SlideShare a Scribd company logo
International Journal of Information Sciences and Techniques (IJIST) Vol.1, No.2, September 2011
DOI : 10.5121/ijist.2011.1202 13
Strategic Prefetching of VoD Programs Based on
ART2 driven Request Clustering
Dr. T. R. Gopalakrishnan Nair1
and P. Jayarekha2
Director, Research and Industry Incubation Centre, DSI, Bangalore
trgnair@yahoo.com
Research Scholar, Dr. MGR University Dept. of ISE, BMSCE, Bangalore .
Member, Multimedia Research Group, Research Centre, DSI, Bangalore.
Jayarekha2001@yahoo.co.in
Abstract
In this paper we present a novel neural architecture to classify various types of VoD request arrival pattern
using an unsupervised clustering Adaptive Resonance Theory 2 (ART2). The knowledge extracted from the
ART2 clusters is used to prefetch the multimedia objects into the proxy server’s cache, from the disk and
prepare the system to serve the clients more efficiently before the user’s arrival of the request. This
approach adapts to changes in user request patterns over a period by storing the previous information.
Each cluster is represented as prototype vector by generalizing the most frequently used video blocks that
are accessed by all the cluster members. The simulation results of the proposed clustering and prefetching
algorithm shows a significant increase in the performance of streaming server. The proposed algorithm
helps the server’s agent to learn user preferences and discover the information about the corresponding
videos. These videos can be prefetched to the cache and identify those videos for the users who demand it.
KEYWORDS
Clustering, Predictive prefetch and neural networks.
1. INTRODUCTION
In the past few years, Multimedia applications have grown rapidly and it is evident through the
exponential growth of traffic on the Internet. These applications include Video-on-demand, video
authoring tools, news broadcasting, videoconferencing, digital libraries and interactive video
games. The new challenges which have emerged today are related to data storage, management
processing, continuous arrival of multiple requests and potentially unbounded streams that are
rapid and time varying. It is generally not feasible to store the request arrival pattern in a
traditional database management system in order to perform delivery operation of a video stream
later. Instead, the request arrival must generally be processed in an online manner from the cache
which also holds the predicatively prefetched video streams and this process assures that results
can be delivered with a small start up delay for the videos accessed for the first-time.
The VoD proxy server is an important component as its function is to retrieve as many blocks of
video streams as possible and send them to users. VoD proxy server is responsible for retrieving
different blocks of different video streams and sending them to different users simultaneously.
International Journal of Information Sciences and Techniques (IJIST) Vol.1, No.2, September 2011
14
This is not an easy task due to the real time commitment and the large volume of characteristics
possessed by the video. Real time characteristic requires the video blocks to be retrieved from the
server’s disk within a deadline for continuous delivery to users. Failure to meet the deadline will
result in jitters on screen during viewing. The usage of proxy server cache to store the prefetched
videos can reduce the user’s waiting time. In this solution the videos that are more likely to be
accessed are prefetched to the browser’s cache and when a request is received for one of these
videos, a cache–hit occur immediately thereby avoiding start up delays. Given the previous
instance, a crucial issue is to effectively predict the following requests and subsequently model
the user’s actions over time. If the next request can be determined accurately then the user’s
waiting time is reduced to zero and furthermore, no chance of user request flooding.
With the rapid development in VoD streaming services, the modern techniques to improve
multimedia services has become an important research area. An important topic in learning user’s
request pattern is the clustering of multimedia VoD users, i.e, grouping the users into clusters
based on their common interest. By analyzing the characteristics of the groups, the streaming
server will understand the users better and may provide more suitable, customized services to the
users. In this paper, the clustering of the users request access pattern based on their browsing
activities is studied. Users with similar browsing activities are clustered or grouped into classes
(clusters). A clustering algorithm takes a set of input vectors and gives as output a set of clusters
and a mapping of each input vector to a cluster. Input vectors which are close to each other
according to a specific similarity measure should be mapped to the same cluster. Clusters are
internally represented using prototype vectors which are the vectors indicating a certain
similarity.
VoD application services are made available over a computer network. It provides to watch any
video at any time. One of the requirements for VoD system implementation is to have a VoD
streaming server that acts as an engine to deliver videos from the server’s disk to users. Video
blocks should be prefetched intelligently with less latency from the disk and hence enable the
service of high number of streams. However, due to real time and large volume characteristics
possessed by the video, the designing of video layout is a challenging task. Real time imposes
constraints on the distribution of blocks on disk and hence it decreases the number of streams
being delivered to users.
In this paper, we consider the problem of clustering video streams. Thus, our goal is to maintain
classes of video streams such that a selected class contains videos of more or less similar
properties and attributes. The focus of the work is on delivery of video streams in real-time. Here
popularity of each individual video is represented by an index, which is a measurement of
popularity.
Outline of the Paper: The paper is organized into various sections as follows: Section 2 discusses
about the related work in clustering and prefetching. Section 3 presents the importance of ART2.
Section 4 presents the methodology used in developing the algorithm. Section 5 discusses the
architecture of ART2 algorithm. Section 6 presents performance evaluation and Section 7 gives
the conclusion.
2. RELATED WORK
2.1 Related work in clustering
The clustering of users based on their web access pattern is an active area of research in Web
usage mining. Cooley R et al. have proposed taxonomy of Web Mining and they present
various research issues. In addition, the research in web mining is centered on the extraction and
applications of clustering and prefeching. Both these issues are clearly discussed by Rangarajan S
K . It has been proven in this scheme a 97.78% of prediction hierarchy. Clustering of multimedia
International Journal of Information Sciences and Techniques (IJIST) Vol.1, No.2, September 2011
15
request access pattern is defined by hierarchical clustering method to cluster the generalized
session.
2.2 Related work in prefetching
Prefetching means fetching the multimedia objects much prior to the user request arrival. There
are some existing prefetching techniques, but they possess some deficiency. In this the client
suffers from start-up delay for those objects that are accessed for the first-time since, prefetching
action is only triggered when a client starts to access that object. However, an inefficient
prefetching technique causes wastage of network resources by increasing the web traffic over
the network. J Yuan et al., have proposed a scheme, in which proxy servers aggressively prefetch
media objects without a pattern before they are requested. They make use of servers’ knowledge
about access patterns to ensure the accuracy of prefetching, and have tried to minimize the
prefetched data size by prefetching only the initial segments of media objects. KJ Nesbit et al.,
have proposed a prefetching algorithm which is based on a global history buffer that holds the
most recent missing addresses in FIFO order. S K Rangarajan, et al., have proposed ART1
algorithm in which clustering and prediction has resulted in an accuracy of 97%. In this work we
have proposed ART2 NN clustering algorithm for clustering user request arrival pattern. This
cluster helps the server’s agent in prefetching the videos into the disk, prior the user request.
3. ART2 NEURAL NETWORK
ART2 is an unsupervised neural network algorithm derived from the resonance theory. The ART
networks are rather good at pattern recognizing and pattern classification. Their design allows the
user to control the similarity between the patterns accepted by the same cluster]. ART2 can learn
about significant new classes, yet remain stable in response to previously learned classes. Thus, it
is able to meet the challenges in clustering the request arrival pattern where numerous variations
are common. ART networks are configured to recognize invariant properties of a given problem
domain; when presented with data pertinent to the domain, the network can categorize it on the
basis of these features. This process also categorizes when distinctly different data are presented
and it includes the ability to create new clusters. ART networks accommodate these requirements
through interactions between different subsystems, designed to process previously encountered
and unfamiliar events, respectively. We choose the ART2 neural network rather than other
classifiers because capable of incrementally increasing the numbers of clusters if needed.
ART2 networks were designed to process continuous input pattern data. A special characteristic
of such networks is the plasticity that allows the system to learn new concepts and at the same
time retain the stability that prevents destruction of previously learned information [6].
4. METHODOLOGY
4.1 Preprocessing the web logs
The, the log data of request arrivals are represented as <client_Id,date, requested_video> format.
We have selected a sample format of 50 clients requesting for 200 different videos.
4.2 Getting the Popularity Value
The popularity value is the most important parameter to get the effective prefetch operation.
This popularity value may consider the long term measurement of request-frequency, which is
neglected in the other algorithms. In this work the reference count value is used to get the
popularity value. The reference count value is highly variable over short time scales, but this is
much smoother over long time scales. This property makes the popularity value to deal with the
long term measurement of request frequency.
International Journal of Information Sciences and Techniques (IJIST) Vol.1, No.2, September 2011
16
Since the maximum and minimum value of request frequency is known during the submission of
input to the ART2 system, the normalized value of the popularity can be obtained using the
following transformation.
min
d
max
d
min
d
d
−
−
=
δ (1)
The transformed into a range between [0 ,1].
4.3 Extraction of feature vectors
For clustering, we need to extract the popularity of each video that represents the frequency of
number of times the video is requested. The pattern vector maps the access frequency of each
base vector element to real values. It is of the form P ={P1,P2,….Pn} where each Pi varies between
0 to 1.
0.8 0.2 0.2 0.1 0.3 0.4 0.5 0.1 0.3
Figure 1 Sample Pattern Vector
Figure 2 is a sample of pattern vector generated during a session.
Each pattern vector has a real value pattern of length 200.For each session we input 50 such
pattern to an ART2, since we have 50 clients.
5 PROPOSED ARCHITECTURE AND ALGORITHM
Architecture of ART2 is shown in Figure 2. It is designed for processing analog as well as binary
input patterns. ART2 network module includes two main parts: attentional subsystem and
orienting subsystem. Attentional subsystem preprocess analog input pattern, and then choose the
best matching pattern under competitive selection rule from the input pattern prototypes.
Orienting subsystem carry out similarity vigilance-testing of the selective pattern prototype and
trigger resonance learning and adjusting weight vectors when vigilance-testing passed, otherwise
get rid of the current active node and search the other new ones. If there is no pattern prototype
matching the input pattern, create a new output node to represent it. Its memory capacity can
increase with the increase of learning patterns. The network allows not only off-line learning but
also in an on-line learning and applying way simultaneously, that is, the learning and applying
states are inseparable.
Figure 2 The ART2 Neural networks
International Journal of Information Sciences and Techniques (IJIST) Vol.1, No.2, September 2011
17
The ART2 neural network algorithm used in this work is summarized below.
Neural network configuration:
The parameters required for ART2 formulation has been initially chosen :
Noise inhibition threshold:
0 ≤ θ ≤1 (2)
Surveillance Parameter:
0≤ρ≤1 (3)
Error tolerance parameter ETP in the
F1 layer: 0≤ETP≤1 (4)
Weight initialization of the neural
network: Top-down: Zji(0) = 0 (5)
Bottom-up: Zij(0) ≤ (6)
Operation steps:
1. Initialize the sub-layer and layer outputs with zero value and set cycle counter to one.
2. Apply an input vector I to the sub-layer W of the F1 layer. The output of this layer is:
Wi =Ii + aUi (7)
3. Propagate to the X sub-layer:
W
e
i
w
xi
+
= (8)
4. Calculate the V sub-layer output:
Vi = f(xi) + bf(qi) (9)
In the first cycle the second term of (9) is zero once the value of qi is zero.
The function f(x) is given by:










