received the M.Sc., and
M.Phil. degrees from the University of
the West Indies. He is currently a PhD
student and has up-to-date, published
numerous papers in journals &
proceedings of international repute. His
research areas are computational intelligence, routing
protocols, wireless communications, information security
and adaptive streaming controllers.
Wayne Goodridge is a Lecturer in the
Department of Computing and
Information Technology, The
University of the West Indies, St.
Augustine. He did is PhD at Dalhousie
University and his research interest
includes computer communications and security.