This summarizes a research paper that proposes using an Adaptive Resonance Theory 2 (ART2) neural network to cluster user request patterns for video on demand (VoD) programs. The ART2 clusters are used to identify groups of users with similar browsing activities. Popular videos are then prefetched to the proxy server's cache based on the cluster profiles before users arrive, reducing waiting times. The paper presents the ART2 algorithm and discusses performance evaluation based on hits and accuracy metrics. Simulation results showed the proposed clustering and prefetching approach significantly increased the streaming server's performance.
This document discusses a proposed light-weight authentication system and resource monitoring using a multi-agent system (MAS). It proposes using mobile agents for key distribution and management to authenticate users, which would provide benefits over existing methods like Kerberos that require high computation. The system would use three types of agents: registration agents to issue public/private key pairs, validation agents to authenticate users, and certificate authority agents to issue session keys for secure communication. This distributed MAS approach aims to provide faster authentication with high availability compared to existing centralized approaches. The proposed solution is implemented using the SPADE MAS framework and XMPP protocol.
Caching on Named Data Network: a Survey and Future Research IJECEIAES
The IP-based system cause inefficient content delivery process. This inefficiency was attempted to be solved with the Content Distribution Network. A replica server is located in a particular location, usually on the edge router that is closest to the user. The user’s request will be served from that replica server. However, caching on Content Distribution Network is inflexible. This system is difficult to support mobility and conditions of dynamic content demand from consumers. We need to shift the paradigm to content-centric. In Named Data Network, data can be placed on the content store on routersthat are closest to the consumer. Caching on Named Data Network must be able to store content dynamically. It should be selectively select content that is eligible to be stored or deleted from the content storage based on certain considerations, e.g. the popularity of content in the local area. This survey paper explains the development of caching techniques on Named Data Network that are classified into main points. The brief explanation of advantages and disadvantages are presented to make it easy to understand. Finally, proposed the open challenge related to the caching mechanism to improve NDN performance.
Enhancing Security of Multimodal Biometric Authentication System by Implement...IOSR Journals
Abstract : Conventional personal identification techniques for instance passwords, tokens, ID card and PIN
codes are prone to theft or forgery and thus biometrics isa solution thereto. Biometrics is the way of recognizing
and scrutinizing the physical traits of a person. Automated biometrics verification caters as a conducive and
legitimate method, but there must be an assurance to its cogency. Furthermore, in most of the cases unimodal
biometric recognition is not able to meet the performance requirements of the applications. According to recent
trends, recognition based on multimodal biometrics is emerging at a greater pace. Multimodal biometrics
unifies two or more biometric traits and thus the issues that emerge in unimodal recognition can be mitigated in
multimodal biometric systems. But with the rapid ontogenesis of information technology, even the biometric
data is not secure. Digital watermarking is one such technique that is implemented to secure the biometric data
from inadvertent or premeditated attacks.This paper propounds an approach that is projected in both the
directions of improving the performance of biometric identification system by going multimodal and, increasing
the security through watermarking. The biometric traits are initially transformed using Discrete Wavelet and
Discrete Cosine Transformation and then watermarked using Singular Value Decomposition. Scheme depiction
and presented outcomes justifies the effectiveness of the scheme.
Keywords: Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), Multimodal biometrics,
Singular Value Decomposition, Watermarking
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...IRJET Journal
This document summarizes a research paper that proposes a method for ensuring data integrity and privacy when data is stored on cloud computing systems. The method uses blockchain techniques and distributed verification to provide redundancy and guarantee data reliability. It allows both data owners and public verifiers to check data integrity without downloading the entire dataset. The technique utilizes homomorphic tokens and ring signatures to enable auditing while preventing privacy leaks about user identities or data contents. Prior works on remote data integrity lacked either public auditing or support for dynamic data operations, but the proposed method achieves both.
Secret keys and the packets transportation for privacy data forwarding method...eSAT Publishing House
This document proposes a method for improving data security and privacy in cloud data forwarding. The method involves splitting a data owner's encrypted file into multiple packets, encrypting each packet, and storing the packets and encryption keys across multiple cloud servers. If the data owner wants to forward the file, they send the encrypted packets and verify the recipient's identity. To further enhance security, the decryption key is sent as an SMS rather than over the cloud servers. This integrates concepts of encryption, encoding, and key distribution to improve data confidentiality when files are forwarded in the cloud.
Secret keys and the packets transportation for privacy data forwarding method...eSAT Journals
Abstract The Cloud computing is the process of storing the data in the Remote server. This process doesn‘t speak much about confidentiality and robustness of the data. To improve the security and confidentiality the uploaded file from a data owner is splitted into multiple packets and stored in multiple cloud servers. These packets are encrypted using the primary key. These different keys are also distributed in multiple key servers. User id is appended for verification. If the data owner forwards the file then the keys are verified for the data access. In this we are proposing sending the secret key as SMS to the shared or forwarded nodes for the process of proper Security. This technique integrates the concepts of encryption, encoding and forwarding. Keywords-cloud computing, encryption, storage system
The document proposes a scheme for secure access to outsourced databases in cloud computing environments. It uses a modified row-based encryption technique where each database row is encrypted with a separate key. The scheme also uses client-side memory and selective encryption to increase performance. A modified Diffie-Hellman key exchange algorithm is used to establish secure communication between the cloud service provider and users, inhibiting malicious outsiders. The scheme aims to overcome security challenges like information leakage, key management, revocation handling and user authentication that exist in current solutions for securing outsourced databases.
Identity-Based Distributed Provable Data Possession in Multicloud Storage1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
This document discusses a proposed light-weight authentication system and resource monitoring using a multi-agent system (MAS). It proposes using mobile agents for key distribution and management to authenticate users, which would provide benefits over existing methods like Kerberos that require high computation. The system would use three types of agents: registration agents to issue public/private key pairs, validation agents to authenticate users, and certificate authority agents to issue session keys for secure communication. This distributed MAS approach aims to provide faster authentication with high availability compared to existing centralized approaches. The proposed solution is implemented using the SPADE MAS framework and XMPP protocol.
Caching on Named Data Network: a Survey and Future Research IJECEIAES
The IP-based system cause inefficient content delivery process. This inefficiency was attempted to be solved with the Content Distribution Network. A replica server is located in a particular location, usually on the edge router that is closest to the user. The user’s request will be served from that replica server. However, caching on Content Distribution Network is inflexible. This system is difficult to support mobility and conditions of dynamic content demand from consumers. We need to shift the paradigm to content-centric. In Named Data Network, data can be placed on the content store on routersthat are closest to the consumer. Caching on Named Data Network must be able to store content dynamically. It should be selectively select content that is eligible to be stored or deleted from the content storage based on certain considerations, e.g. the popularity of content in the local area. This survey paper explains the development of caching techniques on Named Data Network that are classified into main points. The brief explanation of advantages and disadvantages are presented to make it easy to understand. Finally, proposed the open challenge related to the caching mechanism to improve NDN performance.
Enhancing Security of Multimodal Biometric Authentication System by Implement...IOSR Journals
Abstract : Conventional personal identification techniques for instance passwords, tokens, ID card and PIN
codes are prone to theft or forgery and thus biometrics isa solution thereto. Biometrics is the way of recognizing
and scrutinizing the physical traits of a person. Automated biometrics verification caters as a conducive and
legitimate method, but there must be an assurance to its cogency. Furthermore, in most of the cases unimodal
biometric recognition is not able to meet the performance requirements of the applications. According to recent
trends, recognition based on multimodal biometrics is emerging at a greater pace. Multimodal biometrics
unifies two or more biometric traits and thus the issues that emerge in unimodal recognition can be mitigated in
multimodal biometric systems. But with the rapid ontogenesis of information technology, even the biometric
data is not secure. Digital watermarking is one such technique that is implemented to secure the biometric data
from inadvertent or premeditated attacks.This paper propounds an approach that is projected in both the
directions of improving the performance of biometric identification system by going multimodal and, increasing
the security through watermarking. The biometric traits are initially transformed using Discrete Wavelet and
Discrete Cosine Transformation and then watermarked using Singular Value Decomposition. Scheme depiction
and presented outcomes justifies the effectiveness of the scheme.
Keywords: Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), Multimodal biometrics,
Singular Value Decomposition, Watermarking
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...IRJET Journal
This document summarizes a research paper that proposes a method for ensuring data integrity and privacy when data is stored on cloud computing systems. The method uses blockchain techniques and distributed verification to provide redundancy and guarantee data reliability. It allows both data owners and public verifiers to check data integrity without downloading the entire dataset. The technique utilizes homomorphic tokens and ring signatures to enable auditing while preventing privacy leaks about user identities or data contents. Prior works on remote data integrity lacked either public auditing or support for dynamic data operations, but the proposed method achieves both.
Secret keys and the packets transportation for privacy data forwarding method...eSAT Publishing House
This document proposes a method for improving data security and privacy in cloud data forwarding. The method involves splitting a data owner's encrypted file into multiple packets, encrypting each packet, and storing the packets and encryption keys across multiple cloud servers. If the data owner wants to forward the file, they send the encrypted packets and verify the recipient's identity. To further enhance security, the decryption key is sent as an SMS rather than over the cloud servers. This integrates concepts of encryption, encoding, and key distribution to improve data confidentiality when files are forwarded in the cloud.