θ
≥
θ
≤
≤
θ
+
θ
=
x
x
x
0
)
x
(
2
)
x
(
f 2
2
2
(10)
5. Compute the U sub-layer output:
v
e
i
v
i
u
+
= (11)
International Journal of Information Sciences and Techniques (IJIST) Vol.1, No.2, September 2011
18
6. Propagate the previous output
to the P sub-layer: iJ
i
i dZ
u
p +
= (12)
The J node of the F2 layer is the winner node. If F2 is inactive or if the network is in its initial
configuration,
i
u
i
p = (13)
7. Calculate the Q sub-layer output:
p
e
p
q i
i
+
= (14)
8. Repeat steps (2) to (8) until stabilizing the values in F1 layer according to Error (i) = U(i) -
U*(i).
If Error (i) ≤ ETP, the F1 layer is stable.
9. Calculate the R sub-layer output:
cP
u
e
cp
u
r
i
i
i
+
+
+
= (15)
10. Determine if a reset condition is indicated. If ρ (e R ) then, send a reset signal to F2, mark
any active F2 node as not enable for competition, reduce to zero the cycle counter and return
to the step (2). If there is no reset signal and the counter is one, the cycle counter is increased
and passes to step (11). If there is no reset and the cycle counter is larger than one, then
control passes to step (14), once the resonance was established.
11. Calculate the F2 layer input:
Ji
M
i
i
j Z
P
T ∑
=
=
1
(16)
12. Only the F2 winner node has non-zero output. Any node marked as non capable by a previous
reset signal doesn't participate in the competition.









