Recent years have witnessed the blossom of online social network service and online
video service as well as the rapid convergence of the two services. Social video contents or social videos
in short that is generated and shared by users in online social networks are becoming increasingly
popular on today's Internet. The unique propagation properties make the video access pattern in the
online social network quite different from that in the traditional centralized video service systems, in that
(1) video contents are no longer produced by a few centralized content providers, but by all individual
users; and (2) social connections and social activities determine the propagation of the videos among the
users. In that Existing system Secure Social tube, an improved peer-assisted video sharing system that
explores interest similarity, physical location and social relationship between peers in OSNs.
Specifically, social Tube incorporates four algorithms: a social network (SN)-based a buffer
management, scheduling, chunk delivery, chunk prefetching and P2P overlay construction. Proposed
system implement secure social tube approach to share useful videos in online social network and
implement video conversion approach to convert videos into frames and check each and every frames
using video content features and also eliminate the redundant video shared on network. Implement this
social tube framework in security manner.
This poster by Jennifer Smith about methods of education and community outreach and input at the Rat Genome Database was presented at the December 2009 Rat Genomics and Models meeting at Cold Spring Harbor Laboratory.
This poster by Jennifer Smith about methods of education and community outreach and input at the Rat Genome Database was presented at the December 2009 Rat Genomics and Models meeting at Cold Spring Harbor Laboratory.
Enhanced Social Media Marketing with WordPressBrian Rotsztein
These are the slides from my WordCamp Montreal 2012 talk. If you missed it, you can always try attending one of my other talks, full-day workshops, or hire me for consulting on social media marketing, SEO, online business strategies or other related topics. Of course, my company can build you a full SEO-friendly website from the ground up and then use some of the social media techniques that were discussed. Finally, thank you for all of the great feedback I've received for this talk. I appreciate it and I'm glad you found it helpful.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
hey!!!!! everybody dats was simple ppt on mobile computing as u all aware dat d world is not stationary things are getting change technology is rocking all over so lets get into in it
and plz. dont forget to comment on my work weather u lik or not
Prevention based mechanism for attacks in Network SecurityEditor IJMTER
Network Security has become vital in today’s information technology era, as a result
of that numerous techniques are a unit adopted to bypass it. Network administrator has to be
compelled to manage with the recent advancements in each the hardware and software system fields
for their betterment of the user’s knowledge. This paper outlines the varied attack strategies in the
field of Networking and numerous prevention mechanisms against them.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Enhanced Social Media Marketing with WordPressBrian Rotsztein
These are the slides from my WordCamp Montreal 2012 talk. If you missed it, you can always try attending one of my other talks, full-day workshops, or hire me for consulting on social media marketing, SEO, online business strategies or other related topics. Of course, my company can build you a full SEO-friendly website from the ground up and then use some of the social media techniques that were discussed. Finally, thank you for all of the great feedback I've received for this talk. I appreciate it and I'm glad you found it helpful.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
hey!!!!! everybody dats was simple ppt on mobile computing as u all aware dat d world is not stationary things are getting change technology is rocking all over so lets get into in it
and plz. dont forget to comment on my work weather u lik or not
Prevention based mechanism for attacks in Network SecurityEditor IJMTER
Network Security has become vital in today’s information technology era, as a result
of that numerous techniques are a unit adopted to bypass it. Network administrator has to be
compelled to manage with the recent advancements in each the hardware and software system fields
for their betterment of the user’s knowledge. This paper outlines the varied attack strategies in the
field of Networking and numerous prevention mechanisms against them.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
PEER-TO-PEER LIVE STREAMING AND VIDEO ON DEMAND DESIGN ISSUES AND ITS CHALLEN...ijp2p
Peer-to-Peer Live streaming and Video on Demand is the most popular media applications over the
Internet in recent years. These systems reduce the load on the server and provide a scalable content
distribution. A new paradigm of P2P network collaborates to build large distributed video applications
on existing networks .But, the problem of designing the system are at par with the P2P media streaming,
live and Video on demand systems. Hence a comprehensive design comparison is needed to build such
kind of system architecture. Therefore, in this paper we elaborately studied the traditional approaches for
P2P streaming architectures, and its critical design issues, as well as practicable challenges. Thus, our
studies in this paper clearly point the tangible design issues and its challenges, and other intangible
issues for providing P2P VoD services.
Live multimedia streaming and video on demand issues and challengeseSAT Journals
Abstract
Live Streaming and Video on Demand are the trending technologies nowadays over the internet. It provides the mechanism to
deliver multimedia content such as audio or video to the large number of audience. However internet based services face the
problem of QOS (Quality of Service) due to the instability faced in networks. Performance gets degraded when serving content to
large number of consumers. Despite following the modern architectural design, precise estimate of resources such as bandwidth
and server load is a challenging task.. In this paper we delve into the architectural and performance issues of running these kinds
of services. Our study demonstrates that the streaming architecture and Security issues are the challenges faced by these
technologies. Moreover resources such as bandwidth and design of networks degrade the quality of multimedia data delivered to
users. Thus in order to have best experience of streaming and Video on demand services, these issues must be addressed.