Secret keys and the packets transportation for privacy data forwarding method...eSAT Journals
Abstract The Cloud computing is the process of storing the data in the Remote server. This process doesn‘t speak much about confidentiality and robustness of the data. To improve the security and confidentiality the uploaded file from a data owner is splitted into multiple packets and stored in multiple cloud servers. These packets are encrypted using the primary key. These different keys are also distributed in multiple key servers. User id is appended for verification. If the data owner forwards the file then the keys are verified for the data access. In this we are proposing sending the secret key as SMS to the shared or forwarded nodes for the process of proper Security. This technique integrates the concepts of encryption, encoding and forwarding. Keywords-cloud computing, encryption, storage system
The document proposes a scheme for secure access to outsourced databases in cloud computing environments. It uses a modified row-based encryption technique where each database row is encrypted with a separate key. The scheme also uses client-side memory and selective encryption to increase performance. A modified Diffie-Hellman key exchange algorithm is used to establish secure communication between the cloud service provider and users, inhibiting malicious outsiders. The scheme aims to overcome security challenges like information leakage, key management, revocation handling and user authentication that exist in current solutions for securing outsourced databases.
Identity-Based Distributed Provable Data Possession in Multicloud Storage1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...idescitation
Digital communication has seen exponential growth in the past decade.
Consequently, the security of digital data has become a field of extensive research since
piracy and unauthorized use of such data is prevalent because of the ease with which data
can be replicated or tampered. Visual Cryptography (VC) is a special cryptographic
technique where decryption is done by an authorized user by simply overlaying the shares.
Thus, there is no requirement for complex computations unlike normal cryptography.
Though simple for an authorized user, it is equally difficult for an unauthorized user to
attack since the secret message can be deciphered if and only if all the shares are available
to the attacker. The probability of this is negligibly small since one of the shares usually
needs to be registered with a Certified Authority (CA). The procedure is non- intrusive and
does not alter the contents of the host image or video. For this reason, VC has been applied
to image watermarking widely. In case of video watermarking applications, robustness
against different types of attacks like frame attacks, spatial and temporal desynchronization
attacks, statistical analysis and collusion attacks need to be considered. Also creation of
shares for videos requires feature extraction techniques which are different from that of
images. Moreover, as size of video is more, a large secret payload can be used to construct a
share. In this survey paper, the research being carried out globally on VC techniques for
videos, along with their pros and cons have been highlighted. The paper also discusses
challenges in applying VC for video watermarking. Further, a performance comparison
amongst the mentioned schemes is also provided.
Authentic Data Access Scheme for Variant Disruption- Tolerant NetworksEditor IJCATR
Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network
connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow
wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by
exploiting external storage nodes. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and
privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities.
In this paper, we propose a secure data retrieval scheme using CP-ABE for decentralized DTNs where multiple key authorities manage
their attributes independently. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the
confidential data distributed in the disruption-tolerant military network. Since some users may change their associated attributes at
some point (for example, moving their region), or some private keys might be compromised, key revocation (or update) for each
attribute is necessary in order to make systems secure. This implies that revocation of any attribute or any single user in an attribute
group would affect the other users in the group. It may result in bottleneck during rekeying procedure, or security degradation due to
the windows of vulnerability if the previous attribute key is not updated immediately.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Hybrid Digital Watermarking Approach Using Wavelets and LSB IJECEIAES
The present paper proposed a novel approach called Wavelet based Least Significant Bit Watermarking (WLSBWM) for high authentication, security and copyright protection. Alphabet Pattern (AP) approach is used to generate shuffled image in the first stage and Pell’s Cat Map (PCM) is used for providing more security and strong protection from attacks. PCM applied on each 5×5 sub images. A wavelet concept is used to reduce the dimensionality of the image until it equals to the size of the watermark image. Discrete Cosign Transform is applied in the first stage; later N level Discrete Wavelet Transform (DWT) is applied for reducing up to the size of the watermark image. The water mark image is inserted in LH Sub band of the wavelet image using LSB concept. Simulation results show that the proposed technique produces better PSNR and similarity measure. The experimental results indicate that the present approach is more reliable and secure efficient. The robustness of the proposed scheme is evaluated against various image-processing attacks.
Cryptographic Countermeasure Against Prevention Of Dos and Distributed DOS A...IRJET Journal
The document discusses cryptographic puzzles as a countermeasure against denial of service (DoS) and distributed denial of service (DDoS) attacks. It proposes a system called a software puzzle that generates puzzles for clients to solve in order to access server resources. When under attack, the server would generate and send puzzles to clients, and only grant access to clients that correctly solve the puzzles, thereby preventing attackers from overwhelming the server. However, existing puzzle schemes are not effective against attacks that use GPUs to rapidly solve puzzles in parallel. The document proposes improvements to puzzle generation and verification that aim to make the puzzles more difficult to solve by attackers using GPUs or multiple computers.
Distributed systems allow objects to communicate across different processes and computers through remote method invocation (RMI). RMI allows a client to invoke methods on remote objects similarly to local method calls. Key aspects of RMI include stub/skeleton layers that redirect client calls to remote services, remote reference layers that manage object references, and low-level transport layers. Distributed garbage collection must coordinate across systems to properly free memory from remote objects. Remote procedure call (RPC) provides a similar way for programs to request services from remote programs without network details. Events and notifications allow distributed systems to communicate asynchronously through publishing and subscribing to event types.
Cloud Computing Environment using Secured Access Control TechniqueIRJET Journal
This document proposes a new technique called Storage Correctness and Small-grained Access Provision (SCSAP) for secure cloud computing environments. SCSAP aims to improve on existing access control techniques by providing more fine-grained user access and ensuring correctness of outsourced cloud data storage through a token granting system. The technique constructs hierarchical user access formations and includes algorithmic phases for small-grained data access and efficient storage. If implemented, SCSAP could provide stronger security, access control and data integrity than prior cloud storage solutions.
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...IRJET Journal
This document presents a key-policy attribute-based temporary keyword search scheme for secure cloud storage. It introduces a new cryptographic primitive called key-policy attribute-based temporary keyword search (KP-ABTKS) that allows authorized users to generate search tokens to search for ciphertexts encrypted within a specified time interval that contain a given keyword. The proposed scheme is constructed using bilinear pairing and is proven to be secure against selectively chosen keyword attacks under the decisional Diffie-Hellman assumption. It consists of five algorithms: setup, key generation, encryption, token generation, and search. The performance evaluation shows the scheme is practical in terms of computational complexity and execution time.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. IJCERT JOURNAL
Redundant data avoidance systems, the Private Cloud are involved as a proxy to allow data owner/users to securely perform duplicate check with differential privileges. Such architecture is practical and has attracted much attention from researchers. The data owners only outsource their data storage by utilizing public cloud while the data operation is managed in private cloud, in this connection our presented system has follows traditional encryption while providing data confidentiality, is incompatible with redundant data avoidance. Identical data copies of different users will lead to different ciphertexts, making data avoidance impossible. To address above issues convergent encryption technique has been proposed to encrypt the data before outsourcing. To better protect data security, this paper makes the first attempt to formally address the problem of authorized redundant data avoidance. Different from traditional redundant data avoidance systems, the differential privileges of users are further considered in duplicate check besides the data itself. We also present several new redundant data avoidance constructions supporting authorized duplicate check in a multi-cloud architecture. Security analysis demonstrates that our scheme is secure in terms of the definitions specified in the proposed security model. In order to perform secure access controlling scheme user may satisfy fine-grained approach at cloud level towards access restricting from unauthorized users or adversaries.
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET Journal
This document proposes a novel technique that combines encryption and digital watermarking to securely transmit medical images over public networks like the cloud. The algorithm divides images into regions of interest and non-interest, and embeds cryptographic watermarks and patient data in the non-interest regions before transmission. At the receiver end, the watermarks and data can be extracted to authenticate the image and verify that it has not been tampered with. The algorithm was tested on medical images and provided security, integrity and authenticity of transmitted medical information.
This dissertation aims to explore the values of multi-agent systems (MAS) and demonstrate their benefits for IT projects. It discusses challenges that cause many projects to exceed time and budgets. The research methodology includes literature reviews, developing and evaluating a MAS using tools like INGENIAS and JADE, and analyzing case studies. Metrics are identified to measure agent qualities. Evaluation methods include theory-assisted and tool-assisted approaches. Results show MAS can help deliver projects on time and within budget but require an appropriate development approach rather than traditional object-oriented methods. A global solution is needed to address common MAS implementation issues.
Efficient and secure authentication on remote server using stegno video objec...pradip patel
Due to the present increase in world population, people in this world tend to occupy available locations present in any zone which also include zones falling in the high seismic zone categories. The buildings constructed in such zones must be analysed and designed to withstand these earthquakes, along with the cost economy. Bracing systems is very efficient and unyielding lateral load resisting system. Bracing systems serves as one of the component in buildings for increasing stiffness and strength to guard buildings from incidence caused by natural forces like earthquake. Braced frames widen their resistance to lateral forces by the bracing action of inclined members. The braces stimulate forces in the associated beams and columns so that all works like a truss which results in smaller sizes of beam and column sections that turns out to be economical. In this study, G+14 storey building model has been analysed considering “Inverted V” and “V” type RCC bracing system and steel bracing system under seismic loadings using STADD PRO for analysis. Results are concluded by comparison of storey displacement, storey drift and base shear for fixed base building
A novel graphical password approach for accessing cloud & data verificationeSAT Publishing House
This document summarizes a research paper that proposes a new graphical password approach for cloud access and data verification. The paper introduces issues with current password authentication schemes for cloud access. It then proposes a new graphical password technique for cloud authentication as well as a technique for verifying the integrity of user data stored on the cloud. The paper discusses the methodology of the proposed system through registration, login, and verification processes. It also reviews related literature and discusses objectives and conclusions. The proposed system aims to only allow authentic users to access the cloud through a secure login process and allow users to check correctness of their cloud data.
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
This document summarizes a proposed cloud security and data integrity framework that provides client accountability. The framework aims to address issues like lack of user control over cloud data, need for data transparency and tracking, and ensuring data integrity. It proposes using JAR (Java Archive) files for data sharing due to benefits like portability. The framework incorporates client-side verification using MD5 hashing, digital signature-based authentication of JAR files, and use of HMAC to ensure data integrity. It also uses password-based encryption of log files to keep them tamper-proof. The framework is intended to provide both accountability and security for data sharing in cloud environments.
Measurable, safe and secure data management for sensitive users in cloud comp...eSAT Publishing House
This document summarizes a research paper that proposes a method for managing sensitive user data in cloud computing through measurable and secure data access controls. It discusses privacy issues with current data storage practices in cloud computing. The proposed method uses attribute-based encryption to assign users fine-grained access permissions to limited amounts of data for a specific time period. This aims to address issues with data leakage, privacy, and lack of data owner control in existing cloud data systems. The method was implemented in a simulation using .NET technologies to test access permissions between cloud service providers, consumers, and users.
Improving Efficiency of Security in Multi-CloudIJTET Journal
Abstract--Due to risk in service availability failure and the possibilities of malicious insiders in the single cloud, a movement towards “Multi-clouds” has emerged recently. In general a multi-cloud security system there is a possibility for third party to access the user files. Ensuring security in this stage has become tedious since, most of the activities are done in network. In this paper, an enhanced security methodology has been introduced in order to make the data stored in cloud more secure. Duple authentication process introduced in this concept defends malicious insiders and shields the private data. Various disadvantages in traditional systems like unauthorized access, hacking have been overcome in this proposed system and a comparison made with the traditional systems in terms of performance and computational time have shown better results.
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
A Generalized Image Authentication Based On Statistical Moments of Color Hist...idescitation
Designing low cost and high speed authentication
solution for digital images is always an attractive area of
research in image processing. In past few years because of
widespread use of internet and network technology, concept
of information distribution has been become habit rather than
exception in daily life. In same aspects challenges involved
with distribution of authenticate information has been
increased manifolds. In this paper a generalize image
authentication method has proposed by hybridization of color
histogram and associated first four statistical moments to
achieve the objectives of low cost and high speed. Proposed
method can apply for both gray and color images having any
size and any format. Solution generates a very small
authentication code with an ease means which is use to analyze
the characteristics of received image from tampering
perspective.
This document contains the ORCID profile of Vijayananda Mohire. It lists his employment history including positions at Bhadale IT Pvt. Ltd, MphasiS, and Wipro Technologies. It also lists his education including an M.Tech from Karnataka State Open University and a PGDIT from Symbiosis Centre for Distance Learning. Finally, it lists his memberships in professional organizations including IEEE, Project Management Institute, and Engineers Australia.
Enhanced Authentication Mechanism in WLAN via MMBSPSRAJESH DUVVURU
The ability to provide a Quality of Service (QoS) is one of the
challenging aspects of any Wireless Network. This paper
concentrates in improvising the speedy authentication
mechanism in Wireless Local Area Network (WLAN). To
fulfill the specified important issue, this work introduces a
novel Multi Merged Bio-Cryptographic Security-Aware
Packet Scheduling (MMBSPS) algorithm. In merging the
different biometric images, it is commenced with the new
merging mechanism called Triple Equally Segmented Bio-
Image (TESB) algorithm and later it is encrypted with the
RSA algorithm for efficient security. Matlab tool is used for
conducting the simulations on Multi Merged Bio-Images
(MMBI) and Bio-Images. The results of MMBSPS algorithm
is presented in contrast with the EMBSPS and EBSPS
algorithms. In the results, it is observed that, MMBSPS
algorithm is working better than existing EMBSPS and
EBSPS algorithms with respect to the speedy authentication
besides assuring security in WLAN. It is also observed the
overall performance of MMBSPS is improved by
approximately 23% in terms of authentication mechanism in
WLAN.
Survey on caching and replication algorithm for content distribution in peer ...ijcseit
This document summarizes and compares several caching and replication algorithms for content distribution in peer-to-peer networks. It first introduces caching and replication techniques and their benefits, including reliability, availability, fault tolerance, load balancing and performance improvements. It then reviews six specific algorithms: 1) A weighted-rank cache replacement policy, 2) A streaming algorithm using multiple description coding, 3) Two prefetching protocols (full striping and code-based placement), 4) A popularity-aware limited caching approach, 5) Replication algorithms with random load balancing, and 6) An optimal replication strategy characterization. For each algorithm, it describes the approach and how it addresses challenges in peer-to-peer content distribution.
Dynamic Chunks Distribution Scheme for Multiservice Load Balancing Using Fibo...Editor IJCATR
This document describes a proposed dynamic chunks distribution scheme for multiservice load balancing in cloud computing using a Fibonacci bases approach. Videos are split into chunks that are distributed across hosts for storage. The chunk sizes increase to reduce delay and improve performance. A Fibonacci-based splitting strategy is used to divide video files into chunks to reduce provisioning delay for users and optimize resource utilization. The scheme allows users to view entire videos without delays by gathering chunks from different servers in parallel.
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...idescitation
Digital communication has seen exponential growth in the past decade.
Consequently, the security of digital data has become a field of extensive research since
piracy and unauthorized use of such data is prevalent because of the ease with which data
can be replicated or tampered. Visual Cryptography (VC) is a special cryptographic
technique where decryption is done by an authorized user by simply overlaying the shares.
Thus, there is no requirement for complex computations unlike normal cryptography.
Though simple for an authorized user, it is equally difficult for an unauthorized user to
attack since the secret message can be deciphered if and only if all the shares are available
to the attacker. The probability of this is negligibly small since one of the shares usually
needs to be registered with a Certified Authority (CA). The procedure is non- intrusive and
does not alter the contents of the host image or video. For this reason, VC has been applied
to image watermarking widely. In case of video watermarking applications, robustness
against different types of attacks like frame attacks, spatial and temporal desynchronization
attacks, statistical analysis and collusion attacks need to be considered. Also creation of
shares for videos requires feature extraction techniques which are different from that of
images. Moreover, as size of video is more, a large secret payload can be used to construct a
share. In this survey paper, the research being carried out globally on VC techniques for
videos, along with their pros and cons have been highlighted. The paper also discusses
challenges in applying VC for video watermarking. Further, a performance comparison
amongst the mentioned schemes is also provided.
Authentic Data Access Scheme for Variant Disruption- Tolerant NetworksEditor IJCATR
Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network
connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow
wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by
exploiting external storage nodes. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and
privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities.
In this paper, we propose a secure data retrieval scheme using CP-ABE for decentralized DTNs where multiple key authorities manage
their attributes independently. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the
confidential data distributed in the disruption-tolerant military network. Since some users may change their associated attributes at
some point (for example, moving their region), or some private keys might be compromised, key revocation (or update) for each
attribute is necessary in order to make systems secure. This implies that revocation of any attribute or any single user in an attribute
group would affect the other users in the group. It may result in bottleneck during rekeying procedure, or security degradation due to
the windows of vulnerability if the previous attribute key is not updated immediately.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Hybrid Digital Watermarking Approach Using Wavelets and LSB IJECEIAES
The present paper proposed a novel approach called Wavelet based Least Significant Bit Watermarking (WLSBWM) for high authentication, security and copyright protection. Alphabet Pattern (AP) approach is used to generate shuffled image in the first stage and Pell’s Cat Map (PCM) is used for providing more security and strong protection from attacks. PCM applied on each 5×5 sub images. A wavelet concept is used to reduce the dimensionality of the image until it equals to the size of the watermark image. Discrete Cosign Transform is applied in the first stage; later N level Discrete Wavelet Transform (DWT) is applied for reducing up to the size of the watermark image. The water mark image is inserted in LH Sub band of the wavelet image using LSB concept. Simulation results show that the proposed technique produces better PSNR and similarity measure. The experimental results indicate that the present approach is more reliable and secure efficient. The robustness of the proposed scheme is evaluated against various image-processing attacks.
Cryptographic Countermeasure Against Prevention Of Dos and Distributed DOS A...IRJET Journal
The document discusses cryptographic puzzles as a countermeasure against denial of service (DoS) and distributed denial of service (DDoS) attacks. It proposes a system called a software puzzle that generates puzzles for clients to solve in order to access server resources. When under attack, the server would generate and send puzzles to clients, and only grant access to clients that correctly solve the puzzles, thereby preventing attackers from overwhelming the server. However, existing puzzle schemes are not effective against attacks that use GPUs to rapidly solve puzzles in parallel. The document proposes improvements to puzzle generation and verification that aim to make the puzzles more difficult to solve by attackers using GPUs or multiple computers.
