To see the other types of publications on this topic, follow the link: Destination sequence Number.

Journal articles on the topic 'Destination sequence Number'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Destination sequence Number.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Jhaveri, Rutvij H., Aneri Desai, Ankit Patel, and Yubin Zhong. "A Sequence Number Prediction Based Bait Detection Scheme to Mitigate Sequence Number Attacks in MANETs." Security and Communication Networks 2018 (November 15, 2018): 1–13. http://dx.doi.org/10.1155/2018/3210207.

Full text
Abstract:
The characteristics of MANET such as decentralized architecture, dynamic topologies make MANETs susceptible to various security attacks. Sequence number attacks are such type of security threats which tend to degrade the network functioning and performance by sending fabricated route reply packets (RREP) with the objective of getting involved in the route and drop some or all of the data packets during the data transmission phase. The sequence number adversary attempts to send a fabricated high destination number in the RREP packet which attracts the sender to establish a path through the adve
APA, Harvard, Vancouver, ISO, and other styles
2

Smiley, Alison, Carolyn MacGregor, Robert E. Dewar, and Chris Blamey. "Evaluation of Prototype Highway Tourist Signs for Ontario." Transportation Research Record: Journal of the Transportation Research Board 1628, no. 1 (1998): 34–40. http://dx.doi.org/10.3141/1628-05.

Full text
Abstract:
Information load and comprehension of new tourist signs for Ontario highways were evaluated. In a laboratory study involving 288 subjects, drivers searched for target destinations on timed sequences of slides of signs and identified whether their target was present, and, if so, its direction and distance. Performance was assessed in relation to number of names, number of signs in a sequence, arrow shapes, pictograph effectiveness, and sign organization. Signs used a letter height of 19 cm (7.5 in.). Subjects were allowed reading time equivalent to that available to drivers driving at 80 km/h (
APA, Harvard, Vancouver, ISO, and other styles
3

Brych, Vasyl, and Olexander Kyfyak. "Theoretical and methodological bases of formation of tourist destinations in western Ukrainian border regions." Herald of Ternopil National Economic University, no. 4(98) (February 20, 2021): 114. http://dx.doi.org/10.35774/visnyk2020.04.114.

Full text
Abstract:
Introduction. Tourist activity in the western Ukrainian border regions is organized in such a way that a tourist destination becomes a key element of the tourism system. However, their small number and some problems with their creation require theoretical and methodological support, which determines the relevance of the scientific article.Purpose and methods. Definition of basic theories, basic scientific approaches and formation of an ideal image of a tourist destination for the western Ukrainian border regions. The methodological basis of the study are general scientific and theoretical meth
APA, Harvard, Vancouver, ISO, and other styles
4

Sasirekha, V., and S. Nithyadevi. "Detecting and Preventing a Black Hole Attack in VANET." Asian Journal of Computer Science and Technology 8, S1 (2019): 7–9. http://dx.doi.org/10.51983/ajcst-2019.8.s1.2015.

Full text
Abstract:
In recent years, Vehicular Adhoc Network is one of fastest ongoing emerging field in the networking industry. But it faces lot of challenges today. Security is the major concern in the VANET. Now a day’s hacking is the hobby of the programmers. Lots of applications were developed for security attack. VANET is a dynamic network, it require secure communication. The VANET is vulnerable to various types of attacks. In this paper we have focused on black hole attack. The Black hole attack may interrupt the packets and insert the false information in the packets and sends to the other vehicle. The
APA, Harvard, Vancouver, ISO, and other styles
5

Kumar, Kamlesh, and Bobby Sharma. "Multicasting Model for Efficient Data Transmission in VANET." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 7s (2023): 408–14. http://dx.doi.org/10.17762/ijritcc.v11i7s.7016.

Full text
Abstract:
VANETs (Vehicle Ad hoc Networks) are networks made up of a number of vehicular nodes that are free to enter and leave the network. The Location Aided Routing (LAR) protocol is the one that is most frequently utilized among them. Here, the route request packets are flooded across many pathways to the source node using the broadcasting strategy. The vehicles that have a direct path to the destination send the route reply packets back to the source. The least number of hops and the sequence number are used to determine the route from source to destination. This research study has used the multica
APA, Harvard, Vancouver, ISO, and other styles
6

Paelke, Gretchen M. "A Comparison of Route Guidance Destination Entry Methods." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 37, no. 9 (1993): 569–73. http://dx.doi.org/10.1177/154193129303700911.

Full text
Abstract:
This paper examined four touchscreen methods for entering a destination into a route guidance system. Three of the interfaces were character entry-based including: 1) A method using a sequence of two buttons for each alphanumeric entry (referred to as Doublepress), 2) A Qwerty keypad layout, and 3) A phone-based keypad where letters were entered using their corresponding number key. The fourth interface provided an alphabetic list through which a user scrolled to select a city or street name. Sixteen subjects used each of the interfaces to enter destinations in a laboratory study while “parked
APA, Harvard, Vancouver, ISO, and other styles
7

Shiftan, Yoram. "Practical Approach to Model Trip Chaining." Transportation Research Record: Journal of the Transportation Research Board 1645, no. 1 (1998): 17–23. http://dx.doi.org/10.3141/1645-03.

