To see the other types of publications on this topic, follow the link: Node behavior.

Journal articles on the topic 'Node behavior'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Node behavior.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Fan, Na, Zongtao Duan, and Guangyuan Zhu. "A data dissemination mechanism based on evaluating behavior for vehicular delay-tolerant networks." International Journal of Distributed Sensor Networks 15, no. 7 (2019): 155014771986550. http://dx.doi.org/10.1177/1550147719865509.

Full text
Abstract:
Vehicular delay-tolerant networks are widely used in intelligent transport application. Vehicle nodes exchange and share various information in vehicular delay-tolerant networks. However, current delay-tolerant network routing algorithms do not take into account the dynamic characteristic of traffic flow, and they do not effectively resist cyber attacks, such as black hole attack. To address this issue, we propose a data dissemination mechanism for vehicular delay-tolerant networks. In this mechanism, we develop a combined model to estimate the real-time traffic density. Simultaneously, we pro
APA, Harvard, Vancouver, ISO, and other styles
2

Forouzandeh, Saman, Amir Sheikhahmadi, Atae Rezaei Aghdam, and Shuxiang Xu. "New centrality measure for nodes based on user social status and behavior on Facebook." International Journal of Web Information Systems 14, no. 2 (2018): 158–76. http://dx.doi.org/10.1108/ijwis-07-2017-0053.

Full text
Abstract:
Purpose This paper aims to analyze the role of influential nodes on other users on Facebook social media sites by social and behavioral characteristics of users. Hence, a new centrality for user is defined, applying susceptible-infected recovered (SIR) model to identify influence of users. Results show that the combination of behavioral and social characteristics would be determined the most influential users that influence majority of nodes on social networks. Design/methodology/approach In this paper, the authors define a new centrality for users, considering node status and behaviors. Thus,
APA, Harvard, Vancouver, ISO, and other styles
3

Chen, Bo, Jian Lin Mao, Ning Guo, Guan Hua Qiao, and Ning Dai. "A Threshold-Based K-Means Algorithm for Selfish Behavior Detection in IEEE 802.15.4 Wireless Sensor Networks." Applied Mechanics and Materials 303-306 (February 2013): 255–60. http://dx.doi.org/10.4028/www.scientific.net/amm.303-306.255.

Full text
Abstract:
To overcome the insufficient of Sliding Window Non-parameter Cumulation Sum (SWN-CUSUM) algorithm, a Threshold-based K-means (TK-means) algorithm was presented to detect the selfish behaviors in an IEEE 802.15.4 Wireless Sensor Network (WSN).By judging the threshold and tracing the statistics characteristic of the average delay and the average throughput from each link, a node can determine if there is a selfish behavior and distinguish selfish nodes from normal nodes in the WSN. In the TK-means detection mechanism, when the threshold is lower than zero, it is judged that selfish behavior happ
APA, Harvard, Vancouver, ISO, and other styles
4

Zhu, Qi. "Node Behavior Trust Evaluation Model Based on Sliding Window." Applied Mechanics and Materials 155-156 (February 2012): 138–42. http://dx.doi.org/10.4028/www.scientific.net/amm.155-156.138.

Full text
Abstract:
In order to improve confidence of the node behavior the credibility assessing, this paper presents the nodes behavior of the trust evaluation mechanism based on sliding window, Through the sliding window Assessment strategies to ensure the trust assessment to meet the node behavior assessment principles, Assessment strategies is good combination of confidence assessment method of the subjective and assessment content of the objectivity to ensure contacts number ofa large number of nodes (Nmin) at the same time maintaining good scalability, trust assessment reflects the importance of the recent
APA, Harvard, Vancouver, ISO, and other styles
5

Nian, Fuzhong, Yang Yang, Yayong Shi, Jinhu Ren, and Renmeng Cao. "A behavioral propagation and competition model based on pressure." Modern Physics Letters B 35, no. 19 (2021): 2150328. http://dx.doi.org/10.1142/s0217984921503280.

Full text
Abstract:
The influence of node behavior by the relevant group behavior in complex networks is a topic of recent interest. In order to measure the direct and indirect influence of the neighborhoods, the behavioral propagation and competition model was established based on the pressure. The pressure is described by the impact of group behavior on nodes, which is related to the length and number of reachable paths between two nodes for measuring the nodal behavioral influence. In addition, the pressure range has an effect on the pressure. By modeling and analyzing the change of nodes motivation and the ru
APA, Harvard, Vancouver, ISO, and other styles
6

Song, Cui Ye, Cheng Lie Du, and Gang Li. "An Event Bridge Framework for Modeling and Simulating Networked Hybrid Dynamic Behaviors." Applied Mechanics and Materials 651-653 (September 2014): 1798–805. http://dx.doi.org/10.4028/www.scientific.net/amm.651-653.1798.

