Showing 221 - 240 results of 471 for search '"complex network"', query time: 0.05s Refine Results
  1. 221

    Analysis of Complex Transportation Network and Its Tourism Utilization Potential: A Case Study of Guizhou Expressways by Sihong Chen, Jianchao Xi, Menghao Liu, Tao Li

    Published 2020-01-01
    “…Transportation is an example of a typical, open, fluid complex network system. Expressways are one form of complex transportation networks, and expressway service areas serve as infrastructure nodes in the expressway transportation network; hence, their construction has a significant impact on tourism development and utilization. …”
    Get full text
    Article
  2. 222

    Linear discriminant analysis in network traffic modeling by ZHANG Bing-yi, BIAN Yu-lan, ZHANG Hong-ke, SUN Ya-min

    Published 2005-01-01
    “…Compared with traditional method this arithmetic is useful and can conveniently give an accurate judgment for complex network traffic trace.…”
    Get full text
    Article
  3. 223

    L’Éducation nouvelle et l’idée de liberté : approche trialectique by Emilie Osmont

    Published 2015-03-01
    “…More specifically, referring to the paradigm of complexity, which is enriched by the contributions of trialectic logic, we study the relationship freedom / education on repositioning it in a complex network of influences in order to highlight the concepts third who successively governed it. …”
    Get full text
    Article
  4. 224

    Influence of Dynamical Change of Edges on Clustering Coefficients by Yuhong Ruan, Anwei Li

    Published 2015-01-01
    “…Clustering coefficient is a very important measurement in complex networks, and it describes the average ratio between the actual existent edges and probable existent edges in the neighbor of one vertex in a complex network. …”
    Get full text
    Article
  5. 225

    SDN resolve space-ground integrated network based on end side computing by Jinglin LI, Xiaolan WAN

    Published 2020-07-01
    “…There is a complex network structure of space-ground integrated network.And this kind of network has heterogeneous network,dynamic topology,intermittently connected node height exposure,and so on.There are many limitations in traditional SDN implementation.A method of SDN implement based on end side computing and a space-ground integrated network based on SDN were presented,which separated space network control and data,using the computing power of the communication terminal (mobile terminal and fixed ground backbone network),unloading the calculation of SDN controller in space-based plane,thus simplifying the data forwarding plane.A practical and effective verification method was also proposed.…”
    Get full text
    Article
  6. 226

    On Ve-Degree-Based Irregularity Properties of the Crystallographic Structure of Molecules by Akbar Jahanbani, Rana Khoeilar, Hajar Shooshtari

    Published 2021-01-01
    “…These theoretical conclusions provide practical guiding significance for pharmaceutical engineering and complex network and quantify the degree of folding of long organic molecules.…”
    Get full text
    Article
  7. 227

    Study on the 5GC security situational awareness system by Yatian LIU, Bowen HU, Maofei CHEN, Dongxin LIU

    Published 2022-11-01
    “…As the key infrastructure for the next generation mobile network, 5G confronts more complex network security threats, targeting the new architecture and techniques that 5G evolves.Also as a key component of the 5G architecture, 5GC security has become an essential research topic.5GC security situational awareness aims at understanding the current security situation and making tendency predictions in near future, which is an effective technique to counter network threats under 5G scenarios and enhance 5G operations more securely and effectively.The security situational awareness was firstly introduced, 5G particularly 5GC security demands were analyzed, then the detail design of 5GC security situational awareness system was addressed, including the system architecture and key techniques.…”
    Get full text
    Article
  8. 228

    Security evaluation method for confidential and stable complex systems by Jinxin ZUO, Ziyu GUO, Jin LI, Jie ZHANG, Yueming LU

    Published 2019-04-01
    “…Confidential and stable complex systems are characterized by high confidentiality requirements,continuous and stable operation requirements,and complex network structure,but existing evaluation models has a single dimension of security objectives and lack the correlation analysis among indicators.In view of this,a comprehensive security evaluation model based on the correlation analysis of indicators is proposed and eight security objectives covering confidentiality,availability,controllability,identifiability,personnel organization,risk management,enterprise grading and sustainability at three levels of product,system and service have been established.Taking the confidentiality of the smart medical IoT as an example,a sorting and weight confirmation algorithm based on index correlation is constructed,and the fuzzy comprehensive evaluation method is used to evaluate the selected system.…”
    Get full text
    Article
  9. 229

    Optimization of Communication Path Planning Method for Low Earth Orbit Constellation Based on Dijkstra Algorithm by YIN Shuming, XUE Chengcheng, HAO Liyun, ZHANG Xinjun

    Published 2024-09-01
    “…Complex network topologies and unbalanced uses of network resources are key problems in communication path planning for low earth orbit constellations. …”
    Get full text
    Article
  10. 230

    Réseaux familiaux et institutionnels des religieuses : des alliés en justice ? Le cas des Visitandines de Rennes (xviie-xviiie siècles) by Aude Loriaud

    Published 2023-12-01
    “…Thus, the Visitandines of Bordeaux were able to win a trial in the parliament of Brittany thanks to the Visitandines of Rennes. We can sketch a complex network consisting of institutional, family and friendly links, and reveal informal gratuities to judicial officers. …”
    Get full text
    Article
  11. 231

    A Hybrid Model of Extreme Learning Machine Based on Bat and Cuckoo Search Algorithm for Regression and Multiclass Classification by Qinwei Fan, Tongke Fan

    Published 2021-01-01
    “…However, the standard ELM requires more hidden nodes in the application due to the random assignment of hidden layer parameters, which in turn has disadvantages such as poorly hidden layer sparsity, low adjustment ability, and complex network structure. In this paper, we propose a hybrid ELM algorithm based on the bat and cuckoo search algorithm to optimize the input weight and threshold of the ELM algorithm. …”
    Get full text
    Article
  12. 232

    Early-warning schemes for alarm mutation in networks based on control chart by Xing SU, Lu ZHANG

    Published 2016-03-01
    “…The amount of various network elements and alarms trigged is pretty startling with the expansion of the network.The traditional network operation and maintenance,that is,passively processed worksheet after the occurrence of network failure one by one,has been unable to adapt to the complex network management today.The various types of important service-related network alarm titles were sorted out,and the fluctuation under control for kinds of important alarms by control chart,establishes the graded early-warning model and algorithm for alarm mutation in networks combining with the service-related analysis,were analyzed.At last,a dynamic closed-loop control mechanism,which was preceded by fault occurred and actively digs into hidden troubles,was proposed.…”
    Get full text
    Article
  13. 233

    Research and application of UMR technology for new metropolitan area network by Yuanyang YIN, Zhizhong WANG, Youqiang JIANG, Jiaqi SUN, Xiaobin LIANG

    Published 2022-02-01
    “…The new metropolitan area network adopts the new architecture of spine-leaf.BRAS is a high hanging and centralized deployment mode.With the deployment of the new metropolitan area network, the home wide service is gradually cut over to the new network.The current typical bearer scheme has many problems, such as the sharp increase of pressure on the network equipment MAC routing table, the large and complex network configuration.After analyzing and comparing the defects of typical bearer schemes, the implementation scheme of UMR technology was innovatively put forward, which provided reference significance for promoting the rapid deployment of new metropolitan area network.…”
    Get full text
    Article
  14. 234

    Load balancing based on clustering analysis and deep learning for multi-frequency and multi-mode network by Yaxing QIU, Xidong WANG, Sen BIAN, Lei YUE

    Published 2020-07-01
    “…Load balancing is a huge challenge for LTE multi-frequency and multi-mode network.Hundreds of parameters are involved in load balancing for the complex network structure.Therefore,it is difficult to perform precise and meticulous configuration only relying on human experience.In order to cope with the challenge,a load balancing scheme based on clustering analysis and deep learning was proposed.Firstly,the key indicators were selected to identify the network scenes,and then big data and deep learning technologies were used to mine the relationship between data.Finally,the optimum system parameters for different network scenes were found.It has been proved that machine learning technology can greatly improve the accuracy and the efficiency of parameter configuration.…”
    Get full text
    Article
  15. 235

    PM2.5 concentration prediction model based on random forest regression analysis by Xu DU, Jingyu FENG, Shaoqing LV, Wei SHI

    Published 2017-07-01
    “…The random foreat regression algorithm was introduced to solve the shortcomings of neural network in predicting the PM2.5 concentration,such as over-fitting,complex network structure,low learning efficiency.A novel PM2.5 concentration prediction model named RFRP was designed by analyzing the 22 characteristic factors including the meteorological conditions,the concentration of air pollutants and the season.The historical meteorological data of Xi’an in 2013—2016 were collected to verify the effectiveness of the model.The experimental results show that the proposed model can not only predict the PM2.5 concentration effectively,but also improve the operating efficiency of the model without affecting the prediction accuracy.The average run time of the proposed model is 0.281 s,which is about 5.58% of the neural network prediction model.…”
    Get full text
    Article
  16. 236

    Multiple Addressing Coordination and Switching Technology in Space-Integrated-Ground Information Network by Wenlan DIAO, Jianping AN, Yu ZHANG, Han HU

    Published 2020-12-01
    “…The construction requirements and deployment status of the space-integrated-ground integrated information network was analyzed, and the diffi culties in the integration of satellite network and internet was discussed.To tackle the problems of complex network structure, high dynamic topology, diffi cult data compatibility and limited satellite resources, a multi addressing coordination and switching technology based on IP address, ID identifi cation and content name was proposed.In particular, a multi addressing datagram format was designed, and the multi addressing route forwarding mechanism was extended.It could realized the interconnection of heterogeneous networks, the stability of mobile communication, the compatible switching of polymorphic data, and the effi cient routing with low power consumption of satellites.…”
    Get full text
    Article
  17. 237

    Community detection in multiplex networks via consensus matrix by Nianwen Ning, Bin Wu

    Published 2017-09-01
    “…In complex network of real world,there are many types of relationships between individuals,and the more effective research ways for this kind of network is to abstract these relationship as a multiplex network.More and more researchers are attracted to be engaged in multiplex network research.A novel framework of community detection of multiplex network based on consensus matrix was presented.Firstly,this framework merges the structure of multiplex network and the information of link between each node into monoplex network.Then,the community structure information of each layer network was obtained through consensus matrix,and the traditional community division algorithm was utilized to carry out community detection of combine networks.The experimental results show that the proposed algorithm can get better performance of community partition in the real network datasets.…”
    Get full text
    Article
  18. 238

    Algorithm of grid reliability assessment and reconstruction optimization system by Zhibin ZANG, Peihao ZHENG, Benhai WEI, Zaipei ZHAI, Shengguo MA

    Published 2017-12-01
    “…Based on the research of the reliability of distribution network and the reconstruction of network,a new method was put forward to reconstruct the power grid reliability.Firstly,the evaluation index system was proposed,which included the active network LOSS (LOSS),lack of system power supply (ENS) and the average power supply availability (ASAI).A multi-objective model of distribution network was constructed by normalization,and the multi-objective function was transformed into a new single objective function by using the judgment matrix method,which realized fast calculation of power distribution network reconstruction and optimization.Through IEEE69 example verification,the optimization algorithm can obtain the global optimal solution and reduce the computational time at the same time,effectively solve the problem of the reconstruction of the complex network optimization.…”
    Get full text
    Article
  19. 239

    GBSS:researches on group-based semantic search by CHEN Hai-tao, GONG Zheng-hu, HUANG Zun-guo

    Published 2006-01-01
    “…A group-based semantic search method-GBSS was presented.With regard to architecture,GBSS introduced a hybrid architecture in which the storage and search of raw data was based on DHT network,but the storage and search of meta-data was based on unstructured P2P network.With regard to search algorithm,GBSS presented a file grouping method without users’ description and constructs friend relations between nodes based on search interests and sharing files.The design idea came from some conclusions of P2P researches and complex network researches.The forwarding of user requests came use of friend relations in search process,which integrated effective caching strategy.The simulation tests prove that the GBSS algorithm is efficient,stable,and the performance improved times compared with traditional algorithms.…”
    Get full text
    Article
  20. 240

    Adaptive federated learning secure aggregation scheme based on threshold homomorphic encryption by Zhuo MA, Jiayu JIN, Yilong YANG, Yang LIU, Zuobin YING, Teng LI, Junwei ZHANG

    Published 2023-07-01
    “…Aiming at the communication bottleneck problem when the current federated learning security aggregation algorithm was applied in a complex network environment, an adaptive federated learning secure aggregation scheme based on threshold homomorphic encryption was proposed.While protecting gradient privacy, users adaptively compress gradients based on the current available bandwidth, greatly reduced communication overhead for federated users.Furthermore, the new dynamic decryption task distribution algorithm and gradient combination algorithm were designed in the phase of aggregation gradient decryption, which relieved the user’s uplink communication pressure.The experimental results show that the proposed scheme can sharply reduce the amount of communication to 4% compared with the existing federated learning scheme with a trivial model accuracy loss of 1%.…”
    Get full text
    Article