SlideShare a Scribd company logo
1 of 5
Download to read offline
http://www.iaeme.com/IJCIET/index.
International Journal of Civil Engineering and Technology (IJCIET)
Volume 8, Issue 2, February 2017, pp.
Available online at http://www.iaeme.com/IJCIET/issues.
ISSN Print: 0976-6308 and ISSN Online: 0976
© IAEME Publication Scopus
A STUDY ON PEER TO
CURRENT NETWORKING
Research
Professor, Sri Ramanu
ABSTRACT
Due to the truth that traditional centralized tr
of P2P network, we need installation a dispensed trusting mechanism to power the reliability
of device. The accept as true with models consciousness o the participants. It divides P2P
network into numerous overlapped companies with unique features and treats it as undergo in
mind courting of companies preserve in thoughts relationship among agencies and friends and
agree with dating amongst pals within the same organization. in a single corporation the
evaluations among individuals come into being thru combos of records statistics of item peers
written thru participants and individual experience of appreciators moreover via amending
those statistics in keeping with versions of human beings abilities to statement.
community the agree with evaluation among companies are obtained by means of way of the
usage of a technique of global hold in mind. At last the take into account degree of aimed pals
is calculated with the useful aid of valuations among participan
receive as right with reviews amongst agencies, then corresponding selection of trade can be
made via the recall degree. The experiments in simulation have demonstrated our version has
strong ability for protective malicious pee
additionally costs little charge inside the re
changes.
Key words: corporation, assessment, accept as true with diploma, network safety
Cite this Article: S. Govindaraj and Dr. Krishna Mohanta
in Current Networking. International Journal of Civil Engineering and Technology
pp. 13–17.
http://www.iaeme.com/IJCIET/issues.
1. INTRODUCTION
P2P carrier has turn out to be one of the most critical programs inside the internet nowadays. but, due
to its traits in decentralization, autonomy, dynamics, self company and heterogeneity, which have
added approximately tremendous traumatic conditions to
people would possibly no longer exchanges with impunity to others. in addition in network, people are
cautious whilst receiving offerings from strangers or presenting service to others. at the same time as
P2P network lacks or responding powerful mechanisms to make sure the protection.
IJCIET/index.asp 13
International Journal of Civil Engineering and Technology (IJCIET)
2017, pp. 13–17 Article ID: IJCIET_08_02_003
http://www.iaeme.com/IJCIET/issues.asp?JType=IJCIET&VType=8&IType=2
6308 and ISSN Online: 0976-6316
Scopus Indexed
A STUDY ON PEER TO PEER NETWORK IN
CURRENT NETWORKING
S. Govindaraj
Research Shcholar, Bharath College, Chennai, India
Dr. Krishna Mohanta
Ramanujar College of Engineering, Chennai, India
ue to the truth that traditional centralized trusting mechanism cannot adapt to the call for
of P2P network, we need installation a dispensed trusting mechanism to power the reliability
of device. The accept as true with models consciousness o the participants. It divides P2P
lapped companies with unique features and treats it as undergo in
mind courting of companies preserve in thoughts relationship among agencies and friends and
agree with dating amongst pals within the same organization. in a single corporation the
ns among individuals come into being thru combos of records statistics of item peers
written thru participants and individual experience of appreciators moreover via amending
those statistics in keeping with versions of human beings abilities to statement.
community the agree with evaluation among companies are obtained by means of way of the
usage of a technique of global hold in mind. At last the take into account degree of aimed pals
is calculated with the useful aid of valuations among participants in the same employer and
receive as right with reviews amongst agencies, then corresponding selection of trade can be
made via the recall degree. The experiments in simulation have demonstrated our version has
strong ability for protective malicious peers and it has fewer errors in desires searching. It
additionally costs little charge inside the re-convergence technique whilst community topology
corporation, assessment, accept as true with diploma, network safety
S. Govindaraj and Dr. Krishna Mohanta, A Study on Peer to Peer Network
International Journal of Civil Engineering and Technology
http://www.iaeme.com/IJCIET/issues.asp?JType=IJCIET&VType=8&IType=2
2P carrier has turn out to be one of the most critical programs inside the internet nowadays. but, due
to its traits in decentralization, autonomy, dynamics, self company and heterogeneity, which have
added approximately tremendous traumatic conditions to protection problem. In human society,
people would possibly no longer exchanges with impunity to others. in addition in network, people are
cautious whilst receiving offerings from strangers or presenting service to others. at the same time as
lacks or responding powerful mechanisms to make sure the protection.
editor@iaeme.com
asp?JType=IJCIET&VType=8&IType=2
EER NETWORK IN
, India
usting mechanism cannot adapt to the call for
of P2P network, we need installation a dispensed trusting mechanism to power the reliability
of device. The accept as true with models consciousness o the participants. It divides P2P
lapped companies with unique features and treats it as undergo in
mind courting of companies preserve in thoughts relationship among agencies and friends and
agree with dating amongst pals within the same organization. in a single corporation the
ns among individuals come into being thru combos of records statistics of item peers
written thru participants and individual experience of appreciators moreover via amending
those statistics in keeping with versions of human beings abilities to statement. In P2P
community the agree with evaluation among companies are obtained by means of way of the
usage of a technique of global hold in mind. At last the take into account degree of aimed pals
ts in the same employer and
receive as right with reviews amongst agencies, then corresponding selection of trade can be
made via the recall degree. The experiments in simulation have demonstrated our version has
rs and it has fewer errors in desires searching. It
convergence technique whilst community topology
corporation, assessment, accept as true with diploma, network safety
A Study on Peer to Peer Network
International Journal of Civil Engineering and Technology, 8(2), 2017,
asp?JType=IJCIET&VType=8&IType=2
2P carrier has turn out to be one of the most critical programs inside the internet nowadays. but, due
to its traits in decentralization, autonomy, dynamics, self company and heterogeneity, which have
protection problem. In human society,
people would possibly no longer exchanges with impunity to others. in addition in network, people are
