Search alternatives:
conductivity » productivity (Expand Search)
Showing 321 - 340 results of 1,849 for search 'Dynamic network conductivity', query time: 0.24s Refine Results
  1. 321

    Behavioral and Topological Heterogeneities in Network Versions of Schelling’s Segregation Model by Will Deter, Hiroki Sayama

    Published 2025-01-01
    “…In the present study, we examined the effects of the concurrent presence of both behavioral and topological heterogeneities in network segregation models. Simulations were conducted using both homogeneous and heterogeneous preference models on 2D lattices with varied levels of densification to create topological heterogeneities (i.e., clusters and hubs). …”
    Get full text
    Article
  2. 322

    Wormhole Attack Mitigation in Wireless Network Using Propagation Delay by Harry May, Travis Atkison

    Published 2024-10-01
    “…To evaluate the effectiveness of our approach, testing was conducted using a custom-built testbed running on an external network simulator. …”
    Get full text
    Article
  3. 323

    Hypergraph Convolution Network Classification for Hyperspectral and LiDAR Data by Lei Wang, Shiwen Deng

    Published 2025-05-01
    “…Although deep learning methods based on convolutional neural networks (CNNs), transformers, and graph convolutional networks (GCNs) have demonstrated promising results in fusing complementary multi-source data, existing methodologies demonstrate limited efficacy in capturing the intricate higher-order spatial–spectral dependencies among pixels. …”
    Get full text
    Article
  4. 324

    Resilience Analysis of Airport Systems Based on Improved Bayesian Networks by Jiuxia Guo, Xin Tong, Yungui Yang, Jiang Yuan, Siying Xu

    Published 2025-07-01
    “…To mitigate this, we apply the best worst method (BWM) to conduct systematic pairwise comparison. Building on this, we leverage the BWM’s systematic pairwise comparisons, conducted with 10 aviation experts, to generate conditional probability tables for the Bayesian network. …”
    Get full text
    Article
  5. 325
  6. 326

    An optimization-inspired intrusion detection model for software-defined networking by Hui Xu, Longtan Bai, Wei Huang

    Published 2025-01-01
    “…As an emerging network architecture, software-defined networking (SDN) has the core concept of separating the control plane from the network hardware and unifying its management by a central controller. …”
    Get full text
    Article
  7. 327

    Optimizing Artificial Neural Networks Using Mountain Gazelle Optimizer by Muhammed Abdulhamid Karabiyik, Bahaeddin Turkoglu, Tunc Asuroglu

    Published 2025-01-01
    “…The performance of artificial neural networks heavily depends on the optimization of network parameters, specifically weights and biases, during the training process. …”
    Get full text
    Article
  8. 328

    Convolutional Neural Networks for Automatic Identification of Individuals at Terrestrial Terminals by Darwin Yarango-Farro, Alex Mondragon-Fernandez, Heber I. Mejia-Cabrera, Juan Arcila-Diaz

    Published 2025-01-01
    “…The objective of this study was to develop an automated system for the identification of wanted individuals in terrestrial terminals using Convolutional Neural Networks (CNN). The research was conducted under a quantitative approach and a quasi-experimental design. …”
    Get full text
    Article
  9. 329

    Resilience Evolution of Dongguan Industrial Network Based on Enterprise Connections by Huang Zhuo, Zhao Miaoxi

    Published 2024-11-01
    “…Second, by conducting a long-term, continuous analysis of network resilience, this study explores the evolution of network resilience from a dynamic perspective, offering a fresh viewpoint for existing static network resilience studies. …”
    Get full text
    Article
  10. 330

    Neural network backstepping control of OWC wave energy system by Priyanka Nath, Sunil Kumar Mishra, Amitkumar Vidyakant Jha, Bhargav Appasani, Akshaya Kumar Pati, Vijay Kumar Verma, Philibert Nsengiyumva, Avireni Srinivasulu

    Published 2025-03-01
    “…The proposed NN-BSC law effectively handles nonlinearities and improves system robustness under dynamic conditions. Numerical simulations have been conducted using MATLAB/SIMULINK to compare the performance of the uncontrolled OWC system, conventional PI and BSC, and NN-BSC, under scenarios with and without actuator disturbances. …”
    Get full text
    Article
  11. 331
  12. 332