Keywords— Live Streaming, VOD (Video On Demand), P2P Streaming, Client-Server Model.
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGijp2p
Peer-to-Peer (P2P) networking emerged as a disruptive business model displacing the server based
networks within a point in time.P2P technologies are on the edge of becoming all-purpose in developing
several applications for social networking. In the past seventeen years, research on P2P computing and
systems has received enormous amount of attention in the areas of academia and the industry. P2P rose to
triumphant profit-making systems in the internet. It represents the best incarnation of the end to end
argument, the frequently disputed design philosophies that guided the design of the internet. The doubting
factor then is why is research on P2P computing now fading from the spotlight and suffering a nose dive
fall as dramatic as its rise to its popularity. This paper is going to capture a quick look at past results in
peer-to-peer computing with focus on understanding what led to its rise, what contributed to its commercial
success and what has led to its lack of interest. The insight of this paper introduces cloud computing as a
paradigm to peer-to-peer computing.
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGijp2p
Peer-to-Peer (P2P) networking emerged as a disruptive business model displacing the server based
networks within a point in time.P2P technologies are on the edge of becoming all-purpose in developing
several applications for social networking. In the past seventeen years, research on P2P computing and
systems has received enormous amount of attention in the areas of academia and the industry. P2P rose to
triumphant profit-making systems in the internet. It represents the best incarnation of the end to end
argument, the frequently disputed design philosophies that guided the design of the internet. The doubting
factor then is why is research on P2P computing now fading from the spotlight and suffering a nose dive
fall as dramatic as its rise to its popularity. This paper is going to capture a quick look at past results in
peer-to-peer computing with focus on understanding what led to its rise, what contributed to its commercial
success and what has led to its lack of interest. The insight of this paper introduces cloud computing as a
paradigm to peer-to-peer computing.
Talk on "Socially-aware Traffic Management" given by Michael Seufert (http://www3.informatik.uni-wuerzburg.de/staff/michael.seufert/) at the workshop Sozioinformatik 2013 (http://www.sozioinformatik2013.de/, organized by Katharina Anna Zweig; held in conjunction with Jahrestagung der Gesellschaft für Informatik (INFORMATIK 2013)). The workshop addressed questions evolving around the interplay between social and technical systems, and bridged the gap from social sciences to computer sciences. The workshop talks gave an overview on different aspects of interactions between humans and IT-systems, and highlighted the need for a combination of social sciences and computer science in this field. The workshop showed that it is possible and sometimes necessary to integrate social studies into the design and application of IT-systems. This applies to SmartenIT especially in the context of socially-aware traffic management.
Michael Seufert, George Darzanos, Valentin Burger, Ioanna Papafili, Tobias Hoßfeld
Socially-Aware Traffic Management.
Workshop Sozioinformatik 2013, Koblenz, Germany, September 2013.
Abstract:
Socially-aware traffic management exploits social signals to optimize traffic management in the Internet in terms of traffic load, energy consumption, or end-user satisfaction. Several use cases can benefit from socially-aware traffic management and the performance of overlay applications can be enhanced. In the talk we show interdisciplinary efforts between communication networks and social network analysis. Specifically, we give an overview on existing use cases and solutions, but also raise discussions at the workshop on additional benefits from the integration of social information into traffic management.
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...Editor IJMTER
Due to the increasing popularity of video services application in recent days, it is
undesirable to prevent the content leakage on the trusted video delivery and piracy prevention has
been indeed, become critical. In order to preserve content leakage and prevent piracy,
conventional system addressed the issue by proposing the method based on the observation of
streamed traffic throughout the network .Also piracy has hindered the use of open peer to peer
networks for commercial content delivery. Hence the basic idea is to propose an enhanced
dynamic content leakage detection scheme that is robust to the variation of the video lengths. It
enhances the detection performances even in the environment subjected to variation in length of
videos. To detect pirates, identity-based signature and time stamped token have been generated. It
helps to solve piracy without affecting P2P clients so that colluder cannot download the secured
videos. The advantage lies mainly in advanced content availability, low cost and copyright
agreements in protecting the secured videos.
Peer-to-Peer Communication Service and Messaging SystemEditor IJMTER
The peer-to-peer communication services[1] has entered into the public limelight over the last few
years. Several researches are underway on peer-to-peer communication technologies, but no definitive conclusion
is currently available. Comparing to traditional server client technology on the Internet, the peer-to-peer
technology has capabilities to realize highly scalable, extensible and efficient distributed applications. Our work
presents an anonymous peer-to-peer (P2P) messaging system. A P2P network consists of a large number of peers
interconnected together to share all kinds of digital content. A key weakness of most existing P2P systems is the
lack of anonymity. Without anonymity, it is possible for third parties to identify the participants involved. First,
anonymous P2P system should make it impossible for third parties to identify the participants involved. Second,
anonymous P2P system should guarantee that only the content receiver knows the content. Third, anonymous P2P
system should allow the content publisher to plausibly deny that the content originated from him or her.
