-
921
Energy Efficient Clustering Based Network Protocol Stack for 3D Airborne Monitoring System
Published 2017-01-01“…Usually, most of the application areas of WSNs require two-dimensional (2D) topology. Various emerging application areas such as airborne networks and underwater wireless sensor networks are usually deployed using three-dimensional (3D) network topology. …”
Get full text
Article -
922
Calculations on Lie Algebra of the Group of Affine Symplectomorphisms
Published 2017-01-01“…Given the relevance of Hochschild homology to string topology and to get more interesting applications, we show that such a map is of potential interest in string topology and homological algebra by taking into account that the Hochschild homology HH⁎-1(U(gn)) is isomorphic to H⁎-1Lie(gn,U(gn)ad). …”
Get full text
Article -
923
Pythagorean Nanogeneralized Closed Sets with Application in Decision-Making
Published 2021-01-01“…Topology is similar in geometrical structures and quantitatively equivalent. …”
Get full text
Article -
924
Node centrality metric based caching mechanism in content-centric network
Published 2017-06-01“…In order to reduce the cache redundancy as well as increase the cache hit ratios in content-centric networks,the node centrality metric based caching mechanism (CMC) was proposed.CMC utilized controllers to obtain the topology of the whole network and the idle rate of cache space.According to the connection relation of the topology,the degree centrality,closeness centrality and betweenness centrality of nodes were calculated.When CMC choose the caching nodes,it took the three metrics and the idle rate of cache space into account.Simulation results show that CMC can effectively increase the cache hit ratios and reduce the content fetching hops and average request delay compared with the traditional routing algorithms in CCN.…”
Get full text
Article -
925
Individual encounter prediction based on mobile internet record data
Published 2017-10-01“…Studies on human movement behavior have drawn much attention with the availability of unprecedented amount of records with high accuracy involving individuals’ trajectories.The encounter prediction problem based on the session data generated by users’ mobile terminal was studied when users accessed the internet for data usage.Firstly,the network based on the encounter relations between users was constructed.Secondly,the network topology features were analyzed and user mobility characteristics and user internet behavior characteristics were introduced.Finally,the prediction model based on random forest was applied.The experimental results show that compared with the traditional network topology features,the prediction performance can be significantly improved by introducing the user mobility characteristics and user internet behavior characteristics.…”
Get full text
Article -
926
Pengembangan Aplikasi Pemantauan Jaringan Berbasis Web pada Software-Defined Networking dengan Protokol SFLOW
Published 2021-11-01“…Hasil pengembangan aplikasi menghasilkan tiga buah fitur utama yaitu topologi, grafik traffic, dan laporan. Visualisasi topologi dibuat berdasarkan data topologi dari API ONOS dan ditampilkan menggunakan pustaka vis.js. …”
Get full text
Article -
927
Feasibility study of IPTV video-on-demand system with setbox-participated P2P distribution
Published 2012-07-01“…In order to reduce the operation and deployment cost of Shanghai Telecom IPTV system,the IPTV VOD scheme with setbox-participated P2P distribution may be feasible.To study the feasibility of this scheme,firstly the primary performance indicator and primary related parameters to evaluate the scheme were proposed;then the actual user behaviors and the real topology of Shanghai Telecom IPTV system were analyzed,a large-scale IPTV simulation system RVSPS was built and this system was stimulated with real topology and actual user behaviors;after that the impact that various parameters have on the primary performance indicator was analyzed;and finally a detailed feasibility was given that study of IPTV VOD scheme with setbox-participated P2P distribution from a technical perspective.…”
Get full text
Article -
928
Fault diagnosis based on sliding mode observer for formation of UAVs
Published 2017-09-01“…Under the directed network topology,formation of UAVs with leader-follower structure was studied.And a fault estimation method using distributed adaptive sliding mode observer was designed for actuator fault with unknown upper bound.First of all,for each network node,based on the directed network topology,relative output estimation error was introduced to show information exchanges between neighbouring nodes.And a corresponding sliding mode observer was constructed.Then the global error system was defined,and the stability and sliding mode reaching condition was proved by Lyapunov theory.At last,all the parameters to be designed were calculated by the linear matrix inequality toolbox,and the validity of the proposed method was verified by Matlab simulation.…”
Get full text
Article -
929
Service function chain deployment algorithm based on optimal weighted graph matching
Published 2019-03-01“…Service function chain can support flexible network service requirement by linking virtual network functions.Aiming at the problem of service function chain deployment in a resource-constrained network,an algorithm for service function chain deployment based on optimal weighted graph matching was proposed.The service function chains was composed into graphs of functional topography,and the optimal matching results between graphs of functional topology and physical topology was obtained using eigendecomposition approach,and furtherly the matching results by hill-climbing method was optimized.Simulation results show that,the proposed algorithm can reduce the required bandwidth to deploy service function chains,balance the load of nodes and bandwidth of links,and support more service requests.What is more,the algorithm has a lower computation complexity and higher time efficience.…”
Get full text
Article -
930
Minimal coding cost and low delay multicast routing of wireless mesh networks
Published 2016-01-01“…MNCLDMR protocol introduces the concept of topology key nodes and network coding key nodes, serving as the routing metric whether the next hop nodes were network coding key nodes or topology key nodes, using MNCLD algorithm construct multicast tree. …”
