Efficient Data Caching Based On Fuzzy Decision Routing InVehicle Disruption Tolerant Networks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6
Abstract
Abstract: Disruption tolerant networks (DTNs) are characterized by low node density, unpredictable nodemobility, and lack of global network information. Most of current research efforts in DTNs focus on dataforwarding, but only limited work have been done on providing efficient data access to vehicle users. Theproposed Fuzzy Probabilistic Routing Protocol using History of Encounters and Transitivity (FPRoPHET)protocol uses an algorithm that attempts to exploit the non-randomness of real-world encounters by maintaininga set of probabilities for successful delivery to known destinations in the VDTN (delivery predictabilities) andreplicating messages during opportunistic encounters only if the Mule that does not have the message appearsto have a better chance of delivering it. Propose a novel approach to support fairness aware cooperativecaching scheme in VSNs (Vehicle Social Networks). Through capturing close friend set of each node, we cachedata prior at nodes which are overlapped by most nodes’ close friend sets. Proposed system develop anoptimization procedure to restrict the scope of caching nodes to satisfy the condition that there is at least onecommon node between caching node set and each node’s close friend set. By this mean, we minimize the numberof caching nodes while ensuring the fairness of each node at the same time. Extensive trace-driven simulationsshow that our approach significantly improves data access performance compared to existing schemes.
Authors and Affiliations
G. Menaka , Mr. Periyasamy
A Study on Proposed Distributed Attack Detection Algorithm Using Experimental and Simulation Analysis
Abstract: The attack detection rates are higher for large node deployment densities, as compared to the low density counterparts. This is because the attack detection scheme relies on both the individual traffic observat...
A Comparative Study of Contrast Enhancement using Image Fusion
Abstract: Image enhancement is used to improve the visual quality of an image. In this paper a different approach on image fusion has been described for image enhancement. The two main algorithms involved in this...
Integration of Irreversible Gates in Reversible Circuits Using NCT Library
The reversible circuit synthesis problem can be reduced to permutation group. This allows Schreier-Sims Algorithm for the strong generating set-finding problem to be used to synthesize reversible circuits using...
A Novel System of Fingerprint Recognition Approach for Immigration Control
Abstract : Insecurity is a pressing and important issue that needs urgent attention in Nigeria. The dramatic increase in worldwide flow of people, goods, and ideas has created a new group of threats. These are glob...
Secured Source Anonymous Message Authentication UsingWireless Sensor Network
Abstract: The secured exchange of message was the main concern. To overcome this, message authenticationschemes were developed, to maintain the privacy of message. Message authentication schemes are based onsymmetric key...