Copyright Protection in Peer To Peer NetworkIJERA Editor
Recently, P2P technology has become so popular that a large number of files are being exchanged by millions of users concurrently. However, due to the significant growth of P2P file sharing, even copyrighted files are also actively exchanged so copyright infringement has become a serious issue. In particular, P2P file sharing is recognized as a killer application for the P2P technology, and several P2P file sharing systems have been used by many users from the late 90’s to the present, including Napster, Gnutella, Kazaa and Bit Torrent. However, the popularization of such P2P file sharing causes several undesired issues in recent years, such as the illegal sharing of copyrighted contents violating the copyright law and the act as a hotbed of cyber-crimes such as phishing scams and leaks of personal information. In this work, we propose a solution to ensure copy right violation in P2P systems. Keywords- Peer to Peer systems, copyright infringement, file sharing, digital rights management, pollution attack, index poisoning, watermarking and fingerprinting.
Adaptive Sliding Piece Selection Window for BitTorrent SystemsWaqas Tariq
Peer to peer BitTorrent (P2P BT) systems are used for video-on-Demand (VoD) services. Scalability problem could face this system and would cause media servers not to be able to respond to the users’ requests on time. Current sliding window methods face problems like waiting for the window pieces to be totally downloaded before sliding to the next pieces and determining the window size that affects the video streaming performance. In this paper, a modification is developed for BT systems to select video files based on sliding window method. Developed system proposes using two sliding windows, High and Low, running simultaneously. Each window collects video pieces based on the user available bandwidth, video bit rate and a parameter that determines media player buffered seconds. System performance is measured and evaluated against other piece selection sliding window methods. Results show that our method outperforms the benchmarked sliding window methods
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIPEditor IJMTER
System-on-chip (soc) based system has so many disadvantages in power-dissipation as
well as clock rate while the data transfer from one system to another system in on-chip. At the same
time, a higher operated system does not support the lower operated bus network for data transfer.
However an alternative scheme is proposed for high speed data transfer. But this scheme is limited to
SOCs. Unlike soc, network-on-chip (NOC) has so many advantages for data transfer. It has a special
feature to transfer the data in on-chip named as transitional encoder. Its operation is based on input
transitions. At the same time it supports systems which are higher operated frequencies. In this
project, a low-power encoding scheme is proposed. The proposed system yields lower dynamic
power dissipation due to the reduction of switching activity and coupling switching activity when
compared to existing system. Even-though many factors which is based on power dissipation, the
dynamic power dissipation is only considerable for reasonable advantage. The proposed system is
synthesized using quartus II 9.1 software. Besides, the proposed system will be extended up to
interlink PE communication with help of routers and PE’s which are performed by various
operations. To implement this system in real NOC’s contains the proposed encoders and decoders for
data transfer with regular traffic scenarios should be considered.
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...Editor IJMTER
Coins are important part of our life. We use coins in a places like stores, banks, buses, trains
etc. So it becomes a basic need that coins can be sorted, counted automatically. For this, there is
necessary that the coins can be recognized automatically. Automated Coin Recognition System for the
Indian Coins of Rs. 1, 2, 5 and 10 with the rotation invariance. We have taken images from the both
sides of coin. So this system is capable to recognizing coins from both sides. Features are taken from the
images using techniques as a Hough Transformation, Pattern Averaging etc.
Analysis of VoIP Traffic in WiMAX EnvironmentEditor IJMTER
Worldwide Interoperability for Microwave Access (WiMAX) is currently one of the
hottest technologies in wireless communication. It is a standard based on the IEEE 802.16 wireless
technology that provides a very high throughput broadband connections over long distances. In
parallel, Voice Over Internet Protocol (VoIP) is a new technology which provides access to voice
communication over internet protocol and hence it is becomes an alternative to public switched
telephone networks (PSTN) due to its capability of transmission of voice as packets over IP
networks. A lot of research has been done in analyzing the performances of VoIP traffic over
WiMAX network. In this paper we review the analysis carried out by several authors for the most
common VoIP codec’s which are G.711, G.723.1 and G.729 over a WiMAX network using various
service classes. The objective is to compare the results for different types of service classes with
respect to the QoS parameters such as throughput, average delay and average jitter.
A Hybrid Cloud Approach for Secure Authorized De-DuplicationEditor IJMTER
The cloud backup is used for the personal storage of the people in terms of reducing the
mainlining process and managing the structure and storage space managing process. The challenging
process is the deduplication process in both the local and global backup de-duplications. In the prior
work they only provide the local storage de-duplication or vice versa global storage de-duplication in
terms of improving the storage capacity and the processing time. In this paper, the proposed system
is called as the ALG- Dedupe. It means the Application aware Local-Global Source De-duplication
proposed system to provide the efficient de-duplication process. It can provide the efficient deduplication process with the low system load, shortened backup window, and increased power
efficiency in the user’s personal storage. In the proposed system the large data is partitioned into
smaller part which is called as chunks of data. Here the data may contain the redundancy it will be
avoided before storing into the storage area.
