Selfish Node Detection in Replica Allocation over MANETs
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 13, Issue 5
Abstract
: MOBILE ad hoc networks (MANETs) have attracted a lot of attention due to the popularity of mobile devices and the advances in wireless communication technologies. A MANET is a peer-to-peer multi hop mobile wireless network that has neither a fixed infrastructure nor a central server. Each node in a MANET acts as a router, and communicates with each other. In a mobile ad hoc network, the mobility and resource constraints of mobile nodes may lead to network partitioning or performance degradation. Several data replication techniques have been proposed to minimize performance degradation. Most of them assume that all mobile nodes collaborate fully in terms of sharing their memory space. In reality, however, some nodes may selfishly decide only to cooperate partially, or not at all, with other nodes. These selfish nodes could then reduce the overall data accessibility in the network. I
Authors and Affiliations
Kishore Kumar
“Development of Biometrics technology in multimode fusion data in various levels”
In this paper study of the biometrics. The recognition of face and fingerprint. The authentication of face and fingerprint are using various fusion levels. In this technology are useful for various applications. The biom...
Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspired Elephant Based Swarm Optimization
: The robust and complex real-time applications and dramatically increased sensor capabilities may play a vital role in enhancing the lifespan of WSNs. On the other hand majority of WSNs operate on battery powe...
Segmentation of Lung Tumor in CT Scan Images using FA-FCM Algorithms
Abstract: Lung Cancer is dangerous disease that cause most human to death at early age and it is an uncontrolled cell growth in tissues on the lung. Many algorithms and technologies are introduced for identifying the lun...
Uses of Genetic Algorithm in Cryptanalysis of RSA
Abstract : The information system security is nowadays paramount, it is for what we are focused in our research to talk about a basic of security which is cryptography, and specially about RSA algorithm, a system of codi...
Core Based Group Communication with Qos Support
The present day is demanding more and more quality of service in broadband group communication to support huge access of internet service and multimedia application. The core based solution is able to full fill &...