Green ICT Communication, Networking and Data Processing

[1]  Ameer Ahmed Abbasi,et al.  A survey on clustering algorithms for wireless sensor networks , 2007, Comput. Commun..

[2]  Massudi Mahmuddin,et al.  Evaluation of video transmission of MAC protocols in wireless sensor network , 2016 .

[3]  Chien-Li Chou,et al.  Pattern-Based Near-Duplicate Video Retrieval and Localization on Web-Scale Videos , 2015, IEEE Transactions on Multimedia.

[4]  Jong-Ho Lee,et al.  Low-Energy Adaptive Clustering Hierarchy Using Affinity Propagation for Wireless Sensor Networks , 2016, IEEE Communications Letters.

[5]  Jens Malmodin,et al.  Exploring the effect of ICT solutions on GHG emissions in 2030 , 2015, EnviroInfo/ICT4S.

[6]  Ahmad Hamad,et al.  Evaluation of the RC4 Algorithm for Data Encryption , 2006, Int. J. Comput. Sci. Appl..

[7]  Robert H. Deng,et al.  Database Access Pattern Protection Without Full-Shuffles , 2011, IEEE Transactions on Information Forensics and Security.

[8]  Indrajit Ray,et al.  Secure Logging as a Service—Delegating Log Management to the Cloud , 2013, IEEE Systems Journal.

[9]  Yookun Cho,et al.  PEACH: Power-efficient and adaptive clustering hierarchy protocol for wireless sensor networks , 2007, Comput. Commun..

[10]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[11]  Eric Rondeau,et al.  Reducing energy consumption of network infrastructure using spectral approach , 2016, ArXiv.

[12]  Guanglin Li,et al.  Development of Sensory-Motor Fusion-Based Manipulation and Grasping Control for a Robotic Hand-Eye System , 2017, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[13]  T.G. Giallorenzi,et al.  Optical communications research and technology: Fiber optics , 1978, Proceedings of the IEEE.

[14]  Elisa Bertino,et al.  Privacy-Preserving Enforcement of Spatially Aware RBAC , 2012, IEEE Transactions on Dependable and Secure Computing.

[15]  Adnan Yazici,et al.  Automated Moving Object Classification in Wireless Multimedia Sensor Networks , 2017, IEEE Sensors Journal.

[16]  Jin-Shyan Lee,et al.  An Improved Three-Layer Low-Energy Adaptive Clustering Hierarchy for Wireless Sensor Networks , 2016, IEEE Internet of Things Journal.

[17]  Aliaa A. A. Youssif,et al.  Energy Efficient and QoS Aware Framework for Video Transmission over Wireless Sensor Networks , 2016 .

[18]  L. Marcenaro,et al.  Dual camera intelligent sensor for high definition 360 degrees surveillance , 2005 .

[19]  Zhiming Luo,et al.  An Ensemble Deep Learning Method for Vehicle Type Classification on Visual Traffic Surveillance Sensors , 2017, IEEE Access.

[20]  Syaiful Andy,et al.  Simple duplicate frame detection of MJPEG codec for video forensic , 2017, 2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE).

[21]  Ching-Tang Fan,et al.  Heterogeneous Information Fusion and Visualization for a Large-Scale Intelligent Video Surveillance System , 2017, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[22]  Wen Hu,et al.  Sensor-Assisted Multi-View Face Recognition System on Smart Glass , 2018, IEEE Transactions on Mobile Computing.

[23]  Hyung Yun Kong,et al.  Energy efficient cooperative LEACH protocol for wireless sensor networks , 2010, Journal of Communications and Networks.

[24]  Emad Alsusa,et al.  A Cooperative Clustering Protocol With Duty Cycling for Energy Harvesting Enabled Wireless Sensor Networks , 2018, IEEE Transactions on Wireless Communications.

[25]  K. Srinathan,et al.  Blind Authentication: A Secure Crypto-Biometric Verification Protocol , 2010, IEEE Transactions on Information Forensics and Security.

[26]  Jongkil Kim,et al.  A Cryptographically Enforced Access Control with a Flexible User Revocation on Untrusted Cloud Storage , 2016, Data Science and Engineering.

[27]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..

[28]  Jean Temga,et al.  Power Consumption: Base Stations of Telecommunication in Sahel Zone of Cameroon: Typology Based on the Power Consumption—Model and Energy Savings , 2016 .

[29]  Jun Wu,et al.  Joint Compression of Near-Duplicate Videos , 2017, IEEE Transactions on Multimedia.

[30]  Tsung-Han Tsai,et al.  Near-Duplicate Subsequence Matching Between the Continuous Stream and Large Video Dataset , 2014, IEEE Transactions on Multimedia.

[31]  Maghsoud Abbaspour,et al.  An Energy-Efficient and High-Quality Video Transmission Architecture in Wireless Video-Based Sensor Networks , 2008, Sensors.

[32]  Jianyuan Lu,et al.  Green Router: Power-Efficient Router Design , 2014 .

[33]  A. Kandasamy,et al.  An Energy-Efficient Clustering Algorithm for Edge-Based Wireless Sensor Networks , 2016 .

[34]  Sankaranarayanan Swamynathan,et al.  Cluster-chain mobile agent routing algorithm for efficient data aggregation in wireless sensor network , 2017, Journal of Communications and Networks.

[35]  Samir Khuller,et al.  A clustering scheme for hierarchical control in multi-hop wireless networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[36]  Abdennaceur Kachouri,et al.  An Energy-Efficient Unequal Clustering Algorithm Using ‘Sierpinski Triangle’ for WSNs , 2016, Wirel. Pers. Commun..

[37]  San Murugesan,et al.  Harnessing Green IT: Principles and Practices , 2008, IT Professional.

[38]  Min Chen,et al.  Rethinking energy efficiency models of cellular networks with embodied energy , 2011, IEEE Network.

[39]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .