replication algorithm based on identity for improving ... · replication algorithm based on...

12
Replication Algorithm Based on Identity for Improving Query Efficiency in P2P Systems Dr.AR.Arunachalam 1 , G.Michael 1 Professor,Department of Computer Science and Engineering 2 Asst.Professor, Department of Computer Science and Engineering Department of CSE, BIST, BIHER, Bharath University, Chennai. arunachalam.cse@bharathuniv.ac.in, michael.cse@bharathuniv.ac.in, ABSTRACT In appropriated file sharing structures, the progression which is generally used to overhaul record ask for capacity is record replication. Most chronicle replication frameworks duplicate records in all terminals or two end reasons for a customer server. Regardless, these strategies either have low sufficiency or consolidate some enormous traps of high overhead. Record replication in server side upgrades multiplication hit rate, from this time forward, query ability yet makes over-weight terminals and can't unmitigated reduce ask for way length. Report replication in customer side could extraordinarily decrease ask for way length, yet can't ensure high pantomime hit rate to thoroughly use augmentations. Despite the way that replication along ask for route manages these issues, it comes at a high cost of overhead in perspective of more pantomimes and delivers underutilized ages. This paper displays a Capable and Reconciling Decentralized (CRD) chronicle replication assuming that completions high demand reasonability and high copy use at an out of a general sense immaterial effort. CRD upgrades the utilization of document proliferations by choosing demand development center concentrations and reliable requesters as copy terminals and sensibly changing as per non uniform and time-shifting record notoriety and terminal side intrigue. Not in any manner like current frameworks, CRD makes and erases ages in a decentralized self-satisfying way while ensures high pantomime utilize. In an open P2P framework, a terminal may not will to have pantomimes for others. In this manner, we utilized personality based cryptography to help with the security and execution basic errand of client characters in passed on frameworks. We mistreat these segments in scattered frameworks by committing an ID and giving the related character based private key to each joining terminal. KeywordsCRD, Private Key Generator, P2P, Identity Based Encryption. 1. INTRODUCTION This paper manages the acquaintance of security with the document replication environment in a distributed record sharing frameworks [1-3] where the terminals interconnected with one another and which additionally gets the records from reproduction server for sharing so as to lessen the server load the document with the server. This is distinguished by discovering the inquiry load from the neighboring terminals by the way making them as activity center points furthermore to make them as the copy terminals for the server. In this spot we find that there could be a security rupture on the recreated record thus we wanted to give security by utilizing id based[4-9] key made in light of the beneficiary terminal id that is utilized to scramble the information i.e. open key and the information is sent to accepting terminal then the decoding is done utilizing private key by the beneficiary. 2.RELATED WORK In the current system for CRD they have not characterized any security strategies to it. A few Malicious elements that can control ID task can probabilistically demonstrat to themselves as the wellspring of chose substance or steering messages, and can in this way subvert the directing conventions, dirty the conveyed substance, or anticipate position of honest to goodness content. A Sybil assault is one in which an assailant subverts the notoriety arrangement of a distributed system by making a substantial number of pseudonymous elements, utilizing them to pick up an excessively vast impact [10-13]. A notoriety framework's defenselessness to a Sybil assault relies on upon how economically International Journal of Pure and Applied Mathematics Volume 118 No. 18 2018, 1055-1065 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu Special Issue ijpam.eu 1055

Upload: others

Post on 26-Aug-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Replication Algorithm Based on Identity for Improving ... · Replication Algorithm Based on Identity for Improving Query Efficiency in P2P Systems Dr.AR.Arunachalam 1, G.Michael 1Professor,

Replication Algorithm Based on Identity for Improving

Query Efficiency in P2P Systems

Dr.AR.Arunachalam1, G.Michael

1Professor,Department of Computer Science and Engineering 2Asst.Professor, Department of Computer Science and Engineering

Department of CSE, BIST, BIHER, Bharath University, Chennai.

