12 research outputs found

    An Efficient Intrusion-Detection Mechanisms To Protect Manet From Attacks

    Get PDF
    The self-configuring ability of nodes in MANET absolutes it admired among essential mission applications like military use or emergency recovery. The mobility and scalability carried by wireless network ended it possible in many applications.  Surrounded by all the contemporary wireless net- works Mobile Ad hoc NETwork (MANET) is one of the most significant and exclusive applications. In this paper a qualified learns of Secure Intrusion- Detection Systems for determining malicious nodes and attacks on MANETs are presented. Due to some special characteristics of MANETs prevention mechanisms alone are not sufficient to handle the secure networks.  One of the main advantages of wireless networks is its capability to permit data communication between different parties and still maintain their mobility. However this message is incomplete to the range of transmitters. This means that two nodes cannot converse with each other when the distance between the two nodes is further than the communication range of their own. MANET solves this difficulty by allowing intermediate parties to transmit data transmissions. This is achieved by dividing MANET into two types of networks namely single-hop and multi hop. In a single-hop network all nodes within the same radio range communicate directly with each other

    Optimal Object Placement Policies To Minimize The Network-Wide Content Provisioning Cost

    Get PDF
    Social Wireless Networks are formed by mobile devices such as data enabled phones, electronic book readers etc., allocating common interests in electronic content and physically gathering together in public places. Electronic object caching in such social wireless networks (SWNETs)are capable to diminish the content provisioning cost which depends greatly on the service and pricing dependences amide range of stakeholders together with content providers (CP), network service providers and End Consumers (EC). Drawing inspiration from Amazon’s Kindle electronic book delivery business, this paper build up practical network, service and pricing models which are then used for creating two object caching approaches for diminishing content provisioning costs in networks with homogenous and assorted object demands. The paper creates logical and replication models for analyzing the proposed caching approaches   in the presence of selfish users that diverge from network-wide cost-optimal policies.

    Analyzation Of The Scalability Problems Of Distributed Presence Server Architectures

    Get PDF
    A mobile presence service is an important factor of social network services in cloud computing environments. The key function of a mobile presence service is to maintain an up-to-date list of presence information of all mobile users. The presence information includes details about a mobile user’s location, availability, activity, device capability and preferences. The service must also connect the user’s ID to his/her current presence information as well as regain and subscribe to changes in the presence information of the user’s friends. We suggest competent and scalable server architecture, called Presence Cloud which facilitates mobile presence services to hold up large-scale social network applications. When a mobile user joins a network Presence Cloud searches for the presence of his/her friends and notifies them of his/her arrival. Presence Cloud categorizes presence servers into a quorum-based server-to-server architecture for efficient presence searching

    To Achieve An Optimal Tradeoff Between P2p Overlay Maintenance And Video Sharing Efficiency In Osn’s

    Get PDF
    Video sharing has been a gradually more popular application in OSNs facilitating users to share their personal videos or interesting videos they found with their friends. However OSN’s additional progress is strictly caught up by the inherent limits of the conventional client/server architecture of its video sharing system which is not only costly in terms of server storage and bandwidth but also not scalable with the high amount of users and video content in OSNs. The efforts have been dedicated to perk up the client/server architecture for video sharing with the peer-to-peer (P2P) architecture being the most promising. P2P-based video sharing has been used in on demand video streaming.The dimension reveals that mainly of the viewers of a user’s videos are the user’s close friends, most video views are driven by social relationships and the rest are driven by interests and viewers of the same video tend to live in the same location. Based on our observations we propose Social Tube a system that discover the social relationship interest resemblance and location to improve the presentation of video sharing in OSNs. Specifically an OSN has a social network (SN)-based P2P overlay construction algorithm that come together peers based on their social relationships and interests.

