898 results on '"Supernetwork"'
Search Results
52. Research on the Application of Super Network Model in Anti-Missile System Operation
- Author
-
Wang Jiejuan, Yu Xiaohong, Luo Jian, and Jiang Wei
- Subjects
System of systems ,Optimization problem ,Computer science ,Distributed computing ,Node (networking) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Missile defense ,Supernetwork ,Complex network ,Subnet ,Network model - Abstract
Aiming at the missile Defense system of systems process, based on complex network, firstly, the Application of missile Defense system-of-systems is abstracted for Topologically, and the supernetwork Modeling of the application of missile Defense system-of-systems is built, which is composed of shard subnet, information subnet, Engagement subnet configures and sensor subnet configures. Secondly, the static interaction mechanism of models is analyzed deeply, and which nodes interaction is described mathematically. Thirdly, The dynamic interaction mechanism of models is analyzed based on the timing sequence of operation, Extracted and the characteristic parameters which reflect the network evolution characteristics between subnet and internal subnet are extracted. An example is illustrated at last. The simulation results show The overall characteristic value of the network changes in phases, such as network Density, while, the information flow changes regularly with phases, As well as the role and status of each node, which is a helpful exploration for the following optimization problems.
- Published
- 2020
- Full Text
- View/download PDF
53. The equilibrium of closed-loop supply chain supernetwork with time-dependent parameters.
- Author
-
Feng, Zhifang, Wang, Zhiping, and Chen, Yan
- Subjects
- *
SUPPLY chain management , *ECONOMIC equilibrium , *CLOSED loop systems , *PARAMETERS (Statistics) , *INVESTMENTS , *MARKETING channels , *ECONOMIC activity - Abstract
Highlights: [•] The consumers’ demand is set to be a function of time. [•] We formulate the closed-loop supply chain model with cyclic demand and solve it. [•] We study the stability of the model and analyze influence of the price sensitivity. [•] Some references of management on economic activity are provided. [•] The investment Iki on reverse distribution channels is introduced. [Copyright &y& Elsevier]
- Published
- 2014
- Full Text
- View/download PDF
54. SuperedgeRank algorithm and its application in identifying opinion leader of online public opinion supernetwork.
- Author
-
Ma, Ning and Liu, Yijun
- Subjects
- *
PUBLIC opinion , *ALGORITHMS , *LEADERSHIP , *MATHEMATICAL models , *EXPERT systems - Abstract
Highlights: [•] The online public opinion supernetwork model is established. [•] Four supernetwork indexes are proposed: SD, LSE , dSE , SO. [•] SuperedgeRank algorithm is proposed to rank the superedges in supernetwork model. [•] Identification mechanism of opinion leader based on the new algorithm is presented. [Copyright &y& Elsevier]
- Published
- 2014
- Full Text
- View/download PDF
55. Parameter Selection and Evaluation of Robustness of Nanjing Metro Network Based on Supernetwork
- Author
-
Tao Wang, Jun Chen, Wei Yu, and Yan Zheng
- Subjects
General Computer Science ,business.industry ,Computer science ,020209 energy ,Supernetwork ,Vertex connectivity ,General Engineering ,02 engineering and technology ,robustness ,010501 environmental sciences ,Network connectivity ,01 natural sciences ,metro ,Transport engineering ,Robustness (computer science) ,Public transport ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,lcsh:TK1-9971 ,0105 earth and related environmental sciences - Abstract
Metro plays an important role in an urban public transport system. With the use of metro lines, the increasing flow of people has brought tremendous pressure to the operation of metro lines, resulting in different faults, thus affecting the travel of residents. How to qualitatively evaluate the robustness of the metro network after encountering faults is a problem worthy of attention. By 2018, ten metro lines have been opened in Nanjing, forming a radiation structure from the urban center to the surrounding suburbs. In this study, the metro faults in Nanjing in the past three years are counted and classified. The space L and space P models for the metro network are constructed. The robustness of a Nanjing metro network is measured by the three indicators: network connectivity efficiency, largest connected subgraph size, and average subgraph size. The concept of supernetwork is proposed, and the metro line is considered as a whole. The robustness changes of the Nanjing metro network caused by the attacks on the nodes and hyperedges of the metro network are analyzed. The results show that deliberate attack causes more damage than a random attack. When traffic hub stations and trunk lines are attacked, the performance of the metro network will decline sharply. The research conclusion has certain practical value to enhance the anti-fault ability of the metro network.
- Published
- 2019
56. Research on the Search and Rescue System-of-Systems Capability Evaluation Index System Construction Method Based on Weighted Supernetwork
- Author
-
Yaqian You, Kewei Yang, Niping Jia, Yu Guo, and Yanjing Lu
- Subjects
0209 industrial biotechnology ,General Computer Science ,Computer science ,02 engineering and technology ,computer.software_genre ,weighted supernetwork model ,020901 industrial engineering & automation ,Search and rescue system-of-systems ,0502 economics and business ,General Materials Science ,Architecture ,Search and rescue ,System of systems ,Network architecture ,05 social sciences ,General Engineering ,Supernetwork ,Construct (python library) ,indicator importance sort algorithm ,index system construction ,Constraint (information theory) ,capability evaluation ,050211 marketing ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Data mining ,lcsh:TK1-9971 ,computer - Abstract
Currently, studies on the system-of-systems (SoS) capability evaluation index system generation mechanism are scant, and the indicators are mostly determined by merely qualitative expert experience. This paper tries to explore a quantitative method for constructing the search and rescue system-of-systems (SARSoS) capability evaluation index system based on the SoS network architecture analysis, considering the impact from the SoS activity, organization, equipment, project, technology, and their relationships constraint on the capability generation. The four-layers weighted supernetwork model of the SARSoS is first established to describe the influence of SoS network architecture to the capability. Then, the index system construction method is proposed through the indicator importance sort algorithm (IISA). Finally, a specific case study of the SARSoS capability evaluation index system construction is demonstrated based on the proposed method. This paper provides a viable way to construct the index system based on the SoS architecture, which can select and integrate the indicators from multiple perspectives, and help to discover the SoS weak points and relationships in the future capability evaluation work.
- Published
- 2019
- Full Text
- View/download PDF
57. Multilevel Command and Control Supernetwork Modeling Based on Attribute Synergy Prioritization
- Author
-
Haoyang Yu, Bo Chen, Yunming Wang, Xiue Gao, and Yaoyao Xu
- Subjects
Hypergraph ,command and control ,General Computer Science ,Computer science ,02 engineering and technology ,computer.software_genre ,01 natural sciences ,0103 physical sciences ,Attribute synergy prioritization ,0202 electrical engineering, electronic engineering, information engineering ,Command and control ,General Materials Science ,Network performance ,Network model ,010308 nuclear & particles physics ,General Engineering ,Supernetwork ,Construct (python library) ,Term (time) ,supernetwork modeling ,hypergragh ,020201 artificial intelligence & image processing ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Data mining ,Enhanced Data Rates for GSM Evolution ,lcsh:TK1-9971 ,computer - Abstract
Current command and control (C2) network models typically do not account for differences in attributes of nodes that belong to the same class; in addition, there is no provision in these models for the adequate description of operational relationships that exist between multiple combat entities with different attributes in real-world scenarios. To address these issues, we propose a method to model multilevel command and control supernetworks (MC2S) based on the attribute synergy prioritization and hypergraph theory. First, the characteristics of C2 supernetworks are analyzed to abstract their nodes and hyperedges, based on which, we propose the MC2S model, which consists of three layers and five networks. Second, the Term Frequency-Inverse Document Frequency and spatial distance algorithms are used to construct an attribute synergy prioritization-based strategy for the generation of intra-layer MC2S hyperedges, while the local-world (LW) selection is used to create an LW model-based method for the generation of inter-layer MC2S hyperedges. Through simulation experiments, we show that our model exhibits (approximately) scale-free properties as well as small-world properties, excellent cooperative engagement capabilities, and has a high level of network invulnerability. These findings will serve as a useful reference for the description of complex nodal (edge) relationships in C2 networks, network performance analyses, and deployment of complex combat mission networks.
- Published
- 2019
- Full Text
- View/download PDF
58. Establishment and Analysis of the Supernetwork Model for Nanjing Metro Transportation System
- Author
-
Sun Ning and Yu Wei
- Subjects
Multidisciplinary ,Article Subject ,General Computer Science ,Computer science ,business.industry ,Distributed computing ,Node (networking) ,Supernetwork ,Link (geometry) ,Complex network ,01 natural sciences ,lcsh:QA75.5-76.95 ,010305 fluids & plasmas ,Public transport ,0103 physical sciences ,Line (geometry) ,Network performance ,lcsh:Electronic computers. Computer science ,010306 general physics ,business ,Centrality - Abstract
In recent years, many researchers have applied complex network theory to urban public transport network to construct complex network and analyze its network performance. The original analysis method generally uses the Space L and Space R model to establish a simple link between public sites but ignores the organic link between the overall network system and the line subsystem. As an important part of urban public transport system, subway plays an important role in alleviating traffic pressure. In this paper, a supernetwork model of Nanjing metro network is established by using the supernetwork method. Three parameters, node-hyperedge degree, hyperedge-node degree, and hyperedge degree, are proposed to describe the model. The model is compared with the traditional Space L and Space P models. The study on the supernetwork model of Nanjing metro complex network shows that the network density, network centrality, and network clustering coefficient are large, and the average network distance is small, which meets the requirements of traffic planning and design. In this study, the subway line is considered as a subsystem and further simplified as a node, so that the complex network analysis method can be applied to the new supernetwork model, expanding the thinking of complex network research.
- Published
- 2018
- Full Text
- View/download PDF
59. Routing to Multi-Instantiated Destinations: Principles, Practice, and Applications
- Author
-
J.J. Garcia-Luna-Aceves, Rolando Menchaca-Mendez, and Jesus Elohim Martinez-Castillo
- Subjects
Routing protocol ,Dynamic Source Routing ,Computer Networks and Communications ,Computer science ,Equal-cost multi-path routing ,Routing table ,Enhanced Interior Gateway Routing Protocol ,Wireless Routing Protocol ,Geographic routing ,02 engineering and technology ,Network topology ,Anycast ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,Hierarchical routing ,Triangular routing ,Static routing ,Zone Routing Protocol ,Multicast ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Policy-based routing ,020206 networking & telecommunications ,Supernetwork ,Routing domain ,Link-state routing protocol ,Multipath routing ,020201 artificial intelligence & image processing ,Unicast ,business ,Software ,Computer network - Abstract
Prior solutions for routing to multi-instantiated destinations simply adapt existing routing algorithms designed for single-instance destinations, or rely on flooding techniques. In this paper, a new approach for routing to multi-instantiated destinations is introduced, and the Multiple Instance Destination Routing (MIDR) framework is presented as an example of the approach. MIDR uses only distance information to multi-instantiated destinations, without routers having to establish overlays, know the network topology, use complete paths to destination instances, or know about all the instances of destinations. MIDR can be used in name-based content routing, IP unicast routing, multicasting, and anycasting; even in scenarios where the network topology is highly dynamic such as in the case of MANETs. It is shown that MIDR provides multiple loop-free paths to destination instances. Extensive simulation-based experiments performed in the context of MANETs show that MIDR outperforms traditional approaches based on unicast protocols and that it scales to large networks.
- Published
- 2018
- Full Text
- View/download PDF
60. Energy-Aware Dual-Path Geographic Routing to Bypass Routing Holes in Wireless Sensor Networks
- Author
-
Haojun Huang, Geyong Min, Yulei Wu, Hao Yin, Junbao Zhang, and Xu Zhang
- Subjects
Routing protocol ,Dynamic Source Routing ,Computer Networks and Communications ,Computer science ,Equal-cost multi-path routing ,Routing table ,Enhanced Interior Gateway Routing Protocol ,Mobile computing ,Wireless Routing Protocol ,Geographic routing ,02 engineering and technology ,0202 electrical engineering, electronic engineering, information engineering ,Network performance ,Electrical and Electronic Engineering ,Hierarchical routing ,Triangular routing ,020203 distributed computing ,Static routing ,business.industry ,Network packet ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Policy-based routing ,020206 networking & telecommunications ,Supernetwork ,Energy consumption ,Load balancing (computing) ,Link-state routing protocol ,Routing domain ,Multipath routing ,Hazy Sighted Link State Routing Protocol ,business ,Wireless sensor network ,Software ,Computer network ,Efficient energy use - Abstract
Geographic routing has been considered as an attractive approach for resource-constrained wireless sensor networks (WSNs) since it exploits local location information instead of global topology information to route data. However, this routing approach often suffers from the routing hole (i.e., an area free of nodes in the direction closer to destination) in various environments such as buildings and obstacles during data delivery, resulting in route failure. Currently, existing geographic routing protocols tend to walk along only one side of the routing holes to recover the route, thus achieving suboptimal network performance such as longer delivery delay and lower delivery ratio. Furthermore, these protocols cannot guarantee that all packets are delivered in an energy-efficient manner once encountering routing holes. In this paper, we focus on addressing these issues and propose an energy-aware dual-path geographic routing (EDGR) protocol for better route recovery from routing holes. EDGR adaptively utilizes the location information, residual energy, and the characteristics of energy consumption to make routing decisions, and dynamically exploits two node-disjoint anchor lists, passing through two sides of the routing holes, to shift routing path for load balance. Moreover, we extend EDGR into three-dimensional (3D) sensor networks to provide energy-aware routing for routing hole detour. Simulation results demonstrate that EDGR exhibits higher energy efficiency, and has moderate performance improvements on network lifetime, packet delivery ratio, and delivery delay, compared to other geographic routing protocols in WSNs over a variety of communication scenarios passing through routing holes. The proposed EDGR is much applicable to resource-constrained WSNs with routing holes.
- Published
- 2018
- Full Text
- View/download PDF
61. Constructing level-2 phylogenetic networks from trinets
- Author
-
Kole, Sjors (author) and Kole, Sjors (author)
- Abstract
Phylogenetic networks are a generalization of evolutionary trees that can be used to represent reticulate events. Level-k phylogenetic networks are such networks, but with a at most k reticulations per biconnected component of the network. For level-1 networks there exists an algorithm, called TriLoNet (Trinet Level-one Network algorithm), that constructs these networks directly from sequence alignments which works by piecing together smaller level-1 networks on three taxa. Here, we introduce TriL2Net (Trinet Level-2 Network algorithm), an algorithm similar to TriLoNet that works for the larger class of level-2 networks. More specifically, TriL2Net constructs a level-2 phylogenetic network from a set of level-2 trinets. We show that TriL2Net performs better on sampled level-2 networks than TriLoNet performs om sampled level-1 networks. We hypothesize that this result is either due to the different ways the data is sampled, or the difference in heuristics used. Moreover, we applied TriL2Net to level-1 trinet sets derived from real sequence data involving recombination. When comparing the networks generated by TriL2Net from these data sets to the networks generated by TriLoNet from these same data sets, we found that TriL2Net’s networks are at least as consistent with the input as TriLoNet’s networks. TriL2Net has been implemented in Python and is freely available at https://github.com/KSjors/TriL2Net., Applied Mathematics
- Published
- 2020
62. Supernetwork-based method on division of community structure in complex network.
- Author
-
WU Peng, WANG Heng-shan, and LIU Qi
- Subjects
- *
COMPUTER networks , *COMMUNITY organization , *TOPOLOGY , *GAUSS-Newton method , *ALGORITHMS , *COMPUTER science - Abstract
Community structure is one of the most important and basic topologic properties of complex network. The rational division of community structure in complex network is the main purpose of the complex network's community division research. This paper mainly researched the division of community structure in complex network based on the theory of supernetwork and standardized degree centrality. Based on the lack of GN algorithm, this paper proposed a new comprehensive algorithm to divide community structure from the perspective of supernetwork. Finally, the new comprehensive algorithm is illustrated through examples. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
63. A new coupled-map car-following model based on a transportation supernetwork framework.
- Author
-
Yao Jing, Huang Jing-Yi, Chen Guan-Rong, and Xu Wei-Sheng
- Subjects
- *
TRAFFIC flow , *AUTOMOTIVE transportation , *TRAFFIC congestion , *TRAFFIC engineering , *COMMUNICATION , *TELECOMMUNICATION systems - Abstract
A new car-following model is proposed by considering information from a number of preceding vehicles with intervehicle communication. A supernetwork architecture is first described, which has two layers: a traffic network and a communication network. The two networks interact with and depend on each other. The error dynamic system around the steady state of the model is theoretically analyzed and some nonjam criteria are derived. A simple control signal is added to the model to analyze the criteria of suppressing traffic jams. The corresponding numerical simulations confirm the correctness of the theoretical analysis. Compared with previous studies concerning coupled map models, the controlled model proposed in this paper is more reasonable and also more effective in the sense that it takes into account the formation of traffic congestion. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
64. Research on Organizational Knowledge Sharing Based on the Weighted Supernetwork Model.
- Author
-
Liao Kaiji and Yang Binbin
- Published
- 2013
- Full Text
- View/download PDF
65. On encodings of phylogenetic networks of bounded level.
- Author
-
Gambette, Philippe and Huber, Katharina
- Subjects
- *
PHYLOGENY , *CLADISTIC analysis , *PLANT phylogeny , *TREE physiology , *SPECIES hybridization - Abstract
Phylogenetic networks have now joined phylogenetic trees in the center of phylogenetics research. Like phylogenetic trees, such networks canonically induce collections of phylogenetic trees, clusters, and triplets, respectively. Thus it is not surprising that many network approaches aim to reconstruct a phylogenetic network from such collections. Related to the well-studied perfect phylogeny problem, the following question is of fundamental importance in this context: When does one of the above collections encode (i.e. uniquely describe) the network that induces it? For the large class of level-1 (phylogenetic) networks we characterize those level-1 networks for which an encoding in terms of one (or equivalently all) of the above collections exists. In addition, we show that three known distance measures for comparing phylogenetic networks are in fact metrics on the resulting subclass and give the diameter for two of them. Finally, we investigate the related concept of indistinguishability and also show that many properties enjoyed by level-1 networks are not satisfied by networks of higher level. [ABSTRACT FROM AUTHOR]
- Published
- 2012
- Full Text
- View/download PDF
66. Modeling of Emergency Information Dissemination Supernetwork and Determination of Important Nodes in the Supernetwork.
