SlideShare a Scribd company logo
1 of 5
The Design and Evaluation of An Information Sharing 
System for Human Networks 
ABSTRACT: 
With fast-growing consumer demands and rapidly-developing mobile 
technologies, portable mobile devices are becoming a necessity of our daily lives. 
However, existing mobile devices rely on the wireless infrastructure to access 
Internet services provided by central application providers. This architecture is 
inefficient in many situations and also does not utilize abundant interdevice 
communication opportunities in many scenarios. This paper proposes the human 
network (HUNET), a network architecture that enables information sharing 
between mobile devices through direct interdevice communication. We design B-SUB, 
an interest-driven information sharing system for HUNETs. In B-SUB, 
content and user interests are described by tags, which are human-readable strings 
that are designated by users. An experiment is performed to demonstrate the 
effectiveness of this tag-based content description method. To facilitate efficient 
data dissemination, we invent the Temporal Counting Bloom filter (TCBF) to 
encode tags, which also reduces the overhead of content routing. Comprehensive 
theoretical analyses on the parameter tuning of B-SUB are presented and verify B-
SUB’s ability to work efficiently under various network conditions. We then 
extend B-SUB’s routing scheme to provide a stronger privacy guarantee. Extensive 
real-world trace-driven simulations are performed to evaluate the performance of 
BSUB, and the results demonstrate its efficiency and usefulness. 
EXISTING SYSTEM: 
A new architecture of networking portable wireless devices has emerged, which is 
called the delay tolerant networks . DTNs adopt a “store-carry-and-forward” 
model, which significantly expands the communication capability of mobile 
device. Driven by the new application demands and the limitations of the existing 
architecture, we envision a new type of dynamic networking service called human 
networks (HUNETs). Physically, a HUNET is composed of human-carried mobile 
devices, which have the same structure as DTNs. These devices use short-range 
wireless communication technologies, such as WiFi or BlueTooth, to communicate 
with each other. Functionally, HUNETs enable information sharing between users 
in a completely decentralized manner without the aid of an wireless 
communication infrastructure. A high-level illustration of this architecture is 
presented . The figure shows a HUNET composed of four users, each of which 
carries a mobile device. Users share information they are interested in with nearby 
peers through direct interdevice wireless communication.We present B-SUB, an
interest-driven information sharing system for HUNETs, which stands for the 
bloom-filter-based publish/SUBscribe. B-SUB is designed for small to medium 
sized networks composed of dozens of devices restricted in a limited physical area 
where interdevice communication opportunities are abundant.B-SUB employs 
contentbased networking to achieve infrastructureless communication. B-SUB is 
much more efficient than traditional content-based publish/subscribe 
DISADVANTAGES OF EXISTING SYSTEM: 
1. Mobile devices have weak processors and are powered by batteries. Their 
computational capability is rather limited. 
2. TCBF has false positives in their queries, which causes useless messages to be 
forwarded to nodes that are not really interested in their content. 
PROPOSED SYSTEM: 
 We propose HUNET, a novel network architecture that facilitates efficient 
information sharing between portable mobile devices. We design B-SUB, an 
interest-driven information sharing system for HUNETs, a content-based
publish/subscribe that achieves infrastructure-less communication between 
mobile devices. 
 We invent the TCBF, an extension to the counting Bloom filter. 
 We conduct extensive theoretical analyses and real world trace driven 
simulations to evaluate the performance of B-SUB. 
ADVANTAGES OF PROPOSED SYSTEM: 
1. This provides stronger privacy guarantee. 
2. Gives better protect user privacy. 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech.
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : JAVA/J2EE 
 IDE : Netbeans 7.4 
 Database : MYSQL 
REFERENCE: 
Yaxiong Zhao, and Jie Wu, “The Design and Evaluation of An Information 
Sharing System for Human Networks” IEEE TRANSACTIONS ON 
PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 3, MARCH 
2014.

