-
1081
Fuzzy Inverse Compactness
Published 2008-01-01“…We introduce definitions of fuzzy inverse compactness, fuzzy inverse countable compactness, and fuzzy inverse Lindelöfness on arbitrary 𝐿-fuzzy sets in 𝐿-fuzzy topological spaces. We prove that the proposed definitions are good extensions of the corresponding concepts in ordinary topology and obtain different characterizations of fuzzy inverse compactness.…”
Get full text
Article -
1082
Fuzzy r-continuous and fuzzy r-semicontinuous maps
Published 2001-01-01“…Using fuzzy r-interior, we define fuzzy r-semiopen sets and fuzzy r-semicontinuous maps which are generalizations of fuzzy semiopen sets and fuzzy semicontinuous maps in Chang's fuzzy topology, respectively. Some basic properties of fuzzy r-semiopen sets and fuzzy r-semicontinuous maps are investigated.…”
Get full text
Article -
1083
Automatic Verification Analysis Technology of Network Security Domain
Published 2015-01-01“…By studying the automatic verification analysis techniques of network security domain, a secure domain topology automatically restore and security domains devices interconnected relations, security domain boundaries and border access control policy automatic verification were achieved. …”
Get full text
Article -
1084
Bipartite Containment Control for Multiagent Systems with Adaptive Quantization Information
Published 2022-01-01“…In this study, bipartite containment control for multiagent systems (MASs) with quantitative information is investigated. Communication topology is structurally balanced, and the follower’s trajectory is within the area surrounded by the leader by designing distributed error terms. …”
Get full text
Article -
1085
Quantitative analysis of BGP convergence and its influence on network performance
Published 2007-01-01“…The relation of BGP convergence and the characteristics of the inter-domain system was analyzed.The in-ter-domain routing system is classified into three hierarchies—core layer,transmit layer and stub layer based on the power law and commercial relations of autonomous systems.The relation of network topology and convergence parame-ters were presented of all sorts of convergence events in different layers.And a new proposal has been presented to im-prove BGP convergence based on the above analysis,called Best Up,which behaved better than normal convergence mode in the experiments.…”
Get full text
Article -
1086
Network latency clustering for detector placement on macroscopical prewarning
Published 2006-01-01“…Research on the network-based and distributed intrusion detection was aroused by the burst-outs of large-scale security events.How to place detection instruments was the key to the detections.The problem of detector placement was turned to that of the clustering of topology graph.A novel bidirectional hierarchical clustering algorithm was put forward,which decreased the amount of result clusters by integration of initial marker selection method based on node out-degree.The simulation results demonstrates that our clustering approaches effectively identify clusters and been employed in the measured real network of the backbone.…”
Get full text
Article -
1087
Research of composite safety protection for digital maps
Published 2016-02-01“…In order to preserve topology of map effectly by the large embedding rates and protect the safety of watermarking scenario, a gray balance means was provided, and the maximum capacity in each divided rectangle blocks in the electronic charts was computed.The experiment also shows that it can adapt to data perturbation by conventional operations.The method has better robustness.…”
Get full text
Article -
1088
The Long-Run Behavior of Consumption and Wealth Dynamics in Complete Financial Market with Heterogeneous Investors
Published 2014-01-01“…First, long-run behaviors, specifically golden rules or modified golden rules, about consumption path and wealth accumulation are investigated under uncertainty and in the sense of uniform topology. Second, inefficacy of temporary taxation policies, which are chosen to be consumption tax and wealth tax, is confirmed in the current financial market.…”
Get full text
Article -
1089
Type Synthesis of the Mechanism of Pulse CVT based on Kinematic Chain
Published 2018-01-01“…According to the topology configuration of the existing pulse CVT,the design requirements of the pulse CVT are summarized and the kinematic chain satisfying the design requirements is calculated by the combination. …”
Get full text
Article -
1090
Improved brain functional network in major depressive disorder with suicidal ideation after individual target-transcranial magnetic stimulation treatment: a graph-theory analysis
Published 2025-01-01“…The functional network of all three groups conformed to small-world topology. There was a renormalization in topology structure after IT-TMS treatment. …”
Get full text
Article -
1091
Multistability of synchronous modes in a multimachine power grid with a common load and their global and non-local stability