- Author
-
Wu Peng and Wang Hengshan
- Published
- 2012
- Full Text
- View/download PDF
67. A multimodal transport network model for advanced traveler information systems.
- Author
-
Zhang, Jianwei, Liao, Feixiong, Arentze, Theo, and Timmermansa, Harry
- Subjects
ADVANCED traveler information systems ,ALGORITHMS ,ROAD locations ,COMPUTER networks ,DATA transmission systems ,MATHEMATICAL models ,READING machines (Data processing equipment) - Abstract
Abstract: There is an application need for seamless multimodal advanced traveler information systems. Currently, no comprehensive network modeling approach exists to deal with routing queries for different private and public transport modes taking into account multiple attributes, dynamic travel times and time tables in large-scale transport networks. The goal of this paper is to develop and test a generic multimodal transport network model for ATIS applications. First, we model multimodal transport networks from an abstract point of view and categorize networks into private and public modes. Then we use a generic method to construct a multimodal transport network representation by using transfer links which is inspired by the so-called supernetwork technique. Among all modes, pedestrian networks play an important role in modeling transfer connections. We test our model and algorithm based on a case study in the Eindhoven region. The results indicate that our model and algorithms provide a suitable basis for ATIS applications. One current limitation is that much time is required for data reading and compiling. This can be solved by implementing existing computational strategies to increase efficiency. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
68. A supply chain-transport supernetwork equilibrium model with the behaviour of freight carriers
- Author
-
Yamada, Tadashi, Imai, Koji, Nakamura, Takamasa, and Taniguchi, Eiichi
- Subjects
- *
SUPPLY chain management , *TRANSPORTATION , *FREIGHT & freightage , *COST , *NUMERICAL analysis , *MATHEMATICAL models , *CARRIERS - Abstract
Abstract: This paper presents a supernetwork equilibrium model integrating supply chain networks with a transport network, namely, a supply chain-transport supernetwork equilibrium model. The model takes into account the behaviour of freight carriers and transport network users to endogenously determine the transport costs generated in the supply chain networks. The interaction between transport network and supply chain networks can also be examined. Results of the numerical tests reveal that the improvement of transport network could enhance the efficiency of supply chain networks. The paper makes contributions to modelling of supply chain networks as well as to that of transport networks. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
69. Constructing personalized transportation networks in multi-state supernetworks: a heuristic approach.
- Author
-
Liao, Feixiong, Arentze, TheoA., and Timmermans, HarryJ.P.
- Subjects
- *
CHOICE of transportation , *MATHEMATICAL models , *HEURISTIC algorithms , *GEOGRAPHIC information systems , *MULTIMODAL user interfaces , *LOCAL transit access - Abstract
An integrated view encompassing the networks for public and private transport modes as well as the activity programs of travelers is essential for accessibility analysis. In earlier research, the multi-state supernetwork has been put forward by the authors as a suitable technique to model the system in such an integrated fashion. An essential part of a supernetwork involving multi-modal and multi-activity is the personalized transportation network, which is an under-researched topic in the academic community. This article attempts to develop a heuristic approach to construct personalized transportation networks for an individual's activity program. In this approach, the personalized network consists of two types of network extractions from the original transportation system: public transport network and private vehicle network. Three examples are presented to illustrate that the public transport network and private vehicle network can represent an individual's attributes and be applied in large-scale applications for analyzing the synchronization of land-use and transportation systems. [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
70. Incorporating free-floating car-sharing into an activity-based dynamic user equilibrium model: A demand-side model
- Author
-
Harry Timmermans, Qing Li, Jing Zhou, Feixiong Liao, Hai-Jun Huang, and Urban Planning and Transportation
- Subjects
Flexibility (engineering) ,050210 logistics & transportation ,Demand side ,Mathematical optimization ,Focus (computing) ,Computer science ,Activity-travel scheduling ,05 social sciences ,Transportation ,Floating car data ,Supernetwork ,010501 environmental sciences ,Management Science and Operations Research ,01 natural sciences ,Free-floating car-sharing ,Scheduling (computing) ,Mode (computer interface) ,0502 economics and business ,Multi-state supernetwork ,Representation (mathematics) ,Dynamic user equilibrium ,0105 earth and related environmental sciences ,Civil and Structural Engineering - Abstract
Free-floating car-sharing (FFC) has recently received increasing attention due to the flexibility in mobility services. Existing studies related to FFC mainly focus on the analysis of operational management and user preferences. Efforts to model the dynamic choices of free-floating shared cars (SCs) in individuals’ daily multi-modal multi-activity trip chains have still been rare. This study proposes a tolerance-based dynamic user equilibrium model of activity-travel scheduling that formulates free-floating SC as an alternative transport mode for conducting daily activities. The model embeds the choice of SC into daily trip chains by extending the state-of-the-art multi-state supernetwork representation. The dynamic traffic flows and supply-demand interactions of SCs are captured endogenously. Moreover, traveler heterogeneity and different pricing schemes are taken into account. A path-flow swapping method is suggested to solve the tolerance-based dynamic user equilibrium model. Numerical examples of various scenarios demonstrate that fleet size, distribution, and rental-parking price of FFC significantly influence the choice of SC and activity-travel pattern.
- Published
- 2018
- Full Text
- View/download PDF
71. An efficient algorithm for solving supply chain network equilibria and equivalent supernetwork based traffic network equilibria.
- Author
-
Xu, Meng and Gao, ZiYou
- Abstract
This paper is concerned with the algorithm of the supply chain network equilibrium model and its equivalent supernetwork based traffic network equilibrium model with elastic demands. Both models are further written as nonlinear complementarity problems. Semismooth least squares reformulations of the complementarity problems are presented and their convergence properties are investigated. Considering the drawbacks of Quasi-Newton method (using the Fischer-Burmeister function), a semi-smooth Levenberg-Marquardt-type method is proposed to solve the problems. Numerical examples show that the Levenberg-Marquardt-type method can solve the supply chain network equilibrium model and its equivalent supernetwork based traffic network equilibrium model significantly, and is more efficient than the Quasi Newton method and the modified projection method. Furthermore, the Levenberg-Marquardt-type method with the equivalent supernetwork based complementarity formulation can be implemented faster than with the supply chain network equilibrium complementarity formulation. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
72. Supernetwork-based-Analysis of Knowledge Diffusion Trend.
- Author
-
Yu Yang, Dang Yanzhong, Wu Jiangning, and Deng Qiuhong
- Published
- 2010
- Full Text
- View/download PDF
73. Intragenic Recombination Events and Evidence for Hybrid Speciation in Nicotiana (Solanaceae).
- Author
-
Kelly, Laura J., Leitch, Andrew R., Clarkson, James J., Hunter, Robin B., Knapp, Sandra, and Chase, Mark W.
- Abstract
Reticulate evolution may function both at the species level, through homoploid and polyploid hybridization, and below the species level, through inter and intragenic recombination. These processes represent challenges for the reconstruction of evolutionary relationships between species, because they cannot be represented adequately with bifurcating trees. We use data from low-copy nuclear genes to evaluate long-standing hypotheses of homoploid (interspecific) hybrid speciation in Nicotiana (Solanaceae) and reconstruct a complex series of reticulation events that have been important in the evolutionary history of this genus. Hybrid origins for three diploid species (Nicotiana glauca, N. linearis, and N. spegazzinii) are inferred on the basis of gene tree incongruence, evidence for interallelic recombination between likely parental alleles, and support for incompatible splits in Lento plots. Phylogenetic analysis of recombinant gene sequences illustrates that recombinants may be resolved with one of their progenitor lineages with a high posterior probability under Bayesian inference, and thus there is no indication of the conflict between phylogenetic signals that results from reticulation. Our results illustrate the importance of hybridization in shaping evolution in Nicotiana and also show that intragenic recombination may be relatively common. This finding demonstrates that it is important to investigate the possibility of recombination when aiming to detect hybrids from DNA-sequence data and reconstruct patterns of reticulate evolution between species. [ABSTRACT FROM PUBLISHER]
- Published
- 2010
- Full Text
- View/download PDF
74. The Organization Knowledge Classification Based on Supernetwork According to Knowledge Loss Degree.
- Author
-
Yu Yang and Dang Yanzhong
- Published
- 2010
- Full Text
- View/download PDF
75. Synthesis of distillation configurations. II: A search formulation for basic configurations
- Author
-
Giridhar, Arun and Agrawal, Rakesh
- Subjects
- *
FRACTIONAL distillation , *MIXTURES , *CONFIGURATION space , *SIMULATION methods & models , *CHEMICAL engineering , *MATHEMATICAL optimization , *INTEGER programming - Abstract
Abstract: It is known that there exist a combinatorially large number of multicomponent distillation column configurations for a given feed and given product specifications. In the accompanying part I of the paper, we classified configurations into basic configurations (those that use (n −1) columns for an n-component feed mixture) and non-basic configurations (those that use more than (n −1) columns for the same feed). As n exceeds four, the number of non-basic configurations greatly exceeds the number of basic configurations and have a huge impact on the size of the search space. However, through extensive calculations for a four-component feed, we have found that a non-basic configuration never has a lower heat duty than the lowest heat duty basic configuration. While prior researchers have proposed a mathematical formulation that could be used to generate only the set of basic configurations, we present an alternative supernetwork model to achieve this goal. We show how the supernetwork can be reduced to a binary integer program (BIP), and how all feasible configurations can be drawn for a given application using a suitable solver. We present different solution techniques, including parallel algorithms based on the fact that the evaluation of the performance for each configuration is independent of any other configuration. Through such a procedure, all applicable basic configurations can be rank listed for a given application according to a chosen criterion. We also extend the supernetwork formulation to a unified non-convex MINLP that can be used in a flexible way to find the best candidate configurations for a given application. We show the power of our search formulation in accommodating general separation techniques other than distillation, such as membranes, adsorption, etc. [Copyright &y& Elsevier]
- Published
- 2010
- Full Text
- View/download PDF
76. A mixed-equilibrium model of individual and household activity–travel choices in multimodal transportation networks
- Author
-
Khoa D. Vo, Zhi-Chun Li, and William H.K. Lam
- Subjects
Mathematical optimization ,Job shop scheduling ,Mathematical model ,Computer science ,business.industry ,Logit ,Transportation ,Supernetwork ,Management Science and Operations Research ,Public transport ,Automotive Engineering ,Variational inequality ,Uniqueness ,business ,Assignment problem ,Civil and Structural Engineering - Abstract
This paper develops a novel household-oriented activity-based mixed-equilibrium model for estimating individual and household activity–travel choices in multimodal transportation networks with interactions between private car and public transit modes. In the novel model, household members with heterogeneous errors of perception on the time-dependent utility of different activity types make daily joint/solo activity–travel choices in a mixed-equilibrium manner, which maximizes either perceived household utility or perceived individual utility. A logit-based stochastic choice model is developed to capture the mixed equilibrium with heterogeneous errors of perception and used to predict the choices of alternative joint activity–travel paths (JATPs) on a supernetwork platform. Based on this stochastic JATP choice model, the mixed-equilibrium model is formulated as an equivalent variational inequality (VI) problem and solved using a modified diagonalization method. This converts the time-dependent activity–travel scheduling problem into an equivalent static traffic assignment problem on JATPs. The conditions required for the existence and uniqueness of a solution to the equivalent VI problem in terms of a JATP flow pattern are also identified. Numerical examples are provided to illustrate the model’s merits and its applications for examining the effect of the coronavirus disease 2019 (COVID-19) pandemic.
- Published
- 2021
- Full Text
- View/download PDF
77. Continuum modeling of park-and-ride services in a linear monocentric city with deterministic mode choice
- Author
-
Liu, Tian-Liang, Huang, Hai-Jun, Yang, Hai, and Zhang, Xiaoning
- Subjects
- *
COMMUTERS , *TRANSPORTATION , *RAILROADS , *TRAVEL costs - Abstract
Abstract: The objective of this paper is to enhance the insights into commuters’ travel choice behaviors in a competitive railway/highway system with continuum park-and-ride services along a travel corridor. It is assumed that parking charges gradually decrease from the city center to the corridor boundary and commuters are continuously distributed along the corridor. Commuters choose either the railway or highway for traveling from their home to the center in the morning. If choosing the highway, the commuters also consider the use of park-and-ride facilities available anywhere throughout the corridor. Given these assumptions, we propose a deterministic continuum equilibrium model to characterize commuters’ modal choices and park-and-ride transfer behaviors. We prove that, at equilibrium, the variable travel cost per unit distance on the highway is not higher than that on the railway along the corridor. As a result, the railway is used only between the city center (the destinations of morning commuters) and some location in the linear city, beyond which all commuters choose the highway. Furthermore, commuters living closer to the city center choose the park-and-ride facilities that are simultaneously chosen by those who live farther away from the city center. The model is solved numerically through its transformation into a discrete version using a supernetwork approach and demonstrated with numerical examples together with a discussion of the effect of park-and-ride services and pricing on travel behaviors. [Copyright &y& Elsevier]
- Published
- 2009
- Full Text
- View/download PDF
78. Method to Analyze Robustness of Knowledge Network based on Weighted Supernetwork Model and Its Application.
- Author
-
XI, Yun-jiang and DANG, Yan-zhong
- Subjects
ROUTING (Computer network management) ,COMPUTER network security ,FIREWALLS (Computer security) ,WEBSITE security - Abstract
Abstract: The method of analyzing the robustness of a knowledge network is discussed in this article. As against a general complex network, there are two different types of nodes in a knowledge network: knowledge and knowledge owners such as persons, enterprises, and so on. To analyze the robustness of a knowledge network, both types of nodes should be taken into account. To meet the requirement, a method based on the weighted supernetwork model is proposed in which the two types of nodes are integrated together according to the relation mappings between them. On the basis of the supernetwork model, a combined node removal method is proposed. To measure the robustness of a knowledge network, some signals, such as, the unique knowledge proportion, the weighted proportion of unique knowledge, the resilience of the knowledge network, and the resilience of the core field knowledge network, are proposed and analyzed. The method proposed in this article can successfully analyze and measure the robustness of a knowledge network, and can also be applied to assess the security of a knowledge resource in an organization, to discover the knowledge points that are easily lost, and to evaluate the importance of each member in the organizational knowledge. [Copyright &y& Elsevier]
- Published
- 2007
- Full Text
- View/download PDF
79. An Approach for Weapon System-of-Systems Scheme Generation Based on a Supernetwork Granular Analysis
- Author
-
Xiao-pan Wang, Shanfei Li, Qingsong Zhao, Kewei Yang, and Yajie Dou
- Subjects
Scheme (programming language) ,0209 industrial biotechnology ,Engineering ,021103 operations research ,Computer Networks and Communications ,business.industry ,Distributed computing ,0211 other engineering and technologies ,02 engineering and technology ,Quotient space (topology) ,Supernetwork ,Computer Science Applications ,Weapon system ,Task (computing) ,020901 industrial engineering & automation ,Control and Systems Engineering ,Path (graph theory) ,Weighted network ,Electrical and Electronic Engineering ,business ,Realization (systems) ,computer ,Information Systems ,computer.programming_language - Abstract
A weapon system of systems (WSoS) is a collection of interdependent systems providing multiple interdependent capabilities to support multiple tasks. In this paper, we propose a WSoS scheme generation method based on a granular analysis of a WSoS supernetwork. More precisely, we establish a WSoS supernetwork model based on a “network-centered” combat mode. Next, based on the theory of quotient space, a granular analysis is presented to reduce the complexity of the WSoS scheme generation. Then, the WSoS supernetwork is converted into a directed weighted network with multiple granularities, and an algorithm for the WSoS scheme generation based on the directed weighted network is presented. Consequently, each WSoS scheme corresponds to a path in the directed weighted network, and the capability of supporting the realization of a task by a WSoS can be analyzed based on the schemes. Finally, the feasibility of the proposed approach is demonstrated using an illustrative example.
- Published
- 2017
- Full Text
- View/download PDF
80. EIR: Edge-aware inter-domain routing protocol for the future mobile internet
- Author
-
Dipankar Raychaudhuri, Shreyasee Mukherjee, Shravan Sriram, and Tam Vu
- Subjects
Routing protocol ,Dynamic Source Routing ,Computer Networks and Communications ,Computer science ,Distributed computing ,Routing table ,Enhanced Interior Gateway Routing Protocol ,Wireless Routing Protocol ,02 engineering and technology ,Network topology ,Routing Information Protocol ,03 medical and health sciences ,0302 clinical medicine ,Protocol overhead ,Anycast ,Convergence (routing) ,0202 electrical engineering, electronic engineering, information engineering ,Hierarchical routing ,Triangular routing ,Zone Routing Protocol ,Static routing ,Access network ,business.industry ,Inter-domain ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Policy-based routing ,Testbed ,Path vector protocol ,020206 networking & telecommunications ,Supernetwork ,Link-state routing protocol ,Optimized Link State Routing Protocol ,Routing domain ,030220 oncology & carcinogenesis ,Interior gateway protocol ,Multipath routing ,Border Gateway Protocol ,Hazy Sighted Link State Routing Protocol ,business ,Computer network - Abstract
This work describes a clean-slate inter-domain routing protocol designed to meet the needs of the future mobile Internet. In particular, we describe the edge-aware inter-domain routing (EIR) protocol which provides new abstractions, such as aggregated-nodes (aNodes) and virtual-links (vLinks) for expressing network topologies and edge network properties necessary to address mobility related routing scenarios which are inadequately supported by the border gateway protocol (BGP) in use today. Specific use-cases addressed by EIR include emerging mobility service scenarios such as multi-homing across WiFi and cellular, multipath routing over several access networks, and anycast access from mobile devices to replicated cloud services. It is shown that EIR can be used to realize efficient routing strategies for the mobility use-cases under consideration, while also providing support for a range of inter-domain routing policies currently associated with BGP. Simulation results for protocol overhead are presented for a global-scale CAIDA topology, leading to an identification of parameters necessary to obtain a good balance between overhead and routing table convergence time. A Click-based proof-of-concept implementation of EIR on the ORBIT testbed is described and used to validate performance and functionality for selected mobility use-cases, including mobile data services with open WiFi access points and mobile platforms such as buses operating in an urban area.
- Published
- 2017
- Full Text
- View/download PDF
81. Lightweight On-demand Ad hoc Distance-vector Routing - Next Generation (LOADng): Protocol, extension, and applicability
- Author
-
Thomas Clausen, Ulrich Herberg, Jiazi Yi, and École polytechnique (X)
- Subjects
Routing protocol ,Dynamic Source Routing ,Computer Networks and Communications ,computer.internet_protocol ,Computer science ,Routing table ,Distributed computing ,Enhanced Interior Gateway Routing Protocol ,Wireless Routing Protocol ,02 engineering and technology ,routing protocol ,Network topology ,Routing Information Protocol ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,LOADng ,0202 electrical engineering, electronic engineering, information engineering ,Destination-Sequenced Distance Vector routing ,Hierarchical routing ,Zone Routing Protocol ,Static routing ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Path vector protocol ,020206 networking & telecommunications ,Supernetwork ,Ad hoc wireless distribution service ,Interior Gateway Routing Protocol ,Distance-vector routing protocol ,Optimized Link State Routing Protocol ,Link-state routing protocol ,Border Gateway Protocol ,Interior gateway protocol ,reactive protocol ,low power and lossy network ,020201 artificial intelligence & image processing ,Hazy Sighted Link State Routing Protocol ,business ,computer ,Computer network - Abstract
International audience; This paper studies the routing protocol "Lightweight On-demand Ad hoc Distance-vector Routing Protocol Next Generation (LOADng)", designed to enable efficient, scalable and secure routing in low power and lossy networks. As a reactive protocol, it does not maintain a routing table for all destinations in the network, but initiates a route discovery to a destination only when there is data to be sent to that destination to reduce routing overhead and memory consumption. Designed with a modular approach, LOADng can be extended with additional components for adapting the protocol to different topologies, traffic, and data-link layer characteristics. This paper studies several such additional components for extending LOADng: support for smart route requests and expanding ring search, an extension permitting maintaining collection trees, a fast rerouting extension. All those extensions are examined from the aspects of specification, interoperability with other mechanisms, security vulnerabilities, performance and applicability. A general framework is also proposed to secure the routing protocol.
- Published
- 2017
- Full Text
- View/download PDF
82. Accessibility measures for robustness of the transport system
- Author
-
Feixiong Liao, Bert van Wee, and Urban Planning and Transportation
- Subjects
050210 logistics & transportation ,Land use ,Computer science ,Route overlap ,05 social sciences ,0211 other engineering and technologies ,021107 urban & regional planning ,Transportation ,02 engineering and technology ,Supernetwork ,Development ,Accessibility ,Travel options ,Transport engineering ,Robustness (computer science) ,SDG 15 – Leven op het land ,0502 economics and business ,Multi-state supernetwork ,Transport system ,Civil and Structural Engineering ,SDG 15 - Life on Land - Abstract
Accessibility is a key concept in transport and land use policies, and infrastructure-based measures are one important category of accessibility measures. Recently, there has been a significant increase in the attention paid in both academic literature and policy documents to the robustness of the transport system. However, there is not a mature body of literature on the infrastructure-based accessibility measures expressing this concept. This paper proposes a family of accessibility measures to express the robustness of the transport system. These have in common that they express the number of travel options between a given origin and destination, or to conduct activities. The family of measures is conceptualized by using the multi-state supernetwork approach. With respect to the travel options, we discuss (1) the overlap of travel routes, and (2) the choices of travel modes (e.g. car versus train; multimodal). With respect to the activities, we discuss (1) the choice of OD pairs as opposed to activity-travel patterns, and (2) fixed versus flexible activity locations and fixed versus flexible order of activities. We illustrate the travel options and robustness in a multi-modal transport system between the city centers of the Hague-Rotterdam-Dordrecht corridor (The Netherlands).
- Published
- 2017
- Full Text
- View/download PDF
83. Node stability-based routing in Wireless Mesh Networks
- Author
-
Mustapha Boushaba, Abdelhakim Hafid, and Michel Gendreau
- Subjects
Routing protocol ,Dynamic Source Routing ,Computer Networks and Communications ,Computer science ,Distributed computing ,Mesh networking ,Geographic routing ,02 engineering and technology ,Metrics ,Default gateway ,Computer Science::Networking and Internet Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Network performance ,Static routing ,Wireless mesh network ,Wireless network ,business.industry ,Network packet ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020206 networking & telecommunications ,Order One Network Protocol ,Supernetwork ,Computer Science Applications ,Link-state routing protocol ,Hardware and Architecture ,Shortest path problem ,Interior gateway protocol ,Expected transmission count ,020201 artificial intelligence & image processing ,Hazy Sighted Link State Routing Protocol ,business ,Computer network - Abstract
Network stability is a key performance metric in supporting real time communication over wireless networks. Because of high bandwidth demand and dynamic traffic variation, several paths in Wireless Mesh Networks (WMNs) are expected to be unstable. High levels of network instability can lead to interferences, packet losses and high delays. In this paper, we address the stability problem of WMNs. Instability in these networks is caused mainly by link quality fluctuations and frequent route flapping. First, we present the key factors that may cause network instability. Then, we propose a new technique, called Node Stability-based Routing (NSR), using the entropy function to define a node stability and a probability function to select an appropriate gateway. Simulation results show that NSR can significantly improve the overall network performance compared to techniques using interference and channel switching (MIC), Expected Transmission count (ETX) or load at gateways as a routing metric, Reinforcement learning-based best path to best gateway (RLBDR), and nearest gateway (i.e., shortest path to gateway).
- Published
- 2017
- Full Text
- View/download PDF
84. Scalable pipelined IP lookup with prefix tries
- Author
-
Ge Nong, Mounir Hamdi, and Yi Wu
- Subjects
Router ,Routing protocol ,Dynamic Source Routing ,Computer Networks and Communications ,Computer science ,Routing table ,Distributed computing ,Enhanced Interior Gateway Routing Protocol ,Throughput ,02 engineering and technology ,Prefix delegation ,Trie ,0202 electrical engineering, electronic engineering, information engineering ,Destination-Sequenced Distance Vector routing ,Static routing ,route ,business.industry ,Network packet ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Policy-based routing ,020206 networking & telecommunications ,Supernetwork ,020202 computer hardware & architecture ,Bipartite graph ,business ,Computer network - Abstract
While the throughput demand for a backbone router keeps increasing constantly, both routing and switching of packets are facing tough challenges for running faster. Currently, the prefix trie-based routing algorithms for IP lookup are playing a key role in building high performance routing systems. We propose in this article a scalable routing architecture for pipelining any prefix trie-based routing algorithm that links nodes by pointers. All the prefixes in a routing table are classified into the short and the long categories to organize as a quick table and a set of prefix tries, respectively, where the tries’ nodes are evenly distributed into multiple memory blocks using a randomization technique. Each arriving packet finds its route information by looking up the quick table at first and then traverses a corresponding prefix trie if necessary. A routing buffer is employed to cache packet arrivals that suffer memory access contentions when visiting nodes of the prefix tries. The scheduling of queuing packets to access the memory blocks is modeled as a bipartite matching problem. The performance of the proposed architecture is evaluated by investigating the memory requirements and the maximum throughput with comparison to the linear and the circular pipelines. The results for both the analytical queuing model and the simulation experiments indicate that this architecture can be a potential candidate for building high bandwidth routing engines of backbone routers.
