SlideShare a Scribd company logo
1 of 5
Download to read offline
Jaya Krishna Katti et al. Int. Journal of Engineering Research and Application www.ijera.com
Vol. 3, Issue 5, Sep-Oct 2013, pp.473-477
www.ijera.com 473 | P a g e
Casting Selfish Nodes Into Non Selfish In Replica Allocation Over
Mobile Ad Hoc Network
Jaya Krishna Katti*, Venkata Naga Sudheer**
*(M.Tech Final Year student, Department of CSE, QIS College of Engineering and Technology, Ongole)
** (Asst. Professor, Department of C.S.E, QIS College of Engineering and Technology, Ongole)
ABSTARCT
The nodes in Mobile Ad Hoc Network are resource constrained. This drawback and mobility nature of nodes
can cause network partitioning and degradation of performance. Traditionally replica allocation techniques were
used to overcome the drawback of performance degradation. It is assumed that all nodes in MANET share their
memory resources fully. However, in reality the nodes may behave selfishly instead of cooperating in
communication process. The selfishness exhibited by some of the nodes may lead to reduced quality of data
accessibility over network. Recently Choi et al. studied the impact of selfish nodes from replication allocation
perspective. Their solution is named “Selfish Replica Allocation”. They proposed a novel replica allocation and
selfish node detection. In this paper we implemented those mechanisms for casting selfish nodes in non selfish
from the perspective of replica allocation. We built a custom Java simulator to demonstrate the proof of concept.
The empirical results reveal that the approach shows higher performance when compared with existing
techniques in terms of communication cost, data accessibility and average query delay.
Index Terms – Mobile ad hoc networks, selfish node, selfish replica allocation
I. INTRODUCTION
Due to the advent of innovative
technologies in mobile devices, their usage has
become ubiquitous. MANET (Mobile Ad Hoc
Network) is a network of mobile nodes which are
automatically configured without a fixed
infrastructure. The existing technologies in the
domain of mobile computing have paved the way
for creation of MANETs [1], [2], [3]. MANETs are
automatically established and they have real utility
in real time applications [4] such as battle fields,
natural disasters and so on. Therefore in emergency
situations MANETs are suitable to address
communication problems. Peer-to-peer mobile
overlay is another interesting MANET that can be
used for file sharing and searching [5], [6].
Network partitions are caused by node mobility as
they move from one place to another place. Thus
data present in a mobile node can become
inaccessible. The data accessibility measure is used
to know the level of data accessibility in MANETs
[7]. To overcome the data inaccessibility problem
due to node mobility, the data can be replicated in
many nodes [1], [7], [8]. By making replicas, the
node scan provides requested data in cooperative
fashion. However, in reality nodes may behave
selfishly to get rid of resource consumption or any
other reason. Many replica allocation techniques
came into existence. Recently Choi et al. [20]
presented a selfish replica allocation model which
is presented in fig. 1.
Fig. 1 – Selfish replica allocation
As can be seen in fig. 1, many nodes are
interconnected to form MANET through wireless
media. There is some replication allocation scheme
named DCG as explored in [7]. Wireless links are
represented by straight lines between nodes.
Rectangle with an item in gray color indicates
original data; white boxes represent replication
allocations. The table1 shows access frequencies of
data.
Table 1 – Access frequencies of nodes
RESEARCH ARTICLE OPEN ACCESS
Jaya Krishna Katti et al. Int. Journal of Engineering Research and Application www.ijera.com
Vol. 3, Issue 5, Sep-Oct 2013, pp.473-477
www.ijera.com 474 | P a g e
As can be seen in table 1, the frequently
accessed items by the nodes 3 and 4 are shown in
gray color. To reduce duplication allocation DCG
technique is employed. Delay in data access is
resulted when a node behaves selfishly in a group.
For instance, when node 3 misbehaves, the nodes
in the group will be able to access data properly. In
order to overcome the problems of query delay,
improve data accessibility and response time,
replication techniques are used in MENTs. Nodes
in the MANET have fewer resources. For this
reason they may behave selfishly to save energy by
not cooperating with the objective of the network.
When the nodes behave selfishly they can save
energy and enjoy resources causing delay in data
access [9], [10].
This paper has implemented the
mechanisms proposed in [20] using a custom Java
simulator which demonstrates selfish replica
allocation. The remainder of this paper is organized
into the following sections. Section II reviews
literature relevant to replication allocation in
MANETs. Section III presents proposed replica
allocation strategy. Section IV shows experimental
results while section V concludes the paper.
II. RELATED WORK
Mobile Ad Hoc Network is a network
formed among mobile nodes without fixed
infrastructure. MANET is of two types as explored
in [11], [12], and [13]. One type of MANET is
known as closed MANET where nodes exhibit
expected behavior. Other type of MANET is
known as open MANET where the nodes have
some sort of guaranteed behavior. However, nodes
in MANET can misbehave to save energy
resources selfishly. This behavior of nodes in
MANET was handled by many techniques [13].
This paper considers open MANET. All existing
techniques employed to handle selfish nodes in
MANET are categorized into three types. They are
game theory based, reputation based and credit-
payment based. Reputation based techniques allow
the MANET to observe nodes for monitoring
selfish behavior [14], [15]. Credits are evaluated in
case of credit payment methods where nodes are
rewarded when they behave well while
participating in data access procedures such as data
forwarding [9], [16]. The game theory based
methods are employed by MANET nodes to have
their own strategies to increase their profits [10],
[17].
Packet forwarding is used in all the
techniques for communication in MANETs.
However, the focus of this paper is on selfish
replica allocation. In [18] many trust models were
presented. The selfishness is treated as refusal to
forward data besides dropping packets. These
techniques are not effective for replica allocation
which gets rid of selfish behavior. In [7] also
techniques were given for replication allocation.
The techniques like DCG have shown highest
accessibility of data. However, DCG is not suitable
for MANET. In [8] problems like query delay and
data inaccessibility were handled. In [19]
cooperative caching is used in order to overcome
the problem of selfish nodes. They features
employed include Cache Path, Cache Data and
Hybrid. In [20] a novel replica allocation technique
was proposed. It could detect selfish nodes
effectively besides allocating replicas successfully.
III. PROPOSED REPLICA
ALLOCATION STRATEGY
In this section we describe the replica
allocation strategy and algorithms used as proposed
in [20]. The algorithms include SCF-tree building,
selfish node detection and replica allocation. In
order to detect selfish nodes, credit concept is used.
Credit risk scores are used to determine the selfish
behavior of nodes. The algorithms are employed in
every node. Therefore every node is capable of
detecting selfish nodes. Listing 1 shows pseudo
code for detecting selfish nodes.
Listing 1 – Selfish node detection algorithm
The algorithm presented in listing 1 runs
in every node in MANET. In every relocation
period, the node can make use of credit risk
concept and detect selfish nodes. The algorithm 2
presented in listing 2 updates selfish features.
Listing 2 – Algorithm to update selfish feature
Jaya Krishna Katti et al. Int. Journal of Engineering Research and Application www.ijera.com
Vol. 3, Issue 5, Sep-Oct 2013, pp.473-477
www.ijera.com 475 | P a g e
As can be seen in listing 2 at each and
every query the credibility of nodes is computed
and the selfish feature of the nodes is updated. The
algorithm shown in listing 3 is used to build SCF
tree.
Listing 3 – SCF tree building algorithm
As can be seen in listing3, the algorithm is used to
build a tree known as SCF tree which is best used
in replication allocation successfully. The actual
replication allocation mechanism is coded in listing
4.
Listing 4 – Replica allocation algorithm
As can be seen in listing 4, identification
of all data items is done by the algorithm for
replication. Replicas are placed at each node which
is organized in the descending order by access
frequencies of nodes. Initially breadth first search
is used to obtain priorities and based on the
priorities replica allocation is carried out.
IV. EXPERIMENTAL RESULTS
We built a prototype application that is a
custom Java simulator to demonstrate the proof of
concept of casting selfish nodes to non selfish. The
application is built in Java platform. The
environment used to implement the prototype
includes a PC with 2 GB RAM and Core 2 dual
processor running Windows XP operating system.
The simulations are made using the customer
simulator application. The simulation demonstrates
the creation of MANET, detecting selfish nodes
and handling the problem of selfishness associated
with nodes. The simulation parameters are
presented in table 2.
Table 2 – Simulation Parameters
As can be seen in table 2, the simulation
parameters are presented. The parameters
considered include number of nodes, number of
data items, radius communication range, size of
network, size of memory space, percentage of
selfish nodes and maximum velocity.
Fig. 2 –Relocation period vs. overall selfishness
alarm
As seen in fig. 2, relocation period is
presented in X axis while the Y axis represents
overall selfishness alarm. The results show that the
DCG+ shows very less selfishness alarm.
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
0.45
1 2 3 4 5 6 7 8
OverallSelfishnessalarm
Relocation Period
DCG
DCG+
DCG(Selfis
hness
only)
Jaya Krishna Katti et al. Int. Journal of Engineering Research and Application www.ijera.com
Vol. 3, Issue 5, Sep-Oct 2013, pp.473-477
www.ijera.com 476 | P a g e
Fig. 3 –Size of memory space vs. overall
selfishness alarm
As can be seen in fig. 3, the size of
memory space is shown in horizontal axis while the
vertical axis represents overall selfishness alarm.
The results show that the DCG+ shows very less
selfishness alarm.
Fig. 4 –Varying relocation period vs.
communication cost
In fig. 4, the horizontal axis represents relocation
period while the vertical axis shows total hop count
of data transmission.
Fig. 5 –Varying size of memory space vs.
communication cost
As seen in fig. 5, size of memory space is
represented by horizontal axis while the vertical
axis represents total hop count of data transmission.
As shown in result, the increase in size of memory
space increases communication cost. However, the
debugging starts after a while. After some time, the
replicas are in many nodes. Thus the delay in
communication is reduced. When compared with
other techniques, the communication cost of SCF is
less.
V. CONCLUSION
In this paper we implemented mechanisms
for selfish node detection and replication allocation
to reduce selfish behavior in MANET. These
mechanisms were originally proposed in [20]. The
main focus of the paper is selfish replica allocation.
It does mean that the mechanisms identity selfish
nodes and convert them into non-selfish nodes. The
algorithms used in this paper were proposed by
Choi et al. [20]. The mechanisms take care of
selfish node allocation and also handling selfish
nodes in the MANET. We implemented a custom
Java simulator to demonstrate the proof of concept.
The results revealed that the mechanisms could
reduce delay in response, improve data
accessibility besides improving the performance of
network.
REFERENCES
[1] T. Hara and S.K. Madria, “Data
Replication for Improving Data
Accessibility in Ad Hoc Networks,” IEEE
Trans. Mobile Computing, vol. 5, no. 11,
pp. 1515-1532, Nov. 2006.
[2] T. Hara and S.K. Madria, “Consistency
Management Strategies for Data
Replication in Mobile Ad Hoc Networks,”
IEEE Trans. Mobile Computing, vol. 8,
no. 7, pp. 950-967, July 2009.
[3] S.-Y. Wu and Y.-T. Chang, “A User-
Centered Approach to Active Replica
Management in Mobile Environments,”
IEEE Trans. Mobile Computing, vol. 5,
no. 11, pp. 1606-1619, Nov. 2006.
[4] P. Padmanabhan, L. Gruenwald, A.
Vallur, and M. Atiquzzaman, “A Survey
of Data Replication Techniques for
Mobile Ad Hoc Network Databases,” The
Int’l J. Very Large Data Bases, vol. 17,
no. 5, pp. 1143-1164, 2008.
[5] G. Ding and B. Bhargava, “Peer-to-Peer
File-Sharing over Mobile Ad Hoc
Networks,” Proc. IEEE Ann. Conf.
Pervasive Computing and Comm.
Workshops, pp. 104-108, 2004.
[6] M. Li, W.-C. Lee, and A.
Sivasubramaniam, “Efficient Peer-to-Peer
Information Sharing over Mobile Ad Hoc
Networks,” Proc. World Wide Web
(WWW) Workshop Emerging
Applications for Wireless and Mobile
Access, pp. 2-6, 2004.
[7] T. Hara, “Effective Replica Allocation in
Ad Hoc Networks for Improving Data
Accessibility,” Proc. IEEE INFOCOM,
pp. 1568- 1576, 2001.
[8] L. Yin and G. Cao, “Balancing the
Tradeoffs between Data Accessibility and
Query Delay in Ad Hoc Networks,” Proc.
0
0.1
0.2
0.3
0.4
0.5
1 2 3 4 5 6 7 8 9 10
Overallselfishness
alarm
Size of memory space
DCG
DCG+
DCG(Selfish
ness only)
DCG+(Selfis
hness only)
0
2
4
6
8
10
12
1 2 3 4 5 6 7 8 9
Totalhopcountofdata
transmission
Relocation Period
SAF
DCG
DCG+
SCF
SCF-DS
SCF-CN
eSCF
0
5
10
15
20
10003000500070009000
Totlalhopcountofdata
transmission
Size of memory space
SAF
DCG
DCG+
SCF
SCF-DS
SCF-CN
Jaya Krishna Katti et al. Int. Journal of Engineering Research and Application www.ijera.com
Vol. 3, Issue 5, Sep-Oct 2013, pp.473-477
www.ijera.com 477 | P a g e
IEEE Int’l Symp. Reliable Distributed
Systems, pp. 289-298, 2004.
[9] L. Anderegg and S. Eidenbenz, “Ad Hoc-
VCG: A Truthful and Cost-Efficient
Routing Protocol for Mobile Ad Hoc
Networks with Selfish Agents,” Proc.
ACM MobiCom, pp. 245-259, 2003.
[10] D. Hales, “From Selfish Nodes to
Cooperative Networks - Emergent Link-
Based Incentives in Peer-to-Peer
Networks,” Proc. IEEE Int’l Conf. Peer-
to-Peer Computing, pp. 151-158, 2004.
[11] K. Balakrishnan, J. Deng, and P.K.
Varshney, “TWOACK: Preventing
Selfishness in Mobile Ad Hoc Networks,”
Proc. IEEE Wireless Comm. and
Networking, pp. 2137-2142, 2005.
[12] H. Miranda and L. Rodrigues, “Friends
and Foes: Preventing Selfishness in Open
Mobile Ad hoc Networks,” Proc. IEEE
Int’l Conf. Distributed Computing
Systems Workshops, pp. 440-445, 2003.
[13] Y. Yoo and D.P. Agrawal, “Why Does It
Pay to be Selfish in a MANET,” IEEE
Wireless Comm., vol. 13, no. 6, pp. 87-97,
Dec. 2006.
[14] Y. Liu and Y. Yang, “Reputation
Propagation and Agreement in Mobile
Ad-Hoc Networks,” Proc. IEEE Wireless
Comm. and Networking Conf., pp. 1510-
1515, 2003.
[15] S. Marti, T. Giuli, K. Lai, and M. Baker,
“Mitigating Routing Misbehavior in
Mobile Ad hoc Networks,” Proc. ACM
MobiCom, pp. 255-265, 2000.
[16] W. Wang, X.-Y. Li, and Y. Wang,
“Truthful Multicast Routing in Selfish
Wireless Networks,” Proc. ACM
MobiCom, pp. 245-259, 2004.
[17] V. Srinivasan, P. Nuggehalli, C.
Chiasserini, and R. Rao, “Cooperation in
Wireless Ad Hoc Networks,” Proc. IEEE
INFOCOM, pp. 808-817, 2003.
[18] H. Li and M. Singhal, “Trust Management
in Distributed Systems,” Computer, vol.
40, no. 2, pp. 45-53, Feb. 2007.
[19] G. Cao, L. Yin, and C.R. Das,
“Cooperative Cache-Based Data Access in
Ad Hoc Networks,” Computer, vol. 37,
no. 2, pp. 32-39, Feb. 2004.
[20] Jae-Ho Choi, Kyu-Sun Shim, SangKeun
Lee, and Kun-Lung Wu, Fellow, IEEE,
“Handling Selfishness in Replica
Allocation over a Mobile Ad Hoc
Network”, IEEE TRANSACTIONS ON
MOBILE COMPUTING, VOL. 11, NO.
2, FEBRUARY 2012.
K. Jaya Krishna was born in Ongole,
Prakasam Dt, Andhra Pradesh, India.
He received MCA from Anna
University, Tamilnadu, India.
Presently, he is pursuing M.Tech in C.S.E from
QIS College of Engineering& Technology,
vengamukkapalem, Ongole, Prakasam Dt, Andhra
Pradesh, India. His Research interest includes
Computer Networks, Data Mining.
T. Venkata Naga Sudheer was born in
Marlapadu(V), Prakasam Dt, Andhra
Pradesh, India. He received B.Tech
from university of JNTUH, Hydrabad,
and M.Tech from S.V University,
Tirupathi, Andrapradesh, India. Presently, he is
working as a Asst.Professor in C.S.E from QIS
College of Engineering & Technology,
vengamukkapalem, Ongole, Prakasam Dt, Andhra
Pradesh, India. His Research interest includes
Computer Networks and Data Mining.

More Related Content

What's hot

IRJET- Visual Question Answering using Combination of LSTM and CNN: A Survey
IRJET- Visual Question Answering using Combination of LSTM and CNN: A SurveyIRJET- Visual Question Answering using Combination of LSTM and CNN: A Survey
IRJET- Visual Question Answering using Combination of LSTM and CNN: A SurveyIRJET Journal
 
MultiObjective(11) - Copy
MultiObjective(11) - CopyMultiObjective(11) - Copy
MultiObjective(11) - CopyAMIT KUMAR
 
A New Approach for Improving Performance of Intrusion Detection System over M...
A New Approach for Improving Performance of Intrusion Detection System over M...A New Approach for Improving Performance of Intrusion Detection System over M...
A New Approach for Improving Performance of Intrusion Detection System over M...IOSR Journals
 
Computation of Neural Network using C# with Respect to Bioinformatics
Computation of Neural Network using C# with Respect to BioinformaticsComputation of Neural Network using C# with Respect to Bioinformatics
Computation of Neural Network using C# with Respect to BioinformaticsSarvesh Kumar
 
Knowledge Acquisition Based on Repertory Grid Analysis System
Knowledge Acquisition Based on Repertory Grid Analysis SystemKnowledge Acquisition Based on Repertory Grid Analysis System
Knowledge Acquisition Based on Repertory Grid Analysis Systemijtsrd
 
Neuro-Fuzzy Model for Strategic Intellectual Property Cost Management
Neuro-Fuzzy Model for Strategic Intellectual Property Cost ManagementNeuro-Fuzzy Model for Strategic Intellectual Property Cost Management
Neuro-Fuzzy Model for Strategic Intellectual Property Cost ManagementEditor IJCATR
 
IRJET- Comparative Study of Different Techniques for Text as Well as Object D...
IRJET- Comparative Study of Different Techniques for Text as Well as Object D...IRJET- Comparative Study of Different Techniques for Text as Well as Object D...
IRJET- Comparative Study of Different Techniques for Text as Well as Object D...IRJET Journal
 
IRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET- Spot Me - A Smart Attendance System based on Face RecognitionIRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET- Spot Me - A Smart Attendance System based on Face RecognitionIRJET Journal
 
IRJET- Factoid Question and Answering System
IRJET-  	  Factoid Question and Answering SystemIRJET-  	  Factoid Question and Answering System
IRJET- Factoid Question and Answering SystemIRJET Journal
 
Table of contenets dec 2018
Table of contenets dec 2018Table of contenets dec 2018
Table of contenets dec 2018ijesajournal
 
A Parallel Framework For Multilayer Perceptron For Human Face Recognition
A Parallel Framework For Multilayer Perceptron For Human Face RecognitionA Parallel Framework For Multilayer Perceptron For Human Face Recognition
A Parallel Framework For Multilayer Perceptron For Human Face RecognitionCSCJournals
 
Test PDF
Test PDFTest PDF
Test PDFAlgnuD
 
Multidimensional scaling algorithm and its current applications in wireless l...
Multidimensional scaling algorithm and its current applications in wireless l...Multidimensional scaling algorithm and its current applications in wireless l...
Multidimensional scaling algorithm and its current applications in wireless l...IDES Editor
 
Targeted Visual Content Recognition Using Multi-Layer Perceptron Neural Network
Targeted Visual Content Recognition Using Multi-Layer Perceptron Neural NetworkTargeted Visual Content Recognition Using Multi-Layer Perceptron Neural Network
Targeted Visual Content Recognition Using Multi-Layer Perceptron Neural Networkijceronline
 
Paper id 252014107
Paper id 252014107Paper id 252014107
Paper id 252014107IJRAT
 
Intrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor NetworksIntrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor Networksrahulmonikasharma
 
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...IJCNCJournal
 
Neural network based numerical digits recognization using nnt in matlab
Neural network based numerical digits recognization using nnt in matlabNeural network based numerical digits recognization using nnt in matlab
Neural network based numerical digits recognization using nnt in matlabijcses
 
Comparison of relational and attribute-IEEE-1999-published ...
Comparison of relational and attribute-IEEE-1999-published ...Comparison of relational and attribute-IEEE-1999-published ...
Comparison of relational and attribute-IEEE-1999-published ...butest
 

What's hot (19)

IRJET- Visual Question Answering using Combination of LSTM and CNN: A Survey
IRJET- Visual Question Answering using Combination of LSTM and CNN: A SurveyIRJET- Visual Question Answering using Combination of LSTM and CNN: A Survey
IRJET- Visual Question Answering using Combination of LSTM and CNN: A Survey
 
MultiObjective(11) - Copy
MultiObjective(11) - CopyMultiObjective(11) - Copy
MultiObjective(11) - Copy
 
A New Approach for Improving Performance of Intrusion Detection System over M...
A New Approach for Improving Performance of Intrusion Detection System over M...A New Approach for Improving Performance of Intrusion Detection System over M...
A New Approach for Improving Performance of Intrusion Detection System over M...
 
Computation of Neural Network using C# with Respect to Bioinformatics
Computation of Neural Network using C# with Respect to BioinformaticsComputation of Neural Network using C# with Respect to Bioinformatics
Computation of Neural Network using C# with Respect to Bioinformatics
 
Knowledge Acquisition Based on Repertory Grid Analysis System
Knowledge Acquisition Based on Repertory Grid Analysis SystemKnowledge Acquisition Based on Repertory Grid Analysis System
Knowledge Acquisition Based on Repertory Grid Analysis System
 
Neuro-Fuzzy Model for Strategic Intellectual Property Cost Management
Neuro-Fuzzy Model for Strategic Intellectual Property Cost ManagementNeuro-Fuzzy Model for Strategic Intellectual Property Cost Management
Neuro-Fuzzy Model for Strategic Intellectual Property Cost Management
 
IRJET- Comparative Study of Different Techniques for Text as Well as Object D...
IRJET- Comparative Study of Different Techniques for Text as Well as Object D...IRJET- Comparative Study of Different Techniques for Text as Well as Object D...
IRJET- Comparative Study of Different Techniques for Text as Well as Object D...
 
IRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET- Spot Me - A Smart Attendance System based on Face RecognitionIRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET- Spot Me - A Smart Attendance System based on Face Recognition
 
IRJET- Factoid Question and Answering System
IRJET-  	  Factoid Question and Answering SystemIRJET-  	  Factoid Question and Answering System
IRJET- Factoid Question and Answering System
 
Table of contenets dec 2018
Table of contenets dec 2018Table of contenets dec 2018
Table of contenets dec 2018
 
A Parallel Framework For Multilayer Perceptron For Human Face Recognition
A Parallel Framework For Multilayer Perceptron For Human Face RecognitionA Parallel Framework For Multilayer Perceptron For Human Face Recognition
A Parallel Framework For Multilayer Perceptron For Human Face Recognition
 
Test PDF
Test PDFTest PDF
Test PDF
 
Multidimensional scaling algorithm and its current applications in wireless l...
Multidimensional scaling algorithm and its current applications in wireless l...Multidimensional scaling algorithm and its current applications in wireless l...
Multidimensional scaling algorithm and its current applications in wireless l...
 
Targeted Visual Content Recognition Using Multi-Layer Perceptron Neural Network
Targeted Visual Content Recognition Using Multi-Layer Perceptron Neural NetworkTargeted Visual Content Recognition Using Multi-Layer Perceptron Neural Network
Targeted Visual Content Recognition Using Multi-Layer Perceptron Neural Network
 
Paper id 252014107
Paper id 252014107Paper id 252014107
Paper id 252014107
 
Intrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor NetworksIntrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor Networks
 
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...
 
Neural network based numerical digits recognization using nnt in matlab
Neural network based numerical digits recognization using nnt in matlabNeural network based numerical digits recognization using nnt in matlab
Neural network based numerical digits recognization using nnt in matlab
 
Comparison of relational and attribute-IEEE-1999-published ...
Comparison of relational and attribute-IEEE-1999-published ...Comparison of relational and attribute-IEEE-1999-published ...
Comparison of relational and attribute-IEEE-1999-published ...
 

Viewers also liked

How to think like a startup
How to think like a startupHow to think like a startup
How to think like a startupLoic Le Meur
 
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your BusinessBarry Feldman
 
Teaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & TextspeakTeaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & TextspeakShelly Sanchez Terrell
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerLuminary Labs
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
 

Viewers also liked (6)

Inaugural Addresses
Inaugural AddressesInaugural Addresses
Inaugural Addresses
 
How to think like a startup
How to think like a startupHow to think like a startup
How to think like a startup
 
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
 
Teaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & TextspeakTeaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & Textspeak
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 

Similar to Ch35473477

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Detecting Misbehaving and Selfish Nodes in the Network using Watchdog Mechanism
Detecting Misbehaving and Selfish Nodes in the Network using Watchdog MechanismDetecting Misbehaving and Selfish Nodes in the Network using Watchdog Mechanism
Detecting Misbehaving and Selfish Nodes in the Network using Watchdog MechanismINFOGAIN PUBLICATION
 
Energy Efficinet Intrusion Detection System in mobile ad-hoc networks
Energy Efficinet Intrusion Detection System in mobile ad-hoc networksEnergy Efficinet Intrusion Detection System in mobile ad-hoc networks
Energy Efficinet Intrusion Detection System in mobile ad-hoc networksIJARIIE JOURNAL
 
Review on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsReview on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsijtsrd
 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...IJNSA Journal
 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...IJNSA Journal
 
Artificial Neural Content Techniques for Enhanced Intrusion Detection and Pre...
Artificial Neural Content Techniques for Enhanced Intrusion Detection and Pre...Artificial Neural Content Techniques for Enhanced Intrusion Detection and Pre...
Artificial Neural Content Techniques for Enhanced Intrusion Detection and Pre...AM Publications
 
Analysis on different Data mining Techniques and algorithms used in IOT
Analysis on different Data mining Techniques and algorithms used in IOTAnalysis on different Data mining Techniques and algorithms used in IOT
Analysis on different Data mining Techniques and algorithms used in IOTIJERA Editor
 
Effect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networksEffect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networkseSAT Journals
 
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...IDES Editor
 
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc NetworkHandling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc NetworkIJCERT
 
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSLOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSEditor IJCATR
 
Grid resource discovery a survey and comparative analysis 2
Grid resource discovery a survey and comparative analysis 2Grid resource discovery a survey and comparative analysis 2
Grid resource discovery a survey and comparative analysis 2IAEME Publication
 
Volume 2-issue-6-1930-1932
Volume 2-issue-6-1930-1932Volume 2-issue-6-1930-1932
Volume 2-issue-6-1930-1932Editor IJARCET
 
Volume 2-issue-6-1930-1932
Volume 2-issue-6-1930-1932Volume 2-issue-6-1930-1932
Volume 2-issue-6-1930-1932Editor IJARCET
 
Bz32915919
Bz32915919Bz32915919
Bz32915919IJMER
 

Similar to Ch35473477 (20)

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Detecting Misbehaving and Selfish Nodes in the Network using Watchdog Mechanism
Detecting Misbehaving and Selfish Nodes in the Network using Watchdog MechanismDetecting Misbehaving and Selfish Nodes in the Network using Watchdog Mechanism
Detecting Misbehaving and Selfish Nodes in the Network using Watchdog Mechanism
 
Energy Efficinet Intrusion Detection System in mobile ad-hoc networks
Energy Efficinet Intrusion Detection System in mobile ad-hoc networksEnergy Efficinet Intrusion Detection System in mobile ad-hoc networks
Energy Efficinet Intrusion Detection System in mobile ad-hoc networks
 
Review on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsReview on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETs
 
Analytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANETAnalytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANET
 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
 
Artificial Neural Content Techniques for Enhanced Intrusion Detection and Pre...
Artificial Neural Content Techniques for Enhanced Intrusion Detection and Pre...Artificial Neural Content Techniques for Enhanced Intrusion Detection and Pre...
Artificial Neural Content Techniques for Enhanced Intrusion Detection and Pre...
 
