International Journal of Internet Protocol Technology最新文献

筛选
英文 中文
Towards a transmission control mechanism for data centers based on flow deadline and size over Software Defined Networking 基于流量截止日期和流量大小的数据中心传输控制机制的研究
IF 0.3
International Journal of Internet Protocol Technology Pub Date : 2023-01-01 DOI: 10.1504/ijipt.2023.10054892
Xuesong Qiu, Tianfang Yu
{"title":"Towards a transmission control mechanism for data centers based on flow deadline and size over Software Defined Networking","authors":"Xuesong Qiu, Tianfang Yu","doi":"10.1504/ijipt.2023.10054892","DOIUrl":"https://doi.org/10.1504/ijipt.2023.10054892","url":null,"abstract":"","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":"1 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67131729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distribution and Tracking Current Live Location of Recognized Criminal Face at Decentralized Blockchain through Image 基于图像的分散区块链识别罪犯面部分布与实时位置跟踪
IF 0.3
International Journal of Internet Protocol Technology Pub Date : 2023-01-01 DOI: 10.1504/ijipt.2023.10054246
M. Amjad, Sana Zeba
{"title":"Distribution and Tracking Current Live Location of Recognized Criminal Face at Decentralized Blockchain through Image","authors":"M. Amjad, Sana Zeba","doi":"10.1504/ijipt.2023.10054246","DOIUrl":"https://doi.org/10.1504/ijipt.2023.10054246","url":null,"abstract":"","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":"1 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67131712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A constant temperature control system for indoor environments in buildings using internet of things 一种基于物联网的建筑室内环境恒温控制系统
International Journal of Internet Protocol Technology Pub Date : 2023-01-01 DOI: 10.1504/ijipt.2023.10060176
Ashok Vajravelu, Lakshmi M, Ashokkumar N, Kavitha N.S.
{"title":"A constant temperature control system for indoor environments in buildings using internet of things","authors":"Ashok Vajravelu, Lakshmi M, Ashokkumar N, Kavitha N.S.","doi":"10.1504/ijipt.2023.10060176","DOIUrl":"https://doi.org/10.1504/ijipt.2023.10060176","url":null,"abstract":"","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135263017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Effective Differential Privacy Protection Method of Location data Based on Perturbation Loss Constraint 一种基于扰动损失约束的位置数据差分隐私保护方法
International Journal of Internet Protocol Technology Pub Date : 2023-01-01 DOI: 10.1504/ijipt.2023.10059167
Shasha Zhang, Ying Li, Haiyan Kang
{"title":"An Effective Differential Privacy Protection Method of Location data Based on Perturbation Loss Constraint","authors":"Shasha Zhang, Ying Li, Haiyan Kang","doi":"10.1504/ijipt.2023.10059167","DOIUrl":"https://doi.org/10.1504/ijipt.2023.10059167","url":null,"abstract":"","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135496945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SVC-MST BWQLB Multicast over Software-Defined Networking 基于软件定义网络的SVC-MST BWQLB组播
IF 0.3
International Journal of Internet Protocol Technology Pub Date : 2023-01-01 DOI: 10.1504/ijipt.2023.10058807
Jirawat Thaenthong, Piyawit Tantisarkhornkhet, Jakapan Suaboot, Warodom Werapun
{"title":"SVC-MST BWQLB Multicast over Software-Defined Networking","authors":"Jirawat Thaenthong, Piyawit Tantisarkhornkhet, Jakapan Suaboot, Warodom Werapun","doi":"10.1504/ijipt.2023.10058807","DOIUrl":"https://doi.org/10.1504/ijipt.2023.10058807","url":null,"abstract":"","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":"7 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67131830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comparative performance analysis of TCP congestion control algorithm: elastic TCP vs. e-Elastic TCP TCP拥塞控制算法的性能比较分析:弹性TCP与e-弹性TCP
International Journal of Internet Protocol Technology Pub Date : 2023-01-01 DOI: 10.1504/ijipt.2023.133029
Vivek Kumar Jaiswal, Sanjeev Patel
{"title":"A comparative performance analysis of TCP congestion control algorithm: elastic TCP vs. e-Elastic TCP","authors":"Vivek Kumar Jaiswal, Sanjeev Patel","doi":"10.1504/ijipt.2023.133029","DOIUrl":"https://doi.org/10.1504/ijipt.2023.133029","url":null,"abstract":"The Transmission Control Protocol (TCP) is a widely used transport layer protocol for reliable IP networks. To handle congestion in the network due to various reasons many algorithms have been designed. In this paper, we have carried out a detailed analysis of the Elastic TCP congestion control algorithm which is based on delay and independent of Round-Trip Time (RTT). Elastic TCP uses a Window-correlated Weighting Function (WWF) for deciding the update of congestion window size. We have proposed an enhanced Elastic (e-Elastic) for further improvement of performance. These algorithms Elastic and e-Elastic are more suitable for the high and moderate Bandwidth-Delay Product (BDT) while we have tested it for moderate BDT on network simulator-3 (ns-3). Our proposed algorithm improves the average throughput with 5.11%, 10.14%, 10.69% and 11.07% over Elastic, CUBIC, Veno and New Reno, respectively.","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136302731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A cross encryption scheme for data security storage in cloud computing environment 一种云计算环境下数据安全存储的交叉加密方案
IF 0.3
International Journal of Internet Protocol Technology Pub Date : 2023-01-01 DOI: 10.1504/ijipt.2023.10054903
