Green ICT Communication, Networking and Data Processing
暂无分享,去创建一个
Abhishek Kumar | Sandeep Sharma | S. Rakesh Kumar | N. Gayathri | Ch. Ramesh | Rajiv Kumar Modanval | N. Gayathri | S. R. Kumar | Abhishek Kumar | Sandeep Sharma | R. K. Modanval | C. Ramesh
[1] Ameer Ahmed Abbasi,et al. A survey on clustering algorithms for wireless sensor networks , 2007, Comput. Commun..
[2] Massudi Mahmuddin,et al. Evaluation of video transmission of MAC protocols in wireless sensor network , 2016 .
[3] Chien-Li Chou,et al. Pattern-Based Near-Duplicate Video Retrieval and Localization on Web-Scale Videos , 2015, IEEE Transactions on Multimedia.
[4] Jong-Ho Lee,et al. Low-Energy Adaptive Clustering Hierarchy Using Affinity Propagation for Wireless Sensor Networks , 2016, IEEE Communications Letters.
[5] Jens Malmodin,et al. Exploring the effect of ICT solutions on GHG emissions in 2030 , 2015, EnviroInfo/ICT4S.
[6] Ahmad Hamad,et al. Evaluation of the RC4 Algorithm for Data Encryption , 2006, Int. J. Comput. Sci. Appl..
[7] Robert H. Deng,et al. Database Access Pattern Protection Without Full-Shuffles , 2011, IEEE Transactions on Information Forensics and Security.
[8] Indrajit Ray,et al. Secure Logging as a Service—Delegating Log Management to the Cloud , 2013, IEEE Systems Journal.
[9] Yookun Cho,et al. PEACH: Power-efficient and adaptive clustering hierarchy protocol for wireless sensor networks , 2007, Comput. Commun..
[10] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[11] Eric Rondeau,et al. Reducing energy consumption of network infrastructure using spectral approach , 2016, ArXiv.
[12] Guanglin Li,et al. Development of Sensory-Motor Fusion-Based Manipulation and Grasping Control for a Robotic Hand-Eye System , 2017, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[13] T.G. Giallorenzi,et al. Optical communications research and technology: Fiber optics , 1978, Proceedings of the IEEE.
[14] Elisa Bertino,et al. Privacy-Preserving Enforcement of Spatially Aware RBAC , 2012, IEEE Transactions on Dependable and Secure Computing.
[15] Adnan Yazici,et al. Automated Moving Object Classification in Wireless Multimedia Sensor Networks , 2017, IEEE Sensors Journal.
[16] Jin-Shyan Lee,et al. An Improved Three-Layer Low-Energy Adaptive Clustering Hierarchy for Wireless Sensor Networks , 2016, IEEE Internet of Things Journal.
[17] Aliaa A. A. Youssif,et al. Energy Efficient and QoS Aware Framework for Video Transmission over Wireless Sensor Networks , 2016 .
[18] L. Marcenaro,et al. Dual camera intelligent sensor for high definition 360 degrees surveillance , 2005 .
[19] Zhiming Luo,et al. An Ensemble Deep Learning Method for Vehicle Type Classification on Visual Traffic Surveillance Sensors , 2017, IEEE Access.
[20] Syaiful Andy,et al. Simple duplicate frame detection of MJPEG codec for video forensic , 2017, 2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE).
[21] Ching-Tang Fan,et al. Heterogeneous Information Fusion and Visualization for a Large-Scale Intelligent Video Surveillance System , 2017, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[22] Wen Hu,et al. Sensor-Assisted Multi-View Face Recognition System on Smart Glass , 2018, IEEE Transactions on Mobile Computing.
[23] Hyung Yun Kong,et al. Energy efficient cooperative LEACH protocol for wireless sensor networks , 2010, Journal of Communications and Networks.
[24] Emad Alsusa,et al. A Cooperative Clustering Protocol With Duty Cycling for Energy Harvesting Enabled Wireless Sensor Networks , 2018, IEEE Transactions on Wireless Communications.
[25] K. Srinathan,et al. Blind Authentication: A Secure Crypto-Biometric Verification Protocol , 2010, IEEE Transactions on Information Forensics and Security.
[26] Jongkil Kim,et al. A Cryptographically Enforced Access Control with a Flexible User Revocation on Untrusted Cloud Storage , 2016, Data Science and Engineering.
[27] Anantha P. Chandrakasan,et al. An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..
[28] Jean Temga,et al. Power Consumption: Base Stations of Telecommunication in Sahel Zone of Cameroon: Typology Based on the Power Consumption—Model and Energy Savings , 2016 .
[29] Jun Wu,et al. Joint Compression of Near-Duplicate Videos , 2017, IEEE Transactions on Multimedia.
[30] Tsung-Han Tsai,et al. Near-Duplicate Subsequence Matching Between the Continuous Stream and Large Video Dataset , 2014, IEEE Transactions on Multimedia.
[31] Maghsoud Abbaspour,et al. An Energy-Efficient and High-Quality Video Transmission Architecture in Wireless Video-Based Sensor Networks , 2008, Sensors.
[32] Jianyuan Lu,et al. Green Router: Power-Efficient Router Design , 2014 .
[33] A. Kandasamy,et al. An Energy-Efficient Clustering Algorithm for Edge-Based Wireless Sensor Networks , 2016 .
[34] Sankaranarayanan Swamynathan,et al. Cluster-chain mobile agent routing algorithm for efficient data aggregation in wireless sensor network , 2017, Journal of Communications and Networks.
[35] Samir Khuller,et al. A clustering scheme for hierarchical control in multi-hop wireless networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[36] Abdennaceur Kachouri,et al. An Energy-Efficient Unequal Clustering Algorithm Using ‘Sierpinski Triangle’ for WSNs , 2016, Wirel. Pers. Commun..
[37] San Murugesan,et al. Harnessing Green IT: Principles and Practices , 2008, IT Professional.
[38] Min Chen,et al. Rethinking energy efficiency models of cellular networks with embodied energy , 2011, IEEE Network.
[39] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .