Suggested Topics within your search.
Suggested Topics within your search.
- Law reports, digests, etc 5
- Mathematical analysis 3
- Mathematics 3
- Number theory 3
- 44.83 rheumatology, orthopedics 2
- History 2
- MATHEMATICS / Mathematical Analysis 2
- Orthopedics 2
- Quality of life 2
- Social conditions 2
- Social problems 2
- Study and teaching 2
- Academic writing 1
- Analysis 1
- Applied linguistics 1
- COMPUTERS / Internet / General 1
- Cardiac Patient 1
- Chemical reactions 1
- Chemistry 1
- Chirurgie orthopédique 1
- Cloud computing 1
- Communication 1
- Computer scheduling 1
- Descriptive cataloging 1
- Dissertations, Academic 1
- Droit 1
- Economic conditions 1
- Economic policy 1
- Emotions 1
- Fluid mechanics 1
-
1821
Multi-objective optimization placement strategy for SDN security controller considering Byzantine attributes
Published 2021-06-01“…By giving the software defined network distributed control plane Byzantine attributes, its security can be effectively improved.In the process of realizing Byzantine attributes, the number and location of controllers, and the connection relationship between switches and controllers can directly affect the key network performance.Therefore, a controller multi-objective optimization placement strategy for SDN security controllers considering Byzantine attributes was proposed.Firstly, a Byzantine controller placement problem (MOSBCPP) model that comprehensively considered interaction delay, synchronization delay, load difference and the number of controllers was constructed.Then, a solution algorithm based on NASG-II was designed for this model, which included the initialization function, the mutation function, the fast non-dominated sorting function and the elite strategy selection function.Simulation results show that this strategy can effectively reduce interaction delay, synchronization delay, load difference and the number of controllers, while improving control plane security.…”
Get full text
Article -
1822
Numerical Research on Convective Heat Transfer and Resistance Characteristics of Turbulent Duct Flow Containing Nanorod-Based Nanofluids
Published 2018-01-01“…Friction factor of nanofluids with nanorods increases with higher particle volume concentration or aspect ratio, but the increment reduces when the Reynolds number gets larger. The relative Nusselt number is obtained to characterize the intensity of convective heat transfer. …”
Get full text
Article -
1823
On the Global Dynamics of a Vector-Borne Disease Model with Age of Vaccination
Published 2018-01-01“…Using the basic reproduction number, we derive a vaccination coverage rate that is required for disease control and elimination.…”
Get full text
Article -
1824
A Stage-Structured Predator-Prey Model in a Patchy Environment
Published 2020-01-01“…The net reproduction number for each patch in isolation is obtained along with the net reproduction number of the system of patches, ℛ0. …”
Get full text
Article -
1825
A Simple Epidemic Model with Surprising Dynamics
Published 2004-10-01“…Four re-parameterized quantities the basicdemographic reproductive number ($\R_d$), the basic epidemiologicalreproductive number ($\R_0$), the ratio ($\nu$) between the averagelife spans of susceptible and infective class, and the relativefecundity of infectives ($\theta$), are utilized in qualitativeanalysis. …”
Get full text
Article -
1826
Rainbow Connectivity Using a Rank Genetic Algorithm: Moore Cages with Girth Six
Published 2019-01-01“…The computation of the minimum number of colors of a rainbow coloring is known to be NP-Hard and the Rank Genetic Algorithm showed good behavior finding rainbow t-colorings with a small number of colors.…”
Get full text
Article -
1827
Viscous Flow over Nonlinearly Stretching Sheet with Effects of Viscous Dissipation
Published 2012-01-01“…The effect of various values of Prandtl number, Eckert number and nonlinear stretching parameter are studied. …”
Get full text
Article -
1828
Botnets’ similarity analysis based on communication features and D-S evidence theory
Published 2011-01-01“…A potential hidden relationship may exist among different zombie groups.A method to analyze the relationship among botnets was proposed based on the communication activities.The method extracted several communication fea-tures of botnet,including the number of flows per hour,the number of packets per flow,the number of flows per IP and the packet payloads.It defined similarity statistical functions of the communication features,and built the analysis model of botnets relationship based on the advanced dempster-shafer(D-S) evidence theory to synthetically evaluate the simi-larities between different zombie groups.The experiments were conducted using several botnet traces.The results show that the method is valid and efficient,even in the case of encrypted botnet communication messages.Moreover,the ideal processing results is achieved by applying our method to analyze the data captured from the security monitoring platform of computer network,as well as compare with similar work.…”
Get full text
Article -
1829
KORELASI FENOTYPE DAN HASIL JAGUNG MANIS (Zea mays saccharata, Sturt) DI KECAMATAN RUMBAI PEKANBARU
Published 2018-08-01“…Plant height, leaf number, and leaf width did not give a significant correlation to the weight of cobs weighing. …”
Get full text
Article -
1830
Criminal acts eradication of corruption in corporates in Indonesia
Published 2023-03-01“…The results of the analysis conclude that corporations that commit criminal acts of corruption can be held criminally responsible based on doctrine and Law Number 20 of 2001 concerning Amendments to Law Number 31 of 1999 concerning the Eradication of Criminal Acts of Corruption Articles 1, 2 and 3 in terms of formal law. …”
Get full text
Article -
1831
The Impacts of Internet + Rural Financial Industry on County Economy and Industrial Growth Algorithm
Published 2022-01-01“…In recent years, commercial banks and rural financial institutions in and below the county area have developed rapidly, and the number of outlets has increased rapidly. But for the vast rural areas of the country, the number of outlets is still limited. …”
Get full text
Article -
1832
Controlling imported malaria cases in the United States of America
