Open Access
Subscription Access
An Analysis of Processing Multimedia Data in Mobile Ad Hoc Networks
Technological growth in the digital communication era made a huge impact on life style of human beings. Now a day the growth of social networking sites gained much popularity around the world. Social networks provide a means for users to interact or communicate over the internet. Some of the trending social media include Facebook, twitter, WhatsApp, LinkedIn, Instagram, Google+ and so on. The multimedia data is the basic building blocks for all the types of communications. Social networks also help to share multimedia data like audios, videos, stories and animations. Users can access these social media services via web-based tools through laptops, smart phones and tablets. Social networks are extremely communicating stages through which persons, groups and governments can share, co-create, discuss and modify the data through internet. In this paper the different video processing models in MANETs such as Prediction Model, Network Friendly Model, Congestion Control Model and Bandwidth Estimation Model are critically analyzed. By varying the impairments these models are compared using a network simulator.
Keywords
Multimedia, Social Network, TCP, MANET.
User
Font Size
Information
- Anees Ul Hassan, Jamil Hussain, Musarrat Hussain, Muhammad Sadiq, Sungyoung Lee, (2017) “Sentiment Analysis of Social Networking Sites (SNS) Data using Machine Learning Approach for the Measurement of Depression”, IEEE xplore, Pages 138 - 140.
- Alireza Farasat, Geoffrey Gross, Rakesh Nagi, and Alexander G. Nikolaev (2016), “Social Network Analysis With Data Fusion”, IEEE, Volume: 3 , Issue: 2, Page s: 88 – 99
- Stefan Stieglitza, Milad Mirbabaiea, Björn Rossa, Christoph Neubergerb, “Social media analytics – Challenges in topic discovery, data collection, and data preparation”, Elsevier, 2017.
- Anton Ivaschenko, Anastasiya Khorina, Vladislav Isayko, Daniil Krupin, Viktor Bolotsky, and Pavel Sitnikov (2018), “Modeling of User Behavior for Social Media Analysis”, IEEE, Pages: 1 - 4.
- Ravi vatrapu1, Raghava Rao Mukkamala, Abid Hussain, Benjamin Flesch, (2016) “Social Set Analysis: A Set Theoretical Approach to Big Data Analytics”, IEEE, Vol. 4, Pages: 2542 – 2571
- Flora Amato, Vincenzo Moscato, Antonio Picariello and Giancarlo Sperl, (2016) “Multimedia Social Network modeling: a proposal”, IEEE, 448 – 453
- Sun Danpeng ; Jiang Rui, “Research on Congestion Control of Multimedia Data Stream in Network Transmission”, 2015 Seventh International Conference on Measuring Technology and Mechatronics Automation, Year: 2015, Page s: 856 – 859
- K M Archana Patel ; Richa Martoli (2016), “Congestion control techniques in networking” International Conference on Communication and Signal Processing (ICCSP), Year: 2016, Page s: 1831 – 1835
- Yuan Xinlei ; Li Shuping, (2015) “Multimedia Data Flow Transmission Technology Research in the Network”, 8th International Conference on Intelligent Computation Technology and Automation (ICICTA), IEEE, Page s: 560 – 563
- Danyang Zhu ; Changqiao Xu ; Jiuren Qin ; Zan Zhou ; Jianfeng Guan (2017), “Mobility-aware multimedia data transfer using Multipath TCP in Vehicular Network”, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), Pages: 1041 – 1046
- Yuanlong Cao ; Changqiao Xu ; Jianfeng Guan ; Hongke Zhang (2014), “TCP-friendly CMT-based multimedia distribution over multi-homed wireless networks”, 2014 IEEE Wireless Communications and Networking Conference (WCNC), Page s: 3028 – 3033
- Joe, M. M., & Ramakrishnan, B. (2017). Novel authentication procedures for preventing unauthorized access in social networks. Peer-to-Peer Networking and Applications, 10(4), 833-843.
- Altunbey, F., & Alatas, B. (2015). Overlapping community detection in social networks using parliamentary optimization algorithm. International Journal of Computer Networks and Applications, 2(1), 12-19.
- Joe, M. M., & Ramakrishnan, D. B. (2014). A survey of various security issues in online social networks. International Journal of Computer Networks and Applications, 1(1), 11-14.
- Ozbay, Feyza Altunbey, and Bilal Alatas. "Discovery of Multi-Objective Overlapping Communities within Social Networks using a Socially Inspired Metaheuristic Algorithm." International Journal of Computer Networks and Applications, 4(6), 148 - 158.
- Joe, M. M., Ramakrishnan, B., & Shaji, R. S. (2013). Prevention of losing user account by enhancing security module: A facebook case. Journal of emerging technologies in web intelligence, 5(3), 247-256.
- Joe, M. M., & Ramakrishan, B. (2014). Enhancing security module to prevent data hacking in online social networks. Journal of Emerging Technologies in Web Intelligence, 6(2), 184-192.
- Joe, M. M., Shaji, R. S., & Dhanaseelan, F. R. (2012). Detection of M-worm to provide secure computing in social networks. Elixir International Journal–September-50, 10363-10365.
- Joe, M. M., Ramakrishnan, B., & Das, R. (2016). Designing a Novel Two-Tier Authentication Algorithm for Web Service Architecture. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 8(9), 67-75.
- Joe, M. M., Ramakrishnan, B., & Shaji, R. S. (2013). Modeling future generation e-mail communication model for improving quality of service. Journal of emerging technologies in web intelligence, 5(4), 385-394
Abstract Views: 341
PDF Views: 0