Data Passing with High Security through Non Infected Nodes in Networks
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2019, Vol 3, Issue 6
Abstract
Path based network diffusion kernel is its tenability, that it can consider different number of shortest paths in kernel computation. This resembles, vaguely, a Taylor expansion of network topology to form a diffusion kernel with different orders of expansion. One can extend this key idea to design other network diffusion kernels to approximate other general diffusion models such as SIR the challenge of determining sources is compounded as the true propagation dynamics are typically unknown, and when they have been directly measured, they rarely conform to the assumptions of any of the well studied models. In this paper introduce a method called Network Infusion NI that has been designed to circumvent these issues, making source inference practical for large, complex real world networks. A stateless receiver based multicast RBMulticast protocol that simply uses a list of the multicast members' e.g., sinks' addresses, embedded in packet headers, to enable receivers to decide the best way to forward the multicast traffic. This protocol, called Receiver Based Multicast, exploits the knowledge of the geographic locations of the nodes to remove the need for costly state maintenance. The key idea is that to infer the source node in the network, full characterization of diffusion dynamics, in many cases, may not be necessary. This objective is achieved by creating a diffusion kernel that well approximates standard diffusion models such as the susceptible infected diffusion model, but lends itself to inversion, by design, via likelihood maximization or error minimization. We apply NI for both single source and multi source diffusion, for both single snapshot and multi snapshot observations, and for both homogeneous and heterogeneous diffusion setups. We prove the mean field optimality of NI for different scenarios, and demonstrate its effectiveness over several synthetic networks. Moreover, we apply NI to a real data application, identifying news sources in the Digg social network, and demonstrate the effectiveness of NI compared to existing methods. K. Malarvizhi | Prof. P. Parthasarathy | Dr. S. Shankar "Data Passing with High Security through Non Infected Nodes in Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29387.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/29387/data-passing-with-high-security-through-non-infected-nodes-in-networks/k-malarvizhi
Study on Real-time Operating System and its Scheduling Procedures
This paper describes current research in real time operating system and its scheduling procedures. The scheduling procedure is the backbone of any operating systems. In this paper we analyses the application of schedulin...
Synthesis and Characterisation of CDSE Nanoparticles by Chemical Precipitation Method
CdSe nanoparticles were synthesized using a simple chemical precipitation method at room temperature in different Cd:Se ratios. The nanoparticles were characterized using x-ray diffraction(XRD),high resolution scanning e...
Seismic Analysis of G 10 Storey Building with Various Locations of Shear Walls using Etabs
Shear walls are specially designed structural members provided in the multi storey buildings to resist lateral forces. These walls have very high in plane strength and stiffness, which can resist large horizontal forces...
Performance Analysis of PV Modules A Review
Composite materials especially the polymer matrix materials are well acknowledged for their applications in aerospace, automotive and structural applications. They are considerably light weight and offers high strength w...
Review:Wavelet transform based electroencephalogram methods
In this paper, EEG signals are the signatures of neural activities. There have been many algorithms developed so far for processing EEG signals. The analysis of brain waves plays an important role in diagnosis of differe...