期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
The Immense Impact of Reverse Edges on Large Hierarchical Networks
1
作者 Haosen Cao Bin-Bin Hu +7 位作者 Xiaoyu Mo Duxin Chen Jianxi Gao Ye Yuan Guanrong Chen Tamás Vicsek Xiaohong Guan Hai-Tao Zhang 《Engineering》 SCIE EI CAS CSCD 2024年第5期240-249,共10页
Hierarchical networks are frequently encountered in animal groups,gene networks,and artificial engineering systems such as multiple robots,unmanned vehicle systems,smart grids,wind farm networks,and so forth.The struc... Hierarchical networks are frequently encountered in animal groups,gene networks,and artificial engineering systems such as multiple robots,unmanned vehicle systems,smart grids,wind farm networks,and so forth.The structure of a large directed hierarchical network is often strongly influenced by reverse edges from lower-to higher-level nodes,such as lagging birds’howl in a flock or the opinions of lowerlevel individuals feeding back to higher-level ones in a social group.This study reveals that,for most large-scale real hierarchical networks,the majority of the reverse edges do not affect the synchronization process of the entire network;the synchronization process is influenced only by a small part of these reverse edges along specific paths.More surprisingly,a single effective reverse edge can slow down the synchronization of a huge hierarchical network by over 60%.The effect of such edges depends not on the network size but only on the average in-degree of the involved subnetwork.The overwhelming majority of active reverse edges turn out to have some kind of“bunching”effect on the information flows of hierarchical networks,which slows down synchronization processes.This finding refines the current understanding of the role of reverse edges in many natural,social,and engineering hierarchical networks,which might be beneficial for precisely tuning the synchronization rhythms of these networks.Our study also proposes an effective way to attack a hierarchical network by adding a malicious reverse edge to it and provides some guidance for protecting a network by screening out the specific small proportion of vulnerable nodes. 展开更多
关键词 SYNCHRONIZABILITY large hierarchical networks Reverse edges Information flows Complex networks
下载PDF
Risk Management of Clinical Reference Dosimetry of a Large Hospital Network Using Statistical Process Control 被引量:1
2
作者 Seng-Boh Lim Thomas LoSasso +2 位作者 Maria Chan Laura Cervino Dale Michael Lovelock 《International Journal of Medical Physics, Clinical Engineering and Radiation Oncology》 2021年第3期119-131,共13页
Managing TG-51 reference dosimetry in a large hospital network can be a challenging task. The objectives of this study are to investigate the effectiveness of using Statistical Process Control (SPC) to manage TG-51 wo... Managing TG-51 reference dosimetry in a large hospital network can be a challenging task. The objectives of this study are to investigate the effectiveness of using Statistical Process Control (SPC) to manage TG-51 workflow in such a network. All the sites in the network performed the annual reference dosimetry in water according to TG-51. These data were used to cross-calibrate the same ion chambers in plastic phantoms for monthly QA output measurements. An energy-specific dimensionless beam quality cross-calibration factor, <img src="Edit_6bfb9907-c034-4197-97a7-e8337a7fc21a.png" width="20" height="19" alt="" />, was derived to monitor the process across multiple sites. The SPC analysis was then performed to obtain the mean, <img src="Edit_c630a2dd-f714-4042-a46e-da0ca863cb41.png" width="30" height="20" alt="" /> , standard deviation, <span style="font-size:6.5pt;font-family:;" "=""><span style="white-space:normal;"><span style="font-size:6.5pt;font-family:"">&sigma;</span><span style="white-space:nowrap;"><sub><i>k</i></sub></span></span></span>, the Upper Control Limit (UCL) and Lower Control Limit (LCL) in each beam. This process was first applied to 15 years of historical data at the main campus to assess the effectiveness of the process. A two-year prospective study including all 30 linear accelerators spread over the main campus and seven satellites in the network followed. The ranges of the control limits (±3σ) were found to be in the range of 1.7% - 2.6% and 3.3% - 4.2% for the main campus and the satellite sites respectively. The wider range in the satellite sites was attributed to variations in the workflow. Standardization of workflow was also found to be effective in narrowing the control limits. The SPC is effective in identifying variations in the workflow and was shown to be an effective tool in managing large network reference dosimetry. 展开更多
关键词 TG-51 DOSIMETRY Process Control Risk Management large Hospital network
