Journal articles on the topic 'Node behavior'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Node behavior.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Fan, Na, Zongtao Duan, and Guangyuan Zhu. "A data dissemination mechanism based on evaluating behavior for vehicular delay-tolerant networks." International Journal of Distributed Sensor Networks 15, no. 7 (2019): 155014771986550. http://dx.doi.org/10.1177/1550147719865509.
Full textForouzandeh, Saman, Amir Sheikhahmadi, Atae Rezaei Aghdam, and Shuxiang Xu. "New centrality measure for nodes based on user social status and behavior on Facebook." International Journal of Web Information Systems 14, no. 2 (2018): 158–76. http://dx.doi.org/10.1108/ijwis-07-2017-0053.
Full textChen, Bo, Jian Lin Mao, Ning Guo, Guan Hua Qiao, and Ning Dai. "A Threshold-Based K-Means Algorithm for Selfish Behavior Detection in IEEE 802.15.4 Wireless Sensor Networks." Applied Mechanics and Materials 303-306 (February 2013): 255–60. http://dx.doi.org/10.4028/www.scientific.net/amm.303-306.255.
Full textZhu, Qi. "Node Behavior Trust Evaluation Model Based on Sliding Window." Applied Mechanics and Materials 155-156 (February 2012): 138–42. http://dx.doi.org/10.4028/www.scientific.net/amm.155-156.138.
Full textNian, Fuzhong, Yang Yang, Yayong Shi, Jinhu Ren, and Renmeng Cao. "A behavioral propagation and competition model based on pressure." Modern Physics Letters B 35, no. 19 (2021): 2150328. http://dx.doi.org/10.1142/s0217984921503280.
Full textSong, Cui Ye, Cheng Lie Du, and Gang Li. "An Event Bridge Framework for Modeling and Simulating Networked Hybrid Dynamic Behaviors." Applied Mechanics and Materials 651-653 (September 2014): 1798–805. http://dx.doi.org/10.4028/www.scientific.net/amm.651-653.1798.
Full textWang, Xian Jun. "Study on Gravity Dam Foundation Stability Combining with Dam Foundation Deformation Behavior." Advanced Materials Research 250-253 (May 2011): 2965–69. http://dx.doi.org/10.4028/www.scientific.net/amr.250-253.2965.
Full textLi, Feng, Yali Si, Ning Lu, Zhen Chen, and Limin Shen. "A Security and Efficient Routing Scheme with Misbehavior Detection in Delay-Tolerant Networks." Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/2761486.
Full textWang, Longbao, Yingchi Mao, Yangkun Cheng, and Yi Liu. "Deep Learning-Based Diagnosing Structural Behavior in Dam Safety Monitoring System." Sensors 21, no. 4 (2021): 1171. http://dx.doi.org/10.3390/s21041171.
Full textS, Dhanabal, Dr Amudhavalli P, Dr Prasanna Venkatesan G. K. D, and Dr Prasanna Venkatesan G. K. D. "An energy efficient flexible delay tolerant network with adaptive secured framework (ASF-DTN)." International Journal of Engineering & Technology 7, no. 3 (2018): 1299. http://dx.doi.org/10.14419/ijet.v7i3.12485.
Full textYuan, Peiyan, Xiaoxiao Pang, Ping Liu, and En Zhang. "FollowMe: One Social Importance-Based Collaborative Scheme in MONs." Future Internet 11, no. 4 (2019): 98. http://dx.doi.org/10.3390/fi11040098.
Full textTong, Ruipeng, Yanwei Zhang, Yunyun Yang, Qingli Jia, Xiaofei Ma, and Guohua Shao. "Evaluating Targeted Intervention on Coal Miners’ Unsafe Behavior." International Journal of Environmental Research and Public Health 16, no. 3 (2019): 422. http://dx.doi.org/10.3390/ijerph16030422.