[email protected], [email protected],

ABSTRACT

In appropriated file sharing structures, the progression

which is generally used to overhaul record ask for

capacity is record replication. Most chronicle

replication frameworks duplicate records in all

terminals or two end reasons for a customer server.

Regardless, these strategies either have low sufficiency

or consolidate some enormous traps of high overhead.

Record replication in server side upgrades

multiplication hit rate, from this time forward, query

ability yet makes over-weight terminals and can't

unmitigated reduce ask for way length. Report

replication in customer side could extraordinarily

decrease ask for way length, yet can't ensure high

pantomime hit rate to thoroughly use augmentations.

Despite the way that replication along ask for route

manages these issues, it comes at a high cost of overhead

in perspective of more pantomimes and delivers

underutilized ages. This paper displays a Capable and

Reconciling Decentralized (CRD) chronicle replication

assuming that completions high demand reasonability

and high copy use at an out of a general sense

immaterial effort. CRD upgrades the utilization of

document proliferations by choosing demand

development center concentrations and reliable

requesters as copy terminals and sensibly changing as

per non uniform and time-shifting record notoriety and

terminal side intrigue. Not in any manner like current

frameworks, CRD makes and erases ages in a

decentralized self-satisfying way while ensures high

pantomime utilize. In an open P2P framework, a

terminal may not will to have pantomimes for others. In

this manner, we utilized personality based

cryptography to help with the security and execution

basic errand of client characters in passed on

frameworks. We mistreat these segments in scattered

frameworks by committing an ID and giving the related

character based private key to each joining terminal.

Keywords—CRD, Private Key Generator, P2P, Identity

Based Encryption.

1. INTRODUCTION

This paper manages the acquaintance of security with

the document replication environment in a distributed

record sharing frameworks [1-3] where the terminals

interconnected with one another and which

additionally gets the records from reproduction server

for sharing so as to lessen the server load the

document with the server. This is distinguished by

discovering the inquiry load from the

neighboring terminals by the way making them as

activity center points furthermore to make them as

the copy terminals for the server. In this spot we find

that there could be a security rupture on the recreated

record thus we wanted to give security by utilizing id

based[4-9]

key made in light of the beneficiary terminal id that is

utilized to scramble the information i.e. open key and

the information is sent to accepting terminal then the

decoding is done utilizing private key by the

beneficiary.

2.RELATED WORK

In the current system for CRD they have not

characterized any security strategies to it. A few

Malicious elements that can control ID task can

probabilistically demonstrat to themselves as the

wellspring of chose substance or steering messages,

and can in this way subvert the directing conventions,

dirty the conveyed substance, or anticipate position

of honest to goodness content. A Sybil assault is one

in which an assailant subverts the notoriety

arrangement of a distributed system by making a

substantial number of pseudonymous elements,

utilizing them to pick up an excessively vast impact

[10-13]. A notoriety framework's defenselessness to a

Sybil assault relies on upon how economically

International Journal of Pure and Applied MathematicsVolume 118 No. 18 2018, 1055-1065ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version)url: http://www.ijpam.euSpecial Issue ijpam.eu

1055

Page 2: Replication Algorithm Based on Identity for Improving ... · Replication Algorithm Based on Identity for Improving Query Efficiency in P2P Systems Dr.AR.Arunachalam 1, G.Michael 1Professor,

characters can be produced, the extent to which the

notoriety framework acknowledges inputs from

substances that don't have a chain of trust connecting

them to a trusted element. A defective terminal or a

foe might show numerous personalities to a

distributed system with a specific end goal to show

up and capacity as particular terminals. By turning

out to be a piece of the shared system, the foe might

then catch correspondences or act malevolently. By

disguising and showing different characters, the foe

can control the system significantly.

3.SYSTEM ARCHITECTURE

We propose to utilization of character based

cryptography to help with the security and execution

basic task of client personalities in P2P frameworks.

