Results 21 to 30 of about 8,512 (160)
Datacollection in Event-Driven Wireless Sensor Networks with Mobile Sinks
We present a two-tier distributed hash table-based scheme for data-collection in event-driven wireless sensor networks. The proposed method leverages mobile sinks to significantly extend the lifetime of the sensor network. We propose localized algorithms
Harshavardhan Sabbineni +1 more
doaj +1 more source
Investigation of personal data protection mechanism based on blockchain technology
Blockchain technology is increasingly being used in personal data protection. Inspired by the importance of data security, this paper proposes a personal data protection mechanism based on blockchain, combined with distributed hash tables and ...
Rongrong Zhu +3 more
doaj +1 more source
Decentralized Data Management Privacy-Aware Framework for Positive Energy Districts
Energy Transition (ET) needs actors to perform independent actions on multiple levels of governance. These actors may need to write and read their data, and at the same time they want to protect their data from unauthorized access.
Sidra Aslam +2 more
doaj +1 more source
A real-time distributed hash table [PDF]
Currently, the North American power grid uses a centralized system to monitor and control wide-area power grid states. This centralized architecture is becoming a bottleneck as large numbers of wind and photo-voltaic (PV) generation sources require real-time monitoring and actuation to ensure sustained reliability.
null Tao Qian +2 more
openaire +1 more source
Accurate querying of frequent subgraphs in power grid graph data
With the development of information technology, the amount of power grid topology data has gradually increased. Therefore, accurate querying of this data has become particularly important. Several researchers have chosen different indexing methods in the
Aihua Zhou +3 more
doaj +1 more source
On Routing in Distributed Hash Tables [PDF]
There have been many proposals for constructing routing tables for distributed hash tables (DHT). They can be classified into two groups: A) those that assume that the peers are uniformly randomly distributed in the identifier space, and B) those that allow order-preserving hash functions that lead to a skewed peer distribution in the identifier space.
Fabius Klemm +3 more
openaire +1 more source
Steganographic embedding of information in SVG images on a WEB page
This study suggests a steganographic algorithm for embedding data in SVG images integrated into html code. The algorithm uses a composite key that includes an embed key, an encryption key, and a replacement table.
Sergey V. Belim, Sergei N. Munko
doaj +1 more source
The power grid safety and stability control system has limited terminal resources and high requirement for real time response, and existing authentication schemes can hardly satisfy the requirements of the system for safety, real-time ability and storage
Yening LAI +4 more
doaj +1 more source
A Read-Only Distributed Hash Table [PDF]
A distributed hash table (DHT) is an infrastructure to support resource discovery in large distributed systems. In a DHT, data items such as resources, indexes of resources or resource metadata, are distributed across an overlay network based on a hash function.
March, V., Teo, Y.M.
openaire +1 more source
CAR:a P2P content addressable andauto-retrievable algorithm for MANET
To be directed at the unique features of mobile ad-hoc network(MANET) environment,a kind of mobile P2P(MP2P) index structure.Geographic-information-based hierarchical hash index structure(GH2I),was presented based on DHT(Distributed Hash Table).On the ...
WU Hua-feng1 +2 more
doaj +2 more sources

