skip to main content
10.1145/3102304acmotherconferencesBook PagePublication PagesicfndsConference Proceedingsconference-collections
ICFNDS '17: Proceedings of the International Conference on Future Networks and Distributed Systems
ACM2017 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ICFNDS '17: International Conference on Future Networks and Distributed Systems Cambridge United Kingdom July 19 - 20, 2017
ISBN:
978-1-4503-4844-7
Published:
19 July 2017
In-Cooperation:
LABSTICC

Bibliometrics
invited-talk
Intelligent FH Sequence for High Security Satellite Communication: The Generation, Performance Analysis and Application

Nowadays, various jamming, eavesdropping and other attacks become serious threats for the peoplefis information privacy in satellite communication. Hence, the information transmission of high security applications requires strong anti-jamming and anti-...

invited-talk
From IoT to Ephemeral Computing: Understanding Cyber-Physical Interactions

Networks of sensor devices are being embedded into the world around us, however to ensure their continuous operation requires new network protocols, data analytics and a strong understanding of how the physical world impacts on the cyber world. This ...

invited-talk
Towards Sustainable Smart Society: Big Data Driven Approaches

By 2020, the total size of digital data generated by social networks, sensors, biomedical imaging and simulation devices, will reach an estimated 44 Zettabytes (e.g. 44 trillion gigabytes) according to IDC report. This type of 'big data', together with ...

invited-talk
Distributed, Autonomous and Resilient Networks: Joint RAN and Backhaul Optimisation

5G Communication Systems will have challenging requirements for data rates, energy efficiency and the end-to-end latency of the system. To design a system that meets all these challenges several advanced signal processing techniques have been proposed ...

research-article
Optimization Water Leakage Detection using Wireless Sensor Networks (OWLD)

This paper presents a technical method to monitor the water distribution pipelines against leakage and to control the pump when the water level decreases in the tank. Water leakage is the most popular cause of water wasted in the domestic water ...

research-article
Segmented-Based Region Duplication Forgery Detection Using MOD Keypoints and Texture Descriptor

Nowadays, with a rapid development of digital image technology, image forgery is made easy. Image forgery has considerable consequences, e.g., medical images, miscarriage of justice, political, etc. For instance, in digital newspapers, forged images ...

research-article
Cooperative Hybrid Wireless-Powerline Channel Transmission for Peer-to-Peer Energy Trading and Sharing System

The Peer-to-Peer (P2P) energy trading and sharing (ETS) network derives from the conventional smart-grid systems. The smart-grids operate smart meters that may be equipped with both wireless and powerline communication standards. In this study, we ...

research-article
A Survey on Authentication Techniques for the Internet of Things

The Internet of Things (IoT) is the technology, which forms the foundation of today's smart and connected world. The IoT is a network used to interconnect embedded devices, such as sensors, which are able to generate, communicate and share data with one ...

research-article
An Improved Dynamic Load Balancing Algorithm applied to a Cafeteria System in a University Campus

Load-balancing algorithms play a key role in improving the performance of practical distributed systems that consist of heterogeneous nodes. The performance of any load-balancing algorithms and its convergence-rate is affected by the structural factors ...

research-article
A Survey on Data Confidentiality and Privacy in Cloud Computing

Cloud computing is often referred to as the technology of the decade. Current Cloud systems present critical limitations to protecting users' data confidentiality. This survey presents a review of the three essential data security attributes in the ...

research-article
Robust Localization in Wireless Sensor Networks via Low-rank and 'Sparse Matrix Decomposition
Article No.: 11, pp 1–10https://doi.org/10.1145/3102304.3102315

This paper proposes a robust matrix completion method to solve the localization problem in wireless sensor networks. A novel cost function is formulated which inherently copes with missing measures and corrupted data. In particular, the proposed ...

research-article
Encoding Shortest Paths in Triangular Grids for Delivery Without Errors

We consider the problem of encoding shortest paths in a triangular grid so that there are no false positives adjacent to the path. In terms of message delivery, this means that each message in a computer network of this shape will be only forwarded ...

research-article
User Centered Method for Enhancing the Adoption of Software Systems in Palestine
Article No.: 13, pp 1–11https://doi.org/10.1145/3102304.3102317

Software systems play major roles in improving people work and life quality. Developing countries as Palestine should adopt these systems to cope with the development and improve services provided to people. However, the adoption of software systems in ...

research-article
A Shared Memory Method For Enhancing The HTNGH AlgorithmPerformance: Proposed Method

In bioinformatics, pair-wise alignment plays a significant role insequence comparison by rating the similarities and distances between protein, DeoxyriboNucleic Acid (DNA), and RiboNucleic Acid (RNA) sequences. Sequence comparison considered as a key ...

research-article
Software Defined Network (SDN) Based Internet of Things (IoT): A Road Ahead

Internet of Things (IoT) and Software Defined Network (SDN) are two emerging technologies. The IoT aims to connect objects over the Internet and the SDN provides orchestration for network management by decoupling the control plane and the data plane. ...

research-article
Measuring the Complexity of Chaotic Time Series by Fuzzy Entropy

A bridge called chaotic time series connects the chaos theory and real world. The properties of chaos make a natural relationship with security problem about information, such as sensitive dependence on initial conditions, unpredictable result for long ...

research-article
Recognising Activities at Home: Digital and Human Sensors
Article No.: 17, pp 1–11https://doi.org/10.1145/3102304.3102321

What activities take place at home? When do they occur, for how long do they last and who is involved? Asking such questions is important in social research on households, e.g., to study energy-related practices, assisted living arrangements and various ...

research-article
5G Hetrogeneous Cellular Networks a Viable Mode for Implementing Future Smart Grid Networks

The recruitment of optimum viable and parsimoniously viable communication technology for smart grid network has become a burning discussion. One of the best proposed configuration for future smart grid networks is the 5G Heterogeneous Cellular Networks ...

research-article
A Cloud Storage Architecture for High Data Availability, Reliability, and Fault-tolerance

The most important factors that need to be taken into consideration when designing a distributed storage system are data availability, reliability and access performance. This paper introduces an architecture to meet such goals by following the ...

research-article
IoT Mashups: From IoT Big Data to IoT Big Service

Internet of Things (IoT) addresses the challenge to provide a transparent access to a huge number of IoT resources that can be either physical devices or just data resources. Moreover, because of the large number of resource-constrained devices and the ...

research-article
S-Shaped vs. V-Shaped Transfer Functions for Ant Lion Optimization Algorithm in Feature Selection Problem

Feature selection is an important preprocessing step for classification problems. It deals with selecting near optimal features in the original dataset. Feature selection is an NP-hard problem, so meta-heuristics can be more efficient than exact ...

research-article
Intelligent core network for Tactile Internet system

Tactile Internet requires a round trip latency of 1ms, which considered being the main challenge with the system realization. Forced by recent development and capabilities of the fifth generation (5G) cellular system, the Tactile Internet will become a ...

research-article
OpenFlow switch buffer configuration method

This paper dedicated to SDN modeling and analysis. We analyze the packet delivery time and propose the method to reduce it. We consider delay of packets in SDN switch caused by the processing time. The proposed model represents a packet delay as time ...

research-article
ESSAC: Enhanced Scalable Secure Access Control Framework for Cloud Storage

Outsourcing data storage and IT workloads to a third-party cloud provider introduces some security risks and time performance degradation. Moreover, controlling access to this data becomes very difficult when the volume of the data and number of users ...

research-article
Joint FEC/CRC coding scheme for energy constrained IOT devices

Energy efficiency is of utmost importance in internet of things (IOT) as it tends to rely on battery-powered devices constrained by their limited lifetime, which entails the need of energy-aware protocols. As transmission energy is the most energy ...

research-article
Zone Divisional Approach for Energy Balanced Clustering Protocol in Wireless Sensor Network

Cluster based routing protocols are key factors in wireless sensor network to extend the metric of network lifetime. Recently applied clustering routing algorithms have shown their limitation in prolonging the network lifespan due to the requirement of ...

research-article
Malicious SSL Certificate Detection: A Step Towards Advanced Persistent Threat Defence

Advanced Persistent Threat (APT) is one of the most serious types of cyber attacks, which is a new and more complex version of multistep attack. Within the APT life cycle, continuous communication between infected hosts and Command and Control (C&C) ...

research-article
Toward a Global WSN-Based System to Manage Road Traffic

The traffic network and the quality of road transportation play an increasingly vital role in every economy's growth around the world and are part of the lifeblood of countries' trade and communications. With the continued growth in number of vehicles, ...

short-paper
Intel Edison based scalable platform solution for visually impaired people on W-IoT

Wearable Internet of Things (IoT) is seen as one of the advance paradigm in widespread applications such as health care, fitness, etc. There is a huge gap in the technology that helps today the visually disabled people to this advance level. There is a ...

research-article
Agile servient integration with the Swarm: Automatic code generation for nodes in the Internet of Things

Swarm vision, consists in an organic ecosystem of heterogeneous devices that communicate and collaborate to achieve complex results. In previous work, we have proposed an architecture to implement this vision based on web technologies. In this paper, we ...

Index terms have been assigned to the content through auto-classification.

Recommendations