Character based cryptosystems use literary strings to

get open keys from cryptographic parameters

publicized inside of a space. We misuse these

components in P2P frameworks by doling out an ID

and giving the related character based private key to

every joining terminal [14-19].

The usage of security upgrade in the CRD document

replication is appeared in the Fig 1. Here, the

structural planning is isolated into three noteworthy

parts: server, customer and security highlight has a

third part. In this a terminal will go about as both

server and customer, the customer will work as

joining to a server and leaving from it. Also, server

will acknowledge the solicitation and reaction to the

customers for joining and leave. The fundamental

capacity of server is to duplicate the record utilizing

CRD calculation and chooses the copy terminal from

its neighboring terminals. On seeing the

correspondence between the copy server and

customers (terminals) we utilize character based

encryption to give security by utilizing personality

and encoding/unscrambling the duplicating

substance[20-24].

Fig1. System Architecture

In our proposed system, identities and keys are

derived directly from the IP addresses of the

participating entities—thus, there is no key-to-

identity binding ambiguity for a trusted certification

authority to resolve via signature. Users of the system

compute the public keys of their peers directly. Then

to secure the content from getting polluted we plan to

encrypt and decrypt the replicated information

between each terminal which is done by using the

public key cryptography especially the RSA

algorithm for safer data replication[25-30].

3.1 Terminal Joining and Leaving

Fig 2 speaks to the terminal in the shared

frameworks. In shared frameworks every terminal

can fill in as customer or server in light of the

distributed of hot documents or asking for the

comparing record. So that every terminal can join or

leave any of their adjacent terminals by giving their

International Journal of Pure and Applied Mathematics Special Issue

1056

Page 3: Replication Algorithm Based on Identity for Improving ... · Replication Algorithm Based on Identity for Improving Query Efficiency in P2P Systems Dr.AR.Arunachalam 1, G.Michael 1Professor,

IP location of the customer where they wish to join,

in the wake of joining the directing tables present,

both the ancestor and the successor terminals are

overhauled with the recently joined terminal. Every

terminal will have the steering data furthermore the

neighboring terminals subtle elements and it will

keep up antecedent and successor and overhauls

appropriately when any terminals leaves or joins [31-

33]. At the point when another customer terminal

joins the distributed system we have to advise the

successor and additionally forerunner for keeping up

the directing data. At the point when any customer

needs to leave from the shared system they will be

eased quickly after they advise the forerunner when

they don't have any successor or else they have to

educate both successor and ancestor so that the

steering data we trade to exchanged among the

successor.

Fig2. Terminal Representations in P2P

Systems

The following two algorithms show that how the

terminal joins and leaves in the P2P systems.

Terminal joining:

Get its terminal ID

Fabricate its directing table and neighbor list

Advise its forerunner and successor

Get the records in terminalID space [pre.ID, ID] and

[ID, suc.ID]

Get the files of imitations in its antecedent and

successor

Intermittently process the question rate of each of the

copies of f

In the event that qf > Tq then

Solicitation a copy from the proprietor of the

reproduction

Terminal taking off:

Inform its forerunner and successor

Move documents in [pre.ID,ID] to its forerunner

Move records in [ID,suc.ID] to its successor

on the off chance that [suc:ID - ID] < [ID – pre:ID]

then

N=successor

else

N=predecessor

Exchange every one of its imitations to N

Exchange the records of its reproductions to the next

neighbour

3.2 CRD File Replication Algorithm

CRD utilizations question activity center points

reproduction terminals to guarantee high imitation hit

rate and which doesn't make copies on all terminals

or on the customer to server way [34-36]. It

accomplishes more inquiry proficiency to Path

however makes a great deal less reproductions. It

likewise gives higher hit rate than Client side

International Journal of Pure and Applied Mathematics Special Issue

1057

Page 4: Replication Algorithm Based on Identity for Improving ... · Replication Algorithm Based on Identity for Improving Query Efficiency in P2P Systems Dr.AR.Arunachalam 1, G.Michael 1Professor,

furthermore decreases the lookup way length and

stays away from the over-burdening copy terminals

in Serverside.CRD takes every one of the upsides of

document reproductions by powerfully picking

imitation terminals taking into account record

question rate.