Distributed systems allow objects to communicate across different processes and computers through remote method invocation (RMI). RMI allows a client to invoke methods on remote objects similarly to local method calls. Key aspects of RMI include stub/skeleton layers that redirect client calls to remote services, remote reference layers that manage object references, and low-level transport layers. Distributed garbage collection must coordinate across systems to properly free memory from remote objects. Remote procedure call (RPC) provides a similar way for programs to request services from remote programs without network details. Events and notifications allow distributed systems to communicate asynchronously through publishing and subscribing to event types.
Cloud Computing Environment using Secured Access Control TechniqueIRJET Journal
This document proposes a new technique called Storage Correctness and Small-grained Access Provision (SCSAP) for secure cloud computing environments. SCSAP aims to improve on existing access control techniques by providing more fine-grained user access and ensuring correctness of outsourced cloud data storage through a token granting system. The technique constructs hierarchical user access formations and includes algorithmic phases for small-grained data access and efficient storage. If implemented, SCSAP could provide stronger security, access control and data integrity than prior cloud storage solutions.
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...IRJET Journal
This document presents a key-policy attribute-based temporary keyword search scheme for secure cloud storage. It introduces a new cryptographic primitive called key-policy attribute-based temporary keyword search (KP-ABTKS) that allows authorized users to generate search tokens to search for ciphertexts encrypted within a specified time interval that contain a given keyword. The proposed scheme is constructed using bilinear pairing and is proven to be secure against selectively chosen keyword attacks under the decisional Diffie-Hellman assumption. It consists of five algorithms: setup, key generation, encryption, token generation, and search. The performance evaluation shows the scheme is practical in terms of computational complexity and execution time.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. IJCERT JOURNAL
Redundant data avoidance systems, the Private Cloud are involved as a proxy to allow data owner/users to securely perform duplicate check with differential privileges. Such architecture is practical and has attracted much attention from researchers. The data owners only outsource their data storage by utilizing public cloud while the data operation is managed in private cloud, in this connection our presented system has follows traditional encryption while providing data confidentiality, is incompatible with redundant data avoidance. Identical data copies of different users will lead to different ciphertexts, making data avoidance impossible. To address above issues convergent encryption technique has been proposed to encrypt the data before outsourcing. To better protect data security, this paper makes the first attempt to formally address the problem of authorized redundant data avoidance. Different from traditional redundant data avoidance systems, the differential privileges of users are further considered in duplicate check besides the data itself. We also present several new redundant data avoidance constructions supporting authorized duplicate check in a multi-cloud architecture. Security analysis demonstrates that our scheme is secure in terms of the definitions specified in the proposed security model. In order to perform secure access controlling scheme user may satisfy fine-grained approach at cloud level towards access restricting from unauthorized users or adversaries.
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET Journal
This document proposes a novel technique that combines encryption and digital watermarking to securely transmit medical images over public networks like the cloud. The algorithm divides images into regions of interest and non-interest, and embeds cryptographic watermarks and patient data in the non-interest regions before transmission. At the receiver end, the watermarks and data can be extracted to authenticate the image and verify that it has not been tampered with. The algorithm was tested on medical images and provided security, integrity and authenticity of transmitted medical information.
This dissertation aims to explore the values of multi-agent systems (MAS) and demonstrate their benefits for IT projects. It discusses challenges that cause many projects to exceed time and budgets. The research methodology includes literature reviews, developing and evaluating a MAS using tools like INGENIAS and JADE, and analyzing case studies. Metrics are identified to measure agent qualities. Evaluation methods include theory-assisted and tool-assisted approaches. Results show MAS can help deliver projects on time and within budget but require an appropriate development approach rather than traditional object-oriented methods. A global solution is needed to address common MAS implementation issues.
Efficient and secure authentication on remote server using stegno video objec...pradip patel
Due to the present increase in world population, people in this world tend to occupy available locations present in any zone which also include zones falling in the high seismic zone categories. The buildings constructed in such zones must be analysed and designed to withstand these earthquakes, along with the cost economy. Bracing systems is very efficient and unyielding lateral load resisting system. Bracing systems serves as one of the component in buildings for increasing stiffness and strength to guard buildings from incidence caused by natural forces like earthquake. Braced frames widen their resistance to lateral forces by the bracing action of inclined members. The braces stimulate forces in the associated beams and columns so that all works like a truss which results in smaller sizes of beam and column sections that turns out to be economical. In this study, G+14 storey building model has been analysed considering “Inverted V” and “V” type RCC bracing system and steel bracing system under seismic loadings using STADD PRO for analysis. Results are concluded by comparison of storey displacement, storey drift and base shear for fixed base building
A novel graphical password approach for accessing cloud & data verificationeSAT Publishing House
This document summarizes a research paper that proposes a new graphical password approach for cloud access and data verification. The paper introduces issues with current password authentication schemes for cloud access. It then proposes a new graphical password technique for cloud authentication as well as a technique for verifying the integrity of user data stored on the cloud. The paper discusses the methodology of the proposed system through registration, login, and verification processes. It also reviews related literature and discusses objectives and conclusions. The proposed system aims to only allow authentic users to access the cloud through a secure login process and allow users to check correctness of their cloud data.
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
This document summarizes a proposed cloud security and data integrity framework that provides client accountability. The framework aims to address issues like lack of user control over cloud data, need for data transparency and tracking, and ensuring data integrity. It proposes using JAR (Java Archive) files for data sharing due to benefits like portability. The framework incorporates client-side verification using MD5 hashing, digital signature-based authentication of JAR files, and use of HMAC to ensure data integrity. It also uses password-based encryption of log files to keep them tamper-proof. The framework is intended to provide both accountability and security for data sharing in cloud environments.
Measurable, safe and secure data management for sensitive users in cloud comp...eSAT Publishing House
This document summarizes a research paper that proposes a method for managing sensitive user data in cloud computing through measurable and secure data access controls. It discusses privacy issues with current data storage practices in cloud computing. The proposed method uses attribute-based encryption to assign users fine-grained access permissions to limited amounts of data for a specific time period. This aims to address issues with data leakage, privacy, and lack of data owner control in existing cloud data systems. The method was implemented in a simulation using .NET technologies to test access permissions between cloud service providers, consumers, and users.
Improving Efficiency of Security in Multi-CloudIJTET Journal
Abstract--Due to risk in service availability failure and the possibilities of malicious insiders in the single cloud, a movement towards “Multi-clouds” has emerged recently. In general a multi-cloud security system there is a possibility for third party to access the user files. Ensuring security in this stage has become tedious since, most of the activities are done in network. In this paper, an enhanced security methodology has been introduced in order to make the data stored in cloud more secure. Duple authentication process introduced in this concept defends malicious insiders and shields the private data. Various disadvantages in traditional systems like unauthorized access, hacking have been overcome in this proposed system and a comparison made with the traditional systems in terms of performance and computational time have shown better results.
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
A Generalized Image Authentication Based On Statistical Moments of Color Hist...idescitation
Designing low cost and high speed authentication
solution for digital images is always an attractive area of
research in image processing. In past few years because of
widespread use of internet and network technology, concept
of information distribution has been become habit rather than
exception in daily life. In same aspects challenges involved
with distribution of authenticate information has been
increased manifolds. In this paper a generalize image
authentication method has proposed by hybridization of color
histogram and associated first four statistical moments to
achieve the objectives of low cost and high speed. Proposed
method can apply for both gray and color images having any
size and any format. Solution generates a very small
authentication code with an ease means which is use to analyze
the characteristics of received image from tampering
perspective.
This document contains the ORCID profile of Vijayananda Mohire. It lists his employment history including positions at Bhadale IT Pvt. Ltd, MphasiS, and Wipro Technologies. It also lists his education including an M.Tech from Karnataka State Open University and a PGDIT from Symbiosis Centre for Distance Learning. Finally, it lists his memberships in professional organizations including IEEE, Project Management Institute, and Engineers Australia.
Enhanced Authentication Mechanism in WLAN via MMBSPSRAJESH DUVVURU
The ability to provide a Quality of Service (QoS) is one of the
challenging aspects of any Wireless Network. This paper
concentrates in improvising the speedy authentication
mechanism in Wireless Local Area Network (WLAN). To
fulfill the specified important issue, this work introduces a
novel Multi Merged Bio-Cryptographic Security-Aware
Packet Scheduling (MMBSPS) algorithm. In merging the
different biometric images, it is commenced with the new
merging mechanism called Triple Equally Segmented Bio-
Image (TESB) algorithm and later it is encrypted with the
RSA algorithm for efficient security. Matlab tool is used for
conducting the simulations on Multi Merged Bio-Images
(MMBI) and Bio-Images. The results of MMBSPS algorithm
is presented in contrast with the EMBSPS and EBSPS
algorithms. In the results, it is observed that, MMBSPS
algorithm is working better than existing EMBSPS and
EBSPS algorithms with respect to the speedy authentication
besides assuring security in WLAN. It is also observed the
overall performance of MMBSPS is improved by
approximately 23% in terms of authentication mechanism in
WLAN.
Survey on caching and replication algorithm for content distribution in peer ...ijcseit
This document summarizes and compares several caching and replication algorithms for content distribution in peer-to-peer networks. It first introduces caching and replication techniques and their benefits, including reliability, availability, fault tolerance, load balancing and performance improvements. It then reviews six specific algorithms: 1) A weighted-rank cache replacement policy, 2) A streaming algorithm using multiple description coding, 3) Two prefetching protocols (full striping and code-based placement), 4) A popularity-aware limited caching approach, 5) Replication algorithms with random load balancing, and 6) An optimal replication strategy characterization. For each algorithm, it describes the approach and how it addresses challenges in peer-to-peer content distribution.
Dynamic Chunks Distribution Scheme for Multiservice Load Balancing Using Fibo...Editor IJCATR
This document describes a proposed dynamic chunks distribution scheme for multiservice load balancing in cloud computing using a Fibonacci bases approach. Videos are split into chunks that are distributed across hosts for storage. The chunk sizes increase to reduce delay and improve performance. A Fibonacci-based splitting strategy is used to divide video files into chunks to reduce provisioning delay for users and optimize resource utilization. The scheme allows users to view entire videos without delays by gathering chunks from different servers in parallel.
International Journal of Computer Science, Engineering and Information Techno...ijcseit
In this paper, we focuses on caching and replication algorithm for content distribution in peer to peer
networks. Caching and replication is a key strategy for improve the reliability, availability, and
performance in peer to peer networks. This paper gives a brief introduction to caching, replication and
various algorithms have been discussed and a detailed study has been performed. The comparison table
shows it clearly that an algorithm satisfies the caching and replication requirement.
Pre-allocation Strategies of Computational Resources in Cloud Computing using...ijccsa
One of the major challenges of cloud computing is the management of request-response coupling and optimal allocation strategies of computational resources for the various types of service requests. In the normal situations the intelligence required to classify the nature and order of the request using standard methods is insufficient because the arrival of request is at a random fashion and it is meant for multiple resources with different priority order and variety. Hence, it becomes absolutely essential that we identify the trends of different request streams in every category by auto classifications and organize pre allocation strategies in a predictive way. It calls for designs of intelligent modes of interaction between the client request and cloud computing resource manager. This paper discusses about the corresponding scheme using Adaptive Resonance Theory-2.
This document summarizes a research paper on wireless network intrinsic secrecy. The paper proposes a framework to model wireless networks with inherent secrecy given by physical properties like node spatial distribution, wireless propagation medium, and total network interference. It develops metrics to measure network secrecy and evaluates how properties like path loss, fading and interference can enhance secrecy. The analysis provides insights into exploiting inherent properties of wireless networks to improve security and privacy of communications. Evaluation results show that interference can significantly benefit network secrecy and a deeper understanding of how natural network properties can be used to enhance secrecy.
A COMPARISON OF CACHE REPLACEMENT ALGORITHMS FOR VIDEO SERVICESijcsit
The increasing demand for video services has made video caching a necessity to decrease download times
and reduce Internet traffic. In addition, it is very important to store the right content at the right time in
caches to make effective use of caching. An informative decision has to be made as to which videos are to
be evicted from the cache in case of cache saturation. Therefore, the best cache replacement algorithm is
the algorithm which dynamically selects a suitable subset of videos for caching, and maximizes the cache
hit ratio by attempting to cache the videos which are most likely to be referenced in the future. In this paper
we study the most popular cache replacement algorithms (OPT, CC, QC, LRU-2, LRU, LFU and FIFO)
which are currently used in video caching. We use simulations to evaluate and compare these algorithms
using video popularities that follow a Zipf distribution. We consider different cache sizes and video request
rates. Our results show that the CC algorithm achieves the largest hit ratio and performs well even under
small cache sizes. On the other hand, the FIFO algorithm has the smallest hit ratio among all algorithms.
System analysis and design for multimedia retrieval systemsijma
Due to the extensive use of information technology and the recent developments in multimedia systems, the
amount of multimedia data available to users has increased exponentially. Video is an example of
multimedia data as it contains several kinds of data such as text, image, meta-data, visual and audio.
Content based video retrieval is an approach for facilitating the searching and browsing of large
multimedia collections over WWW. In order to create an effective video retrieval system, visual perception
must be taken into account. We conjectured that a technique which employs multiple features for indexing
and retrieval would be more effective in the discrimination and search tasks of videos. In order to validate
this, content based indexing and retrieval systems were implemented using color histogram, Texture feature
(GLCM), edge density and motion..
Voice Enable Blind Assistance System -Real time Object DetectionIRJET Journal
This document describes a voice-enabled blind assistance system using real-time object detection. The system uses a Single Shot Multi-Box Detection (SSD) model with MobileNet to detect objects in frames captured by a webcam in real-time. When an object is detected, its class is converted to speech using text-to-speech and provided to blind users along with alerts if the object is too close. The system aims to help visually impaired people gain more independence by identifying objects and hazards in their environment. An experiment showed the SSD MobileNet model achieved accurate real-time detection of household objects.
Visual Cryptography Industrial Training ReportMohit Kumar
A visual cryptography scheme (VCS) is a kind of secret sharing scheme which allows the encoding of a secret image into shares distributed to participants. The beauty of such a scheme is that a set of qualified participants is able to recover the secret image without any cryptographic knowledge and computation devices. An extended visual cryptography scheme (EVCS) is a kind of VCS which consists of meaningful shares (compared to the random shares of traditional VCS).
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the CloudIRJET Journal
The document discusses privacy preserving keyword search over encrypted data in the cloud. It proposes a personalized search (PSU) scheme that uses natural language processing on the client side to pre-compute search results for user queries before uploading encrypted data to the cloud. This allows encrypted keyword searches to be performed efficiently without retrieving all encrypted data from the cloud.
In this paper, we have proposed a hybrid push-pull protocol for peer-to-peer live video streaming. The
main goal of this research is to minimize the network end-to-end delay in comparison to pure mesh
networks. Hybrid protocols, in most cases, suffer from complex construction and maintenance. Therefore,
our proposed protocol uses a pure mesh topology and a single layer video coding. In summary, our pushpull
protocol has two parts. The pull-based part which is done on the mesh network, and the push-based
part which consists of two phases: parent selection and tree construction. When a push procedure appears,
it is very important to prevent data redundancy. To satisfy this condition, we have introduced a parent
selection method. In this method, by parent selection based on the minimum arrival time, the most stable
node will be selected. This node has the advantage of maximizing the expected service time of the tree.
Using this method, there is no need for maintaining any extra information and topology control data.
Finally, we do performance evaluation using OMNeT++ simulator. The simulation results show that the
proposed architecture has better performance in start-up delay, end-to-end delay, and distortion than pure
mesh-based network.
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGijp2p
In this paper, we have proposed a hybrid push-pull protocol for peer-to-peer live video streaming. The
main goal of this research is to minimize the network end-to-end delay in comparison to pure mesh
networks. Hybrid protocols, in most cases, suffer from complex construction and maintenance. Therefore,
our proposed protocol uses a pure mesh topology and a single layer video coding. In summary, our pushpull protocol has two parts. The pull-based part which is done on the mesh network, and the push-based
part which consists of two phases: parent selection and tree construction. When a push procedure appears,
it is very important to prevent data redundancy. To satisfy this condition, we have introduced a parent
selection method. In this method, by parent selection based on the minimum arrival time, the most stable
node will be selected. This node has the advantage of maximizing the expected service time of the tree.
Using this method, there is no need for maintaining any extra information and topology control data.
Finally, we do performance evaluation using OMNeT++ simulator. The simulation results show that the
proposed architecture has better performance in start-up delay, end-to-end delay, and distortion than pure
mesh-based network.
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGijp2p
In this paper, we have proposed a hybrid push-pull protocol for peer-to-peer live video streaming. The
main goal of this research is to minimize the network end-to-end delay in comparison to pure mesh
networks. Hybrid protocols, in most cases, suffer from complex construction and maintenance. Therefore,
our proposed protocol uses a pure mesh topology and a single layer video coding. In summary, our pushpull protocol has two parts. The pull-based part which is done on the mesh network, and the push-based
part which consists of two phases: parent selection and tree construction. When a push procedure appears,
it is very important to prevent data redundancy. To satisfy this condition, we have introduced a parent
selection method. In this method, by parent selection based on the minimum arrival time, the most stable
node will be selected. This node has the advantage of maximizing the expected service time of the tree.
Using this method, there is no need for maintaining any extra information and topology control data.
Finally, we do performance evaluation using OMNeT++ simulator. The simulation results show that the
proposed architecture has better performance in start-up delay, end-to-end delay, and distortion than pure
mesh-based network.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
SCHEDULING IN GRID TO MINIMIZE THE IMPOSED OVERHEAD ON THE SYSTEM AND TO INC...ijcsa
This document proposes and evaluates scheduling policies in a virtualized grid environment that aim to minimize VM preemptions and increase resource utilization. It first presents an analytical queuing model of a grid with multiple clusters receiving local and external requests. It then proposes a two-part scheduling policy: 1) A workload allocation policy that determines the fraction of external requests allocated to each cluster in a way that minimizes preemptions, based on the analytical model. 2) A dispatch policy that prioritizes more valuable external requests to reduce their chance of preemption. The policies are evaluated based on metrics like preemptions, utilization and response time. Results show the proposed policies significantly outperform others in minimizing preemptions across different workload scenarios
Live multimedia streaming and video on demand issues and challengeseSAT Journals
Live streaming and video on demand face challenges in providing quality service over the internet. The key issues are quality of service due to network instability and degraded performance when serving large numbers of users. While peer-to-peer architectures can help solve issues of limited server resources, they introduce challenges such as ensuring sufficient upload bandwidth from peers and maintaining stable connectivity. Additional issues include firewalls and internet service provider throttling impacting streaming quality, and challenges in peer discovery and storage overhead in peer-to-peer video on demand systems. Addressing these architectural and performance issues is important for providing the best experience of streaming and video on demand services.
Similar to Strategic Prefetching of VoD Programs Based on ART2 driven Request Clustering (20)
Call for Papers - 5th International Conference on Cloud, Big Data and IoT (CB...ijistjournal
5th International Conference on Cloud, Big Data and IoT (CBIoT 2024) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Cloud, Big Data and IoT. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of Cloud, Big Data and IoT.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in Cloud, Big Data and IoT.
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...ijistjournal
Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication. Most cryptographic algorithms function more efficiently when implemented in hardware than in software running on single processor. However, systems that use hardware implementations have significant drawbacks: they are unable to respond to flaws discovered in the implemented algorithm or to changes in standards. As an alternative, it is possible to implement cryptographic algorithms in software running on multiple processors. However, most of the cryptographic algorithms like DES (Data Encryption Standard) or 3DES have some drawbacks when implemented in software: DES is no longer secure as computers get more powerful while 3DES is relatively sluggish in software. AES (Advanced Encryption Standard), which is rapidly being adopted worldwide, provides a better combination of performance and enhanced network security than DES or 3DES by being computationally more efficient than these earlier standards. Furthermore, by supporting large key sizes of 128, 192, and 256 bits, AES offers higher security against brute-force attacks.
In this paper, AES has been implemented with single processor. Then the result has been compared with parallel implementations of AES with 2 varying different parameters such as key size, number of rounds and extended key size, and show how parallel implementation of the AES offers better performance yet flexible enough for cryptographic algorithms.
Submit Your Research Articles - International Journal of Information Sciences...ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
INFORMATION THEORY BASED ANALYSIS FOR UNDERSTANDING THE REGULATION OF HLA GEN...ijistjournal
Considering information entropy (IE), HLA surface expression (SE) regulation phenomenon is considered as information propagation channel with an amount of distortion. HLA gene SE is considered as sink regulated by the inducible transcription factors (TFs) (source). Previous work with a certain number of bin size, IEs for source and receiver is computed and computation of mutual information characterizes the dependencies of HLA gene SE on some certain TFs in different cells types of hematopoietic system under the condition of leukemia. Though in recent time information theory is utilized for different biological knowledge generation and different rules are available in those specific domains of biomedical areas; however, no such attempt is made regarding gene expression regulation, hence no such rule is available. In this work, IE calculation with varying bin size considering the number of bins is approximately half of the sample size of an attribute also confirms the previous inferences.
Call for Research Articles - 5th International Conference on Artificial Intel...ijistjournal
5th International Conference on Artificial Intelligence and Machine Learning (CAIML 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Artificial Intelligence and Machine Learning. The Conference looks for significant contributions to all major fields of the Artificial Intelligence, Machine Learning in theoretical and practical aspects. The aim of the Conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Computer Science, Engineering and Applications.
Online Paper Submission - International Journal of Information Sciences and T...ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
SYSTEM IDENTIFICATION AND MODELING FOR INTERACTING AND NON-INTERACTING TANK S...ijistjournal
System identification from the experimental data plays a vital role for model based controller design. Derivation of process model from first principles is often difficult due to its complexity. The first stage in the development of any control and monitoring system is the identification and modeling of the system. Each model is developed within the context of a specific control problem. Thus, the need for a general system identification framework is warranted. The proposed framework should be able to adapt and emphasize different properties based on the control objective and the nature of the behavior of the system. Therefore, system identification has been a valuable tool in identifying the model of the system based on the input and output data for the design of the controller. The present work is concerned with the identification of transfer function models using statistical model identification, process reaction curve method, ARX model, genetic algorithm and modeling using neural network and fuzzy logic for interacting and non interacting tank process. The identification technique and modeling used is prone to parameter change & disturbance. The proposed methods are used for identifying the mathematical model and intelligent model of interacting and non interacting process from the real time experimental data.
Call for Research Articles - 4th International Conference on NLP & Data Minin...ijistjournal
4th International Conference on NLP & Data Mining (NLDM 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Natural Language Computing and Data Mining.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to.
Research Article Submission - International Journal of Information Sciences a...ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
Call for Papers - International Journal of Information Sciences and Technique...ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
Implementation of Radon Transformation for Electrical Impedance Tomography (EIT)ijistjournal
Radon Transformation is generally used to construct optical image (like CT image) from the projection data in biomedical imaging. In this paper, the concept of Radon Transformation is implemented to reconstruct Electrical Impedance Topographic Image (conductivity or resistivity distribution) of a circular subject. A parallel resistance model of a subject is proposed for Electrical Impedance Topography(EIT) or Magnetic Induction Tomography(MIT). A circular subject with embedded circular objects is segmented into equal width slices from different angles. For each angle, Conductance and Conductivity of each slice is calculated and stored in an array. A back projection method is used to generate a two-dimensional image from one-dimensional projections. As a back projection method, Inverse Radon Transformation is applied on the calculated conductance and conductivity to reconstruct two dimensional images. These images are compared to the target image. In the time of image reconstruction, different filters are used and these images are compared with each other and target image.
Online Paper Submission - 6th International Conference on Machine Learning & ...ijistjournal
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to.
Submit Your Research Articles - International Journal of Information Sciences...ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
BER Performance of MPSK and MQAM in 2x2 Almouti MIMO Systemsijistjournal
Almouti published the error performance of the 2x2 space-time transmit diversity scheme using BPSK. One of the key techniques employed for correcting such errors is the Quadrature amplitude modulation (QAM) because of its efficiency in power and bandwidth.. In this paper we explore the error performance of the 2x2 MIMO system using the Almouti space-time codes for higher order PSK and M-ary QAM. MATLAB was used to simulate the system; assuming slow fading Rayleigh channel and additive white Gaussian noise. The simulated performance curves were compared and evaluated with theoretical curves obtained using BER tool on the MATLAB by setting parameters for random generators. The results shows that the technique used do find a place in correcting error rates of QAM system of higher modulation schemes. The model can equally be used not only for the criteria of adaptive modulation but for a platform to design other modulation systems as well.
Online Paper Submission - International Journal of Information Sciences and T...ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
Call for Papers - International Journal of Information Sciences and Technique...ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
International Journal of Information Sciences and Techniques (IJIST)ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...ijistjournal
Feature extraction is a method of capturing visual content of an image. The feature extraction is the process to represent raw image in its reduced form to facilitate decision making such as pattern classification. We have tried to address the problem of classification MRI brain images by creating a robust and more accurate classifier which can act as an expert assistant to medical practitioners. The objective of this paper is to present a novel method of feature selection and extraction. This approach combines the Intensity, Texture, shape based features and classifies the tumor as white matter, Gray matter, CSF, abnormal and normal area. The experiment is performed on 140 tumor contained brain MR images from the Internet Brain Segmentation Repository. The proposed technique has been carried out over a larger database as compare to any previous work and is more robust and effective. PCA and Linear Discriminant Analysis (LDA) were applied on the training sets. The Support Vector Machine (SVM) classifier served as a comparison of nonlinear techniques Vs linear ones. PCA and LDA methods are used to reduce the number of features used. The feature selection using the proposed technique is more beneficial as it analyses the data according to grouping class variable and gives reduced feature set with high classification accuracy.
Research Article Submission - International Journal of Information Sciences a...ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINijistjournal
In this paper A Median Based Directional Cascaded with Mask (MBDCM) filter has been proposed, which is based on three different sized cascaded filtering windows. The differences between the current pixel and its neighbors aligned with four main directions are considered for impulse detection. A direction index is used for each edge aligned with a given direction. Minimum of these four direction indexes is used for impulse detection under each masking window. Depending on the minimum direction indexes among these three windows new value to substitute the noisy pixel is calculated. Extensive simulations showed that the MBDCM filter provides good performances of suppressing impulses from both gray level and colored benchmarked images corrupted with low noise level as well as for highly dense impulses. MBDCM filter gives better results than MDWCMM filter in suppressing impulses from highly corrupted digital images.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
International Conference on NLP, Artificial Intelligence, Machine Learning an...
Strategic Prefetching of VoD Programs Based on ART2 driven Request Clustering
1. International Journal of Information Sciences and Techniques (IJIST) Vol.1, No.2, September 2011
DOI : 10.5121/ijist.2011.1202 13
Strategic Prefetching of VoD Programs Based on
ART2 driven Request Clustering
Dr. T. R. Gopalakrishnan Nair1
and P. Jayarekha2
Director, Research and Industry Incubation Centre, DSI, Bangalore
trgnair@yahoo.com
Research Scholar, Dr. MGR University Dept. of ISE, BMSCE, Bangalore .
Member, Multimedia Research Group, Research Centre, DSI, Bangalore.
Jayarekha2001@yahoo.co.in
Abstract
In this paper we present a novel neural architecture to classify various types of VoD request arrival pattern
using an unsupervised clustering Adaptive Resonance Theory 2 (ART2). The knowledge extracted from the
ART2 clusters is used to prefetch the multimedia objects into the proxy server’s cache, from the disk and
prepare the system to serve the clients more efficiently before the user’s arrival of the request. This
approach adapts to changes in user request patterns over a period by storing the previous information.
Each cluster is represented as prototype vector by generalizing the most frequently used video blocks that
are accessed by all the cluster members. The simulation results of the proposed clustering and prefetching
algorithm shows a significant increase in the performance of streaming server. The proposed algorithm
helps the server’s agent to learn user preferences and discover the information about the corresponding
videos. These videos can be prefetched to the cache and identify those videos for the users who demand it.
KEYWORDS
Clustering, Predictive prefetch and neural networks.
1. INTRODUCTION
In the past few years, Multimedia applications have grown rapidly and it is evident through the
exponential growth of traffic on the Internet. These applications include Video-on-demand, video
authoring tools, news broadcasting, videoconferencing, digital libraries and interactive video
games. The new challenges which have emerged today are related to data storage, management
processing, continuous arrival of multiple requests and potentially unbounded streams that are
rapid and time varying. It is generally not feasible to store the request arrival pattern in a
traditional database management system in order to perform delivery operation of a video stream
later. Instead, the request arrival must generally be processed in an online manner from the cache
which also holds the predicatively prefetched video streams and this process assures that results
can be delivered with a small start up delay for the videos accessed for the first-time.
The VoD proxy server is an important component as its function is to retrieve as many blocks of
video streams as possible and send them to users. VoD proxy server is responsible for retrieving
different blocks of different video streams and sending them to different users simultaneously.
2. International Journal of Information Sciences and Techniques (IJIST) Vol.1, No.2, September 2011
14
This is not an easy task due to the real time commitment and the large volume of characteristics
possessed by the video. Real time characteristic requires the video blocks to be retrieved from the
server’s disk within a deadline for continuous delivery to users. Failure to meet the deadline will
result in jitters on screen during viewing. The usage of proxy server cache to store the prefetched
videos can reduce the user’s waiting time. In this solution the videos that are more likely to be
accessed are prefetched to the browser’s cache and when a request is received for one of these
videos, a cache–hit occur immediately thereby avoiding start up delays. Given the previous
instance, a crucial issue is to effectively predict the following requests and subsequently model
the user’s actions over time. If the next request can be determined accurately then the user’s
waiting time is reduced to zero and furthermore, no chance of user request flooding.
With the rapid development in VoD streaming services, the modern techniques to improve
multimedia services has become an important research area. An important topic in learning user’s
request pattern is the clustering of multimedia VoD users, i.e, grouping the users into clusters
based on their common interest. By analyzing the characteristics of the groups, the streaming
server will understand the users better and may provide more suitable, customized services to the
users. In this paper, the clustering of the users request access pattern based on their browsing
activities is studied. Users with similar browsing activities are clustered or grouped into classes
(clusters). A clustering algorithm takes a set of input vectors and gives as output a set of clusters
and a mapping of each input vector to a cluster. Input vectors which are close to each other
according to a specific similarity measure should be mapped to the same cluster. Clusters are
internally represented using prototype vectors which are the vectors indicating a certain
similarity.
VoD application services are made available over a computer network. It provides to watch any
video at any time. One of the requirements for VoD system implementation is to have a VoD
streaming server that acts as an engine to deliver videos from the server’s disk to users. Video
blocks should be prefetched intelligently with less latency from the disk and hence enable the
service of high number of streams. However, due to real time and large volume characteristics
possessed by the video, the designing of video layout is a challenging task. Real time imposes
constraints on the distribution of blocks on disk and hence it decreases the number of streams
being delivered to users.
In this paper, we consider the problem of clustering video streams. Thus, our goal is to maintain
classes of video streams such that a selected class contains videos of more or less similar
properties and attributes. The focus of the work is on delivery of video streams in real-time. Here
popularity of each individual video is represented by an index, which is a measurement of
popularity.
Outline of the Paper: The paper is organized into various sections as follows: Section 2 discusses
about the related work in clustering and prefetching. Section 3 presents the importance of ART2.
Section 4 presents the methodology used in developing the algorithm. Section 5 discusses the
architecture of ART2 algorithm. Section 6 presents performance evaluation and Section 7 gives
the conclusion.
2. RELATED WORK
2.1 Related work in clustering
The clustering of users based on their web access pattern is an active area of research in Web
usage mining. Cooley R et al. have proposed taxonomy of Web Mining and they present
various research issues. In addition, the research in web mining is centered on the extraction and
applications of clustering and prefeching. Both these issues are clearly discussed by Rangarajan S
K . It has been proven in this scheme a 97.78% of prediction hierarchy. Clustering of multimedia
3. International Journal of Information Sciences and Techniques (IJIST) Vol.1, No.2, September 2011
15
request access pattern is defined by hierarchical clustering method to cluster the generalized
session.
2.2 Related work in prefetching
Prefetching means fetching the multimedia objects much prior to the user request arrival. There
are some existing prefetching techniques, but they possess some deficiency. In this the client
suffers from start-up delay for those objects that are accessed for the first-time since, prefetching
action is only triggered when a client starts to access that object. However, an inefficient
prefetching technique causes wastage of network resources by increasing the web traffic over
the network. J Yuan et al., have proposed a scheme, in which proxy servers aggressively prefetch
media objects without a pattern before they are requested. They make use of servers’ knowledge
about access patterns to ensure the accuracy of prefetching, and have tried to minimize the
prefetched data size by prefetching only the initial segments of media objects. KJ Nesbit et al.,
have proposed a prefetching algorithm which is based on a global history buffer that holds the
most recent missing addresses in FIFO order. S K Rangarajan, et al., have proposed ART1
algorithm in which clustering and prediction has resulted in an accuracy of 97%. In this work we
have proposed ART2 NN clustering algorithm for clustering user request arrival pattern. This
cluster helps the server’s agent in prefetching the videos into the disk, prior the user request.
3. ART2 NEURAL NETWORK
ART2 is an unsupervised neural network algorithm derived from the resonance theory. The ART
networks are rather good at pattern recognizing and pattern classification. Their design allows the
user to control the similarity between the patterns accepted by the same cluster]. ART2 can learn
about significant new classes, yet remain stable in response to previously learned classes. Thus, it
is able to meet the challenges in clustering the request arrival pattern where numerous variations
are common. ART networks are configured to recognize invariant properties of a given problem
domain; when presented with data pertinent to the domain, the network can categorize it on the
basis of these features. This process also categorizes when distinctly different data are presented
and it includes the ability to create new clusters. ART networks accommodate these requirements
through interactions between different subsystems, designed to process previously encountered
and unfamiliar events, respectively. We choose the ART2 neural network rather than other
classifiers because capable of incrementally increasing the numbers of clusters if needed.
ART2 networks were designed to process continuous input pattern data. A special characteristic
of such networks is the plasticity that allows the system to learn new concepts and at the same
time retain the stability that prevents destruction of previously learned information [6].
4. METHODOLOGY
4.1 Preprocessing the web logs
The, the log data of request arrivals are represented as <client_Id,date, requested_video> format.
We have selected a sample format of 50 clients requesting for 200 different videos.
4.2 Getting the Popularity Value
The popularity value is the most important parameter to get the effective prefetch operation.
This popularity value may consider the long term measurement of request-frequency, which is
neglected in the other algorithms. In this work the reference count value is used to get the
popularity value. The reference count value is highly variable over short time scales, but this is
much smoother over long time scales. This property makes the popularity value to deal with the
long term measurement of request frequency.
4. International Journal of Information Sciences and Techniques (IJIST) Vol.1, No.2, September 2011
16
Since the maximum and minimum value of request frequency is known during the submission of
input to the ART2 system, the normalized value of the popularity can be obtained using the
following transformation.
min
d
max
d
min
d
d
−
−
=
δ (1)
The transformed into a range between [0 ,1].
4.3 Extraction of feature vectors
For clustering, we need to extract the popularity of each video that represents the frequency of
number of times the video is requested. The pattern vector maps the access frequency of each
base vector element to real values. It is of the form P ={P1,P2,….Pn} where each Pi varies between
0 to 1.
0.8 0.2 0.2 0.1 0.3 0.4 0.5 0.1 0.3
Figure 1 Sample Pattern Vector
Figure 2 is a sample of pattern vector generated during a session.
Each pattern vector has a real value pattern of length 200.For each session we input 50 such
pattern to an ART2, since we have 50 clients.
5 PROPOSED ARCHITECTURE AND ALGORITHM
Architecture of ART2 is shown in Figure 2. It is designed for processing analog as well as binary
input patterns. ART2 network module includes two main parts: attentional subsystem and
orienting subsystem. Attentional subsystem preprocess analog input pattern, and then choose the
best matching pattern under competitive selection rule from the input pattern prototypes.
Orienting subsystem carry out similarity vigilance-testing of the selective pattern prototype and
trigger resonance learning and adjusting weight vectors when vigilance-testing passed, otherwise
get rid of the current active node and search the other new ones. If there is no pattern prototype
matching the input pattern, create a new output node to represent it. Its memory capacity can
increase with the increase of learning patterns. The network allows not only off-line learning but
also in an on-line learning and applying way simultaneously, that is, the learning and applying
states are inseparable.