cautious whilst receiving offerings from strangers or presenting service to others. at the same time as
lacks or responding powerful mechanisms to make sure the protection.
A Study on Peer to Peer Network in Current Networking
http://www.iaeme.com/IJCIET/index.asp 14 editor@iaeme.com
It turns into an essential hassle to installation receive as genuine with dating among friends and to
govern the P2P networks efficiently. Contra posing to massive software program software
backgrounds, the developed and distributed consider version also is the item for loads researchers. In
brand new years, accept as true with manipulate technology of P2P network lure masses of attentions
from home and distant places. The object of researchers is developing corresponding disbursed
consider model for tremendous implementation historical past. Numerous agree with fashions are
constantly growing and their contents are even huge with considered one in every of a kind varieties of
elegance techniques. The trust systems in P2P network are based on feedback statistics and they may
be type of divided into worldwide be given as proper with version and close by keep in mind model.
The obtain as genuine with participants of the circle of relatives are divided into three modes: relation
some of the groups, relation amongst corporations, node believe relation inside the agency. The
historic facts of aim node and character revel in of evaluators accumulated from the people are joined,
to accurate those facts, constant with the difference of evaluation capacity. Then it paperwork the
evaluation of internal people. This model has two factors: global consider control version and close by
do not forget manipulate version. interior P2P network, we adopt a worldwide trust assessment
approach among the groups to build up mutual agree with evaluation.
The preceding ensure the practicality of model and the latter make sure the scalability, dynamism
and safety. therefore, we can't exceptional layout mutual be given as true with set of regulations
among professional groups for worldwide organizations, but we moreover format a don't forget set of
regulations to calculate mutual acquire as real with price for Peer in the identical business enterprise.
We moreover offer a conversion set of policies for Peer remember charge calculation in brilliant
corporations, and verify its meaning by means of the use of corresponding descriptions. The
simulations have validated that our model has plenty plenty less blunders in reason searching. It has
strong capability to protect malicious peer attacking and may pay a good deal much less rate sooner or
later of re-convergence at the same time as community topology form is modified.
2. TRUSTING MANAGE IN THE ORGANISATION
2.1. Eigen Accept as Genuine With Protection Model
Agency is a community for some unmarried purpose. even as the group is set up, its objectives to be
published and it publicizes that this commercial enterprise agency will exceptional transact with this
motive whilst it establishes associated transaction. This don't forget fee can most effective be used at
some point of the manner of transaction with related cause in this organisation. As a whole, the
company has a worldwide agree with charge endowed through all customers. This global trust value is
the whole evaluation made by means of manner of the usage of whole P2P network to the friends of
this company. The agree with control of P2P community goals to set up recall members of the family
amongst Peer and Peer, to manipulate self organized digital society. Therefore, people set up the
organization separately and those businesses will make up a human society: buddies with the equal
capabilities will make up group to form P2P network. One Peer can be the member in numerous
groups. Enterprise is the human society simulation and prepared society is greater green than
disorganized society. This paper assumes that constituted with the resource of way of agencies may be
superior to that without a doubt constituted thru Peer, on performance of downloading and stopping
malicious behavior, and so forth. don't forget manage internal this enterprise model adopts close by
obtain as actual with control model, at the equal time as accept as true with control of all accept as true
with organization in P2P community adopts worldwide bear in mind control model. get hold of as
actual with cost of buddies in a single-of-a-type agencies may be transmitted maximum of the
organizations. In our scheme, the network accepts as right with version has abilities of nearby recall
mechanism inclusive of broadcast with constrained range. This broadcast appears to be a few form of
blindness in particular in P2P network. There isn't always any server to control this broadcast
mechanism, so it's far greater difficult to govern broadcasting range. but, in our nearby model,
S. Govindaraj and Dr. Krishna Mohanta
http://www.iaeme.com/IJCIET/index.asp 15 editor@iaeme.com
broadcast is pleasant constrained the various contributors. Broadcasting charge is very small and
comments statistics is dependable. on the same time as node i wants to apprehend consider diploma of
node j , it'll first of all deliver query request for a few node gadgets belonging to their personal
businesses. The nodes obtained request will maintain domestically related historic records and cross
lower back to node i . based on searched records, node i am able to calculate agree with diploma of
node j in this business corporation. Node i'm able to determine the interacted obstacle of node j in
keeping with this consider degree. After node i and node j cease transaction, close by statistics might
be updated consistent with transaction consequences.
2.2. Agree with Expression Internal Corporations
Agree with control set of rules of Peer is best powerful to the buddies of the identical businesses. First,
we introduce a statistics structure: every node preserves and maintains a hard and fast table and the
records inside the table are used to report transacting history. It no longer handiest consists of
dependable node sequence set but it moreover has different nodes file to transact with this node. In this
version, the reliance popular is installation on a fulfilment transacting amount. This is, node
transaction record is taken care of via instances of a achievement transaction in descending order.
Maintained member structure table in node is examined as table 1. The node identity in desk is not
constrained when you don't forget that facts in desk are incredibly simple and information location is
not big. If required, time restriction may be set to modify and acquire transaction facts in member
desk. With the aid of the usage of deleting the past due node document, the kind of node in desk may
be reduced. Within the network at the equal time as one node in company calculates the final agree
with diploma of another node, it wishes to ship query messages of recorded individuals for network
member desk. Then, the calculation may be accomplished through each member’s evaluation.
3. DYNAMIC ACCEPT AS TRUE WITH VERSION