More Related Content

What's hot

Computer Network Theory Part 2
Computer Network Theory Part 2Computer Network Theory Part 2
Computer Network Theory Part 2NishatTasnimAli
 
Shubham comp network final
Shubham comp network finalShubham comp network final
Shubham comp network finalOMGtec
 
Introducing networks
Introducing networksIntroducing networks
Introducing networksMansoor Shar
 
Learning assignment (computer Networking)
Learning assignment (computer Networking)Learning assignment (computer Networking)
Learning assignment (computer Networking)Mehar Arslan
 
Local area network & Metropolitan area network
Local area network & Metropolitan area networkLocal area network & Metropolitan area network
Local area network & Metropolitan area networkNetProtocol Xpert
 
What is Computer Network? Types of computer network, LAN, MAN, WAN
What is Computer Network? Types of computer network, LAN, MAN, WANWhat is Computer Network? Types of computer network, LAN, MAN, WAN
What is Computer Network? Types of computer network, LAN, MAN, WANA. S. M. Shafi
 
A Modern Study of Bluetooth Wireless Technology
A Modern Study of Bluetooth Wireless Technology A Modern Study of Bluetooth Wireless Technology
A Modern Study of Bluetooth Wireless Technology ijcseit
 
Computer Network ASsignment
Computer Network ASsignmentComputer Network ASsignment
Computer Network ASsignmentBijay Bista
 
COMPUTER NETWORK
COMPUTER NETWORK COMPUTER NETWORK
COMPUTER NETWORK MdSahwon
 
Computer Networks Basics
Computer Networks BasicsComputer Networks Basics
Computer Networks Basicsijtsrd
 
Network Infrastructure for E-commerce | Part I
Network Infrastructure for E-commerce | Part INetwork Infrastructure for E-commerce | Part I
Network Infrastructure for E-commerce | Part IHem Pokhrel
 
Types of computer networks
Types of computer networksTypes of computer networks
Types of computer networkshemant Hrhemant5
 
Computer Networking
Computer NetworkingComputer Networking
Computer NetworkingKawsar Ahmed
 
Wi fi mobile-networks
Wi fi mobile-networksWi fi mobile-networks
Wi fi mobile-networksijaz khan
 

What's hot (20)

Assignment1
Assignment1Assignment1
Assignment1
 
Computer Network Theory Part 2
Computer Network Theory Part 2Computer Network Theory Part 2
Computer Network Theory Part 2
 
Shubham comp network final
Shubham comp network finalShubham comp network final
Shubham comp network final
 
Introducing networks
Introducing networksIntroducing networks
Introducing networks
 
Learning assignment (computer Networking)
Learning assignment (computer Networking)Learning assignment (computer Networking)
Learning assignment (computer Networking)
 
Local area network & Metropolitan area network
Local area network & Metropolitan area networkLocal area network & Metropolitan area network
Local area network & Metropolitan area network
 
What is Computer Network? Types of computer network, LAN, MAN, WAN
What is Computer Network? Types of computer network, LAN, MAN, WANWhat is Computer Network? Types of computer network, LAN, MAN, WAN
What is Computer Network? Types of computer network, LAN, MAN, WAN
 
A Modern Study of Bluetooth Wireless Technology
A Modern Study of Bluetooth Wireless Technology A Modern Study of Bluetooth Wireless Technology
A Modern Study of Bluetooth Wireless Technology
 
Dipanshu
DipanshuDipanshu
Dipanshu
 
Lan and wan
Lan and wanLan and wan
Lan and wan
 
Computer Network ASsignment
Computer Network ASsignmentComputer Network ASsignment
Computer Network ASsignment
 
COMPUTER NETWORK
COMPUTER NETWORK COMPUTER NETWORK
COMPUTER NETWORK
 
Computer Networks Basics
Computer Networks BasicsComputer Networks Basics
Computer Networks Basics
 
Network Infrastructure for E-commerce | Part I
Network Infrastructure for E-commerce | Part INetwork Infrastructure for E-commerce | Part I
Network Infrastructure for E-commerce | Part I
 
Networking
NetworkingNetworking
Networking
 
Types of computer networks
Types of computer networksTypes of computer networks
Types of computer networks
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Type of networking
Type of networkingType of networking
Type of networking
 
Computer network
Computer networkComputer network
Computer network
 
Wi fi mobile-networks
Wi fi mobile-networksWi fi mobile-networks
Wi fi mobile-networks
 

Similar to JPJ1444 The Design and Evaluation of An Information Sharing System for Human Networks

2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...IEEEGLOBALSOFTSTUDENTSPROJECTS
 
Location based information sharing system for mobile devices
Location based information sharing system for mobile devicesLocation based information sharing system for mobile devices
Location based information sharing system for mobile deviceseSAT Journals
 