Full text
Abstract:
The need to model trip chaining has been discussed widely in the travel demand literature, but new approaches generally have been limited to academic research. Trip chaining was modeled in an actual urban area model. The model was developed for Boise, Idaho, on the basis of a household survey of 1,600 households. For this model, a tour was defined as a sequence of trip segments that start at home and end at home. The model distinguishes between two main types of tours: A tour that includes one or more work destinations is defined as a work-related tour (WRT); all other tours are defined as non
APA, Harvard, Vancouver, ISO, and other styles
8

Elkabour, Ahmed, and Dr. Rahma Teirab Abaker Haroun. "Mitigating Routing Attacks in Mobile Ad Hoc Networks." International Journal for Innovation Education and Research 7, no. 7 (2019): 227–33. http://dx.doi.org/10.31686/ijier.vol7.iss7.1603.

Full text
Abstract:
Abstract - Mobile Ad hoc Networks have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. In existing solutions typically attempt to isolate malicious nodes based on binary or naive fuzzy response decisions. However, binary responses may result in the unexpected network partition, causing additional damages to the network infrastructure. In this paper proposes a risk-aware response mechanism to systematically cope with the
APA, Harvard, Vancouver, ISO, and other styles
9

Mamei, Marco, Nicola Bicocchi, Marco Lippi, Stefano Mariani, and Franco Zambonelli. "Evaluating Origin–Destination Matrices Obtained from CDR Data." Sensors 19, no. 20 (2019): 4470. http://dx.doi.org/10.3390/s19204470.

Full text
Abstract:
Understanding and correctly modeling urban mobility is a crucial issue for the development of smart cities. The estimation of individual trips from mobile phone positioning data (i.e., call detail records (CDR)) can naturally support urban and transport studies as well as marketing applications. Individual trips are often aggregated in an origin–destination (OD) matrix counting the number of trips from a given origin to a given destination. In the literature dealing with CDR data there are two main approaches to extract OD matrices from such data: (a) in time-based matrices, the analysis focus
APA, Harvard, Vancouver, ISO, and other styles
10

Huang, Chin-Tser, Mohamed G. Gouda, and E. N. Elnozahy. "Convergence of IPsec in presence of resets." Journal of High Speed Networks 15, no. 2 (2006): 173–83. https://doi.org/10.3233/hsn-2006-285.

Full text
Abstract:
IPsec is the current security standard for the Internet Protocol IP. According to this standard, a selected computer pair (p, q) in the Internet can be designated a “security association”. This designation guarantees that all sent IP messages whose original source is computer p and whose ultimate destination is computer q cannot be replayed in the future (by an adversary between p and q) and still be received by computer q as fresh messages from p. This guarantee is provided by adding increasing sequence numbers to all IP messages sent from p to q. Thus, p needs to always remember the sequence
APA, Harvard, Vancouver, ISO, and other styles
11

Castiglione, Joe, Joel Freedman, and Mark Bradley. "Systematic Investigation of Variability due to Random Simulation Error in an Activity-Based Microsimulation Forecasting Model." Transportation Research Record: Journal of the Transportation Research Board 1831, no. 1 (2003): 76–88. http://dx.doi.org/10.3141/1831-09.

Full text
Abstract:
A key difference between stochastic microsimulation models and more traditional forms of travel demand forecasting models is that micro-simulation-based forecasts change each time the sequence of random numbers used to simulate choices is varied. To address practitioners’ concerns about this variation, a common approach is to run the microsimulation model several times and average the results. The question then becomes: What is the minimum number of runs required to reach a true average state for a given set of model results? This issue was investigated by means of a systematic experiment with
APA, Harvard, Vancouver, ISO, and other styles
12

Gu, Shichao, Haifei Zhu, Hui Li, Yisheng Guan, and Hong Zhang. "Optimal Collision-Free Grip Planning for Biped Climbing Robots in Complex Truss Environment." Applied Sciences 8, no. 12 (2018): 2533. http://dx.doi.org/10.3390/app8122533.

Full text
Abstract:
Biped climbing robots (BiCRs) can overcome obstacles and perform transition easily thanks to their superior flexibility. However, to move in a complex truss environment, grips from the original point to the destination, as a sequence of anchor points along the route, are indispensable. In this paper, a grip planning method is presented for BiCRs generating optimal collision-free grip sequences, as a continuation of our previous work on global path planning. A mathematic model is firstly built up for computing the operational regions for negotiating obstacle members. Then a grip optimization mo
APA, Harvard, Vancouver, ISO, and other styles
13

Barry, James J., Robert Newhouser, Adam Rahbee, and Shermeen Sayeda. "Origin and Destination Estimation in New York City with Automated Fare System Data." Transportation Research Record: Journal of the Transportation Research Board 1817, no. 1 (2002): 183–87. http://dx.doi.org/10.3141/1817-24.

Full text
Abstract:
New York City Transit’s automated fare collection system, known as MetroCard, is an entry-only system that records the serial number of the MetroCard and the time and location (subway turnstile or bus number) of each use. A methodology that estimates station-to-station origin and destination (O-D) trip tables by using this MetroCard information is described. The key is to determine the sequence of trips made throughout a day on each MetroCard. This is accomplished by sorting the MetroCard information by serial number and time and then extracting, for each MetroCard, the sequence of the trips a
APA, Harvard, Vancouver, ISO, and other styles
14

Elmorssy, Mahmoud, and Huseyin Onur Tezcan. "Ordered Generalized Extreme Value Model as a Tool for Demand Modelling of Discretionary Trips." PROMET - Traffic&Transportation 32, no. 2 (2020): 193–205. http://dx.doi.org/10.7307/ptt.v32i2.3214.

