2016
DOI: 10.14257/ijgdc.2016.9.7.01
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient DHT Routing Protocol with Small-world Features for Structured P2P Network

Abstract: Distributed Hash Tables (DHT)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…Then we used three measures, the mean load of nodes, the load dispersion, and the estimate dispersion, to compare the performance of the other two approaches. One thousand lookup requests were initiated simultaneously when nodes were inserted, and insertion procedure continued until the network size approached 2 12 . The load per node is defined as the number of lookup requests accepted by each node.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Then we used three measures, the mean load of nodes, the load dispersion, and the estimate dispersion, to compare the performance of the other two approaches. One thousand lookup requests were initiated simultaneously when nodes were inserted, and insertion procedure continued until the network size approached 2 12 . The load per node is defined as the number of lookup requests accepted by each node.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…As mentioned in our work earlier [12], when a peer node joins the network, a unique identification number defined by CalcID will be assigned by mapping the x-coordinate and y-coordinate of the zone center to a 31-digits binary array. When a node A initiates the calculation step, it would find the largest ℓ to ensure n ℓ ≥16(1+) −2 ln(2 ℓ n ℓ ).…”
Section: Range Searching Based Estimation Algorithmmentioning
confidence: 99%
“…The user can set the required level of management values step by step and the program notifies the user step by step when data is detected that exceeds the management values set by the user. It is reflected in the program to prevent unexpected accidents by sending text messages to the mobile phone in the absence of users [10]. Therefore, the most important safety assessment algorithm is developed and reflected in the operations management system to inform the user of the current structure status.…”
Section: Figure 3 Improved Wireless Remote Measurement Management Pro...mentioning
confidence: 99%