Jie Deng, Haiyan Kang
{"title":"A cross encryption scheme for data security storage in cloud computing environment","authors":"Jie Deng, Haiyan Kang","doi":"10.1504/ijipt.2023.10054903","DOIUrl":"https://doi.org/10.1504/ijipt.2023.10054903","url":null,"abstract":"","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":"1 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67131786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient routing protocol for IoT networks based on fog computing and routing protocol of low-power lossy networks 基于雾计算的高效物联网路由协议和低功耗网络路由协议
International Journal of Internet Protocol Technology Pub Date : 2023-01-01 DOI: 10.1504/ijipt.2023.133031
Ankit Verma, Suman Deswal
{"title":"Efficient routing protocol for IoT networks based on fog computing and routing protocol of low-power lossy networks","authors":"Ankit Verma, Suman Deswal","doi":"10.1504/ijipt.2023.133031","DOIUrl":"https://doi.org/10.1504/ijipt.2023.133031","url":null,"abstract":"The Internet of Things (IoT) is prevalent in the modern era because of its versatile application in every field. IoT solves real word problems through the connectivity of the internet. Smart devices in IoT control the environment and provide diverse utilities. IoT networks make human life easy by using next-generation technology. Even after various studies on IoT still, the major challenge is routing. Various algorithms are proposed but still remarkable performance is not achieved. The standard algorithm for low-power lossy network (RPL) protocol does not work well in parent selection for bulky networks. FOG-RPL is based on fog computing with an innovative objective function. In this paper, FOG-RPL is proposed and tested on the Cooja simulator with Contiki OS with quality parameters. The simulation of FOG-RPL is performed with performance parameters and results show that the packet loss ratio is 6% and the energy consumption is 0.6 mw, which is 11% more efficient than the existing algorithm.","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136302734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid encryption model for managing the data security in medical internet of things 用于医疗物联网数据安全管理的混合加密模型
IF 0.3
International Journal of Internet Protocol Technology Pub Date : 2020-02-06 DOI: 10.1504/ijipt.2020.10026701
P. Jyotheeswari, N. Jeyanthi
{"title":"Hybrid encryption model for managing the data security in medical internet of things","authors":"P. Jyotheeswari, N. Jeyanthi","doi":"10.1504/ijipt.2020.10026701","DOIUrl":"https://doi.org/10.1504/ijipt.2020.10026701","url":null,"abstract":"Internet of things (IoT) creates communication between the sensor nodes and smart devices through the internet to collect the data. The utilisation of IoT in the medical field brings more advantage to the patients and doctors for effective monitoring. The confidentiality of the medical data is a crucial factor need to be taken care of by the medical- IoT (M-IoT). This paper concentrates on developing a secure mechanism for medical data management. In this paper, we develop an architecture for managing the large volumes of medical data generated by the sensor nodes. This architecture will provide secure communication for data sharing among doctors and patients in normal and emergency conditions. As a next step, we propose the security mechanism for improving the data integrity and confidentiality. The proposed mechanism uses symmetric encryption and attribute-based encryption to achieve the performance. The simulation results prove the efficiency of the proposed system.","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":"1 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2020-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41646092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bio-inspired Approaches for OFDM Based Cognitive Radio 基于OFDM认知无线电的仿生方法
IF 0.3
International Journal of Internet Protocol Technology Pub Date : 2019-05-09 DOI: 10.1504/IJIPT.2019.10019368
N. A. Saoucha, B. Benmammar
{"title":"Bio-inspired Approaches for OFDM Based Cognitive Radio","authors":"N. A. Saoucha, B. Benmammar","doi":"10.1504/IJIPT.2019.10019368","DOIUrl":"https://doi.org/10.1504/IJIPT.2019.10019368","url":null,"abstract":"Link adaptation algorithms design for OFDM-based cognitive radio networks is a challenging task. The main concern is to provide a high quality of service for the secondary user while the mutual interference between this last and the primary user persists within a tolerable range. This issue can be formulated as a multiobjective optimisation constraint problem. To tackle this optimisation problem in a multiobjective constraint framework, in this paper we exploit three of the most recent powerful bio-inspired algorithms: firefly, bat, and cuckoo search. Simulation results revealed that, in contrast to the classical genetic algorithm and particle swarm optimisation-based link adaptation, our proposed algorithms exhibit better performance in terms of convergence speed and solution quality with saving rates reaching over 98.93% and 46.60%, respectively.","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":" ","pages":""},"PeriodicalIF":0.3,"publicationDate":"2019-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43613868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信