下载PDF
A Fast Method for Shortest-Path Cover Identification in Large Complex Networks
3
作者 Qiang Wei Guangmin Hu +1 位作者 Chao Shen Yunfei Yin 《Computers, Materials & Continua》 SCIE EI 2020年第5期705-724,共20页
Fast identifying the amount of information that can be gained by measuring a network via shortest-paths is one of the fundamental problem for networks exploration and monitoring.However,the existing methods are time-c... Fast identifying the amount of information that can be gained by measuring a network via shortest-paths is one of the fundamental problem for networks exploration and monitoring.However,the existing methods are time-consuming for even moderate-scale networks.In this paper,we present a method for fast shortest-path cover identification in both exact and approximate scenarios based on the relationship between the identification and the shortest distance queries.The effectiveness of the proposed method is validated through synthetic and real-world networks.The experimental results show that our method is 105 times faster than the existing methods and can solve the shortest-path cover identification in a few seconds for large-scale networks with millions of nodes and edges. 展开更多
关键词 network discovery shortest-path cover shortest-path distance query large complex networks
下载PDF
AN IDENTITY-BASED KEY AGREEMENT SCHEME FOR LARGE SCALE SENSOR NETWORKS
4
作者 Yang Lijun Wu Meng Ding Chao 《Journal of Electronics(China)》 2013年第6期574-586,共13页
To solve the problems of high memory occupation, low connectivity and poor resiliency against node capture, which existing in the random key pre-distribution techniques while applying to the large scale Wireless Senso... To solve the problems of high memory occupation, low connectivity and poor resiliency against node capture, which existing in the random key pre-distribution techniques while applying to the large scale Wireless Sensor Networks (WSNs), an Identity-Based Key Agreement Scheme (IBKAS) is proposed based on identity-based encryption and Elliptic Curve Diffie-Hellman (ECDH). IBKAS can resist man-in-the-middle attacks and node-capture attacks through encrypting the key agreement parameters using identity-based encryption. Theoretical analysis indicates that comparing to the random key pre-distribution techniques, IBKAS achieves significant improvement in key connectivity, communication overhead, memory occupation, and security strength, and also enables efficient secure rekcying and network expansion. Furthermore, we implement IBKAS for TinyOS-2.1.2 based on the MICA2 motes, and the experiment results demonstrate that IBKAS is feasible for infrequent key distribution and rekeying for large scale sensor networks. 展开更多
关键词 large scale Wireless Sensor networks (WSNs) network security Key agreement Iden-tity-based cryptography
下载PDF
Estimation of Data Transfer Routes Fractal Dimension in Large Scale Networks
5
作者 Yuriy Danik Yuriy Kulakov +1 位作者 Vladimir Vorotnikov Igor Gumenyuk 《Journal of Mathematics and System Science》 2016年第1期38-45,共8页
The article is devoted to the evaluation of fractal properties of routing data in computer large scale networks. Implemented the study of percolation network topological structures of large dimension and made their tr... The article is devoted to the evaluation of fractal properties of routing data in computer large scale networks. Implemented the study of percolation network topological structures of large dimension and made their transformation into fractal macrostructure. An example of calculating the fractal dimension of the data path for the boundary of the phase transition between the states of network connectivity. The dependence of the fractal dimension of the percolation cluster on the size of the square δ-cover and conductivity value network of large dimension. It is shown that for the value of the fractal dimension of the route dc ≈ 1.5, network has a stable dynamics of development and size of clusters are optimized with respect to the current load on the network. 展开更多
关键词 large scale network percolation cluster fractal dimension ROUTING
下载PDF
GBP-WAHSN:A Group-Based Protocol for Large Wireless Ad Hoc and Sensor Networks 被引量:1
6
作者 Jaime Lloret Miguel Garcia +1 位作者 Jesus Tomás Fernando Boronat 《Journal of Computer Science & Technology》 SCIE EI CSCD 2008年第3期461-480,共20页
