Browsing Information Overloading Unstructured Multimedia Social Network Contents on Mobile Devices

2016 ◽  
Vol 2016 (11) ◽  
pp. 1-12
Author(s):  
Chang Wen Chen
2013 ◽  
Vol 9 (4) ◽  
pp. 331-345
Author(s):  
Jianwei Niu ◽  
Mingzhu Liu ◽  
Han-Chieh Chao

With the proliferation of high-end mobile devices that feature wireless interfaces, many promising applications are enabled in opportunistic networks. In contrary to traditional networks, opportunistic networks utilize the mobility of nodes to relay messages in a store-carry-forward paradigm. Thus, the relay process in opportunistic networks faces several practical challenges in terms of delay and delivery rate. In this paper, we propose a novel P2P Query algorithm, namely Betweenness Centrality Forwarding (PQBCF), for opportunistic networking. PQBCF adopts a forwarding metric called Betweenness Centrality (BC), which is borrowed from social network, to quantify the active degree of nodes in the networks. In PQBCF, nodes with a higher BC are preferable to serve as relays, leading to higher query success rate and lower query delay. A comparison with the state-of-the-art algorithms reveals that PQBCF can provide better performance on both the query success Ratio and query delay, and approaches the performance of Epidemic Routing (ER) with much less resource consumption.


2017 ◽  
Vol 7 (3) ◽  
pp. 149-156
Author(s):  
Mucahit Baydar ◽  
Songul Albayrak

AbstractDevelopments in mobile devices and wireless networks have led to the increasing popularity of location-based social networks. These networks allow users to explore new places, share their location, videos and photos and make friends. They give information about the mobility of users, which can be used to improve the networks. This paper studies the problem of predicting the next check-in of users of location-based social networks. For an accurate prediction, we first analyse the datasets that are obtained from the social networks, Foursquare and Gowalla. Then we obtain some features like place popularity, place popular time range, place distance to user’s home, user’s past visits, category preferences and friendships ,which are used for prediction and deeper understanding of the user behaviours. We use each feature individually, and then in combination, using the new method. Finally, we compare the acquired results and observe the improvement with the new method.Keywords: Location prediction, location-based social network, check-in data.


2016 ◽  
Vol 76 (3) ◽  
pp. 3235-3253 ◽  
Author(s):  
Fei Peng ◽  
Xiao-qing Gong ◽  
Min Long ◽  
Xing-ming Sun

2018 ◽  
Vol 10 (2) ◽  
pp. 23-39
Author(s):  
Min Long ◽  
Fei Peng ◽  
Xiaoqing Gong

Aiming at secure video sharing in multimedia social network, a format-compliant encryption scheme for high efficiency video coding (HEVC) based on sigh data hiding (SDH) is proposed. The encryption is tightly integrated with the encoding/decoding processes. For each coding unit (CU), the sign of the nonzero coefficient and the first hiding nonzero coefficient are both encrypted with key stream. Meanwhile, one of merging index, motion vector prediction index, sign of motion vector difference and reference frame index is chosen for encryption according to a control factor. As it is explored in this article, experimental results and analysis indicate that it can effectively resist brute-force attack, difference attack and replacement attack. Also, it can keep a good balance in encryption space, computation complexity and security. Based on the encryption scheme, a framework of its implementation in multimedia social network is presented. It has great potential to be implemented for secure video sharing in multimedia social network.


Sign in / Sign up

Export Citation Format

Share Document