Pub Date : 2019-09-25DOI: 10.14445/22492615/ijptt-v9i5p402
Haitam A. Jamil, Bushra M. Ali, Ahmed E. Osman, Hind G. Abdelrahim
{"title":"Coarse-Grained Classification Of P2p Network Traffic Using Filter/Wrapper Features Selection","authors":"Haitam A. Jamil, Bushra M. Ali, Ahmed E. Osman, Hind G. Abdelrahim","doi":"10.14445/22492615/ijptt-v9i5p402","DOIUrl":"https://doi.org/10.14445/22492615/ijptt-v9i5p402","url":null,"abstract":"","PeriodicalId":231377,"journal":{"name":"International Journal of P2P Network Trends and Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133425909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-25DOI: 10.14445/22492615/ijptt-v9i4p403
Ahmed A. Alkadhmawee, M. A. Altaha
{"title":"Energy Efficient Routing Protocol using LPA-star algorithm with Dynamic Threshold","authors":"Ahmed A. Alkadhmawee, M. A. Altaha","doi":"10.14445/22492615/ijptt-v9i4p403","DOIUrl":"https://doi.org/10.14445/22492615/ijptt-v9i4p403","url":null,"abstract":"","PeriodicalId":231377,"journal":{"name":"International Journal of P2P Network Trends and Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131566562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-25DOI: 10.14445/22492615/IJPTT-V9I1P402
R.Anil Kumar, Zaiduddin Shaik, M. Furqan
This paper is a finished study of various tools and strategies utilized for SEO. Search Engines which are utilized to discover any data crosswise over web. The primary goal of any site is to list at the top of all the links. Search Engine Optimization is the specialty of enhancing a site's perceivability in the fundamental assemblage of search engine results. This craft of enhancing a sites perceivability in the assemblage of search engines result is conceivable utilizing the methods and apparatuses accessible in the market.
{"title":"A Survey on Search Engine Optimization Techniques","authors":"R.Anil Kumar, Zaiduddin Shaik, M. Furqan","doi":"10.14445/22492615/IJPTT-V9I1P402","DOIUrl":"https://doi.org/10.14445/22492615/IJPTT-V9I1P402","url":null,"abstract":"This paper is a finished study of various tools and strategies utilized for SEO. Search Engines which are utilized to discover any data crosswise over web. The primary goal of any site is to list at the top of all the links. Search Engine Optimization is the specialty of enhancing a site's perceivability in the fundamental assemblage of search engine results. This craft of enhancing a sites perceivability in the assemblage of search engines result is conceivable utilizing the methods and apparatuses accessible in the market.","PeriodicalId":231377,"journal":{"name":"International Journal of P2P Network Trends and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129250719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-25DOI: 10.14445/22492615/IJPTT-V9I1P404
Sharda Dixit, Amarjeet Sharma, A. Gupta
{"title":"A Region-Driven Analysis of Processor Power Consumption for Various HPC Workloads","authors":"Sharda Dixit, Amarjeet Sharma, A. Gupta","doi":"10.14445/22492615/IJPTT-V9I1P404","DOIUrl":"https://doi.org/10.14445/22492615/IJPTT-V9I1P404","url":null,"abstract":"","PeriodicalId":231377,"journal":{"name":"International Journal of P2P Network Trends and Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125484790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-25DOI: 10.14445/22492615/ijptt-v9i1p403
R.Anil Kumar, S. Ahamed, S. Basha
Abstract: AI (ML) has advanced from the chance of PCs figuring out how to mess around and part of Mathematics (Statistics) that only occasionally viewed as computational methodologies, to a free examination discipline. Yet in addition has created different calculations that are consistently utilized for text understanding, design acknowledgment, and a numerous other business purposes. This paper centers around clarifying the idea and advancement of Machine Learning, a portion of the well-known Machine Learning calculations.