Full text
Abstract:
Although the four-step model is the most common method in transportation demand modelling, it is exposed to a considerable criticism in terms of representing the actual choice behaviours of travellers. For example, the four steps are presented in a fixed sequence and independently from each other. Such assumption may be correct in case of obligatory trips (e.g. work trips) where travellers’ behaviour has usually no effect on trip generation or trip distribution stages. However, in discretionary trips, they may simultaneously decide on various trip dimensions. This paper tries to overcome the l
APA, Harvard, Vancouver, ISO, and other styles
15

Muzulon, Nádya Zanin, Guilherme Neto Ferrari, Arthur Eduardo Turra, Gislaine Camila Lapasini Leal, and Rafael Henrique Palma Lima. "Proposal of a method for routing school buses in a small-sized county." Acta Scientiarum. Technology 44 (May 25, 2022): e58638. http://dx.doi.org/10.4025/actascitechnol.v44i1.58638.

Full text
Abstract:
The School Bus Routing Problem (SBRP) is widely discussed in the operations research literature and can be solved by several exact methods and heuristics. This problem seeks to designate the most efficient routes for a fleet of school buses, minimizing the total distance covered and considering variables such as bus stop locations, number of passengers, and the assigned destination for each of them. This study aims at solving a real case SBRP of a small-sized county located in the state of Paraná. The proposed method is based on the Capacitated Vehicle Routing Problem (CVRP) and Travelling Sal
APA, Harvard, Vancouver, ISO, and other styles
16

Ahmed Abdullah, Abdullah, Sardar Hasen Ali, Ramadhan J. Mstafa, and Vaman Mohammed Haji. "Image steganography based on DNA sequence translation properties." ISSUE SIX 4, no. 6 (2020): 15–26. http://dx.doi.org/10.25079/ukhjse.v4n1y2020.pp15-26.

Full text
Abstract:
Digital communication has become a vital part of daily life nowadays, many applications are using internet-based communication and here the importance of security rose to have a secure communication between two parties to prevent authorized access to sensitive data. These requirements led to a number of research in information security that has been done in the past two decades. Cryptography and steganography are the two main methods that are being used for information security. Cryptography refers to techniques that encrypt a message to be sent to a destination using different methods to be d
APA, Harvard, Vancouver, ISO, and other styles
17

Abdullah, Abdullah, Sardar Ali, Ramadhan Mstafa, and Vaman Haji. "Image steganography based on DNA sequence translation properties." ISSUE SIX 4, no. 6 (2020): 15–26. http://dx.doi.org/10.25079/ukhjse.v4n2y2020.pp15-26.

Full text
Abstract:
Digital communication has become a vital part of daily life nowadays, many applications are using internet-based communication and here the importance of security rose to have a secure communication between two parties to prevent authorized access to sensitive data. These requirements led to a number of research in information security that has been done in the past two decades. Cryptography and steganography are the two main methods that are being used for information security. Cryptography refers to techniques that encrypt a message to be sent to a destination using different methods to be d
APA, Harvard, Vancouver, ISO, and other styles
18

Sreenu, Ponnada, Kumar Sekharamantry Praveen, Dayal Abhinav, Yarramalle Srinivas, Vadaparthi Nagesh, and Hemanth Jude. "An assisting model for the visually challenged to detect bus door accurately." TELKOMNIKA (Telecommunication, Computing, Electronics and Control) 19, no. 6 (2021): 1924–34. https://doi.org/10.12928/telkomnika.v19i6.19811.

Full text
Abstract:
Visually impaired individuals are increasing and as per global statistics, around 39 million are blind, and 246 million are affected by low vision. Even in India, as per the recent reviews, over 5 million visually challenged people are present. Authors performed a survey of some critical problems the visually challenged people faced in India from the centre for visually challenged (CVC) School established by UVSM Hospitals. Among the major problems identified through survey, most of these persons prefer carrying out their tasks independently, and depend on public transport buses for migration.
APA, Harvard, Vancouver, ISO, and other styles
19

Kuchiki, Akifumi. "On ‘Economies of Sequence’ in the Architectural Theory of Agglomeration: A Case of the Kyoto Tourism Industry." Economies 8, no. 1 (2020): 15. http://dx.doi.org/10.3390/economies8010015.

Full text
Abstract:
This paper focuses on an architecture-based theory of agglomeration. An agglomeration is composed of a number of segments such as physical infrastructure facilitation including airports and stations. ‘Economies of sequence’ can be defined as the sequencing of the segments toward the efficient building of an agglomeration. The main three findings are as follows: first, foreign nationals from Kansai International Airport Granger-cause the number of tourists to Kyoto Prefecture, foreign nationals from Kansai International Airport Granger-cause the number of foreign tourists to Kyoto City, and pas
APA, Harvard, Vancouver, ISO, and other styles
20

Vanlalhruaia. "Securing AODV Against Black Hole Attack For Wireless Mesh Network." Journal of Information Systems Engineering and Management 10, no. 37s (2025): 1192–202. https://doi.org/10.52783/jisem.v10i37s.7547.

