Showing 1 - 10 of 1,593
The influences of bounded noise together with shortcuts on the spatiotemporal collective behaviors of temporal … shortcuts to the regular neuronal networks to formulate small-world neuronal networks. The results indicate that the spatial … synchronization and temporal coherence in the networks can be enhanced with the addition of shortcuts. Moreover, we verify that there …
Persistent link: https://www.econbiz.de/10011061972
An important concept in network security is trust, interpreted as a relation among entities that participate in various protocols. Trust relations are based on evidence related to the previous interactions of entities within a protocol. In this work, we are focusing on the evaluation process of...
Persistent link: https://www.econbiz.de/10009450567
Wireless Ad-hoc single-rate environments typically use a Distance Vector routing with a metric based on the minimization of the hop-count. In practice, the technique of minimizing the distance does not reward in the case of multi-rate, therefore it may be prefereable touse protocols privileging...
Persistent link: https://www.econbiz.de/10005465202
The aim of this paper is to give a big survey in enhancing the balance of the routing load and the consumption of resources using network layer metrics for the path discovery in the MAODV protocol. A ad hoc network (AD HOC NETWORKS) consists of a collection of wireless mobile nodes, which form a...
Persistent link: https://www.econbiz.de/10011265120
В статье рассматривается задача формирования топологии беспроводной ad hoc сети. На плоскости расположены узлы, оснащенные беспроводными передатчиками. Каждый...
Persistent link: https://www.econbiz.de/10011227278
A freeway with vehicles transmitting traffic-related messages via short-range broadcasting is a technological example of coupled material and information flows in complex networks: information on traffic flows is propagated via a dynamically changing ad hoc network based on local interactions....
Persistent link: https://www.econbiz.de/10011057490
There has been a rich interplay in recent years between (i) empirical investigations of real-world dynamic networks, (ii) analytical modeling of the microscopic mechanisms that drive the emergence of such networks, and (iii) harnessing of these mechanisms to either manipulate existing networks,...
Persistent link: https://www.econbiz.de/10011057651
Relay nodes in an ad hoc network can be modelled as fluid queues, in which the available service capacity is shared by the input and output. In this paper such a relay node is considered; jobs arrive according to a Poisson process and bring along a random amount of work. The total transmission...
Persistent link: https://www.econbiz.de/10010999665
Susceptibility of power-law (PL) networks to attacks has been traditionally studied in the context of what may be termed as instantaneous attacks, where a randomly selected set of nodes and edges are deleted while the network is kept static. In this paper, we shift the focus to the study of...
Persistent link: https://www.econbiz.de/10010588824
In this article, we are interested in managing engineering design of ad hoc wireless network. We have to design topology of such networks to guarantee all nodes cover. So, spanning tree concept is applied to design and optimise the tree with the constraint of the degree (d-MSTP) of the...
Persistent link: https://www.econbiz.de/10010670319