International Journal of Grid and Distributed Computing最新文献

筛选
英文 中文
Energy-Efficient Clustering Scheme in Wireless Sensor Network 无线传感器网络中的节能聚类方案
International Journal of Grid and Distributed Computing Pub Date : 2018-10-31 DOI: 10.14257/IJGDC.2018.11.10.09
J. Lee
{"title":"Energy-Efficient Clustering Scheme in Wireless Sensor Network","authors":"J. Lee","doi":"10.14257/IJGDC.2018.11.10.09","DOIUrl":"https://doi.org/10.14257/IJGDC.2018.11.10.09","url":null,"abstract":"Hierarchical clustering algorithms have been proposed to minimize energy consumption by sensor nodes under power constraints in a wireless sensor network. However, previously reported methods such as backbone construction algorithms consume energy quickly at the cluster head nodes. A cluster head node must therefore be changed periodically by election among the available sensor nodes, to transfer aggregated data from one cluster head node to another for as long as possible. This study investigates the clustering algorithm and cluster head election methodology among sensors to efficiently control energy consumption. This paper presents comparison results between the conventional and proposed schemes of clustering algorithms.","PeriodicalId":46000,"journal":{"name":"International Journal of Grid and Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47524585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Congestion Aware Routing Protocol for Low Power and Lossy Networks 低功耗和有损网络的拥塞感知路由协议
International Journal of Grid and Distributed Computing Pub Date : 2018-10-31 DOI: 10.14257/IJGDC.2018.11.10.05
Abheyjeet Singh Chahal, D. Gupta, Ravreet Kaur
{"title":"Congestion Aware Routing Protocol for Low Power and Lossy Networks","authors":"Abheyjeet Singh Chahal, D. Gupta, Ravreet Kaur","doi":"10.14257/IJGDC.2018.11.10.05","DOIUrl":"https://doi.org/10.14257/IJGDC.2018.11.10.05","url":null,"abstract":"","PeriodicalId":46000,"journal":{"name":"International Journal of Grid and Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47603461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Data Sharing using Proxy Re-Encryption for Intelligent Customized Services 使用代理重新加密实现智能定制服务的安全数据共享
International Journal of Grid and Distributed Computing Pub Date : 2018-10-31 DOI: 10.14257/ijgdc.2018.11.10.03
Hyun-Jong Cha, Ho-Kyung Yang, You-Jin Song
{"title":"Secure Data Sharing using Proxy Re-Encryption for Intelligent Customized Services","authors":"Hyun-Jong Cha, Ho-Kyung Yang, You-Jin Song","doi":"10.14257/ijgdc.2018.11.10.03","DOIUrl":"https://doi.org/10.14257/ijgdc.2018.11.10.03","url":null,"abstract":"Intelligent customized services are required to meet the needs of users. Data concerning the user’s environment is needed more so the situation of the user can be determined for providing a highly reliable service. In order to collect a large amount of data, the Internet of Things (IoT), which connects numerous devices through the Internet, has been developed. Cloud computing is widely used for managing data efficiently, but can delay data transmission. Therefore, fog computing has been proposed. However, the method used to manage data securely in the cloud computing environment is not efficient in the fog computing environment. Moreover, data may contain personally sensitive information. Additionally, various stakeholders may exist in relation to the access authority of the information. In this respect, there can be many vulnerabilities and threats. In response, this study proposed a re-encryption technique for managing data securely in the fog computing environment. This technique allows a user to delegate the decryption authority to decrypt encrypted data using the re-encryption method in the proxy server for efficient communication.","PeriodicalId":46000,"journal":{"name":"International Journal of Grid and Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41866380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security Authentication Technique using Hash Code in Wireless RFID Environments 无线RFID环境中使用哈希码的安全认证技术
International Journal of Grid and Distributed Computing Pub Date : 2018-10-31 DOI: 10.14257/IJGDC.2018.11.10.08
Cheol-seung Lee
{"title":"Security Authentication Technique using Hash Code in Wireless RFID Environments","authors":"Cheol-seung Lee","doi":"10.14257/IJGDC.2018.11.10.08","DOIUrl":"https://doi.org/10.14257/IJGDC.2018.11.10.08","url":null,"abstract":"The development of computing technology and networking has developed into a fundamental technology of the Fourth Industrial Revolution, which provides a ubiquitous environment. In the ubiquitous environment, the IoT environment has become an issue so that various devices and the things can be actively accessed and connected. Also, the RFID system using the wireless identification code attaches an RFID tag to the object, such as the production and distribution of products. It is applied to the management very efficiently. EPCglobal