Showing 1,081 - 1,100 results of 2,667 for search '"Topology"', query time: 0.05s Refine Results
  1. 1081

    Fuzzy Inverse Compactness by Halis Aygün, A. Arzu Bural, S. R. T. Kudri

    Published 2008-01-01
    “…We introduce definitions of fuzzy inverse compactness, fuzzy inverse countable compactness, and fuzzy inverse Lindelöfness on arbitrary 𝐿-fuzzy sets in 𝐿-fuzzy topological spaces. We prove that the proposed definitions are good extensions of the corresponding concepts in ordinary topology and obtain different characterizations of fuzzy inverse compactness.…”
    Get full text
    Article
  2. 1082

    Fuzzy r-continuous and fuzzy r-semicontinuous maps by Seok Jong Lee, Eun Pyo Lee

    Published 2001-01-01
    “…Using fuzzy r-interior, we define fuzzy r-semiopen sets and fuzzy r-semicontinuous maps which are generalizations of fuzzy semiopen sets and fuzzy semicontinuous maps in Chang's fuzzy topology, respectively. Some basic properties of fuzzy r-semiopen sets and fuzzy r-semicontinuous maps are investigated.…”
    Get full text
    Article
  3. 1083

    Automatic Verification Analysis Technology of Network Security Domain by Xiaofeng Liu, Bin Tan, Lan Qiu, Huanru Wang

    Published 2015-01-01
    “…By studying the automatic verification analysis techniques of network security domain, a secure domain topology automatically restore and security domains devices interconnected relations, security domain boundaries and border access control policy automatic verification were achieved. …”
    Get full text
    Article
  4. 1084

    Bipartite Containment Control for Multiagent Systems with Adaptive Quantization Information by Jie Wu, Heng Lei, Xisheng Zhan

    Published 2022-01-01
    “…In this study, bipartite containment control for multiagent systems (MASs) with quantitative information is investigated. Communication topology is structurally balanced, and the follower’s trajectory is within the area surrounded by the leader by designing distributed error terms. …”
    Get full text
    Article
  5. 1085

    Quantitative analysis of BGP convergence and its influence on network performance by ZHAO Jin-jing, ZHU Pei-dong, LU Xi-cheng

    Published 2007-01-01
    “…The relation of BGP convergence and the characteristics of the inter-domain system was analyzed.The in-ter-domain routing system is classified into three hierarchies—core layer,transmit layer and stub layer based on the power law and commercial relations of autonomous systems.The relation of network topology and convergence parame-ters were presented of all sorts of convergence events in different layers.And a new proposal has been presented to im-prove BGP convergence based on the above analysis,called Best Up,which behaved better than normal convergence mode in the experiments.…”
    Get full text
    Article
  6. 1086

    Network latency clustering for detector placement on macroscopical prewarning by HE Hui, HU Ming-zeng, YUN Xiao-chun, ZHANG Hong-li

    Published 2006-01-01
    “…Research on the network-based and distributed intrusion detection was aroused by the burst-outs of large-scale security events.How to place detection instruments was the key to the detections.The problem of detector placement was turned to that of the clustering of topology graph.A novel bidirectional hierarchical clustering algorithm was put forward,which decreased the amount of result clusters by integration of initial marker selection method based on node out-degree.The simulation results demonstrates that our clustering approaches effectively identify clusters and been employed in the measured real network of the backbone.…”
    Get full text
    Article
  7. 1087

    Research of composite safety protection for digital maps by Feng XU, Jia-nan LI, Jian-guo SUN

    Published 2016-02-01
    “…In order to preserve topology of map effectly by the large embedding rates and protect the safety of watermarking scenario, a gray balance means was provided, and the maximum capacity in each divided rectangle blocks in the electronic charts was computed.The experiment also shows that it can adapt to data perturbation by conventional operations.The method has better robustness.…”
    Get full text
    Article
  8. 1088

    The Long-Run Behavior of Consumption and Wealth Dynamics in Complete Financial Market with Heterogeneous Investors by Darong Dai

    Published 2014-01-01
    “…First, long-run behaviors, specifically golden rules or modified golden rules, about consumption path and wealth accumulation are investigated under uncertainty and in the sense of uniform topology. Second, inefficacy of temporary taxation policies, which are chosen to be consumption tax and wealth tax, is confirmed in the current financial market.…”
    Get full text
    Article
  9. 1089

    Type Synthesis of the Mechanism of Pulse CVT based on Kinematic Chain by Song Zhongkang, Bai Lianqiang, Wang Peng

    Published 2018-01-01
    “…According to the topology configuration of the existing pulse CVT,the design requirements of the pulse CVT are summarized and the kinematic chain satisfying the design requirements is calculated by the combination. …”
    Get full text
    Article
  10. 1090

    Improved brain functional network in major depressive disorder with suicidal ideation after individual target-transcranial magnetic stimulation treatment: a graph-theory analysis by Yao Zhang, Nan Mu, Shun Qi, Chuanzhu Sun, Yang Rao, Xinyi Yang, Jianying Guo, Yunfeng Mu

    Published 2025-01-01
    “…The functional network of all three groups conformed to small-world topology. There was a renormalization in topology structure after IT-TMS treatment. …”
    Get full text
    Article
  11. 1091

    Multistability of synchronous modes in a multimachine power grid with a common load and their global and non-local stability by Khramenkov, Vladislav Anatolevich, Dmitrichev, Aleksej Sergeevich, Nekorkin, Vladimir Isaakovich

