-
121
Vulnerability Evaluation and Improvement Method of Civil Aviation Navigation Network
Published 2022-01-01“…The structural importance of a node corresponds to its topology features including local dominance of the node and its global influence, and the important contribution to both adjacent and nonadjacent nodes from this node, while the functional importance is indicated by the flight flow serviced by the node during a fixed period of time. …”
Get full text
Article -
122
Variations of Gastrocolic Trunk of Henle and Its Significance in Gastrocolic Surgery
Published 2018-01-01“…Due to the increasing incidence of gastrointestinal (GI) tumors, more and more importance is attached to radical resection and patients’ survival, which requires adequate extent of resection and radical lymph node dissection. Blood vessels around the gastrointestinal tract, as anatomical landmarks for tumor resection and lymph node dissection, play a key role in the successful surgery and curative treatment of gastrointestinal tumors. …”
Get full text
Article -
123
User role analysis method based on directed topological potential
Published 2014-12-01“…The majority of real-world networks are directed,weighted and dynamic.Aiming at the problem of node role analysis in directed weighted network,a novel node role analysis method based on directed topological potential is pro-posed,which can divide nodes into four roles based on their behavior pattern and local influence.Then,a node role-based dynamic networks evolution analysis method is introduced,which can model the dynamics of behavioral roles represent-ing the main connectivity patterns over time and detect the significant event.The experiment results indicate that pro-posed approaches can effectively estimate the node role and detect the dynamics of network evolution.…”
Get full text
Article -
124
Analysis and Simulation of Tooth Root Fault based on ANSYS / LS- DYNA
Published 2015-01-01“…A pair of undamaged gears and a pair of gears with crack on the root of tooth are simulated and analyzed by using the LS- DYNA,and the change of the acceleration signals and meshing force of any node on the gear can be got. Through the simulation calculation,the meshing force and node acceleration curve can be observed to understand the influence of the meshing impact force on gear body. …”
Get full text
Article -
125
Forest Fire Detection Using Wireless Sensors and Networks
Published 2022-09-01“…This technology can provide a real time monitoring for forest fire, where it can provide information at the ignition instance or at very small delay, depends on the node used wake up/sleep schedule. It’s more reliable because it can influence the world in the surrounded area, if it is used in appropriate methods, rather than expecting events over large distances and long delay like other satellite and camera towers techniques. …”
Get full text
Article -
126
Threshold model for hot events spreading based on relative impact weight of the user
Published 2017-09-01“…A new relative influence weight function was proposed in combination with the existing linear threshold model.Combining with the information itself sensitivity and the threshold characteristic of the node itself,a threshold model(URLT model) was proposed,which can measure the information communication ability.By simulating the spread of different networks,different sensitivity information and different node thresholds,and comparing the final propagation situation,the experimental results show that the final influence range is consistent with the real spread situation.Therefore,the model has some reference value for the discovery and suppression of the law of information dissemination.…”
Get full text
Article -
127
Research on WSN lifetime optimization game algorithm combined power and channel
Published 2019-04-01“…Due to the problem of shortening the network lifetime which was caused by the big energy consumption for wireless sensor network (WSN) whose energy and computing power was limit,a lifetime optimization game algorithm combined power control and channel allocation (LOAPC) was proposed.The influence of node power and residual energy on the node interference was explored to construct an interference affection measurement model.Then,expected transmission times was introduced to establish a novel node lifetime model.Finally,LOAPC aimed at reducing interference and prolonging lifetime,and the node power was limited by an optional power set which ensured the network connectivity and economized energy consumption,so as to prolong the network lifetime effectively.At the same time,the simulation results show that the algorithm has the characteristics of low interference,low energy consumption and effectively prolonging the lifetime of the network.…”
Get full text
Article -
128
Analysis of time delay jitter of communication system on fault location of power line based on traveling wave method
Published 2018-03-01“…In order to study the time delay jitter of communication system on fault location of power line,a mathematical model of the delay jitter based on Poisson distribution was presented.The characteristic of the random delay jitter for single and multiple node cases were analyzed.Results show the delay jitter is remarkable when the communication load is high,and is insensitive when the communication load is low in the single node case.The total delay jitter is lower than the sum of the jitter in the queues on a path,and the position of the heavy load node in the path has a large influence on the total path jitter.The delay jitter with its influencing factors should be taken into account to perform optimal network design.…”
Get full text
Article -
129
Multifactor task allocation problem in wireless sensor and actuator networks
Published 2017-10-01“…Task allocation is an essential part of many military applications of WSAN such as intelligent minefield.The key problem of task allocation decision in these systems for the optimal scheme on task allocation is how to obtain the node-target assignment.Combing with the factors of target’s parameters and node’s own status,the various influence factors of task efficiency were analyzed and the positive and negative indicators were processed by range normalization method separately.The linear-weighted task efficiency function was proposed in the applications of WSAN such as intelligent minefield.It can be utilized as the evaluation index of assignment schemes since it reflected the integrated impact of target’s threat and node’s value on the system more comprehensively.Task efficiency function can be constructed flexibly based on the demand of different multifactor task allocation application.The essence of the problem was how to make node-target assignment to achieve the maximum task efficiency of the whole system.This problem turned into assignment problem and can be solved.Finally,an application was implemented to demonstrate this scheme.The results show that the model is suitable for small-scale multifactor task allocation problem in intelligent minefield system.…”
Get full text
Article -
130
Routing optimization based on topology control in satellite network