To begin with, CRD points in minimizing the

reproductions and to accomplish high record inquiry

productivity. More imitations lead to higher question

effectiveness and the other way around [5]. CRD

recreates a document in terminals with high inquiry

movement of the record, accordingly lessening more

copies while it guarantees high hit rate and similar

question effectiveness.

Second, instead of relying upon a document

proprietor to decide reproduction creation and

cancellation in a brought together way, the CRD

expects to direct the operations in a decentralized

way without trading off imitation use. Part a huge

document into little pieces can build the

administration limit of a substantial record quickly.

Imitating document area clue along an inquiry way

can likewise enhance record question productivity.

Calculation

Occasionally ascertain inquiry load

in the event that it is over-burden by a component of

y

{

in the event that there are document replication

demands amid T

{

Request replication requesters in light of their qf in a

slipping request

While(sumation qf < (underload i-y)) do

{

Replication document to replication requester on the

highest priority on the rundown

Expel the replication requester from the highest

priority on the rundown

}

else

Reproduce document to the neighbor terminals that

most every now and again forward questions for

record f

}

else

for each asked for document replication by a terminal

with qft

on the off chance that qft * distance(hop) *

lq(resource utilization) > r(cost)

Make a replication to the replication requester

3.3 IBE in Securing Terminals

Identity-based systems allow any party to generate a

open key from a referred to personality esteem, for

example, an ASCII string [7]. A trusted outsider

produces the comparing private keys and which is

known as the Private Key Generator. To work, the

PKG first distributes an expert open key, and holds

the comparing expert private key (alluded to as

expert key). The accompanying Fig 3 demonstrates

that how two customers getting their private keys

from the PKG and how it's sharing their documents.

International Journal of Pure and Applied Mathematics Special Issue

1058

Page 5: Replication Algorithm Based on Identity for Improving ... · Replication Algorithm Based on Identity for Improving Query Efficiency in P2P Systems Dr.AR.Arunachalam 1, G.Michael 1Professor,

Fig3. IBE Setup

Given the expert open key, any gathering can register

an open key combining so as to compare to the

personality ID the expert open key with the character

quality. To get a relating private key, the gathering

approved to utilize the personality ID contacts the

PKG [1], which uses the expert private key to

produce the private key for character ID.

Accordingly, gatherings might scramble messages (or

check marks) with no former dispersion of keys

between individual members. This is to a great

degree valuable in situations where pre-appropriation

of validated keys is awkward or infeasible because of

specialized restrictions. In any case, to decode or sign

messages, the approved client must acquire the fitting

private key from the PKG [10]. Once the keys are

acquired by the taking an interest terminals then we

have to do safe replication by utilizing either

symmetric or uneven sort of calculations, here we

utilize RSA to endeavor the element of encryption

and unscrambling

Calculation

Setup

data: a security parameter t

yield: params and expert key(public,private)

Concentrate

data: params, expert key,and ID {0,1}*

yield: dID

Encode

info: params, ID {0,1}*,M m

yield: C

Decode

info: params, dID, C c

4. PERFORMANCE EVALUATION

We contrasted the execution of CRD and ServerSide,

ClientSide, and Path in both static and element

situations. Investigation results demonstrate that

CRD accomplishes high document question

proficiency, high hit rate, and adjusted burden

appropriation with less record imitations. CRD's

decentralized adjustment system is more viable and

which likewise ensured the high imitation use. To be

similar, the server is over-burden in all replication

calculations we utilize the same number of

replication operations. While replication operation,

the server duplicates the record by picking one of its

neighbors in ServerSide, a successive requester in

ClientSide, and all terminals in a lookup way in Path.

In this way Path recreates to various terminals in one

replication operation and CRD, ServerSide, and

ClientSide repeat a record to a solitary terminal. This

conveyance shows to this present reality, where there

are machines with limits that shift by diverse requests

of extent. The asked for documents and the record

requesters were pick haphazardly in the examination.

Document lookups were produced by Poisson

procedure at a rate of one every second.

International Journal of Pure and Applied Mathematics Special Issue

1059

Page 6: Replication Algorithm Based on Identity for Improving ... · Replication Algorithm Based on Identity for Improving Query Efficiency in P2P Systems Dr.AR.Arunachalam 1, G.Michael 1Professor,

4.1 Effectiveness of Replication Algorithms

Fig.4 shows the quantity of replication operations

when a server is over-burden verses the copy hit rate

of diverse calculations. In this we can watch that the

minimum hit rate was produced by Clientside. Way

prompts higher hit rate than CRD and CRD has

higher hit rate than ServerSide. Here, Clientside has

low imitation hit rate. ServerSide reproduces a

document close to its proprietor such that an inquiry

for the record has high likelihood to experience a

reproduction terminal before it touches base at the

record proprietor. The outcome that CRD prompts

higher hit rate than ServerSide is especially charming

given that they have the same number of copies. In

spite of the fact that ServerSide has high plausibility

for a question to meet a reproduction terminal close

to the record server, it is not ensured [2]. CRD

imitates a document at activity center points or

successive requesters and guaranteeing high hit rate.

This suggests the adequacy of CRD to repeat

documents in terminals with high question rate,

which upgrades the use of imitations, and

subsequently, lessens the lookup way

length.

Fig4. Replica hit rate

Path replicates files at terminals along a routing path.

More replica terminals render higher possibility for a

file request to meet a replica terminal. Therefore,

Path increases replica hit rate and which produces

shorter path length. However, its efficiency is

outweighed by its prohibitive cost of overhead for

keeping track of query paths and maintaining much

more file replicas.

4.2 OverhCRD of Replication Algorithms

Fig5. Number of replicas

Fig 5 shows the aggregate number of imitations in

distinctive calculations. It demonstrates that when the

quantity of replication operations builds then the

quantity of reproductions likewise increments. The

quantity of copies of Path is higher than the others,

and that of others keeps just about the same. This is

on the grounds that in every document replication

operation, a record is recreated in a solitary terminal

in CRD, Clientside, Serverside however in numerous

terminals along a steering way in Path. Along these

lines, Path needs much higher overhead for document

replication and reproduction upkeep. Accordingly,

Path has shore lookup way and high hit rate, yet this

advantage comes at the expense of restrictively

higher overhead.

4.3 Effectiveness of Decentralized Adaptation

Fig.6 demonstrates the viability of decentralized

imitation adjustment system in EAD. We utilize EAD

without adaption and EAD with adaption to indicate

EAD without and with this procedure, separately. In

this test, the quantity of hot documents is run from 50

to 10 with 10 diminishes in every

International Journal of Pure and Applied Mathematics Special Issue

1060

Page 7: Replication Algorithm Based on Identity for Improving ... · Replication Algorithm Based on Identity for Improving Query Efficiency in P2P Systems Dr.AR.Arunachalam 1, G.Michael 1Professor,

stride.

Fig6. Effectiveness in EAD: Number of Replicas

Fig. 6 demonstrates that the quantity of reproductions

of EAD with adaption diminishes as the quantity of

hot records diminishes, while that of EAD without

adaption keeps consistent. EAD with adaption

modifies the quantity of document imitations

adaptively in light of the record question rate such

that less asked for records have less document copies

and the other way around. This outcome

demonstrates that EAD with adaption executes and in

addition EAD without adaption as to lookup

effectiveness and imitation hit rate. Be that as it may,

EAD with adaption makes reproductions for hot

records relating to inquiry rate to keep imitations

advantageous furthermore diminishes pointless

copies. In this way, EAD with adaption ensures high

imitation use.

4.4 Performance of ID based Encryption

Utilizing ID based Encryption with CRD is

fundamentally utilized for the security of the

documents which repeats [9]. By utilizing this, just

the approved clients can join in the system and

repeats the document. One of the real preferences of

any personality based encryption plan is that after the

sum total of what clients have been issued with keys

the outsider's mystery can be pulverized. In addition,

as open keys are gotten from identifiers, IBE

dispenses with the requirement for an open key

conveyance base. The credibility of the general

population keys is ensured certainly the length of the

vehicle of the private keys to the comparing client is

kept secure. At the point when the beneficiary

contacts the PKG to recover the private key for this

open key, the PKG can assess the identifier and

decrease the extraction if the lapse date has passed.

For the most part, inserting information in the ID

compares to opening an extra channel in the middle

of sender and PKG with genuineness ensured through

the reliance of the private key on the identifier.

5. CONCLUSION

This paper gave ID based encryption CRD and which

is anything but difficult to execute and forces

negligible computational weight on the asset obliged

gadget and demonstrates the requirement for security

in shared frameworks. Results from this paper have

demonstrated that record replication can be enhanced

by utilizing CRD which repeats just the hot

documents with ease and by utilizing IBE it offers

security to the documents. Later on work, we will

promote study the impact of agitate on the

productivity and viability of CRD. Furthermore, we

can likewise give more security by giving separate

private keys to every terminal and sparing those keys

for all time in the database.

1. Hameed Hussain J., Anbazhgan G., Improve

of the cop of vapour compression

refrigeration system by using thermoelectric

cooler, International Journal of Pure and

Applied Mathematics, V-116, I-14 Special

Issue, PP-585-589, 2017

2. Nakkeeran S., Hussain J.H., Innovative

technique for running a petrol engine with

diesel as a fuel, International Journal of Pure

and Applied Mathematics, V-116, I-18

Special Issue, PP-41-44, 2017

3. Naveenchandran P., Vijayaragavan S.P., A

sensor less control of SPM using fuzzy and

ANFIS technique, International Journal of

Pure and Applied Mathematics, V-116, I-13

Special Issue, PP-43-50, 2017

International Journal of Pure and Applied Mathematics Special Issue

1061

Page 8: Replication Algorithm Based on Identity for Improving ... · Replication Algorithm Based on Identity for Improving Query Efficiency in P2P Systems Dr.AR.Arunachalam 1, G.Michael 1Professor,