 =
=
otherwise
)
T
max(
T
)
T
(
g
0
k
j
d
j
(17)
13. Repeat the steps (6) to (10).
14. Update the bottom-up weights of the F2 layer winner node:
d
1
u
Z i
Ji
−
= (18)
International Journal of Information Sciences and Techniques (IJIST) Vol.1, No.2, September 2011
19
15. Update the top-down weights of the F2 layer winner node:
d
1
u
Z i
iJ
−
= (19)
16. Remove input vector, restore inactive F2 nodes and return to the step (1) with a new input
vector.
The initial values chosen for ART2 is as follows
a=10, b=10,d=0.9,c=0.1,e=0.0 θ=0.2 M = 5
Threshold value selection and methodology used
The use of several feature vectors require a special neural network, a supervised ART2 NN is
used. The performance of a supervised or unsupervised ART2 NN depends on the appropriate
selection of the vigilance threshold [10]. If the value of vigilance threshold is near to zero, a lot of
clusters will be generated, but if it is greater, then number clusters will be generated.
6 PERFORMANCE EVALUATION
A performance analysis was done based on two parameters. (a) Hits and (b) Accuracy. Hits
indicate the number of videos that are requested from the prefetched videos, and accuracy is the
ratio to hits to the number of videos being prefetched. The overload of network is reduced by
clustering and prefetching a community of users. It prefetches request with an accuracy as high as
97% as compared with ART1 system. In ART1 each prototype vector of a cluster represents a
possibility of community of users requesting for videos in the form of binary pattern. Even a
highest popular video will be represented by a value of 1. In ART2 the popularity value is
normalized between [0,1].Hence the values for the input vector varies along with the popularity
value.
Table 1: Result of ART 2 prefetching scheme
Number of members
each cluster
Videos prefetced Hits Accuracy %
8 38 36 95%
6 48 46 96%
4 34 32 94%
5 31 30 96%
The results obtained have considerable improvement over ART1 which takes only the binary
values as input. ART1 resulted in nearly 93 percentage accuracy prediction of prefetching .
7 SUMMARY
In recent years, there have been a number of researches in exploring novel methods and
techniques to group users based on the request access pattern. In this work we have clustered and
prefetched user request access pattern using ART2 neural network approach. The predictions
International Journal of Information Sciences and Techniques (IJIST) Vol.1, No.2, September 2011
20
were done over a time series domain. The proposed system has achieved good performance with
high satisfaction and applicability.
REFERENCES
[1] CARPENTER G, GROSSBERG, S , 1987, ART2: Self-Organization of Stable Category Recognition Codes
for Analog Input Patterns, Applied Optics, 26: p 4916:4930.
[2] COOLEY R., MOBASHER B., SRIVATSAVA J., 1997 ,Web Mining: Information and Pattern Discovery
on the World Wide Web , ICTAI’97.
[3] CHRIS TSENG H, 2007, Internet Applications with Fuzzy Logic and Neural Networks: A Survey,
Journal of engineering, computing and architecture.
[4] DINKAR SITARAM, ASIT DAN, 2000, Multimedia Servers Applications,Environment, and Design,
Morgan Kaufmann publishers, 2000
[5] HEINS, LUCIEN G., TAURITZ, AND, DANIEL R, 1995, Adaptive Resonance Theory (ART): An
Introduction. Internal Report 95-35, Department of Computer Science, Leiden University,
pages 174-185.
[6] FAUSETT, L.V. 1994, Fundamentals of Neural Networks Architectures, Algorithms, and applications.
New Jersey: Prentice Hall International Inc, New Jersey, p .246-287.
[7] ISSAM DAGHER , 2006 Art networks with geometrical distances Journal of Discrete Algorithms
archive Volume Issue 4 ISSN:1570-8667 Pages: 538-553
[8] JUNG J, LEE D, CHON K, 2000 Proactive Web caching with cumulative prefetching for large
multimedia Data Computer Networks – Elsevier
[9] KUMAR N, JOSHI R S 2007 Data Clustering Using Artificial Neural Networks Proceedings of
National Conference on Challenges & Opportunities in Information Technology (COIT-2007).
[10] NACHEV A, GANCHEV I 2003 Data Mining For Browsing Pattern Weblog Data By Art2 Neural
Networks International Journal Information Theories & Applications Vol.10.
[11] NESBIT K J, SMITH J E, 2004 Data Cache Prefetching using a global history buffer, High Performance
Computer Architecture.
[12] MASSEY L 2002 Determination of clustering tendency with ART neural networks Proceedings of
recent advances in soft-computing (RASC02) .
[13] RANGARAJAN S K , PHOHA V V , BALAGANI K, SELMIC R R 2008 Web user caching and its
application to prefetching using ART neural networks IEEE Internet Computing, Data & Knowledge
Engineering, Vol.65 No.3, p.512-543
[14] SANTOSH K, VIR V, KIRAN S, SELMIC R, IYENGAR SS, 2004 Adaptive Neural Network clustering of
Web users IEEE Computer..
[15] TAE-UK CHOI, YOUNG-JU KIM,1999 “
A prefetching scheme based on the analysis of user access
patterns in news-on-demand system“, International Multimedia Conference Proceedings of the
seventh ACM international conference on Multimedia (Part 1) Orlando, Florida, United States,
ISBN:1-58113-151-8 Pages: 145 - 148 .
[16] VENKETESH P, VENKATESAN R 2009 A Survey on Applications of NeuralNetworks and Evolutionary
Techniques Web Caching IETE Technical review.
International Journal of Information Sciences and Techniques (IJIST) Vol.1, No.2, September 2011
21
[17] YUAN J, SUN Q, RAHARDJA S, 2007 A More Aggressive Prefetching Scheme for streaming Media
Delivery over the Internet Proceedings of SPIE
[18] XIAOBO ZHOU “ A video replacement policy based on revenue to cost ratio in a multicast tv-anytime
system.
Authors
T.R. Gopalakrishnan Nair holds M.Tech. (IISc, Bangalore) and Ph.D. degree in Computer Science. He
has three decades experience in Computer Science and Engineering through research, industry and
education. He has published several papers and holds patents in multi domain. He won the PARAM Award
for technology innovation. Currently, he is the Director of Research and Industry in Dayananda Sagar
Institutions, Bangalore, India.
P Jayarekha holds M.Tech (VTU Belgaum ) in Computer Science securing second rank . She has one and
half decades experience in teaching field. She has published many papers. Currently, she is working as a
teaching faculty in the department of Information Science and Engineering at BMS College of Engineering,
Bangalore, India.

More Related Content

What's hot

An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
idescitation
 
Authentic Data Access Scheme for Variant Disruption- Tolerant Networks
Authentic Data Access Scheme for Variant Disruption- Tolerant NetworksAuthentic Data Access Scheme for Variant Disruption- Tolerant Networks
Authentic Data Access Scheme for Variant Disruption- Tolerant Networks
Editor IJCATR
 
I42024349
I42024349I42024349
I42024349
IJERA Editor
 
A Hybrid Digital Watermarking Approach Using Wavelets and LSB
A Hybrid Digital Watermarking Approach Using Wavelets and LSB A Hybrid Digital Watermarking Approach Using Wavelets and LSB
A Hybrid Digital Watermarking Approach Using Wavelets and LSB
IJECEIAES
 
Cryptographic Countermeasure Against Prevention Of Dos and Distributed DOS A...
Cryptographic Countermeasure Against  Prevention Of Dos and Distributed DOS A...Cryptographic Countermeasure Against  Prevention Of Dos and Distributed DOS A...
Cryptographic Countermeasure Against Prevention Of Dos and Distributed DOS A...
IRJET Journal
 
DS R16 - UNIT-3.pdf
DS R16 - UNIT-3.pdfDS R16 - UNIT-3.pdf
DS R16 - UNIT-3.pdf
VarshaBaini
 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control Technique
IRJET Journal
 
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET Journal
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
IJCERT JOURNAL
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET Journal
 
Disseration M.Tech
Disseration M.TechDisseration M.Tech
Disseration M.Tech
Vijayananda Mohire
 
Efficient and secure authentication on remote server using stegno video objec...
Efficient and secure authentication on remote server using stegno video objec...Efficient and secure authentication on remote server using stegno video objec...
Efficient and secure authentication on remote server using stegno video objec...
pradip patel
 
A novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verificationA novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verification
eSAT Publishing House
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
IDES Editor
 
Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...
eSAT Publishing House
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
IJTET Journal
 
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
1crore projects
 
A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...
idescitation
 
Vijayananda Mohire ORCID (0000 0002-0647-4130)
Vijayananda Mohire ORCID (0000 0002-0647-4130)Vijayananda Mohire ORCID (0000 0002-0647-4130)
Vijayananda Mohire ORCID (0000 0002-0647-4130)
Vijayananda Mohire
 
Enhanced Authentication Mechanism in WLAN via MMBSPS
Enhanced Authentication Mechanism in WLAN via MMBSPSEnhanced Authentication Mechanism in WLAN via MMBSPS
Enhanced Authentication Mechanism in WLAN via MMBSPS
RAJESH DUVVURU
 

What's hot (20)

An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
 
Authentic Data Access Scheme for Variant Disruption- Tolerant Networks
Authentic Data Access Scheme for Variant Disruption- Tolerant NetworksAuthentic Data Access Scheme for Variant Disruption- Tolerant Networks
Authentic Data Access Scheme for Variant Disruption- Tolerant Networks
 
I42024349
I42024349I42024349
I42024349
 
A Hybrid Digital Watermarking Approach Using Wavelets and LSB
A Hybrid Digital Watermarking Approach Using Wavelets and LSB A Hybrid Digital Watermarking Approach Using Wavelets and LSB
A Hybrid Digital Watermarking Approach Using Wavelets and LSB
 
Cryptographic Countermeasure Against Prevention Of Dos and Distributed DOS A...
Cryptographic Countermeasure Against  Prevention Of Dos and Distributed DOS A...Cryptographic Countermeasure Against  Prevention Of Dos and Distributed DOS A...
Cryptographic Countermeasure Against Prevention Of Dos and Distributed DOS A...
 
DS R16 - UNIT-3.pdf
DS R16 - UNIT-3.pdfDS R16 - UNIT-3.pdf
DS R16 - UNIT-3.pdf
 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control Technique
 
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
 
Disseration M.Tech
Disseration M.TechDisseration M.Tech
Disseration M.Tech
 
Efficient and secure authentication on remote server using stegno video objec...
Efficient and secure authentication on remote server using stegno video objec...Efficient and secure authentication on remote server using stegno video objec...
Efficient and secure authentication on remote server using stegno video objec...
 
A novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verificationA novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verification
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
 
A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...
 
Vijayananda Mohire ORCID (0000 0002-0647-4130)
Vijayananda Mohire ORCID (0000 0002-0647-4130)Vijayananda Mohire ORCID (0000 0002-0647-4130)
Vijayananda Mohire ORCID (0000 0002-0647-4130)
 
Enhanced Authentication Mechanism in WLAN via MMBSPS
Enhanced Authentication Mechanism in WLAN via MMBSPSEnhanced Authentication Mechanism in WLAN via MMBSPS
Enhanced Authentication Mechanism in WLAN via MMBSPS
 

Similar to Strategic Prefetching of VoD Programs Based on ART2 driven Request Clustering

Survey on caching and replication algorithm for content distribution in peer ...
Survey on caching and replication algorithm for content distribution in peer ...Survey on caching and replication algorithm for content distribution in peer ...
Survey on caching and replication algorithm for content distribution in peer ...
ijcseit
 
Dynamic Chunks Distribution Scheme for Multiservice Load Balancing Using Fibo...
Dynamic Chunks Distribution Scheme for Multiservice Load Balancing Using Fibo...Dynamic Chunks Distribution Scheme for Multiservice Load Balancing Using Fibo...
Dynamic Chunks Distribution Scheme for Multiservice Load Balancing Using Fibo...
Editor IJCATR
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
ijcseit
 
Pre-allocation Strategies of Computational Resources in Cloud Computing using...
Pre-allocation Strategies of Computational Resources in Cloud Computing using...Pre-allocation Strategies of Computational Resources in Cloud Computing using...
Pre-allocation Strategies of Computational Resources in Cloud Computing using...
ijccsa
 
Wireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyWireless Network Intrinsic Secrecy
Wireless Network Intrinsic Secrecy
IRJET Journal
 
A COMPARISON OF CACHE REPLACEMENT ALGORITHMS FOR VIDEO SERVICES
A COMPARISON OF CACHE REPLACEMENT ALGORITHMS FOR VIDEO SERVICESA COMPARISON OF CACHE REPLACEMENT ALGORITHMS FOR VIDEO SERVICES
A COMPARISON OF CACHE REPLACEMENT ALGORITHMS FOR VIDEO SERVICES
ijcsit
 
System analysis and design for multimedia retrieval systems
System analysis and design for multimedia retrieval systemsSystem analysis and design for multimedia retrieval systems
System analysis and design for multimedia retrieval systems
ijma
 
Voice Enable Blind Assistance System -Real time Object Detection
Voice Enable Blind Assistance System -Real time Object DetectionVoice Enable Blind Assistance System -Real time Object Detection
Voice Enable Blind Assistance System -Real time Object Detection
IRJET Journal
 
Visual Cryptography Industrial Training Report
Visual Cryptography Industrial Training ReportVisual Cryptography Industrial Training Report
Visual Cryptography Industrial Training Report
Mohit Kumar
 
A virtual analysis on various techniques using ann with
A virtual analysis on various techniques using ann withA virtual analysis on various techniques using ann with
A virtual analysis on various techniques using ann with
eSAT Publishing House
 
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the CloudIRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET Journal
 
A hybrid push pull overlay network for
A hybrid push pull overlay network forA hybrid push pull overlay network for
A hybrid push pull overlay network for
ijp2p
 
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGA HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
ijp2p
 
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGA HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
ijp2p
 
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
IEEEFINALSEMSTUDENTSPROJECTS
 
SCHEDULING IN GRID TO MINIMIZE THE IMPOSED OVERHEAD ON THE SYSTEM AND TO INC...
SCHEDULING IN GRID TO MINIMIZE THE IMPOSED OVERHEAD ON THE SYSTEM AND  TO INC...SCHEDULING IN GRID TO MINIMIZE THE IMPOSED OVERHEAD ON THE SYSTEM AND  TO INC...
SCHEDULING IN GRID TO MINIMIZE THE IMPOSED OVERHEAD ON THE SYSTEM AND TO INC...
ijcsa
 
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions   2014 ieee java project - query services in cost ef...Ieeepro techno solutions   2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
hemanthbbc
 
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
ASAITHAMBIRAJAA
 
IEEE 2015 Java Projects
IEEE 2015 Java ProjectsIEEE 2015 Java Projects
IEEE 2015 Java Projects
Vijay Karan
 
Live multimedia streaming and video on demand issues and challenges
Live multimedia streaming and video on demand issues and challengesLive multimedia streaming and video on demand issues and challenges
Live multimedia streaming and video on demand issues and challenges
eSAT Journals
 

Similar to Strategic Prefetching of VoD Programs Based on ART2 driven Request Clustering (20)

Survey on caching and replication algorithm for content distribution in peer ...
Survey on caching and replication algorithm for content distribution in peer ...Survey on caching and replication algorithm for content distribution in peer ...
Survey on caching and replication algorithm for content distribution in peer ...
 
