Results 21 to 30 of about 8,512 (160)

Datacollection in Event-Driven Wireless Sensor Networks with Mobile Sinks

open access: yesInternational Journal of Distributed Sensor Networks, 2010
We present a two-tier distributed hash table-based scheme for data-collection in event-driven wireless sensor networks. The proposed method leverages mobile sinks to significantly extend the lifetime of the sensor network. We propose localized algorithms
Harshavardhan Sabbineni   +1 more
doaj   +1 more source

Investigation of personal data protection mechanism based on blockchain technology

open access: yesScientific Reports, 2023
Blockchain technology is increasingly being used in personal data protection. Inspired by the importance of data security, this paper proposes a personal data protection mechanism based on blockchain, combined with distributed hash tables and ...
Rongrong Zhu   +3 more
doaj   +1 more source

Decentralized Data Management Privacy-Aware Framework for Positive Energy Districts

open access: yesEnergies, 2021
Energy Transition (ET) needs actors to perform independent actions on multiple levels of governance. These actors may need to write and read their data, and at the same time they want to protect their data from unauthorized access.
Sidra Aslam   +2 more
doaj   +1 more source

A real-time distributed hash table [PDF]

open access: yes2014 IEEE 20th International Conference on Embedded and Real-Time Computing Systems and Applications, 2014
Currently, the North American power grid uses a centralized system to monitor and control wide-area power grid states. This centralized architecture is becoming a bottleneck as large numbers of wind and photo-voltaic (PV) generation sources require real-time monitoring and actuation to ensure sustained reliability.
null Tao Qian   +2 more
openaire   +1 more source

Accurate querying of frequent subgraphs in power grid graph data

open access: yesGlobal Energy Interconnection, 2019
With the development of information technology, the amount of power grid topology data has gradually increased. Therefore, accurate querying of this data has become particularly important. Several researchers have chosen different indexing methods in the
Aihua Zhou   +3 more
doaj   +1 more source

On Routing in Distributed Hash Tables [PDF]

open access: yesSeventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007), 2007
There have been many proposals for constructing routing tables for distributed hash tables (DHT). They can be classified into two groups: A) those that assume that the peers are uniformly randomly distributed in the identifier space, and B) those that allow order-preserving hash functions that lead to a skewed peer distribution in the identifier space.
Fabius Klemm   +3 more
openaire   +1 more source

Steganographic embedding of information in SVG images on a WEB page

open access: yesБезопасность информационных технологий, 2023
This study suggests a steganographic algorithm for embedding data in SVG images integrated into html code. The algorithm uses a composite key that includes an embed key, an encryption key, and a replacement table.
Sergey V. Belim, Sergei N. Munko
doaj   +1 more source

Distributed Authentication of Power Grid Safety and Stability Control Terminals Based on DHT and Blockchain

open access: yesZhongguo dianli, 2022
The power grid safety and stability control system has limited terminal resources and high requirement for real time response, and existing authentication schemes can hardly satisfy the requirements of the system for safety, real-time ability and storage
Yening LAI   +4 more
doaj   +1 more source

A Read-Only Distributed Hash Table [PDF]

open access: yesJournal of Grid Computing, 2011
A distributed hash table (DHT) is an infrastructure to support resource discovery in large distributed systems. In a DHT, data items such as resources, indexes of resources or resource metadata, are distributed across an overlay network based on a hash function.
March, V., Teo, Y.M.
openaire   +1 more source

CAR:a P2P content addressable andauto-retrievable algorithm for MANET

open access: yesTongxin xuebao, 2011
To be directed at the unique features of mobile ad-hoc network(MANET) environment,a kind of mobile P2P(MP2P) index structure.Geographic-information-based hierarchical hash index structure(GH2I),was presented based on DHT(Distributed Hash Table).On the ...
WU Hua-feng1   +2 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy