Contribution of Information Sharing In Wireless Sensor Network With Prune Delay
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 9
Abstract
The increase in the number of smart phone users has lead to the increase in the peer-to-peer adhoc content sharing. Traditional data delivery schemes are not suitable for such networks due to intermittent connectivity between smart phones. Thus new content sharing mechanisms should be proposed. To share the contents in such a scenario, researchers have proposed store-carry-forward as an efficient content sharing scheme where a node stores a message and carries it for certain duration until a communication opportunity arises and then delivers it to the destination. Previous works in this field focused on whether two nodes would encounter each other and the place and time of encounter and did not consider the activities of malicious peers. This paper proposes discoverpredict-deliver as efficient content sharing scheme that enable peers to share contents and also presents distributed algorithms that enable a peer to reason about trustworthiness of other peers based on past interactions and recommendations. Interactions and recommendations among peers are evaluated based on importance, recentness and peer satisfaction parameters.
Authors and Affiliations
Jacob Sastry N| Student of M.Tech (CSE) and Department of Computer Since Engineering, Anantha Rao . G| Department of Computer ScienceDr.Samuel George Institute of Engineering & Technology, Markapur
We propose a framework, in particular, Path Planning by Caching (PPC), to answer another way arranging inquiry continuously by effectively reserving and reusing authentic questioned ways. Not at all like the regular...
Modeling And Simulation of An Advanced Step Up Converter For Low Voltage Energy Harvesting By Using Fuzzy Logic Controller
This paper presents a direct AC-DC power electronic converter topology and it is proposed for efficient and maximum energy harvesting from low voltage inertial micro generators. To process the positive and negative h...
We show another fine-grained two-factor Authentication (2FA) get the opportunity to control system for electronic conveyed processing organizations. Specifically, in our proposed 2FA access control structure, a quali...
A review of Data Mining Techniques Using in Big Data
The term Big Data comprises largevolume, complex, growing data sets with multiple, autonomous sources. With the fast development of networking, data storage, and the data collection capacity, Big Data are now rapidly...
This paper Proposed another present control topology for network associated based circulated age (DG), which encourages the DG to trade a sinusoidal current into the utility matrix in spite of the mutilated lattice vo...