Published 2017-01-01“…We extend the mathematical malaria epidemic model framework of Dembele et al. and use it to “capture” the 2013 Centers for Disease Control and Prevention (CDC) reported data on the 2011 number of imported malaria cases in the USA. Furthermore, we use our “fitted” malaria models for the top 20 countries of malaria acquisition by USA residents to study the impact of protecting USA residents from malaria infection when they travel to malaria endemic areas, the impact of protecting residents of malaria endemic regions from mosquito bites and the impact of killing mosquitoes in those endemic areas on the CDC number of imported malaria cases in USA. …”
Get full text
Article -
1833
Nettree for maximum disjoint paths with length constraint in DAG
Published 2015-08-01“…The problem of the maximum disjoint paths in directed acyclic graphs(DAG)was researched which is to find the maximum disjoint paths with length k between two given vertices.A greedy algorithm named greedy path(GP)was proposed to solve the problem.GP transformed a DAG into a nettree with depth k+1 at first.Then the number of root-leaf paths for each node of the nettree was calculated to achieve the number of total paths for each vertex of the DAG.In order to obtain an optimized disjoint path,GP selected the node in the(k+1)th level of the nettree as the current node,and searched for the optimized parent in the usable parents whose number of total paths was minimal.This process was iterated,until there was no disjoint path.The space and time complexities of GP are O(wkn(p+q))and O(kn(p+q)+n<sup>2</sup>).To evaluate the performance of GP,an algorithm which can create artificial DAG with known maximum disjoint paths was also proposed.Experimental results show that GP can get better performance than other competitive algorithms.…”
Get full text
Article -
1834
Security versus reliability analysis for multi-eavesdropper cooperation wireless networks with best relay
Published 2017-10-01“…Physical-layer security could be used to effectively combat eavesdroppers and the transmission reliability of the main link could be improved.A wireless relay network with multiple both decode and forward eavesdroppers and relays were considered,in the presence of the link from source to destination.A best relay selection scheme based on multieavesdropper’s cooperation was proposed,and the outage probability and the intercept probability was deduced under both schemes without relay and with best relay.Then,the security and reliability influenced by different relay selection schemes were analyzed.The simulation results show that the achievable channel capacity at the destination node and the system outage probability are directly affected by different relay selection scheme.Lower system outage probability can be achieved by the proposed scheme,and the system outage probability and intercept probability are both decreased with the increase of the number of relays.The intercept probability increases with the increase of the number of eavesdroppers,which,however,can be reduced by increasing the number of relays to ensure the main link’s reliable transmission.…”
Get full text
Article -
1835
A Mathematical Model for Peristaltic Transport of Micro-Polar Fluids
Published 2011-01-01“…An in-depth study has been done to learn the effects of coupling number and micro-polar parameter. The effects of coupling number and micro-polar parameter are investigated also on mechanical efficiency, reflux and trapping. …”
Get full text
Article -
1836
Similarity analysis for natural convection from a vertical plate with distributed wall concentration
Published 2000-01-01“…The fundamental parameters of this problem are the Schmidt number, Sc, and reaction order, n. Numerical results, based on the fourth order Runge-Kutta method, for Schmidt number ranging from 0.0 to 100.0 and reaction order from 0.0 to 1.5 are presented. …”
Get full text
Article -
1837
Small cell discovery based on TOA fingerprint database
Published 2017-09-01“…In the scenario that a large number of small cells are deployed in the mobile communication network,the number of carriers to be detected by the user equipment (UE) in inter-frequency scanning is considerably larger than that in the conventional network deployment scenarios.This procedure may consume tremendous amounts of UEs’ energy.In order to solve this problem,a small cell discovery (SCD) scheme based on TOA fingerprint database to alleviate intensive energy consumption was proposed when the UEs try to find their potential serving small cells.The proposed scheme reduces the energy consumption of the UE by decreasing the number of unnecessary inter-frequency detection.The simulation results verifiy that the proposed scheme,compared with the existing SCD strategy using received signal strength (RSSI) based radio maps,has better anti-noise performance and higher accuracy.In addition,it can effectively help the high-speed UE avoid performing inter-frequency detection,and hence increase the rate of the UE being successfully connected to the appropriate small cell.…”
Get full text
Article -
1838
Risk function and optimality of statistical procedures for identification of network structures
Published 2018-06-01“…Two types of network structures have been investigated: network structures with an arbitrary number of elements and network structures with a fixed number of elements of the network model. …”
Get full text
Article -
1839
A Mathematical Model for Nipah Virus Infection
Published 2020-01-01“…The model is analyzed, and the reproduction number is computed. It is established that the disease-free state is globally asymptotically stable when the reproduction number is less than unity and unstable if it is greater than unity. …”
Get full text
Article -
1840
LEGAL REGULATION OF MEASURES OF STATE SUPPORT IN THE PROCESS OF THE IMPLEMENTATION OF NORTHERN DELIVERY
Published 2023-03-01“…The purpose of the study is to substantiate the need for state participation in the process of northern delivery and to propose a number of changes to the legislation of the Russian Federation, based on the analysis of the legal regulation of measures of state financial support for the implementation of the northern delivery. …”
Get full text
Article