- Published
- 2017
- Full Text
- View/download PDF
85. Trusted and Secured Routing Protocol for Vehicular Ad-Hoc Networks
- Author
-
Prodipto Das and Debasish Roy
- Subjects
Routing protocol ,Dynamic Source Routing ,Computer science ,computer.internet_protocol ,Wireless ad hoc network ,Enhanced Interior Gateway Routing Protocol ,Wireless Routing Protocol ,Throughput ,Geographic routing ,02 engineering and technology ,Source routing ,Network simulation ,Routing Information Protocol ,Ad hoc On-Demand Distance Vector Routing ,0202 electrical engineering, electronic engineering, information engineering ,Destination-Sequenced Distance Vector routing ,Hierarchical routing ,Zone Routing Protocol ,Multidisciplinary ,Vehicular ad hoc network ,Network packet ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Path vector protocol ,020206 networking & telecommunications ,Supernetwork ,Interior Gateway Routing Protocol ,Distance-vector routing protocol ,Optimized Link State Routing Protocol ,Link-state routing protocol ,Border Gateway Protocol ,Interior gateway protocol ,020201 artificial intelligence & image processing ,Hazy Sighted Link State Routing Protocol ,business ,computer ,Computer network - Abstract
Objectives: To establish a trust based secured routing protocol to accurately distinguish malicious nodes that are dropping the important information and modifying the routes. Efforts are made to identify malicious nodes such as route modifiers and packet droppers. Methods/Statistical Analysis: Vehicular Ad-hoc NETworks (VANETs) is a modern technology which help a vehicle and a driver in several ways. The main characteristics of VANETs are nodes i.e. vehicles with relatively high mobility and constantly changing topology. In case of data communication in VANETs, a source node must depend on the intermediate nodes to send its data packets to the destination node on multi-hop routes. VANETs can give better performance if all its nodes work properly with full cooperation during the communication. In VANETs, a node can generate and broadcast important and essential messages to other nodes in the network for safety reason. However, the generated message by a vehicle may not be reliable every time. In this paper we have proposed a trusted and secured routing protocol that evaluates the trust of a vehicle and also checks the message reliability. The proposed protocol is named as Trusted Vehicular Ad-hoc On-demand Distance Vector (TVAODV) routing protocol which is the modification of Ad-hoc On-demand Distance Vector routing protocol. Since VANETs are mostly attacked by the malicious nodes; therefore better security solution is needed to stop such attacks. The proposed protocol introduces a trust model to establish a malicious node free route for source node to send its data packets to the destination node on multi-hop routes. Findings: The TVAODV protocol is simulated in Network Simulator (NS2) to check the performance and accuracy and also compared to AODV routing protocol. It is found that TVAODV is comparatively better in performance when VANET is in high mobility and versatile topology. The performance of the proposed protocol is evaluated using performance measurement metrics: average end-to-end delay, throughput, routing load and packet delivery ratio. The proposed protocol performance is evaluated in the presence of malicious (route modifiers and packet droppers) vehicles and the results shows that the proposed protocol is achieved better accuracy and it shows better performance compared to AODV routing protocol. Application/Improvements: The proposed protocol may be useful in the process of developing a better traffic management and transportation system. In this paper we have proposed a TVAODV routing protocol which includes trust model to evaluate the trust of vehicles as well as to establish a malicious free route.
- Published
- 2017
- Full Text
- View/download PDF
86. Enhanced Detection of Internet Water Army Based on Supernetwork Theory
- Author
-
D. Hamithra Jothi and T. Rajasenbagam M. E.
- Subjects
Hierarchy ,business.industry ,Computer science ,020206 networking & telecommunications ,02 engineering and technology ,Supernetwork ,Identification (information) ,Statistical classification ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,The Internet ,Social media ,business ,Literature survey ,Subnetwork ,Computer network - Abstract
The hierarchy and the correct nature of the Internet has been strongly contaminated by the advent of the Internet water armies in recent years. The minute and intense identification and detection of such Internet water armies is an important task. On the basis of the Supernetwork theory, a new model is proposed in this paper that will be employed in the detection of water armies. In this model, a Supernetwork consisting of five layers including User subnetwork, Content subnetwork, Psychological subnetwork, Negative keyword subnetwork and Repeated keywords subnetwork. Literature survey is carried out on the evolution of such spammers over years. The performance of the model is tested with the dataset obtained from the online communication platform, Reddit. A comparative analysis is presented from five existing models of Internet water army detection that were introduced in previous studies.
- Published
- 2020
- Full Text
- View/download PDF
87. Research on the Identification of Key Nodes in the Process of WeChat Epidemic Information Dissemination: A Supernetwork Perspective
- Author
-
Peng Wu and Di Zhao
- Subjects
Article Subject ,020205 medical informatics ,Computer science ,Process (engineering) ,General Mathematics ,General Engineering ,Information Dissemination ,02 engineering and technology ,Supernetwork ,Engineering (General). Civil engineering (General) ,Data science ,Identification (information) ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,QA1-939 ,020201 artificial intelligence & image processing ,TA1-2040 ,Mathematics - Abstract
It is of great significance to comprehensively and reasonably identify the key nodes in the WeChat epidemic information dissemination system. First, the recognition results can be used to guide the spread of epidemic-related information in WeChat, such as accelerating the spread of valuable information or monitoring the spread of rumors. Secondly, the analysis of key nodes helps us understand the evolution of the epidemic information dissemination network in WeChat, and the analysis of key nodes also helps us understand the modes and methods of epidemic-related information dissemination in WeChat. Finally, the results of these studies may be generalized to other fields of social life. This paper analyzes the composition of and relationship between epidemic-related information dissemination systems in WeChat and proposes a Supernetwork model for WeChat epidemic information dissemination on this basis. In this study, a comprehensive identification method of key nodes of the WeChat epidemic information dissemination system under the Supernetwork vision was constructed, and the method is analyzed and verified through examples in this paper.
- Published
- 2020
88. Refugee migration networks and regulations: a multiclass, multipath variational inequality framework
- Author
-
Ladimer S. Nagurney, Anna Nagurney, and Patrizia Daniele
- Subjects
Mathematical optimization ,Control and Optimization ,Refugee ,0211 other engineering and technologies ,02 engineering and technology ,Management Science and Operations Research ,Article ,Euler method ,symbols.namesake ,Human migration ,Regulations ,Mathematics ,Refugees ,021103 operations research ,business.industry ,Applied Mathematics ,Supernetwork ,Variational inequalities ,Computer Science Applications ,Transformation (function) ,Path (graph theory) ,Variational inequality ,symbols ,Networks ,business ,Multipath propagation - Abstract
In this paper, we take up the timely topic of the modeling, analysis, and solution of refugee migration networks. We construct a general, multiclass, multipath model, determine the governing equilibrium conditions, and provide alternative variational inequality formulations in path flows and in link flows. We also demonstrate how governmental imposed regulations associated with refugees can be captured via constraints. We provide qualitative properties and then establish, via a supernetwork transformation, that the model(s) are isomorphic to traffic network equilibrium models with fixed demands. Illustrative examples are given, along with numerical examples, inspired by a refugee crisis from Mexico to the United States, which are solved using the Euler method embedded with exact equilibration. The work sets the foundation for the development of additional models and algorithms and also provides insights as to who wins and who loses under certain refugee regulations.
- Published
- 2019
89. A Supernetwork Model for ATM System Reliability Analysis
- Author
-
Daozhong Feng, Kaiquan Cai, Lian Xubing, and Lei Ding
- Subjects
System of systems ,021110 strategic, defence & security studies ,010308 nuclear & particles physics ,System Wide Information Management ,Computer science ,Reliability (computer networking) ,Node (networking) ,Distributed computing ,Air traffic management ,0211 other engineering and technologies ,Complex system ,Civil aviation ,02 engineering and technology ,Supernetwork ,01 natural sciences ,0103 physical sciences - Abstract
As the transport volume of civil aviation increases rapidly, more attention than before has been paid to the stable and reliable operation of the Air Traffic Management (ATM) system. Then, the reliability analysis of the system is in urgent need. Meantime, due to the complexity of this “system of systems” which contains a diversity of individual systems, the construction of the model which can efficiently and accurately reflect the characteristics of ATM system is crucial. After the characteristic analysis of the system, a modeling method based on the supernetwork theory is introduced in this paper. The theory specializes in characterizing the complicated structural attribute of the complex system and the interaction relationship between the system components. Furthermore, the method is applied to the modeling of the System Wide Information Management (SWIM)-based ATM system which facilitates the information access and interchange of distributed heterogeneous systems. Specifically, the supernetwork model can be divided into three subnetworks according to the user based information domains of SWIM. Considered that there remains a certain number of invalid paths between nodes within the supernetwork, five types of supply-demand flows are proposed, and based on which improvements in traditional reliability index, typically the efficiency parameters are achieved. In order to simulate the performance of the SWIM-based ATM system in the case of system failure, the reliability index of the supernetwork model is calculated under the node removal strategy. Analysis results indicate the reasonability and applicability of the reliability analysis scheme for ATM system.
