-
1461
Energy saving proactive neighbor discovery algorithm in mobile low-duty-cycle wireless sensor network
Published 2018-04-01“…Mobile low-duty-cycle wireless sensor network is a new kind of wireless multi-hop network,which is self-organized by a large number of nodes that have mobile ability and are able to get into sleep for a long time.Such networks have wide application prospects in national defense,industry,agriculture and other fields that need long term monitoring in severe environments.However,the movement and the sleeping features of nodes lead to constantly change of network topology,which makes the nodes difficult to discover their neighbors quickly.Therefore,the nodes cannot achieve optimal distribution decisions.In order to solve this problem,a new proactive neighbor discovery algorithm was proposed.This algorithm made the nodes in the network take the initiative to find their neighbors when they woke up,and avoided the delay caused by long time waiting in the traditional passive neighbor discovery.In addition,by predicting the movement speed and distance of neighbors,the neighbor set at the next moment can be quickly determined,which can further reduce the delay and obtain more accurate neighbor discovery results.Theoretical analysis and experimental results show that compared with the existing algorithms,the algorithm can find all the neighbors in MLDC-WSN with less energy consumption and lower delay.…”
Get full text
Article -
1462
Design and Implementation of a Mobile Multihop WSN for AGV System
Published 2010-01-01“…By adopting a concept of system data sharing, it is possible to make each node exchange the data timely with all the other nodes. It is also a topology-agnostic protocol which has no knowledge of neighbors, routes, or next hops. …”
Get full text
Article -
1463
Improving VANETs Connectivity with a Totally Ad Hoc Living Mobile Backbone
Published 2015-01-01“…The network behavior can be totally different in topological aspects because of the mobility of vehicular nodes. …”
Get full text
Article -
1464
One-Pot Synthesis, X-Ray Diffraction and MAS NMR Spectroscopic Study of Gallosilicate Nitrate Cancrinite Na8[GaSiO4]6(NO3)4(H2O)6
Published 2010-01-01“…One-pot synthetic gallosilicate nitrate cancrinite (CAN) framework topology have been synthesized under hydrothermal conditions at 100 °C. …”
Get full text
Article -
1465
Transportation System Vulnerability Assessment considering Environmental Impact
Published 2022-01-01“…A key characteristic of vulnerability assessment is the travelers’ response to the changes in the transportation network topology and capacity after an extreme event. Hence, the problem is formulated as a nonlinear programme with equilibrium constraints, considering travelers’ route choice behavior. …”
Get full text
Article -
1466
Quality of Service of Routing Protocols in Wireless Sensor Networks: A Review
Published 2017-01-01“…Due to distributed nature, dynamic topology and resources constraints of tiny sensing nodes in wireless sensor networks (WSNs), the quality of service (QoS) support is a challenging issue. …”
Get full text
Article -
1467
Pathway Detection from Protein Interaction Networks and Gene Expression Data Using Color-Coding Methods and A* Search Algorithms
Published 2012-01-01“…We proposed a color-coding method based on the characteristics of biological network topology and applied heuristic search to speed up color-coding method. …”
Get full text
Article -
1468
Cross-Layer Greedy-Based Routing in VANETs: Virtual Multibackbones Approach
Published 2024-01-01“…An efficient data packet delivery in a vehicular ad hoc network (VANET) is still a challenging task because of the rapid changes in the network topology and the instability of link quality, especially for nonsafety applications. …”
Get full text
Article -
1469
Comprehensive influence evaluation algorithm of complex network nodes based on global-local attributes
Published 2022-09-01“…Mining key nodes in the network plays a great role in the evolution of information dissemination, virus marketing, and public opinion control, etc.The identification of key nodes can effectively help to control network attacks, detect financial risks, suppress the spread of viruses diseases and rumors, and prevent terrorist attacks.In order to break through the limitations of existing node influence assessment methods with high algorithmic complexity and low accuracy, as well as one-sided perspective of assessing the intrinsic action mechanism of evaluation metrics, a comprehensive influence (CI) assessment algorithm for identifying critical nodes was proposed, which simultaneously processes the local and global topology of the network to perform node importance.The global attributes in the algorithm consider the information entropy of neighboring nodes and the shortest distance nodes between nodes to represent the local attributes of nodes, and the weight ratio of global and local attributes was adjusted by a parameter.By using the SIR (susceptible infected recovered) model and Kendall correlation coefficient as evaluation criteria, experimental analysis on real-world networks of different scales shows that the proposed method is superior to some well-known heuristic algorithms such as betweenness centrality (BC), closeness centrality (CC), gravity index centrality(GIC), and global structure model (GSM), and has better ranking monotonicity, more stable metric results, more adaptable to network topologies, and is applicable to most of the real networks with different structure of real networks.…”