Full text
Abstract:
Wireless Mesh Networks (WMNs) offer flexible and scalable communication solutions but are vulnerable to various security threats, including black hole attacks. These attacks exploit the reactive nature of routing protocols like the Ad hoc On-Demand Distance Vector (AODV), which is commonly used in WMNs. Black hole attacks disrupt network operations by falsely advertising optimal paths, leading to data packet losses. To address this, we propose a detection mechanism for identifying malicious nodes in AODV-based WMNs. Our approach utilizes destination sequence number comparison and hop count ver
APA, Harvard, Vancouver, ISO, and other styles
21

Petkova Petkova - Georgieva, Stoyanka. "TELEMEDICINE PRACTICE FOR TOURISM HEALTH PREVENTION AND DEVELOPMENT." Knowledge International Journal 34, no. 4 (2019): 1109–15. http://dx.doi.org/10.35120/kij34041109p.

Full text
Abstract:
In this study is made a parallel between the common benefits of the activity sequence for the telemedicine practice and the tourism health prevention and development. The basic thesis is that such symbiosis may improve the access to specialized health services in regions that there is a lack of specialist doctors or in regions with difficult access to healthcare services but at the same time intensively visited by tourists. By the usage of the telemonitoring a large number of health care problems can be solved especially when there is a language barrier between the tourist that needs a health
APA, Harvard, Vancouver, ISO, and other styles
22

Branch, Philip, Binghao Li, and Kai Zhao. "A LoRa-Based Linear Sensor Network for Location Data in Underground Mining." Telecom 1, no. 2 (2020): 68–79. http://dx.doi.org/10.3390/telecom1020006.

Full text
Abstract:
In this paper, we describe a LoRa (from “Long Range”)-based, linear sensor network we have developed for transmitting location information of personnel and equipment in an underground mine. The system is intended to be used during emergencies when existing communications infrastructure has failed. Linear networks comprise a sequence of relays that forward data to a common destination, the headend. Relays forward location information transmitted from tags carried by personnel or equipment. Relays will usually be put in place as investigators or rescuers enter the mine. LoRa is used both by the
APA, Harvard, Vancouver, ISO, and other styles
23

Shearer, Kim, Svetha Venkatesh, and Dorota Kieronska. "The Visitors Guide: A Simple Video Reuse Application." International Journal of Pattern Recognition and Artificial Intelligence 11, no. 02 (1997): 275–301. http://dx.doi.org/10.1142/s0218001497000135.

Full text
Abstract:
One of the results of the surge in interest in the internet is the great increase in availability of pictorial and video data. Web browsers such as Netscape give access to an enormous range of such data. In order to make use of large amounts of pictorial and video data, it is necessary to develop indexing and retrieval methods.Pictorial databases have made great progress recently, to theextent that there are now a number of commercially available products. Video databases are now being researched and developed from a number ofdifferent viewpoints.Given a general indexing scheme for video, the
APA, Harvard, Vancouver, ISO, and other styles
24

Eze, Constance Nneka, Chikani N.I, and Nnaji B. Ugochukwu. "Minimizing Packet Drop Due to Black Hole Attack in Wireless Ad-Hoc Network Using Intrusion Detection System." International Journal of Research and Innovation in Applied Science 07, no. 04 (2022): 01–06. http://dx.doi.org/10.51584/ijrias.2022.7401.

Full text
Abstract:
A black hole attack is a place in computer networking whereby incoming and outgoing traffic are silently discarded or dropped without notifying the source that the data sent was unable to reach its destination. A highly successfully black hole attack can prevent all data from reaching its destination and are undetectable. This attack is a significant threat to any wireless Ad-hoc Network because it causes isolation in the Network and does that untraced. The aim of this research work focus on minimizing black hole attack in wireless Ad-hoc Network. To do this, the effect of black hole attack on
APA, Harvard, Vancouver, ISO, and other styles
25

Pramitarini, Yushintia, Ridho Hendra Yoga Perdana, Kyusung Shim, and Beongku An. "DLSMR: Deep Learning-Based Secure Multicast Routing Protocol against Wormhole Attack in Flying Ad Hoc Networks with Cell-Free Massive Multiple-Input Multiple-Output." Sensors 23, no. 18 (2023): 7960. http://dx.doi.org/10.3390/s23187960.

Full text
Abstract:
The network area is extended from ground to air. In order to efficiently manage various kinds of nodes, new network paradigms are needed such as cell-free massive multiple-input multiple-output (CF-mMIMO). Additionally, security is also considered as one of the important quality-of-services (QoS) parameters in future networks. Thus, in this paper, we propose a novel deep learning-based secure multicast routing protocol (DLSMR) in flying ad hoc networks (FANETs) with cell-free massive MIMO (CF-mMIMO). We consider the problem of wormhole attacks in the multicast routing process. To tackle this p
APA, Harvard, Vancouver, ISO, and other styles
26

Akter, Habiba, and Chris Phillips. "Tunnelling the Internet." Journal of Telecommunications and the Digital Economy 7, no. 1 (2019): 20–36. http://dx.doi.org/10.18080/jtde.v7n1.175.

Full text
Abstract:
Despite a considerable increase in Internet capacity, regional congestion is still an issue at certain times of day. Dimensioning the system to provide minimal delay under these transient conditions would be uneconomical. We therefore investigate a scheme that allows end-users to selectively exploit a sequence of mini-tunnels along a path from their origin to a chosen destination. Such tunnels can be advertised centrally through a broker, with the cooperation of the Autonomous System (AS) domain operators, similar to a driver choosing to use a toll road to avoid potential congestion. It is thu
APA, Harvard, Vancouver, ISO, and other styles
27

Lan, Xiangang, Qin Tao, and Xincheng Wu. "Liner-Shipping Network Design with Emission Control Areas: A Real Case Study." Sustainability 15, no. 4 (2023): 3734. http://dx.doi.org/10.3390/su15043734.

