SlideShare uma empresa Scribd logo
1 de 5
Efficient Data Query in Intermittently-Connected Mobile Ad 
Hoc Social Networks 
ABSTRACT: 
This work addresses the problem of how to enable efficient data query in a Mobile 
Ad-hoc SOcial Network (MASON), formed by mobile users who share similar 
interests and connect with one another by exploiting Bluetooth and/or WiFi 
connections. The data query in MASONs faces several unique challenges including 
opportunistic link connectivity, autonomous computing and storage, and unknown 
or inaccurate data providers. Our goal is to determine an optimal transmission 
strategy that supports the desired query rate within a delay budget and at the same 
time minimizes the total communication cost. To this end, we propose a 
centralized optimization model that offers useful theoretic insights and develop a 
distributed data query protocol for practical applications. To demonstrate the 
feasibility and efficiency of the proposed scheme and to gain useful empirical 
insights, we carry out a testbed experiment by using 25 off-the-shelf Dell Streak 
tablets for a period of 15 days. Moreover, extensive simulations are carried out to 
learn the performance trend under various network settings, which are not practical 
to build and evaluate in laboratories.
EXISTING SYSTEM: 
An autonomous social network formed by mobile users who share similar interests 
and connect with one another by exploiting the Bluetooth and/or WiFi connections 
of their mobile phones or portable tablets is called MASON. An individual 
MASON is incomparable with online social networks in terms of the population of 
participants, the number of social connections and the amount of social media. 
MASONs gain significant value by serving as a supplement and augment to online 
social networks and by effectively supporting local community-based ad-hoc social 
networking. it helps discover and update social links that are not captured by 
online social networks and allows a user to query localized data such as local 
knowledge, contacts and expertise, surrounding news and photos, or other 
information that people usually cannot or do not bother to report to online websites 
but may temporarily keep on their portable devices or generate upon a request.A 
query is created by a query issuer. It is delivered by the network toward the nodes 
that can successfully provide an answer (i.e., data providers). If a data provider 
receives the query, it sends the query reply to the query issuer.
DISADVANTAGES OF EXISTING SYSTEM: 
 Opportunistic link connectivity 
 Autonomous computing and storage: 
 Unknown or inaccurate expertise: 
PROPOSED SYSTEM: 
We propose a centralized optimization model that offers useful theoretic insights 
and develop a distributed data query protocol for practical applications. Based on 
the insights gained from the analysis on MASON, a distributed data query protocol 
is proposed, aiming to enable highly efficient ad hoc query under practical 
MASON settings. A distributed protocol for the data query in MASONs is based 
on two key techniques. First, it employs “reachable expertise” as the routing metric 
to guide the transmission of query requests. Second, it exploits the redundancy in 
query transmission. Redundancy is not considered in the analysis due to its 
intractability, but can effectively improve the query delivery rate in practice if it is 
properly controlled.
ADVANTAGES OF PROPOSED SYSTEM: 
 The feasibility and efficiency of the data query protocol is increased 
 The proposed system provides facilities to gain useful empirical insights,. 
 Minimized total communication cost. 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : ASP.net, C#.net 
 Tool : Visual Studio 2010
 Database : SQL SERVER 2008 
REFERENCE: 
Yang Liu, Student Member, IEEE, Yanyan Han, Zhipeng Yang, Student Member, 
IEEE, and Hongyi Wu, Member, IEEE. “Efficient Data Query in Intermittently- 
Connected Mobile Ad Hoc Social Networks”. IEEE TRANSACTIONS ON 
PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO. , APRIL 2014

Mais conteúdo relacionado

Destaque

Evora slideshare
Evora slideshareEvora slideshare
Evora slidesharekartenn
 
Proyecto Gigantes del pasado
Proyecto Gigantes del pasadoProyecto Gigantes del pasado
Proyecto Gigantes del pasadokarina_i
 
Trabalho 2 anexo
Trabalho 2   anexoTrabalho 2   anexo
Trabalho 2 anexoHugocg86
 
Proyecto sobre reciclaje de aceite quemado y lodos resumen tecnico economico
Proyecto sobre reciclaje de aceite quemado y lodos resumen tecnico economicoProyecto sobre reciclaje de aceite quemado y lodos resumen tecnico economico
Proyecto sobre reciclaje de aceite quemado y lodos resumen tecnico economicoHernandez Salazar
 
Azpe te desea Feliz Año 2012
Azpe te desea Feliz Año 2012Azpe te desea Feliz Año 2012
Azpe te desea Feliz Año 2012Azpe Informatica
 
