A Unifying Model and Analysis of P2P VoD Replication and Scheduling Abstract?A Unifying Model and Analysis of P2P VoD Replication and Scheduling. We consider a peer-to-peer (P2P)-assisted video-on-demand (VoD) system where each peer can store a relatively small number of movies to offload the server when these movies are requested. User requests are stochastic based…
A Unifying Model and Analysis of P2P VoD Replication and Scheduling Abstract?We consider a peer-to-peer (P2P)-assisted video-on-demand (VoD) system where each peer can store a relatively small number of movies to offload the server when these movies are requested. User requests are stochastic based on some movie popularity distribution. The problem is how to replicate…
A Universal Fairness Evaluation Framework for Resource Allocation in Cloud Computing Abstract? In cloud computing, fairness is one of the most significant indicators to evaluate resource allocation algorithms, which reveals whether each user is allocated as much as that of all other users having the same bottleneck. However, how fair an allocation algorithm is remains…
A Utility Maximization Framework for Fair and Efficient Multicasting in Multicarrier Wireless Cellular Networks Abstract?Multicast/broadcast is regarded as an efficient technique for wireless cellular networks to transmit a large volume of common data to multiple mobile users simultaneously. To guarantee the quality of service for each mobile user in such single-hop multicasting, the base-station transmitter…
A Virtual Coordinate-Based Bypassing Void Routing for Wireless Sensor Networks Abstract? To solve the routing void problem in geographic routing, high control overhead and transmission delay are usually taken in wireless sensor networks. Inspired by the structure composed of edge nodes around which there is no routing void, an ef?cient bypassing void routing protocol based…
A Visual Model-Based Perceptual Image Hash for Content Authentication Abstract?Perceptual image hash has been widely investigated in an attempt to solve the problems of image content authentication and content-based image retrieval. In this paper, we combine statistical analysis methods and visual perception theory to develop a real perceptual image hash method for content authentication. To…
A Web Search Engine-Based Approach to Measure Semantic Similarity between Words Abstract? A Web Search Engine-Based Approach to Measure Semantic Similarity between Words. Measuring the semantic similarity between words is an important component in various tasks on the web such as relation extraction, community mining, < Final Year Projects > document clustering, and automatic metadata…
AASR: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments Abstract? Anonymous communications are important for many of the applications of mobile ad hoc networks (MANETs) deployed in adversary environments. A major requirement on the network is the ability to provide unidenti?ability and unlinkability for mobile nodes and their traf?c. Although a number of anonymous…
Abandoned Object Detection via Temporal Consistency Modeling and Back-Tracing Verification for Visual Surveillance Abstract? An effective approach for detecting < Final Year Projects 2016 > abandoned luggage in surveillance videos. We combine short- and long-term background models to extract foreground objects, where each pixel in an input image is classi?ed as a 2-bit code. Subsequently,…
Abnormal crowd behaviour detection by using partical entorpy Abstract? Abnormal crowd behaviour detection by using partical entorpy. We propose a fully unsupervised method for abnormal activity detection in crowded scenes. Neither normal nor abnormal training examples are needed before detection. By observing that in crowded scenes, normal activities are the behaviors performed by the majority…
AC-Plus Scan Methodology for Small Delay Testing and Characterization Abstract? AC-Plus Scan Methodology for Small Delay Testing and Characterization. Small delay defects escaping traditional delay testing could cause a device to malfunction in the field and thus detecting these defects is often necessary. To address this issue, we propose three test modes in a new…