Showing 1,261 - 1,280 results of 2,667 for search '"Topology"', query time: 0.05s Refine Results
  1. 1261

    Local routing strategy in network simulation based on Zone_Cut by Zhao-xin ZHANG, Yue-jin DU, Ke WANG, Xuan-chun1 WANG, Zhi-yu HAO

    Published 2013-07-01
    “…Local routing strategy based on Zone_Cut was put forward for network simulation.All nodes in topology were divided into three zones, including T Zone, LD Zone and HD Zone according to the property of the node. …”
    Get full text
    Article
  2. 1262

    Research on Energy Saving Algorithm of 5G Relay Cellular Network by Yangbo Guo, Zhizhong Zhang, Haonan Hu, Fang Cheng

    Published 2015-03-01
    “…The energy saving issue of 5G relay cellular network was discussed.Relay technology is an important technology in the fifth generation mobile communication network(5G).By switching some base stations with low traffic into sleep mode,the energy can be saved.Therefore,the state of base stations in 5G may convert usually,the network topology and business changed over time.Considering both quality of service(QoS)and power consumption of the whole network,a dynamic energy saving(DES)algorithm was proposed to optimize the overall performance of QoS and energy efficiency for 5G relay cellular network.Simulation results under different traffic conditions demonstrate that the DES algorithm can reconfigure the network,shut down part of the base station and relay nodes to significantly reduce energy consumption,especially when the network load is low.…”
    Get full text
    Article
  3. 1263

    Node mobility scheme in emergency multi-hop wireless network by Kangrong ZHANG, Jiming LIN, Lin ZHENG

    Published 2018-09-01
    “…When there is a segmentation phenomenon in the network,the increase in throughput easily leads to network congestion.The key problem that causes network segmentation is that there are key nodes in the network.The key nodes are public nodes of a large number of network routes,which lead to the increase of energy consumption of key nodes and the decrease of network communication efficiency.A node mobility scheme based on dependency graphs to compensate for network segmentation was proposed.Firstly,the key nodes that cause congestion in the network were determined through the dependency graph.Then,the neighboring points of the key nodes were selected.Under the condition that the topology of the nodes were unchanged,moving in the divection of the shortest connected distance to establish a backup route of the key node position.The simulation results show that compared with the existing node mobility schemes,this scheme has significant performance improvements in network connectivity,coverage and network life cycle.…”
    Get full text
    Article
  4. 1264

    Design of automatic routing algorithm based on overlapping hierarchical induction by Jianhong ZHENG, Heyun CHEN, Pengguang ZHOU, Hao XU

    Published 2018-02-01
    “…Aiming at the problem of impulse noise with large amplitude fluctuation and strong time-varying characteristics,which seriously affected the communication performance of power carrier network,the power line network topology and the classical routing algorithm of power line carrier communication were analyzed,and on this basis,an algorithm of overlapping hierarchical induction algorithm (OHIA) was proposed,which proved the feasibility of the algorithm and gave the inductive factor transfer algorithm,route addressing process and forecast based route maintenance strategy.Through the NS-3 simulation platform to establish the PLC model,respectively,ant colony algorithm and overlapping layer induced PLC automatic routing algorithm were simulated.The simulation results show that compared with the ant colony algorithm,the proposed algorithm improves the success rate of the first communication in the strong time-varying channel environment,and makes great progress in the large-scale networking of PLC.…”
    Get full text
    Article
  5. 1265

    Multichannel Broadcast Based on Home Channel for Cognitive Radio Sensor Networks by Fanzi Zeng, Yuting Tang, Jianjie Pu

    Published 2014-01-01
    “…This protocol maintains the networks topology only through the home channel, so there is no need for the public channel to transmit the control information and no need for the synchronization. …”
    Get full text
    Article
  6. 1266

    High resistance botnet based on smart contract by Hao ZHAO, Hui SHU, Fei KANG, Ying XING

    Published 2021-08-01
    “…The development and application of blockchain technology makes it possible to build a more robust and flexible botnet command and control channel.In order to better study this type of potential new botnet threats, a highly confrontational botnet model based on blockchain smart contracts-SCBot was proposed.The SCBot model adopts a hierarchical hybrid topology structure, builds a command transmission channel based on smart contracts at the zombie subnet layer, and establishes a credibility evaluation mechanism to determine the authenticity of nodes, and enhances the confrontation of the network from the two major levels of traffic and terminals.The construction of small botnet clusters were simulated, comparative experiments on SCBot's command transmission efficiency and robustness were conducted, and its feasibility in the real environment from the perspective of economic costs was analyzed.Finally, a brief analysis and discussion of the defense strategy of this type of botnet were given.…”
    Get full text
    Article
  7. 1267