Full text
Abstract:
Typical CPS system composes of large scale of smart physical nodes communicated by kinds of network, while each node shows certain hybrid dynamic behavior. Their dynamic behavior features with networked mix of discrete time-driven cyber behavior and continuous time-driven physical behavior, complicating the modeling and simulating of the entire CPS behavior during the design and analysis. In this paper, an event bridge framework is proposed, extending the composition semantics of the hybrid automata, to capture the communication relationship among CPS nodes as well as the transmission delay pr
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Xian Jun. "Study on Gravity Dam Foundation Stability Combining with Dam Foundation Deformation Behavior." Advanced Materials Research 250-253 (May 2011): 2965–69. http://dx.doi.org/10.4028/www.scientific.net/amr.250-253.2965.

Full text
Abstract:
Gravity dam foundation failure progress is always associated with its deformation development. So dam foundation deformation should be paid more attention in gravity dam stability analysis. Key node plays an important role in analyzing the dam foundation deformation development. But how to select key node is worth researching. A gravity dam foundation stability is studied by the development of plastic zone and key nodes’ displacements in dam foundation. The problem of key node selection is researched and a key node selection method is brought up also in this paper.
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Feng, Yali Si, Ning Lu, Zhen Chen, and Limin Shen. "A Security and Efficient Routing Scheme with Misbehavior Detection in Delay-Tolerant Networks." Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/2761486.

Full text
Abstract:
Due to the unique network characteristics, the security and efficient routing in DTNs are considered as two great challenges. In this paper, we design a security and efficient routing scheme, called SER, which integrates the routing decision and the attacks detection mechanisms. In SER scheme, each DTNs node locally maintains a one-dimensional vector table to record the summary information about the contact with other nodes and the trust degree of other nodes. To obtain the global status and the contact relationship among all nodes, the trusted routing table consisting of vectors of all nodes
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Longbao, Yingchi Mao, Yangkun Cheng, and Yi Liu. "Deep Learning-Based Diagnosing Structural Behavior in Dam Safety Monitoring System." Sensors 21, no. 4 (2021): 1171. http://dx.doi.org/10.3390/s21041171.

Full text
Abstract:
Collecting a myriad of prototype data through various types of monitoring sensors plays a virtual important role in many aspects of dam safety such as real-time grasp of safety state, exposure of hidden dangers, and inspection design and construction. However, the current methods of prediction are weak in the long-term sequence of nodes with missing and abnormal error value. Moreover, the limitation caused by the apparatus, environmental factors, and network transmission can lead to the deviation and inconsistency of diagnosis and evaluation of local region. In this paper, we consider the corr
APA, Harvard, Vancouver, ISO, and other styles
10

S, Dhanabal, Dr Amudhavalli P, Dr Prasanna Venkatesan G. K. D, and Dr Prasanna Venkatesan G. K. D. "An energy efficient flexible delay tolerant network with adaptive secured framework (ASF-DTN)." International Journal of Engineering & Technology 7, no. 3 (2018): 1299. http://dx.doi.org/10.14419/ijet.v7i3.12485.

Full text
Abstract:
Delay tolerant networks are widely used in mobile communications because of network withstanding capability of delay. However, when the connectivity of nodes increases, data loss may occur while transmission. Due to the malicious behavior of nodes the data may get permanently lost, which is known as black hole attacks and there is a chance to partial data loss because of the lower energy level of a node, which is known as a gray hole attack. In existing work, the data capacity of a node is not limited, so most of the highly energy efficient node contains a huge amount of data, when compared to
APA, Harvard, Vancouver, ISO, and other styles
11

Yuan, Peiyan, Xiaoxiao Pang, Ping Liu, and En Zhang. "FollowMe: One Social Importance-Based Collaborative Scheme in MONs." Future Internet 11, no. 4 (2019): 98. http://dx.doi.org/10.3390/fi11040098.

Full text
Abstract:
The performance of mobile opportunistic networks mainly relies on collaboration among nodes. Thus far, researchers have ignored the influence of node sociality on the incentive process, leading to poor network performance. Considering the fact that followers always imitate the behavior of superstars, this paper proposes FollowMe, which integrates the social importance of nodes with evolutionary game theory to improve the collaborative behavior of nodes. First, we use the prisoner’s dilemma model to establish the matrix of game gains between nodes. Second, we introduce the signal reference as a
APA, Harvard, Vancouver, ISO, and other styles
12

Tong, Ruipeng, Yanwei Zhang, Yunyun Yang, Qingli Jia, Xiaofei Ma, and Guohua Shao. "Evaluating Targeted Intervention on Coal Miners’ Unsafe Behavior." International Journal of Environmental Research and Public Health 16, no. 3 (2019): 422. http://dx.doi.org/10.3390/ijerph16030422.

Full text
Abstract:
Miners’ unsafe behavior is the main cause of roof accidents in coal mines, and behavior intervention plays a significant role in reducing the occurrence of miners’ unsafe behavior. However, traditional behavior intervention methods lack pertinence. In order to improve the intervention effect and reduce the occurrence of coal mine roof accidents more effectively, this study proposed a targeted intervention method for unsafe behavior. The process of targeted intervention node locating was constructed, and based on the analysis of 331 coal mine roof accidents in China, three kinds of targeted int
APA, Harvard, Vancouver, ISO, and other styles
13

Ionescu, Adriana, Cristian Burada, and Mihai Negru. "F.E.M. Simulation of the Building Frame Node Behavior during Seism." Applied Mechanics and Materials 823 (January 2016): 95–98. http://dx.doi.org/10.4028/www.scientific.net/amm.823.95.

Full text
Abstract:
This paper presents a simulation made with ANSYS program on the stress and strain state of the node region of a reinforced concrete building subjected to earthquakes and equipped with devices for seism energy dissipation. This simulation includes the forces developed by the damping devices which act on these important nodes regions. The main goal of this simulation is to determine if the presence of the damping device at the supra-structure of the building is increasing the stresses and strains in the concrete and reinforcement bars of the node during earthquakes. For this study were used damp
APA, Harvard, Vancouver, ISO, and other styles
14

Srivastav, Abhishek, Asok Ray, and Shashi Phoha. "Adaptive Sensor Activity Scheduling in Distributed Sensor Networks: A Statistical Mechanics Approach." International Journal of Distributed Sensor Networks 5, no. 3 (2009): 242–61. http://dx.doi.org/10.1080/15501320802473250.

Full text
Abstract:
This article presents an algorithm for adaptive sensor activity scheduling ( A-SAS) in distributed sensor networks to enable detection and dynamic footprint tracking of spatial-temporal events. The sensor network is modeled as a Markov random field on a graph, where concepts of Statistical Mechanics are employed to stochastically activate the sensor nodes. Using an Ising-like formulation, the sleep and wake modes of a sensor node are modeled as spins with ferromagnetic neighborhood interactions; and clique potentials are defined to characterize the node behavior. Individual sensor nodes are de
APA, Harvard, Vancouver, ISO, and other styles
15

CAO, XIAN-BIN, WEN-BO DU, MAO-BIN HU, ZHI-HAI RONG, PENG SUN, and CAI-LONG CHEN. "TOPOLOGY PROPERTY AND DYNAMIC BEHAVIOR OF A GROWING SPATIAL NETWORK." International Journal of Modern Physics C 22, no. 04 (2011): 333–45. http://dx.doi.org/10.1142/s0129183111016282.

Full text
Abstract:
In this paper, we propose a growing spatial network (GSN) model and investigate its topology properties and dynamical behaviors. The model is generated by adding one node i with m links into a square lattice at each time step and the new node i is connected to the existing nodes with probabilities proportional to: [Formula: see text], where kj is the degree of node j, α is the tunable parameter and dij is the Euclidean distance between i and j. It is found that both the degree heterogeneity and the clustering coefficient monotonously increase with the increment of α, while the average shortest
APA, Harvard, Vancouver, ISO, and other styles
16

Et. al., Dr B. Shadaksharappa,. "Attack Prediction By Using Greedy Algorithm For Diminishing The Drop And Delay In Wireless Sensor Networks." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (2021): 1072–82. http://dx.doi.org/10.17762/turcomat.v12i6.2425.

Full text
Abstract:
The essential constraint of the internet is that forwarding the data packets of data among the restricted and trustworthy data nodes. If the receiver node is attacker node then it'll drop the data rather than forwarding the data to ensuing neighbor node. Therefore, efficient and secure data transmission is extremely necessary within the network data transmission. Each router node within the network can accept the data packets up to its buffer size only. Once the queue value reached the buffer threshold value then congestion can occur at the node. Once congestion happens then it would lose the
APA, Harvard, Vancouver, ISO, and other styles
17

Hu, Yu Jie, Jian Lin Mao, Ning Guo, Bo Chen, and Guan Hua Qiao. "An Improved K-Means Algorithm Based on Density in the Selfish Behavior Detection." Advanced Materials Research 1030-1032 (September 2014): 1642–45. http://dx.doi.org/10.4028/www.scientific.net/amr.1030-1032.1642.

Full text
Abstract:
Aiming at selfish nodes in wireless sensor network (WSN) competition Shared channel unfair use of channel resources, for the purpose of selfish node Detection, puts forward an Improved Clustering Method (Improved Density-based Clustering Detection Method, ID-BCDM).With an average transmission delay, average throughput of node link sequence and collision probability of network performance characteristics, add the density function, improved K-means algorithm was carried out on the characteristics of sequence analysis and clustering. The simulation test results show that the ID-BCDM on three dime
APA, Harvard, Vancouver, ISO, and other styles
18

Ramalakshmi, R., S. Subash Prabhu, and C. Balasubramanian. "Detection of Compromised Nodes in Wireless Sensor Networks using GPSR Protocol and Iterative Filtering Algorithm." APTIKOM Journal on Computer Science and Information Technologies 1, no. 3 (2016): 141–48. http://dx.doi.org/10.11591/aptikom.j.csit.122.

Full text
Abstract:
The sensor network is used to observe surrounding area gathered and spread the information to other sink. The advantage of this network is used to improve life time and energy. The first sensor node or group of sensor nodes in the network runs out of energy. The aggregator node can send aggregate value to the base station. The sensor node can be used to assign initial weights for each node. This sensor node calculates weight for each node. Which sensor node weight should be lowest amount they can act as a cluster head. The joint node can send false data to the aggregator node and then these no
APA, Harvard, Vancouver, ISO, and other styles
19

BILLETTE, JACQUES, and STANLEY NATTEL. "Dynamic Behavior of the Atrioventricular Node:." Journal of Cardiovascular Electrophysiology 5, no. 1 (1994): 90–102. http://dx.doi.org/10.1111/j.1540-8167.1994.tb01117.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Wen, Yang, Shu Tan Liu, and Gong Ke Xia. "Mechanical Behavior Research on the Double Angle Bolts Tube-Plate Joints of Concrete-Filled Steel Tubular Lattice Wind Turbine Tower." Applied Mechanics and Materials 578-579 (July 2014): 727–31. http://dx.doi.org/10.4028/www.scientific.net/amm.578-579.727.

Full text
Abstract:
Through the experiment of the six node models, this article obtained the axial force-deformation curves of the web members, the equivalent stress distribution curves under different loads of the tower within the scope of the node plate length. The result shows that: the stress level in the node area increases with the growth of the radius-thickness ratio; the node without stiffening ribs prone to appear node plate out-of-plane buckling with a lower carrying capacity, and the pillar got a higher stress concentration at the front end of the node plate; while the exists of the stiffening rib can
APA, Harvard, Vancouver, ISO, and other styles
21

Nian, Fuzhong, Rendong Liu, and Anhui Cong. "An incentive mechanism model based on the correlation between neighbor behavior and distance." International Journal of Modern Physics C 31, no. 11 (2020): 2050161. http://dx.doi.org/10.1142/s0129183120501612.

Full text
Abstract:
In this study, the incentive is defined based on feedback mechanism promoting propagation, and a novel model of behavior propagation is proposed based on feedback mechanism to investigate behavior propagation. In this model, the incentive includes the distance among individuals and the set of state and the influence of node is decided by the incentive and node degree, which explore the propagation effect under different network. The experimental results show the incentive and the propagation have positive correlation, and the propagating effect is determined by the network attribute. At the sa
APA, Harvard, Vancouver, ISO, and other styles
22

Dong, Li Ting, and Yan Wang. "Comparative Analysis on Seismic Performance of Steel Frame with Different Forms of Symmetric Enhanced Nodes." Advanced Materials Research 790 (September 2013): 247–51. http://dx.doi.org/10.4028/www.scientific.net/amr.790.247.

Full text
Abstract:
Based on node test and finite element analysis results of four different structural form enhanced nodes,failure modes,hysteretic behavior,bearing capacity,ductility and energy dissipation capacity of nodes are analyzed comprehensively and comparatively for more in-depth exploration about the seismic performance of symmetric enhanced nodes.The results showed that all the symmetric enhanced nodes have full hysteretic curve and energy dissipation capacity. On the whole,The flange-plate reinforced node exhibit better seismic performance.
APA, Harvard, Vancouver, ISO, and other styles
23

Benahmed, Khelifa, Madjid Merabti, and Hafid Haffaf. "Inspired Social Spider Behavior for Secure Wireless Sensor Networks." International Journal of Mobile Computing and Multimedia Communications 4, no. 4 (2012): 1–10. http://dx.doi.org/10.4018/jmcmc.2012100101.

Full text
Abstract:
Last year’s biologically inspired systems had received a great interest. Behavior of social insects, DNA computation, artificial neural networks, evolutionary computation, and artificial immune systems are some of the interests which can be highlighted. Wireless sensor networks have no clear line of defense and no fixed infrastructure; therefore, the known security techniques used for cabled networks might not work perfectly. While wireless sensor networks, node misbehavior can cause the packet dropping, packet modification, packet misrouting, selfish node behavior, and so on. A biologically-i
APA, Harvard, Vancouver, ISO, and other styles
24

Jia, Tianye, Christine Macare, Sylvane Desrivières, et al. "Neural basis of reward anticipation and its genetic determinants." Proceedings of the National Academy of Sciences 113, no. 14 (2016): 3879–84. http://dx.doi.org/10.1073/pnas.1503252113.

Full text
Abstract:
Dysfunctional reward processing is implicated in various mental disorders, including attention deficit hyperactivity disorder (ADHD) and addictions. Such impairments might involve different components of the reward process, including brain activity during reward anticipation. We examined brain nodes engaged by reward anticipation in 1,544 adolescents and identified a network containing a core striatal node and cortical nodes facilitating outcome prediction and response preparation. Distinct nodes and functional connections were preferentially associated with either adolescent hyperactivity or
APA, Harvard, Vancouver, ISO, and other styles
25

Caminha, Jean, Angelo Perkusich, and Mirko Perkusich. "A Smart Trust Management Method to Detect On-Off Attacks in the Internet of Things." Security and Communication Networks 2018 (2018): 1–10. http://dx.doi.org/10.1155/2018/6063456.

Full text
Abstract:
Internet of Things (IoT) resources cooperate with themselves for requesting and providing services. In heterogeneous and complex environments, those resources must trust each other. On-Off attacks threaten the IoT trust security through nodes performing good and bad behaviors randomly, to avoid being rated as a menace. Some countermeasures demand prior levels of trust knowledge and time to classify a node behavior. In some cases, a malfunctioning node can be mismatched as an attacker. In this paper, we introduce a smart trust management method, based on machine learning and an elastic slide wi
APA, Harvard, Vancouver, ISO, and other styles
26

Martínez Sarmiento, Fredy Hernán, and Jesús Alberto Delgado. "Wireless Visual Sensor Network Robots Based for the Emulation of Collective Behavior." Revista Tecnura 16, no. 31 (2012): 10. http://dx.doi.org/10.14483/udistrital.jour.tecnura.2012.1.a01.

Full text
Abstract:
We consider the problem of bacterial quorum Sensing emulate on small mobile robots. Robots that reflect the behavior of bacteria are designed as mobile wireless camera nodes. They are able to structure a dynamic wireless sensor network. Emulated behavior corresponds to a simplification of bacterial quórum sensing, where the action of a network node is conditioned by the population density of robots (nodes) in a given area. The population density Reading is done visually using a camera. The robot makes an estímate of the population density of the images, and acts according to this information.
APA, Harvard, Vancouver, ISO, and other styles
27

Silva, Eduardo Just da Costa e., and Giselia Alves Pontes da Silva. "Local behavior and lymph node metastases of Wilms' tumor: accuracy of computed tomography." Radiologia Brasileira 47, no. 1 (2014): 9–13. http://dx.doi.org/10.1590/s0100-39842014000100007.

Full text
Abstract:
Objective To evaluate the accuracy of computed tomography for local and lymph node staging of Wilms' tumor. Materials and Methods Each case of Wilms' tumor was evaluated for the presence of abdominal lymph nodes by a radiologist. Signs of capsule and adjacent organ invasion were analyzed. Surgical and histopathological results were taken as the gold standard. Results Sensitivity was 100% for both mesenteric and retroperitoneal lymph nodes detection, and specificity was, respectively, 12% and 33%, with positive predictive value of 8% and 11% and negative predictive value of 100%. Signs of capsu
APA, Harvard, Vancouver, ISO, and other styles
28

Jianming, Zhou, Liu Fan, and Lu Qiuyuan. "Data Fusion Based on Node Trust Evaluation in Wireless Sensor Networks." Journal of Sensors 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/391401.

Full text
Abstract:
Abnormal behavior detection and trust evaluation mode of traditional sensor node have a single function without considering all the factors, and the trust value algorithm is relatively complicated. To avoid these above disadvantages, a trust evaluation model based on the autonomous behavior of sensor node is proposed in this paper. Each sensor node has the monitoring privilege and obligation. Neighboring sensor nodes can monitor each other. Their direct and indirect trust values can be achieved by using a relatively simple calculation method, the synthesis trust value of which could be got acc
APA, Harvard, Vancouver, ISO, and other styles
29

Beranek, Ladislav, and Radim Remes. "Distribution of Node Characteristics in Evolving Tripartite Network." Entropy 22, no. 3 (2020): 263. http://dx.doi.org/10.3390/e22030263.

Full text
Abstract:
Many real-world networks have a natural tripartite structure. Investigating the structure and the behavior of actors in these networks is useful to gain a deeper understanding of their behavior and dynamics. In our paper, we describe an evolving tripartite network using a network model with preferential growth mechanisms and different rules for changing the strength of nodes and the weights of edges. We analyze the characteristics of the strength distribution and behavior of selected nodes and selected actors in this tripartite network. The distributions of these analyzed characteristics follo
APA, Harvard, Vancouver, ISO, and other styles
30

Ramalakshmi, R., S. Subash Prabhu, and C. Balasubramanianb. "Detection of Compromised Nodes in Wireless Sensor Networks using GPSR Protocol and Iterative Filtering Algorithm." APTIKOM Journal on Computer Science and Information Technologies 1, no. 3 (2020): 141–48. http://dx.doi.org/10.34306/csit.v1i3.59.

Full text
Abstract:
The sensor network is used to observe surrounding area gathered and spread the information to other sink.The advantage of this network is used to improve life time and energy. The first sensor node or group of sensor nodesin the network runs out of energy. The aggregator node can send aggregate value to the base station. The sensornode can be used to assign initial weights for each node. This sensor node calculates weight for each node. Whichsensor node weight should be lowest amount they can act as a cluster head. The joint node can send false data to theaggregator node and then these node co
APA, Harvard, Vancouver, ISO, and other styles
31

Lin, Yu, Xuejun Yu, and Walther Glaubitt. "Trusted behavior identification model for distributed node." Journal of Intelligent & Fuzzy Systems 37, no. 4 (2019): 4621–31. http://dx.doi.org/10.3233/jifs-179296.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Chen, Zuo, Min He, Wei Liang, and Kai Chen. "Trust-Aware and Low Energy Consumption Security Topology Protocol of Wireless Sensor Network." Journal of Sensors 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/716468.