    Distributed Dynamic Traffic Modeling and Implementation Oriented Different Levels of Induced Travelers by Yan Liu, Yao Yu

    Published 2015-01-01
    “…In order to respond to the variable state of traffic network in time, a distributed dynamic traffic assignment strategy is proposed which can improve the intelligent traffic management. …”
    Get full text
    Article
  13. 333

    Design and analysis of intelligent service chain system for network security resource pool by Zenan WANG, Jiahao LI, Chaohong TAN, Dechang PI

    Published 2022-08-01
    “…The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security area deployment and poor scalability.Besides, the architecture cannot be flexibly adjusted when facing network security events, making it difficult to meet the security needs of future networks.The intelligent service chain system for network security resource pool was based on software-defined network and network function virtualization technologies, which can effectively solve the above problems.Network security functions of virtual form were added based on network function virtualization technology, combined with the existing hardware network elements to build a network security resource pool.In addition, the switching equipment connected to the network security elements can be flexibly controlled based on software-defined network technology.Then a dynamically adjustable network security service chain was built.Network security events were detected based on security log detection and a expert library consisting of security rules.This enabled dynamic and intelligent regulation of the service chain by means of centralized control in the face of network security events.The deployment process of the service chain was mathematically modeled and a heuristic algorithm was designed to realize the optimal deployment of the service chain.By building a prototype system and conducting experiments, the results show that the designed system can detect security events in seconds and automatically adjust the security service chain in minutes when facing security events, and the designed heuristic algorithm can reduce the occupation of virtual resources by 65%.The proposed system is expected to be applied to the network security area at the exit of the campus and data center network, simplifying the operation and maintenance of this area and improving the deployment flexibility of this area.…”
    Get full text
    Article
  14. 334

    Dynamic Aerial Small Target Detection Algorithm Based on Compound Zoom Scaling by Jiang Yuan, Zhu Gaofeng, Zhu Fenghua, Xiong Gang

    Published 2025-04-01
    “…Firstly, a more efficient backbone network is introduced, and a composite scaling method is employed to optimize the balance among network depth, width, and image resolution. …”
    Get full text
    Article
  15. 335

    Mitigating opinion polarization in social networks using adversarial attacks by Michinori Ninomiya, Genki Ichinose, Katsumi Chiyomaru, Kazuhiro Takemoto

    Published 2025-03-01
    “…Recently, it was found that even a few artificial perturbations inspired by the adversarial attack reverse the result in voter models, where a minority opinion becomes dominant through these perturbations. In this study, we conducted numerical simulations to determine whether it is possible to mitigate opinion polarization by adding such perturbations to the network in opinion dynamics models. …”
    Get full text
    Article
  16. 336

    Bioelectronic Hydrogels: Exemplifying the Synergy Between Biopolymers and Conjugated Polymers by Thanh Nhi Tra, Kristina Fidanovski, Damia Mawad

    Published 2025-08-01
    “…To address this, self‐healing conductive hydrogels with reversible dynamic networks have emerged. …”
    Get full text
    Article
  17. 337

    Territorial intelligence in Algeria, between network structuring and sustainable development by Younes Ferdj, Abdelkader Djeflat

    Published 2024-06-01
    “…This study explores the complex dynamics related to the network structuring of territorial actors and its impact on sustainable development. …”
    Get full text
    Article
  18. 338

    Social Networks and the Algerian society : the Advent of new practices and Behaviors by Nadira BESSOUH & Yamina GRARI

    Published 2024-12-01
    “…These social network platforms play a key role in the dissemination of information and the expression of opinions, which leads to radically changing the traditional social dynamics. …”
    Get full text
    Article
  19. 339

    Synchronization of Short-Memory Fractional Directed Higher-Order Networks by Xiaoqin Wang, Weiyuan Ma, Jiayu Zou

    Published 2025-07-01
    “…This paper addresses the synchronization problem in complex networks characterized by short-memory fractional dynamics and directed higher-order interactions. …”
    Get full text
    Article
  20. 340

    PROBLEMS OF USING NEURAL NETWORKS TO PREDICT THE PRICE OF VIRTUAL ASSETS by Andrii Tsemko, Maxym Matskiv

    Published 2025-03-01
    “…Materials and Methods. The study was conducted on the basis of Bitcoin price dynamics data (Coinbase exchange) for the period of May 4, 2021 - April 9, 2024. …”
    Get full text
    Article