Haitam A. Jamil, Bushra M. Ali, Ahmed E. Osman, Hind G. Abdelrahim
{"title":"Coarse-Grained Classification Of P2p Network Traffic Using Filter/Wrapper Features Selection","authors":"Haitam A. Jamil, Bushra M. Ali, Ahmed E. Osman, Hind G. Abdelrahim","doi":"10.14445/22492615/ijptt-v9i5p402","DOIUrl":"https://doi.org/10.14445/22492615/ijptt-v9i5p402","url":null,"abstract":"","PeriodicalId":231377,"journal":{"name":"International Journal of P2P Network Trends and Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133425909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy Efficient Routing Protocol using LPA-star algorithm with Dynamic Threshold","authors":"Ahmed A. Alkadhmawee, M. A. Altaha","doi":"10.14445/22492615/ijptt-v9i4p403","DOIUrl":"https://doi.org/10.14445/22492615/ijptt-v9i4p403","url":null,"abstract":"","PeriodicalId":231377,"journal":{"name":"International Journal of P2P Network Trends and Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131566562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Search Engine Optimization Techniques","authors":"R.Anil Kumar, Zaiduddin Shaik, M. Furqan","doi":"10.14445/22492615/IJPTT-V9I1P402","DOIUrl":"https://doi.org/10.14445/22492615/IJPTT-V9I1P402","url":null,"abstract":"This paper is a finished study of various tools and strategies utilized for SEO. Search Engines which are utilized to discover any data crosswise over web. The primary goal of any site is to list at the top of all the links. Search Engine Optimization is the specialty of enhancing a site's perceivability in the fundamental assemblage of search engine results. This craft of enhancing a sites perceivability in the assemblage of search engines result is conceivable utilizing the methods and apparatuses accessible in the market.","PeriodicalId":231377,"journal":{"name":"International Journal of P2P Network Trends and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129250719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Region-Driven Analysis of Processor Power Consumption for Various HPC Workloads","authors":"Sharda Dixit, Amarjeet Sharma, A. Gupta","doi":"10.14445/22492615/IJPTT-V9I1P404","DOIUrl":"https://doi.org/10.14445/22492615/IJPTT-V9I1P404","url":null,"abstract":"","PeriodicalId":231377,"journal":{"name":"International Journal of P2P Network Trends and Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125484790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Machine Learning","authors":"R.Anil Kumar, S. Ahamed, S. Basha","doi":"10.14445/22492615/ijptt-v9i1p403","DOIUrl":"https://doi.org/10.14445/22492615/ijptt-v9i1p403","url":null,"abstract":"Abstract: AI (ML) has advanced from the chance of PCs figuring out how to mess around and part of Mathematics (Statistics) that only occasionally viewed as computational methodologies, to a free examination discipline. Yet in addition has created different calculations that are consistently utilized for text understanding, design acknowledgment, and a numerous other business purposes. This paper centers around clarifying the idea and advancement of Machine Learning, a portion of the well-known Machine Learning calculations.","PeriodicalId":231377,"journal":{"name":"International Journal of P2P Network Trends and Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123346156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Queuing Network using Job Scheduling using Transposition Cipher","authors":"Vera B. Anand, Christ, R.Siva kumar","doi":"10.14445/22492615/IJPTT-V8I4P402","DOIUrl":"https://doi.org/10.14445/22492615/IJPTT-V8I4P402","url":null,"abstract":"Today, network carries huge volume of data across various applications and devices. Each application depends on some service which is served from a desired server. The client’s request increase in number day to day and the demands of the user are high. Computer network is broadly classified into two categories as wired and wireless with the usage of various interface devices.The technical mechanism in each of such devices varies based on the users need. The performance of each device can be analyzed and can make use of it with more efficiency. The efficiency of the network can still be improved by managing the requests in a standard framework using queuing theory and Transposition Cipher method were used for protected data transmission.","PeriodicalId":231377,"journal":{"name":"International Journal of P2P Network Trends and Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132349178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. T. Qureshi, Amir Mushtaq, Danyal Ahmed, A. Saleem
{"title":"Blogging – Future Media and Internet Activism","authors":"M. T. Qureshi, Amir Mushtaq, Danyal Ahmed, A. Saleem","doi":"10.14445/22492615/ijptt-v8i4p403","DOIUrl":"https://doi.org/10.14445/22492615/ijptt-v8i4p403","url":null,"abstract":"","PeriodicalId":231377,"journal":{"name":"International Journal of P2P Network Trends and Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116758485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hybrid Approach for SVD and Neural Networks Based Robust Image Watermarking","authors":"Mokhtar Hussein, B.Man jula","doi":"10.14445/22492615/ijptt-v8i4p401","DOIUrl":"https://doi.org/10.14445/22492615/ijptt-v8i4p401","url":null,"abstract":"In the digital world, a lot of digital watermarking techniques for copyright protection of multimedia data have been proposed to avoid their misuse. Implementation of these watermarking schemes requires main focus on robustness, trustworthiness and imperceptibility. In this paper, a new SVD and Neural Network based robust image watermarking method is proposed. The proposed method is supposed to offer better quality and robustness for the image under different types of attacks and under copy move forgery attacks.","PeriodicalId":231377,"journal":{"name":"International Journal of P2P Network Trends and Technology","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122953744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}