An Introduction To Computer Networking A Survey
An Introduction To Computer Networking  A SurveyAn Introduction To Computer Networking  A Survey
An Introduction To Computer Networking A SurveyCheryl Brown
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & NetworkMaulen Bale
 
Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Uvaraj Shan
 
Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Uvaraj Shan
 
Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Uvaraj Shan
 
Service Based Content Sharing in the Environment of Mobile Ad-hoc Networks
Service Based Content Sharing in the Environment of Mobile Ad-hoc NetworksService Based Content Sharing in the Environment of Mobile Ad-hoc Networks
Service Based Content Sharing in the Environment of Mobile Ad-hoc NetworksIOSR Journals
 
Review of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network ProtocolsReview of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network Protocolsiosrjce
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Telecom trends 261112
Telecom trends 261112Telecom trends 261112
Telecom trends 261112Sharon Rozov
 
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyA study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyaravindhawan
 
Фреймворк промышленного интернета
Фреймворк промышленного интернетаФреймворк промышленного интернета
Фреймворк промышленного интернетаSergey Zhdanov
 
Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...IJCNCJournal
 
VIRALNET: A WAY TO MAKE SHORT-RANGE MESSAGES INSTANTLY VIRAL
VIRALNET: A WAY TO MAKE SHORT-RANGE MESSAGES INSTANTLY VIRALVIRALNET: A WAY TO MAKE SHORT-RANGE MESSAGES INSTANTLY VIRAL
VIRALNET: A WAY TO MAKE SHORT-RANGE MESSAGES INSTANTLY VIRALEman Kanjo
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksAmy Moore
 

Similar to JPJ1444 The Design and Evaluation of An Information Sharing System for Human Networks (20)

2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...
 
Location based information sharing system for mobile devices
Location based information sharing system for mobile devicesLocation based information sharing system for mobile devices
Location based information sharing system for mobile devices
 
An Introduction To Computer Networking A Survey
An Introduction To Computer Networking  A SurveyAn Introduction To Computer Networking  A Survey
An Introduction To Computer Networking A Survey
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & Network
 
Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...
 
Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...
 
Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...
 
Computer network answer
Computer network answerComputer network answer
Computer network answer
 
Service Based Content Sharing in the Environment of Mobile Ad-hoc Networks
Service Based Content Sharing in the Environment of Mobile Ad-hoc NetworksService Based Content Sharing in the Environment of Mobile Ad-hoc Networks
Service Based Content Sharing in the Environment of Mobile Ad-hoc Networks
 
Review of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network ProtocolsReview of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network Protocols
 
A017220112
A017220112A017220112
A017220112
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Telecom trends 261112
Telecom trends 261112Telecom trends 261112
Telecom trends 261112
 
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyA study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
 
Computer network solution
Computer network solutionComputer network solution
Computer network solution
 
Фреймворк промышленного интернета
Фреймворк промышленного интернетаФреймворк промышленного интернета
Фреймворк промышленного интернета
 
Ijetr021256
Ijetr021256Ijetr021256
Ijetr021256
 
Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...
 
VIRALNET: A WAY TO MAKE SHORT-RANGE MESSAGES INSTANTLY VIRAL
VIRALNET: A WAY TO MAKE SHORT-RANGE MESSAGES INSTANTLY VIRALVIRALNET: A WAY TO MAKE SHORT-RANGE MESSAGES INSTANTLY VIRAL
VIRALNET: A WAY TO MAKE SHORT-RANGE MESSAGES INSTANTLY VIRAL
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
 

More from chennaijp

JPEEE1440 Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
JPEEE1440   Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...JPEEE1440   Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
JPEEE1440 Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...chennaijp
 
JPN1423 Stars a Statistical Traffic Pattern
JPN1423   Stars a Statistical Traffic PatternJPN1423   Stars a Statistical Traffic Pattern
JPN1423 Stars a Statistical Traffic Patternchennaijp
 
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...chennaijp
 
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
JPN1420   Joint Routing and Medium Access Control in Fixed Random Access Wire...JPN1420   Joint Routing and Medium Access Control in Fixed Random Access Wire...
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...chennaijp
 
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
JPN1418  PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...JPN1418  PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...chennaijp
 
JPN1417 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
JPN1417  AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...JPN1417  AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
JPN1417 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...chennaijp
 
JPN1416 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
JPN1416  Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...JPN1416  Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
JPN1416 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...chennaijp
 
JPN1415 R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
JPN1415   R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...JPN1415   R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
JPN1415 R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...chennaijp
 