3.1. Trust Degree Computation
The trust diploma computation inside the organization includes initialization, question, reaction and
remaining answer. Within the community of this paper, whilst a node calculates the very last consider
degree of a few exceptional node, it desires to send query messages to a number of contributors
recorded in close by member table. Then it's going to perform complete computation in step with once
more assessment of each member and upload its non-public close by take into account degree with a
sure percent. Considering the truth that there exists dynamicity within the community, we can also
gain exquisite final don't forget diploma due to special nodes or phased of the equal node. With the
increase of transaction of nodes, the extra its behaviours are mentioned through distinctive nodes, the
extra exhaustive its get hold of as genuine with degree is collected with the aid of using community,
which makes the take shipping of as genuine with degree mirror and anticipate the behaviours of node
more appropriately.
3.2. Trust Control a Number of the Businesses
The receive as proper with the diverse corporations takes all the pals composing a fixed as a whole for
manage, as is not similar to the calculation of single Peer inside the company. it's miles a global
believe version in fact. in this version the agree with relation are divided into three layers: the be given
as authentic with relation the various agencies, the take delivery of as true with relation amongst
business enterprise and node and do not forget relation some of the nodes inside the organization. The
fundamental concept is to set up community endure in thoughts relation to different nodes, consistent
with transactions. Then the transacting consequences may be decrease lower back to its group as
comments. The institution establishes corresponding relation of inner nodes and that of different
corporations. When evaluating the accept as true with diploma of various nodes, if there is not any
relative close by statistics, turn to question the group. After receiving the be given as actual with
A Study on Peer to Peer Network in Current Networking
http://www.iaeme.com/IJCIET/index.asp 16 editor@iaeme.com
degree which comes from internal nodes, the enterprise will select whether or now not or no longer it
belongs to its company: if certain then offer the recollect facts
4. CONCLUSION
We endorse a very specific dynamic remember control model primarily based on institution in this
paper. This model makes a speciality of the schooling of believe assessment and divide P2P network
into several overlapped agencies. Inside the organizations, all participants’ reviews are mixed with
evaluators experience to shape inner opinions of member Peer inside the organizations. In the
meantime, in P2P network, a international consider evaluation technique is used to get the whole trust
assessment of P2P network on single grouping. Finally we are able to get the combination of internal
assessment of group people and fundamental evaluation from P2P to institution. So the very last
consider of unmarried Peer can be received. This model assists that users can acquire correlated agree
with degree of transaction item through restrained liberating query information. it is beneficial to
decorate the success charge in transaction.
REFERENCES
[1] Juels A (2006) RFID security and privacy: A research survey. IEEE J Sel Areas Commun
24(2):381–394MathSciNetCrossRefGoogle Scholar
[2] Ren Y, Chuah M, Yang J, Chen Y (2011) Distributed spatio-temporal social community detection
leveraging template matching. Proc GLOBECOM 2011 1–6
[3] Gu L, Pan Y, Dong M, Ota K (2013) Noncommutative lightweight signcryption for wireless Sensor
networks. Int J Distrib Sens Netw 10(1):547–565Google Scholar
[4] Dong M, Kimata T, Sugiura K, Zettsu K (2014) Quality-of-Experience (QoE) in emerging mobile
social networks. IEICE Trans Inf Syst 97(10):2606–2612CrossRefGoogle Scholar
[5] Dong M, Liu X, Qian Z, Liu A, Wang T (2015) QoE-ensured price competition model for emerging
mobile networks. IEEE Wirel Commun 22(4):50–57CrossRefGoogle Scholar
[6] Su Z, Xu Q (2015) Content distribution over content centric mobile social networks in 5G. IEEE
Commun Mag 53(6):66–72CrossRefGoogle Scholar
[7] Su Z, Xu Q, Zhu H, Wang Y (2015) A novel design for content delivery over software defined
mobile social networks. IEEE Network 29(4):62–67
[8] Engberg SJ, Harning MB, Jensen CD (2004) Zero-knowledge device authentication: Privacy &
security enhanced RFID preserving business value and consumer convenience. Proc PST 89–101
[9] Rhee K, Kwak J, Kim S, et al. (2005) Challenge-response based RFID authentication protocol for
distributed database environment. Secur Pervasive Comput 70–84
[10] Feldhofer M (2004) An authentication protocol in a security layer for RFID smart tags. Proc MEC
2004 59–762
[11] Saito J, Sakurai K (2005) Grouping proof for RFID tags. Adv Inf Netw Appl 621–624
[12] Fan K, Li J, Li H, Liang X, Shen X, Yang Y (2014) RSEL: Revocable secure efficient lightweight
RFID authentication scheme. Concurr Comput Pract Exp 26(5):1084–1096CrossRefGoogle Scholar
[13] Fan K, Wang W, Li H, Yang Y (2015) Adaptive sensing private property protection protocol based
on cloud. Int J Distrib Sens Netw Article ID 743580, 9 pages. DOI: 0.1155/2015/743580
[14] Nana Kwame Gyamfi, Makafui Nyamadi, Prince Appiah, Dr. Ferdinand Katsriku and Dr. Jama-
Deen Abdulai, A Brief Survey of Mobile Forensics Analysis on Social Networking Application.
International Journal of Computer Engineering and Technology, 7(4), 2016, pp. 81– 86.
[15] Chien HY (2007) SASI: A new ultralightweight RFID authentication protocol providing strong
authentication and strong integrity. IEEE Trans Dependable Secure Comput 337–340
S. Govindaraj and Dr. Krishna Mohanta
http://www.iaeme.com/IJCIET/index.asp 17 editor@iaeme.com
[16] Peris-Lopez P, Hernandez-Castro JC, Tapiador JME, et al (2009) Advances in ultralightweight
cryptography for low-cost RFID tags: Gossamer protocol. Inf Secur Appl 56–68
[17] Fan K, Gong Y, Liang CH, Li H, Yang Y (2015) Lightweight and ultralightweight RFID mutual
authentication protocol with cache in the reader for IoT in 5G. Secur Commun Netw.
doi:10.1002/sec.1314, Published online in Wiley Online Library (wileyonlinelibrary.com)Google
Scholar
[18] Cao T, Bertino E, Lei H (2009) Security analysis of the SASI protocol. Dependable Secure Comput
6(1):73–77CrossRefGoogle Scholar
[19] Dimplepreet Kaur, Tanisha and Amit Verma, A Fast Handoff Technique in VANET to Decrease
Delay in Network Using Mobile Nodes. International Journal of Electronics and Communication
Engineering and Technology (IJECET), 7(6), 2016, pp. 101–106.
[20] Bilal Z, Masood A, Kausar F (2009) Security analysis of ultra-lightweight cryptographic protocol
for low-cost RFID tags: Gossamer protocol. Proc NIS 2009 260–267
[21] Tsudik G. YA-TRAP (2006) Yet another trivial RFID authentication protocol. Proc of PerCom
2006. 632–643
[22] Khan G N, Zhu G (2013) Secure RFID authentication protocol with key updating technique. Proc
ICCCN 2013 1–5

