Results 71 to 80 of about 29,473 (207)
Multicast in DKS(N, k, f) Overlay Networks [PDF]
Recent developments in the area of peer-to-peer computing show that structured overlay networks implementing distributed hash tables scale well and can serve as infrastructures for Internet scale applications.
Ali Ghodsi +4 more
core +7 more sources
A Machine Learning Approach for Secure Communication Using Blockchain for IoT‐Based VANETs
This article is based on the Secure Data communication over VANET through 5G communication. The data is handled using the Blockchain secure mechanism and Decision making is possible using Machine Learning. ABSTRACT Vehicular ad hoc networks (VANETs) have a dynamic topology. This nature makes them highly susceptible to security attacks. It also leads to
Jarallah Alqahtani +3 more
wiley +1 more source
Analysis of Performance of Dynamic Multicast Routing Algorithms
In this paper, three new dynamic multicast routing algorithms based on the greedy tree technique are proposed; Source Optimised Tree, Topology Based Tree and Minimum Diameter Tree. A simulation analysis is presented showing various performance aspects of
Ballardie +16 more
core +2 more sources
A Thorough Review of Security in Information‐Centric Networking
The rapid evolution of technology has revealed the limitations of host‐centric or IP address–based networks. To overcome these limitations, a new communication paradigm has emerged: the information‐centric networking (ICN), which focuses on content (data) regardless of its location in the network.
Ado Adamou Abba Ari +7 more
wiley +1 more source
Recent advancements in unmanned aerial vehicle (UAV) technology have facilitated its widespread adoption across a spectrum of sectors, such as commercial logistics, agricultural surveillance, industrial diagnostics, and military maneuvers. However, the widespread adoption has also engendered a burgeoning array of security concerns.
Hailong Xi +8 more
wiley +1 more source
Delay constraint supported overlay multicast routing protocol
The degree and delay constrained routing problem in overlay multicast was studied, and a new overlay multicast routing protocol called delay bounded tree protocol (DBTP) was proposed.
WU Jia-gao +3 more
doaj +2 more sources
Developing a Fuzzy Logic Based on Demand Multicast Routing Protocol
Multicast routing is an efficient method to lead data packets from one source group to several nodes as destination group. Although multicast routing algorithms could be efficient in many situations but their routing mechanism like as route request ...
Alireza Shams Shafigh +2 more
doaj +1 more source
ADN: An Information-Centric Networking Architecture for the Internet of Things
Forwarding data by name has been assumed to be a necessary aspect of an information-centric redesign of the current Internet architecture that makes content access, dissemination, and storage more efficient.
Afanasyev A. +7 more
core +1 more source
Priority‐based resource optimisation and user association in integrated networks
This paper focuses on optimising energy efficiency, resource utilisation, and task priority‐based user association. The authors solve this optimisation problem using three methods: the branch and bound algorithm (BBA), the interior point method (IPM), and the barrier simplex algorithm (BSA).
Sana Sharif, Shahid Manzoor, Waleed Ejaz
wiley +1 more source
A genetic-inspired joint multicast routing and channel assignment algorithm in wireless mesh networks [PDF]
Copyright @ 2008 IEEEThis paper proposes a genetic algorithm (GA) based optimization approach to search a minimum-interference multicast tree which satis¯es the end-to-end delay constraint and optimizes the usage of the scarce radio network resource in ...
Cheng, H, Yang, S
core