Dynamic Chunks Distribution Scheme for Multiservice Load Balancing Using Fibo...
Dynamic Chunks Distribution Scheme for Multiservice Load Balancing Using Fibo...Dynamic Chunks Distribution Scheme for Multiservice Load Balancing Using Fibo...
Dynamic Chunks Distribution Scheme for Multiservice Load Balancing Using Fibo...
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
Pre-allocation Strategies of Computational Resources in Cloud Computing using...
Pre-allocation Strategies of Computational Resources in Cloud Computing using...Pre-allocation Strategies of Computational Resources in Cloud Computing using...
Pre-allocation Strategies of Computational Resources in Cloud Computing using...
 
Wireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyWireless Network Intrinsic Secrecy
Wireless Network Intrinsic Secrecy
 
A COMPARISON OF CACHE REPLACEMENT ALGORITHMS FOR VIDEO SERVICES
A COMPARISON OF CACHE REPLACEMENT ALGORITHMS FOR VIDEO SERVICESA COMPARISON OF CACHE REPLACEMENT ALGORITHMS FOR VIDEO SERVICES
A COMPARISON OF CACHE REPLACEMENT ALGORITHMS FOR VIDEO SERVICES
 
System analysis and design for multimedia retrieval systems
System analysis and design for multimedia retrieval systemsSystem analysis and design for multimedia retrieval systems
System analysis and design for multimedia retrieval systems
 
Voice Enable Blind Assistance System -Real time Object Detection
Voice Enable Blind Assistance System -Real time Object DetectionVoice Enable Blind Assistance System -Real time Object Detection
Voice Enable Blind Assistance System -Real time Object Detection
 
Visual Cryptography Industrial Training Report
Visual Cryptography Industrial Training ReportVisual Cryptography Industrial Training Report
Visual Cryptography Industrial Training Report
 
A virtual analysis on various techniques using ann with
A virtual analysis on various techniques using ann withA virtual analysis on various techniques using ann with
A virtual analysis on various techniques using ann with
 
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the CloudIRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
 
A hybrid push pull overlay network for
A hybrid push pull overlay network forA hybrid push pull overlay network for
A hybrid push pull overlay network for
 
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGA HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
 
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGA HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
 
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
 
SCHEDULING IN GRID TO MINIMIZE THE IMPOSED OVERHEAD ON THE SYSTEM AND TO INC...
SCHEDULING IN GRID TO MINIMIZE THE IMPOSED OVERHEAD ON THE SYSTEM AND  TO INC...SCHEDULING IN GRID TO MINIMIZE THE IMPOSED OVERHEAD ON THE SYSTEM AND  TO INC...
SCHEDULING IN GRID TO MINIMIZE THE IMPOSED OVERHEAD ON THE SYSTEM AND TO INC...
 
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions   2014 ieee java project - query services in cost ef...Ieeepro techno solutions   2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
 
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
 
IEEE 2015 Java Projects
IEEE 2015 Java ProjectsIEEE 2015 Java Projects
IEEE 2015 Java Projects
 
Live multimedia streaming and video on demand issues and challenges
Live multimedia streaming and video on demand issues and challengesLive multimedia streaming and video on demand issues and challenges
Live multimedia streaming and video on demand issues and challenges
 

More from ijistjournal

Call for Papers - 5th International Conference on Cloud, Big Data and IoT (CB...
Call for Papers - 5th International Conference on Cloud, Big Data and IoT (CB...Call for Papers - 5th International Conference on Cloud, Big Data and IoT (CB...
Call for Papers - 5th International Conference on Cloud, Big Data and IoT (CB...
ijistjournal
 
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
ijistjournal
 
Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...
ijistjournal
 
INFORMATION THEORY BASED ANALYSIS FOR UNDERSTANDING THE REGULATION OF HLA GEN...
INFORMATION THEORY BASED ANALYSIS FOR UNDERSTANDING THE REGULATION OF HLA GEN...INFORMATION THEORY BASED ANALYSIS FOR UNDERSTANDING THE REGULATION OF HLA GEN...
INFORMATION THEORY BASED ANALYSIS FOR UNDERSTANDING THE REGULATION OF HLA GEN...
ijistjournal
 
Call for Research Articles - 5th International Conference on Artificial Intel...
Call for Research Articles - 5th International Conference on Artificial Intel...Call for Research Articles - 5th International Conference on Artificial Intel...
Call for Research Articles - 5th International Conference on Artificial Intel...
ijistjournal
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...
ijistjournal
 
SYSTEM IDENTIFICATION AND MODELING FOR INTERACTING AND NON-INTERACTING TANK S...
SYSTEM IDENTIFICATION AND MODELING FOR INTERACTING AND NON-INTERACTING TANK S...SYSTEM IDENTIFICATION AND MODELING FOR INTERACTING AND NON-INTERACTING TANK S...
SYSTEM IDENTIFICATION AND MODELING FOR INTERACTING AND NON-INTERACTING TANK S...
ijistjournal
 
Call for Research Articles - 4th International Conference on NLP & Data Minin...
Call for Research Articles - 4th International Conference on NLP & Data Minin...Call for Research Articles - 4th International Conference on NLP & Data Minin...
Call for Research Articles - 4th International Conference on NLP & Data Minin...
ijistjournal
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...
ijistjournal
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...
ijistjournal
 
Implementation of Radon Transformation for Electrical Impedance Tomography (EIT)
Implementation of Radon Transformation for Electrical Impedance Tomography (EIT)Implementation of Radon Transformation for Electrical Impedance Tomography (EIT)
Implementation of Radon Transformation for Electrical Impedance Tomography (EIT)
ijistjournal
 
Online Paper Submission - 6th International Conference on Machine Learning & ...
Online Paper Submission - 6th International Conference on Machine Learning & ...Online Paper Submission - 6th International Conference on Machine Learning & ...
Online Paper Submission - 6th International Conference on Machine Learning & ...
ijistjournal
 
Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...
ijistjournal
 
BER Performance of MPSK and MQAM in 2x2 Almouti MIMO Systems
BER Performance of MPSK and MQAM in 2x2 Almouti MIMO SystemsBER Performance of MPSK and MQAM in 2x2 Almouti MIMO Systems
BER Performance of MPSK and MQAM in 2x2 Almouti MIMO Systems
ijistjournal
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...
ijistjournal
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...
ijistjournal
 
International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)
ijistjournal
 
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...
ijistjournal
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...
ijistjournal
 
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINA MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
ijistjournal
 

More from ijistjournal (20)

Call for Papers - 5th International Conference on Cloud, Big Data and IoT (CB...
Call for Papers - 5th International Conference on Cloud, Big Data and IoT (CB...Call for Papers - 5th International Conference on Cloud, Big Data and IoT (CB...
Call for Papers - 5th International Conference on Cloud, Big Data and IoT (CB...
 
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
 
Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...
 