Aging protocols that could incapacitate the InternetEditor IJMTER
The biggest threat to the Internet is the fact that it was never really designed. For e.g., the
BGP protocol is used by Internet routers to exchange information about changes to the Internet's
network topologies. However, it also is among the most fundamentally broken; as Internet routing
information can be poisoned with bogus routing information. Instead, it evolved in fits and start,
thanks to various protocols that have been cobbled together to fulfill the needs of the moment. Few
of protocols from them were designed with security in mind. or if they were sported no more than
was needed to keep out a nosy neighbor, not a malicious attacker. The result is a welter of aging
protocols susceptible to exploit on an Internet scale. Here are six Internet protocols that could stand
to be replaced sooner rather than later or are (mercifully) on the way out.
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...Editor IJMTER
The emergence of exactitude agriculture has been promoted by the numerous developments within
the field of wireless sensing element actor networks (WSAN). These WSANs offer important data
for gathering, work management, development of crops, and limitation of crop diseases. Goals of
this paper to introducing cloud computing as a brand new way (technique) to be utilized in addition
to WSANs to any enhance their application and benefits to the area of agriculture.
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESEditor IJMTER
Carpooling (also car-sharing, ride-sharing, lift-sharing), is the sharing of car journeys so
that more than one person travels in a car. It helps to resolve a variety of problems that continue to
plague urban areas, ranging from energy demands and traffic congestion to environmental pollution.
Most of the existing method used stochastic disturbances arising from variations in vehicle travel
times for carpooling. However it doesn’t deal with the unmet demand with uncertain demand of the
vehicle for car pooling. To deal with this the proposed system uses Chance constrained
formulation/Programming (CCP) approach of the problem with stochastic demand and travel time
parameters, under mild assumptions on the distribution of stochastic parameters; and relates it with a
robust optimization approach. Since real problem sizes can be large, it could be difficult to find
optimal solutions within a reasonable period of time. Therefore solution algorithm using tabu
heuristic solution approach is developed to solve the model. Therefore, we constructed a stochastic
carpooling model that considers the in- fluence of stochastic travel times. The model is formulated as
an integer multiple commodity network flow problem. Since real problem sizes can be large, it could
be difficult to find optimal solutions within a reasonable period of time.
Sustainable Construction With Foam Concrete As A Green Green Building MaterialEditor IJMTER
A green building is an environmentally sustainable building, designed, constructed and
operated to minimise the total environmental impacts. Carbon dioxide (CO2) is the primary
greenhouse gas emitted through human activities. It is claimed that 5% of the world’s carbon dioxide
emission is attributed to cement industry, which is the vital constituent of concrete. Due to the
significant contribution to the environmental pollution, there is a need for finding an optimal solution
along with satisfying the civil construction needs. Apart from normal concrete bricks, a clay brick,
Foam concrete is a new innovative technology for sustainable building and civil construction which
fulfills the criteria of being a Green Material. This paper concludes that Foam Concrete can be an
effective sustainable material for construction and also focuses on the cost effectiveness in using
Foam Concrete as a building material in replacement with Clay Brick or other bricks.
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTEditor IJMTER
A good education system is required for overall prosperity of a nation. A tremendous
growth in the education sector had made the administration of education institutions complex. Any
researches reveal that the integration of ICT helps to reduce the complexity and enhance the overall
administration of education. This study has been undertaken to identify the various functional areas
to which ICT is deployed for information administration in education institutions and to find the
current extent of usage of ICT in all these functional areas pertaining to information administration.
The various factors that contribute to these functional areas were identified. A theoretical model was
derived and validated.
Textual Data Partitioning with Relationship and Discriminative AnalysisEditor IJMTER
Data partitioning methods are used to partition the data values with similarity. Similarity
measures are used to estimate transaction relationships. Hierarchical clustering model produces tree
structured results. Partitioned clustering produces results in grid format. Text documents are
unstructured data values with high dimensional attributes. Document clustering group ups unlabeled text
documents into meaningful clusters. Traditional clustering methods require cluster count (K) for the
document grouping process. Clustering accuracy degrades drastically with reference to the unsuitable
cluster count.
Textual data elements are divided into two types’ discriminative words and nondiscriminative
words. Only discriminative words are useful for grouping documents. The involvement of
nondiscriminative words confuses the clustering process and leads to poor clustering solution in return.
A variation inference algorithm is used to infer the document collection structure and partition of
document words at the same time. Dirichlet Process Mixture (DPM) model is used to partition
documents. DPM clustering model uses both the data likelihood and the clustering property of the
Dirichlet Process (DP). Dirichlet Process Mixture Model for Feature Partition (DPMFP) is used to
discover the latent cluster structure based on the DPM model. DPMFP clustering is performed without
requiring the number of clusters as input.
Document labels are used to estimate the discriminative word identification process. Concept
relationships are analyzed with Ontology support. Semantic weight model is used for the document
similarity analysis. The system improves the scalability with the support of labels and concept relations
for dimensionality reduction process.