- Published
- 2019
- Full Text
- View/download PDF
90. Implementing Planning for Computing in Libraries
- Author
-
Stephen R. Salmon
- Subjects
Government ,State (polity) ,Bond ,media_common.quotation_subject ,Principal (computer security) ,Institution ,Business ,Library automation ,Supernetwork ,Public administration ,media_common - Abstract
The National Science Foundation, the Office of Education, the Council on Library Resources, and a number of foundations provided millions of dollars for development of library automation activities. Once plans for library automation are firm and the institution is ready to begin implementation, the major problem is apt to be funding. Traditionally there have been three primary sources for such funds: grants from the federal government or private foundations; reallocation of existing funds; and additional appropriations from the library's normal source of funds, whether that be institutional, state appropriations, bond issues, or city and county budgets. The council has developed what it calls the Bibliographic Services Development Program, which has as its principal goal the linking of the several networks that grew up during the 1970s. As far as granting agencies are concerned, then, the trend is clear: from individual library projects to networks and from networks to a supernetwork.
- Published
- 2019
- Full Text
- View/download PDF
91. Development and implementation of systematic model-development strategy using model-based experimental design
- Author
-
Zhengkun Jiang, Laurent Falk, Jean-Marc Commenge, Jean-François Portha, Laboratoire Réactions et Génie des Procédés (LRGP), Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS), and Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)
- Subjects
Chemical process ,Computer science ,020209 energy ,General Chemical Engineering ,Context (language use) ,02 engineering and technology ,Reaction supernetwork ,Software ,Data acquisition ,020401 chemical engineering ,0202 electrical engineering, electronic engineering, information engineering ,[SPI.GPROC]Engineering Sciences [physics]/Chemical and Process Engineering ,0204 chemical engineering ,MATLAB ,Process engineering ,Plug flow reactor model ,Ethanolysis ,computer.programming_language ,business.industry ,System identification ,General Chemistry ,Supernetwork ,Model development ,[CHIM.MATE]Chemical Sciences/Material chemistry ,Model-based experimental design ,Multi-equipment strategy ,business ,computer - Abstract
Adequate and accurate models describing quantitatively the syntheses of fine and pharmaceutical chemicals are essential to optimize the performances of chemical processes. However, it is difficult, time consuming and experimentally expensive to develop such models. Appropriate, efficient and systematic strategies for model development are therefore required. In this context, the aims of this work consist in methodological development, numerical implementation and experimental validation of a systematic model-development strategy. In the first stage of this work, a methodologically systematic model-development strategy, consisting of initial data acquisition, model development, model identification, model validation and model refining modules, is developed. In the initial data acquisition module, preliminary experiments are designed and performed to provide the basic information for the initial model development. Module development module is composed of three steps: model structure development, model structure analysis and model parameter development. Model structure development is based on the reaction network proposed within the reaction supernetwork containing all feasible chemical reactions and mass transfers. For model identification, validation and refining, the model-based experimental design is performed by taking into consideration several reactors, which enlarges the explored experimental windows. In the second stage of this work, in order to facilitate the application of the strategy, a software, integrating model parameter estimation, model evaluation, model-based experimental design for model refining and performance optimization, is developed using MATLAB R2014a. The initial version of the software is suitable for the liquid-phase reaction systems, 4 ideal reactors are taken into consideration: batch stirred-tank reactor, semi-batch stirred-tank reactor, continuous stirred-tank reactor and continuous tubular reactor. In the third stage of this work, the feasibilities and generalities of the developed strategy and strategy-based software are demonstrated with two experimental case studies, relating to the valorization of sunflower oil, namely, NaOH-catalyzed ethanolysis of sunflower oil and epoxidation of sunflower oil by performic acid generated in situ.
- Published
- 2019
- Full Text
- View/download PDF
92. Multi-Inherited Search Tree for Dynamic IP Router-Tables
- Author
-
Sun-Yuan Hsieh and Po-Cheng Hsu
- Subjects
Router ,Routing protocol ,Virtual routing and forwarding ,Computer science ,computer.internet_protocol ,Routing table ,IP forwarding ,02 engineering and technology ,Parallel computing ,Loose Source Routing ,Theoretical Computer Science ,Trie ,0202 electrical engineering, electronic engineering, information engineering ,Forwarding plane ,Static routing ,route ,business.industry ,Network packet ,Supernetwork ,IPv4 ,Search tree ,020202 computer hardware & architecture ,Computational Theory and Mathematics ,Hardware and Architecture ,020201 artificial intelligence & image processing ,The Internet ,business ,computer ,Software ,Computer network - Abstract
IP lookup and routing table update affect the speed at which a router forwards packets. This study proposes a new data structure for dynamic router tables used in IP lookup and update, called the Multi-inherited Search Tree (MIST). Partitioning each prefix according to an index value and removing the relationships among prefixes enables performing IP lookup operations efficiently. Because a prefix trie is used as a substructure, memory can be consumed and dynamic router-table operations can be performed efficiently. Experiments using real IPv4 routing databases indicated that the MIST uses memory efficiently and performs lookup, insert, and delete operations effectively.
- Published
- 2017
- Full Text
- View/download PDF
93. A Survey on Approaches to Reduce BGP Interdomain Routing Convergence Delay on the Internet
- Author
-
Edjard Mota and Ricardo Bennesby da Silva
- Subjects
Routing protocol ,business.industry ,Computer science ,Distributed computing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Enhanced Interior Gateway Routing Protocol ,Policy-based routing ,020206 networking & telecommunications ,02 engineering and technology ,Supernetwork ,Link-state routing protocol ,Border Gateway Protocol ,Multipath routing ,0202 electrical engineering, electronic engineering, information engineering ,Default-free zone ,020201 artificial intelligence & image processing ,Electrical and Electronic Engineering ,business ,Computer network - Abstract
The Internet interdomain routing protocol (border gateway protocol) exhibits slow convergence. Many Internet applications suffer from the effects of its high convergence delay. In this paper, we provide an overview of the state-of-the-art methods on efforts to improve interdomain routing performance. We classified these efforts into five kinds of approaches: 1) speeding up updates; 2) limiting path exploration; 3) efficient policy configuration; 4) multipath; and 5) centralized control of the network. We detailed how each approach addresses the slow convergence problem. The goal of this paper is to provide the researchers a deep understanding on what has been done to improve Internet convergence time. We also discuss why, despite the existence of these efforts, the issue remains open.
- Published
- 2017
- Full Text
- View/download PDF
94. Scaling the Internet Routing System Through Distributed Route Aggregation
- Author
-
Andre Sousa, Jennifer Rexford, Laurent Vanbever, Joao Luis Sobrinho, and Franck Le
- Subjects
Router ,Routing protocol ,Virtual routing and forwarding ,Dynamic Source Routing ,Computer Networks and Communications ,computer.internet_protocol ,Equal-cost multi-path routing ,Computer science ,Distributed computing ,Routing table ,Enhanced Interior Gateway Routing Protocol ,IP forwarding ,Wireless Routing Protocol ,02 engineering and technology ,Network topology ,Routing Information Protocol ,Hardware_INTEGRATEDCIRCUITS ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,Hierarchical routing ,Zone Routing Protocol ,Static routing ,Network packet ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Policy-based routing ,Autonomous system (Internet) ,020206 networking & telecommunications ,Supernetwork ,Computer Science Applications ,Routing domain ,Link-state routing protocol ,Border Gateway Protocol ,Interior gateway protocol ,Default-free zone ,020201 artificial intelligence & image processing ,business ,computer ,Software ,Computer network - Abstract
The Internet routing system faces serious scalability challenges due to the growing number of IP prefixes that needs to be propagated throughout the network. Although IP prefixes are assigned hierarchically and roughly align with geographic regions, today’s Border Gateway Protocol (BGP) and operational practices do not exploit opportunities to aggregate routing information. We present DRAGON, a distributed route-aggregation technique whereby nodes analyze BGP routes across different prefixes to determine which of them can be filtered while respecting the routing policies for forwarding data-packets. DRAGON works with BGP, can be deployed incrementally, and offers incentives for Autonomous Systems (ASs) to upgrade their router software. We illustrate the design of DRAGON through a number of examples, prove its properties while developing a theoretical model of route aggregation, and evaluate its performance. Our experiments with realistic AS-level topologies, assignments of IP prefixes, and routing policies show that DRAGON reduces the number of prefixes in each AS by at least 70% with minimal stretch in the lengths of AS-paths traversed by data packets.