INFORMATION THEORY BASED ANALYSIS FOR UNDERSTANDING THE REGULATION OF HLA GEN...
INFORMATION THEORY BASED ANALYSIS FOR UNDERSTANDING THE REGULATION OF HLA GEN...INFORMATION THEORY BASED ANALYSIS FOR UNDERSTANDING THE REGULATION OF HLA GEN...
INFORMATION THEORY BASED ANALYSIS FOR UNDERSTANDING THE REGULATION OF HLA GEN...
 
Call for Research Articles - 5th International Conference on Artificial Intel...
Call for Research Articles - 5th International Conference on Artificial Intel...Call for Research Articles - 5th International Conference on Artificial Intel...
Call for Research Articles - 5th International Conference on Artificial Intel...
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...
 
SYSTEM IDENTIFICATION AND MODELING FOR INTERACTING AND NON-INTERACTING TANK S...
SYSTEM IDENTIFICATION AND MODELING FOR INTERACTING AND NON-INTERACTING TANK S...SYSTEM IDENTIFICATION AND MODELING FOR INTERACTING AND NON-INTERACTING TANK S...
SYSTEM IDENTIFICATION AND MODELING FOR INTERACTING AND NON-INTERACTING TANK S...
 
Call for Research Articles - 4th International Conference on NLP & Data Minin...
Call for Research Articles - 4th International Conference on NLP & Data Minin...Call for Research Articles - 4th International Conference on NLP & Data Minin...
Call for Research Articles - 4th International Conference on NLP & Data Minin...
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...
 
Implementation of Radon Transformation for Electrical Impedance Tomography (EIT)
Implementation of Radon Transformation for Electrical Impedance Tomography (EIT)Implementation of Radon Transformation for Electrical Impedance Tomography (EIT)
Implementation of Radon Transformation for Electrical Impedance Tomography (EIT)
 
Online Paper Submission - 6th International Conference on Machine Learning & ...
Online Paper Submission - 6th International Conference on Machine Learning & ...Online Paper Submission - 6th International Conference on Machine Learning & ...
Online Paper Submission - 6th International Conference on Machine Learning & ...
 
Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...
 
BER Performance of MPSK and MQAM in 2x2 Almouti MIMO Systems
BER Performance of MPSK and MQAM in 2x2 Almouti MIMO SystemsBER Performance of MPSK and MQAM in 2x2 Almouti MIMO Systems
BER Performance of MPSK and MQAM in 2x2 Almouti MIMO Systems
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...
 
International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)
 
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...
 
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINA MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
 

Recently uploaded

一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
LAXMAREDDY22
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
MiscAnnoy1
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 

Recently uploaded (20)

