Loading

Automated Music Video Generation Using Web Image Resource

Automated Music Video Generation Using Web Image Resource
In this paper, we proposed a novel prototype of automated music video generation using web image resource. In this prototype, the salient words/phrases of a song's lyrics are first automatically extracted and then used as queries to retrieve related high-quality images from web search engines.To guarantee the coherence among the chosen images' visual representation and the music song, the returned images are further re-ranked and filtered based on their content characteristics such as color, face, landscape, as well as the song's mood type. Finally, those selected images are concatenated to generate a music video using the Photo2Video technique, based on the rhythm information of the music. Preliminary evaluations of the proposed prototype have shown promising results.

Index Terms - music video, image search, music analysis

Download Full PAper Click Here
Read Full Paper....

Satellite Encryption full paper download

Abstract: The main aim of this paper is to create awareness towards satellite encryption. In an age of explosive worldwide growth of electronic data storage and satellite communications, many vital national interests required the effective protection of information. Especially when used in coordination with other tools for information security, encryption in all of its applications, including data confidentiality, data integrity, and user authentication, is a most powerful tool for protecting information. Encryption is a powerful tool that can be used to protect information stored and communicated in digital form via satellite. Encryption can help to assure confidentiality of data; to detect unauthorized alterations in data and thereby help to maintain its integrity; and, to authenticate the asserted identity of an individual or a computer system. Encryption can be used in a number of applications to secure voice, data communications and stored information.

Read Full Paper....

A Service-Centric Multicast Architecture and Routing Protocol paper and ppt

A Service-Centric Multicast Architecture and Routing Protocol

Abstract—In this paper, we present a new multicast architecture and the associated multicast routing protocol for providing efficient and flexible multicast services over the Internet. Traditional multicast architectures construct and update the multicast tree in a distributed manner, which causes two problems: first, since each node has only local or partial information on the network topology and group membership, it is difficult to build an efficient multicast tree; second, due to lack of the complete information, broadcast is often used when transmitting control packets or data packets, which consumes a great deal of network bandwidth. In the newly proposed multicast architecture, a few powerful routers, called m-routers, collect multicast-related information and process multicast requests based on the information collected. m-routers handle most of multicast related tasks, while other routers only need to perform minimum functions for routing. m-routers are designed to be able to handle simultaneous many-to-many communications efficiently.

Download Full Paper Click Here
Read Full Paper....

Artificial Passenger Full Paper

Abstract: To overcome the problems due to accidents like crashes, deaths and injuries IBM introduces a new sleep prevention technology device called as ‘ARTIFICIAL PASSENGER’ which was developed by Dimitry Kanevsky and Wlodek Zadrozny.
        This research suggests that we can make predictions about various aspects of driver performance based on what we gleam from the movements of a driver’s eye and that a system can eventually be developed to capture this data and used to allow people when they are driving as become significantly impaired by fatigue. In this paper we are going to discuss about introduction, background of invention, why such systems used, advantages, devices used, architecture, applications, future enhancement and conclusion.   

Read Full Paper....

Design and Visulization of Space Colony Full Paper

Abstract: Lewis One is a qualitative space biosphere design. It is intended to house 10,000 residents in a cylinder large enough for a 1g rotating habitat module and construction facilities to reproduce the module. The shielding, exterior, and construction bays are non-rotating. Lewis One is compared to the Bernal Sphere space colony designed in the 1970’s. Lewis One is visualized using state of the art computer graphics hardware and software to produce a three dimensional, animated, lighted, shaded, texture mapped surface model. One may interactively ‘fly’ outside and inside the structure to examine features of interest. Interactively controlled planar cutaways at any location and/or orientation are available. Visualization provides insight into, and feedback on, the design to drive improvements and communicate design concepts.

Read Full Paper....

Ethical Hacking Paper Full

Abstract: The explosive growth of the Internet has brought many good things: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution, to name a few. As with most technological advances, there is also a dark side: criminal hackers. Governments, companies, and private citizens around the world are anxious to be a part of this revolution, but they are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization's secrets to the open Internet. With these concerns and others, the ethical hacker can help. This paper describes ethical hackers: their skills, their attitudes, and how they go about helping their customers find and plug up security holes. The ethical hacking process is explained, along with many of the problems that the Global Security Analysis Lab has seen during its early years of ethical hacking for IBM clients.