Full textIonescu, Adriana, Cristian Burada, and Mihai Negru. "F.E.M. Simulation of the Building Frame Node Behavior during Seism." Applied Mechanics and Materials 823 (January 2016): 95–98. http://dx.doi.org/10.4028/www.scientific.net/amm.823.95.
Full textSrivastav, Abhishek, Asok Ray, and Shashi Phoha. "Adaptive Sensor Activity Scheduling in Distributed Sensor Networks: A Statistical Mechanics Approach." International Journal of Distributed Sensor Networks 5, no. 3 (2009): 242–61. http://dx.doi.org/10.1080/15501320802473250.
Full textCAO, XIAN-BIN, WEN-BO DU, MAO-BIN HU, ZHI-HAI RONG, PENG SUN, and CAI-LONG CHEN. "TOPOLOGY PROPERTY AND DYNAMIC BEHAVIOR OF A GROWING SPATIAL NETWORK." International Journal of Modern Physics C 22, no. 04 (2011): 333–45. http://dx.doi.org/10.1142/s0129183111016282.
Full textEt. al., Dr B. Shadaksharappa,. "Attack Prediction By Using Greedy Algorithm For Diminishing The Drop And Delay In Wireless Sensor Networks." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (2021): 1072–82. http://dx.doi.org/10.17762/turcomat.v12i6.2425.
Full textHu, Yu Jie, Jian Lin Mao, Ning Guo, Bo Chen, and Guan Hua Qiao. "An Improved K-Means Algorithm Based on Density in the Selfish Behavior Detection." Advanced Materials Research 1030-1032 (September 2014): 1642–45. http://dx.doi.org/10.4028/www.scientific.net/amr.1030-1032.1642.
Full textRamalakshmi, R., S. Subash Prabhu, and C. Balasubramanian. "Detection of Compromised Nodes in Wireless Sensor Networks using GPSR Protocol and Iterative Filtering Algorithm." APTIKOM Journal on Computer Science and Information Technologies 1, no. 3 (2016): 141–48. http://dx.doi.org/10.11591/aptikom.j.csit.122.
Full textBILLETTE, JACQUES, and STANLEY NATTEL. "Dynamic Behavior of the Atrioventricular Node:." Journal of Cardiovascular Electrophysiology 5, no. 1 (1994): 90–102. http://dx.doi.org/10.1111/j.1540-8167.1994.tb01117.x.
Full textWen, Yang, Shu Tan Liu, and Gong Ke Xia. "Mechanical Behavior Research on the Double Angle Bolts Tube-Plate Joints of Concrete-Filled Steel Tubular Lattice Wind Turbine Tower." Applied Mechanics and Materials 578-579 (July 2014): 727–31. http://dx.doi.org/10.4028/www.scientific.net/amm.578-579.727.
Full textNian, Fuzhong, Rendong Liu, and Anhui Cong. "An incentive mechanism model based on the correlation between neighbor behavior and distance." International Journal of Modern Physics C 31, no. 11 (2020): 2050161. http://dx.doi.org/10.1142/s0129183120501612.
Full textDong, Li Ting, and Yan Wang. "Comparative Analysis on Seismic Performance of Steel Frame with Different Forms of Symmetric Enhanced Nodes." Advanced Materials Research 790 (September 2013): 247–51. http://dx.doi.org/10.4028/www.scientific.net/amr.790.247.
Full textBenahmed, Khelifa, Madjid Merabti, and Hafid Haffaf. "Inspired Social Spider Behavior for Secure Wireless Sensor Networks." International Journal of Mobile Computing and Multimedia Communications 4, no. 4 (2012): 1–10. http://dx.doi.org/10.4018/jmcmc.2012100101.
Full textJia, Tianye, Christine Macare, Sylvane Desrivières, et al. "Neural basis of reward anticipation and its genetic determinants." Proceedings of the National Academy of Sciences 113, no. 14 (2016): 3879–84. http://dx.doi.org/10.1073/pnas.1503252113.
