A Random Walker Cloning Method Based Searching in Peer to Peer (P2p) Network
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 11
Abstract
A network has been developed over a time for resource sharing called peer-to-peer network. Major task of this is to find out the objective data or files. A better scheme with good reciprocity for searching is difficult to find because its recognition is too wavering. Several methods have been found to overcome the problem and most of them were only useful to search popular objects so in our paper we proposed a Cloning Random Walker assisted by Dominating Set (Clone RW+DS) method to identify the correct data or file. In our paper theoretical analysis shows that the system requires little amount of query messages and simulation results depicts that our system can perform a better reciprocity.
Authors and Affiliations
Vimal S, Dr. S. K. Srivatsa, Vijayalakshmi V
Experimental Study of Self Compaction Concrete by Using Flyash and GGBS
Self compacting concrete (SSC) is a following concrete mixture that is able to consolidate under its own weight. The highly fluid nature of SSC makes its suitable for placing in difficult conditions and in section with...
Singular-Value-Decomposition Based Generalized Inverse Aided Method PAPR-Aware Linear Precoder Designing for MIMO Based OFDM System
Here we propose a linear precoding scheme for a single user multiple-input–multiple-output orthogonal frequency division multiplexing (OFDM) system to minimize PAPR (peak to average power ratio) by using some redundant...
Face Recognition with SIFT Algorithm for Attendance Monitoring
The Face Recognition is an integral part of biometrics. In biometrics, basic traits of human are used to extract information and use that information and data for other application. The SIFT [1] algorithm takes a croppe...
Consistency Preservation in Data Cloud By Adopting Efficient Third Party Audit Election for Cloud Storage
Cloud Server consists of many shared resources like platform, software, and infrastructure. In cloud consistency influences the availability and performance of the system. To check the consistency, auditing is done wher...
A Survey on DNA Based Cryptography
DNA cryptography is a new era of enhanced security for the data transfer using the internet. DNA cryptography enhanced the cryptography in terms of time complexity as well as capacity. It uses the DNA strands to hide th...