Testing of Matrices Multiplication Methods on Different ProcessorsEditor IJMTER
There are many algorithms we found for matrices multiplication. Until now it has been
found that complexity of matrix multiplication is O(n3). Though Further research found that this
complexity can be decreased. This paper focus on the algorithm and its complexity of matrices
multiplication methods.
Malware is a worldwide pandemic. It is designed to damage computer systems without
the knowledge of the owner using the system. Software‟s from reputable vendors also contain
malicious code that affects the system or leaks information‟s to remote servers. Malware‟s includes
computer viruses, spyware, dishonest ad-ware, rootkits, Trojans, dialers etc. Malware detectors are
the primary tools in defense against malware. The quality of such a detector is determined by the
techniques it uses. It is therefore imperative that we study malware detection techniques and
understand their strengths and limitations. This survey examines different types of Malware and
malware detection methods.
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
Practical requirements for securely demonstrating identities between two handheld
devices are an important concern. The adversary can inject a Man-In- The-Middle (MITM) attack to
intrude the protocol. Protocols that employ secret keys require the devices to share private
information in advance, in which it is not feasible in the above scenario. Apart from insecurely
typing passwords into handheld devices or comparing long hexadecimal keys displayed on the
devices’ screen, many other human-verifiable protocols have been proposed in the literature to solve
the problem. Unfortunately, most of these schemes are unsalable to more users. Even when there are
only three entities attempt to agree a session key, these protocols need to be rerun for three times.
So, in the existing method a bipartite and a tripartite authentication protocol is presented using a
temporary confidential channel. Besides, further extend the system into a transitive authentication
protocol that allows multiple handheld devices to establish a conference key securely and efficiently.
But this method detects only the outsider attacks. Method does not consider the insider attacks. So,
in the proposed method trust score based method is introduced which computes the trust values for
the nodes and provide the security. The trust score is computed has a positive influence on the
confidence with which an entity conducts transactions with that node. Network the behavior of the
node will be monitored periodically and its trust value is also updated .So depending on the behavior
of the node in the network trust relation will be established between two nodes.
GLAUCOMA is a chronic eye disease that can damage optic nerve. According to WHO It
is the second leading cause of blindness, and is predicted to affect around 80 million people by 2020.
Development of the disease leads to loss of vision, which occurs increasingly over a long period of
time. As the symptoms only occur when the disease is quite advanced so that glaucoma is called the
silent thief of sight. Glaucoma cannot be cured, but its development can be slowed down by
treatment. Therefore, detecting glaucoma in time is critical. However, many glaucoma patients are
unaware of the disease until it has reached its advanced stage. In this paper, some manual and
automatic methods are discussed to detect glaucoma. Manual analysis of the eye is time consuming
and the accuracy of the parameter measurements also varies with different clinicians. To overcome
these problems with manual analysis, the objective of this survey is to introduce a method to
automatically analyze the ultrasound images of the eye. Automatic analysis of this disease is much
more effective than manual analysis.
Survey: Multipath routing for Wireless Sensor NetworkEditor IJMTER
Reliability is playing very vital role in some application of Wireless Sensor Networks
and multipath routing is one of the ways to increase the probability of reliability. More over energy
consumption is constraint. In this paper, we provide a survey of the state-of-the-art of proposed
multipath routing algorithm for Wireless Sensor Networks. We study the design, analyze the tradeoff
of each design, and overview several presenting algorithms.
Step up DC-DC Impedance source network based PMDC Motor DriveEditor IJMTER
This paper is devoted to the Quasi Z source network based DC Drive. The cascaded
(two-stage) Quasi Z Source network could be derived by the adding of one diode, one inductor,
and two capacitors to the traditional quasi-Z-source inverter The proposed cascaded qZSI inherits all
the advantages of the traditional solution (voltage boost and buck functions in a single stage,
continuous input current, and improved reliability). Moreover, as compared to the conventional qZSI,
the proposed solution reduces the shoot-through duty cycle by over 30% at the same voltage boost
factor. Theoretical analysis of the two-stage qZSI in the shoot-through and non-shoot-through
operating modes is described. The proposed and traditional qZSI-networks are compared. A
prototype of a Quasi Z Source network based DC Drive was built to verify the theoretical
assumptions. The experimental results are presented and analyzed.
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONEditor IJMTER
The paper reflects the spiritual philosophy of Aurobindo Ghosh which is helpful in today’s
education. In 19th century he wrote about spirituality, in accordance with that it is a core and vital part
of today’s education. It is very much essential for today’s kid. Here I propose the overview of that
philosophy.At the utmost regeneration of those values in today’s generation is the great deal with
education system. To develop the values and spiritual education in the youngers is the great moto of
mine. It is the materialistic world and without value redefinition among them is the harder task but not
difficult.