Figure 2 The ART2 Neural networks
5. International Journal of Information Sciences and Techniques (IJIST) Vol.1, No.2, September 2011
17
The ART2 neural network algorithm used in this work is summarized below.
Neural network configuration:
The parameters required for ART2 formulation has been initially chosen :
Noise inhibition threshold:
0 ≤ θ ≤1 (2)
Surveillance Parameter:
0≤ρ≤1 (3)
Error tolerance parameter ETP in the
F1 layer: 0≤ETP≤1 (4)
Weight initialization of the neural
network: Top-down: Zji(0) = 0 (5)
Bottom-up: Zij(0) ≤ (6)
Operation steps:
1. Initialize the sub-layer and layer outputs with zero value and set cycle counter to one.
2. Apply an input vector I to the sub-layer W of the F1 layer. The output of this layer is:
Wi =Ii + aUi (7)
3. Propagate to the X sub-layer:
W
e
i
w
xi
+
= (8)
4. Calculate the V sub-layer output:
Vi = f(xi) + bf(qi) (9)
In the first cycle the second term of (9) is zero once the value of qi is zero.
The function f(x) is given by:
θ
≥
θ
≤
≤
θ
+
θ
=
x
x
x
0
)
x
(
2
)
x
(
f 2
2
2
(10)
5. Compute the U sub-layer output:
v
e
i
v
i
u
+
= (11)
6. International Journal of Information Sciences and Techniques (IJIST) Vol.1, No.2, September 2011
18
6. Propagate the previous output
to the P sub-layer: iJ
i
i dZ
u
p +
= (12)
The J node of the F2 layer is the winner node. If F2 is inactive or if the network is in its initial
configuration,
i
u
i
p = (13)
7. Calculate the Q sub-layer output:
p
e
p
q i
i
+
= (14)
8. Repeat steps (2) to (8) until stabilizing the values in F1 layer according to Error (i) = U(i) -
U*(i).
If Error (i) ≤ ETP, the F1 layer is stable.
9. Calculate the R sub-layer output:
cP
u
e
cp
u
r
i
i
i
+
+
+
= (15)
10. Determine if a reset condition is indicated. If ρ (e R ) then, send a reset signal to F2, mark
any active F2 node as not enable for competition, reduce to zero the cycle counter and return
to the step (2). If there is no reset signal and the counter is one, the cycle counter is increased
and passes to step (11). If there is no reset and the cycle counter is larger than one, then
control passes to step (14), once the resonance was established.
11. Calculate the F2 layer input:
Ji
M
i
i
j Z
P
T ∑
=
=
1
(16)
12. Only the F2 winner node has non-zero output. Any node marked as non capable by a previous
reset signal doesn't participate in the competition.
=
=
otherwise
)
T
max(
T
)
T
(
g
0
k
j
d
j
(17)
13. Repeat the steps (6) to (10).
14. Update the bottom-up weights of the F2 layer winner node:
d
1
u
Z i
Ji
−
= (18)
7. International Journal of Information Sciences and Techniques (IJIST) Vol.1, No.2, September 2011
19
15. Update the top-down weights of the F2 layer winner node:
d
1
u
Z i
iJ
−
= (19)
16. Remove input vector, restore inactive F2 nodes and return to the step (1) with a new input
vector.
The initial values chosen for ART2 is as follows
a=10, b=10,d=0.9,c=0.1,e=0.0 θ=0.2 M = 5
Threshold value selection and methodology used
The use of several feature vectors require a special neural network, a supervised ART2 NN is
used. The performance of a supervised or unsupervised ART2 NN depends on the appropriate
selection of the vigilance threshold [10]. If the value of vigilance threshold is near to zero, a lot of
clusters will be generated, but if it is greater, then number clusters will be generated.
6 PERFORMANCE EVALUATION
A performance analysis was done based on two parameters. (a) Hits and (b) Accuracy. Hits
indicate the number of videos that are requested from the prefetched videos, and accuracy is the
ratio to hits to the number of videos being prefetched. The overload of network is reduced by
clustering and prefetching a community of users. It prefetches request with an accuracy as high as
97% as compared with ART1 system. In ART1 each prototype vector of a cluster represents a
possibility of community of users requesting for videos in the form of binary pattern. Even a
highest popular video will be represented by a value of 1. In ART2 the popularity value is
normalized between [0,1].Hence the values for the input vector varies along with the popularity
value.
Table 1: Result of ART 2 prefetching scheme
Number of members
each cluster
Videos prefetced Hits Accuracy %
8 38 36 95%
6 48 46 96%
4 34 32 94%
5 31 30 96%
The results obtained have considerable improvement over ART1 which takes only the binary
values as input. ART1 resulted in nearly 93 percentage accuracy prediction of prefetching .
7 SUMMARY
In recent years, there have been a number of researches in exploring novel methods and
techniques to group users based on the request access pattern. In this work we have clustered and
prefetched user request access pattern using ART2 neural network approach. The predictions
8. International Journal of Information Sciences and Techniques (IJIST) Vol.1, No.2, September 2011
20
were done over a time series domain. The proposed system has achieved good performance with
high satisfaction and applicability.
REFERENCES
[1] CARPENTER G, GROSSBERG, S , 1987, ART2: Self-Organization of Stable Category Recognition Codes
for Analog Input Patterns, Applied Optics, 26: p 4916:4930.
[2] COOLEY R., MOBASHER B., SRIVATSAVA J., 1997 ,Web Mining: Information and Pattern Discovery
on the World Wide Web , ICTAI’97.
[3] CHRIS TSENG H, 2007, Internet Applications with Fuzzy Logic and Neural Networks: A Survey,
Journal of engineering, computing and architecture.
[4] DINKAR SITARAM, ASIT DAN, 2000, Multimedia Servers Applications,Environment, and Design,
Morgan Kaufmann publishers, 2000
[5] HEINS, LUCIEN G., TAURITZ, AND, DANIEL R, 1995, Adaptive Resonance Theory (ART): An
Introduction. Internal Report 95-35, Department of Computer Science, Leiden University,
pages 174-185.
[6] FAUSETT, L.V. 1994, Fundamentals of Neural Networks Architectures, Algorithms, and applications.
New Jersey: Prentice Hall International Inc, New Jersey, p .246-287.
[7] ISSAM DAGHER , 2006 Art networks with geometrical distances Journal of Discrete Algorithms
archive Volume Issue 4 ISSN:1570-8667 Pages: 538-553
[8] JUNG J, LEE D, CHON K, 2000 Proactive Web caching with cumulative prefetching for large
multimedia Data Computer Networks – Elsevier
[9] KUMAR N, JOSHI R S 2007 Data Clustering Using Artificial Neural Networks Proceedings of
National Conference on Challenges & Opportunities in Information Technology (COIT-2007).
[10] NACHEV A, GANCHEV I 2003 Data Mining For Browsing Pattern Weblog Data By Art2 Neural
Networks International Journal Information Theories & Applications Vol.10.
[11] NESBIT K J, SMITH J E, 2004 Data Cache Prefetching using a global history buffer, High Performance
Computer Architecture.
[12] MASSEY L 2002 Determination of clustering tendency with ART neural networks Proceedings of
recent advances in soft-computing (RASC02) .
[13] RANGARAJAN S K , PHOHA V V , BALAGANI K, SELMIC R R 2008 Web user caching and its
application to prefetching using ART neural networks IEEE Internet Computing, Data & Knowledge
Engineering, Vol.65 No.3, p.512-543
[14] SANTOSH K, VIR V, KIRAN S, SELMIC R, IYENGAR SS, 2004 Adaptive Neural Network clustering of
Web users IEEE Computer..
[15] TAE-UK CHOI, YOUNG-JU KIM,1999 “
A prefetching scheme based on the analysis of user access
patterns in news-on-demand system“, International Multimedia Conference Proceedings of the
seventh ACM international conference on Multimedia (Part 1) Orlando, Florida, United States,
ISBN:1-58113-151-8 Pages: 145 - 148 .
[16] VENKETESH P, VENKATESAN R 2009 A Survey on Applications of NeuralNetworks and Evolutionary
Techniques Web Caching IETE Technical review.
9. International Journal of Information Sciences and Techniques (IJIST) Vol.1, No.2, September 2011
21
[17] YUAN J, SUN Q, RAHARDJA S, 2007 A More Aggressive Prefetching Scheme for streaming Media
Delivery over the Internet Proceedings of SPIE
[18] XIAOBO ZHOU “ A video replacement policy based on revenue to cost ratio in a multicast tv-anytime
system.
Authors
T.R. Gopalakrishnan Nair holds M.Tech. (IISc, Bangalore) and Ph.D. degree in Computer Science. He
has three decades experience in Computer Science and Engineering through research, industry and
education. He has published several papers and holds patents in multi domain. He won the PARAM Award
for technology innovation. Currently, he is the Director of Research and Industry in Dayananda Sagar
Institutions, Bangalore, India.
P Jayarekha holds M.Tech (VTU Belgaum ) in Computer Science securing second rank . She has one and
half decades experience in teaching field. She has published many papers. Currently, she is working as a
teaching faculty in the department of Information Science and Engineering at BMS College of Engineering,
Bangalore, India.