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networks
JPN1411   Secure Continuous Aggregation in Wireless Sensor NetworksJPN1411   Secure Continuous Aggregation in Wireless Sensor Networks
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networkschennaijp
 
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
JPN1414   Distributed Deployment Algorithms for Improved Coverage in a Networ...JPN1414   Distributed Deployment Algorithms for Improved Coverage in a Networ...
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...chennaijp
 
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
JPN1413   An Energy-Balanced Routing Method Based on Forward-Aware Factor for...JPN1413   An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...chennaijp
 
JPN1412 Transmission-Efficient Clustering Method for Wireless Sensor Networ...
JPN1412   Transmission-Efficient Clustering Method for Wireless Sensor Networ...JPN1412   Transmission-Efficient Clustering Method for Wireless Sensor Networ...
JPN1412 Transmission-Efficient Clustering Method for Wireless Sensor Networ...chennaijp
 
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...chennaijp
 
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
JPN1409  Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless NetworksJPN1409  Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networkschennaijp
 
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
JPN1408  Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...JPN1408  Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...chennaijp
 
JPN1406 Snapshot and Continuous Data Collection in Probabilistic Wireless S...
JPN1406   Snapshot and Continuous Data Collection in Probabilistic Wireless S...JPN1406   Snapshot and Continuous Data Collection in Probabilistic Wireless S...
JPN1406 Snapshot and Continuous Data Collection in Probabilistic Wireless S...chennaijp
 
JPN1405 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
JPN1405  RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...JPN1405  RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
JPN1405 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...chennaijp
 
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETsJPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETschennaijp
 
JPM1410 Images as Occlusions of Textures: A Framework for Segmentation
JPM1410   Images as Occlusions of Textures: A Framework for SegmentationJPM1410   Images as Occlusions of Textures: A Framework for Segmentation
JPM1410 Images as Occlusions of Textures: A Framework for Segmentationchennaijp
 
JPM1407 Exposing Digital Image Forgeries by Illumination Color Classification
JPM1407   Exposing Digital Image Forgeries by Illumination Color ClassificationJPM1407   Exposing Digital Image Forgeries by Illumination Color Classification
JPM1407 Exposing Digital Image Forgeries by Illumination Color Classificationchennaijp
 

More from chennaijp (20)

JPEEE1440 Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
JPEEE1440   Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...JPEEE1440   Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
JPEEE1440 Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
 
JPN1423 Stars a Statistical Traffic Pattern
JPN1423   Stars a Statistical Traffic PatternJPN1423   Stars a Statistical Traffic Pattern
JPN1423 Stars a Statistical Traffic Pattern
 
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
 
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
JPN1420   Joint Routing and Medium Access Control in Fixed Random Access Wire...JPN1420   Joint Routing and Medium Access Control in Fixed Random Access Wire...
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
 
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
JPN1418  PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...JPN1418  PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
 
JPN1417 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
JPN1417  AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...JPN1417  AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
JPN1417 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
 
JPN1416 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
JPN1416  Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...JPN1416  Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
JPN1416 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
 
JPN1415 R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
JPN1415   R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...JPN1415   R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
JPN1415 R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
 
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networks
JPN1411   Secure Continuous Aggregation in Wireless Sensor NetworksJPN1411   Secure Continuous Aggregation in Wireless Sensor Networks
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networks
 
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
JPN1414   Distributed Deployment Algorithms for Improved Coverage in a Networ...JPN1414   Distributed Deployment Algorithms for Improved Coverage in a Networ...
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
 
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
JPN1413   An Energy-Balanced Routing Method Based on Forward-Aware Factor for...JPN1413   An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
 
JPN1412 Transmission-Efficient Clustering Method for Wireless Sensor Networ...
JPN1412   Transmission-Efficient Clustering Method for Wireless Sensor Networ...JPN1412   Transmission-Efficient Clustering Method for Wireless Sensor Networ...
JPN1412 Transmission-Efficient Clustering Method for Wireless Sensor Networ...
 
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
 
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
JPN1409  Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless NetworksJPN1409  Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
 
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
JPN1408  Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...JPN1408  Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
 
JPN1406 Snapshot and Continuous Data Collection in Probabilistic Wireless S...
JPN1406   Snapshot and Continuous Data Collection in Probabilistic Wireless S...JPN1406   Snapshot and Continuous Data Collection in Probabilistic Wireless S...
JPN1406 Snapshot and Continuous Data Collection in Probabilistic Wireless S...
 
JPN1405 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
JPN1405  RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...JPN1405  RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
JPN1405 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
 
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETsJPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
 
JPM1410 Images as Occlusions of Textures: A Framework for Segmentation
JPM1410   Images as Occlusions of Textures: A Framework for SegmentationJPM1410   Images as Occlusions of Textures: A Framework for Segmentation
JPM1410 Images as Occlusions of Textures: A Framework for Segmentation
 
JPM1407 Exposing Digital Image Forgeries by Illumination Color Classification
JPM1407   Exposing Digital Image Forgeries by Illumination Color ClassificationJPM1407   Exposing Digital Image Forgeries by Illumination Color Classification
JPM1407 Exposing Digital Image Forgeries by Illumination Color Classification
 

Recently uploaded

Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 

Recently uploaded (20)

Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 

JPJ1444 The Design and Evaluation of An Information Sharing System for Human Networks

  • 1. The Design and Evaluation of An Information Sharing System for Human Networks ABSTRACT: With fast-growing consumer demands and rapidly-developing mobile technologies, portable mobile devices are becoming a necessity of our daily lives. However, existing mobile devices rely on the wireless infrastructure to access Internet services provided by central application providers. This architecture is inefficient in many situations and also does not utilize abundant interdevice communication opportunities in many scenarios. This paper proposes the human network (HUNET), a network architecture that enables information sharing between mobile devices through direct interdevice communication. We design B-SUB, an interest-driven information sharing system for HUNETs. In B-SUB, content and user interests are described by tags, which are human-readable strings that are designated by users. An experiment is performed to demonstrate the effectiveness of this tag-based content description method. To facilitate efficient data dissemination, we invent the Temporal Counting Bloom filter (TCBF) to encode tags, which also reduces the overhead of content routing. Comprehensive theoretical analyses on the parameter tuning of B-SUB are presented and verify B-
  • 2. SUB’s ability to work efficiently under various network conditions. We then extend B-SUB’s routing scheme to provide a stronger privacy guarantee. Extensive real-world trace-driven simulations are performed to evaluate the performance of BSUB, and the results demonstrate its efficiency and usefulness. EXISTING SYSTEM: A new architecture of networking portable wireless devices has emerged, which is called the delay tolerant networks . DTNs adopt a “store-carry-and-forward” model, which significantly expands the communication capability of mobile device. Driven by the new application demands and the limitations of the existing architecture, we envision a new type of dynamic networking service called human networks (HUNETs). Physically, a HUNET is composed of human-carried mobile devices, which have the same structure as DTNs. These devices use short-range wireless communication technologies, such as WiFi or BlueTooth, to communicate with each other. Functionally, HUNETs enable information sharing between users in a completely decentralized manner without the aid of an wireless communication infrastructure. A high-level illustration of this architecture is presented . The figure shows a HUNET composed of four users, each of which carries a mobile device. Users share information they are interested in with nearby peers through direct interdevice wireless communication.We present B-SUB, an
  • 3. interest-driven information sharing system for HUNETs, which stands for the bloom-filter-based publish/SUBscribe. B-SUB is designed for small to medium sized networks composed of dozens of devices restricted in a limited physical area where interdevice communication opportunities are abundant.B-SUB employs contentbased networking to achieve infrastructureless communication. B-SUB is much more efficient than traditional content-based publish/subscribe DISADVANTAGES OF EXISTING SYSTEM: 1. Mobile devices have weak processors and are powered by batteries. Their computational capability is rather limited. 2. TCBF has false positives in their queries, which causes useless messages to be forwarded to nodes that are not really interested in their content. PROPOSED SYSTEM:  We propose HUNET, a novel network architecture that facilitates efficient information sharing between portable mobile devices. We design B-SUB, an interest-driven information sharing system for HUNETs, a content-based
  • 4. publish/subscribe that achieves infrastructure-less communication between mobile devices.  We invent the TCBF, an extension to the counting Bloom filter.  We conduct extensive theoretical analyses and real world trace driven simulations to evaluate the performance of B-SUB. ADVANTAGES OF PROPOSED SYSTEM: 1. This provides stronger privacy guarantee. 2. Gives better protect user privacy. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.
  • 5.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL REFERENCE: Yaxiong Zhao, and Jie Wu, “The Design and Evaluation of An Information Sharing System for Human Networks” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 3, MARCH 2014.