Analysis on different Data mining Techniques and algorithms used in IOT
Analysis on different Data mining Techniques and algorithms used in IOTAnalysis on different Data mining Techniques and algorithms used in IOT
Analysis on different Data mining Techniques and algorithms used in IOT
 
H1803055461
H1803055461H1803055461
H1803055461
 
Effect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networksEffect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networks
 
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
 
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc NetworkHandling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
 
Dy4301752755
Dy4301752755Dy4301752755
Dy4301752755
 
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSLOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
 
Grid resource discovery a survey and comparative analysis 2
Grid resource discovery a survey and comparative analysis 2Grid resource discovery a survey and comparative analysis 2
Grid resource discovery a survey and comparative analysis 2
 
Mobile ad hoc networks and its clustering scheme
Mobile ad hoc networks and its clustering schemeMobile ad hoc networks and its clustering scheme
Mobile ad hoc networks and its clustering scheme
 
Volume 2-issue-6-1930-1932
Volume 2-issue-6-1930-1932Volume 2-issue-6-1930-1932
Volume 2-issue-6-1930-1932
 
Volume 2-issue-6-1930-1932
Volume 2-issue-6-1930-1932Volume 2-issue-6-1930-1932
Volume 2-issue-6-1930-1932
 
Bz32915919
Bz32915919Bz32915919
Bz32915919
 

Recently uploaded

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 

Recently uploaded (20)

