{"title":"Energy-Constrained Paths for Optimization of Energy Consumption in Wireless Sensor Networks","authors":"D. Hoang, N. Kamyabpour","doi":"10.1109/ICNDC.2013.17","DOIUrl":"https://doi.org/10.1109/ICNDC.2013.17","url":null,"abstract":"A sensor spends a large part of its energy in transmitting its data and relay its neighbours' data. The overall lifetime of a wireless sensor network depends strongly on how a sensor selects its relaying neighbours and the data path to the destination. One critical problem is that if a sensor has to support too many neighbours, its energy is exhausted rapidly and may bring down the whole network. This paper suggests algorithms for assigning weights to links between neighbours taking into account the number of neighbours who rely on them to relay traffic to the destination. In order to do so, the paper also proposes an algorithm for constructing node connectivity based on sensors position within the broadcast range of another sensor, and a shortest energy-constrained path from a sensor to the destination.","PeriodicalId":152234,"journal":{"name":"2013 Fourth International Conference on Networking and Distributed Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131304833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure File Sharing Scheme for Mobile Devices","authors":"Kuo-Hsuan Huang, En-Chi Chang, Chen-Lin Chang","doi":"10.1109/ICNDC.2013.18","DOIUrl":"https://doi.org/10.1109/ICNDC.2013.18","url":null,"abstract":"An ideal file sharing method is all mobile users can directly share their files one-to-one in the mobile peer-to-peer (MP2P) environment. However, some copyright multimedia files usually are shared and downloaded extensively through P2P technology, so P2P technology has a bad reputation by these illegal distribution behaviors. Hence, how to effectively control unauthorized digital content distribution is a security issue that needed to be solved in P2P environment. Accordingly, this paper proposes a scheme that users can access files via mobile devices through wireless communication. And we can reduce the cost and share files quickly by the concept of P2P. In addition, the paper involves Digital Rights Management to protect digital contents from illegal distribution and reproduced. Furthermore, a user can efficiently and legally transfer his license from one of his devices to one another in our scheme.","PeriodicalId":152234,"journal":{"name":"2013 Fourth International Conference on Networking and Distributed Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132704908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Cleaning for Power Quality Monitoring","authors":"Zijing Yang, Junwei Cao, Yanxiang Xu, Huaying Zhang, Peng Yu, Senjing Yao","doi":"10.1109/ICNDC.2013.39","DOIUrl":"https://doi.org/10.1109/ICNDC.2013.39","url":null,"abstract":"Power quality issues are becoming more critical for high-tech enterprises and grid companies. Many power quality monitoring systems are deployed in recent years. Advanced analysis of monitoring data is not widely applied due to the lackness of data management. In this work, data cleaning technology is introduced to enable advanced study of power quality data, with detailed procedures and software implementation. With power quality monitoring data from Shenzhen Power Supply Company, the effectiveness of data cleaning technology applied for power quality data analysis is demonstrated. Cleaned data that avoid voidness and lackness is more feasible in actual usage, as a good basis for further advanced analysis of power quality.","PeriodicalId":152234,"journal":{"name":"2013 Fourth International Conference on Networking and Distributed Computing","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133985759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predicate Priority Based Event Matching Algorithm in Publish/Subscribe System","authors":"M. Xu, Pin Lv, Haibo Wang","doi":"10.1109/ICNDC.2013.38","DOIUrl":"https://doi.org/10.1109/ICNDC.2013.38","url":null,"abstract":"The large distributed interactive simulation system which based on the publish/subscribe model has considerable data, it needs to disseminate accurate data to the interested users quickly, so improving the match efficient is a very important method to solve this problem. Based on the study and comparison of current matching algorithm, we have proposed a predicate priority based event matching algorithm(hereinafter referred to as PPEM). Performance analysis and detailed experimentations are carried out to verify the effectiveness of PPEM. When the number of subscriptions is 10000, the average time of matching one event is only 22.6ms and when we change the type of data distribution or increase the number of event attribute, the average matching time of PPEM is almost unchangeable comparing with bucket and multi-dimension algorithms. All the results show that PPEM achieves high matching efficiency and also has good scalability and robustness.","PeriodicalId":152234,"journal":{"name":"2013 Fourth International Conference on Networking and Distributed Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126129828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}