一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 

Strategic Prefetching of VoD Programs Based on ART2 driven Request Clustering

  • 1. International Journal of Information Sciences and Techniques (IJIST) Vol.1, No.2, September 2011 DOI : 10.5121/ijist.2011.1202 13 Strategic Prefetching of VoD Programs Based on ART2 driven Request Clustering Dr. T. R. Gopalakrishnan Nair1 and P. Jayarekha2 Director, Research and Industry Incubation Centre, DSI, Bangalore trgnair@yahoo.com Research Scholar, Dr. MGR University Dept. of ISE, BMSCE, Bangalore . Member, Multimedia Research Group, Research Centre, DSI, Bangalore. Jayarekha2001@yahoo.co.in Abstract In this paper we present a novel neural architecture to classify various types of VoD request arrival pattern using an unsupervised clustering Adaptive Resonance Theory 2 (ART2). The knowledge extracted from the ART2 clusters is used to prefetch the multimedia objects into the proxy server’s cache, from the disk and prepare the system to serve the clients more efficiently before the user’s arrival of the request. This approach adapts to changes in user request patterns over a period by storing the previous information. Each cluster is represented as prototype vector by generalizing the most frequently used video blocks that are accessed by all the cluster members. The simulation results of the proposed clustering and prefetching algorithm shows a significant increase in the performance of streaming server. The proposed algorithm helps the server’s agent to learn user preferences and discover the information about the corresponding videos. These videos can be prefetched to the cache and identify those videos for the users who demand it. KEYWORDS Clustering, Predictive prefetch and neural networks. 1. INTRODUCTION In the past few years, Multimedia applications have grown rapidly and it is evident through the exponential growth of traffic on the Internet. These applications include Video-on-demand, video authoring tools, news broadcasting, videoconferencing, digital libraries and interactive video games. The new challenges which have emerged today are related to data storage, management processing, continuous arrival of multiple requests and potentially unbounded streams that are rapid and time varying. It is generally not feasible to store the request arrival pattern in a traditional database management system in order to perform delivery operation of a video stream later. Instead, the request arrival must generally be processed in an online manner from the cache which also holds the predicatively prefetched video streams and this process assures that results can be delivered with a small start up delay for the videos accessed for the first-time. The VoD proxy server is an important component as its function is to retrieve as many blocks of video streams as possible and send them to users. VoD proxy server is responsible for retrieving different blocks of different video streams and sending them to different users simultaneously.
  • 2. International Journal of Information Sciences and Techniques (IJIST) Vol.1, No.2, September 2011 14 This is not an easy task due to the real time commitment and the large volume of characteristics possessed by the video. Real time characteristic requires the video blocks to be retrieved from the server’s disk within a deadline for continuous delivery to users. Failure to meet the deadline will result in jitters on screen during viewing. The usage of proxy server cache to store the prefetched videos can reduce the user’s waiting time. In this solution the videos that are more likely to be accessed are prefetched to the browser’s cache and when a request is received for one of these videos, a cache–hit occur immediately thereby avoiding start up delays. Given the previous instance, a crucial issue is to effectively predict the following requests and subsequently model the user’s actions over time. If the next request can be determined accurately then the user’s waiting time is reduced to zero and furthermore, no chance of user request flooding. With the rapid development in VoD streaming services, the modern techniques to improve multimedia services has become an important research area. An important topic in learning user’s request pattern is the clustering of multimedia VoD users, i.e, grouping the users into clusters based on their common interest. By analyzing the characteristics of the groups, the streaming server will understand the users better and may provide more suitable, customized services to the users. In this paper, the clustering of the users request access pattern based on their browsing activities is studied. Users with similar browsing activities are clustered or grouped into classes (clusters). A clustering algorithm takes a set of input vectors and gives as output a set of clusters and a mapping of each input vector to a cluster. Input vectors which are close to each other according to a specific similarity measure should be mapped to the same cluster. Clusters are internally represented using prototype vectors which are the vectors indicating a certain similarity. VoD application services are made available over a computer network. It provides to watch any video at any time. One of the requirements for VoD system implementation is to have a VoD streaming server that acts as an engine to deliver videos from the server’s disk to users. Video blocks should be prefetched intelligently with less latency from the disk and hence enable the service of high number of streams. However, due to real time and large volume characteristics possessed by the video, the designing of video layout is a challenging task. Real time imposes constraints on the distribution of blocks on disk and hence it decreases the number of streams being delivered to users. In this paper, we consider the problem of clustering video streams. Thus, our goal is to maintain classes of video streams such that a selected class contains videos of more or less similar properties and attributes. The focus of the work is on delivery of video streams in real-time. Here popularity of each individual video is represented by an index, which is a measurement of popularity. Outline of the Paper: The paper is organized into various sections as follows: Section 2 discusses about the related work in clustering and prefetching. Section 3 presents the importance of ART2. Section 4 presents the methodology used in developing the algorithm. Section 5 discusses the architecture of ART2 algorithm. Section 6 presents performance evaluation and Section 7 gives the conclusion. 2. RELATED WORK 2.1 Related work in clustering The clustering of users based on their web access pattern is an active area of research in Web usage mining. Cooley R et al. have proposed taxonomy of Web Mining and they present various research issues. In addition, the research in web mining is centered on the extraction and applications of clustering and prefeching. Both these issues are clearly discussed by Rangarajan S K . It has been proven in this scheme a 97.78% of prediction hierarchy. Clustering of multimedia
  • 3. International Journal of Information Sciences and Techniques (IJIST) Vol.1, No.2, September 2011 15 request access pattern is defined by hierarchical clustering method to cluster the generalized session. 2.2 Related work in prefetching Prefetching means fetching the multimedia objects much prior to the user request arrival. There are some existing prefetching techniques, but they possess some deficiency. In this the client suffers from start-up delay for those objects that are accessed for the first-time since, prefetching action is only triggered when a client starts to access that object. However, an inefficient prefetching technique causes wastage of network resources by increasing the web traffic over the network. J Yuan et al., have proposed a scheme, in which proxy servers aggressively prefetch media objects without a pattern before they are requested. They make use of servers’ knowledge about access patterns to ensure the accuracy of prefetching, and have tried to minimize the prefetched data size by prefetching only the initial segments of media objects. KJ Nesbit et al., have proposed a prefetching algorithm which is based on a global history buffer that holds the most recent missing addresses in FIFO order. S K Rangarajan, et al., have proposed ART1 algorithm in which clustering and prediction has resulted in an accuracy of 97%. In this work we have proposed ART2 NN clustering algorithm for clustering user request arrival pattern. This cluster helps the server’s agent in prefetching the videos into the disk, prior the user request. 3. ART2 NEURAL NETWORK ART2 is an unsupervised neural network algorithm derived from the resonance theory. The ART networks are rather good at pattern recognizing and pattern classification. Their design allows the user to control the similarity between the patterns accepted by the same cluster]. ART2 can learn about significant new classes, yet remain stable in response to previously learned classes. Thus, it is able to meet the challenges in clustering the request arrival pattern where numerous variations are common. ART networks are configured to recognize invariant properties of a given problem domain; when presented with data pertinent to the domain, the network can categorize it on the basis of these features. This process also categorizes when distinctly different data are presented and it includes the ability to create new clusters. ART networks accommodate these requirements through interactions between different subsystems, designed to process previously encountered and unfamiliar events, respectively. We choose the ART2 neural network rather than other classifiers because capable of incrementally increasing the numbers of clusters if needed. ART2 networks were designed to process continuous input pattern data. A special characteristic of such networks is the plasticity that allows the system to learn new concepts and at the same time retain the stability that prevents destruction of previously learned information [6]. 4. METHODOLOGY 4.1 Preprocessing the web logs The, the log data of request arrivals are represented as <client_Id,date, requested_video> format. We have selected a sample format of 50 clients requesting for 200 different videos. 4.2 Getting the Popularity Value The popularity value is the most important parameter to get the effective prefetch operation. This popularity value may consider the long term measurement of request-frequency, which is neglected in the other algorithms. In this work the reference count value is used to get the popularity value. The reference count value is highly variable over short time scales, but this is much smoother over long time scales. This property makes the popularity value to deal with the long term measurement of request frequency.
  • 4. International Journal of Information Sciences and Techniques (IJIST) Vol.1, No.2, September 2011 16 Since the maximum and minimum value of request frequency is known during the submission of input to the ART2 system, the normalized value of the popularity can be obtained using the following transformation. min d max d min d d − − = δ (1) The transformed into a range between [0 ,1]. 4.3 Extraction of feature vectors For clustering, we need to extract the popularity of each video that represents the frequency of number of times the video is requested. The pattern vector maps the access frequency of each base vector element to real values. It is of the form P ={P1,P2,….Pn} where each Pi varies between 0 to 1. 0.8 0.2 0.2 0.1 0.3 0.4 0.5 0.1 0.3 Figure 1 Sample Pattern Vector Figure 2 is a sample of pattern vector generated during a session. Each pattern vector has a real value pattern of length 200.For each session we input 50 such pattern to an ART2, since we have 50 clients. 5 PROPOSED ARCHITECTURE AND ALGORITHM Architecture of ART2 is shown in Figure 2. It is designed for processing analog as well as binary input patterns. ART2 network module includes two main parts: attentional subsystem and orienting subsystem. Attentional subsystem preprocess analog input pattern, and then choose the best matching pattern under competitive selection rule from the input pattern prototypes. Orienting subsystem carry out similarity vigilance-testing of the selective pattern prototype and trigger resonance learning and adjusting weight vectors when vigilance-testing passed, otherwise get rid of the current active node and search the other new ones. If there is no pattern prototype matching the input pattern, create a new output node to represent it. Its memory capacity can increase with the increase of learning patterns. The network allows not only off-line learning but also in an on-line learning and applying way simultaneously, that is, the learning and applying states are inseparable. Figure 2 The ART2 Neural networks
  • 5. International Journal of Information Sciences and Techniques (IJIST) Vol.1, No.2, September 2011 17 The ART2 neural network algorithm used in this work is summarized below. Neural network configuration: The parameters required for ART2 formulation has been initially chosen : Noise inhibition threshold: 0 ≤ θ ≤1 (2) Surveillance Parameter: 0≤ρ≤1 (3) Error tolerance parameter ETP in the F1 layer: 0≤ETP≤1 (4) Weight initialization of the neural network: Top-down: Zji(0) = 0 (5) Bottom-up: Zij(0) ≤ (6) Operation steps: 1. Initialize the sub-layer and layer outputs with zero value and set cycle counter to one. 2. Apply an input vector I to the sub-layer W of the F1 layer. The output of this layer is: Wi =Ii + aUi (7) 3. Propagate to the X sub-layer: W e i w xi + = (8) 4. Calculate the V sub-layer output: Vi = f(xi) + bf(qi) (9) In the first cycle the second term of (9) is zero once the value of qi is zero. The function f(x) is given by:           θ ≥ θ ≤ ≤ θ + θ = x x x 0 ) x ( 2 ) x ( f 2 2 2 (10) 5. Compute the U sub-layer output: v e i v i u + = (11)
  • 6. International Journal of Information Sciences and Techniques (IJIST) Vol.1, No.2, September 2011 18 6. Propagate the previous output to the P sub-layer: iJ i i dZ u p + = (12) The J node of the F2 layer is the winner node. If F2 is inactive or if the network is in its initial configuration, i u i p = (13) 7. Calculate the Q sub-layer output: p e p q i i + = (14) 8. Repeat steps (2) to (8) until stabilizing the values in F1 layer according to Error (i) = U(i) - U*(i). If Error (i) ≤ ETP, the F1 layer is stable. 9. Calculate the R sub-layer output: cP u e cp u r i i i + + + = (15) 10. Determine if a reset condition is indicated. If ρ (e R ) then, send a reset signal to F2, mark any active F2 node as not enable for competition, reduce to zero the cycle counter and return to the step (2). If there is no reset signal and the counter is one, the cycle counter is increased and passes to step (11). If there is no reset and the cycle counter is larger than one, then control passes to step (14), once the resonance was established. 11. Calculate the F2 layer input: Ji M i i j Z P T ∑ = = 1 (16) 12. Only the F2 winner node has non-zero output. Any node marked as non capable by a previous reset signal doesn't participate in the competition.           = = otherwise ) T max( T ) T ( g 0 k j d j (17) 13. Repeat the steps (6) to (10). 14. Update the bottom-up weights of the F2 layer winner node: d 1 u Z i Ji − = (18)
  • 7. International Journal of Information Sciences and Techniques (IJIST) Vol.1, No.2, September 2011 19 15. Update the top-down weights of the F2 layer winner node: d 1 u Z i iJ − = (19) 16. Remove input vector, restore inactive F2 nodes and return to the step (1) with a new input vector. The initial values chosen for ART2 is as follows a=10, b=10,d=0.9,c=0.1,e=0.0 θ=0.2 M = 5 Threshold value selection and methodology used The use of several feature vectors require a special neural network, a supervised ART2 NN is used. The performance of a supervised or unsupervised ART2 NN depends on the appropriate selection of the vigilance threshold [10]. If the value of vigilance threshold is near to zero, a lot of clusters will be generated, but if it is greater, then number clusters will be generated. 6 PERFORMANCE EVALUATION A performance analysis was done based on two parameters. (a) Hits and (b) Accuracy. Hits indicate the number of videos that are requested from the prefetched videos, and accuracy is the ratio to hits to the number of videos being prefetched. The overload of network is reduced by clustering and prefetching a community of users. It prefetches request with an accuracy as high as 97% as compared with ART1 system. In ART1 each prototype vector of a cluster represents a possibility of community of users requesting for videos in the form of binary pattern. Even a highest popular video will be represented by a value of 1. In ART2 the popularity value is normalized between [0,1].Hence the values for the input vector varies along with the popularity value. Table 1: Result of ART 2 prefetching scheme Number of members each cluster Videos prefetced Hits Accuracy % 8 38 36 95% 6 48 46 96% 4 34 32 94% 5 31 30 96% The results obtained have considerable improvement over ART1 which takes only the binary values as input. ART1 resulted in nearly 93 percentage accuracy prediction of prefetching . 7 SUMMARY In recent years, there have been a number of researches in exploring novel methods and techniques to group users based on the request access pattern. In this work we have clustered and prefetched user request access pattern using ART2 neural network approach. The predictions
  • 8. International Journal of Information Sciences and Techniques (IJIST) Vol.1, No.2, September 2011 20 were done over a time series domain. The proposed system has achieved good performance with high satisfaction and applicability. REFERENCES [1] CARPENTER G, GROSSBERG, S , 1987, ART2: Self-Organization of Stable Category Recognition Codes for Analog Input Patterns, Applied Optics, 26: p 4916:4930. [2] COOLEY R., MOBASHER B., SRIVATSAVA J., 1997 ,Web Mining: Information and Pattern Discovery on the World Wide Web , ICTAI’97. [3] CHRIS TSENG H, 2007, Internet Applications with Fuzzy Logic and Neural Networks: A Survey, Journal of engineering, computing and architecture. [4] DINKAR SITARAM, ASIT DAN, 2000, Multimedia Servers Applications,Environment, and Design, Morgan Kaufmann publishers, 2000 [5] HEINS, LUCIEN G., TAURITZ, AND, DANIEL R, 1995, Adaptive Resonance Theory (ART): An Introduction. Internal Report 95-35, Department of Computer Science, Leiden University, pages 174-185. [6] FAUSETT, L.V. 1994, Fundamentals of Neural Networks Architectures, Algorithms, and applications. New Jersey: Prentice Hall International Inc, New Jersey, p .246-287. [7] ISSAM DAGHER , 2006 Art networks with geometrical distances Journal of Discrete Algorithms archive Volume Issue 4 ISSN:1570-8667 Pages: 538-553 [8] JUNG J, LEE D, CHON K, 2000 Proactive Web caching with cumulative prefetching for large multimedia Data Computer Networks – Elsevier [9] KUMAR N, JOSHI R S 2007 Data Clustering Using Artificial Neural Networks Proceedings of National Conference on Challenges & Opportunities in Information Technology (COIT-2007). [10] NACHEV A, GANCHEV I 2003 Data Mining For Browsing Pattern Weblog Data By Art2 Neural Networks International Journal Information Theories & Applications Vol.10. [11] NESBIT K J, SMITH J E, 2004 Data Cache Prefetching using a global history buffer, High Performance Computer Architecture. [12] MASSEY L 2002 Determination of clustering tendency with ART neural networks Proceedings of recent advances in soft-computing (RASC02) . [13] RANGARAJAN S K , PHOHA V V , BALAGANI K, SELMIC R R 2008 Web user caching and its application to prefetching using ART neural networks IEEE Internet Computing, Data & Knowledge Engineering, Vol.65 No.3, p.512-543 [14] SANTOSH K, VIR V, KIRAN S, SELMIC R, IYENGAR SS, 2004 Adaptive Neural Network clustering of Web users IEEE Computer.. [15] TAE-UK CHOI, YOUNG-JU KIM,1999 “ A prefetching scheme based on the analysis of user access patterns in news-on-demand system“, International Multimedia Conference Proceedings of the seventh ACM international conference on Multimedia (Part 1) Orlando, Florida, United States, ISBN:1-58113-151-8 Pages: 145 - 148 . [16] VENKETESH P, VENKATESAN R 2009 A Survey on Applications of NeuralNetworks and Evolutionary Techniques Web Caching IETE Technical review.
  • 9. International Journal of Information Sciences and Techniques (IJIST) Vol.1, No.2, September 2011 21 [17] YUAN J, SUN Q, RAHARDJA S, 2007 A More Aggressive Prefetching Scheme for streaming Media Delivery over the Internet Proceedings of SPIE [18] XIAOBO ZHOU “ A video replacement policy based on revenue to cost ratio in a multicast tv-anytime system. Authors T.R. Gopalakrishnan Nair holds M.Tech. (IISc, Bangalore) and Ph.D. degree in Computer Science. He has three decades experience in Computer Science and Engineering through research, industry and education. He has published several papers and holds patents in multi domain. He won the PARAM Award for technology innovation. Currently, he is the Director of Research and Industry in Dayananda Sagar Institutions, Bangalore, India. P Jayarekha holds M.Tech (VTU Belgaum ) in Computer Science securing second rank . She has one and half decades experience in teaching field. She has published many papers. Currently, she is working as a teaching faculty in the department of Information Science and Engineering at BMS College of Engineering, Bangalore, India.