Trabajo tecnologia 10º
Trabajo tecnologia 10ºTrabajo tecnologia 10º
Trabajo tecnologia 10ºsebasf14
 
Jpnmpercubaantamilk12011
Jpnmpercubaantamilk12011Jpnmpercubaantamilk12011
Jpnmpercubaantamilk12011Surya Kala
 
Proyecto las 5’s(camilo rios)
Proyecto las 5’s(camilo rios)Proyecto las 5’s(camilo rios)
Proyecto las 5’s(camilo rios)estefajhn
 
Ute psicologia 2 d0 bimestre - otras variables que determinan la diversi...
Ute psicologia 2 d0 bimestre - otras  variables  que  determinan  la  diversi...Ute psicologia 2 d0 bimestre - otras  variables  que  determinan  la  diversi...
Ute psicologia 2 d0 bimestre - otras variables que determinan la diversi...UTE
 
Trabajo verano Colegio El Castro fyq 3º eso 2013
Trabajo verano Colegio El Castro fyq 3º eso 2013Trabajo verano Colegio El Castro fyq 3º eso 2013
Trabajo verano Colegio El Castro fyq 3º eso 2013Cristina
 
FTV Education Forum - Voters Ed Manual
FTV Education Forum - Voters Ed ManualFTV Education Forum - Voters Ed Manual
FTV Education Forum - Voters Ed Manualdarwinitocaballero
 
TECNOLOGIA 2n ESO: EL PLA INCLINAT
TECNOLOGIA 2n ESO:  EL PLA INCLINATTECNOLOGIA 2n ESO:  EL PLA INCLINAT
TECNOLOGIA 2n ESO: EL PLA INCLINATsinnombre710
 

Destaque (15)

Fraternité
FraternitéFraternité
Fraternité
 
Evora slideshare
Evora slideshareEvora slideshare
Evora slideshare
 
Proyecto Gigantes del pasado
Proyecto Gigantes del pasadoProyecto Gigantes del pasado
Proyecto Gigantes del pasado
 
Rio system
Rio systemRio system
Rio system
 
Trabalho 2 anexo
Trabalho 2   anexoTrabalho 2   anexo
Trabalho 2 anexo
 
Proyecto sobre reciclaje de aceite quemado y lodos resumen tecnico economico
Proyecto sobre reciclaje de aceite quemado y lodos resumen tecnico economicoProyecto sobre reciclaje de aceite quemado y lodos resumen tecnico economico
Proyecto sobre reciclaje de aceite quemado y lodos resumen tecnico economico
 
Azpe te desea Feliz Año 2012
Azpe te desea Feliz Año 2012Azpe te desea Feliz Año 2012
Azpe te desea Feliz Año 2012
 
Trabajo tecnologia 10º
Trabajo tecnologia 10ºTrabajo tecnologia 10º
Trabajo tecnologia 10º
 
Jpnmpercubaantamilk12011
Jpnmpercubaantamilk12011Jpnmpercubaantamilk12011
Jpnmpercubaantamilk12011
 
Proyecto las 5’s(camilo rios)
Proyecto las 5’s(camilo rios)Proyecto las 5’s(camilo rios)
Proyecto las 5’s(camilo rios)
 
Ute psicologia 2 d0 bimestre - otras variables que determinan la diversi...
Ute psicologia 2 d0 bimestre - otras  variables  que  determinan  la  diversi...Ute psicologia 2 d0 bimestre - otras  variables  que  determinan  la  diversi...
Ute psicologia 2 d0 bimestre - otras variables que determinan la diversi...
 
Trabajo verano Colegio El Castro fyq 3º eso 2013
Trabajo verano Colegio El Castro fyq 3º eso 2013Trabajo verano Colegio El Castro fyq 3º eso 2013
Trabajo verano Colegio El Castro fyq 3º eso 2013
 
Curriuculm europeo
Curriuculm europeoCurriuculm europeo
Curriuculm europeo
 
FTV Education Forum - Voters Ed Manual
FTV Education Forum - Voters Ed ManualFTV Education Forum - Voters Ed Manual
FTV Education Forum - Voters Ed Manual
 
TECNOLOGIA 2n ESO: EL PLA INCLINAT
TECNOLOGIA 2n ESO:  EL PLA INCLINATTECNOLOGIA 2n ESO:  EL PLA INCLINAT
TECNOLOGIA 2n ESO: EL PLA INCLINAT
 

Mais de chennaijp

JPEEE1440 Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
JPEEE1440   Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...JPEEE1440   Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
JPEEE1440 Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...chennaijp
 
