An Efficient Content Sharing Scheme For Delay-Tolerant Smart Phone Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
Some smart phones in the network store content that they are ready to share with others. All Smartphone users are eager to assist and provide a limited amount of their resources such as bandwidth, storage and processing power to aid others. The objective is to permit users to issue queries for content stored on other smart phones wherever in the network and to measure the chances of obtaining the information needed. We take for granted that smart phones can carry out searches on their local storage and we find the applicable results for a given query to make easy searching. Theoretically the content sharing process is considered into two phases the content discovery phase and the content delivery phase. In the content discovery phase a user inputs requirements for content in a content sharing application. In our work we scrutinize a network of smart phones with the deliberation that Smartphone carriers expend most of their time indoors where GPS cannot be accessed. Previous research shows that GPS signal is available for 4.5 percent only of a typical user’s day. Consequently we require to design a system to support location-based services in indoor environments.
Authors and Affiliations
P. Manasa, U. Vinod Kumar
PERFECTIONS AND PSYCHIATRING USER PROFILE IN WEB SITES USING WEB USAGE MINING & CLUSTERING SESSIONS
The web site under study is part of a nonprofit organization that does not "sell" any products, it was crucial to understand "who" the users Ire, "what" they looked at, and "how their interests changed with time," al...
INFORMATION RETRIEVAL IN INDIAN LANGUAGES: A CASE STUDY ON CROSS-LINGUAL AND MULTI-LINGUAL
In today’s world of globalization, local languages storage and retrieval is essential for the developing nations like India. As our country is diversified by languages and only 10% of population is aware of English l...
Proficient Algorithms for Mining Elevated Service Item Sets Commencing Transactional Databases
Association rule mining is used to stumble on the patronize item sets in substantial database. In the data mining field, utility mining materialize as an essential topic that to excavation the high value item sets fr...
Three-Party Authenticated Quantum Key Distribution Protocols based Security in WLANs
This work presents quantum key distribution protocols (QKDPs) to safeguard security in large networks, ushering in new directions in classical cryptography and quantum cryptography. Two three-party QKDPs, one with i...
A Survey Of Intrusion Detection Mechanisms In Multitier Web Applications
Today the usage of computer for web applications is increasing day by day. Most of the transactions such as banking, travel etc are done through web. So the targets of attacks towards web applications are also increa...