4. Hameed Hussain J., Nakkeeran S., Design

and development of pepper plucking

equipment, International Journal of Pure and

Applied Mathematics, V-116, I-14 Special

Issue, PP-573-576, 2017

5. Naveenchandran P., Vijayaragavan S.P., A

high performance inverter fed energy

efficient cum compact microcontroller based

power conditioned distributed photo voltaic

system, International Journal of Pure and

Applied Mathematics, V-116, I-13 Special

Issue, PP-165-169, 2017

6. Golden RenjithNimal R.J., Hussain J.H.,

Stress analysis of gear tooth using metal,

International Journal of Pure and Applied

Mathematics, V-116, I-17 Special Issue, PP-

317-322, 2017

7. Hameed Hussain J., Hariharan R.,

Development of temperature-time and

pressure-time diagrams for diffusion

bonding ti-aa7075 dissimilar materials,

International Journal of Pure and Applied

Mathematics, V-116, I-14 Special Issue, PP-

493-499, 2017

8. Udayakumar R., Khanaa V., Saravanan T.,

Saritha G., Cross layer optimization for

wireless network (WIMAX), Middle - East

Journal of Scientific Research, V-16, I-12,

PP-1786-1789, 2013

9. Khanaa V., Thooyamani K.P., Udayakumar

R., Cognitive radio based network for ISM

band real time embedded system, Middle -

East Journal of Scientific Research, V-16, I-

12, PP-1798-1800, 2013

10. Khanaa V., Mohanta K., Saravanan T.,

Comparative study of uwb communications

over fiber using direct and external

modulations, Indian Journal of Science and

Technology, V-6, I-SUPPL.6, PP-4845-

4847, 2013

11. Kumarave A., Udayakumar R., Web portal

visits patterns predicted by intuitionistic

fuzzy approach, Indian Journal of Science

and Technology, V-6, I-SUPPL5, PP-4549-

4553, 2013

12. Thooyamani K.P., Khanaa V., Udayakumar

R., An integrated agent system for e-mail

coordination using jade, Indian Journal of

Science and Technology, V-6, I-SUPPL.6,

PP-4758-4761, 2013

13. Sengottuvel P., Satishkumar S., Dinakaran

D., Optimization of multiple characteristics

of EDM parameters based on desirability

approach and fuzzy modeling, Procedia

Engineering, V-64, PP-1069-1078, 2013

14. Udayakumar R., Khanaa V., Saravanan T.,

Synthesis and structural characterization of

thin films of sno2 prepared by spray

pyrolysis technique, Indian Journal of

Science and Technology, V-6, I-SUPPL.6,

PP-4754-4757, 2013

15. Udayakumar R., Kumarave A., Rangarajan

K., Introducing an efficient programming

paradigm for object-oriented distributed

systems, Indian Journal of Science and

Technology, V-6, I-SUPPL5, PP-4596-

4603, 2013

16. KeranaHanirex D., Kaliyamurthie K.P.,

Multi-classification approach for detecting

thyroid attacks, International Journal of

Pharma and Bio Sciences, V-4, I-3, PP-

B1246-B1251, 2013

17. Udayakumar R., Khanaa V., Kaliyamurthie

K.P., Performance analysis of resilient ftth

architecture with protection mechanism,

Indian Journal of Science and Technology,

V-6, I-SUPPL.6, PP-4737-4741, 2013

18. Udayakumar R., Khanaa V., Kaliyamurthie

K.P., Optical ring architecture performance

evaluation using ordinary receiver, Indian

Journal of Science and Technology, V-6, I-

SUPPL.6, PP-4742-4747, 2013

19. Udayakumar R., Khanaa V., Saravanan T.,

Chromatic dispersion compensation in

optical fiber communication system and its

simulation, Indian Journal of Science and

International Journal of Pure and Applied Mathematics Special Issue

1062

Page 9: Replication Algorithm Based on Identity for Improving ... · Replication Algorithm Based on Identity for Improving Query Efficiency in P2P Systems Dr.AR.Arunachalam 1, G.Michael 1Professor,