Full text
Abstract:
In recent years, liner-shipping companies have faced a traditional trade-off between cost and emission (CO2 and SOX) reduction. This study considers this element to construct a liner-shipping network design model which includes a package-cargo transport plan, route allocation, and route design. The objective is to maximize profit by selecting the ports to be visited, the sequence of port visits, the cargo flows between ports, and the number/operating speeds of vessels. In addition, emission control areas (ECAs) exist in the liner network. With reference to the idea of the column generation alg
APA, Harvard, Vancouver, ISO, and other styles
28

A., Klishchevskaya, and Klishchevsky S. "DEVELOPMENT AND IMPLEMENTATION OF A BRAND PROJECT OF A TOURIST DESTINATION IN PRISIVASHSHYA." Scientific Bulletin of Kherson State University. Series Economic Sciences, no. 45 (March 30, 2022): 57–62. http://dx.doi.org/10.32999/ksu2307-8030/2022-45-7.

Full text
Abstract:
The article is devoted to the problems of finding and substantiating new ways of using the potential of land re-sources of territorial communities of Southern Ukraine, consolidation of factors that determine the development of places outside urban areas and are areas of agricultural production and rural development. The issues of arranging destinations and territories attractive for visitors due to the availability of tourist resources and increasing their competitiveness are becoming especially important. The publication reveals the issue of creating and implementing a brand of the territory
APA, Harvard, Vancouver, ISO, and other styles
29

Rida, Nouha, Mohammed Ouadoud, and Abderrahim Hasbi. "Coordinated Signal Control System in Urban Road Network." International Journal of Online and Biomedical Engineering (iJOE) 16, no. 10 (2020): 4. http://dx.doi.org/10.3991/ijoe.v16i10.15473.

Full text
Abstract:
Road congestion has become one of the major problems of urban cities due to the growth in the number of vehicles and the limitation of road infrastructure. The consequences of this congestion can be seen through a difficult movement of vehicles, an increase in CO2 emissions, increasing energy consumption, and stress for drivers. Intelligent Transport Systems (ITS) based on wireless sensor networks (WSN) have emerged with new solutions and application potentials in the context of the Intelligent city. In this article, we study an approach of using a wireless sensor network to control the traffi
APA, Harvard, Vancouver, ISO, and other styles
30

Ben, Bella S. Tawfik, and M.A. Elgazza Mohamed. "Integer Linear Programming with Ant-Colony Optimized Algorithm to Extend MANET Lifetime." International Journal of Recent Technology and Engineering (IJRTE) 9, no. 4 (2020): 277–81. https://doi.org/10.35940/ijrte.D4709.119420.

Full text
Abstract:
Network which is randomly sorted out remotely and organization that conveys without framework and experiencing low force battery is called Mobile Ad-hoc Network (MANET). Oneof the main objectives isto get thebest route from source to destination to minimize the node energy consumption. Linear Programming (Integer Linear Programming) and nature inspiration technique (Ant Colony Optimization) are two models that enhance energy consumption.The proposed models in our work are considered extension of our previous works with modified version and different measures [13]. We introduced a modified vers
APA, Harvard, Vancouver, ISO, and other styles
31

Humayun, Mamoona, Maram Fahhad Almufareh, and Noor Zaman Jhanjhi. "Autonomous Traffic System for Emergency Vehicles." Electronics 11, no. 4 (2022): 510. http://dx.doi.org/10.3390/electronics11040510.

Full text
Abstract:
An emergency can occur at any time. To overcome that emergency efficiently, we require seamless movement on the road to approach the destination within a limited time by using an Emergency Vehicle (EV). This paper proposes an emergency vehicle management solution (EVMS) to determine an efficient vehicle-passing sequence that allows the EV to cross a junction without any delay. The proposed system passes the EV and minimally affects the travel times of other vehicles on the junction. In the presence of an EV in the communication range, the proposed system prioritizes the EV by creating space fo
APA, Harvard, Vancouver, ISO, and other styles
32

Xiao, Zhanding, Bo Zheng, Jinghui Xia, and Zongqu Zhao. "Multi-core shared tree based MP2MP RWA algorithms in large scale and multi-domain optical networks." Journal of Physics: Conference Series 2722, no. 1 (2024): 012005. http://dx.doi.org/10.1088/1742-6596/2722/1/012005.

Full text
Abstract:
Abstract The increasing demands of bandwidth-intensive parallel computing and collaborative applications, efficient service provisioning to support multipoint to multipoint (MP2MP) communications have attracted increasing attention. However, with the development of larger-scale and multi-domain optical networks, MP2MP RWA are introduced optimal domain sequence selection and core nodes belong to which domains problems which cannot be tackled by the conventional algorithms proposed aim at a signal domain. In this paper, we proposed a multi-core node shared multicast tree heuristic algorithm (MCS
APA, Harvard, Vancouver, ISO, and other styles
33

Raharjo, Timbul. "INDONESIAN CRAFT IN THE WORLD TRADE." Ars: Jurnal Seni Rupa dan Desain 21, no. 3 (2018): 177–82. http://dx.doi.org/10.24821/ars.v21i3.2899.