JPN1423 Stars a Statistical Traffic Pattern
JPN1423   Stars a Statistical Traffic PatternJPN1423   Stars a Statistical Traffic Pattern
JPN1423 Stars a Statistical Traffic Patternchennaijp
 
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...chennaijp
 
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
JPN1420   Joint Routing and Medium Access Control in Fixed Random Access Wire...JPN1420   Joint Routing and Medium Access Control in Fixed Random Access Wire...
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...chennaijp
 
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
JPN1418  PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...JPN1418  PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...chennaijp
 
JPN1417 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
JPN1417  AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...JPN1417  AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
JPN1417 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...chennaijp
 
JPN1416 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
JPN1416  Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...JPN1416  Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
JPN1416 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...chennaijp
 
JPN1415 R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
JPN1415   R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...JPN1415   R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
JPN1415 R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...chennaijp
 
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networks
JPN1411   Secure Continuous Aggregation in Wireless Sensor NetworksJPN1411   Secure Continuous Aggregation in Wireless Sensor Networks
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networkschennaijp
 
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
JPN1414   Distributed Deployment Algorithms for Improved Coverage in a Networ...JPN1414   Distributed Deployment Algorithms for Improved Coverage in a Networ...
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...chennaijp
 
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
JPN1413   An Energy-Balanced Routing Method Based on Forward-Aware Factor for...JPN1413   An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...chennaijp
 
JPN1412 Transmission-Efficient Clustering Method for Wireless Sensor Networ...
JPN1412   Transmission-Efficient Clustering Method for Wireless Sensor Networ...JPN1412   Transmission-Efficient Clustering Method for Wireless Sensor Networ...
JPN1412 Transmission-Efficient Clustering Method for Wireless Sensor Networ...chennaijp
 
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...chennaijp
 
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
JPN1409  Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless NetworksJPN1409  Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networkschennaijp
 
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
JPN1408  Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...JPN1408  Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...chennaijp
 
JPN1406 Snapshot and Continuous Data Collection in Probabilistic Wireless S...
JPN1406   Snapshot and Continuous Data Collection in Probabilistic Wireless S...JPN1406   Snapshot and Continuous Data Collection in Probabilistic Wireless S...
JPN1406 Snapshot and Continuous Data Collection in Probabilistic Wireless S...chennaijp
 
JPN1405 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
JPN1405  RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...JPN1405  RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
JPN1405 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...chennaijp
 
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETsJPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETschennaijp
 
JPM1410 Images as Occlusions of Textures: A Framework for Segmentation
JPM1410   Images as Occlusions of Textures: A Framework for SegmentationJPM1410   Images as Occlusions of Textures: A Framework for Segmentation
JPM1410 Images as Occlusions of Textures: A Framework for Segmentationchennaijp
 
JPM1407 Exposing Digital Image Forgeries by Illumination Color Classification
JPM1407   Exposing Digital Image Forgeries by Illumination Color ClassificationJPM1407   Exposing Digital Image Forgeries by Illumination Color Classification
JPM1407 Exposing Digital Image Forgeries by Illumination Color Classificationchennaijp
 

Mais de chennaijp (20)

JPEEE1440 Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
JPEEE1440   Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...JPEEE1440   Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
JPEEE1440 Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
 
JPN1423 Stars a Statistical Traffic Pattern
JPN1423   Stars a Statistical Traffic PatternJPN1423   Stars a Statistical Traffic Pattern
JPN1423 Stars a Statistical Traffic Pattern
 
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
 
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
JPN1420   Joint Routing and Medium Access Control in Fixed Random Access Wire...JPN1420   Joint Routing and Medium Access Control in Fixed Random Access Wire...
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
 
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
JPN1418  PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...JPN1418  PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
 
JPN1417 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
JPN1417  AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...JPN1417  AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
JPN1417 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
 
JPN1416 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
JPN1416  Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...JPN1416  Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
JPN1416 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
 
JPN1415 R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
JPN1415   R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...JPN1415   R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
JPN1415 R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
 
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networks
JPN1411   Secure Continuous Aggregation in Wireless Sensor NetworksJPN1411   Secure Continuous Aggregation in Wireless Sensor Networks
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networks
 
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
JPN1414   Distributed Deployment Algorithms for Improved Coverage in a Networ...JPN1414   Distributed Deployment Algorithms for Improved Coverage in a Networ...
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
 
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
JPN1413   An Energy-Balanced Routing Method Based on Forward-Aware Factor for...JPN1413   An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
 
JPN1412 Transmission-Efficient Clustering Method for Wireless Sensor Networ...
JPN1412   Transmission-Efficient Clustering Method for Wireless Sensor Networ...JPN1412   Transmission-Efficient Clustering Method for Wireless Sensor Networ...
JPN1412 Transmission-Efficient Clustering Method for Wireless Sensor Networ...
 