Published 2025-01-01“…The approach for reducing the effective network to the network with a hub topology (star topology) is proposed. We use numerical methods to construct a partition of the parameter space into areas with different operating modes of the power grid. …”
Get full text
Article -
1092
Multi-Temporal Analysis and Techno-Economic Evaluation of Offshore Wind Energy Integration to the Western Interconnection
Published 2024-01-01“…Three generation and transmission scenarios across two future representations of the Western Interconnection (WI) are modeled, and detailed production cost modeling (PCM) and power flow (PF) models of each topology were constructed. A novel multi-terminal high voltage direct current (MTDC) model was developed and utilized, and its performance is compared with conventional high voltage direct current (HVDC) radial topology. …”
Get full text
Article -
1093
Deep Ensemble Learning for Human Action Recognition in Still Images
Published 2020-01-01“…The nonsequential network topology of NCNN can separately learn the spatial- and channel-wise features with parallel branches, which helps improve the model performance. …”
Get full text
Article -
1094
Deteksi Cepat Kadar Alkohol Pada Minuman Kopi dengan Metode Dielektrik dan Jaringan Syaraf Tiruan
Published 2022-02-01“…Analisis sensitivitas dengan input sifat biolistrik (induktansi, kapasitansi, resistansi dan impedansi) dan output kadar alkohol dan pH didapat topologi JST terbaik yaitu 4-10-30-2. Pada topologi JST terbaik didapat MSE pelatihan 0,000948 dan MSE validasi 0,0011 serta koefisien korelasi (R) pelatihan sebesar 0,99929 dan R validasi 0,99985. …”
Get full text
Article -
1095
Functional switching among dynamic neuronal hub-nodes in the brain induces maintenance/transition of cognitive states
Published 2025-01-01“…The functional topology trends of the underlying hierarchical network organization have been characterized by the percentage of the hub and non-hub nodes, which further determines the global and local connectivity trends. …”
Get full text
Article -
1096
Dynamics Modeling and Analysis of a 5-DOF Parallel Manipulator Arm with Closed Loop Branch Chain
Published 2020-07-01“…A double closed loop 5-DOF manipulator arm is proposed, which adds a closed loop structure on the basis of((2-UPS)+U)PU configuration to obtain a new topology configuration 2-UPS+((2-UPS)+U)PU. The introduction of the closed loop structure enables the mechanism to obtain a higher carrying capacity and provides a new idea for the new topology configuration. …”
Get full text
Article -
1097
Low-power multicast routing algorithm in green Internet
Published 2014-10-01“…A path node-driven strategy based one-to-many multicast routing algorithm in green Internet (GIOMR) is proposed to generate a low-power shortest path tree,fully making use of the path node sharing paths and meanwhile improving user’s QoS satisfaction degree.The GIOMR is implemented over CERNET2 topology by simulation.It has been shown that GIOMR has better performance on the network power consumption,the success rate of routing and the running time than efficient heuristics for energy-aware routing (EHER) algorithm.…”
Get full text
Article -
1098
Research and implementation of network transmission situation awareness
Published 2010-01-01“…The advanced ideas of situation awareness were introduced to network transmission and NTSA(network transmission situation awareness) model was established based on spatial traffic clustering.Around the key technologies of the model,situation factors were selected according to information gain and mutual information;a high-dimensional data stream clustering algorithm for transmission pattern partition as well as a topology importance analysis method of network element based on graph theory were proposed;furthermore,a NTSA prototype system was designed and imple-mented.The experiment results on real datasets demonstrate the efficiency,effectiveness and scalability.…”
Get full text
Article -
1099
Stable enclosure based hybrid routing schema in heterogeneous wireless networks
Published 2012-09-01“…The model of heterogeneous wireless networks was analyzed and a hybrid routing schema based on MANET stable enclosure was proposed.This schema could transform the routing protocol between MANET and DTN based on the local topology in real time.In the stable enclosure,AODV was used to improve packet relaying efficiency.When packet relayed to the disconnected area,the routing protocol transcended to Prophet to avoid routing failed.It fully used the advantage of MANET and DTN routing protocol.The feasibility of the proposed algorithm is demonstrated,and it is more efficient than the other DTN routing protocols used in the heterogeneous wireless networks.…”
Get full text
Article -
1100
Performance Evaluation of the WSN Routing Protocols Scalability
Published 2008-01-01“…A good routing protocol has to be scalable and adaptive to the changes in the network topology. Thus scalable protocol should perform well as the network grows larger or as the workload increases. …”
Get full text
Article