scispace - formally typeset
Search or ask a question

Answers from top 9 papers

More filters
Papers (9)Insight
On the assumption that the signal sources are nodes in an underwater network, this method can be used to estimate the number of network nodes.
Open accessProceedings ArticleDOI
Saad Biaz, Yiming Ji 
13 Jun 2005
33 Citations
The proposed techniques can estimate all nodes' positions, even with limited and imprecise network knowledge.
Through four typical networks, i. e., the regular one dimensional, small world, random, and scale-free networks, we show that the features of network can be approximately given by investigating many fewer nodes than the network size, thus our approach to detect the topology of unknown network may be efficient in practical situations with large network size.
It is, therefore, important to assess the detection performance of the network when the nodes do not possess same sensing range.
The results provide insights into probability distributions for the entire network-not only for individual nodes and edges.
Proceedings ArticleDOI
Zhang Jiawan, Li Liang, Lu Liangfu, Zhou Ning 
13 Dec 2008
13 Citations
The experiments show that ScanViewer can not only detect network scans, port scans, distributed port scans, but also can detect the hidden scans etc.
In a network without a fusion center, where nodes do not know the graph structure, estimating the number of nodes is not straightforward.
Open accessProceedings ArticleDOI
Krishnan Srinivasan, Karam S. Chatha 
08 Aug 2005
157 Citations
It is proven that the complexity of the technique is lower than that of NMAP.
Open accessProceedings ArticleDOI
Krishnan Srinivasan, Karam S. Chatha 
08 Aug 2005
157 Citations
For the latency constrained case, while NMAP fails on most test cases, the technique is able to generate high quality results.

See what other people are reading

Is there any paper on automatic drone flight using cps structure?
5 answers
Yes, there are papers discussing the integration of Cyber-Physical Systems (CPS) in drone technology for autonomous flight. One such paper explores the utilization of advanced sensing, communication, and control technologies to enhance the real-time perception and autonomous flight capabilities of drones, aiming to achieve performance-based air traffic management. Another paper focuses on enhancing drone communication systems through Automatic Modulation Classification (AMC) using deep learning methods, specifically proposing a decentralized AMC approach based on ResNet for improved training efficiency and data privacy protection. These papers highlight the growing interest in leveraging CPS structures to advance autonomous flight capabilities and communication systems in drone technology.
What are the potential challenges and limitations associated with implementing camera sensors in poultry farming?
5 answers
Implementing camera sensors in poultry farming poses challenges such as handling big data, effective noise filtering, computing at the edge, on-farm resiliency, power usage, and infrastructure costs. These challenges are addressed through the use of high-performance computing and deep learning to develop object detection models for smart agriculture solutions in poultry farming. By automating monitoring critical variables like heat, moisture, air quality, and food feeder through wireless sensor networks and IoT technologies, the risk of chicken mortality can be reduced, enhancing productivity and ensuring the production of healthy chickens. The integration of camera sensors with advanced technologies can revolutionize poultry farm management by enabling efficient data collection and analysis for improved decision-making.
How does machine learning algorithms identify influential nodes in a network?
5 answers
Machine learning algorithms identify influential nodes in a network by considering various factors such as node attributes, network topology, and information propagation dynamics. Different approaches like Graph Neural Networks (GNNs), Graph Convolutional Networks (GCN), Local Propagation Probability (LPP) model, and Community Structure with Integrated Features Ranking (CIFR) algorithmhave been proposed. These algorithms leverage deep learning architectures, structural centrality, community detection, and integrated features ranking to effectively aggregate information about nodes and their neighborhoods. By incorporating features like node degree values, neighborhood overlap, and community structures, these algorithms can accurately rank nodes based on their influence, leading to improved identification of influential nodes in complex networks. Experiments across various real and synthetic networks have demonstrated the effectiveness and superiority of these machine learning algorithms in identifying influential nodes.
What is the role of the Routing Protocol for Low-Power and Lossy Networks (RPL) in IoT networks?
5 answers
The Routing Protocol for Low-Power and Lossy Networks (RPL) plays a crucial role in IoT networks by facilitating optimized routing and reducing network overhead. RPL is designed to support communication in resource-constrained nodes typical of IoT networks, selecting the best paths for data transmission. To enhance RPL's efficiency, the integration of fog computing principles has led to the development of FOG-RPL, a protocol that reduces network load and improves performance parameters. Moreover, advancements in RPL include the development of Fuzzy-based Takagi and Sugeno Objective Function (FTSOF), which outperforms existing techniques by combining routing metrics to select parent nodes accurately. Overall, RPL in IoT networks ensures efficient data routing, improved network performance, and enhanced decision-making for selecting optimal paths.
How does data-based performance analysis contribute to improving the training and competition strategies for top-level athletes?
5 answers
Data-based performance analysis plays a crucial role in enhancing training and competition strategies for elite athletes. By utilizing technologies like wireless sensor networks, video tracking systems, and machine learning algorithms, coaches and researchers can quantitatively assess athletes' physiological responses, energy consumption, and predict future performance accurately. This comprehensive approach allows for a deeper understanding of athletes' physical abilities, fatigue levels, and potential for improvement. Moreover, by integrating various perspectives such as biomechanical, psychological, and tactical aspects, performance analysis provides a holistic view of athletes' behaviors in real-based contexts, guiding the development of tailored training programs and strategic adjustments. Ultimately, data-driven insights enable coaches and athletes to optimize performance, reduce injuries, and achieve peak competitive results.
What is opportunistic sampling in social work?
5 answers
Opportunistic sampling in social work refers to a method where data is collected based on chance encounters or unplanned interactions within a population. This approach is prevalent in various fields like opportunistic sensing, ad-hoc communication networks, and wireless sensor networks. In opportunistic sensing, data is anonymously delivered to a task initiator through intermediate devices, ensuring privacy and efficiency. Ad-hoc communication networks leverage mobility and social relationships for message routing, enhancing communication effectiveness. In wireless sensor networks, nodes opportunistically sample data during communication, leading to accurate global knowledge and efficient query processing. Overall, opportunistic sampling in social work involves leveraging chance encounters and unplanned interactions to gather data effectively and enhance communication and information processing within a network.
What is microsoft fabric?
7 answers
Microsoft's Service Fabric (SF) is a comprehensive distributed platform designed to facilitate the development, deployment, and maintenance of microservice applications in the cloud. SF distinguishes itself by its extensive use in production environments for over a decade, underpinning many of Microsoft's critical services. The platform is built on a foundation of key design principles that prioritize modularity and support for robust semantics, including fault tolerance and consistency across its architectural components. This approach enables SF to offer a reliable and efficient environment for running large-scale services, as evidenced by lessons learned and experimental results derived from production data. SF's architecture is not just about running services; it also emphasizes the creation and management of these services through a bottom-up approach, focusing on the intricate details of its low-level components. This meticulous attention to the underlying structure ensures that each element of SF contributes to the overall goal of providing a resilient and adaptable platform for microservices. In the broader context of distributed systems and fabric-based solutions, SF's role is part of a larger ecosystem that includes various fabric technologies aimed at enhancing the security, efficiency, and scalability of distributed information systems and cloud computing environments. These technologies range from systems like Fabric, which focuses on building secure distributed information systems with a high-level programming language, to infrastructures like FABRIC, which enables experimental research in networking and distributed computing at a national scale. Additionally, solutions like Scalable Fabric address desktop complexity and task management, while innovative platforms like the Forward Fabric platform system integrate with data center platforms for enhanced connectivity and management. Furthermore, the FABRIC project aims to integrate middleware standards for high-quality streaming over heterogeneous networks, and the FABRIC scheme proposes secure cloud data sharing through proxy re-encryption. Together, these fabric-based technologies, including Microsoft's Service Fabric, represent a multifaceted approach to tackling the challenges of modern computing environments, from cloud services to secure data sharing and beyond.
How does practices are considerated to mensure the uses of transportation stations?
5 answers
Transportation station usage is evaluated through various practices globally. Sustainability assessments, including methods like Cost-benefit analysis (CBA) and Multi-criteria analysis (MCA), are commonly employed. Node-place modeling tools like StationRadar are tested to bridge the gap between research and practice, validating their usefulness in station area development planning. The design of transportation hubs, like Rotterdam Central Station, requires collaborative approaches between public and private entities, emphasizing the importance of new design practices and competences. During crises like the COVID-19 outbreak, technical requirements are proposed to manage passenger transportation places effectively, ensuring operational continuity while minimizing health risks. These diverse approaches aim to enhance station usage assessment, considering sustainability, stakeholder involvement, design complexity, and crisis management.
What can other companies learn from Amazon's performance metrics decision making strategy?
5 answers
Other companies can learn from Amazon's performance metrics decision-making strategy by focusing on key elements such as cost optimization, product variation, technical innovation, topological information, performance metrics, predictive analytics, and customer-driven metrics. Amazon's success is attributed to factors like lower marginal physical cost, diverse product offerings, and innovative technological outcomes. Companies can emulate Amazon's approach by utilizing topological and performance data to make informed decisions, especially in scenarios like Content Delivery Network deployments. Learning from Amazon's use of advanced predictive analytics and prescriptive analytics can help healthcare sectors enhance decision support tools and customer satisfaction. Additionally, adopting a methodology for acquiring performance metrics from e-commerce websites, like Amazon, can aid in comparative studies with physical resources. Amazon's emphasis on customer-driven metrics and real-time measurement can inspire a culture of customer value obsession within other companies.
How does Blockchain enhance data Integrity and Privacy in water monitoring system?
5 answers
Blockchain technology enhances data integrity and privacy in water monitoring systems by providing a decentralized and secure platform for storing and managing water resource information. It ensures data security by encrypting monitoring and business data, making it tamper-proof and resistant to unauthorized access. Additionally, blockchain's decentralized ledger system allows for transparent and immutable record-keeping, preventing data manipulation and ensuring the reliability of water quality information. By utilizing blockchain-based algorithms like smart contracts and chain codes, water-related data processing systems can be designed to maintain data integrity and privacy while enabling efficient information sharing among stakeholders. This approach not only safeguards sensitive water resource data but also fosters trust among users and stakeholders in the water industry.
What is the subnet mask used for the IP address range 192.168.1.158/28?
5 answers
The subnet mask used for the IP address range 192.168.1.158/28 is 255.255.255.240. This subnet mask allows for efficient addressing by dividing the IP address space into smaller subnets. Subnet masks play a crucial role in network communication, enabling devices to determine which part of an IP address represents the network and which part represents the host. In some cases, subnet masks can be automatically determined by network nodes based on communication patterns within the network. Different subnetting methods like VLSM, FLSM, AFLSM, and HFLSM offer varying levels of efficiency and address utilization. The subnet mask structure can vary, with layers of non-woven fabrics designed for specific filtration purposes.