Grouping nodes gives better performance to the whole network by diminishing the average network delay and avoiding unnecessary message forwarding and additional overhead. Many routing protocols for ad-hoc and sensor n... Grouping nodes gives better performance to the whole network by diminishing the average network delay and avoiding unnecessary message forwarding and additional overhead. Many routing protocols for ad-hoc and sensor networks have been designed but none of them are based on groups. In this paper, we will start defining group-based topologies, and then we will show how some wireless ad hoc sensor networks (WAHSN) routing protocols perform when the nodes are arranged in groups. In our proposal connections between groups are established as a function of the proximity of the nodes and the neighbor's available capacity (based on the node's energy). We describe the architecture proposal, the messages that are needed for the proper operation and its mathematical description. We have also simulated how much time is needed to propagate information between groups. Finally, we will show a comparison with other architectures. 展开更多
关键词 group-based protocol group-based architecture group-based routing algorithm large networks
原文传递
MRHCA: a nonparametric statistics based method for hub and co-expression module identification in large gene co-expression network
7
作者 Yu Zhang Sha Cao +3 位作者 Jing Zhao Burair Alsaihati Qin Ma Chi Zhang 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2018年第1期40-55,共16页
Background: Gene co-expression and differential co-expression analysis has been increasingly used to study co- functional and co-regulatory biological mechanisms from large scale transcriptomics data sets. Methods: ... Background: Gene co-expression and differential co-expression analysis has been increasingly used to study co- functional and co-regulatory biological mechanisms from large scale transcriptomics data sets. Methods: In this study, we develop a nonparametric approach to identify hub genes and modules in a large co- expression network with low computational and memory cost, namely MRHCA. Results: We have applied the method to simulated transcriptomics data sets and demonstrated MRHCA can accurately identify hub genes and estimate size of co-expression modules. With applying MRHCA and differential co- expression analysis to E. coil and TCGA cancer data, we have identified significant condition specific activated genes in E. coil and distinct gene expression regulatory mechanisms between the cancer types with high copy number variation and small somatic mutations. Conclusion: Our analysis has demonstrated MRItCA can (i) deal with large association networks, (ii) rigorously assess statistical significance for hubs and module sizes, (iii) identify co-expression modules with low associations, (iv) detect small and significant modules, and (v) allow genes to be present in more than one modules, compared with existing methods. 展开更多
关键词 gene co-expression network algorithm for large scale networks analysis statistical significance of gene co-expression Mutual Rank
原文传递
Multi-Wavelength Ultra-Weak Fiber Bragg Grating Arrays for Long-Distance Quasi-Distributed Sensing 被引量:3
8
作者 Wenjing GAO Jianxia LIU +3 位作者 Huiyong GUO Xin JIANG Shaofa SUN Haihu YU 《Photonic Sensors》 SCIE EI CSCD 2022年第2期185-195,共11页
Fiber Bragg grating(FBG)array,consisting of a number of sensing units in a single optical fiber,can be practically applied in quasi-distributed sensing networks.Serious signal crosstalk occurring between large-serial ... Fiber Bragg grating(FBG)array,consisting of a number of sensing units in a single optical fiber,can be practically applied in quasi-distributed sensing networks.Serious signal crosstalk occurring between large-serial of identical FBGs,however,has limited the further increase in the number of sensing units,thus restricting applications only for short-distance sensing networks.To reduce the signal crosstalk,we design two novel types of 10-kilometer-long FBG arrays with 10000 equally spaced gratings,written on-line using a customized grating inscription system,which is affiliated to a drawing tower.Main factors causing signal crosstalk,such as spectral shadowing and multiple reflections,are firstly investigated in theory.Consistent with the theoretical findings,experimental results are proving that ultra-weak(the reflectivity of—40 dB)and multi-wavelength gratings of a number more than 10000 can be readily identified,with satisfied low crosstalk.The maximum attenuation of grating signal and minimum signal-to-noise ratio(SNR)in a single-wavelength array are 10.69 dB and 5.62 dB,respectively.As a comparison,by increasing the number of central wavelengths to three,the attenuation can be effectively reduced to 5.54dB and the minimum SNR has been improved to 8.14 dB.The current study significantly enhances the multiplexing capacity of FBG arrays and demonstrates promising potentials for establishing large-capacity quasi-distributed sensing networks. 展开更多
关键词 Multi-wavelength gratings array large scale sensing network crosstalk ultra-weak grating
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部