More Related Content

What's hot

A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionCSCJournals
 
Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacyvivatechijri
 
Internet service providers responsibilities in botnet mitigation: a Nigerian ...
Internet service providers responsibilities in botnet mitigation: a Nigerian ...Internet service providers responsibilities in botnet mitigation: a Nigerian ...
Internet service providers responsibilities in botnet mitigation: a Nigerian ...IJECEIAES
 
The fate-of-the-semantic-web
The fate-of-the-semantic-webThe fate-of-the-semantic-web
The fate-of-the-semantic-webMarketingfacts
 
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONSQUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONSIJCSEA Journal
 
Common protocol to support disparate communication types within industrial Et...
Common protocol to support disparate communication types within industrial Et...Common protocol to support disparate communication types within industrial Et...
Common protocol to support disparate communication types within industrial Et...Maurice Dawson
 
iCTRE: The Informal community Transformer into Recommendation Engine
iCTRE: The Informal community Transformer into Recommendation EngineiCTRE: The Informal community Transformer into Recommendation Engine
iCTRE: The Informal community Transformer into Recommendation EngineIRJET Journal
 

What's hot (9)

A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
 
204
204204
204
 
Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacy
 
Internet service providers responsibilities in botnet mitigation: a Nigerian ...
Internet service providers responsibilities in botnet mitigation: a Nigerian ...Internet service providers responsibilities in botnet mitigation: a Nigerian ...
Internet service providers responsibilities in botnet mitigation: a Nigerian ...
 
The fate-of-the-semantic-web
The fate-of-the-semantic-webThe fate-of-the-semantic-web
The fate-of-the-semantic-web
 
The Future of PR
The Future of PRThe Future of PR
The Future of PR
 
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONSQUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
 
Common protocol to support disparate communication types within industrial Et...
Common protocol to support disparate communication types within industrial Et...Common protocol to support disparate communication types within industrial Et...
Common protocol to support disparate communication types within industrial Et...
 
iCTRE: The Informal community Transformer into Recommendation Engine
iCTRE: The Informal community Transformer into Recommendation EngineiCTRE: The Informal community Transformer into Recommendation Engine
iCTRE: The Informal community Transformer into Recommendation Engine
 

Similar to Ijciet 08 02_003

Survey on Peer to Peer Car Sharing System Using Blockchain
Survey on Peer to Peer Car Sharing System Using BlockchainSurvey on Peer to Peer Car Sharing System Using Blockchain
Survey on Peer to Peer Car Sharing System Using BlockchainIRJET Journal
 
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Editor IJAIEM
 
IRJET- Cross System User Modeling and Personalization on the Social Web
IRJET- Cross System User Modeling and Personalization on the Social WebIRJET- Cross System User Modeling and Personalization on the Social Web
IRJET- Cross System User Modeling and Personalization on the Social WebIRJET Journal
 
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’S
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’SDiscovering Influential User by Coupling Multiplex Heterogeneous OSN’S
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’SIRJET Journal
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...ijtsrd
 
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPINGIMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPINGijp2p
 
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data RatingA Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data RatingIRJET Journal
 
Trust Based Content Distribution for Peer-ToPeer Overlay Networks
Trust Based Content Distribution for Peer-ToPeer Overlay NetworksTrust Based Content Distribution for Peer-ToPeer Overlay Networks
Trust Based Content Distribution for Peer-ToPeer Overlay NetworksIJNSA Journal
 
The Synereo Whitepaper
The Synereo WhitepaperThe Synereo Whitepaper
The Synereo WhitepaperJoseph Denman
 
IRJET- A New Approach to Product Recommendation Systems
IRJET- A New Approach to Product Recommendation SystemsIRJET- A New Approach to Product Recommendation Systems
IRJET- A New Approach to Product Recommendation SystemsIRJET Journal
 
IRJET- A New Approach to Product Recommendation Systems
IRJET-  	  A New Approach to Product Recommendation SystemsIRJET-  	  A New Approach to Product Recommendation Systems
IRJET- A New Approach to Product Recommendation SystemsIRJET Journal
 
Group level model based online payment fraud detection
Group level model based online payment fraud detectionGroup level model based online payment fraud detection
Group level model based online payment fraud detectionIRJET Journal
 
Global Computing: an Analysis of Trust and Wireless Communications
Global Computing: an Analysis of Trust and Wireless CommunicationsGlobal Computing: an Analysis of Trust and Wireless Communications
Global Computing: an Analysis of Trust and Wireless CommunicationsNicola Mezzetti
 
An Efficient Trust Evaluation using Fact-Finder Technique
An Efficient Trust Evaluation using Fact-Finder TechniqueAn Efficient Trust Evaluation using Fact-Finder Technique
An Efficient Trust Evaluation using Fact-Finder TechniqueIJCSIS Research Publications
 
IRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence TheoryIRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence TheoryIRJET Journal
 
IRJET - YouTube Spam Comments Detection
IRJET - YouTube Spam Comments DetectionIRJET - YouTube Spam Comments Detection
IRJET - YouTube Spam Comments DetectionIRJET Journal
 
IRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based ApproachIRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based ApproachIRJET Journal
 
IRJET - Social Network Message Credibility: An Agent-based Approach
IRJET -  	  Social Network Message Credibility: An Agent-based ApproachIRJET -  	  Social Network Message Credibility: An Agent-based Approach
IRJET - Social Network Message Credibility: An Agent-based ApproachIRJET Journal
 

Similar to Ijciet 08 02_003 (20)

Survey on Peer to Peer Car Sharing System Using Blockchain
Survey on Peer to Peer Car Sharing System Using BlockchainSurvey on Peer to Peer Car Sharing System Using Blockchain
Survey on Peer to Peer Car Sharing System Using Blockchain
 
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
 
IRJET- Cross System User Modeling and Personalization on the Social Web
IRJET- Cross System User Modeling and Personalization on the Social WebIRJET- Cross System User Modeling and Personalization on the Social Web
IRJET- Cross System User Modeling and Personalization on the Social Web
 
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’S
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’SDiscovering Influential User by Coupling Multiplex Heterogeneous OSN’S
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’S
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
 
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPINGIMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
 
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data RatingA Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
 
Trust Based Content Distribution for Peer-ToPeer Overlay Networks
Trust Based Content Distribution for Peer-ToPeer Overlay NetworksTrust Based Content Distribution for Peer-ToPeer Overlay Networks
Trust Based Content Distribution for Peer-ToPeer Overlay Networks
 
The Synereo Whitepaper
The Synereo WhitepaperThe Synereo Whitepaper
The Synereo Whitepaper
 
IRJET- A New Approach to Product Recommendation Systems
IRJET- A New Approach to Product Recommendation SystemsIRJET- A New Approach to Product Recommendation Systems
IRJET- A New Approach to Product Recommendation Systems
 
IRJET- A New Approach to Product Recommendation Systems
IRJET-  	  A New Approach to Product Recommendation SystemsIRJET-  	  A New Approach to Product Recommendation Systems
IRJET- A New Approach to Product Recommendation Systems
 
Group level model based online payment fraud detection
Group level model based online payment fraud detectionGroup level model based online payment fraud detection
Group level model based online payment fraud detection
 
Global Computing: an Analysis of Trust and Wireless Communications
Global Computing: an Analysis of Trust and Wireless CommunicationsGlobal Computing: an Analysis of Trust and Wireless Communications
Global Computing: an Analysis of Trust and Wireless Communications
 
An Efficient Trust Evaluation using Fact-Finder Technique
An Efficient Trust Evaluation using Fact-Finder TechniqueAn Efficient Trust Evaluation using Fact-Finder Technique
An Efficient Trust Evaluation using Fact-Finder Technique
 
IRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence TheoryIRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence Theory
 
ISMI_Management Report
ISMI_Management ReportISMI_Management Report
ISMI_Management Report
 
IRJET - YouTube Spam Comments Detection
IRJET - YouTube Spam Comments DetectionIRJET - YouTube Spam Comments Detection
IRJET - YouTube Spam Comments Detection
 
Ijsrdv7 i10842
Ijsrdv7 i10842Ijsrdv7 i10842
Ijsrdv7 i10842
 
IRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based ApproachIRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based Approach
 
IRJET - Social Network Message Credibility: An Agent-based Approach
IRJET -  	  Social Network Message Credibility: An Agent-based ApproachIRJET -  	  Social Network Message Credibility: An Agent-based Approach
IRJET - Social Network Message Credibility: An Agent-based Approach
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 

Recently uploaded (20)

Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 

Ijciet 08 02_003

  • 1. http://www.iaeme.com/IJCIET/index. International Journal of Civil Engineering and Technology (IJCIET) Volume 8, Issue 2, February 2017, pp. Available online at http://www.iaeme.com/IJCIET/issues. ISSN Print: 0976-6308 and ISSN Online: 0976 © IAEME Publication Scopus A STUDY ON PEER TO CURRENT NETWORKING Research Professor, Sri Ramanu ABSTRACT Due to the truth that traditional centralized tr of P2P network, we need installation a dispensed trusting mechanism to power the reliability of device. The accept as true with models consciousness o the participants. It divides P2P network into numerous overlapped companies with unique features and treats it as undergo in mind courting of companies preserve in thoughts relationship among agencies and friends and agree with dating amongst pals within the same organization. in a single corporation the evaluations among individuals come into being thru combos of records statistics of item peers written thru participants and individual experience of appreciators moreover via amending those statistics in keeping with versions of human beings abilities to statement. community the agree with evaluation among companies are obtained by means of way of the usage of a technique of global hold in mind. At last the take into account degree of aimed pals is calculated with the useful aid of valuations among participan receive as right with reviews amongst agencies, then corresponding selection of trade can be made via the recall degree. The experiments in simulation have demonstrated our version has strong ability for protective malicious pee additionally costs little charge inside the re changes. Key words: corporation, assessment, accept as true with diploma, network safety Cite this Article: S. Govindaraj and Dr. Krishna Mohanta in Current Networking. International Journal of Civil Engineering and Technology pp. 13–17. http://www.iaeme.com/IJCIET/issues. 1. INTRODUCTION P2P carrier has turn out to be one of the most critical programs inside the internet nowadays. but, due to its traits in decentralization, autonomy, dynamics, self company and heterogeneity, which have added approximately tremendous traumatic conditions to people would possibly no longer exchanges with impunity to others. in addition in network, people are cautious whilst receiving offerings from strangers or presenting service to others. at the same time as P2P network lacks or responding powerful mechanisms to make sure the protection. IJCIET/index.asp 13 International Journal of Civil Engineering and Technology (IJCIET) 2017, pp. 13–17 Article ID: IJCIET_08_02_003 http://www.iaeme.com/IJCIET/issues.asp?JType=IJCIET&VType=8&IType=2 6308 and ISSN Online: 0976-6316 Scopus Indexed A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING S. Govindaraj Research Shcholar, Bharath College, Chennai, India Dr. Krishna Mohanta Ramanujar College of Engineering, Chennai, India ue to the truth that traditional centralized trusting mechanism cannot adapt to the call for of P2P network, we need installation a dispensed trusting mechanism to power the reliability of device. The accept as true with models consciousness o the participants. It divides P2P lapped companies with unique features and treats it as undergo in mind courting of companies preserve in thoughts relationship among agencies and friends and agree with dating amongst pals within the same organization. in a single corporation the ns among individuals come into being thru combos of records statistics of item peers written thru participants and individual experience of appreciators moreover via amending those statistics in keeping with versions of human beings abilities to statement. community the agree with evaluation among companies are obtained by means of way of the usage of a technique of global hold in mind. At last the take into account degree of aimed pals is calculated with the useful aid of valuations among participants in the same employer and receive as right with reviews amongst agencies, then corresponding selection of trade can be made via the recall degree. The experiments in simulation have demonstrated our version has strong ability for protective malicious peers and it has fewer errors in desires searching. It additionally costs little charge inside the re-convergence technique whilst community topology corporation, assessment, accept as true with diploma, network safety S. Govindaraj and Dr. Krishna Mohanta, A Study on Peer to Peer Network International Journal of Civil Engineering and Technology http://www.iaeme.com/IJCIET/issues.asp?JType=IJCIET&VType=8&IType=2 2P carrier has turn out to be one of the most critical programs inside the internet nowadays. but, due to its traits in decentralization, autonomy, dynamics, self company and heterogeneity, which have added approximately tremendous traumatic conditions to protection problem. In human society, people would possibly no longer exchanges with impunity to others. in addition in network, people are cautious whilst receiving offerings from strangers or presenting service to others. at the same time as lacks or responding powerful mechanisms to make sure the protection. editor@iaeme.com asp?JType=IJCIET&VType=8&IType=2 EER NETWORK IN , India usting mechanism cannot adapt to the call for of P2P network, we need installation a dispensed trusting mechanism to power the reliability of device. The accept as true with models consciousness o the participants. It divides P2P lapped companies with unique features and treats it as undergo in mind courting of companies preserve in thoughts relationship among agencies and friends and agree with dating amongst pals within the same organization. in a single corporation the ns among individuals come into being thru combos of records statistics of item peers written thru participants and individual experience of appreciators moreover via amending those statistics in keeping with versions of human beings abilities to statement. In P2P community the agree with evaluation among companies are obtained by means of way of the usage of a technique of global hold in mind. At last the take into account degree of aimed pals ts in the same employer and receive as right with reviews amongst agencies, then corresponding selection of trade can be made via the recall degree. The experiments in simulation have demonstrated our version has rs and it has fewer errors in desires searching. It convergence technique whilst community topology corporation, assessment, accept as true with diploma, network safety A Study on Peer to Peer Network International Journal of Civil Engineering and Technology, 8(2), 2017, asp?JType=IJCIET&VType=8&IType=2 2P carrier has turn out to be one of the most critical programs inside the internet nowadays. but, due to its traits in decentralization, autonomy, dynamics, self company and heterogeneity, which have protection problem. In human society, people would possibly no longer exchanges with impunity to others. in addition in network, people are cautious whilst receiving offerings from strangers or presenting service to others. at the same time as lacks or responding powerful mechanisms to make sure the protection.