Software Quality Analysis Using Mutation Testing SchemeEditor IJMTER
The software test coverage is used measure the safety measures. The safety critical analysis is
carried out for the source code designed in Java language. Testing provides a primary means for
assuring software in safety-critical systems. To demonstrate, particularly to a certification authority, that
sufficient testing has been performed, it is necessary to achieve the test coverage levels recommended or
mandated by safety standards and industry guidelines. Mutation testing provides an alternative or
complementary method of measuring test sufficiency, but has not been widely adopted in the safetycritical industry. The system provides an empirical evaluation of the application of mutation testing to
airborne software systems which have already satisfied the coverage requirements for certification.
The system mutation testing to safety-critical software developed using high-integrity subsets of
C and Ada, identify the most effective mutant types and analyze the root causes of failures in test cases.
Mutation testing could be effective where traditional structural coverage analysis and manual peer
review have failed. They also show that several testing issues have origins beyond the test activity and
this suggests improvements to the requirements definition and coding process. The system also
examines the relationship between program characteristics and mutation survival and considers how
program size can provide a means for targeting test areas most likely to have dormant faults. Industry
feedback is also provided, particularly on how mutation testing can be integrated into a typical
verification life cycle of airborne software. The system also covers the safety and criticality levels of
Java source code.
Software Defect Prediction Using Local and Global AnalysisEditor IJMTER
The software defect factors are used to measure the quality of the software. The software
effort estimation is used to measure the effort required for the software development process. The defect
factor makes an impact on the software development effort. Software development and cost factors are
also decided with reference to the defect and effort factors. The software defects are predicted with
reference to the module information. Module link information are used in the effort estimation process.
Data mining techniques are used in the software analysis process. Clustering techniques are used
in the property grouping process. Rule mining methods are used to learn rules from clustered data
values. The “WHERE” clustering scheme and “WHICH” rule mining scheme are used in the defect
prediction and effort estimation process. The system uses the module information for the defect
prediction and effort estimation process.
The proposed system is designed to improve the defect prediction and effort estimation process.
The Single Objective Genetic Algorithm (SOGA) is used in the clustering process. The rule learning
operations are carried out sing the Apriori algorithm. The system improves the cluster accuracy levels.
The defect prediction and effort estimation accuracy is also improved by the system. The system is
developed using the Java language and Oracle relation database environment.
Software Cost Estimation Using Clustering and Ranking SchemeEditor IJMTER
Software cost estimation is an important task in the software design and development process.
Planning and budgeting tasks are carried out with reference to the software cost values. A variety of
software properties are used in the cost estimation process. Hardware, products, technology and
methodology factors are used in the cost estimation process. The software cost estimation quality is
measured with reference to the accuracy levels.
Software cost estimation is carried out using three types of techniques. They are regression based
model, anology based model and machine learning model. Each model has a set of technique for the
software cost estimation process. 11 cost estimation techniques fewer than 3 different categories are
used in the system. The Attribute Relational File Format (ARFF) is used maintain the software product
property values. The ARFF file is used as the main input for the system.
The proposed system is designed to perform the clustering and ranking of software cost
estimation methods. Non overlapped clustering technique is enhanced with optimal centroid estimation
mechanism. The system improves the clustering and ranking process accuracy. The system produces
efficient ranking results on software cost estimation methods.
Water billing management system project report.pdfKamal Acharya
Our project entitled “Water Billing Management System” aims is to generate Water bill with all the charges and penalty. Manual system that is employed is extremely laborious and quite inadequate. It only makes the process more difficult and hard.
The aim of our project is to develop a system that is meant to partially computerize the work performed in the Water Board like generating monthly Water bill, record of consuming unit of water, store record of the customer and previous unpaid record.
We used HTML/PHP as front end and MYSQL as back end for developing our project. HTML is primarily a visual design environment. We can create a android application by designing the form and that make up the user interface. Adding android application code to the form and the objects such as buttons and text boxes on them and adding any required support code in additional modular.
MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software. It is a stable ,reliable and the powerful solution with the advanced features and advantages which are as follows: Data Security.MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
SECURED SOCIAL TUBE TO AVOID REDUNDANT VIDEO SHARING IN OSN SYSTEM
1. Scientific Journal Impact Factor (SJIF): 1.711
International Journal of Modern Trends in Engineering
and Research
www.ijmter.com
@IJMTER-2014, All rights Reserved 689
e-ISSN: 2349-9745
p-ISSN: 2393-8161
SECURED SOCIAL TUBE TO AVOID REDUNDANT VIDEO
SHARING IN OSN SYSTEM
J.Priyanka1
, P.Rajeswari 2
II-M.E(CS)1
, H.O.D / ECE2
, Dhanalakshmi Srinivasan Engineering College, Perambalur.
ABSTRACT: Recent years have witnessed the blossom of online social network service and online
video service as well as the rapid convergence of the two services. Social video contents or social videos
in short that is generated and shared by users in online social networks are becoming increasingly
popular on today's Internet. The unique propagation properties make the video access pattern in the
online social network quite different from that in the traditional centralized video service systems, in that
(1) video contents are no longer produced by a few centralized content providers, but by all individual
users; and (2) social connections and social activities determine the propagation of the videos among the
users. In that Existing system Secure Social tube, an improved peer-assisted video sharing system that
explores interest similarity, physical location and social relationship between peers in OSNs.