    Deployment scheme of WSN relay nodes based on artificial bee colony optimization by Kainan LIU, Xu HAN

    Published 2016-09-01
    “…In wireless sensor network(WSN),the relay node deployment performance is one of the main factors to affect network life.Aiming at the WSN with 3-demension high density,there is no existing relay node deployment schemes enhancing the network life efficiently with the constraints of hardware cost and network connectivity.Hence,a novel deployment scheme called artificial bee colony(ABC)-based relay node deployment scheme(ABC-RNDS)was proposed based on network-grid deployment method.In ABC-RNDS,double-layer topology was adopted to build WSN,which used minimum spanning tree to construct the backbone nodes of WSN,and applied ABC to extend the network lifetime by optimizing network parameters and constraining the number of relay nodes.The simulation results show that,compared to the traditional deployment scheme,ABC-RNDS can improve network lifetime significantly under constrains of cost and connectivity.…”
    Get full text
    Article
  8. 1268

    Intelligent Control System Design of Ring Light via IOT Mobile Robot by Xianzhi Kang, Yue Teng

    Published 2023-01-01
    “…The experimental results show that the equalization strategy designed in this study has a good equalization effect in the loop interleaving parallel topology, strong adaptive parameter adjustment ability, good robustness, and anti-interference.…”
    Get full text
    Article
  9. 1269

    Task collaborative offloading scheme in vehicle multi-access edge computing network by Guanhua QIAO, Supeng LENG, Hao LIU, Kaisheng HUANG, Fan WU

    Published 2019-03-01
    “…In order to solve the problem that traditional mobile edge computing network can’t be straightforwardly applied to the Internet of vehicles (IoV) due to high speed mobility and dynamic network topology,a vehicular edge multi-access computing network (VE-MACN) was introduced to realize collaborative computing offloading between roadside units and smart vehicles.In this context,the collaborative computation offloading was formulated as a joint multi-access model selection and task assignment problem to realize the good balance between long-term system utility,diverse needs of IoV applications and energy consumption.Considering the complex joint optimization problem,a deep reinforcement learning-based collaborative computing offloading scheme was designed to overcome the curse of dimensionality for Q-learning algorithm.The simulation results demonstrate that the feasibility and effectiveness of proposed offloading scheme.…”
    Get full text
    Article
  10. 1270

    A Model for Evolution of Investors Behavior in Stock Market Based on Reinforcement Learning in Network by Xiaqun Liu, Yaming Zhuang, Jinsheng Li

    Published 2020-01-01
    “…Second, the network topology significantly affects the behavioral evolution of individual investors compared with institutional investors.…”
    Get full text
    Article
  11. 1271

    Positively charged cytoplasmic residues in corin prevent signal peptidase cleavage and endoplasmic reticulum retention by Hui Li, Shijin Sun, Wenjun Guo, Lina Wang, Zihao Zhang, Yue Zhang, Ce Zhang, Meng Liu, Shengnan Zhang, Yayan Niu, Ningzheng Dong, Qingyu Wu

    Published 2025-01-01
    “…Abstract Positively charged residues are commonly located near the cytoplasm-membrane interface, which is known as the positive-inside rule in membrane topology. The mechanism underlying the function of these charged residues remains poorly understood. …”
    Get full text
    Article
  12. 1272

    Computational measures of irregularity molecular descriptors of octahedral and icosahedral networks by Xiujun Zhang, Hafiz Mutee ur Rehman, M. Mobeen Munir

    Published 2025-01-01
    “…These networks are used in crystallography, where the topology and structural aspects are carrying some important facts to determine the properties of large structures theoretically. …”
    Get full text
    Article
  13. 1273

    Energy spectrum and magnetic properties of the decorated spin ladder models of nanomagnets on the base of polymeric transition metal compounds by Vladyslav Cheranovskii, Viktoriia Mukhomodiarova

    Published 2023-04-01
    “…The work is devoted to the theoretical study of the energy spectrum and low-temperature magnetic properties of the decorated spin-ladder model with the polyacene topology and the three types of the site spins. On the base of cluster expansion technique an approximate analytical treatment of lowest part of the energy spectra of two isomeric ladder structures was given. …”
    Get full text
    Article
  14. 1274