Full text
Abstract:
Wireless sensor network (WSN) is a kind of distributed and self-organizing networks, in which the sensor nodes have limited communication bandwidth, memory, and limited energy. The topology construction of this network is usually vulnerable when attacked by malicious nodes. Besides, excessive energy consumption is a problem that can not be ignored. Therefore, this paper proposes a secure topology protocol of WSN which is trust-aware and of low energy consumption, called TLES. The TLES considers the trust value as an important factor affecting the behavior of node. In detail, the TLES would tak
APA, Harvard, Vancouver, ISO, and other styles
33

Nakahara*, Hiroyuki, and Kenji Doya. "Near-Saddle-Node Bifurcation Behavior as Dynamics in Working Memory for Goal-Directed Behavior." Neural Computation 10, no. 1 (1998): 113–32. http://dx.doi.org/10.1162/089976698300017917.

Full text
Abstract:
In consideration of working memory as a means for goal-directed behavior in nonstationary environments, we argue that the dynamics of working memory should satisfy two opposing demands: long-term maintenance and quick transition. These two characteristics are contradictory within the linear domain. We propose the near-saddle-node bifurcation behavior of a sigmoidal unit with a self-connection as a candidate of the dynamical mechanism that satisfies both of these demands. It is shown in evolutionary programming experiments that the near-saddle-node bifurcation behavior can be found in recurrent
APA, Harvard, Vancouver, ISO, and other styles
34

Helana, Temesgen Mengistu, and Alazar Merdekios Keba. "Enhancing the Performance of Dynamic Source Routing Protocol by Modifying the Algorithm in Mobile ad-hoc Network." International Journal of Innovative Science and Research Technology 5, no. 5 (2020): 1960–64. http://dx.doi.org/10.38124/ijisrt20may880.

Full text
Abstract:
In our day-to-day life, wireless technology plays a great role, because users move from place to place across the globe, it’s important to think about the type of network we can deploy quickly. Collection of two or more node forms A mobile ad-hoc network (MANET) without the aid of any centralized infrastructure. There are independent nodes that communicate without a wire in a mobile ad hoc network. Due to the behavior of nodes in MANET the time when node joining/leaving the network is unknown. This study focuses on improve performance of DSR protocol affected due to selfish nodes. So, identify
APA, Harvard, Vancouver, ISO, and other styles
35

Raț, Tudor. "Analyzing Behavior Within Networks After Fragmentation. The Coagulant Agent Approach." International Review of Social Research 3, no. 3 (2013): 53–61. http://dx.doi.org/10.1515/irsr-2013-0021.

Full text
Abstract:
Abstract This paper introduces a simple mathematical algorithm for identifying the nodes that will most likely act as re-coagulants once the ‘key-players’ are removed. By comparing the difference between in-degree and out-degree centrality scores (assuming that the relational data are directed) and comparing that value with the overall degree score, one can infer where a node sits on the ‘sink-source’ continuum. Furthermore, assuming that the nodes will not change their behavior patterns as a result of the prior ‘intervention’, this algorithm could indicate whether the nodes will act as relati
APA, Harvard, Vancouver, ISO, and other styles
36

Pham, Chung Ngoc, Anh Dong Nguyen, and Hieu Nhu Nguyen. "Nonlinear analysis of thermal behavior for a small satellite in Low Earth Orbit using many-node model." Science and Technology Development Journal 20, K2 (2017): 66–76. http://dx.doi.org/10.32508/stdj.v20ik2.450.

Full text
Abstract:
In this paper, nonlinear thermal responses of a small satellite in Low Earth Orbit (LEO) are analyzed using many-node model. The main elements of primary structure of the satellite include six rectangular cover plates and a solar array linking with satellite's body. These elements can be modeled as different lumped thermal nodes. We use an eight-node model for estimating temperatures at nodal elements i.e. six nodes for cover plates, and two nodes for front and rear surfaces of the solar array. The nodes absorb three major heat energy sources from the space environment consisting of solar irra
APA, Harvard, Vancouver, ISO, and other styles
37

Ali, Sarwan, Muhammad Haroon Shakeel, Imdadullah Khan, Safiullah Faizullah, and Muhammad Asad Khan. "Predicting Attributes of Nodes Using Network Structure." ACM Transactions on Intelligent Systems and Technology 12, no. 2 (2021): 1–23. http://dx.doi.org/10.1145/3442390.