    Transmission Mechanism To Effectively Increase The Social Tv Viewing Experience By Cloud

    Get PDF
    Strong challenges occur on how to competently exploit cloud resources to make easy mobile services. We propose the design of a Cloud-based novel Mobile social TV system (CloudMoV). The system efficiently utilizes both PaaS (Platform-as-a-Service) and IaaS (Infrastructure-as-a- Service) cloud services to propose the living-room knowledge of video watching to a group of dissimilar mobile users who can interconnect socially while sharing the video. The latest cloud computing technology with its wealthy possessions to balance for the limitations of mobile devices and connections can potentially give with an ideal platform to hold up the desired mobile services. We explain the devise of a novel mobile social TV system, CloudMoV which can in effect employ the cloud computing paradigm to proffer a living-room experience of video watching to disparate mobile users with impulsive social interactions. In CloudMoV mobile users can import a live or on-demand video to watch from any video streaming site, invite their friends to watch the video concurrently, and chat with their friends while enjoying the video

    A Routing Algorithm To Reduce The Queueing Complexity In Communication Networks

    Get PDF
    A new adaptive routing algorithm built ahead the widely studied back-pressure algorithm. We decouple the routing and scheduling components of the algorithm by designing a probabilistic routing table that is used to route packets to per-destination queues. The scheduling decisions in the case of wireless networks are made using counters called shadow queues. The results are also extended to the case of networks that employ simple forms of network coding. The routing algorithm is considered to decrease the average number of hops used by packets in the network. This idea along with the scheduling/routing decoupling leads to setback decrease compared with the traditional back-pressure algorithm. The algorithm can be applied to wire line and wireless networks. Wide simulations show spectacular improvement in delay performance compared to the back-pressure algorithm.  When network coding is employed per-previous-hop queues may also be essential but this is a requirement compulsory by network coding not by our algorithm.

    A Distributed Solution For Npv In Mobile Adhoc Networks To Verify The Position Of Communication Neighbours

    Get PDF
    A distributed solution for NPV any node in a mobile ad hoc network to verify the position of its communication neighbours without depending on a priori trustworthy nodes. In absence of a priori trusted nodes the discovery and verification of neighbor positions presents challenges that have been barely investigated in the literature. In this paper we address this open issue by proposing a fully distributed cooperative solution that is healthy against independent and colluding adversaries and can be damaged only by an overwhelming presence of adversaries. We need solutions that allow nodes correctly set up their location in spite of attacks feeding false location information and confirm the positions of their neighbours so as to notice adversarial nodes announcing false locations

    To Improve Content Based Face Retrieval By Creating Semantic Code Words

    Get PDF
    The importance and the complete amount of human face photos make manipulations e.g., search and mining of large-scale human face images a really vital research problem and allow many real world applications. We aim to make use of automatically detected human attributes that contain semantic prompts of the face photos to improve content based face retrieval by constructing semantic code words for efficient large-scale face retrieval. By leveraging human attributes in a scalable and systematic framework we propose two orthogonal methods named attribute-enhanced sparse coding and attribute embedded inverted indexing to perk up the face retrieval in the offline and online stages. We examine the efficiency of different attributes and vital factors necessary for face retrieval. The purpose in this paper is to deal with one of the imperative and challenging problems large-scale content-based face image retrieval. Given a uncertainty face image content-based face image retrieval seeks to find similar face images from a large image database. It is and facilitates equipment for many applications including automatic face annotation crime investigation etc.

    An Algorithm Of Anonymous Id Assignment For Secure Data Sharing On A Network

    Get PDF
    Existing and new algorithms for assigning anonymous IDs are scrutinized with respect to trade-offs among communication and computational requirements. An algorithm for distributed solution of certain polynomials over limited fields improves the scalability of the algorithms. Another form of anonymity as used in secure multiparty computation allows multiple parties on a network to together carry out a global computation that depends on data from each party while the data supposed by each party remains unknown to the other parties. The new algorithms are constructed on top of a secure sum data mining operation using Newton’s identities and Sturm’s theorem. An algorithm for distributed solution of convinced polynomials over limited fields improves the scalability of the algorithms. Markov chain representations are used to find statistics on the number of iterations required and computer algebra gives closed form results for the completion rates.

    The Dynamic Load Balancing Method On Game Theory For Distributed Systems

    Get PDF
    The load balancing model is aimed at the public cloud which has several nodes with scattered computing resources in different geographic locations. When the environment is very large and difficult these divisions simplify the load balancing. The cloud has a main controller that chooses the suitable partitions for arriving jobs while the balancer for each cloud partition chooses the best load balancing strategy. Thus this model divides the public cloud into several cloud partitions. Static schemes do not use the system information and are fewer compounds while dynamic schemes will bring additional costs for the system but can change as the system status changes. The model has a main controller and balancers to gather and analyse the information
    corecore