A new lossless method of image compression and decompression using huffman coding techniques

Technology Used: JAVA The need for an efficient technique for compression of Images ever increasing because the raw images need large amounts of disk space seems to be a big disadvantage during transmission & storage. Even though there are so many compression technique already present a better technique which is faster, memory efficient and simple surely suits the requirements of the user. In this paper we proposed the Lossless method of image compression and decompression using a simple coding technique called Huffman coding. This technique is simple in implementation and…

Read More

Data Mining with Big Data

Data Mining with Big Data KNOWLEDGE AND DATA ENGINEERING, VOL. 26, NO. 1, JANUARY 2014 Big Data concern large-volume, complex, growing data sets with multiple, autonomous sources. With the fast development of networking, data storage, and the data collection capacity, Big Data are now rapidly expanding in all science and engineering domains, including physical, biological and biomedical sciences. This paper presents a HACE theorem that characterizes the features of the Big Data revolution, and proposes a Big Data processing model, from the data mining perspective. This data-driven model involves demand-driven…

Read More

Scalable Keyword Search on Large RDF Data

Scalable Keyword Search on Large RDF Data Keyword search is a useful tool for exploring large RDF datasets. Existing techniques either rely on constructing a distance matrix for pruning the search space or building summaries from the RDF graphs for query processing. Existing techniques have serious limitations in dealing with realistic, large RDF data with tens of millions of triples. Furthermore, the existing summarization techniques may lead to incorrect/incomplete results. To address these issues, an effective summarization algorithm is proposed to summarize the RDF data. Given a keyword query, the…

Read More

Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks

Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks Mobile Computing Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless ad hoc network. In this paper, while observing a sequence of packet losses in the network, we are interested in determining whether the losses are caused by link errors only, or by the combined effect of link errors and malicious drop. We are especially interested in the insider-attack case, whereby malicious nodes that are part of the route exploit their…

Read More

Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks

Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks Disruption tolerant networks (DTNs) are characterized by low node density, unpredictable node mobility, and lack of global network information. Most of current research efforts in DTNs focus on data forwarding, but only limited work has been done on providing efficient data access to mobile users. A novel approach is proposed to support cooperative caching in DTNs, which enables the sharing and coordination of cached data among multiple nodes and reduces data access delay. The basic idea is to intentionally cache…

Read More

Traffic pattern-based content leakage detection for trusted content delivery networks

Traffic pattern-based content leakage detection for trusted content delivery networks Due to the increasing popularity of multimedia streaming applications and services in recent years, the issue of trusted video delivery to prevent undesirable content-leakage has, indeed, become critical. While preserving user privacy, conventional systems have addressed this issue by proposing methods based on the observation of streamed traffic throughout the network. These conventional systems maintain a high detection accuracy while coping with some of the traffic variation in the network (e.g., network delay and packet loss), however, their detection performance…

Read More

Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption

Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption The provisioning of basic security mechanisms such as authentication and confidentiality is highly challenging in a content based publish/subscribe system. Authentication of publishers and subscribers is difficult to achieve due to the loose coupling of publishers and subscribers. Likewise, confidentiality of events and subscriptions conflicts with content-based routing. This paper presents a novel approach to provide confidentiality and authentication in a broker-less content-based publish/subscribe system. The authentication of publishers and subscribers as well as confidentiality of events is ensured, by adapting the pairing-based…

Read More

Energy-optimum Throughput and Carrier Sensing Rate in CSMA-based Wireless Networks

Energy-optimum Throughput and Carrier Sensing Rate in CSMA-based Wireless Networks A model for the energy consumption of a node as a function of its throughput in a wireless CSMA network is proposed. A single-hop network is modeled, and then a multi-hop network. The operating the CSMA network at a high throughput is energy inefficient since unsuccessful carrier sensing attempts increase the energy consumption per transmitted bit. Operating the network at a low throughput also causes energy inefficiency because of increased sleeping duration. Achieving a balance between these two opposite operating…

Read More

Video Dissemination over Hybrid Cellular and Ad Hoc Networks

Video Dissemination over Hybrid Cellular and Ad Hoc Networks We study the problem of disseminating videos to mobile users by using a hybrid cellular and ad hoc network. In particular, we formulate the problem of optimally choosing the mobile devices that will serve as gateways from the cellular to the ad hoc network, the ad hoc routes from the gateways to individual devices, and the layers to deliver on these ad hoc routes. We develop a Mixed Integer Linear Program (MILP)-based algorithm, called POPT, to solve this optimization problem. We…

Read More

Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment

Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment Technology Used: Java Cloud computing allows business customers to scale up and down their resource usage based on needs. Many of the touted gains in the cloud model come from resource multiplexing through virtualization technology. In this paper, we present a system that uses virtualization technology to allocate data center resources dynamically based on application demands and support green computing by optimizing the number of servers in use. We introduce the concept of “skewness to measure the unevenness in the…

Read More