Full text
Abstract:
In many graphs such as social networks, nodes have associated attributes representing their behavior. Predicting node attributes in such graphs is an important task with applications in many domains like recommendation systems, privacy preservation, and targeted advertisement. Attribute values can be predicted by treating each node as a data point described by attributes and employing classification/regression algorithms. However, in social networks, there is complex interdependence between node attributes and pairwise interaction. For instance, attributes of nodes are influenced by their neig
APA, Harvard, Vancouver, ISO, and other styles
38

Dziekoński, Andrzej Marek, and Radoslaw Olgierd Schoeneich. "DTN Routing Algorithm for Networks with Nodes Social Behavior." International Journal of Computers Communications & Control 11, no. 4 (2016): 457. http://dx.doi.org/10.15837/ijccc.2016.4.1454.

Full text
Abstract:
<p>This article presents routing algorithm in Delay and Disruptive Tolerant Networks (DTN). The main idea of this work is routing method that is based on information about nodes social behavior and their social relations in sparse structure of network. The algorithm takes advantage of friendship relationships between nodes and uses historic information to create groups of friends for each node, which is used in buffer management and forwarding phase of routing. Beside the routing method, mechanisms of collecting and exchanging of maintenance information between nodes is described. The al
APA, Harvard, Vancouver, ISO, and other styles
39

Yu, Ruiyun, Xingyou Xia, Shiyang Liao, and Xingwei Wang. "A Location Prediction Algorithm with Daily Routines in Location-Based Participatory Sensing Systems." International Journal of Distributed Sensor Networks 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/481705.

Full text
Abstract:
Mobile node location predication is critical to efficient data acquisition and message forwarding in participatory sensing systems. This paper proposes a social-relationship-based mobile node location prediction algorithm using daily routines (SMLPR). The SMLPR algorithm models application scenarios based on geographic locations and extracts social relationships of mobile nodes from nodes’ mobility. After considering the dynamism of users’ behavior resulting from their daily routines, the SMLPR algorithm preliminarily predicts node’s mobility based on the hidden Markov model in different daily
APA, Harvard, Vancouver, ISO, and other styles
40

Kong, Wenping, Xiaoyong Li, Liyang Hou, and Yanrong Li. "An Efficient and Credible Multi-Source Trust Fusion Mechanism Based on Time Decay for Edge Computing." Electronics 9, no. 3 (2020): 502. http://dx.doi.org/10.3390/electronics9030502.

Full text
Abstract:
With the development of 5G, user terminal computing moves up and cloud computing sinks, thus forming a computing fusion at the edge. Edge computing with high-efficiency, real-time, and fast features will become part of 5G construction. Utilizing distributed computing and storage resources at the edge of the network to perform distributed data processing tasks can alleviate the load on the cloud computing center, which is also the development trend of edge computing. When a malicious node exists, the error information feedback by the node will affect the result of local perception decision. To
APA, Harvard, Vancouver, ISO, and other styles
41

Wang, Xin Tang, Zhi Guo Xie, Ming Zhou, and Fen Bo Yu. "Analysis of Fire Response of a Spacial Pre-Stressed Steel Structure Subjected to Fire Load." Advanced Materials Research 255-260 (May 2011): 246–50. http://dx.doi.org/10.4028/www.scientific.net/amr.255-260.246.

Full text
Abstract:
The numerical model for analysis of fire behavior of the spatial pre-stressed steel structure is established based on the software Marc. Analysis of thermal response and structural response of a suspended pre-stressed steel reticulated lattice shell are computed for the key nodes of the structure. For comparison, the air temperatures near the key nodes are also calculated based on the practical formula of large space air temperature rise. The different location of fire source is considered for analysis of response temperature, displacements and stresses of the nodes of the pre-stressed lattice
APA, Harvard, Vancouver, ISO, and other styles
42

Fu, Lin, Lian Meng Chen, Bin Wu, Zi Hao Zhang, Xi Guo Ye, and Yi Yi Zhou. "Experimental Research on the Prestress and Static Behavior of a Cable-Strut Tensile Structure Model." Advanced Materials Research 1065-1069 (December 2014): 938–42. http://dx.doi.org/10.4028/www.scientific.net/amr.1065-1069.938.

Full text
Abstract:
A cable-strut tensile structure model with the diameter of 5.0m was designed and made to study the prestress and static behavior on the base of theory analysis. New schemes of the boundary compression ring, the cables and struts with the adjustable length, the connection nodes were designed and the least square method to fit the element force and strain curve was proposed. The initial prestress distribution and the responses of the model under full-span node load, half-span node load and 1/4-span node load were investigated. The experimental results indicate the cable-strut tensile structure w
APA, Harvard, Vancouver, ISO, and other styles
43

Zhang, Zhao Hui, Ming Ming Hu, Dong Li, and Xiao Gang Qi. "Distributed Malicious Nodes Detection in Wireless Sensor Networks." Applied Mechanics and Materials 519-520 (February 2014): 1243–46. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.1243.