Full textCaminha, Jean, Angelo Perkusich, and Mirko Perkusich. "A Smart Trust Management Method to Detect On-Off Attacks in the Internet of Things." Security and Communication Networks 2018 (2018): 1–10. http://dx.doi.org/10.1155/2018/6063456.
Full textMartínez Sarmiento, Fredy Hernán, and Jesús Alberto Delgado. "Wireless Visual Sensor Network Robots Based for the Emulation of Collective Behavior." Revista Tecnura 16, no. 31 (2012): 10. http://dx.doi.org/10.14483/udistrital.jour.tecnura.2012.1.a01.
Full textSilva, Eduardo Just da Costa e., and Giselia Alves Pontes da Silva. "Local behavior and lymph node metastases of Wilms' tumor: accuracy of computed tomography." Radiologia Brasileira 47, no. 1 (2014): 9–13. http://dx.doi.org/10.1590/s0100-39842014000100007.
Full textJianming, Zhou, Liu Fan, and Lu Qiuyuan. "Data Fusion Based on Node Trust Evaluation in Wireless Sensor Networks." Journal of Sensors 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/391401.
Full textBeranek, Ladislav, and Radim Remes. "Distribution of Node Characteristics in Evolving Tripartite Network." Entropy 22, no. 3 (2020): 263. http://dx.doi.org/10.3390/e22030263.
Full textRamalakshmi, R., S. Subash Prabhu, and C. Balasubramanianb. "Detection of Compromised Nodes in Wireless Sensor Networks using GPSR Protocol and Iterative Filtering Algorithm." APTIKOM Journal on Computer Science and Information Technologies 1, no. 3 (2020): 141–48. http://dx.doi.org/10.34306/csit.v1i3.59.
Full textLin, Yu, Xuejun Yu, and Walther Glaubitt. "Trusted behavior identification model for distributed node." Journal of Intelligent & Fuzzy Systems 37, no. 4 (2019): 4621–31. http://dx.doi.org/10.3233/jifs-179296.
Full textChen, Zuo, Min He, Wei Liang, and Kai Chen. "Trust-Aware and Low Energy Consumption Security Topology Protocol of Wireless Sensor Network." Journal of Sensors 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/716468.
Full textNakahara*, Hiroyuki, and Kenji Doya. "Near-Saddle-Node Bifurcation Behavior as Dynamics in Working Memory for Goal-Directed Behavior." Neural Computation 10, no. 1 (1998): 113–32. http://dx.doi.org/10.1162/089976698300017917.
Full textHelana, Temesgen Mengistu, and Alazar Merdekios Keba. "Enhancing the Performance of Dynamic Source Routing Protocol by Modifying the Algorithm in Mobile ad-hoc Network." International Journal of Innovative Science and Research Technology 5, no. 5 (2020): 1960–64. http://dx.doi.org/10.38124/ijisrt20may880.
Full textRaț, Tudor. "Analyzing Behavior Within Networks After Fragmentation. The Coagulant Agent Approach." International Review of Social Research 3, no. 3 (2013): 53–61. http://dx.doi.org/10.1515/irsr-2013-0021.
Full textPham, Chung Ngoc, Anh Dong Nguyen, and Hieu Nhu Nguyen. "Nonlinear analysis of thermal behavior for a small satellite in Low Earth Orbit using many-node model." Science and Technology Development Journal 20, K2 (2017): 66–76. http://dx.doi.org/10.32508/stdj.v20ik2.450.
Full textAli, Sarwan, Muhammad Haroon Shakeel, Imdadullah Khan, Safiullah Faizullah, and Muhammad Asad Khan. "Predicting Attributes of Nodes Using Network Structure." ACM Transactions on Intelligent Systems and Technology 12, no. 2 (2021): 1–23. http://dx.doi.org/10.1145/3442390.
Full textDziekoński, Andrzej Marek, and Radoslaw Olgierd Schoeneich. "DTN Routing Algorithm for Networks with Nodes Social Behavior." International Journal of Computers Communications & Control 11, no. 4 (2016): 457. http://dx.doi.org/10.15837/ijccc.2016.4.1454.
Full textYu, Ruiyun, Xingyou Xia, Shiyang Liao, and Xingwei Wang. "A Location Prediction Algorithm with Daily Routines in Location-Based Participatory Sensing Systems." International Journal of Distributed Sensor Networks 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/481705.
Full textKong, Wenping, Xiaoyong Li, Liyang Hou, and Yanrong Li. "An Efficient and Credible Multi-Source Trust Fusion Mechanism Based on Time Decay for Edge Computing." Electronics 9, no. 3 (2020): 502. http://dx.doi.org/10.3390/electronics9030502.
Full textWang, Xin Tang, Zhi Guo Xie, Ming Zhou, and Fen Bo Yu. "Analysis of Fire Response of a Spacial Pre-Stressed Steel Structure Subjected to Fire Load." Advanced Materials Research 255-260 (May 2011): 246–50. http://dx.doi.org/10.4028/www.scientific.net/amr.255-260.246.
Full textFu, Lin, Lian Meng Chen, Bin Wu, Zi Hao Zhang, Xi Guo Ye, and Yi Yi Zhou. "Experimental Research on the Prestress and Static Behavior of a Cable-Strut Tensile Structure Model." Advanced Materials Research 1065-1069 (December 2014): 938–42. http://dx.doi.org/10.4028/www.scientific.net/amr.1065-1069.938.
Full textZhang, Zhao Hui, Ming Ming Hu, Dong Li, and Xiao Gang Qi. "Distributed Malicious Nodes Detection in Wireless Sensor Networks." Applied Mechanics and Materials 519-520 (February 2014): 1243–46. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.1243.
Full textKalpathy, Ravi, and Hosam Mahmoud. "DEGREE PROFILE OF m-ARY SEARCH TREES: A VEHICLE FOR DATA STRUCTURE COMPRESSION." Probability in the Engineering and Informational Sciences 30, no. 1 (2015): 113–23. http://dx.doi.org/10.1017/s0269964815000303.
Full textJia, Yu Zhuo, and Di Luo. "Mechanics Behavior Analysis of K Type Flashboard Node of Transmission Tower in Civil Engineering." Advanced Materials Research 568 (September 2012): 196–99. http://dx.doi.org/10.4028/www.scientific.net/amr.568.196.
Full textBeltman, Joost B., Athanasius F. M. Marée, Jennifer N. Lynch, Mark J. Miller, and Rob J. de Boer. "Lymph node topology dictates T cell migration behavior." Journal of Experimental Medicine 204, no. 4 (2007): 771–80. http://dx.doi.org/10.1084/jem.20061278.
Full textBeltman, Joost B., Athanasius F. M. Marée, Jennifer N. Lynch, Mark J. Miller, and Rob J. de Boer. "Lymph node topology dictates T cell migration behavior." Journal of Cell Biology 177, no. 1 (2007): i2. http://dx.doi.org/10.1083/jcb1771oia2.
Full textWang, Jianwei, Lin Cai, Bo Xu, and Yuedan Wu. "Abnormal Behavior in Cascading Dynamics with Node Weight." PLOS ONE 10, no. 10 (2015): e0139941. http://dx.doi.org/10.1371/journal.pone.0139941.
Full textThanigaivelan, Nanda Kumar, Ethiopia Nigussie, Seppo Virtanen, and Jouni Isoaho. "Hybrid Internal Anomaly Detection System for IoT: Reactive Nodes with Cross-Layer Operation." Security and Communication Networks 2018 (August 15, 2018): 1–15. http://dx.doi.org/10.1155/2018/3672698.
Full textKhasawneh, Mahmoud, and Anjali Agarwal. "A Collaborative Approach for Monitoring Nodes Behavior during Spectrum Sensing to Mitigate Multiple Attacks in Cognitive Radio Networks." Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/3261058.
Full text