Survey on Crowd-Source Video Sharing Systems
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 1
Abstract
Abstract: Nowadays video capturing from mobile and sharing it is common. Consider it be any event, function, performance by an artist, any surprising event. For example, if any famous speaker addressing huge number ofpeople, then this event there may be many people who capture the event in their mobile phones and uploaded it on the video sharing applications (VSA) such as YouTube, Twitter, Facebook. Same event is captured by thehundreds of the devices and uploaded on VSA. This leads to some issues like, huge amount of the bandwidth and battery is use by this activity of uploading videos of the same event and it might also cause the problem while retrieving that video. Numbers of approaches are proposed in the literature to address such problems such as on-demand approach in which first user query is matched to the metadata stored at the server and then data is fetched from user who uploaded the video.We described number of techniques available which gives solution for video sharing and retrieval problems.
Authors and Affiliations
A. S. Kadam , R. V. Dagade
Techniques for Cache Improvement
Personal data caches have been rendered ineffective in the process of reducing the median memory lag in multiprocessors, as is the case in single-processors, due to the distribution of data amongst processors, and furthe...
Low selectivity problem using the concept of sampling
available information on social peers for improving the information needs of a user or node, this is because of the birth of online social networks. In this paper, the focus is on improvement of the performance of...
Electricity, Computers, Innovation, Environment and Capacity Building: A Statistical Review
Abstract : The objective was to examine the frameworks needed to foster innovations and to mobilize innovation towards co - creating computers in the context of developing countries’ challenge of unreliable energ...
Pseudonym Based Security Architecture for Wireless Mesh Network
Abstract : Wireless Mesh Network (WMN) is a wireless network with mesh topology and is expected to be widespread due to the advantages such as low deployment cost, easy maintenance, robustness, scalability, reliable serv...
Two Phase Multi Party Secured Multiplication (2PMSM) In Vertically Distributed Databases
Abstract : Secured multi party computation which is also known as secured computation or multi party computation (SMC) plays a vital role in achieving secured computation in Privacy preserving data mining. Various SMC al...