A simulation is an attempt to model a system in order to study it scientifically. Simulations are the most popular tool for examine peer-to-peer (P2P) applications. The cost of implementation of simulated model is less than that of large-scale experiments and, if carefully constructed, the simulated model can be more realistic than any tractable mathematical model. Simulating P2P overlay networks is a common problem for researchers and developers because P2P systems can consist of million of nodes and dynamic in nature. So that simulation for such a large dynamic network is difficult due to technical constraints even on the most powerful machines. In this paper we focus on various available P2P simulators and summarized them against a proposed set of attributes such as scalability, architecture language and pros and cons of each simulator.
In peer to peer (P2P) systems agent based load balancing is one of the most important problem. P2P systems are characterized by decentralization, scalability and dynamicity, such that they can been seen as instances of complex adaptive systems (CAS). In this paper we present ant-based load balancing algorithm, which effectively balances loads of peers distributed among P2P systems with the help of autonomous agents called Ants. Ants search a pair of overloaded and underloaded nodes through wandering on network and transfer tasks from different overloaded nodes to different underloaded nodes simultaneously. It is assumed that time break that ants spend on searching a pair of overloaded, underloaded node and transfer of virtual servers between them is negligible. The algorithm developed increases response time of submitted jobs and decreases communication overhead by load transfer in terms of virtual servers between overloaded and underloaded nodes simultaneously.
In the recent trends, technology has advanced so much that most of the individuals are using internet for communication purpose. It became very easy, accurate and fast to send data with the help of internet from one end to another across the world. The major issue while sending data over the internet is the security of the data whether it is personal or confidential. Many of the techniques are there for protecting the data, but data hiding is the most protective technique in data security. Basically, Data hiding is a technique in which secret data is embedded into the cover image and at the receiver side, the host will extract the secret data. Another technique is reversible data hiding (RDH) in which the host can extract the secret data as well as the original image without any loss of data. In this paper, we represent an overview of the recent research in the field of the reversible data hiding techniques, related methods and procedures.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.