Modeling Routing Overhead Generated by Wireless Proactive Routing Protocols [PDF]
54th IEEE Globecom2011 (SaCoNAS Workshop), 2011In this paper, we present a detailed framework consisting of modeling of routing overhead generated by three widely used proactive routing protocols; Destination-Sequenced Distance Vector (DSDV), Fish-eye State Routing (FSR) and Optimized Link State Routing (OLSR).
Bibi, Ayesha+3 more
arxiv +4 more sources
Threat assessment of aerial targets based on improved GRA-TOPSIS method and three-way decisions
Mathematical Biosciences and Engineering, 2023Target threat assessment is a critical aspect of information warfare and can offer valuable auxiliary support to combat command decision-making. Aiming to address the shortcomings of three decision-making methods in air combat target assessment, such as ...
Yongfeng Yin, Routing Zhang , Qingran Su
doaj +1 more source
The role of gut archaea in the pig gut microbiome: a mini-review
Frontiers in Microbiology, 2023The gastrointestinal microbiota of swine harbors an essential but often overlooked component: the gut archaea. These enigmatic microorganisms play pivotal roles in swine growth, health, and yield quality.
Jianbo Yang+12 more
doaj +1 more source
Predicting the least air polluted path using the neural network approach [PDF]
EAI Endorsed Transactions on Scalable Information Systems, 2021Air pollution exposure during daily transportation is becoming a critical issue worldwide due to its adverse effect on human health. Predicting the least air polluted healthier path is the best alternative way to mitigate personal air pollution exposure ...
K. Samal, Korra Babu, Santos Das
doaj +1 more source
A Backtracking Ensemble Pruning Based Reconfiguration Method for Time-Triggered Flows in TTEthernet
IEEE Access, 2021In time-triggered ethernet (TTEthernet), when an end system node (ES) permanently fails, the affected TT flows should be reconfigured (known as reconfigured TT flows) with ESs, routings and an updated scheduling table while maintaining the scheduling ...
Ji Li, Qiao Li, Huagang Xiong
doaj +1 more source
DDSLA-RPL: Dynamic Decision System Based on Learning Automata in the RPL Protocol for Achieving QoS
IEEE Access, 2021The internet of things is a worldwide technological development in communications. Low Power and Lossy Networks (LLN) are a fundamental part of the internet of things with numerous monitoring and controlling applications. This network has many challenges
Mohammad Hossein Homaei+3 more
doaj +1 more source
Efficient Content-Based Sparse Attention with Routing Transformers [PDF]
Transactions of the Association for Computational Linguistics, 2020Self-attention has recently been adopted for a wide range of sequence modeling problems. Despite its effectiveness, self-attention suffers from quadratic computation and memory requirements with respect to sequence length. Successful approaches to reduce
Aurko Roy+3 more
semanticscholar +1 more source
A Load Balancing Routing Strategy for LEO Satellite Network
IEEE Access, 2020The LEO network composed of massive satellite nodes is a hot research field at present. In such a network, the problem of load balancing should be reconsidered due to the large number of satellite nodes, the frequently changing topology, and the uneven ...
Jiang Liu+3 more
doaj +1 more source
payGo: Incentive-Comparable Payment Routing Based on Contract Theory
IEEE Access, 2020The increasing use of cryptocurrencies has raised scalability and performance issues in blockchain systems that require global consensus and security assurance for real-time payments.
Kyungho Ryu, Wooseong Kim, Eun-Kyu Lee
doaj +1 more source
Centralized Routing Protocol for Detecting Wormhole Attacks in Wireless Sensor Networks
IEEE Access, 2020Nodes in wireless sensor networks (WSN) are resource and energy-constrained because they are generally batteries powered and therefore have limited computational capability. Due to the less secure environment in WSN, some malicious nodes at one point can
Ohida Rufai Ahutu, Hosam El-Ocla
doaj +1 more source