Published 2018-02-01“…A new double-layer satellite network model for space networking was established and a routing algorithm based on topology control (TCRA) was proposed considering the advantages of low earth orbit and stationary earth orbit satellite networks.This model used virtual node strategy and satellite grouping idea,which regarded the coverage area of each low earth orbit satellite as a virtual node.The network took into account the influence of the polar area on the division of the satellite footprints,such that the upper management satellites can accurately acquire the topology of the lower satellites.Using the improved virtual node strategy,the time slices were superior to other network models in quantity,length and other aspects.Based on the network topology,stationary earth orbit satellites calculate routing for low earth orbit satellites,while low earth orbit satellites were responsible for forwarding data.The simulation results show that the routing algorithm is superior to other algorithms in average end-to-end delay and packet loss rate.…”
Get full text
Article -
131
Evolution characteristics and invulnerability simulation analysis of global zirconium ore trade network
Published 2025-01-01“…China plays a crucial role as a bridge connecting various countries, while Japan exerts significant influence within the network; (2) the network is particularly vulnerable to targeted attacks based on node degree and betweenness centrality, highlighting the potential for significant disruption following the removal of key nodes. …”
Get full text
Article -
132
Construction of Internet of things trusted group based on multidimensional attribute trust model
Published 2021-01-01“…The dispersion of satisfaction records is used to discover abnormal data and weaken its influence on the calculation of the node’s comprehensive trust evaluation. …”
Get full text
Article -
133
Chaos and Bifurcations of a Leslie-Gower Food Chain with Strong Allee Effect
Published 2015-01-01“…Our results show that the existence of Allee effect contributes to the occurrence of more complex dynamics of the system, including Hopf, saddle-node, transcritical, saddle-node-Hopf, period-doubling, and period-halving bifurcations and chaos.…”
Get full text
Article -
134
Study on Thermal Balance Analysis Technology of Rail Traffic Gearbox
Published 2021-05-01“…Heat balance analysis of rail traffic gearbox has great influence on the operation of the gearbox. Based on subway gear transmission system, the heat balance equations of the transmission based on thermal network method is established, and the calculation models of heat source,thermal resistance and convective transfer coefficient are given,the temperature of each node is solved by the heat balance equations. …”
Get full text
Article -
135
Byzantine-robust federated learning over Non-IID data
Published 2023-06-01“…The malicious attacks of Byzantine nodes in federated learning was studied over the non-independent and identically distributed dataset , and a privacy protection robust gradient aggregation algorithm was proposed.A reference gradient was designed to identify “poor quality” shared gradients in model training, and the influence of heterogeneity data on Byzantine node recognition was reduced by reputation evaluation.Meanwhile, the combination of homomorphic encryption and random noise obfuscation technology was introduced to protect user privacy in the process of model training and Byzantine node recognition.Finally, through the evaluation over the real-world datasets, the simulation results show that the proposed algorithm can accurately and efficiently identify Byzantine attack nodes while protecting user privacy and has good convergence and robustness.…”
Get full text
Article -
136
Cellular automata model based power network attack prediction technology
Published 2023-04-01“…The prediction range of the traditional power network attack range prediction technology was not wide enough, resulting in the poor effect of power network security improvement.For this reason, a power network attack prediction technology based on cellular automata model was proposed.A cellular automata model was built, regarding the cells in the cellular automata as power cells, a cell vitality value conversion rule was established and combined with the attack probability of attackers to predict the development and change of power cells.The power network attack was predicted according to the change trend of central power cells and neighboring power cells.The experimental result shows that, under the influence of time factors, the predicted attack node location of the proposed power network attack prediction technology based on cellular automata model is basically consistent with the original node, and the predicted load removal is always below 100 MW, the proposed technology is more effective.…”
Get full text
Article -
137
An Improved RSSI-Based Positioning Method Using Sector Transmission Model and Distance Optimization Technique
Published 2015-09-01“…Moreover, this study also proves that the node position has great influence on the positioning accuracy.…”
Get full text
Article -
138
Vulnerability Analysis of China-Europe Railway Express Network Based on Improved Nonlinear Load-Capacity Model
Published 2024-01-01“…This approach enables a detailed investigation into how condition thresholds and different types of nodes influence network vulnerability. Firstly, a feature matrix is constructed for C-ER Express based on the topological measures, freight information, and external environment scores. …”
Get full text
Article -
139
Mathematical model of the atrioventricular nodal double response tachycardia and double-fire pathology
Published 2016-07-01“…These pathways in the atrioventricular node (AV node) are anatomical and functional contributions of supraventricular tachycardia. …”
Get full text
Article -
140
Research on incentive mechanism for IoT based on mobile hotspot sharing
Published 2019-03-01“…Many devices in the Internet of things,especially energy-constrained sensor devices,often lack efficient network connectivity.If the networking method based on mobile hotspot sharing is adopted,large-area network coverage can be realized efficiently.The basic idea of the networking mode is to activate some mobile node in the cellular network (such as the holders of smart phones and other smart devices) to open mobile hotspot,provide Wi-Fi connections for resource-constrained node,and satisfy the communication needs of these node,so as to achieve efficient access to the mobile Internet.In this networking mode,how to encourage mobile users to contribute hotspot is the key.The incentive mechanism in mobile hotspot sharing network and the impact on network performance was studied mainly,and a novel incentive mechanism was designed to enable some users to obtain certain benefits by contributing Wi-Fi hotspot.Firstly,the optimal sharing decision of different types of users under the incentive mechanism and the influence of decision-making among different users were studied.Then,the evolution of user behavior,the overall state of the network with time and the equilibrium state of the system were analyzed.The simulation results show that under the equilibrium state of the system,the number of mobile hotspot contributors increases with the increase of free traffic ratio,which also leads to an increase in the number of hotspot.If the price of unit traffic is too high,the number of users will be reduced,which is not conducive to the operation of the network.In addition,compared with the non-hotspot sharing network,if the mobile hotspot sharing networking mode is adopted,the network performance can be increased by up to 148%.…”
Get full text
Article