Read Full Paper....

Cross-Layer Optimized MAC to Support Multihop QoS Routing for Wireless Sensor Networks

Cross-Layer Optimized MAC to Support Multihop QoS Routing for Wireless Sensor Networks
Abstract—This paper presents an efficient hybrid mediumaccess control (HMAC) protocol with an embedded cross-layer optimization solution to provide routing-layer coarse-grained end to-end quality-of-service (QoS) support for latency-sensitive traffic flows. A novel channel-reservation technique is proposed to significantly reduce the end-to-end delay for delay-sensitive traffic flows by allowing packets to go through multiple hops within a single medium-access control (MAC) frame and by also giving them higher priority channel access to reduce possible queuing delay. Our proposed protocol (HMAC) combines energy-efficient features of the existing contention-based and time-division multipleaccess (TDMA)-based MAC protocols and adopts a short frame structure to expedite packet delivery. Simulation results in ns-2 show that HMAC achieves significant performance improvements in energy consumption, latency, and throughput over existing MAC protocols.

Index Terms—End-to-end latency, energy efficiency, hybrid medium-access control (HMAC), latency-sensitive traffic, quality of service (QoS).

Read Full Paper....

Security in Wireless Sensor Networks using Frequency Hopping paper full

Security in Wireless Sensor Networks using Frequency Hopping
Abstract: A Wireless Sensor Network (WSN) is a collection of thousands of tiny sensor nodes having the capability of wireless communication, limited computation and sensing. These networks are vulnerable to internal and external attacks due to the lack of tamper-resistant packaging and the insecure nature of  wireless communication channels. Since most of the existing routing protocols are application specific and hence do not satisfy the security constraints of wireless sensor networks. Whenever any device comes within the frequency range can get the access to the transmitting data and may affect the transmission. In this paper, we simulated the concept of frequency hopping and proved it a better approach to provide security in WSN.

General Terms: Wireless Sensor Networks, Security, Frequency Hopping.

Read Full Paper....

A Perceptually Tuned Watermarking Scheme for Color Images ppt

A Perceptually Tuned Watermarking Scheme for Color Images
Abstract—Transparency and robustness are two conflicting requirements demanded by digital image watermarking for copyright protection and many other purposes. A feasible way to simultaneously satisfy the two conflicting requirements is to embed high-strength watermark signals in the host signals that can accommodate the distortion due to watermark insertion as part of perceptual redundancy. The search of distortion-tolerable host signals for watermark insertion and the determination of watermark strength are, hence, crucial to the realization of a transparent yet robust watermark. This paper presents a color image watermarking scheme that hides watermark signals in most distortion-tolerable signals within three color channels of the host image without resulting in perceivable distortion. The distortion-tolerable host signals or the signals that possess high perceptual redundancy are sought in the wavelet domain for watermark insertion. A visual model based upon the CIEDE2000 color difference equation is used to measure the perceptual redundancy inherent in each wavelet coefficient of the host image. By means of quantization index modulation, binary watermark signals are embedded in qualified wavelet coefficients.

Index Terms—CIEDE2000, color image watermarking, color visual model, just noticeable color difference (JNCD), just noticeable difference (JND), perceptual redundancy.

Download Full Paper PPT Click Here
Read Full Paper....

A Vehicle-to-Vehicle Communication Protocol for Cooperative Collision Warning

A Vehicle-to-Vehicle Communication Protocol for Cooperative Collision Warning
Abstract; This paper proposes a vehicle-to-vehicle communication protocol for cooperative collision warning. Emerging wireless technologies for vehicle-to-vehicle (V2V) and vehicle to-roadside (V2R) communications such as DSRC are promising to dramatically reduce the number of fatal roadway
accidents by providing early warnings. One major technical challenge addressed in this paper is to achieve low-latency in delivering emergency warnings in various road situations. Based on a careful analysis of application requirements, we design an effective protocol, comprising congestion control policies, service differentiation mechanisms and methods for emergency warning dissemination. Simulation results demonstrate that the proposed protocol achieves low latency in delivering emergency warnings and efficient bandwidth usage in stressful road scenarios.

Full Paper Presentation Click Here
Read Full Paper....

Back to TOP