- Published
- 2016
- Full Text
- View/download PDF
95. High-performance IPv6 address lookup in GPU-accelerated software routers
- Author
-
Xin Yao, Junhai Zhou, Shiwen Zhang, Feng Lin, and Gang Wang
- Subjects
Static routing ,IPv6 address ,Computer Networks and Communications ,Computer science ,business.industry ,Routing table ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020206 networking & telecommunications ,02 engineering and technology ,Bloom filter ,Supernetwork ,Internet traffic ,Loose Source Routing ,Adaptive routing ,020202 computer hardware & architecture ,Computer Science Applications ,IPv6 ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Longest prefix match ,business ,Computer network - Abstract
Due to the ever-increasing physical link speed, routing table size and internet traffic, modern routers have been the major bottleneck to process packages with a high throughout. As the most time-consumption task of routers, designing efficient IP lookup schemes for IPv6 face new challenges. In this paper, we design parallel bloom filter for IPv6, and implement it on Graphics Processing Unit to develop a novel GPU-accelerated software router, GRv6. Moreover, we design two schemes to support dynamic prefix update, i.e., dynamic prefix insert scheme and dynamic prefix delete scheme. To evaluate the performance of GRv6, we implement it with NVIDIA GeForce GTX 580 and utilize 5 real-life IPv6 routing tables to demonstrate that the IP lookup engine could achieve 60 Gbps for static routing tables, and 40 Gbps for dynamic routing tables with 3000 updates per second.
- Published
- 2016
- Full Text
- View/download PDF
96. $\alpha$Route: Routing on Names
- Author
-
Raouf Boutaba, Faizul Bari, Bertrand Mathieu, Shihabur Rahman Chowdhury, Golam Rabbani, and Reaz Ahmed
- Subjects
Routing protocol ,Dynamic Source Routing ,Virtual routing and forwarding ,Computer Networks and Communications ,Computer science ,Distributed computing ,Routing table ,IP forwarding ,Enhanced Interior Gateway Routing Protocol ,02 engineering and technology ,Loose Source Routing ,Internet topology ,Distributed hash table ,Routing Information Protocol ,Information-centric networking ,Anycast ,0202 electrical engineering, electronic engineering, information engineering ,Destination-Sequenced Distance Vector routing ,Electrical and Electronic Engineering ,Triangular routing ,Static routing ,Zone Routing Protocol ,route ,business.industry ,Address space ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Policy-based routing ,020206 networking & telecommunications ,Supernetwork ,Load balancing (computing) ,Computer Science Applications ,Link-state routing protocol ,Multipath routing ,Border Gateway Protocol ,Default-free zone ,020201 artificial intelligence & image processing ,The Internet ,Content centric ,business ,Software ,Computer network - Abstract
One of the crucial building blocks for Information Centric Networking (ICN) is a name based routing scheme that can route directly on content names instead of IP addresses. However, moving the address space from IP addresses to content names brings the scalability issues to a whole new level, due to two reasons. First, name aggregation is not as trivial a task as the IP address aggregation in BGP routing. Second, the number of addressable contents in the Internet is several orders of magnitude higher than the number of IP addresses. With the current size of the Internet, name based, anycast routing is very challenging specially when routing efficiency is of prime importance. We propose a name-based routing scheme $\alpha$ Route for ICN that offers efficient bandwidth usage, guaranteed content lookup and scalable routing table size. $\alpha$ Route consists of two components: an alphanumeric Distributed Hash Table (DHT) and an overlay to underlay (Internet topology) mapping algorithm. Simulation results show that $\alpha$ Route performs significantly better than Content Centric Network (CCN) in terms of network bandwidth usage, lookup latency and load balancing.
- Published
- 2016
- Full Text
- View/download PDF
97. A Multipath Prefix Routing for Wireless Sensor Networks
- Author
-
Zahia Bidai, Moufida Maimour, Centre de Recherche en Automatique de Nancy (CRAN), Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL), Département d'Informatique [Oran], Université des sciences et de la Technologie d'Oran Mohamed Boudiaf [Oran] (USTO MB), and Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)
- Subjects
Routing protocol ,Dynamic Source Routing ,Equal-cost multi-path routing ,Computer science ,Distributed computing ,Labelling schemes ,Enhanced Interior Gateway Routing Protocol ,Tree routing ,Wireless Routing Protocol ,Geographic routing ,02 engineering and technology ,Multipath routing ,Routing Information Protocol ,ZigBee ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,0202 electrical engineering, electronic engineering, information engineering ,Destination-Sequenced Distance Vector routing ,Electrical and Electronic Engineering ,Hierarchical routing ,020203 distributed computing ,Zone Routing Protocol ,Static routing ,Spanning tree ,business.industry ,Wireless network ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Policy-based routing ,Path vector protocol ,020206 networking & telecommunications ,Supernetwork ,Wireless sensor networks ,Computer Science Applications ,Distance-vector routing protocol ,Optimized Link State Routing Protocol ,Link-state routing protocol ,Hazy Sighted Link State Routing Protocol ,business ,Wireless sensor network ,Prefix routing ,Computer network - Abstract
International audience; When a spanning tree is built on top of a wireless network and an appropriate labelling scheme is applied, the complexity of the routing mechanism in terms of memory usage and control messages can be drastically reduced using compact routing. In this paper, we propose multipath prefix routing (MPR), a multipath routing protocol for wireless sensor networks. MPR is a hybrid (both reactive and proactive) protocol that operates on an already built spanning tree rooted at the sink (the collect station). Besides the tree path, additional paths are built based on an appropriate labelling scheme and neighbourhood relationships. For practical implementation, we propose and evaluate two different labelling schemes. We mainly show that in a perfect W-ary tree, the additional number of bits required to encode labels is at most (H−1)(H−1) where H is the height of the tree. Finally, we apply MPR to the ZigBee standard and evaluate its performance using simulations. MPR has a small state routing while control messages overhead is maintained low compared to traditional multipath routing protocols.
- Published
- 2016
- Full Text
- View/download PDF
98. Exploring some characteristics of unified hybrid supernetwork theory model
- Author
-
LIU Qiang, FANG Jinqing, and LI Yong
- Subjects
supernetwork ,UHNTF ,lcsh:Science (General) ,topological feature ,lcsh:Q1-390 - Abstract
Our group has proposed the unified hybrid network theory framework (UHNTF), which has revealed complicated transition relationship of topological property. In this paper, we constructed three types of multilayer supernetwork models based on UHNTF. We have numerically studied new topological features of these supernetwork models, and revealed some interesting phenomena. This lays the foundation for further practical application of UHNTF.
- Published
- 2016
99. On Laplacian spectra of parametric families of closely connected networks with application to cooperative control
- Author
-
Alexander Veremyev, Alla R. Kammerdiner, and Eduardo L. Pasiliao
- Subjects
Mathematical optimization ,021103 operations research ,Control and Optimization ,Mathematical model ,Spectral graph theory ,Applied Mathematics ,0211 other engineering and technologies ,010103 numerical & computational mathematics ,02 engineering and technology ,Supernetwork ,Management Science and Operations Research ,Topology ,01 natural sciences ,Computer Science Applications ,Integrator ,Convergence (routing) ,0101 mathematics ,Representation (mathematics) ,Laplace operator ,Mathematics ,Parametric statistics - Abstract
In this paper, we introduce mathematical models for studying a supernetwork that is comprised of closely connected groups of subnetworks. For several related classes of such supernetworks, we explicitly derive an analytical representation of their Laplacian spectra. This work is motivated by an application of spectral graph theory in cooperative control of multi-agent networked systems. Specifically, we apply our graph-theoretic results to establish bounds on the speed of convergence and the communication time-delay for solving the average-consensus problem by a supernetwork of clusters of integrator agents.
- Published
- 2016
- Full Text
- View/download PDF
100. Border gateway protocol graph: detecting and visualising internet routing anomalies
- Author
-
Dimitrios Tzovaras, Stavros Papadopoulos, Anastasios Drosou, and Konstantinos Moustakas
- Subjects
Routing protocol ,IP hijacking ,Computer Networks and Communications ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,IP forwarding ,Network mapping ,020207 software engineering ,02 engineering and technology ,Supernetwork ,Border Gateway Protocol ,0202 electrical engineering, electronic engineering, information engineering ,Default-free zone ,020201 artificial intelligence & image processing ,The Internet ,business ,Software ,Information Systems ,Computer network - Abstract
Border gateway protocol (BGP) is the main protocol used on the Internet today, for the exchange of routing information between different networks. The lack of authentication mechanisms in BGP, render it vulnerable to prefix hijacking attacks, which raise serious security concerns regarding both service availability and data privacy. To address these issues, this study presents BGPGraph, a scheme for detecting and visualising Internet routing anomalies. In particular, BGPGraph introduces a novel BGP anomaly metric that quantifies the degree of anomaly on the BGP activity, and enables the analyst to obtain an overview of the BGP status. The analyst, is afterwards able to focus on significant time windows for further analysis, by using a hierarchical graph visualisation scheme. Furthermore, BGPGraph uses a novel method for the quantification of information visualisation that allows for the evaluation, and optimal selection of parameters, in case of the corresponding visual analytics algorithms. As a result, by utilising the proposed approach, four new BGP anomalies were able to be identified. Experimental demonstration in known BGP events, illustrates the significant analytics potential of the proposed approach in terms of identifying prefix hijacks and performing root cause analysis.
- Published
- 2016
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.