A Unifying Model and Analysis of P2P VoD Replication and Scheduling Abstract?We consider a peer-to-peer (P2P)-assisted video-on-demand (VoD) system where each peer can store a relatively small number of movies to offload the server when these movies are requested. User requests are stochastic based on some movie popularity distribution. The problem is how to replicate…
A Unifying Model and Analysis of P2P VoD Replication and Scheduling Abstract?A Unifying Model and Analysis of P2P VoD Replication and Scheduling. We consider a peer-to-peer (P2P)-assisted video-on-demand (VoD) system where each peer can store a relatively small number of movies to offload the server when these movies are requested. User requests are stochastic…
A Universal Fairness Evaluation Framework for Resource Allocation in Cloud Computing Abstract? In cloud computing, fairness is one of the most significant indicators to evaluate resource allocation algorithms, which reveals whether each user is allocated as much as that of all other users having the same bottleneck. However, how fair an allocation algorithm is remains…
A User Authentication Scheme of IoT Devices using Blockchain-enabled Fog Nodes Abstract-These days, IoT devices are deployed at a massive scale, with Cisco predicting 20 billion devices by the year 2020. As opposed to endpoint devices, IoT devices are resource-constrained devices, incapable of securing and defending themselves, and can be easily hacked and compromised. Fog…
A Utility Maximization Framework for Fair and Efficient Multicasting in Multicarrier Wireless Cellular Networks Abstract?Multicast/broadcast is regarded as an efficient technique for wireless cellular networks to transmit a large volume of common data to multiple mobile users simultaneously. To guarantee the quality of service for each mobile user in such single-hop multicasting, the base-station transmitter…
A Virtual Coordinate-Based Bypassing Void Routing for Wireless Sensor Networks Abstract? To solve the routing void problem in geographic routing, high control overhead and transmission delay are usually taken in wireless sensor networks. Inspired by the structure composed of edge nodes around which there is no routing void, an ef?cient bypassing void routing protocol based…
A Visual Model-Based Perceptual Image Hash for Content Authentication Abstract?Perceptual image hash has been widely investigated in an attempt to solve the problems of image content authentication and content-based image retrieval. In this paper, we combine statistical analysis methods and visual perception theory to develop a real perceptual image hash method for content authentication. To…
A Web Search Engine-Based Approach to Measure Semantic Similarity between Words Abstract? A Web Search Engine-Based Approach to Measure Semantic Similarity between Words. Measuring the semantic similarity between words is an important component in various tasks on the web such as relation extraction, community mining, < Final Year Projects > document clustering, and automatic metadata…
A Workflow Management System for Scalable Data Mining on Clouds Abstract-The extraction of useful information from data is often a complex process that can be conveniently modeled as a data analysis workflow. When very large data sets must be analyzed and/or complex data mining algorithms must be executed, data analysis workflows may take very long…
AASR: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments Abstract? Anonymous communications are important for many of the applications of mobile ad hoc networks (MANETs) deployed in adversary environments. A major requirement on the network is the ability to provide unidenti?ability and unlinkability for mobile nodes and their traf?c. Although a number of anonymous…
Abandoned Object Detection via Temporal Consistency Modeling and Back-Tracing Verification for Visual Surveillance Abstract? An effective approach for detecting < Final Year Projects 2016 > abandoned luggage in surveillance videos. We combine short- and long-term background models to extract foreground objects, where each pixel in an input image is classi?ed as a 2-bit code. Subsequently,…