Specifically, social Tube incorporates four algorithms: a social network (SN)-based a buffer
management, scheduling, chunk delivery, chunk prefetching and P2P overlay construction. Proposed
system implement secure social tube approach to share useful videos in online social network and
implement video conversion approach to convert videos into frames and check each and every frames
using video content features and also eliminate the redundant video shared on network. Implement this
social tube framework in security manner.
KEYWORDS: online social networks, peer-to-peer network,
I. INTRODUCTION
The popularity of online social networks (OSNs) in recent years is continuously increasing. Facebook
(FB), in particular, is one of the most important online social networks (OSNs) today. It has the highest
number of active users with more than half active FB users returning daily and the largest number of
visitors among OSNs according to Comscore. OSN users establish friendship relations with real-world
friends and post their profiles and content such as notes, photos, and videos to their private pages. Video
sharing has been an increasingly popular application in OSNs, enabling users to share their interesting
videos they found with their friends.
Different approaches for peer assisted video sharing in online social networks are: NetTube,
SocialTube, etc. OSN based P2P streaming overlay, where social relationships are exploited to develop
a privileged video content distribution mechanism among peers that are also OSN members. The user
who have account in the online social networks they want to upload there videos on the networks and
share it with other members who have account in that network. The other persons who have relationship
with they are friends of the user want to view the shared video they will wait for the video for buffering.
To avoid this problem in the proposed the user upload the video on the social networks the video upload
on the socialtube automatically. So the other user can view the video easily without waiting for
buffering.
2. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 690
II. RELATED WORK:
In [4] Y. Huang, Z. Fu, D. Chiu, C. Lui, and C. Huang et al. In this paper, we describe and discuss
the challenges and the architectural design issues of a large-scale P2P-VoD system based on the
experiences of a real system deployed by PPLive. More recently, the interest has turned towards a new
kind of service, P2P video-on-demand (P2P-VoD). Based on a detailed analysis of a current client-
server VoD system at Microsoft, it was pointed out in that P2P-VoD could bring significant savings in
server loading. These P2P-VoD systems are already enjoying a large viewer population. we conduct an
in-depth study of P2P-VoD based on a real-world P2P-VoD system built and deployed by PPLive in the
fall of 2007. This general model serves to provide a framework and taxonomy for studying different
design issues in a P2P-VoD system. We discuss metrics for evaluating a P2P-VoD system, and how to
instrument the measurement in a real-life system. Real-life measurement data were collected from the
deployed PPLive VoD system. In this paper, we present a general architecture and important building
blocks of realizing a P2P-VoD system.
In [5] B. Cheng, L. Stein, H. Jin, X. Liao, and Z. Zhang et al. This article explains the evaluation,
design and implementation of GridCast, a real deployed P2P VoD system. In this article, we measure
GridCast and explore how to improve peer sharing by using caching and replication. The basic idea
behind GridCast is to enable peers to share with each other and offload the server. In GridCast, video
files are segmented on time rather than space. Tracker server is a well-known rendezvous for joining
peers. Peers fetch chunks from sources or peers and cache them in local memory and disk. Join. To in
the system, the peer notifies the tracker of its existence. When a user leaves the system, the peer notifies
the tracker and its neighbors and then closes all its TCP connections. Start. Users select a video to start a
session. Play. To play continuously, the peer performs two tasks; fetching from the network and feeding
to the media player. Pause. On a pause, the scheduler continues to fetch data from other peers and
provide data to other peers, but the media server stops sending chunks into the player. Seek. On a seek,
the peer moves the playhead to the target location, coordinate with the tracker for a new candidate list,
then activates the scheduler to satisfy the new data requirements. This article first presents the basic
design of a live P2P VoD system, namely GridCast, and then evaluates its performance through the data
trace collected from the initial deployment.
III. SOCIALTUBE:
In an online social network, contents spread among users by their social activities. A number of
research efforts have been devoted to studying the propagation of information in online social networks.
Video sharing has been an more and more well-liked application in online social networks (OSNs).
3. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 691
Figure 1: Structure of SocialTube
However, its sustainable development is severely hindered by the intrinsic limit of the
client/server architecture deployed in current OSN video systems, which is not only expensive in
conditions of server bandwidth and storage but also not scalable with the soaring amount of users and
video content. The peer-assisted Video-on-Demand (VoD) method, in which share peers help the server
in delivering video content has been proposed lately. Unluckily, videos can only be dispersed through
friends in OSNs. As a result, present VoD works that find clustering nodes with similar interests or close
location for high performance are suboptimal, if not entirely inapplicable, in OSNs. Apply breadth-first-
search to keep away from overloading the Face book in existing system. The bandwidth and storage load
on video servers for providing video services is high and has been increasing at a rapid rate. Time delay
is very high, when we watching videos in social network.