Technology, V-6, I-SUPPL.6, PP-4762-

4766, 2013

20. Sundarraj M., Study of compact ventilator,

Middle - East Journal of Scientific Research,

V-16, I-12, PP-1741-1743, 2013

21. Udayakumar R., Khanaa V., Saravanan T.,

Analysis of polarization mode dispersion in

fibers and its mitigation using an optical

compensation technique, Indian Journal of

Science and Technology, V-6, I-SUPPL.6,

PP-4767-4771, 2013

22. Gopalakrishnan K., PremJeya Kumar M.,

SundeepAanand J., Udayakumar R.,

Thermal properties of doped azopolyester

and its application, Indian Journal of

Science and Technology, V-6, I-SUPPL.6,

PP-4722-4725, 2013

23. Udayakumar R., Khanaa V., Kaliyamurthie

K.P., High data rate for coherent optical

wired communication using DSP, Indian

Journal of Science and Technology, V-6, I-

SUPPL.6, PP-4772-4776, 2013

24. KeranaHanirex D., Kaliyamurthie K.P.,

Kumaravel A., Analysis of improved tdtr

algorithm for mining frequent itemsets using

dengue virus type 1 dataset: A combined

approach, International Journal of Pharma

and Bio Sciences, V-6, I-2, PP-B288-B295,

2015

25. Thooyamani K.P., Khanaa V., Udayakumar

R., Using integrated circuits with low power

multi bit flip-flops in different approch,

Middle - East Journal of Scientific Research,

V-20, I-12, PP-2586-2593, 2014

26. Gopalakrishnan K., SundeepAanand J.,

Udayakumar R., Electrical properties of

doped azopolyester, Middle - East Journal of

Scientific Research, V-20, I-11, PP-1402-

1412, 2014

27. Thooyamani K.P., Khanaa V., Udayakumar

R., Partial encryption and partial inference

control based disclosure in effective cost

cloud, Middle - East Journal of Scientific

Research, V-20, I-12, PP-2456-2459, 2014

28. Sundar Raj M., Saravanan T., Srinivasan V.,

Design of silicon-carbide based cascaded

multilevel inverter, Middle - East Journal of

Scientific Research, V-20, I-12, PP-1785-

1791, 2014

29. Thooyamani K.P., Khanaa V., Udayakumar

R., Wide area wireless networks-IETF,

Middle - East Journal of Scientific Research,

V-20, I-12, PP-2042-2046, 2014

30. Kanniga E., Srikanth S.M.K., Sundhararajan

M., Optimization solution of equal

dimension boxes in container loading

problem using a permutation block

algorithm, Indian Journal of Science and

Technology, V-7, PP-22-26, 2014

31. Arulselvi S., Sundararajan M., Smart control

system in traffic analysis using RTK-GPS

standards, International Journal of Pure and

Applied Mathematics, V-116, I-15 Special

Issue, PP-349-352, 2017

32. Arulselvi S., Karthik B., Sundararajan M., A

frame work for road network extraction

from remotely sensed high resolution

images, International Journal of Pure and

Applied Mathematics, V-116, I-15 Special

Issue, PP-355-360, 2017

33. Arulselvi S., Karthik B., Sundararajan M.,

Super resolution method for Thumbnail

Web image, International Journal of Pure

and Applied Mathematics, V-116, I-15

Special Issue, PP-369-373, 2017

34. Arulselvi S., Karthik B., Sundararajan M.,

Linear framework free rewriting systems,

International Journal of Pure and Applied

Mathematics, V-116, I-15 Special Issue, PP-

363-367, 2017

35. Kanniga E., Selvaramarathnam K.,

Sundararajan M., Kandigital bike operating

system, Middle - East Journal of Scientific

Research, V-20, I-6, PP-685-688, 2014

International Journal of Pure and Applied Mathematics Special Issue

1063

Page 10: Replication Algorithm Based on Identity for Improving ... · Replication Algorithm Based on Identity for Improving Query Efficiency in P2P Systems Dr.AR.Arunachalam 1, G.Michael 1Professor,

36. Lakshmi C., Ponnavaikko M., Sundararajan

M., Improved kernel common vector

method for face recognition varying in

background conditions, Lecture Notes in

Computer Science (including subseries

Lecture Notes in Artificial Intelligence and

Lecture Notes in Bioinformatics), V-6026

LNCS, PP-175-186, 2010

International Journal of Pure and Applied Mathematics Special Issue

1064

Page 11: Replication Algorithm Based on Identity for Improving ... · Replication Algorithm Based on Identity for Improving Query Efficiency in P2P Systems Dr.AR.Arunachalam 1, G.Michael 1Professor,

1065

Page 12: Replication Algorithm Based on Identity for Improving ... · Replication Algorithm Based on Identity for Improving Query Efficiency in P2P Systems Dr.AR.Arunachalam 1, G.Michael 1Professor,

1066