  • 2. A Study on Peer to Peer Network in Current Networking http://www.iaeme.com/IJCIET/index.asp 14 editor@iaeme.com It turns into an essential hassle to installation receive as genuine with dating among friends and to govern the P2P networks efficiently. Contra posing to massive software program software backgrounds, the developed and distributed consider version also is the item for loads researchers. In brand new years, accept as true with manipulate technology of P2P network lure masses of attentions from home and distant places. The object of researchers is developing corresponding disbursed consider model for tremendous implementation historical past. Numerous agree with fashions are constantly growing and their contents are even huge with considered one in every of a kind varieties of elegance techniques. The trust systems in P2P network are based on feedback statistics and they may be type of divided into worldwide be given as proper with version and close by keep in mind model. The obtain as genuine with participants of the circle of relatives are divided into three modes: relation some of the groups, relation amongst corporations, node believe relation inside the agency. The historic facts of aim node and character revel in of evaluators accumulated from the people are joined, to accurate those facts, constant with the difference of evaluation capacity. Then it paperwork the evaluation of internal people. This model has two factors: global consider control version and close by do not forget manipulate version. interior P2P network, we adopt a worldwide trust assessment approach among the groups to build up mutual agree with evaluation. The preceding ensure the practicality of model and the latter make sure the scalability, dynamism and safety. therefore, we can't exceptional layout mutual be given as true with set of regulations among professional groups for worldwide organizations, but we moreover format a don't forget set of regulations to calculate mutual acquire as real with price for Peer in the identical business enterprise. We moreover offer a conversion set of policies for Peer remember charge calculation in brilliant corporations, and verify its meaning by means of the use of corresponding descriptions. The simulations have validated that our model has plenty plenty less blunders in reason searching. It has strong capability to protect malicious peer attacking and may pay a good deal much less rate sooner or later of re-convergence at the same time as community topology form is modified. 2. TRUSTING MANAGE IN THE ORGANISATION 2.1. Eigen Accept as Genuine With Protection Model Agency is a community for some unmarried purpose. even as the group is set up, its objectives to be published and it publicizes that this commercial enterprise agency will exceptional transact with this motive whilst it establishes associated transaction. This don't forget fee can most effective be used at some point of the manner of transaction with related cause in this organisation. As a whole, the company has a worldwide agree with charge endowed through all customers. This global trust value is the whole evaluation made by means of manner of the usage of whole P2P network to the friends of this company. The agree with control of P2P community goals to set up recall members of the family amongst Peer and Peer, to manipulate self organized digital society. Therefore, people set up the organization separately and those businesses will make up a human society: buddies with the equal capabilities will make up group to form P2P network. One Peer can be the member in numerous groups. Enterprise is the human society simulation and prepared society is greater green than disorganized society. This paper assumes that constituted with the resource of way of agencies may be superior to that without a doubt constituted thru Peer, on performance of downloading and stopping malicious behavior, and so forth. don't forget manage internal this enterprise model adopts close by obtain as actual with control model, at the equal time as accept as true with control of all accept as true with organization in P2P community adopts worldwide bear in mind control model. get hold of as actual with cost of buddies in a single-of-a-type agencies may be transmitted maximum of the organizations. In our scheme, the network accepts as right with version has abilities of nearby recall mechanism inclusive of broadcast with constrained range. This broadcast appears to be a few form of blindness in particular in P2P network. There isn't always any server to control this broadcast mechanism, so it's far greater difficult to govern broadcasting range. but, in our nearby model,
  • 3. S. Govindaraj and Dr. Krishna Mohanta http://www.iaeme.com/IJCIET/index.asp 15 editor@iaeme.com broadcast is pleasant constrained the various contributors. Broadcasting charge is very small and comments statistics is dependable. on the same time as node i wants to apprehend consider diploma of node j , it'll first of all deliver query request for a few node gadgets belonging to their personal businesses. The nodes obtained request will maintain domestically related historic records and cross lower back to node i . based on searched records, node i am able to calculate agree with diploma of node j in this business corporation. Node i'm able to determine the interacted obstacle of node j in keeping with this consider degree. After node i and node j cease transaction, close by statistics might be updated consistent with transaction consequences. 2.2. Agree with Expression Internal Corporations Agree with control set of rules of Peer is best powerful to the buddies of the identical businesses. First, we introduce a statistics structure: every node preserves and maintains a hard and fast table and the records inside the table are used to report transacting history. It no longer handiest consists of dependable node sequence set but it moreover has different nodes file to transact with this node. In this version, the reliance popular is installation on a fulfilment transacting amount. This is, node transaction record is taken care of via instances of a achievement transaction in descending order. Maintained member structure table in node is examined as table 1. The node identity in desk is not constrained when you don't forget that facts in desk are incredibly simple and information location is not big. If required, time restriction may be set to modify and acquire transaction facts in member desk. With the aid of the usage of deleting the past due node document, the kind of node in desk may be reduced. Within the network at the equal time as one node in company calculates the final agree with diploma of another node, it wishes to ship query messages of recorded individuals for network member desk. Then, the calculation may be accomplished through each member’s evaluation. 