Society Dissemination Based Propagation For Data Spreading In Mobiles Social Networks
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 9
Abstract
In mobile ad hoc networks, nodes are dynamically changing their locations. MOBILE ad hoc networks (MANETs) consist of a collection of mobile nodes which can move freely. These nodes can be dynamically self-organized into arbitrary topology networks without a fixed infrastructure. A mobile ad hoc network consists of wireless hosts that may move often. Movement of hosts results in a change in routes, requiring some mechanism for determining new routes. Several routing protocols have already been proposed for ad hoc networks. MSNets can be viewed as a kind of socially aware Delay/ Disruption Tolerant Networks (DTNs). Thanks to the popularization of smart phones (e.g., iPhone, Nokia N95,and Blackberry), MSNets have begun to attract more attention. However, intermittent and uncertain network connectivity make data dissemination in MSNets a challenging problem. Broadcasting is the operation of sending data from a source user to all other users in the network. Most of the envisioned services (ranging from safety applications to traffic management) rely on broadcasting data to the users inside a certain area of interest. For example, location-based services (product prices, tourist points of interest, etc.) can be advertised from salesmen to near-by users. In this paper The objective is to broadcast data from a superuser to other users in the network. There are two main challenges under this paradigm, namely 1) how to represent and characterize user mobility in realistic MSNets; 2) given the knowledge of regular users' movements, how to design an efficient superuser route to broadcast data actively. We first explore several realistic data sets to reveal both geographic and social regularities of human mobility, and further propose the concepts of geocommunity and geocentrality into MSNet analysis.
Authors and Affiliations
Shaik Mohammad Ayesha| Student of M.Tech Department of Computer Science Engineering G.V.R&S college of Engineering & Technology, GUNTUR, Sk. Mubeena Sultana| Department of Computer Science Engineering G.V.R&S college of Engineering & Technology, GUNTUR
Finest Informant Filtering of Malicious Traffic in Intrusion Detection System
Traffic volume and diversity will have a major impact on the power of network intrusion detection systems (NIDS) to report malicious activity accurately. Supported the observation that a good deal of traffic is, in f...
Simulation of an Inverter-Based Dg System by Using Voltage Control of DC Link for Islanding Detection
This paper presents a novel strategy for islanding detection of distributed generation (DG). During islanding condition the main idea of this paper is to change the dc-link voltage considering the PCC voltage changes...
Designing of Double Input Integrated Buck-Boost Converter
In this paper, two-input integrated dc-dc converter analysis and control strategies useful to photovoltaic (PV) applications is presented. This dc-dc converter is basically combination of individual buck and buck-boos...
Accessible and Confident allotment of Personal Health Records in the cloud
PHRs grant patients access to a wide range of health information sources, best medical practices and health knowledge. In patient centric secure sharing, patients will create, manage and control their personal health...
In created nations, utilizing high quality cement in structures today would bring about both specialized and practical preferred standpoint. In high quality solid, it is important to decrease the water/concrete propo...