Full text
Abstract:
Some international craft exhibitions focus on home accessories, gifts, and furniture. The exhibition aim as craft product branding at the national and international market, for example 2016 JIFFINA exhibition. Indonesian craft commodity maintains market share in several export destination countries because Indonesian products offer special characteristics and moreover, Indonesian exporters are enthusiastic in promoting the products in international exhibitions. In Asia level, Canton Fair held in Guangzhou International Convention & Exhibition Center China is one of the biggest programs whe
APA, Harvard, Vancouver, ISO, and other styles
34

K., Thamizhmaran. "Table Driven vs. On-Demand Routing Protocols for MANET." Table Driven vs. On-Demand Routing Protocols for MANET 2, no. 3 (2020): 1–4. https://doi.org/10.5281/zenodo.4042916.

Full text
Abstract:
<em>Recant the researchers very interested to work temporary infrastructureless network called MANET (Mobile Ad-hoc Networks), this one decentralized network with communicated each other via intermediates nodes.</em><em> In this temporary network based routing is major issue is energy, security and packet drop because of varying network topology due to changing link breakage and node join or leave and mobility of network (source mobility, sink mobility and event mobility with varies three different routing protocols such as table driven and on-demand. In this survey paper discussed performance
APA, Harvard, Vancouver, ISO, and other styles
35

Oliskevych, M., I. Taran, T. Volkova, and I. Klymenko. "Simulation of cargo delivery by road carrier: case study of the transportation company." Naukovyi Visnyk Natsionalnoho Hirnychoho Universytetu, no. 2 (April 30, 2022): 118–23. http://dx.doi.org/10.33271/nvngu/2022-2/118.

Full text
Abstract:
Purpose. To develop a method of simulation of the process of execution of random orders, which would allow substantiating a set of decisions of the transport company Trans-Service Ltd. The decisions concern the use of their own rolling stock, or the involvement of leased vehicles, as well as the rational sequence of orders. Methodology. A simulation model of transport cycles with discrete time is developed. The smallest indivisible duration of a cycle is one working shift. The incoming flow of orders is reflected by the random coordinates of the point of departure and destination of goods. The
APA, Harvard, Vancouver, ISO, and other styles
36

Lovelace, Robin, Martijn Tennekes, and Dustin Carlino. "ClockBoard: A zoning system for urban analysis." Journal of Spatial Information Science, no. 24 (June 20, 2022): 63–85. http://dx.doi.org/10.5311/josis.2022.24.172.

Full text
Abstract:
Zones are the building blocks of urban analysis. Fields ranging from demographics to transport planning routinely use zones - spatially contiguous areal units that break-up continuous space into discrete chunks - as the foundation for diverse analysis techniques. Key methods such as origin-destination analysis and choropleth mapping rely on zones with appropriate sizes, shapes and coverage. However, existing zoning systems are sub-optimal in many urban analysis contexts, for three main reasons: 1) administrative zoning systems are often based on somewhat arbitrary factors; 2) zoning systems th
APA, Harvard, Vancouver, ISO, and other styles
37

Adikaram, Chamila Priyangani, Sandya Sulochana Wijesundera, and Jennifer Perera. "RFLP clusters of rifampicin resistant and susceptible Mycobacterium tuberculosis strains in Western province of Sri Lanka." Journal of Infection in Developing Countries 11, no. 08 (2017): 619–25. http://dx.doi.org/10.3855/jidc.7684.

Full text
Abstract:
Introduction: Continuous studies on genetic diversity of Mycobacterium tuberculosis could enhance the awareness on transmission, control and prevention of tuberculosis (TB). In this study, we investigated current genetic diversity of TB and rifampicin resistant TB by, Restriction Fragment Length Polymorphism (RFLP) based on fingerprinting of the IS6110 insertion sequence, in the Western province of Sri Lanka, the famous touristic destination with the highest TB burden in the country.&#x0D; Methodology: Genomic DNA extracted from susceptible and rifampicin resistant TB strains (confirmed for rp
APA, Harvard, Vancouver, ISO, and other styles
38

Kareem Jumaa, Noor, Auday A.H. Mohamad, Abbas Muhammed Allawy, and Ali A. Mohammed. "Taguchi Method Based Node Performance Analysis of Generous TIT- for-TAT Cooperation of AD-HOC Networks." Iraqi Journal for Electrical and Electronic Engineering 20, no. 2 (2024): 33–44. http://dx.doi.org/10.37917/ijeee.20.2.3.

Full text
Abstract:
Ad-Hoc networks have an adaptive architecture, temporarily configured to provide communication between wireless devices that provide network nodes. Forwarding packets from the source node to the remote destination node may require intermediate cooperative nodes (relay nodes), which may act selfishly because they are power-constrained. The nodes should exhibit cooperation even when faced with occasional selfish or non-cooperative behaviour from other nodes. Several factors affect the behaviour of nodes; those factors are the number of packets required to redirect, power consumption per node, an
APA, Harvard, Vancouver, ISO, and other styles
39

Bartroff, Jay, and Ester Samuel-Cahn. "The fighter problem: optimal allocation of a discrete commodity." Advances in Applied Probability 43, no. 1 (2011): 121–30. http://dx.doi.org/10.1239/aap/1300198515.