IV. SECURED SOCIALTUBE:
Online social networks (OSNs) (e.g., Facebook, Twitter) are now among the most popular sites
on the Web. An OSN offer a influential means of establish social connections and sharing, organizing,
Social Relation
Video Streaming
Connection for interest 1
Video Streaming
Connection for interest 2
Follower
S
Interest 1
Interest 2
Server
4. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 692
and finding content. Unlike current file or video sharing systems (e.g., BitTorrent and YouTube), which
are mainly organized around data, OSNs are prepared approximately users. OSN users establish
friendship relations with real-world friends and post their profiles and content such as notes, photos, and
videos to their private pages. Video sharing has been an increasingly popular application in OSNs,
enabling users to share their interesting videos they found with their friends.
Figure 2: System architecture
So we are improving the client/server architecture for video sharing, with the peer-to-peer (P2P)
architecture being the most hopeful. P2P-based video division has been utilized in on demand video
streaming. With each peer contributing its bandwidth to serving others, the P2P architecture offers high
scalability for large user bases. Proposed system enabling the possibility for P2P video sharing among
the online users. To reduce the video establish latency, we suggest a push based video prefetching
mechanism in SocialTube. To provide the video content in order to guarantee provider availability and
achieve low delay by retrieving chunks in parallel.
Overlay construction and
chunk prefetching algorithm
Login to
social
network
Upload
videos social
network
Facebook
Server
External
Server
Videos
Videos Chunks
Videos on
demand
Evaluation
criteria
Chunk and
Delivery
Scheduling
Buffer
Management
algorithm
Reduced
latency and
improved
efficiency
Share
videos
Android
mobile
Apps
Social
Network
Users
Identify followers
and Non Followers
Request
send to
socialtube
Server
Video Streaming
5. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 693
V. EXPERIMENTAL RESULTS:
In this experiments find the upload and download bandwidth of the video in the socialtube and
secured socialtube. The comparison table and comparison graph is shown below.
Methods
upload
bandwidth
download
bandwidth
SOCIALTUBE 456 128
SECURED
SOCIALTUBE 795 432
Table1: Comparison table
Figure 3: Comparison graph
VI. CONCLUSION:
Our measurement reveals that most of the viewers of a user’s videos are the most video views, user’s
close friends are determined by social relationships, and the remaining are determined by interests, and
watchers of the similar video be likely to exist in the similar location. Based on our comments, we
suggest Social Tube, a scheme that discovers the interest similarity, social relationship and location to
improve the performance of video sharing in OSNs. Particularly, an OSN has a social network (SN)-
based P2P overlay construction algorithm that clusters peers based on their social relationships and
interests. Within every cluster, nodes are linked by virtue of their physical location in order to reduce
video transmission latency.In that Existing system Social Tube also incorporates a SN based chunk
perfecting algorithm to minimize video playback startup delay. A novel P2P assisted video sharing
system in online social networks, which provides efficient P2P assisted video sharing’s services.
Extensive simulation results show that it can provide a low video start up delay and low server traffics
demand.But it dose not avoid redundant video sharing in OSN system . Proposed system implement
secure social tube approach to share useful videos in online social network and implement video
conversion approach to convert videos into frames and check each and every frames using video content
features and also eliminate the redundant video shared on network. Implement this socialtube framework
in security manner.
REFERENCE:
[1] Facebook passes google in time spent on site for first time ever. http://www.businessinsider.com/.
0
100
200
300
400
500
600
700
800
socialtube
secured
socialtube
6. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 694
[2] Social media, web 2.0 and internet stats. http://thefuturebuzz.com/2009/01/12/social-media-web-20- internet-numbers-
stats/.
[3] C. Huang, J. Li, and K. W. Ross. Can internet video-on-demand be profitable? In Proc. of SIGCOMM, 2007.
[4] Y. Huang, Z. Fu, D. Chiu, C. Lui, and C. Huang. Challenges, design and analysis of a large-scale P2P VoD system. In
Proc. SIGCOMM, 2008.
[5] B. Cheng, L. Stein, H. Jin, X. Liao, and Z. Zhang. Gridcast: improving peer sharing for p2p vod. ACM TOMCCAP,
2008.
[6] J. Wang, C. Huang, and J. Li. On ISP-friendly rate allocation for peer-assisted VoD. In Proc. of MM, 2008.
[7] K. Wang and C. Lin. Insight into the P2P-VoD system: Performance modeling and analysis. In Proc. of ICCCN, 2009.
[8] X. Cheng and J. Liu. NetTube: Exploring social networks for peer-to-peer short video sharing. In Proc. of INFOCOM,
2009.
[9] C.-P. Ho, S.-Y. Lee, and J.-Y. Yu. Cluster-based replication for P2P-based video-on-demand service. In Proc. of ICEIE,
2010.
[10] B. Li, M. Ma, Z. Jin, and D. Zhao. Investigation of a large-scale P2P VoD overlay network by measurements. Peer-to-
Peer Networking and Applications, 5(4):398–411,2012.
.