Data Passing with High Security through Non Infected Nodes in Networks

Abstract

Path based network diffusion kernel is its tenability, that it can consider different number of shortest paths in kernel computation. This resembles, vaguely, a Taylor expansion of network topology to form a diffusion kernel with different orders of expansion. One can extend this key idea to design other network diffusion kernels to approximate other general diffusion models such as SIR the challenge of determining sources is compounded as the true propagation dynamics are typically unknown, and when they have been directly measured, they rarely conform to the assumptions of any of the well studied models. In this paper introduce a method called Network Infusion NI that has been designed to circumvent these issues, making source inference practical for large, complex real world networks. A stateless receiver based multicast RBMulticast protocol that simply uses a list of the multicast members' e.g., sinks' addresses, embedded in packet headers, to enable receivers to decide the best way to forward the multicast traffic. This protocol, called Receiver Based Multicast, exploits the knowledge of the geographic locations of the nodes to remove the need for costly state maintenance. The key idea is that to infer the source node in the network, full characterization of diffusion dynamics, in many cases, may not be necessary. This objective is achieved by creating a diffusion kernel that well approximates standard diffusion models such as the susceptible infected diffusion model, but lends itself to inversion, by design, via likelihood maximization or error minimization. We apply NI for both single source and multi source diffusion, for both single snapshot and multi snapshot observations, and for both homogeneous and heterogeneous diffusion setups. We prove the mean field optimality of NI for different scenarios, and demonstrate its effectiveness over several synthetic networks. Moreover, we apply NI to a real data application, identifying news sources in the Digg social network, and demonstrate the effectiveness of NI compared to existing methods. K. Malarvizhi | Prof. P. Parthasarathy | Dr. S. Shankar "Data Passing with High Security through Non Infected Nodes in Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29387.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/29387/data-passing-with-high-security-through-non-infected-nodes-in-networks/k-malarvizhi

Authors and Affiliations

Keywords

Related Articles

TIDDY An Artificial Intelligence Based Floor Cleaning Robot

“Maid in India” is more important than “Made in India” in modern society. Nonetheless, in the hustle and bustle of the present world, cleanliness has been ignored. To make life of humankind easier, with assistance of mac...

Effect of Nano Silica on the Compressive Strength of Concrete

Concrete is one of the most important materials in the construction world. In the present scenario, due to the various industrialization, especially in the urban areas, the demand of construction work increases progressi...

Inventory Management System using Struts Framework Architecture

Every rg niz ti n needs invent ry f r sm th running f its tivities. It serves s link between r du ti n nd distribution r esses. The System maintains m uterized inf rm ti n rel ted t the rg niz ti n. Whi h m int ins nd s...

Impact of Foreign Direct Investments on Domestic Investments in Nigeria

This study examines the impact of foreign direct investments on domestic investments in Nigeria. Specifically, the study seeks to ascertain the effect of foreign direct investment, per capita income, consumption expendit...

A Systematic Literature Review of Frequent Pattern Mining Techniques

Mining of frequent items from a voluminous storage of data is the most favorite topic over the years. Frequent pattern mining has a wide range of real world applications; market basket analysis is one of them. In this pa...

Download PDF file
  • EP ID EP675432
  • DOI -
  • Views 163
  • Downloads 0

How To Cite

(2019). Data Passing with High Security through Non Infected Nodes in Networks. International Journal of Trend in Scientific Research and Development, 3(6), 1274-1278. https://europub.co.uk/articles/-A-675432