-
321
Behavioral and Topological Heterogeneities in Network Versions of Schelling’s Segregation Model
Published 2025-01-01“…In the present study, we examined the effects of the concurrent presence of both behavioral and topological heterogeneities in network segregation models. Simulations were conducted using both homogeneous and heterogeneous preference models on 2D lattices with varied levels of densification to create topological heterogeneities (i.e., clusters and hubs). …”
Get full text
Article -
322
Wormhole Attack Mitigation in Wireless Network Using Propagation Delay
Published 2024-10-01“…To evaluate the effectiveness of our approach, testing was conducted using a custom-built testbed running on an external network simulator. …”
Get full text
Article -
323
Hypergraph Convolution Network Classification for Hyperspectral and LiDAR Data
Published 2025-05-01“…Although deep learning methods based on convolutional neural networks (CNNs), transformers, and graph convolutional networks (GCNs) have demonstrated promising results in fusing complementary multi-source data, existing methodologies demonstrate limited efficacy in capturing the intricate higher-order spatial–spectral dependencies among pixels. …”
Get full text
Article -
324
Resilience Analysis of Airport Systems Based on Improved Bayesian Networks
Published 2025-07-01“…To mitigate this, we apply the best worst method (BWM) to conduct systematic pairwise comparison. Building on this, we leverage the BWM’s systematic pairwise comparisons, conducted with 10 aviation experts, to generate conditional probability tables for the Bayesian network. …”
Get full text
Article -
325
Robot relocation based on residual networks and iterative closest point
Published 2024-08-01Get full text
Article -
326
An optimization-inspired intrusion detection model for software-defined networking
Published 2025-01-01“…As an emerging network architecture, software-defined networking (SDN) has the core concept of separating the control plane from the network hardware and unifying its management by a central controller. …”
Get full text
Article -
327
Optimizing Artificial Neural Networks Using Mountain Gazelle Optimizer
Published 2025-01-01“…The performance of artificial neural networks heavily depends on the optimization of network parameters, specifically weights and biases, during the training process. …”
Get full text
Article -
328
Convolutional Neural Networks for Automatic Identification of Individuals at Terrestrial Terminals
Published 2025-01-01“…The objective of this study was to develop an automated system for the identification of wanted individuals in terrestrial terminals using Convolutional Neural Networks (CNN). The research was conducted under a quantitative approach and a quasi-experimental design. …”
Get full text
Article -
329
Resilience Evolution of Dongguan Industrial Network Based on Enterprise Connections
Published 2024-11-01“…Second, by conducting a long-term, continuous analysis of network resilience, this study explores the evolution of network resilience from a dynamic perspective, offering a fresh viewpoint for existing static network resilience studies. …”
Get full text
Article -
330
Neural network backstepping control of OWC wave energy system
Published 2025-03-01“…The proposed NN-BSC law effectively handles nonlinearities and improves system robustness under dynamic conditions. Numerical simulations have been conducted using MATLAB/SIMULINK to compare the performance of the uncontrolled OWC system, conventional PI and BSC, and NN-BSC, under scenarios with and without actuator disturbances. …”
Get full text
Article -
331
Channel Management for Digital Products in the Two-sided Market with Network Externality Effects
Published 2023-01-01Get full text
Article -
332
Distributed Dynamic Traffic Modeling and Implementation Oriented Different Levels of Induced Travelers
Published 2015-01-01“…In order to respond to the variable state of traffic network in time, a distributed dynamic traffic assignment strategy is proposed which can improve the intelligent traffic management. …”
Get full text
Article -
333
Design and analysis of intelligent service chain system for network security resource pool
Published 2022-08-01“…The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security area deployment and poor scalability.Besides, the architecture cannot be flexibly adjusted when facing network security events, making it difficult to meet the security needs of future networks.The intelligent service chain system for network security resource pool was based on software-defined network and network function virtualization technologies, which can effectively solve the above problems.Network security functions of virtual form were added based on network function virtualization technology, combined with the existing hardware network elements to build a network security resource pool.In addition, the switching equipment connected to the network security elements can be flexibly controlled based on software-defined network technology.Then a dynamically adjustable network security service chain was built.Network security events were detected based on security log detection and a expert library consisting of security rules.This enabled dynamic and intelligent regulation of the service chain by means of centralized control in the face of network security events.The deployment process of the service chain was mathematically modeled and a heuristic algorithm was designed to realize the optimal deployment of the service chain.By building a prototype system and conducting experiments, the results show that the designed system can detect security events in seconds and automatically adjust the security service chain in minutes when facing security events, and the designed heuristic algorithm can reduce the occupation of virtual resources by 65%.The proposed system is expected to be applied to the network security area at the exit of the campus and data center network, simplifying the operation and maintenance of this area and improving the deployment flexibility of this area.…”
Get full text
Article -
334
Dynamic Aerial Small Target Detection Algorithm Based on Compound Zoom Scaling
Published 2025-04-01“…Firstly, a more efficient backbone network is introduced, and a composite scaling method is employed to optimize the balance among network depth, width, and image resolution. …”
Get full text
Article -
335
Mitigating opinion polarization in social networks using adversarial attacks
Published 2025-03-01“…Recently, it was found that even a few artificial perturbations inspired by the adversarial attack reverse the result in voter models, where a minority opinion becomes dominant through these perturbations. In this study, we conducted numerical simulations to determine whether it is possible to mitigate opinion polarization by adding such perturbations to the network in opinion dynamics models. …”
Get full text
Article -
336
Bioelectronic Hydrogels: Exemplifying the Synergy Between Biopolymers and Conjugated Polymers
Published 2025-08-01“…To address this, self‐healing conductive hydrogels with reversible dynamic networks have emerged. …”
Get full text
Article -
337
Territorial intelligence in Algeria, between network structuring and sustainable development
Published 2024-06-01“…This study explores the complex dynamics related to the network structuring of territorial actors and its impact on sustainable development. …”
Get full text
Article -
338
Social Networks and the Algerian society : the Advent of new practices and Behaviors
Published 2024-12-01“…These social network platforms play a key role in the dissemination of information and the expression of opinions, which leads to radically changing the traditional social dynamics. …”
Get full text
Article -
339
Synchronization of Short-Memory Fractional Directed Higher-Order Networks
Published 2025-07-01“…This paper addresses the synchronization problem in complex networks characterized by short-memory fractional dynamics and directed higher-order interactions. …”
Get full text
Article -
340
PROBLEMS OF USING NEURAL NETWORKS TO PREDICT THE PRICE OF VIRTUAL ASSETS
Published 2025-03-01“…Materials and Methods. The study was conducted on the basis of Bitcoin price dynamics data (Coinbase exchange) for the period of May 4, 2021 - April 9, 2024. …”
Get full text
Article