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 

Ch35473477

  • 1. Jaya Krishna Katti et al. Int. Journal of Engineering Research and Application www.ijera.com Vol. 3, Issue 5, Sep-Oct 2013, pp.473-477 www.ijera.com 473 | P a g e Casting Selfish Nodes Into Non Selfish In Replica Allocation Over Mobile Ad Hoc Network Jaya Krishna Katti*, Venkata Naga Sudheer** *(M.Tech Final Year student, Department of CSE, QIS College of Engineering and Technology, Ongole) ** (Asst. Professor, Department of C.S.E, QIS College of Engineering and Technology, Ongole) ABSTARCT The nodes in Mobile Ad Hoc Network are resource constrained. This drawback and mobility nature of nodes can cause network partitioning and degradation of performance. Traditionally replica allocation techniques were used to overcome the drawback of performance degradation. It is assumed that all nodes in MANET share their memory resources fully. However, in reality the nodes may behave selfishly instead of cooperating in communication process. The selfishness exhibited by some of the nodes may lead to reduced quality of data accessibility over network. Recently Choi et al. studied the impact of selfish nodes from replication allocation perspective. Their solution is named “Selfish Replica Allocation”. They proposed a novel replica allocation and selfish node detection. In this paper we implemented those mechanisms for casting selfish nodes in non selfish from the perspective of replica allocation. We built a custom Java simulator to demonstrate the proof of concept. The empirical results reveal that the approach shows higher performance when compared with existing techniques in terms of communication cost, data accessibility and average query delay. Index Terms – Mobile ad hoc networks, selfish node, selfish replica allocation I. INTRODUCTION Due to the advent of innovative technologies in mobile devices, their usage has become ubiquitous. MANET (Mobile Ad Hoc Network) is a network of mobile nodes which are automatically configured without a fixed infrastructure. The existing technologies in the domain of mobile computing have paved the way for creation of MANETs [1], [2], [3]. MANETs are automatically established and they have real utility in real time applications [4] such as battle fields, natural disasters and so on. Therefore in emergency situations MANETs are suitable to address communication problems. Peer-to-peer mobile overlay is another interesting MANET that can be used for file sharing and searching [5], [6]. Network partitions are caused by node mobility as they move from one place to another place. Thus data present in a mobile node can become inaccessible. The data accessibility measure is used to know the level of data accessibility in MANETs [7]. To overcome the data inaccessibility problem due to node mobility, the data can be replicated in many nodes [1], [7], [8]. By making replicas, the node scan provides requested data in cooperative fashion. However, in reality nodes may behave selfishly to get rid of resource consumption or any other reason. Many replica allocation techniques came into existence. Recently Choi et al. [20] presented a selfish replica allocation model which is presented in fig. 1. Fig. 1 – Selfish replica allocation As can be seen in fig. 1, many nodes are interconnected to form MANET through wireless media. There is some replication allocation scheme named DCG as explored in [7]. Wireless links are represented by straight lines between nodes. Rectangle with an item in gray color indicates original data; white boxes represent replication allocations. The table1 shows access frequencies of data. Table 1 – Access frequencies of nodes RESEARCH ARTICLE OPEN ACCESS
  • 2. Jaya Krishna Katti et al. Int. Journal of Engineering Research and Application www.ijera.com Vol. 3, Issue 5, Sep-Oct 2013, pp.473-477 www.ijera.com 474 | P a g e As can be seen in table 1, the frequently accessed items by the nodes 3 and 4 are shown in gray color. To reduce duplication allocation DCG technique is employed. Delay in data access is resulted when a node behaves selfishly in a group. For instance, when node 3 misbehaves, the nodes in the group will be able to access data properly. In order to overcome the problems of query delay, improve data accessibility and response time, replication techniques are used in MENTs. Nodes in the MANET have fewer resources. For this reason they may behave selfishly to save energy by not cooperating with the objective of the network. When the nodes behave selfishly they can save energy and enjoy resources causing delay in data access [9], [10]. This paper has implemented the mechanisms proposed in [20] using a custom Java simulator which demonstrates selfish replica allocation. The remainder of this paper is organized into the following sections. Section II reviews literature relevant to replication allocation in MANETs. Section III presents proposed replica allocation strategy. Section IV shows experimental results while section V concludes the paper. II. RELATED WORK Mobile Ad Hoc Network is a network formed among mobile nodes without fixed infrastructure. MANET is of two types as explored in [11], [12], and [13]. One type of MANET is known as closed MANET where nodes exhibit expected behavior. Other type of MANET is known as open MANET where the nodes have some sort of guaranteed behavior. However, nodes in MANET can misbehave to save energy resources selfishly. This behavior of nodes in MANET was handled by many techniques [13]. This paper considers open MANET. All existing techniques employed to handle selfish nodes in MANET are categorized into three types. They are game theory based, reputation based and credit- payment based. Reputation based techniques allow the MANET to observe nodes for monitoring selfish behavior [14], [15]. Credits are evaluated in case of credit payment methods where nodes are rewarded when they behave well while participating in data access procedures such as data forwarding [9], [16]. The game theory based methods are employed by MANET nodes to have their own strategies to increase their profits [10], [17]. Packet forwarding is used in all the techniques for communication in MANETs. However, the focus of this paper is on selfish replica allocation. In [18] many trust models were presented. The selfishness is treated as refusal to forward data besides dropping packets. These techniques are not effective for replica allocation which gets rid of selfish behavior. In [7] also techniques were given for replication allocation. The techniques like DCG have shown highest accessibility of data. However, DCG is not suitable for MANET. In [8] problems like query delay and data inaccessibility were handled. In [19] cooperative caching is used in order to overcome the problem of selfish nodes. They features employed include Cache Path, Cache Data and Hybrid. In [20] a novel replica allocation technique was proposed. It could detect selfish nodes effectively besides allocating replicas successfully. III. PROPOSED REPLICA ALLOCATION STRATEGY In this section we describe the replica allocation strategy and algorithms used as proposed in [20]. The algorithms include SCF-tree building, selfish node detection and replica allocation. In order to detect selfish nodes, credit concept is used. Credit risk scores are used to determine the selfish behavior of nodes. The algorithms are employed in every node. Therefore every node is capable of detecting selfish nodes. Listing 1 shows pseudo code for detecting selfish nodes. Listing 1 – Selfish node detection algorithm The algorithm presented in listing 1 runs in every node in MANET. In every relocation period, the node can make use of credit risk concept and detect selfish nodes. The algorithm 2 presented in listing 2 updates selfish features. Listing 2 – Algorithm to update selfish feature
