{"title":"Towards a transmission control mechanism for data centers based on flow deadline and size over Software Defined Networking","authors":"Xuesong Qiu, Tianfang Yu","doi":"10.1504/ijipt.2023.10054892","DOIUrl":"https://doi.org/10.1504/ijipt.2023.10054892","url":null,"abstract":"","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":"1 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67131729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distribution and Tracking Current Live Location of Recognized Criminal Face at Decentralized Blockchain through Image","authors":"M. Amjad, Sana Zeba","doi":"10.1504/ijipt.2023.10054246","DOIUrl":"https://doi.org/10.1504/ijipt.2023.10054246","url":null,"abstract":"","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":"1 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67131712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ashok Vajravelu, Lakshmi M, Ashokkumar N, Kavitha N.S.
{"title":"A constant temperature control system for indoor environments in buildings using internet of things","authors":"Ashok Vajravelu, Lakshmi M, Ashokkumar N, Kavitha N.S.","doi":"10.1504/ijipt.2023.10060176","DOIUrl":"https://doi.org/10.1504/ijipt.2023.10060176","url":null,"abstract":"","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135263017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Effective Differential Privacy Protection Method of Location data Based on Perturbation Loss Constraint","authors":"Shasha Zhang, Ying Li, Haiyan Kang","doi":"10.1504/ijipt.2023.10059167","DOIUrl":"https://doi.org/10.1504/ijipt.2023.10059167","url":null,"abstract":"","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135496945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparative performance analysis of TCP congestion control algorithm: elastic TCP vs. e-Elastic TCP","authors":"Vivek Kumar Jaiswal, Sanjeev Patel","doi":"10.1504/ijipt.2023.133029","DOIUrl":"https://doi.org/10.1504/ijipt.2023.133029","url":null,"abstract":"The Transmission Control Protocol (TCP) is a widely used transport layer protocol for reliable IP networks. To handle congestion in the network due to various reasons many algorithms have been designed. In this paper, we have carried out a detailed analysis of the Elastic TCP congestion control algorithm which is based on delay and independent of Round-Trip Time (RTT). Elastic TCP uses a Window-correlated Weighting Function (WWF) for deciding the update of congestion window size. We have proposed an enhanced Elastic (e-Elastic) for further improvement of performance. These algorithms Elastic and e-Elastic are more suitable for the high and moderate Bandwidth-Delay Product (BDT) while we have tested it for moderate BDT on network simulator-3 (ns-3). Our proposed algorithm improves the average throughput with 5.11%, 10.14%, 10.69% and 11.07% over Elastic, CUBIC, Veno and New Reno, respectively.","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136302731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A cross encryption scheme for data security storage in cloud computing environment","authors":"Jie Deng, Haiyan Kang","doi":"10.1504/ijipt.2023.10054903","DOIUrl":"https://doi.org/10.1504/ijipt.2023.10054903","url":null,"abstract":"","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":"1 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67131786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient routing protocol for IoT networks based on fog computing and routing protocol of low-power lossy networks","authors":"Ankit Verma, Suman Deswal","doi":"10.1504/ijipt.2023.133031","DOIUrl":"https://doi.org/10.1504/ijipt.2023.133031","url":null,"abstract":"The Internet of Things (IoT) is prevalent in the modern era because of its versatile application in every field. IoT solves real word problems through the connectivity of the internet. Smart devices in IoT control the environment and provide diverse utilities. IoT networks make human life easy by using next-generation technology. Even after various studies on IoT still, the major challenge is routing. Various algorithms are proposed but still remarkable performance is not achieved. The standard algorithm for low-power lossy network (RPL) protocol does not work well in parent selection for bulky networks. FOG-RPL is based on fog computing with an innovative objective function. In this paper, FOG-RPL is proposed and tested on the Cooja simulator with Contiki OS with quality parameters. The simulation of FOG-RPL is performed with performance parameters and results show that the packet loss ratio is 6% and the energy consumption is 0.6 mw, which is 11% more efficient than the existing algorithm.","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136302734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid encryption model for managing the data security in medical internet of things","authors":"P. Jyotheeswari, N. Jeyanthi","doi":"10.1504/ijipt.2020.10026701","DOIUrl":"https://doi.org/10.1504/ijipt.2020.10026701","url":null,"abstract":"Internet of things (IoT) creates communication between the sensor nodes and smart devices through the internet to collect the data. The utilisation of IoT in the medical field brings more advantage to the patients and doctors for effective monitoring. The confidentiality of the medical data is a crucial factor need to be taken care of by the medical- IoT (M-IoT). This paper concentrates on developing a secure mechanism for medical data management. In this paper, we develop an architecture for managing the large volumes of medical data generated by the sensor nodes. This architecture will provide secure communication for data sharing among doctors and patients in normal and emergency conditions. As a next step, we propose the security mechanism for improving the data integrity and confidentiality. The proposed mechanism uses symmetric encryption and attribute-based encryption to achieve the performance. The simulation results prove the efficiency of the proposed system.","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":"1 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2020-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41646092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bio-inspired Approaches for OFDM Based Cognitive Radio","authors":"N. A. Saoucha, B. Benmammar","doi":"10.1504/IJIPT.2019.10019368","DOIUrl":"https://doi.org/10.1504/IJIPT.2019.10019368","url":null,"abstract":"Link adaptation algorithms design for OFDM-based cognitive radio networks is a challenging task. The main concern is to provide a high quality of service for the secondary user while the mutual interference between this last and the primary user persists within a tolerable range. This issue can be formulated as a multiobjective optimisation constraint problem. To tackle this optimisation problem in a multiobjective constraint framework, in this paper we exploit three of the most recent powerful bio-inspired algorithms: firefly, bat, and cuckoo search. Simulation results revealed that, in contrast to the classical genetic algorithm and particle swarm optimisation-based link adaptation, our proposed algorithms exhibit better performance in terms of convergence speed and solution quality with saving rates reaching over 98.93% and 46.60%, respectively.","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":" ","pages":""},"PeriodicalIF":0.3,"publicationDate":"2019-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43613868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}