3. DYNAMIC ACCEPT AS TRUE WITH VERSION 3.1. Trust Degree Computation The trust diploma computation inside the organization includes initialization, question, reaction and remaining answer. Within the community of this paper, whilst a node calculates the very last consider degree of a few exceptional node, it desires to send query messages to a number of contributors recorded in close by member table. Then it's going to perform complete computation in step with once more assessment of each member and upload its non-public close by take into account degree with a sure percent. Considering the truth that there exists dynamicity within the community, we can also gain exquisite final don't forget diploma due to special nodes or phased of the equal node. With the increase of transaction of nodes, the extra its behaviours are mentioned through distinctive nodes, the extra exhaustive its get hold of as genuine with degree is collected with the aid of using community, which makes the take shipping of as genuine with degree mirror and anticipate the behaviours of node more appropriately. 3.2. Trust Control a Number of the Businesses The receive as proper with the diverse corporations takes all the pals composing a fixed as a whole for manage, as is not similar to the calculation of single Peer inside the company. it's miles a global believe version in fact. in this version the agree with relation are divided into three layers: the be given as authentic with relation the various agencies, the take delivery of as true with relation amongst business enterprise and node and do not forget relation some of the nodes inside the organization. The fundamental concept is to set up community endure in thoughts relation to different nodes, consistent with transactions. Then the transacting consequences may be decrease lower back to its group as comments. The institution establishes corresponding relation of inner nodes and that of different corporations. When evaluating the accept as true with diploma of various nodes, if there is not any relative close by statistics, turn to question the group. After receiving the be given as actual with
  • 4. A Study on Peer to Peer Network in Current Networking http://www.iaeme.com/IJCIET/index.asp 16 editor@iaeme.com degree which comes from internal nodes, the enterprise will select whether or now not or no longer it belongs to its company: if certain then offer the recollect facts 4. CONCLUSION We endorse a very specific dynamic remember control model primarily based on institution in this paper. This model makes a speciality of the schooling of believe assessment and divide P2P network into several overlapped agencies. Inside the organizations, all participants’ reviews are mixed with evaluators experience to shape inner opinions of member Peer inside the organizations. In the meantime, in P2P network, a international consider evaluation technique is used to get the whole trust assessment of P2P network on single grouping. Finally we are able to get the combination of internal assessment of group people and fundamental evaluation from P2P to institution. So the very last consider of unmarried Peer can be received. This model assists that users can acquire correlated agree with degree of transaction item through restrained liberating query information. it is beneficial to decorate the success charge in transaction. REFERENCES [1] Juels A (2006) RFID security and privacy: A research survey. IEEE J Sel Areas Commun 24(2):381–394MathSciNetCrossRefGoogle Scholar [2] Ren Y, Chuah M, Yang J, Chen Y (2011) Distributed spatio-temporal social community detection leveraging template matching. Proc GLOBECOM 2011 1–6 [3] Gu L, Pan Y, Dong M, Ota K (2013) Noncommutative lightweight signcryption for wireless Sensor networks. Int J Distrib Sens Netw 10(1):547–565Google Scholar [4] Dong M, Kimata T, Sugiura K, Zettsu K (2014) Quality-of-Experience (QoE) in emerging mobile social networks. IEICE Trans Inf Syst 97(10):2606–2612CrossRefGoogle Scholar [5] Dong M, Liu X, Qian Z, Liu A, Wang T (2015) QoE-ensured price competition model for emerging mobile networks. IEEE Wirel Commun 22(4):50–57CrossRefGoogle Scholar [6] Su Z, Xu Q (2015) Content distribution over content centric mobile social networks in 5G. IEEE Commun Mag 53(6):66–72CrossRefGoogle Scholar [7] Su Z, Xu Q, Zhu H, Wang Y (2015) A novel design for content delivery over software defined mobile social networks. IEEE Network 29(4):62–67 [8] Engberg SJ, Harning MB, Jensen CD (2004) Zero-knowledge device authentication: Privacy & security enhanced RFID preserving business value and consumer convenience. Proc PST 89–101 [9] Rhee K, Kwak J, Kim S, et al. (2005) Challenge-response based RFID authentication protocol for distributed database environment. Secur Pervasive Comput 70–84 [10] Feldhofer M (2004) An authentication protocol in a security layer for RFID smart tags. Proc MEC 2004 59–762 [11] Saito J, Sakurai K (2005) Grouping proof for RFID tags. Adv Inf Netw Appl 621–624 [12] Fan K, Li J, Li H, Liang X, Shen X, Yang Y (2014) RSEL: Revocable secure efficient lightweight RFID authentication scheme. Concurr Comput Pract Exp 26(5):1084–1096CrossRefGoogle Scholar [13] Fan K, Wang W, Li H, Yang Y (2015) Adaptive sensing private property protection protocol based on cloud. Int J Distrib Sens Netw Article ID 743580, 9 pages. DOI: 0.1155/2015/743580 [14] Nana Kwame Gyamfi, Makafui Nyamadi, Prince Appiah, Dr. Ferdinand Katsriku and Dr. Jama- Deen Abdulai, A Brief Survey of Mobile Forensics Analysis on Social Networking Application. International Journal of Computer Engineering and Technology, 7(4), 2016, pp. 81– 86. [15] Chien HY (2007) SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans Dependable Secure Comput 337–340
  • 5. S. Govindaraj and Dr. Krishna Mohanta http://www.iaeme.com/IJCIET/index.asp 17 editor@iaeme.com [16] Peris-Lopez P, Hernandez-Castro JC, Tapiador JME, et al (2009) Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol. Inf Secur Appl 56–68 [17] Fan K, Gong Y, Liang CH, Li H, Yang Y (2015) Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G. Secur Commun Netw. doi:10.1002/sec.1314, Published online in Wiley Online Library (wileyonlinelibrary.com)Google Scholar [18] Cao T, Bertino E, Lei H (2009) Security analysis of the SASI protocol. Dependable Secure Comput 6(1):73–77CrossRefGoogle Scholar [19] Dimplepreet Kaur, Tanisha and Amit Verma, A Fast Handoff Technique in VANET to Decrease Delay in Network Using Mobile Nodes. International Journal of Electronics and Communication Engineering and Technology (IJECET), 7(6), 2016, pp. 101–106. [20] Bilal Z, Masood A, Kausar F (2009) Security analysis of ultra-lightweight cryptographic protocol for low-cost RFID tags: Gossamer protocol. Proc NIS 2009 260–267 [21] Tsudik G. YA-TRAP (2006) Yet another trivial RFID authentication protocol. Proc of PerCom 2006. 632–643 [22] Khan G N, Zhu G (2013) Secure RFID authentication protocol with key updating technique. Proc ICCCN 2013 1–5