• No results found

18-node model network

Maximization Of Network Reliability Using Ann Under Node-Link Failure Model

Maximization Of Network Reliability Using Ann Under Node-Link Failure Model

... telecommunication network systems as it’s the only means of providing communication among processors and/or memory ...the network reliability may be taken as one of the important reliability measures for ...

5

Random Walk-Based Semantic Annotation for On-demand Printing Products

Random Walk-Based Semantic Annotation for On-demand Printing Products

... useful node-to-node relevance scores by considering global network structure [18] and intricate edge relationships [19], which can discover potential semantic relationship between documents ...

8

PERFORMANCE OF MANET ROUTING PROTOCOL IN AD-HOC NETWORK

PERFORMANCE OF MANET ROUTING PROTOCOL IN AD-HOC NETWORK

... modified node model, the re-routing of the data packets from the overflowed server to the under flowed server makes the data packets not be dropped and make their delivery more ...large network size ...

12

WSN Optimization Algorithm for Traffic Environmental Monitoring

WSN Optimization Algorithm for Traffic Environmental Monitoring

... a node in different directions. As a result, the wireless sensor network is irregular during the propagation ...sensor node is a regular circle [16], the relation- ship between connectivity and ...

12

Performance Evaluation of Epidemic Routing Protocol for Delay Tolerant Network Based on Node Movement Model

Performance Evaluation of Epidemic Routing Protocol for Delay Tolerant Network Based on Node Movement Model

... Movement Model and Random Waypoint ...two node movement models is done for delivery probability ratio and transmission ...purpose. Node progress is put into practice by means of movement ...

5

Identification of Influential Node in a Complex Network using WSM (Weighted Sum Model)

Identification of Influential Node in a Complex Network using WSM (Weighted Sum Model)

... The eight criteria were hierarchy, constraint, efficiency, effective size, closeness centrality, betweenness centrality, eigenvector centrality, and degree centrality. The weight of the criteria was computed using AHP ...

8

Fault Diagnosis of Power Network Based on GIS Platform and Bayesian Networks

Fault Diagnosis of Power Network Based on GIS Platform and Bayesian Networks

... power network establishes the simplified topology whose key equipment is the relay protection and circuit-breaker on the basis of the GIS platform from the point of view of engineering ...power network can ...

7

A Study and Simulation of VoIP in MPLS Network

A Study and Simulation of VoIP in MPLS Network

... MPLS network, data packets are assigned ...OSI model data link layer technology, such as Asynchronous Transfer Mode (ATM), Frame Relay, Synchronous Optical Networking (SONET) or Ethernet, and eliminate the ...

5

Gordon and Newell queueing networks and copulas

Gordon and Newell queueing networks and copulas

... exp( μ i ) , and after the service in this node the customer goes to the node j with the probability P i j . We have noticed that the matrix P as above is the transition matrix of an ergodic Markov chain ...

13

Privacy-preserving scheme for mobile ad hoc networks.

Privacy-preserving scheme for mobile ad hoc networks.

... the network as well as the requesting node’s feedback by these ...the network (the ”friends”), we use homomorphic based encryption ...requesting node sends an encrypted list of its friends to the ...

6

Handover Modeling of Multiple States of Mobile Node in a Five Node Network Model

Handover Modeling of Multiple States of Mobile Node in a Five Node Network Model

... mobile node etc. Authors in [6] used a two network model which was academic in ...five network model to measure the performance based on wrong decision probability ...the network ...

6

Network Dynamic Analysis Method for Project Governance Risk Control

Network Dynamic Analysis Method for Project Governance Risk Control

... A network dynamic analysis (NDA) method is developed in this paper to reveal the inherent mechanism of project governance risk control, which integrates the method of social network analysis and system ...

10

The research of P2P network security model based on group trust relationship

The research of P2P network security model based on group trust relationship

... trust model. Such as: Eigen Trus; Cup-pens; Trust Frame. In the network nodes are divided into three categories: good nodes, evil and bad meaning ...Goodwill node refers to the services or the ...

6

CREATING A MATHEMATICAL THEORY OF COMPUTER NETWORKS

CREATING A MATHEMATICAL THEORY OF COMPUTER NETWORKS

... average network delay (in ...through node i ...queueing network model would provide the ...Jackson’s model it was assumed that the service time at each node in the network ...

7

HP OpenView Network Node Manager

HP OpenView Network Node Manager

... OpenView Network Node Manager (NNM) enables the management of network equipment from syslog ...of network equipment do not have SNMP traps nor supporting MIBs for all error and warning ...

56

Stock Price Prediction using Neural Network with Hybridized Market Indicators

Stock Price Prediction using Neural Network with Hybridized Market Indicators

... Stock prediction with data mining techniques is one of the most important issues in finance being investigated by researchers across the globe. Data mining techniques can be used extensively in the financial markets to ...

9

Analysis of topology and propagation characteristics based on high close network

Analysis of topology and propagation characteristics based on high close network

... directed network, there is a path of length n between i and j if the n edges in the sequence ( ( , ), ( , i s 1 s s 1 2 ), L , ( s m − 1 , ) j ∈ E(G) ) of each edge have the same direction for directed ...

5

Inter-Flow Network Coding. Wireless Mesh Networks

Inter-Flow Network Coding. Wireless Mesh Networks

... Optimized Link State Routing (OSLR) is a widely spread mesh routing protocol that is deployed in many mesh routers running an embedded Linux. It is implemented as a daemon working on the IP layer, is proactive, and uses ...

79

Modeling knowledge states in language learning

Modeling knowledge states in language learning

... a node X in the graph is defined as the set of its parents, children and spouses, where the spouses are the nodes that share the one or more same children with ...the network if we can observe all variables ...

64

International Journal of Computer Science and Mobile Computing

International Journal of Computer Science and Mobile Computing

... the network performance, as well as on the connectivity among the nodes in the targeted ...intermediate node to send the route confirmation request (CREQ) [4] to the next hop node toward the ...

7

Show all 10000 documents...

Related subjects