    Published 2025-01-01
    “…The approach for reducing the effective network to the network with a hub topology (star topology) is proposed. We use numerical methods to construct a partition of the parameter space into areas with different operating modes of the power grid. …”
    Get full text
    Article
  12. 1092

    Multi-Temporal Analysis and Techno-Economic Evaluation of Offshore Wind Energy Integration to the Western Interconnection by Li He, Shahnawaz Siddiqui, Sameer Nekkalapu, Sohom Datta, Travis Douville, Konstantinos Oikonomou, Manisha Maharjan

    Published 2024-01-01
    “…Three generation and transmission scenarios across two future representations of the Western Interconnection (WI) are modeled, and detailed production cost modeling (PCM) and power flow (PF) models of each topology were constructed. A novel multi-terminal high voltage direct current (MTDC) model was developed and utilized, and its performance is compared with conventional high voltage direct current (HVDC) radial topology. …”
    Get full text
    Article
  13. 1093

    Deep Ensemble Learning for Human Action Recognition in Still Images by Xiangchun Yu, Zhe Zhang, Lei Wu, Wei Pang, Hechang Chen, Zhezhou Yu, Bin Li

    Published 2020-01-01
    “…The nonsequential network topology of NCNN can separately learn the spatial- and channel-wise features with parallel branches, which helps improve the model performance. …”
    Get full text
    Article
  14. 1094

    Deteksi Cepat Kadar Alkohol Pada Minuman Kopi dengan Metode Dielektrik dan Jaringan Syaraf Tiruan by Sucipto Sucipto, Yuyun Rohmawati, Dyah Ayu Widyaningrum, Danang Triagus Setiyawan

    Published 2022-02-01
    “…Analisis sensitivitas dengan input sifat biolistrik (induktansi, kapasitansi, resistansi dan impedansi) dan output kadar alkohol dan pH didapat topologi JST terbaik yaitu 4-10-30-2. Pada topologi JST terbaik didapat MSE pelatihan 0,000948 dan MSE validasi 0,0011 serta koefisien korelasi (R) pelatihan sebesar 0,99929 dan R validasi 0,99985. …”
    Get full text
    Article
  15. 1095

    Functional switching among dynamic neuronal hub-nodes in the brain induces maintenance/transition of cognitive states by Jasleen Gund, Yashaswee Mishra, B. N. Mallick, R. K. Brojen Singh

    Published 2025-01-01
    “…The functional topology trends of the underlying hierarchical network organization have been characterized by the percentage of the hub and non-hub nodes, which further determines the global and local connectivity trends. …”
    Get full text
    Article
  16. 1096

    Dynamics Modeling and Analysis of a 5-DOF Parallel Manipulator Arm with Closed Loop Branch Chain by Zhang Dianfan, Zhang Xingchao, Yu Jin, Dai Shijie, Zhang Shijun

    Published 2020-07-01
    “…A double closed loop 5-DOF manipulator arm is proposed, which adds a closed loop structure on the basis of((2-UPS)+U)PU configuration to obtain a new topology configuration 2-UPS+((2-UPS)+U)PU. The introduction of the closed loop structure enables the mechanism to obtain a higher carrying capacity and provides a new idea for the new topology configuration. …”
    Get full text
    Article
  17. 1097

    Low-power multicast routing algorithm in green Internet by Jin-hong ZHANG, Xing-wei WANG, Min HUANG

    Published 2014-10-01
    “…A path node-driven strategy based one-to-many multicast routing algorithm in green Internet (GIOMR) is proposed to generate a low-power shortest path tree,fully making use of the path node sharing paths and meanwhile improving user’s QoS satisfaction degree.The GIOMR is implemented over CERNET2 topology by simulation.It has been shown that GIOMR has better performance on the network power consumption,the success rate of routing and the running time than efficient heuristics for energy-aware routing (EHER) algorithm.…”
    Get full text
    Article
  18. 1098

    Research and implementation of network transmission situation awareness by ZHUO Ying, GONG Chun-ye, GONG Zheng-hu

    Published 2010-01-01
    “…The advanced ideas of situation awareness were introduced to network transmission and NTSA(network transmission situation awareness) model was established based on spatial traffic clustering.Around the key technologies of the model,situation factors were selected according to information gain and mutual information;a high-dimensional data stream clustering algorithm for transmission pattern partition as well as a topology importance analysis method of network element based on graph theory were proposed;furthermore,a NTSA prototype system was designed and imple-mented.The experiment results on real datasets demonstrate the efficiency,effectiveness and scalability.…”
    Get full text
    Article
  19. 1099

    Stable enclosure based hybrid routing schema in heterogeneous wireless networks by Zhi LI, Yi JIANG, Qian-mu LI, Feng-yu LIU

    Published 2012-09-01
    “…The model of heterogeneous wireless networks was analyzed and a hybrid routing schema based on MANET stable enclosure was proposed.This schema could transform the routing protocol between MANET and DTN based on the local topology in real time.In the stable enclosure,AODV was used to improve packet relaying efficiency.When packet relayed to the disconnected area,the routing protocol transcended to Prophet to avoid routing failed.It fully used the advantage of MANET and DTN routing protocol.The feasibility of the proposed algorithm is demonstrated,and it is more efficient than the other DTN routing protocols used in the heterogeneous wireless networks.…”
    Get full text
    Article
  20. 1100

    Performance Evaluation of the WSN Routing Protocols Scalability by L. Alazzawi, A. Elkateeb

    Published 2008-01-01
    “…A good routing protocol has to be scalable and adaptive to the changes in the network topology. Thus scalable protocol should perform well as the network grows larger or as the workload increases. …”
    Get full text
    Article