Get full text
Article -
931
Cache allocation policy of service contents along delivery paths for the smart collaborative network
Published 2016-03-01“…A cache allocation policy(CA)of service contents along delivery paths was proposed for the smart collabora-tive network.CA allocates on-path caches to service contents based on their popularity,expecting to fully and efficiently utilize the cache resource along the delivery path and further improving the network performance.The performance of proposed policy CA was evaluated under a 5-layer tree topology and a 279-node real network topology.The results show that CA outperforms others in terms of tested performance indexes.Compared with LCE(leave copy everywhere)used by named data networking(NDN),CA reduces the distance that users fetch service contents over 20%.…”
Get full text
Article -
932
New Rough Approximations Based on E-Neighborhoods
Published 2021-01-01“…This paper puts forward some rough approximations which are motivated from topology. Given a subset R⊆U×U, we can use 8 types of E-neighborhoods to construct approximations of an arbitrary X⊆U on the one hand. …”
Get full text
Article -
933
Improving community structure strategy for efficiently enhancing Internet transmission performance
Published 2013-04-01“…An efficient weakening community structure strategy (WCS) by adding links to the existing networks was propose,which could enhance Internet transmission performance.Internet topology reconstruction could be realized by WCS strategy,because lightpaths that represent logical links between nodes could achieve the same high performance as physical links by means of optically bypassing intermediate nodes.The performance of the proposed strategy was investigated in pseudo random networks with community structure scale-free network with community structure and Internet,topology respectively,for both local routing strategy and global shortest-path routing strategy.The experimental results show that the traffic capacity of networks and the average shortest path are considerably improved by adding a few links among communities.…”
Get full text
Article -
934
The Intertemporal Evolution Model of Enterprise R&D Cooperative Network
Published 2019-01-01“…Results show that (1) when the R&D network evolution reaches a stable state, the joint distribution of stock knowledge and the number of cooperative enterprises do not affect the initial R&D network topology. However, the evolution path of the enterprise R&D network is complicated by the initial R&D network topology. (2) Among the three factors through which enterprises make decisions, if the enterprise values previous history highly, then the stock knowledge in a steady state will dissipate; if the enterprise values reputation highly, then the stock knowledge in a steady state will decrease but always above a threshold; if the enterprise values attractiveness highly, then the stock knowledge in a steady state can rise to a high level. …”
Get full text
Article -
935
Towards accurate anomaly detection for cloud system via graph-enhanced contrastive learning
Published 2024-11-01“…Moreover, complicated topological associations existed between cloud servers (e.g., computation, storage, and communication). …”
Get full text
Article -
936
A Design of a Redundancy-Based Cascaded Bidirectional DC–DC Converter for Improved Reliability in Energy Storage Devices
Published 2024-01-01“…Thus, the topology is provided merging the cascaded bidirectional Boost converter and cascaded bidirectional Cuk converter. …”
Get full text
Article -
937
Layered energy equalization structure for series battery pack based on multiple optimal matching
Published 2025-04-01“…Furthermore, a directed graph-based approach was proposed to represent the circuit topology equivalently as a multi-weighted network. …”
Get full text
Article -
938
Routledge handbook of African literature /
Published 2019Table of Contents: “…Geopolitical and global topologies in fiction: Islam at the fault lines and the world /…”
View in OPAC
Book -
939
Wireless virtual network embedding algorithm based on link reliability
Published 2012-09-01“…According to the problem of the poor reliability of wireless network links affectting wireless virtual network embedding,a wireless virtual network embedding algorithm based on link reliability named WVNEA-LR was proposed.This algorithm through the physical network topology pretreatment and the method of allowing multiple virtual nodes in the same virtual request mapping to the same physical nodes,improved the success rate of virtual networks construction and saved the physical link resources.The problem that low success ratio of virtual networks construction results from topology sparse was also improved with Q fact.Besides,node embedding of WVNEA-LR made the preparation for link embedding and this algorithm ensured virtual network embedded with high reliability via choosing high reliable paths during link embedding.Simulation results show the better success rate of virtual networks construction and higher resource utility can be acquired.…”
Get full text
Article -
940
Power communication website bandwidth estimation method based on position weighting
Published 2018-10-01“…A power communication network site point communication bandwidth estimation method was proposed,which was related to the field of power communication networks.Firstly,according to a topology diagram of a power communication network,the local importance of the power communication site in the power communication network was determined.Then,the local importance and global importance of the power communication website was merged to obtain the actual importance value of the power communication website.Secondly,according to the actual importance value,each station’s communication bandwidth estimation model was determined.The data traffic redundancy factor was calculated based on the site communication bandwidth estimation model to calculate the planning bandwidth of the power communication site.The station’s position in the network topology was used to calculate the importance of the site and the importance of the node was introduced into the communication bandwidth of the site in the proposed method.In the estimation,the inaccuracy of traditional site communication bandwidth estimation result was overcome.…”
Get full text
Article