distributed networking
Recently Published Documents


TOTAL DOCUMENTS

33
(FIVE YEARS 8)

H-INDEX

4
(FIVE YEARS 1)

2021 ◽  
Author(s):  
M. M. Kamruzzaman

Abstract Smart cities use lightweight security module technologies like sixth-generation (6G) and wireless connections to improve people's quality of life. A smart city can use a networking model to power and monitor many geographically distributed networking models to support various applications like energy and resource management, intelligent transportation systems, and e-health. To manage smart city resources efficiently and intelligently, a significant state architecture must service various technologies due to the enormous development in networking models and the amount of data they generate. This research work presents a smart city networking architecture for smart city environments employing the lightweight security module (SCNM-LSM) in this work in progress article. It first offers a new conceptual framework termed the conventional model for activity off-loading and resource allocation. Second, it enhances the standard model by including off-loading and resource allocation awareness. It expands on the specific research topics to create and study the effectiveness of individual components with the previous models to accommodate technological improvements like the use of Artificial Intelligence (AI) in the sixth generation data transmission technology.


2021 ◽  
pp. 6-18
Author(s):  
N. N. Pokrovskaia ◽  
T. V. Smetanina ◽  
S. I. Shelonaev

Sociological analysis of up-to-date social practices, communication and interaction forms among community members, local and virtual groups is based on a number of methodological approaches that need to be reconceived today in connection with the digital transformations of social processes and structures. Socio-managerial approaches used in the era of traditional and modern society (modernity) do not cover the total social reality and do not reply to the tasks and social practices of the post-modern information society (“meta-modernity”). In these conditions, the rethinking is required for the implementation of the basic concepts such as democratic instruments of state regulation, once rejected by Plato and Aristotle and then again proposed at a new round of social development by K. Popper. The concept of participation, which returned to sociological, socio-anthropological and socio-economic discourse in the middle of the twentieth century, needs to be developed in the era of total digitalization, additionally accelerated by measures of social isolation in connection with the pandemic (the transition to remote work, the expansion of online services, etc.). The article attempts to present new aspects of the concept of participation in relation to understanding the models of distributed networks of economic relations (sharing) and, in general, to digital forms of social communications in society.


2021 ◽  
Author(s):  
Burcu Sakız ◽  
Ayşen Hiç Gencer

Blockchain technology is a disruptive innovation with the potential to replace existing business models that rely on centralized systems and third parties for trust. Even if there are a lot of application areas, blockchain used primarily for cryptocurrencies. Satoshi Nakamoto implemented the first blockchain application and invented the world’s first digital currency which is named as Bitcoin in 2008. Fundementally Bitcoin relies on cryptographic “proof of work” mechanism, digital signatures, and peer to peer distributed networking layer in order to provide a distributed ledger holding transactions. In 2014, a second generation of blockchains allow to program and execute them over distributed networks such as Ethereum project. The code to program any asset stored in blockchain’s peer-to-peer network is called as "smart contract" and smart contracts gives a powerful tool to developers for decentralized applications. There are various types of tokens that anyone can built on top of Ethereum and by combining smart contracts and new tokens, this paved the way of possibility to build a wide range of decentralized projects. One of the disruptive blockchain based innovation impacting intellectual property is called non-fungible-tokens or NFTs firstly introcuced in late 2017 on Ethereum network. This research contends that blockchain and non-fungible tokens (NFTs) which are cryptographically unique, scarce, non-replicable digital assets created through smart contracts and provably digital collectible assets. Our objective is to give NFT taxonomy, review NFT platforms and discuss technical challenges as well as recent advances in tackling the challenges. Moreover, this paper also aims to point out the future directions for NFT technology.


2021 ◽  
Vol 11 (15) ◽  
pp. 6750
Author(s):  
Mostefa Kara ◽  
Abdelkader Laouid ◽  
Muath AlShaikh ◽  
Mohammad Hammoudeh ◽  
Ahcene Bounceur ◽  
...  

Several trusted tasks use consensus algorithms to solve agreement challenges. Usually, consensus agreements are used to ensure data integrity and reliability in untrusted environments. In many distributed networking fields, the Proof of Work (PoW) consensus algorithm is commonly used. However, the standard PoW mechanism has two main limitations, where the first is the high power consumption and the second is the 51% attack vulnerability. In this paper, we look to improve the PoW consensus protocol by introducing several proof rounds. Any given consensus node should resolve the game of the current round Roundi before participating in the next round Roundi+1. Any node that resolves the game of Roundi can only pass to the next round if a predetermined number of solutions has been found by other nodes. The obtained evaluation results of this technique show significant improvements in terms of energy consumption and robustness against the 51% and Sybil attacks. By fixing the number of processes, we obtained an energy gain rate of 15.63% with five rounds and a gain rate of 19.91% with ten rounds.


Author(s):  
Ajay Sikandar ◽  
Rajeev Agrawal ◽  
Manoj Kumar Tyagi ◽  
A. L. Narasimha Rao ◽  
Mukesh Prasad ◽  
...  

Abstract Recently, researchers and practitioners in wireless sensor networks (WSNs) are focusing on energy-oriented communication and computing considering next-generation smaller and tiny wireless devices. The tiny sensor-enabled devices will be used for the purpose of sensing, computing, and wireless communication. The hundreds/thousands of WSNs sensors are used to monitor specific activities and report events via wireless communication. The tiny sensor-enabled devices are powered by smaller batteries to work independently in distributed environments resulting in limited maximum lifetime of the network constituted by these devices. Considering the non-uniform distribution of sensor-enabled devices in the next-generation mobility centric WSNs environments, energy consumption is imbalanced among the different sensors in the overall network environments. Toward this end, in this paper, a cluster-oriented routing protocol termed as prediction-oriented distributed clustering (PODC) mechanism is proposed for WSNs focusing on non-uniform sensor distribution in the network. A network model is presented, while categorizing PODC mechanism in two activities including setting cluster of nodes and the activity in the steady state. Further cluster set up activity is described while categorizing in four subcategories. The proposed protocol is compared with individual sensor energy awareness and distributed networking mode of clustering (EADC) and scheduled sensor activity-based individual sensor energy awareness and distributed networking mode of clustering (SA-ADC). The metrics including the overall lifetime of the network and nodes individual energy consumption in realistic next-generation WSNs environments are considered in the experimental evaluation. The results attest the reduced energy consumption centric benefits of the proposed framework PODC as compared to the literature. Therefore, the framework will be more applicable for the smart product development in the next-generation WSNs environments.


Crowdsourcing refers to decomposing complex jobs to multiple tasks and solve those task with multiple workers through open call in distributed networking environment. The recruitment of employees for organization has undergone transformation from traditional method to digital domain. Online recruitment facilitates just-in-time hiring to requesters and enables the workers to compete in the global market. This paper proposed an Efficient Machine Learning Crowdsourced(EMLC) method for E-recruitment which uses Crowdsourcing method to collect resumes from the workers and details of work from the requesters. The data is collected from a private job agency through an online recruitment portal which consist of recruiters from companies and job seekers based on qualifications and experience related to their field. The data collected from recruitment portal is analyzed with Machine Learning Approach with decision tree algorithms like ID3, CART and C4.5 for better selection of efficient person to complete the job. Various performance metrics such as Accuracy, Error rate, Recall etc were used to the Crowdsourced Database to categorize the job seekers efficiently. The proposed method gives better result for online recruiting through Crowdsourcing.


Author(s):  
Farnaz Farid ◽  
Seyed Shahrestani ◽  
Chun Ruan

The distributed networking system is a dominant paradigm in the industry. In today's network industry, security and Quality of service (QoS) are two key services. The distributed network deals with an entire range of parameters coming from different applications. Therefore, it is of great significance to determine a set of key parameters and draw meaningful evaluation outcomes. On the other hand, security mechanisms provide user identification, authentication, consistency and information protection over the distributed environment. This research presents some analyses which draw connections between QoS and security of distributed networks. Then, a metric-based quantifying methodology is presented which quantifies network quality using QoS and security metrics. The QoS quantifying method is then further elaborated. The efficiency of this method is investigated using a range of simulation studies. The simulation analysis and results indicate that the proposed approach facilitates better QoS management and monitoring of the distributed networking systems.


Sign in / Sign up

Export Citation Format

Share Document