Get full text
Article -
1470
Optimization method of time of use electricity price considering losses in distributed photovoltaic access distribution network
Published 2025-01-01“…Therefore, a new time of using electricity price optimization method is proposed that takes into account the losses of distributed photovoltaic access to the distribution network. Considering the topology structure of the distribution network after the integration of distributed photovoltaic, this paper calculates the comprehensive losses generated by the operation of the distribution network. …”
Get full text
Article -
1471
Spatial Characterization of Landscapes through Multifractal Analysis of DEM
Published 2014-01-01“…Landscapes have been shown to exhibit numerous scaling laws, from Horton’s laws to more sophisticated scaling of heights in topography and river network topology. This scaling and multiscaling analysis has the potential to characterise the landscape in terms of the statistical signature of the measure selected. …”
Get full text
Article -
1472
Dynamic Contagion of Systemic Risks on Global Main Equity Markets Based on Granger Causality Networks
Published 2018-01-01“…Empirical results demonstrate that the network topology has a significant difference during the global financial crisis and other periods. …”
Get full text
Article -
1473
A Single Switch High Step-Up DC-DC Converter Based on Tri-Winding Coupled Inductor for Renewable Energy Applications
Published 2022-01-01“…So, a low voltage-rated power switch can be used in the presented converter. The suggested topology uses only one power switch with low on-state resistance (RDS-ON), which leads to a simple control circuit and decreases the conduction losses. …”
Get full text
Article -
1474
Recurrent neural networks with transient trajectory explain working memory encoding mechanisms
Published 2025-01-01“…The TRNN incorporates biologically plausible modifications, including self-inhibition, sparse connection and hierarchical topology. Besides activity patterns resembling animal recordings and retained versatility to variable encoding time, TRNNs show better performance in delayed choice and spatial memory reinforcement learning tasks. …”
Get full text
Article -
1475
Ground-Air Traffic Congestion Propagation Model Based on Hierarchical Control Interdependent Network
Published 2023-01-01“…These networks are viewed as complex systems with interactions between airports, airspaces, procedures, and air traffic flows (ATFs). A topology-based airport-airspace network and a flight trajectory network are developed to represent critical physical and operational characteristics. …”
Get full text
Article -
1476
Bus Implementation Using New Low Power PFSCL Tristate Buffers
Published 2016-01-01“…It is found that one of the proposed tristate buffer topology outperforms the others in terms of all the performance parameters. …”
Get full text
Article -
1477
Prime-number-assisted block-based neighbor discovery protocol in wireless sensor networks
Published 2019-01-01“…The neighbor discovery is not an one-time event because the network topology can be changed anytime due to node mobility and failure. …”
Get full text
Article -
1478
Syntheses, Crystal Structures, Magnetic Behaviours, and Thermal Properties of Three Hydrogen-Bonding Networks Containing Dicyanamide and 4-Hydroxypyridine
Published 2013-01-01“…Complex 3 is a coordination layer of (4, 4) topology with octahedral metal centers linked by four single μ1,5-bridges. …”
Get full text
Article -
1479
Research Progress in Computational Methods for System-Level Coupling of Electromagnetic Pulse
Published 2025-01-01“…For local systems, starting from the electromagnetic topology (EMT) method which utilizes the Baum-Liu-Tesche (BLT) equation, the time-domain BLT equation and the transient EMT method are reviewed. …”
Get full text
Article -
1480
A single changing hypernetwork to represent (social-)ecological dynamics
Published 2024-10-01“…Moreover, we highlight that any ecosystem hypernetwork exhibits a changing topology summarizing its long term dynamics (e.g., species extinction/invasion, pollutant or human arrival/migration). …”
Get full text
Article