scispace - formally typeset
Search or ask a question

Answers from top 17 papers

More filters
Papers (17)Insight
And worm detection at network level is one possible detecting path, especially for Network Intrusion Detection Systems(NIDS).
If the path fail we still have alternate path can be used for reducing the overhead of route discovery for the network.
In particular, if one monitors only the network boundary and records the first boundary node hit by a random walk, this distribution can be related to the location of the source node.
Book ChapterDOI
Hye-Young Kang, Bog-Ja Lim, Ki-Joune Li 
01 Nov 2004
17 Citations
This triangular network topology provides us with an efficient way to find a path from any source node to the destination node or area, and to process spatial queries.
Based on our analytical model, we propose a novel routing metric that can be used to discover high throughput path in a congested network.
As a result, a source node can discover a trustworthy path to the destination node and each intermediate node can also detect its neighbor nodes.
Open accessProceedings ArticleDOI
Vincent Gripon, Michael G. Rabbat 
07 Jul 2013
20 Citations
We propose and analyze an algorithm which inserts edges by ordering each trace into a path according to which pairs of nodes in the path co-occur most frequently in the observations.
Journal ArticleDOI
36 Citations
We propose that network path caching can provide an efficient way to eliminate, whenever possible, the expensive path computation algorithm that has to be performed in setting up a network connection.
This provides an assured path from any node to the sink node.
The method is also applicable to network trace data characterizing communication patterns between pairs of computers.
This paper proposes that the nodes which are not participating in multi-path routing generates an alarm message during delay and then detects and isolate the malicious node from network.
It finds one near to shortest path per iteration and can be performed repeatedly iteration to find more on-demand shortest node-disjoint routing paths.
To the best of our knowledge, ParaCon is the first attempt that utilizes node parallelism in SDN path computation.
In addition, it is more straightforward to realize the permutation networks path history unit than the trace-forward unit.
It is important to note that this technique will always found out minimum path and even alternate path are also saved in case of node failure.
This approach allows a node to verify that another node is a physical next-hop neighbour, and also detects legitimate neighbours who make dishonest claims as to who their neighbours are.
In this paper, we propose an algorithm in which every node in the network self-detects whether it is a boundary node or an inner node by utilizing the available connectivity information and making no assumptions about the location awareness.

Related Questions

How does transfer path analysis works?5 answersTransfer path analysis (TPA) is a method used to identify critical sound paths in a system. It involves dividing the system into an active component (source) and a passive component (structure) and analyzing their respective behaviors. The excitation behavior of the source is characterized, and the transmission behavior of the structure is assessed. The two systems are then compared to determine if any changes to the source or structure are needed. TPA can be combined with neural network techniques, where operational data is used to train the neural network model. This reduces the need for additional measurements and costs associated with identifying noise propagation paths. TPA can also be applied to agricultural tractors to analyze noise and vibration contributions and derive excitation forces for virtual models. While TPA is commonly used in the automotive field, it is being explored for application in naval architecture to identify vibration and noise sources and paths on ships. Wind turbine models can also benefit from TPA to optimize individual transfer paths and improve vibration transmission.
What are control systems for path tracking?5 answersControl systems for path tracking are essential for improving vehicle performance, ensuring safety, and enabling autonomous driving technology. Various control methods have been proposed in the literature. Li and Nan developed a path planning and tracking control method for parafoil systems, incorporating sliding mode control to enhance accuracy and robustness. Chen studied path tracking control for unmanned vehicles, emphasizing the need for a joint simulation platform to investigate control performance under different conditions. Duan focused on path tracking control for mobile robots, proposing a controller based on optimization theory that demonstrated strong tracking and navigation abilities. Zhang et al. addressed the issue of delays in the control loop of autonomous vehicles and presented a model predictive control method with delay compensation, improving system robustness and stability. These studies highlight the importance of control systems in achieving accurate and reliable path tracking in various applications.
Where have path signatures been used?5 answersPath signatures have been used in various applications such as non-intrusive load monitoring (NILM), repetition detection with period variations, optimal double-execution trading strategy, time series analysis for Lie group-valued data, and feature generation for identifying Alzheimer's disease.
What is the method of nodes in bridges?4 answersThe method of nodes in bridges involves identifying and selecting specific nodes within a network based on various metrics and calculations. This method is used to determine the most critical nodes in a bridge structure. The selection process includes evaluating global and local metrics, such as total traffic flow and traffic flow between nodes, to calculate combinations that determine the bridge node. This method is implemented using specially programmed computers and can be applied to networks with multiple nodes.
Which command is used to query for the network round trip between any two nodes?8 answers
Which command is used to retrieve information on a particular Unix command or system call?9 answers

See what other people are reading

How can the GFSI barriers can be overcome?
5 answers
To overcome Global Information Society (GFSI) barriers, various strategies can be implemented. Firstly, enhancing coordination, teamwork, and shared understanding in requirements engineering can help address challenges related to communication, time management, team mistrust, linguistic and cultural barriers. Secondly, utilizing communication and collaboration technologies effectively while addressing communication barriers can prevent project failures in global software development. Additionally, ensuring access to international knowledge bases, promoting electronic collaboration, and addressing issues like data meanings, legal accountability, and networking standards can facilitate the realization of a GFSI for health. Moreover, bridging the gap between different sensor platforms in global sensor networks can lead to more flexible and robust networks. Lastly, fostering cultural changes in higher education institutions to promote interprofessional education through e-learning can help overcome barriers to collaborative working and communication.
Why more sewer network coverage is needed?
5 answers
Increasing sewer network coverage is crucial due to various reasons outlined in the research papers. Firstly, expanding coverage helps in managing combined sewer overflows (CSOs) more effectively by reducing their frequency and magnitude, thus mitigating environmental impacts. Additionally, enhancing sensor coverage in sewer networks through wireless sensor networks optimizes cost functions and ensures optimal solutions for monitoring and management. Moreover, broader sewer network coverage aids in wastewater-based epidemiology, enabling targeted monitoring of pathogens like SARS-CoV-2 and Influenza viruses within communities, facilitating better public health surveillance and resource allocation. The rapid urban population growth necessitates improved wastewater management, highlighting the need for increased sewer network coverage to meet sanitation goals and environmental concerns.
Is there a study that talks about Benefits of Smart Irrigation Systems?
5 answers
Yes, there are several studies discussing the benefits of Smart Irrigation Systems. These systems utilize IoT technologies and sensors to optimize water usage in agriculture, leading to improved crop quality and quantity. Smart irrigation systems help in reducing labor costs, conserving water, and ensuring crops receive the right amount of water at the right time. They also enable remote monitoring of soil conditions and weather forecasts, allowing farmers to make timely adjustments. By automating irrigation based on soil moisture levels, these systems enhance efficiency, reduce water waste, and promote sustainable farming practices. Overall, the implementation of Smart Irrigation Systems has the potential to significantly impact the agriculture sector by increasing crop yields and supporting farmers in managing their irrigation systems effectively.
What are the procedure to follow on analysing data?
5 answers
The procedure to follow when analyzing data involves several key steps. Initially, the raw data collected needs to be scrutinized, edited, arranged, coded, and classified to prepare it for analysis. Subsequently, the accuracy and authenticity of the data must be verified, and appropriate procedures applied to analyze the data effectively. It is crucial to handle the data correctly from collection to the analysis stage to ensure valid results. Various parameters within the data sample should be calculated and analyzed using different data models to generate insightful results. Additionally, in specific cases like XML data analysis on mobile phones, essential element nodes are identified, analyzed, and processed to optimize memory usage. By following these meticulous steps, researchers can derive meaningful insights, answer research questions, and support decision-making processes effectively.
What are the objectivs of a monitoring network of air quality?
5 answers
The objectives of a monitoring network of air quality include providing invaluable data for studying human health, environmental impacts, and policy effects. Such networks aim to ensure compliance with pollution limits, improve air quality, and reduce severe health impacts globally. Additionally, monitoring networks help in mapping the spatial and temporal distribution of pollution, evaluating network representativeness, and supporting air quality monitoring design using hierarchical clustering techniques. These networks utilize machine-learning methodologies for data analysis, air quality models for simulating pollution over large regions, and spatiotemporal clustering techniques for grouping similar time-series data from different locations. Overall, the primary goals of air quality monitoring networks are to enhance data quality, optimize network efficiency, and provide insights into pollution sources and chemical origins for effective air quality management and public health protection.
What are the current challenges faced by database systems when integrating with blockchain technology?
4 answers
Database systems integrating with blockchain technology face several challenges. Security, privacy, and usability are major concerns in this fusion. The integrity and safety of healthcare data, such as Patient Health Records (PHRs) and Medical Health Records (MHRs), are critical in Healthcare Data Management Systems (HDMS). Additionally, the security of Wireless Sensor Networks (WSNs) integrated with blockchain is a significant issue due to the potential compromise of data. The fusion of blockchain and traditional databases aims to enhance security, efficiency, and privacy, but it also introduces complexities in design and trade-offs. Ensuring confidentiality, authentication, and control in blockchain-integrated systems is crucial to address these challenges and optimize the performance of database systems leveraging blockchain technology.
What is 'Information-processing tasks' defined by William J. Potter?
5 answers
'Information-processing tasks' can be defined as the activities involved in managing and executing tasks based on task information, network state information, and host state information. These tasks typically include generating, modifying, transmitting, and terminating tasks based on various parameters such as task responsible person, task deadline, task correlation indexes, and task execution states. The process involves creating task trees, marking task states, initiating new task processes, and sending notification information to relevant parties to ensure efficient task management and completion. By utilizing mobile terminals and positioning identification equipment, these tasks can be automatically processed, reducing user burden, improving efficiency, and enhancing task information accessibility.
What is the impact of energy efficiency on the performance and longevity of sensor networks?
5 answers
Energy efficiency plays a crucial role in enhancing the performance and longevity of sensor networks. By implementing energy-saving techniques and strategies, such as cluster head relay nodes, energy balancing, and multihop hierarchical communication, the energy consumption in wireless sensor networks (WSNs) can be optimized, leading to extended network lifespan and improved efficiency. Energy-efficient routing protocols aim to reduce energy consumption in individual sensor nodes, while energy-balanced routing techniques distribute power consumption evenly across network nodes, collectively contributing to prolonged network availability and functionality. These approaches not only maximize energy conservation but also enhance network performance metrics like reliability, throughput, data delivery rate, and overhead, making them essential for the sustainable operation of sensor networks in various applications.
Did Robert Brotherton speaks about availability heuristic?
4 answers
Robert Brotherton did not specifically speak about the availability heuristic in the provided contexts. However, various other authors have extensively discussed the availability heuristic. For instance, Ruibo Du highlighted the potential misjudgments resulting from the availability heuristic and its impact on decision-making processes. Rita Girão-Silva et al. presented a heuristic solution approach for communication networks based on edge-betweenness centrality to ensure high availability paths. Yiman Wang discussed the significance of the availability heuristic in behavioral economics and its influence on real estate, transportation, and stocks decisions. Sijia Meng emphasized the existence of bias induced by the availability heuristic and its contradiction to traditional financial market assumptions. Although Brotherton's perspective on the availability heuristic is not mentioned, these diverse discussions shed light on its implications in various fields.
What are the major limitations of current environmental monitoring systems?
5 answers
Current environmental monitoring systems face several limitations. Bioelectronic sensors are prone to durability issues, interference, power supply challenges, sensitivity to various environmental variables, data processing complexities, high costs, and biofouling risks. Conventional systems relying on manual sampling struggle with spatiotemporal coverage and real-time monitoring, hindering effective pollution management. Additionally, the deployment of existing monitoring stations in large cities is slow, costly, and energy-inefficient. To address these challenges, leveraging Internet of Things (IoT) technologies can offer scalable, cost-effective, and energy-efficient solutions for continuous and real-time environmental monitoring, enabling better pollution source identification and management. Nanomaterial-based electrochemical sensors show promise in enhancing sensitivity and selectivity for detecting trace pollutants, contributing to improved environmental safety.
What are the data exchange mechanism for Social Interent of Things?
5 answers
The data exchange mechanisms for the Social Internet of Things (SIoT) involve ensuring controlled flow, sharing, and security of data. To address data security concerns in SIoT, a controllable data transmission mechanism based on consortium blockchain has been proposed, emphasizing trusted data transmission through smart contracts and a fine-grained data structure. Additionally, a novel context-aware mechanism for on-chain data allocation in IoT-blockchain systems has been suggested, utilizing fuzzy logic to calculate data allocation ratings based on various parameters, enhancing network usage, latency, and energy efficiency. Furthermore, an efficient data collection mechanism based on wavelet multi-resolution has been explored to improve data collection efficiency in opportunistic social networks, focusing on compression storage methods and data management mechanisms. These mechanisms collectively aim to enhance data exchange, security, and efficiency in the context of SIoT.