Full text
Abstract:
In this paper we study the fighter problem with discrete ammunition. An aircraft (fighter) equipped with n anti-aircraft missiles is intercepted by enemy airplanes, the appearance of which follows a homogeneous Poisson process with known intensity. If j of the n missiles are spent at an encounter, they destroy an enemy plane with probability a(j), where a(0) = 0 and {a(j)} is a known, strictly increasing concave sequence, e.g. a(j) = 1 - qj, 0 &lt; q &lt; 1. If the enemy is not destroyed, the enemy shoots the fighter down with known probability 1 - u, where 0 ≤ u ≤ 1. The goal of the fighter i
APA, Harvard, Vancouver, ISO, and other styles
40

Bartroff, Jay, and Ester Samuel-Cahn. "The fighter problem: optimal allocation of a discrete commodity." Advances in Applied Probability 43, no. 01 (2011): 121–30. http://dx.doi.org/10.1017/s0001867800004717.

Full text
Abstract:
In this paper we study the fighter problem with discrete ammunition. An aircraft (fighter) equipped with n anti-aircraft missiles is intercepted by enemy airplanes, the appearance of which follows a homogeneous Poisson process with known intensity. If j of the n missiles are spent at an encounter, they destroy an enemy plane with probability a(j), where a(0) = 0 and {a(j)} is a known, strictly increasing concave sequence, e.g. a(j) = 1 - q j , 0 &amp;lt; q &amp;lt; 1. If the enemy is not destroyed, the enemy shoots the fighter down with known probability 1 - u, where 0 ≤ u ≤ 1. The goal of the
APA, Harvard, Vancouver, ISO, and other styles
41

Su, Huanyin, Shuting Peng, Shanglin Mo, and Kaixin Wu. "Neural Network-Based Hybrid Forecasting Models for Time-Varying Passenger Flow of Intercity High-Speed Railways." Mathematics 10, no. 23 (2022): 4554. http://dx.doi.org/10.3390/math10234554.

Full text
Abstract:
Time-varying passenger flow is the input data in the optimization design of intercity high-speed railway transportation products, and it plays an important role. Therefore, it is necessary to predict the origin-destination (O-D) passenger flow at different times of the day in combination with the stable time-varying characteristics. In this paper, three neural network-based hybrid forecasting models are designed and compared, named Variational Mode Decomposition-Multilayer Perceptron (VMD-MLP), Variational Mode Decomposition-Gated Recurrent Unit Neural Network (VMD-GRU), and Variational Mode D
APA, Harvard, Vancouver, ISO, and other styles
42

Radha, Raman Chandan, and P.K.Mishra. "Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs." International Journal of Computer Networks & Communications (IJCNC) 12, no. 3 (2020): 1–20. https://doi.org/10.5281/zenodo.3889350.

Full text
Abstract:
The Mobile Adhoc Network (MANET) is a wireless network model for infrastructure-less communication, and it provides numerous applications in different areas. The MANET is vulnerable to a Black-hole attack, and it affects routing functionality by dropping all the incoming packets purposefully. The Black-hole attackers pretend that it always has the best path to the destination node to mislead the source nodes. Trust is the critical factor for detecting and isolating the Black-hole attackers from the network. However, the harsh channel conditions make it difficult to differentiate the Black-hole
APA, Harvard, Vancouver, ISO, and other styles
43

Wannigama, Dhammika Leshan, Naris Kueakulpattana, Sirirat Luk-In, et al. "1355. Cluster of Multi-drug Resistance Neisseria gonorrhoeae Isolates with Reduce Ceftriaxone Susceptibility, First Report in Thailand." Open Forum Infectious Diseases 8, Supplement_1 (2021): S764. http://dx.doi.org/10.1093/ofid/ofab466.1547.

Full text
Abstract:
Abstract Background Rapid emergence of global azithromycin resistance, with ceftriaxone reduce susceptibility/resistant strains, threatens the current recommends dual therapy with ceftriaxone and azithromycin for gonorrhea to ensure effective treatment. Thailand is a major risk area for gonorrhea because it as a key destination for sex tourism industry, where antibiotic resistance gonorrhea can spread easily and quickly across the region. Here, we identified a first cluster of Neisseria gonorrhoeae isolates with decreased ceftriaxone susceptibility in Thailand. Methods A 134 N. gonorrhoeae iso
APA, Harvard, Vancouver, ISO, and other styles
44

Amit, Lia Natasha, Daisuke Mori, Jecelyn Leaslie John, et al. "Emergence of equine-like G3 strains as the dominant rotavirus among children under five with diarrhea in Sabah, Malaysia during 2018–2019." PLOS ONE 16, no. 7 (2021): e0254784. http://dx.doi.org/10.1371/journal.pone.0254784.

Full text
Abstract:
Rotavirus infection is a dilemma for developing countries, including Malaysia. Although commercial rotavirus vaccines are available, these are not included in Malaysia’s national immunization program. A scarcity of data about rotavirus genotype distribution could be partially to blame for this policy decision, because there are no data for rotavirus genotype distribution in Malaysia over the past 20 years. From January 2018 to March 2019, we conducted a study to elucidate the rotavirus burden and genotype distribution in the Kota Kinabalu and Kunak districts of the state of Sabah. Stool specim
APA, Harvard, Vancouver, ISO, and other styles
45

Dr., R. Madhanmohan. "A Study on Ad Hoc on Demand Distance Vector AODV Protocol." International Journal of Trend in Scientific Research and Development 3, no. 4 (2019): 1019–21. https://doi.org/10.31142/ijtsrd24006.