Full text
Abstract:
Data theft and node attack in wireless sensor networks causes great damage to the networks and the attacker destroys network and obtains the data of the network by malicious nodes distributed in the network. Therefore, it is necessary to detect these malicious nodes and to eliminate their influence. We propose a distributed malicious nodes detection protocol which called BMND based on Bayesian voting, every node determine its suspected malicious nodes by its request message and abnormal behavior. Also, we determine the malicious nodes by Bayesian voting, so that the network can protect itself
APA, Harvard, Vancouver, ISO, and other styles
44

Kalpathy, Ravi, and Hosam Mahmoud. "DEGREE PROFILE OF m-ARY SEARCH TREES: A VEHICLE FOR DATA STRUCTURE COMPRESSION." Probability in the Engineering and Informational Sciences 30, no. 1 (2015): 113–23. http://dx.doi.org/10.1017/s0269964815000303.

Full text
Abstract:
We revisit the random m-ary search tree and study a finer profile of its node outdegrees with the purpose of exploring possibilities of data structure compression. The analysis is done via Pólya urns. The analysis shows that the number of nodes of each individual node outdegree has a phase transition: Up to m = 26, the number of nodes of outdegree k, for k = 0, 1, …, m, is asymptotically normal; that behavior changes at m = 27. Based on the analysis, we propose a compact m-ary tree that offers significant space saving.
APA, Harvard, Vancouver, ISO, and other styles
45

Jia, Yu Zhuo, and Di Luo. "Mechanics Behavior Analysis of K Type Flashboard Node of Transmission Tower in Civil Engineering." Advanced Materials Research 568 (September 2012): 196–99. http://dx.doi.org/10.4028/www.scientific.net/amr.568.196.

Full text
Abstract:
On the UHV transmission steel tube tower, the K type flashboard node is the more common node, the destruction of the node easily leads to the destruction of the entire transmission tower. Through ANSYS software to simulate the U type and the groove type flashboard node establishs a solid model. using the arc-length method for both flashboard node does numerical analysis. Obtained U type flashboard node bearing capacity is greater . U type flashboard node belongs to the branch pipe local buckling failure mode , while the groove flashboard node belongs to the support tube, flashboard and motherb
APA, Harvard, Vancouver, ISO, and other styles
46

Beltman, Joost B., Athanasius F. M. Marée, Jennifer N. Lynch, Mark J. Miller, and Rob J. de Boer. "Lymph node topology dictates T cell migration behavior." Journal of Experimental Medicine 204, no. 4 (2007): 771–80. http://dx.doi.org/10.1084/jem.20061278.

Full text
Abstract:
Adaptive immunity is initiated by T cell recognition of foreign peptides presented on dendritic cells (DCs) by major histocompatibility molecules. These interactions take place in secondary lymphoid tissues, such as lymph nodes (LNs) and spleen, and hence the anatomical structure of these tissues plays a crucial role in the development of immune responses. Two-photon microscopy (2PM) imaging in LNs suggests that T cells walk in a consistent direction for several minutes, pause briefly with a regular period, and then take off in a new, random direction. Here, we construct a spatially explicit m
APA, Harvard, Vancouver, ISO, and other styles
47

Beltman, Joost B., Athanasius F. M. Marée, Jennifer N. Lynch, Mark J. Miller, and Rob J. de Boer. "Lymph node topology dictates T cell migration behavior." Journal of Cell Biology 177, no. 1 (2007): i2. http://dx.doi.org/10.1083/jcb1771oia2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Wang, Jianwei, Lin Cai, Bo Xu, and Yuedan Wu. "Abnormal Behavior in Cascading Dynamics with Node Weight." PLOS ONE 10, no. 10 (2015): e0139941. http://dx.doi.org/10.1371/journal.pone.0139941.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Thanigaivelan, Nanda Kumar, Ethiopia Nigussie, Seppo Virtanen, and Jouni Isoaho. "Hybrid Internal Anomaly Detection System for IoT: Reactive Nodes with Cross-Layer Operation." Security and Communication Networks 2018 (August 15, 2018): 1–15. http://dx.doi.org/10.1155/2018/3672698.

Full text
Abstract:
We present a hybrid internal anomaly detection system that shares detection tasks between router and nodes. It allows nodes to react instinctively against the anomaly node by enforcing temporary communication ban on it. Each node monitors its own neighbors and if abnormal behavior is detected, the node blocks the packets of the anomaly node at link layer and reports the incident to its parent node. A novel RPL control message, Distress Propagation Object (DPO), is formulated and used for reporting the anomaly and network activities to the parent node and subsequently to the router. The system
APA, Harvard, Vancouver, ISO, and other styles
50

Khasawneh, Mahmoud, and Anjali Agarwal. "A Collaborative Approach for Monitoring Nodes Behavior during Spectrum Sensing to Mitigate Multiple Attacks in Cognitive Radio Networks." Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/3261058.

Full text
Abstract:
Spectrum sensing is the first step to overcome the spectrum scarcity problem in Cognitive Radio Networks (CRNs) wherein all unutilized subbands in the radio environment are explored for better spectrum utilization. Adversary nodes can threaten these spectrum sensing results by launching passive and active attacks that prevent legitimate nodes from using the spectrum efficiently. Securing the spectrum sensing process has become an important issue in CRNs in order to ensure reliable and secure spectrum sensing and fair management of resources. In this paper, a novel collaborative approach during
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!