Replica Allocation over a Mobile Ad Hoc Network
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 11
Abstract
Mobile ad hoc network leads to network partitioning or performance degradation when the mobile nodes mobility occur or less stability of resource contents in it. Researchers developed many methods to minimize the performance degradation most of the methods are based on memory space sharing between the nodes. But some of the nodes will not cooperate fully, they partially support and we call these nodes as selfish nodes. These nodes reduce the overall data accessibility in the network. Finally To achieve fair replica allocation among the mobile nodes in the network and makes the reallocation decisions in mobile nodes collaborative.,inovative technique is used named as Collaborative Allocation and Reallocation of replicas with efficiency. This paper examine these selfish node based on the replica allocation to the different nodes in the network. Here the simulations show that this approach is better than the traditional replica allocation in many ways.
Authors and Affiliations
Y. Manga Devi, K. Devi Priya
Comparison Study Among Various Anomaly Detection Techniques
Many approaches are implemented for the detection of anomalies on the system. Anomalies based approaches are considered as efficient from that user intention based approach is preferred for the implementation of anom...
Comparing Tesseract results with and without Character localization for Smartphone application
Tesseract is considered the most accurate free OCR engine in existence. Android operating system based Smartphones application where images taken from camera of mobile device or browsed from gallery are preprocessed....
A level set Image Articulations in presence of disagreement with MRI Scanning
In previous techinices the flow of the level set method for image segmentation can be depicte. A level set methods have been widely use in image processing and computer vision. Intensity in homogeneity often occurs i...
A Reliable Image Steganography with Image Clustering and Robust Steganography using IWT
Steganography is the science that includes imparting mystery information in a suitable sight and multimedia bearer, e.g., picture, sound, and video records. In this paper, we propose a changed secure steganography pla...
A Survey on Peer to Peer sharing using Cloud Based Mobile Social TV (Cloud MoV)
The fast increasing power of personal mobile devices (Smartphone, tablets, etc.) provides more advanced features like news, game app, health tips etc and social interactions to users in day to day life. This developm...