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
 
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
JPN1409  Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless NetworksJPN1409  Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
 
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
JPN1408  Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...JPN1408  Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
 
JPN1406 Snapshot and Continuous Data Collection in Probabilistic Wireless S...
JPN1406   Snapshot and Continuous Data Collection in Probabilistic Wireless S...JPN1406   Snapshot and Continuous Data Collection in Probabilistic Wireless S...
JPN1406 Snapshot and Continuous Data Collection in Probabilistic Wireless S...
 
JPN1405 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
JPN1405  RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...JPN1405  RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
JPN1405 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
 
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETsJPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
 
JPM1410 Images as Occlusions of Textures: A Framework for Segmentation
JPM1410   Images as Occlusions of Textures: A Framework for SegmentationJPM1410   Images as Occlusions of Textures: A Framework for Segmentation
JPM1410 Images as Occlusions of Textures: A Framework for Segmentation
 
JPM1407 Exposing Digital Image Forgeries by Illumination Color Classification
JPM1407   Exposing Digital Image Forgeries by Illumination Color ClassificationJPM1407   Exposing Digital Image Forgeries by Illumination Color Classification
JPM1407 Exposing Digital Image Forgeries by Illumination Color Classification
 

Último

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 

Último (20)

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 

JPD1427 Efficient Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks

  • 1. Efficient Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks ABSTRACT: This work addresses the problem of how to enable efficient data query in a Mobile Ad-hoc SOcial Network (MASON), formed by mobile users who share similar interests and connect with one another by exploiting Bluetooth and/or WiFi connections. The data query in MASONs faces several unique challenges including opportunistic link connectivity, autonomous computing and storage, and unknown or inaccurate data providers. Our goal is to determine an optimal transmission strategy that supports the desired query rate within a delay budget and at the same time minimizes the total communication cost. To this end, we propose a centralized optimization model that offers useful theoretic insights and develop a distributed data query protocol for practical applications. To demonstrate the feasibility and efficiency of the proposed scheme and to gain useful empirical insights, we carry out a testbed experiment by using 25 off-the-shelf Dell Streak tablets for a period of 15 days. Moreover, extensive simulations are carried out to learn the performance trend under various network settings, which are not practical to build and evaluate in laboratories.
  • 2. EXISTING SYSTEM: An autonomous social network formed by mobile users who share similar interests and connect with one another by exploiting the Bluetooth and/or WiFi connections of their mobile phones or portable tablets is called MASON. An individual MASON is incomparable with online social networks in terms of the population of participants, the number of social connections and the amount of social media. MASONs gain significant value by serving as a supplement and augment to online social networks and by effectively supporting local community-based ad-hoc social networking. it helps discover and update social links that are not captured by online social networks and allows a user to query localized data such as local knowledge, contacts and expertise, surrounding news and photos, or other information that people usually cannot or do not bother to report to online websites but may temporarily keep on their portable devices or generate upon a request.A query is created by a query issuer. It is delivered by the network toward the nodes that can successfully provide an answer (i.e., data providers). If a data provider receives the query, it sends the query reply to the query issuer.
  • 3. DISADVANTAGES OF EXISTING SYSTEM:  Opportunistic link connectivity  Autonomous computing and storage:  Unknown or inaccurate expertise: PROPOSED SYSTEM: We propose a centralized optimization model that offers useful theoretic insights and develop a distributed data query protocol for practical applications. Based on the insights gained from the analysis on MASON, a distributed data query protocol is proposed, aiming to enable highly efficient ad hoc query under practical MASON settings. A distributed protocol for the data query in MASONs is based on two key techniques. First, it employs “reachable expertise” as the routing metric to guide the transmission of query requests. Second, it exploits the redundancy in query transmission. Redundancy is not considered in the analysis due to its intractability, but can effectively improve the query delivery rate in practice if it is properly controlled.
  • 4. ADVANTAGES OF PROPOSED SYSTEM:  The feasibility and efficiency of the data query protocol is increased  The proposed system provides facilities to gain useful empirical insights,.  Minimized total communication cost. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : ASP.net, C#.net  Tool : Visual Studio 2010
  • 5.  Database : SQL SERVER 2008 REFERENCE: Yang Liu, Student Member, IEEE, Yanyan Han, Zhipeng Yang, Student Member, IEEE, and Hongyi Wu, Member, IEEE. “Efficient Data Query in Intermittently- Connected Mobile Ad Hoc Social Networks”. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO. , APRIL 2014