is conducting a research on RFID system standardization and various security studies. Since RFID systems use wireless environment technology, there are more security threats than wire problems. In particular, failure to provide confidentiality, indistinguishability, and forward safety could expose them to various threats in the Fourth Industrial Revolution. Therefore, this study analyzes the standard method of EPCgolbal and proposes RFID security method using hash code that can consider the amount of computation.","PeriodicalId":46000,"journal":{"name":"International Journal of Grid and Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41874186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault Tolerant and optimal Barrier Coverage for Critical Area Monitoring 用于关键区域监控的容错和最优屏障覆盖
International Journal of Grid and Distributed Computing Pub Date : 2018-10-31 DOI: 10.14257/IJGDC.2018.11.10.02
Tariq Benahmed, Khelifa Benahmed, Zeyneb Mokeddem
{"title":"Fault Tolerant and optimal Barrier Coverage for Critical Area Monitoring","authors":"Tariq Benahmed, Khelifa Benahmed, Zeyneb Mokeddem","doi":"10.14257/IJGDC.2018.11.10.02","DOIUrl":"https://doi.org/10.14257/IJGDC.2018.11.10.02","url":null,"abstract":"","PeriodicalId":46000,"journal":{"name":"International Journal of Grid and Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46714164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Certificateless Dynamic Data Integrity Verification using Lattices in Cloud Storage 云存储中使用格的无证书动态数据完整性验证
International Journal of Grid and Distributed Computing Pub Date : 2018-10-31 DOI: 10.14257/ijgdc.2018.11.10.06
Sasikala Chinthakunta, Shoba Bindu Chigarepalli
{"title":"Certificateless Dynamic Data Integrity Verification using Lattices in Cloud Storage","authors":"Sasikala Chinthakunta, Shoba Bindu Chigarepalli","doi":"10.14257/ijgdc.2018.11.10.06","DOIUrl":"https://doi.org/10.14257/ijgdc.2018.11.10.06","url":null,"abstract":"","PeriodicalId":46000,"journal":{"name":"International Journal of Grid and Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44184788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Priority Aware MAC Protocol for Delay-Bounded Applications in Wireless Sensor Networks 无线传感器网络中时延限制应用的优先级感知MAC协议
International Journal of Grid and Distributed Computing Pub Date : 2018-10-31 DOI: 10.14257/IJGDC.2018.11.10.04
H. Kim, Seong-cheol Kim, H. Park
{"title":"Priority Aware MAC Protocol for Delay-Bounded Applications in Wireless Sensor Networks","authors":"H. Kim, Seong-cheol Kim, H. Park","doi":"10.14257/IJGDC.2018.11.10.04","DOIUrl":"https://doi.org/10.14257/IJGDC.2018.11.10.04","url":null,"abstract":"","PeriodicalId":46000,"journal":{"name":"International Journal of Grid and Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/IJGDC.2018.11.10.04","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47107607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Supporting High Data Rate Sensing Applications in Internet of Things (IoT) 支持物联网(IoT)中的高数据速率传感应用
International Journal of Grid and Distributed Computing Pub Date : 2018-10-31 DOI: 10.14257/IJGDC.2018.11.10.07
Raees Khan, A. Mian
{"title":"Supporting High Data Rate Sensing Applications in Internet of Things (IoT)","authors":"Raees Khan, A. Mian","doi":"10.14257/IJGDC.2018.11.10.07","DOIUrl":"https://doi.org/10.14257/IJGDC.2018.11.10.07","url":null,"abstract":"","PeriodicalId":46000,"journal":{"name":"International Journal of Grid and Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46008707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High Impedance Fault Detection using Fuzzy Logic Technique 基于模糊逻辑技术的高阻抗故障检测
International Journal of Grid and Distributed Computing Pub Date : 2018-09-30 DOI: 10.14257/IJGDC.2018.11.9.02
G. Vyshnavi, Avagaddi Prasad
{"title":"High Impedance Fault Detection using Fuzzy Logic Technique","authors":"G. Vyshnavi, Avagaddi Prasad","doi":"10.14257/IJGDC.2018.11.9.02","DOIUrl":"https://doi.org/10.14257/IJGDC.2018.11.9.02","url":null,"abstract":"","PeriodicalId":46000,"journal":{"name":"International Journal of Grid and Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48687675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Implementation of Krill Herd Algorithm for Optimal Sizing and Placing of DG in Radial Distribution System 基于磷虾群算法的径向配电系统DG优化配置
International Journal of Grid and Distributed Computing Pub Date : 2018-09-30 DOI: 10.14257/ijgdc.2018.11.9.05
P. Niveditha, M. Sujatha, M. Kumar
{"title":"Implementation of Krill Herd Algorithm for Optimal Sizing and Placing of DG in Radial Distribution System","authors":"P. Niveditha, M. Sujatha, M. Kumar","doi":"10.14257/ijgdc.2018.11.9.05","DOIUrl":"https://doi.org/10.14257/ijgdc.2018.11.9.05","url":null,"abstract":"","PeriodicalId":46000,"journal":{"name":"International Journal of Grid and Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43873867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信