Full text
Abstract:
AODV is a very simple, efficient, and effective routing protocol for Mobile Ad hoc Net works which do not have fixed topology. This algorithm was motivated by the limited bandwidth that is available in the media that are used for wireless communications. It borrows most of the advantageous concepts from DSR and DSDV algorithms. The on demand route discovery and route maintenance from DSR and hop by hop routing, usage of node sequence numbers from DSDV make the algorithm cope up with topology and routing information. Obtaining the routes purely on demand makes AODV a very useful and desired alg
APA, Harvard, Vancouver, ISO, and other styles
46

Hoffmann, Volker, Jan-Hendrik Webert, Brian Murray, and Robert Graf. "Data-driven construction of maritime traffic networks for AI-based route prediction." Journal of Physics: Conference Series 2867, no. 1 (2024): 012048. http://dx.doi.org/10.1088/1742-6596/2867/1/012048.

Full text
Abstract:
Abstract Predicting the routes of maritime traffic can improve economic efficiency, decrease ecological impact, and improve safety at sea. Over scales that are small (few hundred meters) and large (dozens to hundreds of kilometers), vessel trajectories have successfully been predicted by deep learning and (static) network-based approaches, respectively. We present an approach for medium to large scales (few kilometers) where (a) a maritime traffic network is automatically constructed from AIS messages, and (b) vessel trajectories are predicted as most likely paths through the network. Using th
APA, Harvard, Vancouver, ISO, and other styles
47

Kaisina, I. A., A. V. Abilov, M. A. Lamri, K. E. Korepanov, and R. E. Shibanov. "Methods for Priority Relaying of Multi-Stream Data at the Application Layer in the UAV Networks." Vestnik IzhGTU imeni M.T. Kalashnikova 25, no. 1 (2022): 91–99. http://dx.doi.org/10.22213/2413-1172-2022-1-91-99.

Full text
Abstract:
The article presents methods for relaying Multi-Stream data at the application layer of OSI model through a relay node in UAV networks - MS-AL-ARQ Relaying methods. MS-AL-ARQ method is taken as the principal one. One of the basic operating principles of Application Layer ARQ-based Multi-Streaming (MS-AL-ARQ) is to determine a lost fragment from one of the source nodes based on a sequence number with an IP address ID. After determination of the lost data fragment, a negative non-acknowledgment NACK is sent to the source node. A round trip time RTT is set, after each NACK to schedule the request
APA, Harvard, Vancouver, ISO, and other styles
48

Nguyễn, Quốc Cường. "Đánh giá hiệu năng giải pháp chống tấn công lỗ đen trong mạng MANET". Tạp chí Khoa học Đại học Tây Nguyên (Tay Nguyen Journal of Science) 16, № 53 (2022): 26–32. https://doi.org/10.5281/zenodo.6556238.

Full text
Abstract:
Mạng Mobile Ad hoc Network (MANET) l&agrave; mạng gồm c&aacute;c n&uacute;t di động c&oacute; khả năng nhận v&agrave; truyền&nbsp;dữ liệu m&agrave; kh&ocirc;ng cần đến cơ sở hạ tầng cố định. Truyền th&ocirc;ng giữa mỗi cặp n&uacute;t nguồn v&agrave; đ&iacute;ch được&nbsp;thực hiện bằng c&aacute;ch sử dụng c&aacute;c giao thức định tuyến. C&aacute;c giao thức định tuyến n&agrave;y c&ograve;n nhiều lỗ hổng&nbsp;bảo mật dẫn đến mạng MANET bị tấn c&ocirc;ng v&agrave; ảnh hưởng rất lớn đến hiệu năng mạng. Tấn c&ocirc;ng lỗ đen&nbsp;(Blackhole Attack) l&agrave; h&igrave;nh thức thu h&uacute;t lưu lư
APA, Harvard, Vancouver, ISO, and other styles
49

Feng, Chiang Ling. "Simulation of the Performance Metrics for Securing DSDV Routing Protocol Based on Trusted Environments." Journal of Physics: Conference Series 2068, no. 1 (2021): 012047. http://dx.doi.org/10.1088/1742-6596/2068/1/012047.

Full text
Abstract:
Abstract To organize the network in an efficient way to minimize the risk of illegal node and to safeguard protected information, a security mechanism is required to secure communication. In addition, a security mechanism is also required to ensure that received information have not been tampered with. In this paper, a more efficient mechanism for Securing the Destination Sequenced Distance Vector Routing Protocol (SDSDV) is proposed. This paper comprehensively investigates the performance impacts by varying the number of maximum connections and mobility on securing the ad hoc network with Des
APA, Harvard, Vancouver, ISO, and other styles
50

Hemalatha, S., Harikumar Pallathadka, Rajesh P. Chinhewadi, D. Kalaiyarasi, and M. Suresh Thangakrishnan. "Intelligent Buffer Management Algorithm to Prevent Packet loss in Mobile Adhoc Network." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 8s (2023): 325–28. http://dx.doi.org/10.17762/ijritcc.v11i8s.7212.

Full text
Abstract:
In a mobile ad hoc network, which is self-organized and operates without any fundamental infrastructure, packet transmission from the source node to the destination node is completed after sending the route request and route reply. A reliable path is then selected depending on the protocol choice. Data that the sender intends to deliver is broken up into packets and given sequence numbers before being transmitted over the channel. With the aid of an internal buffer that helps to receive packets and forward them to the next destination, each and every packet travels along the allotted path unti
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!