    Thomas Hardy : une écriture paradoxale entre génération et dégradation entropique by Annie Escuret

    Published 2007-03-01
    “…Mikhail Bakhtin (1895-1975) used Einstein’s ideas of space-time to coin the term « chronotope » to refer to his theory of the distinctive use of topology in particular genres of fiction. Hardy’s Wessex is a poetic creation that generates a new sort of time and space. …”
    Get full text
    Article
  15. 1275

    Robust Time-Varying Output Formation Control for Swarm Systems with Nonlinear Uncertainties by Xiaofeng Chai, Qing Wang, Yao Yu, Changyin Sun

    Published 2020-01-01
    “…Time-varying output formation control problems for high-order time-invariant swarm systems are studied with nonlinear uncertainties and directed network topology in this paper. A robust controller which consists of a nominal controller and a robust compensator is applied to achieve formation control. …”
    Get full text
    Article
  16. 1276

    Evolution and industry trend of 5G key technologies by Jing CHONG, Xiaoyong TANG, Lei ZHU, Na LI, Jue ZHANG, Zhengpeng YOU, Peike XU, Jia LIU

    Published 2022-05-01
    “…With the further integration of 5G and the industry, the current standard-defined Release 15/Release 16/Release 17 capabilities were slightly insufficient to support industry needs.The technological evolution direction of 5G-Advanced (Release 18) was reviewed in detail, and potential technical solutions for the technological evolution were given, including downlink MIMO enhancement, uplink transmission enhancement, mobility enhancement, topology transmission technology enhancement, Sidelink enhancement, RedCap technology evolution, positioning capability expansion and enhancement, AI/ML 5G, etc.At the same time, the current industry scene was analyzed in detail, those existing problems including industry terminal access, access network, E2E QoS guarantee, etc.The 5G technologies including SLA-based industry networking, high out-of-band (OOB) suppression, multi-buffer scheduling (MBS), fully connected industry access network technology, computing force network (CFN) technology, and potential implementation methods were proposed.…”
    Get full text
    Article
  17. 1277

    Distance-Based Stable Routing Decision Scheme in Urban Vehicular Ad Hoc Networks by Sang-woo Chang, Sang-sun Lee

    Published 2015-08-01
    “…Although a large number of routing protocols have been developed in MANET, the VANET has different environments such as highly dynamic topology, frequently disconnected network, hard delay constraints for safety-related application, and various communications environments (e.g., highway or urban traffic scenarios). …”
    Get full text
    Article
  18. 1278

    Method of dynamic random network coding in DTN environment by Guang-hong DENG, Wan-hua CAO, Jian ZHANG, Li FENG, Xiong CHENG

    Published 2014-02-01
    “…With the dynamical features of mobility, intermittent connectivity and dynamic topology in delay tolerant net-work (DTN), the static random network coding methods become difficult to adapt to the applications in DTN environ-ment. …”
    Get full text
    Article
  19. 1279

    Timing evolution and prediction of Internet transmission behavior by He TIAN, Hai ZHAO, Jinfa WANG, Chuan LIN

    Published 2018-06-01
    “…The transmission behavior of Internet plays an importance role in the research on the relationship between network topology structure and dynamic behavior.Selecting effective path samples in four monitoring points which from different regions authorized by CAIDA_Ark project and statistics network traveling time and traveling diameter,their correlation is very weak,network traveling time is presented on multi-peak and heavy tail distribution.Using nonlinear time sequences analysis method to identify the Chaos characteristics of network traveling time evolution sequences.The results show that their timing evolution has Chaos characteristics.Based on this,the Logistic equation was lead to establish network transmission behavior prediction model,and particle swarm optimization (PSO) was used to optimize model parameters.The model by the network traveling time sequences of four monitoring points was experimented,evaluated it from accuracy and availability,the results show that the model can predict network transmission behavior accurately in the short term.It can be used as a tool for predicting the network behaviors’ evolution in a period of time.…”
    Get full text
    Article
  20. 1280

    Decision synthesis in engineering design of technological attachment by D. P. Kunkevich, I. L. Kovaleva, A. A. Baryshau

    Published 2021-08-01
    “…The fixtures for locating and clamping parts to be tooled at the manufacturing operations are the design objects. An approach to topology and parametric design are proposed. Most efficiently these tasks are solved at the function level. …”
    Get full text
    Article