A Search Algorithm Based on K-Weighted Search Tree
Journal Title: EAI Endorsed Transactions on Internet of Things - Year 2017, Vol 3, Issue 10
Abstract
Aiming at the issue of low efficiency in Peer-to-Peer (P2P) network system, a search algorithm based on K-weighted search tree is proposed. The k-weighted search tree serving the search is constructed. The nodes are ranked from top to bottom in the tree according to the query hit rate, and the nodes with large hit rate and stable are on the tree layer, the search can thus determine the direction of the message diffusion. By caching the upper node, establishment of search results, using node index, overheated resource replication and add remote neighbours for leaf node, and other methods to improve search efficiency and balance load. The analysis and simulation results show that the proposed algorithm can greatly reduce the invalid message with higher search efficiency, and maintenance of the search tree is less expensive.
Authors and Affiliations
Lianhai Yuan, Xiangwen Li, Lin Zhou
Algorithm and Formal Model of Recovering Network Connectivity in Battlefield Surveillance
Battlefield surveillance requires mission-critical operations and tasks which can effectively be performed using Wireless Sensor and Actor Networks (WSANs). We have used clustering approach for deployment of WSAN to mini...
Semantic Interoperable Traffic Management Framework for IoT Smart City Applications
Real-time traffic monitoring and controlling are one of the biggest problems in this present living world. So many researchers have dealt with and put their effort into this problem, as a result, several types of approac...
Wearable device for swim assessment: a new ecologic approach for communication and analysis
This paper describes a wearable system for the assessment of swim performance focusing on the description of the system and especially on the novel method for data transmission in water, and the algorithm used for extrac...
Offshore Outsourcing Risk Management for Pakistan
Software offshore outsourcing is strong pillar of software development. Software offshore outsourcing involves many risks, due to internal or external factors, that must be recognized and managed. Each organization that...
A Tracing Toolset for Embedded Linux Flash File Systems
NAND flash memory integration in the traditional I/O software stack of Unix-like operating systems (OS) was achieved without modifying most of the OS layers. In fact, one can dissociate two categories of flash memory dev...