  • 3. Jaya Krishna Katti et al. Int. Journal of Engineering Research and Application www.ijera.com Vol. 3, Issue 5, Sep-Oct 2013, pp.473-477 www.ijera.com 475 | P a g e As can be seen in listing 2 at each and every query the credibility of nodes is computed and the selfish feature of the nodes is updated. The algorithm shown in listing 3 is used to build SCF tree. Listing 3 – SCF tree building algorithm As can be seen in listing3, the algorithm is used to build a tree known as SCF tree which is best used in replication allocation successfully. The actual replication allocation mechanism is coded in listing 4. Listing 4 – Replica allocation algorithm As can be seen in listing 4, identification of all data items is done by the algorithm for replication. Replicas are placed at each node which is organized in the descending order by access frequencies of nodes. Initially breadth first search is used to obtain priorities and based on the priorities replica allocation is carried out. IV. EXPERIMENTAL RESULTS We built a prototype application that is a custom Java simulator to demonstrate the proof of concept of casting selfish nodes to non selfish. The application is built in Java platform. The environment used to implement the prototype includes a PC with 2 GB RAM and Core 2 dual processor running Windows XP operating system. The simulations are made using the customer simulator application. The simulation demonstrates the creation of MANET, detecting selfish nodes and handling the problem of selfishness associated with nodes. The simulation parameters are presented in table 2. Table 2 – Simulation Parameters As can be seen in table 2, the simulation parameters are presented. The parameters considered include number of nodes, number of data items, radius communication range, size of network, size of memory space, percentage of selfish nodes and maximum velocity. Fig. 2 –Relocation period vs. overall selfishness alarm As seen in fig. 2, relocation period is presented in X axis while the Y axis represents overall selfishness alarm. The results show that the DCG+ shows very less selfishness alarm. 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 1 2 3 4 5 6 7 8 OverallSelfishnessalarm Relocation Period DCG DCG+ DCG(Selfis hness only)
  • 4. Jaya Krishna Katti et al. Int. Journal of Engineering Research and Application www.ijera.com Vol. 3, Issue 5, Sep-Oct 2013, pp.473-477 www.ijera.com 476 | P a g e Fig. 3 –Size of memory space vs. overall selfishness alarm As can be seen in fig. 3, the size of memory space is shown in horizontal axis while the vertical axis represents overall selfishness alarm. The results show that the DCG+ shows very less selfishness alarm. Fig. 4 –Varying relocation period vs. communication cost In fig. 4, the horizontal axis represents relocation period while the vertical axis shows total hop count of data transmission. Fig. 5 –Varying size of memory space vs. communication cost As seen in fig. 5, size of memory space is represented by horizontal axis while the vertical axis represents total hop count of data transmission. As shown in result, the increase in size of memory space increases communication cost. However, the debugging starts after a while. After some time, the replicas are in many nodes. Thus the delay in communication is reduced. When compared with other techniques, the communication cost of SCF is less. V. CONCLUSION In this paper we implemented mechanisms for selfish node detection and replication allocation to reduce selfish behavior in MANET. These mechanisms were originally proposed in [20]. The main focus of the paper is selfish replica allocation. It does mean that the mechanisms identity selfish nodes and convert them into non-selfish nodes. The algorithms used in this paper were proposed by Choi et al. [20]. The mechanisms take care of selfish node allocation and also handling selfish nodes in the MANET. We implemented a custom Java simulator to demonstrate the proof of concept. The results revealed that the mechanisms could reduce delay in response, improve data accessibility besides improving the performance of network. REFERENCES [1] T. Hara and S.K. Madria, “Data Replication for Improving Data Accessibility in Ad Hoc Networks,” IEEE Trans. Mobile Computing, vol. 5, no. 11, pp. 1515-1532, Nov. 2006. [2] T. Hara and S.K. Madria, “Consistency Management Strategies for Data Replication in Mobile Ad Hoc Networks,” IEEE Trans. Mobile Computing, vol. 8, no. 7, pp. 950-967, July 2009. [3] S.-Y. Wu and Y.-T. Chang, “A User- Centered Approach to Active Replica Management in Mobile Environments,” IEEE Trans. Mobile Computing, vol. 5, no. 11, pp. 1606-1619, Nov. 2006. [4] P. Padmanabhan, L. Gruenwald, A. Vallur, and M. Atiquzzaman, “A Survey of Data Replication Techniques for Mobile Ad Hoc Network Databases,” The Int’l J. Very Large Data Bases, vol. 17, no. 5, pp. 1143-1164, 2008. [5] G. Ding and B. Bhargava, “Peer-to-Peer File-Sharing over Mobile Ad Hoc Networks,” Proc. IEEE Ann. Conf. Pervasive Computing and Comm. Workshops, pp. 104-108, 2004. [6] M. Li, W.-C. Lee, and A. Sivasubramaniam, “Efficient Peer-to-Peer Information Sharing over Mobile Ad Hoc Networks,” Proc. World Wide Web (WWW) Workshop Emerging Applications for Wireless and Mobile Access, pp. 2-6, 2004. [7] T. Hara, “Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility,” Proc. IEEE INFOCOM, pp. 1568- 1576, 2001. [8] L. Yin and G. Cao, “Balancing the Tradeoffs between Data Accessibility and Query Delay in Ad Hoc Networks,” Proc. 0 0.1 0.2 0.3 0.4 0.5 1 2 3 4 5 6 7 8 9 10 Overallselfishness alarm Size of memory space DCG DCG+ DCG(Selfish ness only) DCG+(Selfis hness only) 0 2 4 6 8 10 12 1 2 3 4 5 6 7 8 9 Totalhopcountofdata transmission Relocation Period SAF DCG DCG+ SCF SCF-DS SCF-CN eSCF 0 5 10 15 20 10003000500070009000 Totlalhopcountofdata transmission Size of memory space SAF DCG DCG+ SCF SCF-DS SCF-CN
  • 5. Jaya Krishna Katti et al. Int. Journal of Engineering Research and Application www.ijera.com Vol. 3, Issue 5, Sep-Oct 2013, pp.473-477 www.ijera.com 477 | P a g e IEEE Int’l Symp. Reliable Distributed Systems, pp. 289-298, 2004. [9] L. Anderegg and S. Eidenbenz, “Ad Hoc- VCG: A Truthful and Cost-Efficient Routing Protocol for Mobile Ad Hoc Networks with Selfish Agents,” Proc. ACM MobiCom, pp. 245-259, 2003. [10] D. Hales, “From Selfish Nodes to Cooperative Networks - Emergent Link- Based Incentives in Peer-to-Peer Networks,” Proc. IEEE Int’l Conf. Peer- to-Peer Computing, pp. 151-158, 2004. [11] K. Balakrishnan, J. Deng, and P.K. Varshney, “TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks,” Proc. IEEE Wireless Comm. and Networking, pp. 2137-2142, 2005. [12] H. Miranda and L. Rodrigues, “Friends and Foes: Preventing Selfishness in Open Mobile Ad hoc Networks,” Proc. IEEE Int’l Conf. Distributed Computing Systems Workshops, pp. 440-445, 2003. [13] Y. Yoo and D.P. Agrawal, “Why Does It Pay to be Selfish in a MANET,” IEEE Wireless Comm., vol. 13, no. 6, pp. 87-97, Dec. 2006. [14] Y. Liu and Y. Yang, “Reputation Propagation and Agreement in Mobile Ad-Hoc Networks,” Proc. IEEE Wireless Comm. and Networking Conf., pp. 1510- 1515, 2003. [15] S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad hoc Networks,” Proc. ACM MobiCom, pp. 255-265, 2000. [16] W. Wang, X.-Y. Li, and Y. Wang, “Truthful Multicast Routing in Selfish Wireless Networks,” Proc. ACM MobiCom, pp. 245-259, 2004. [17] V. Srinivasan, P. Nuggehalli, C. Chiasserini, and R. Rao, “Cooperation in Wireless Ad Hoc Networks,” Proc. IEEE INFOCOM, pp. 808-817, 2003. [18] H. Li and M. Singhal, “Trust Management in Distributed Systems,” Computer, vol. 40, no. 2, pp. 45-53, Feb. 2007. [19] G. Cao, L. Yin, and C.R. Das, “Cooperative Cache-Based Data Access in Ad Hoc Networks,” Computer, vol. 37, no. 2, pp. 32-39, Feb. 2004. [20] Jae-Ho Choi, Kyu-Sun Shim, SangKeun Lee, and Kun-Lung Wu, Fellow, IEEE, “Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network”, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 11, NO. 2, FEBRUARY 2012. K. Jaya Krishna was born in Ongole, Prakasam Dt, Andhra Pradesh, India. He received MCA from Anna University, Tamilnadu, India. Presently, he is pursuing M.Tech in C.S.E from QIS College of Engineering& Technology, vengamukkapalem, Ongole, Prakasam Dt, Andhra Pradesh, India. His Research interest includes Computer Networks, Data Mining. T. Venkata Naga Sudheer was born in Marlapadu(V), Prakasam Dt, Andhra Pradesh, India. He received B.Tech from university of JNTUH, Hydrabad, and M.Tech from S.V University, Tirupathi, Andrapradesh, India. Presently, he is working as a Asst.Professor in C.S.E from QIS College of Engineering & Technology, vengamukkapalem, Ongole, Prakasam Dt, Andhra Pradesh, India. His Research interest includes Computer Networks and Data Mining.