State-of-Art Techniques for Object Caching over the Internet

Author(s):  
Keqiu Li ◽  
Takashi Nanya ◽  
Bo Jiang ◽  
Wenyu Qu

Author(s):  
K. Anuradha ◽  
N.R. Raajan

<p>Video processing has gained a lot of significance because of its applications in various areas of research. This includes monitoring movements in public places for surveillance. Video sequences from various standard datasets such as I2R, CAVIAR and UCSD are often referred for video processing applications and research. Identification of actors as well as the movements in video sequences should be accomplished with the static and dynamic background. The significance of research in video processing lies in identifying the foreground movement of actors and objects in video sequences. Foreground identification can be done with a static or dynamic background. This type of identification becomes complex while detecting the movements in video sequences with a dynamic background. For identification of foreground movement in video sequences with dynamic background, two algorithms are proposed in this article. The algorithms are termed as Frame Difference between Neighboring Frames using Hue, Saturation and Value (FDNF-HSV) and Frame Difference between Neighboring Frames using Greyscale (FDNF-G). With regard to F-measure, recall and precision, the proposed algorithms are evaluated with state-of-art techniques. Results of evaluation show that, the proposed algorithms have shown enhanced performance.</p>



Author(s):  
Daniela Andreini

Technology, and most of all Internet, is considered the most important tool for the ongoing economic globalization process, allowing the commercialization of standardized products on a large international scale (Levitt, 1983). Internet is also the real opportunity for micro companies to reach foreign markets at affordable costs (Hoffman and Novak, 1996).This paper focuses on the case of sales of gastronomic typical products on the Internet, probably one of the best e-commerce applications. In fact, no any other old goods can suit so naturally to the virtual market as typical products do. Two are the fundamental characteristics of typical, made in products: first of all, they have to be specialty goods, differentiated from their competitors; then they have to be regional goods, that means having deep roots in their original territory. In the second part of the paper it will be interpreted how typical products find in Internet the way to valorize their local and regional diversities on international markets: this way Internet has reversed the famous international management postulate think global, act local into a new one: think local, act global. Moreover, a partial empirical research about Italian companies selling gastronomic products on the Internet will be illustrated in order to verify quantitatively and qualitatively the state of art of this virtual business.





Author(s):  
James Hardy ◽  
Lu Liu ◽  
Cui Lei ◽  
Jianxin Li

Virtualisation is massively important in computing and continues to develop. This chapter discusses and evaluates the virtualisation technologies and in particular, a state-of-art system called iVIC (the Internet-based Virtual Computing) developed by Beihang University, China as it provides an all-in-one example of many of the major headline Cloud Computing titles of SaaS, IaaS, and HaaS. The chapter considers several virtualization packages which are either commercial, community, or experimental, before focusing on iVIC, a virtual machine cloning system that may be beneficial in a learning or office environment. The chapter introduces a test environment which is used to assess the performance of the iVIC process and the virtual machines created. Power requirements of virtual, as opposed to physical machines, are compared and evaluated. The chapter closes with conclusions regarding virtualisation and iVIC.



Author(s):  
Balkar Singh ◽  
◽  
M. K. Sharma ◽  

In this paper, a novel watermarking technique for the tamper detection of text images is pro- posed. Entropy of every sentence is computed and Markov matrix using the occurrences of the characters is used to generate a character pattern. Entropy and character patterns are converted to Unicode Zero Width Characters (ZWCs) by using a lookup table. The ZWCs of entropy of each sentence is embedded at the end of every sentence after terminator. ZWCs of the character patterns are embedded in the end of the text of the image. On receiver side, ZWCs are extracted and converted to numerical form using the same lookup table. Entropy of every sentence and character patterns are recalculated and compared with extracted values for tamper detection. Comparison of technique with existing state-of-art techniques shows the effectiveness of the proposed technique.



Author(s):  
H. El Fadili ◽  
T. Mazri

Abstract. The Internet of Things (IoT) has frequently been used by people as a way to facilitate their connection to all types of devices. Thanks to this technology, healthcare field can also benefit from a perfect interaction taking advantage of a better diagnostic and treatment that facilitate life for both patients and doctors. Unfortunately, and similarly to other domains based on technology, the smart healthcare does also use IT programs and wireless network to exchange and analyse data the fact that makes it highly exposed to malicious actions. Moreover, if a good security level is not provided in order to save patients information once hackers get access to the mentioned data, patients might be affected or even lose their lives. This paper presents an overview of the security issues in smart healthcare fields and gives a state of art of some well-known network attacks in the field of smart healthcare. We also propose an impact evaluation of those attacks by adopting four scales of evaluation ‘Minor’, ‘Significant’, ‘Serious’ and ‘Critical’ proposed by EBIOS Gravity assessment. The proposed evaluation is classified based on three criteria: sensor’s nature, application field and intervention time.



Author(s):  
Rondik J. Hassan ◽  
Subhi R. M. Zeebaree ◽  
Siddeeq Y. Ameen ◽  
Shakir Fattah Kak ◽  
Mohammed A. M. Sadeeq ◽  
...  

Automation frees workers from excessive human involvement to promote ease of use while still reducing their input of labor. There are about 2 billion people on Earth who live in cities, which means about half of the human population lives in an urban environment. This number is rising which places great problems for a greater number of people, increased traffic, increased noise, increased energy consumption, increased water use, and land pollution, and waste. Thus, the issue of security, coupled with sustainability, is expected to be addressed in cities that use their brain. One of the most often used methodologies for creating a smart city is the Internet of Things (IoT). IoT connectivity is understood to be the very heart of the city of what makes a smart city. such as sensor networks, wearables, mobile apps, and smart grids that have been developed to harness the city's most innovative connectivity technology to provide services and better control its citizens The focus of this research is to clarify and showcase ways in which IoT technology can be used in infrastructure projects for enhancing both productivity and responsiveness.



Author(s):  
Mohammed A. Salem ◽  
Sherine M. Abd El-Kader ◽  
Mohamed I. Youssef ◽  
Ibrahim F. Tarrad

Machine type communication (MTC), additionally called machine-to-machine (M2M) communications, broadly is referring to a number of cooperating machines exchange sensed data or information and make decisions with slight or zero human intervention. M2M technology will let a massive number of devices to be interconnected over the internet leading to a rapid development in recent time, which can be a promising enabling key for many areas, particularly for the internet of things (IoT) and 5th generation (5G) networks. This chapter presents a summary and state of art of M2M communications characteristics, taxonomy, applications, different technologies for deploying of M2M communications, and future challenges.



Sign in / Sign up

Export Citation Format

Share Document