{"title":"A Survey on Machine Learning","authors":"R.Anil Kumar, S. Ahamed, S. Basha","doi":"10.14445/22492615/ijptt-v9i1p403","DOIUrl":"https://doi.org/10.14445/22492615/ijptt-v9i1p403","url":null,"abstract":"Abstract: AI (ML) has advanced from the chance of PCs figuring out how to mess around and part of Mathematics (Statistics) that only occasionally viewed as computational methodologies, to a free examination discipline. Yet in addition has created different calculations that are consistently utilized for text understanding, design acknowledgment, and a numerous other business purposes. This paper centers around clarifying the idea and advancement of Machine Learning, a portion of the well-known Machine Learning calculations.","PeriodicalId":231377,"journal":{"name":"International Journal of P2P Network Trends and Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123346156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-25DOI: 10.14445/22492615/IJPTT-V8I4P402
Vera B. Anand, Christ, R.Siva kumar
Today, network carries huge volume of data across various applications and devices. Each application depends on some service which is served from a desired server. The client’s request increase in number day to day and the demands of the user are high. Computer network is broadly classified into two categories as wired and wireless with the usage of various interface devices.The technical mechanism in each of such devices varies based on the users need. The performance of each device can be analyzed and can make use of it with more efficiency. The efficiency of the network can still be improved by managing the requests in a standard framework using queuing theory and Transposition Cipher method were used for protected data transmission.
{"title":"Queuing Network using Job Scheduling using Transposition Cipher","authors":"Vera B. Anand, Christ, R.Siva kumar","doi":"10.14445/22492615/IJPTT-V8I4P402","DOIUrl":"https://doi.org/10.14445/22492615/IJPTT-V8I4P402","url":null,"abstract":"Today, network carries huge volume of data across various applications and devices. Each application depends on some service which is served from a desired server. The client’s request increase in number day to day and the demands of the user are high. Computer network is broadly classified into two categories as wired and wireless with the usage of various interface devices.The technical mechanism in each of such devices varies based on the users need. The performance of each device can be analyzed and can make use of it with more efficiency. The efficiency of the network can still be improved by managing the requests in a standard framework using queuing theory and Transposition Cipher method were used for protected data transmission.","PeriodicalId":231377,"journal":{"name":"International Journal of P2P Network Trends and Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132349178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-25DOI: 10.14445/22492615/ijptt-v8i4p403
M. T. Qureshi, Amir Mushtaq, Danyal Ahmed, A. Saleem
{"title":"Blogging – Future Media and Internet Activism","authors":"M. T. Qureshi, Amir Mushtaq, Danyal Ahmed, A. Saleem","doi":"10.14445/22492615/ijptt-v8i4p403","DOIUrl":"https://doi.org/10.14445/22492615/ijptt-v8i4p403","url":null,"abstract":"","PeriodicalId":231377,"journal":{"name":"International Journal of P2P Network Trends and Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116758485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-25DOI: 10.14445/22492615/ijptt-v8i4p401
Mokhtar Hussein, B.Man jula
In the digital world, a lot of digital watermarking techniques for copyright protection of multimedia data have been proposed to avoid their misuse. Implementation of these watermarking schemes requires main focus on robustness, trustworthiness and imperceptibility. In this paper, a new SVD and Neural Network based robust image watermarking method is proposed. The proposed method is supposed to offer better quality and robustness for the image under different types of attacks and under copy move forgery attacks.
{"title":"A Hybrid Approach for SVD and Neural Networks Based Robust Image Watermarking","authors":"Mokhtar Hussein, B.Man jula","doi":"10.14445/22492615/ijptt-v8i4p401","DOIUrl":"https://doi.org/10.14445/22492615/ijptt-v8i4p401","url":null,"abstract":"In the digital world, a lot of digital watermarking techniques for copyright protection of multimedia data have been proposed to avoid their misuse. Implementation of these watermarking schemes requires main focus on robustness, trustworthiness and imperceptibility. In this paper, a new SVD and Neural Network based robust image watermarking method is proposed. The proposed method is supposed to offer better quality and robustness for the image under different types of attacks and under copy move forgery attacks.","PeriodicalId":231377,"journal":{"name":"International Journal of P2P Network Trends and Technology","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122953744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}