Showing 1 - 7 results of 7 for search '"topological map"', query time: 0.03s Refine Results
  1. 1

    Graph of Fuzzy Topographic Topological Mapping in relation to k-Fibonacci Sequence by Noorsufia Abd Shukor, Tahir Ahmad, Amidora Idris, Siti Rahmah Awang, Amirul Aizad Ahmad Fuad

    Published 2021-01-01
    “…A generated n-sequence of fuzzy topographic topological mapping, FTTMn, is a combination of n number of FTTM’s graphs. …”
    Get full text
    Article
  2. 2

    Configuration Synthesis of Actuators for Underwater Vehicles<italic>'</italic> Receiving and Placing System by Jiang Mingyang, Liu Hailong, Guo Chuandong, Chen Depeng, Zhang Lin

    Published 2024-07-01
    “…Firstly, the types of the planar nine-bar single-hinge mechanism are synthesized based on the method of blastogram insertion, and 40 kinds of monochrome topological maps are obtained. Secondly, based on 40 kinds of monochrome topological maps, a method for synthesizing planar nine-bar mechanism with only one type of complex hinge mechanism is proposed. …”
    Get full text
    Article
  3. 3

    Approach for topology partitioning in parallel network simulation by WANG Xiao-feng, FANG Bin-xing, YUN Xiao-chun, ZHANG Hong-li

    Published 2006-01-01
    “…To improve the usability and running efficiency of the parallel network simulation,an approach for topology partitioning based on load estimation was realized: first,the relative load values of nodes and links,estimated according to their core levels in the topology map,were treated as their weights;then,the simulation task was partitioned by the graph partitioning tool.Experiments showed that this partitioning method could improve the performance of simulation by 16.4% compared to the partitioning method with no weights.Simulation of worms based on the real topology gathered via network measurement proves that the partitioning method is suitable for real large-scale network topology and can be used to simulate large-scale network security incidents.…”
    Get full text
    Article
  4. 4

    Distributed Intelligent Assistance Robotic System with Sensor Networks Based on Robot Technology Middleware by Songmin Jia, Zhengyin Dong, Xiuzhi Li, Xiongwei Pang, Bing Guo, Shuang Wang, Ke Wang

    Published 2014-06-01
    “…In the proposed system, we use SP 2 ATM (simultaneous path planning and topological mapping) with RBPF (Rao-Blackwellized particle filter) for path planning and localization of mobile robots. …”
    Get full text
    Article
  5. 5

    Internet source address verification method based on synchronization and dynamic filtering in address domain by Dan LI, Lancheng QIN, Jianping WU, Yingying SU, Mingwei XU, Xingang SHI, Yunan GU, Tao LIN

    Published 2020-10-01
    “…At the beginning of the design of the Internet architecture,it assumed that all network members were trusted,and did not fully consider the security threat brought by the untrusted network members.For a long time,routers only forward packets based on the destination IP address of the packet,and do not carry out any verification on the source IP address of the packet.The lack of packet level authenticity on the Internet results in the header being maliciously altered.A real source address verification mechanism with routing synchronization and dynamic filtering were proposed.This mechanism constructs the filter table based on the prefix-topology mapping synchronization,the problem of inconsistent state between the filter table and the route caused by routing asymmetry were solved,false positives and false negatives was avoided,and a low-overhead and low-latency source address verification of the IP address prefix level granularity in the address domain were realized.…”
    Get full text
    Article
  6. 6

    Quaternion modeling of the helical path for analysis of the shape of the DNA molecule by A. F. Muterko

    Published 2018-01-01
    “…Taken together, these algorithms will be useful both in the in silico analysis of relatively short DNA fragments as well as in topological mapping of whole genomes.…”
    Get full text
    Article
  7. 7

    Key Transmission Section Search Based on Graph Theory and PMU Data for Vulnerable Line Identification in Power System by Miao Yu, Shouzhi Zhang, Fang Shi, Jianqun Sun, Jingjing Wei, Yixiao Wu, Jingxuan Hu

    Published 2023-01-01
    “…First, the method combines with the graph theory and PMU data to construct the grid topology map. Second, the comprehensive indicators for screening vulnerable lines are proposed by fully considering the network topology and line capacity, which combines with power exchange efficiency and energy fluctuation probability. …”
    Get full text
    Article