Results 31 to 40 of about 7,142,320 (302)

Distribution Network Topology Identification Considering Nonsynchronous Multi-Prosumer Data Measurement

open access: yesIEEE Access, 2022
Accurate topology is the basis of fine management and safe operation of distribution network. With the development of distributed generation, more and more users participate in the distribution network, which makes the flow direction of distribution ...
Lizong Zhang   +6 more
doaj   +1 more source

Survey on network topology visualization

open access: yes网络与信息安全学报, 2018
As the basis of network monitoring, network management, and network security situation awareness, network topology visualization plays an underlying role in reflecting the whole state of the network and discovering the potential rules in the network ...
WANG Song, ZHANG Ye, WU Yadong
doaj   +3 more sources

Topology Obfuscation Mechanism Against Multi-mode Network Tomography [PDF]

open access: yesJisuanji gongcheng, 2023
By performing an end-to-end performance measurement of a target network, the network tomography method can infer its internal topology accurately, which can support attackers in carrying out more effective attacks.Although network topology obfuscation ...
Hongxiu LIN, Changyou XING, Xi ZHAN
doaj   +1 more source

Topological generalizations of network motifs [PDF]

open access: yesPhysical Review E, 2004
Biological and technological networks contain patterns, termed network motifs, which occur far more often than in randomized networks. Network motifs were suggested to be elementary building blocks that carry out key functions in the network. It is of interest to understand how network motifs combine to form larger structures.
Kashtan, N.   +3 more
openaire   +3 more sources

Entangled Networks, Synchronization, and Optimal Network Topology [PDF]

open access: yesPhysical Review Letters, 2005
Slightly modified version, as accepted in Phys.
Donetti, Luca   +2 more
openaire   +3 more sources

An Efficient Topology Discovery Protocol with Node ID Assignment Based on Layered Model for Underwater Acoustic Networks

open access: yesSensors, 2020
Underwater acoustic networks are widely used in survey missions and environmental monitoring. When an underwater acoustic network (UAN) is deployed in a marine region or two UANs merge, each node hardly knows the entire network and may not have a unique ...
Ruiqin Zhao   +4 more
doaj   +1 more source

The Influence of Genetic Algorithms on Learning Possibilities of Artificial Neural Networks

open access: yesComputers, 2022
The presented research study focuses on demonstrating the learning ability of a neural network using a genetic algorithm and finding the most suitable neural network topology for solving a demonstration problem.
Martin Kotyrba   +3 more
doaj   +1 more source

A (Macro)Molecular-Level Understanding of Polymer Network Topology

open access: yesTrends in Chemistry, 2019
Topology plays a critical role in dictating the properties of many materials. In recent years, with advances in synthetic and characterization techniques, substantial efforts have been made to decipher the topology of networks of interconnected molecules,
Yuwei Gu   +2 more
semanticscholar   +1 more source

Topology of music recommendation networks [PDF]

open access: yesChaos: An Interdisciplinary Journal of Nonlinear Science, 2006
We study the topology of several music recommendation networks, which arise from relationships between artist, co-occurrence of songs in play lists or experts’ recommendation. The analysis uncovers the emergence of complex network phenomena in these kinds of recommendation networks, built considering artists as nodes and their resemblance as links.
Cano, Pedro   +3 more
openaire   +4 more sources

TopoObfu:A Network Topology Obfuscation Mechanism to Defense Network Reconnaissance [PDF]

open access: yesJisuanji kexue, 2021
Some typical network attacks,such as link-flooding attack,need to be carried out on critical links based on topology reconnaissance,which has strong destructiveness and stealthiness.In order to defense these attacks effectively,TopoObfu,a topology ...
LIU Ya-qun, XING Chang-you, GAO Ya-zhuo, ZHANG Guo-min
doaj   +1 more source

Home - About - Disclaimer - Privacy