-
1121
Multi-channel based on power control protocol for mobile ad hoc networks
Published 2006-01-01“…To solve the collision problem brought by power control in mobile ad-hoc network(MANET),multi-channel MAC protocol and on-demand minimum energy routing protocol were employed,to carry out a multi-channel based power control ad hoc network,MCBPC.This architecture controlled the frequent changes of topology,decreased the probability of contact brought by power control,and achieved the goal of energy conservation.Simulation results indicate that compared with AODV@IEEE 802.11 approaches,the proposed MCBPC solution achieves about 90% increase in the throughput and network lifetime,and 30% increase in the packet delivery ratio.…”
Get full text
Article -
1122
Connectivity properties for subspaces of function spaces determined by fixed points
Published 2003-01-01“…We study the topology of a subspace of the function space of continuous self-mappings of a given manifold: the subspace determined by maps having the least number of fixed points in its homotopy class. …”
Get full text
Article -
1123
Solving the Linear 1D Thermoelasticity Equations with Pure Delay
Published 2015-01-01“…For an initial-boundary value problem associated with this system, we prove a well-posedness result in a certain topology under appropriate regularity conditions on the data. …”
Get full text
Article -
1124
Power unified spatial information model for smart grid dual complex network
Published 2016-05-01“…Smart grid refers to the next generation power grid in which the electricity distribution and management are upgraded by combining the power grid and power communication network(called dual network).According to the problems,such as the power spatial information sharing of multi-business integration problem,the thematic application and the dynamic display etc,the new power unified spatial information model(PUSIM)was proposed for smart grid dual network.Based on the abstract layer,entity layer and business layer,PUSIM builded the geometric object,topology relationship and the conceptual model and logical model of account property for the dual network,and constructed the unified model,expression and integration management for the dual network based on common information model.…”
Get full text
Article -
1125
Trustworthy component model supporting networks reconfiguration
Published 2013-03-01“…The results show that this model can change the topology of components and find out the hostility components, which improve the trustworthy of reconfigurable flexible network node.…”
Get full text
Article -
1126
Troubleshooting Assistance Services in Community Wireless Networks
Published 2012-01-01“…We have mainly focused on the use cases and prerequirements—the problem of topology discovery.…”
Get full text
Article -
1127
A Distortion-Free Data Hiding Scheme for Triangular Meshes Based on Recursive Subdivision
Published 2016-01-01“…The secret message is embedded into the newly added vertices. The topology of added vertex is constructed by connecting it with the vertices of located triangle. …”
Get full text
Article -
1128
Concentração no varejo alimentar brasileiro: o grupo Carrefour na encruzilhada?
Published 2023-09-01“…We intend to highlight the implications for the geography of the commercial capital in food retail by highlighting the strategies to acquire new companies, the territorial topology, investments in banking capital, and summarizing the main socioeconomic impacts for the agri-food network.…”
Get full text
Article -
1129
Subarrayed Antenna Array Synthesis Using Ternary Adjusting Method
Published 2014-01-01“…Compared to previous methods, rounding-off operations are not required any longer, and the equation constraint of the fixed total element number is also removed, which effectively reduces the complexity of implementation while obtaining improved topology exploration capability simultaneously.…”
Get full text
Article -
1130
Link Failure Recovery Based on SDN
Published 2015-06-01“…A link failure detection and automatic recovery program based on SDN was designed. The entire network topology could be obtained,and network link state could be monitored through link discovery protoco1. …”
Get full text
Article -
1131
Packet-based routing algorithm in DTN based on the intimacy between nodes
Published 2014-12-01“…Through analyzing the moving law of nodes,the topology is defined based on intimacy between nodes by using the thoughts of reducing redundant copies through clustering in MANET and mining social community in social network for reference.Take topological trim according to the weight of edges and dig out groups of nodes which have higher inti-macy degree.And also improve the spray and wait routing protocol according to the group of source and destination nodes.Then put forward a packet-based routing algorithm in DTN based on the intimacy between nodes.Simulation result shows that this routing algorithm could effectively increase the delivery ratio and reduce delay.…”
Get full text
Article -
1132
A Remark on the Stability of Approximative Compactness
Published 2016-01-01“…We study the stability of approximative τ-compactness, where τ is the norm or the weak topology. Let Λ be an index set and for every λ∈Λ, let Yλ be a subspace of a Banach space Xλ. …”
Get full text
Article -
1133
MP2P high capacity and security resource node selection strategy based on Bayesian game
Published 2016-01-01“…Considering the changes of MP2P topology due to the limitation of the capability, the unreliable and the churn of the node, the efficiency and safety resource node selection strategy based on Bayesian game were proposed in MP2P network. …”
Get full text
Article -
1134
Game theoretical routing protocol with fairness problem in wireless mesh networks
Published 2012-11-01“…Based on game theory,a routing protocol studied with irness problem was proposed.Each router had the same opportunities of Internet access no matter how far from the gateway.Based on the tree topology,the calculation of route could be distributed to every branches of the tree,which greatly reduced the load of the root and more suitable for wireless mesh networks.The simulation results show that the new protocol is more suitable for wireless mesh networks compare with AODV and HWMP,no matter in network throughput or average end-to-end delays,as far as fairness.…”
Get full text
Article -
1135
Research on High Precision Modal Identification Method and Structural Optimization Design of Gearboxes
Published 2023-09-01“…Based on the first six orders of the gearbox obtained from the test, a modal finite element calculation method considering both calculation accuracy and calculation efficiency is proposed. Subsequently, the topology optimization method is used to optimize the structure of the gearbox. …”
Get full text
Article -
1136
Metallic and ferromagnetic carbon allotrope discovered using molecular precursors
Published 2025-01-01“…The new carbon structures, produced by stacking puckered layers of 4,6-membered rings, are found to exhibit exotic electronic, magnetic, and mechanical properties originating from a special sp^{2}−sp^{3} bonding topology. These findings open the prospect of realizing the metallic and ferromagnetic carbon allotrope in practice.…”
Get full text
Article -
1137
BotCatcher:botnet detection system based on deep learning
Published 2018-08-01“…Machine learning technology has wide application in botnet detection.However,with the changes of the forms and command and control mechanisms of botnets,selecting features manually becomes increasingly difficult.To solve this problem,a botnet detection system called BotCatcher based on deep learning was proposed.It automatically extracted features from time and space dimension,and established classifier through multiple neural network constructions.BotCatcher does not depend on any prior knowledge which about the protocol and the topology,and works without manually selecting features.The experimental results show that the proposed model has good performance in botnet detection and has ability to accurately identify botnet traffic .…”
Get full text
Article -
1138
Estimation of Approximating Rate for Neural Network inLwp Spaces
Published 2012-01-01“…The results obtained are helpful in understanding the approximation capability and topology construction of the sigmoidal neural networks.…”
Get full text
Article -
1139
SDN resolve space-ground integrated network based on end side computing
Published 2020-07-01“…There is a complex network structure of space-ground integrated network.And this kind of network has heterogeneous network,dynamic topology,intermittently connected node height exposure,and so on.There are many limitations in traditional SDN implementation.A method of SDN implement based on end side computing and a space-ground integrated network based on SDN were presented,which separated space network control and data,using the computing power of the communication terminal (mobile terminal and fixed ground backbone network),unloading the calculation of SDN controller in space-based plane,thus simplifying the data forwarding plane.A practical and effective verification method was also proposed.…”
Get full text
Article -
1140
Pawlak Algebra and Approximate Structure on Fuzzy Lattice
Published 2014-01-01“…The aim of this paper is to investigate the general approximation structure, weak approximation operators, and Pawlak algebra in the framework of fuzzy lattice, lattice topology, and auxiliary ordering. First, we prove that the weak approximation operator space forms a complete distributive lattice. …”
Get full text
Article