network nodes
Recently Published Documents





2022 ◽  
Vol 11 (3) ◽  
pp. 1-10
Sudhakar Sengan ◽  
Osamah Ibrahim Khalaf ◽  
Ganga Rama Koteswara Rao ◽  
Dilip Kumar Sharma ◽  
Amarendra K. ◽  

An ad hoc structure is self-organizing, self-forming, and system-free, with no nearby associations. One of the significant limits we must focus on in frameworks is leading. As for directions, we can send the packet or communications from the sender to the recipient node. AODV Routing Protocol, a short display that will make the tutorial available on demand. Machine Learning (ML) based IDS must be integrated and perfected to support the detection of vulnerabilities and enable frameworks to make intrusion decisions while ML is about their mobile context. This paper considers the combined effect of stooped difficulties along the way, problems at the medium get-right-of-area to impact layer, or pack disasters triggered by the remote control going off route. The AODV as the Routing MANET protocol is used in this work, and the process is designed and evaluated using Support Vector Machine (SVM) to detect the malicious network nodes.

2022 ◽  
Vol 9 ◽  
Wenbo Song ◽  
Wei Sheng ◽  
Dong Li ◽  
Chong Wu ◽  
Jun Ma

The network topology of complex networks evolves dynamically with time. How to model the internal mechanism driving the dynamic change of network structure is the key problem in the field of complex networks. The models represented by WS, NW, BA usually assume that the evolution of network structure is driven by nodes’ passive behaviors based on some restrictive rules. However, in fact, network nodes are intelligent individuals, which actively update their relations based on experience and environment. To overcome this limitation, we attempt to construct a network model based on deep reinforcement learning, named as NMDRL. In the new model, each node in complex networks is regarded as an intelligent agent, which reacts with the agents around it for refreshing its relationships at every moment. Extensive experiments show that our model not only can generate networks owing the properties of scale-free and small-world, but also reveal how community structures emerge and evolve. The proposed NMDRL model is helpful to study propagation, game, and cooperation behaviors in networks.

2022 ◽  
Vol 12 (2) ◽  
pp. 813
Chaofeng Liu ◽  
He Yin ◽  
Yixin Sun ◽  
Ling Wang ◽  
Xiaodong Guo

Accurately identifying the key nodes of the road network and focusing on its management and control is an important means to improve the robustness and invulnerability of the road network. In this paper, a classification and identification method of key nodes in urban road networks based on multi-attribute evaluation and modification was proposed. Firstly, the emergency function guarantee grade of road network nodes was divided by comprehensively considering the importance of road network nodes, the consequences of failure, and the degree of difficulty of recovery. The evaluation indexes were selected according to the local attributes, global attributes, and functional attributes of the road network topology. The spatial distribution patterns of the evaluation indexes of the nodes were analyzed. The dynamic classification method was used to cluster the attributes of the road network nodes, and the TOPSIS method was used to comprehensively evaluate the importance ranking of the road network nodes. Attribute clustering of road network nodes by dynamic classification method (DT) and the TOPSIS method was used to comprehensively evaluate the ranking of the importance of road network nodes. Then, combined with the modification of the comprehensive evaluation and ranking of the importance of the road network nodes, the emergency function support classification results of the road network nodes were obtained. Finally, the method was applied to the road network within the second Ring Road of Beijing. It was compared with the clustering method of self-organizing competitive neural networks. The results show that this method can identify the key nodes of the road network more accurately. The first-grade key nodes are all located at the more important intersections on expressways and trunk roads. The spatial distribution pattern shows a “center-edge” pattern, and the important traffic corridors of the road network show a “five vertical and five horizontal” pattern.

2022 ◽  
Song Tang ◽  
Zhiqiang Wang ◽  
Jian Jiang ◽  
Suli Ge ◽  
GaiFang Tan

Abstract With the continuous development of blockchain technology and the emergence of application scenarios, consensus algorithms are still the bottleneck restricting the number of network nodes and data writing efficiency that blockchain can support. How to improve the performance of alliance blockchains safely and efficiently has become an urgent problem to be solved at present. For the practical Byzantine fault tolerance algorithm (PBFT) commonly used in alliance blockchains, there are some problems, such as large communication overhead, simple selection of master nodes, and inability to expand and exit nodes dynamically in the network. This paper proposes an improved algorithm tPBFT (trust-based practical Byzantine algorithm), which is suitable for the high-frequency transaction scenario of alliance chains and introduces a trust interest scoring mechanism between network nodes to adjust the list of consensus nodes dynamically, simplify the PBFT consensus process and reduce the interaction overhead between network nodes. Theoretical analysis and experiments show that the improved tPBFT algorithm can effectively reduce the amount of information interaction between nodes, improve consensus efficiency and support more network nodes.

Sensors ◽  
2022 ◽  
Vol 22 (1) ◽  
pp. 387
Krystian Chachuła ◽  
Tomasz Michał Słojewski ◽  
Robert Nowak

Illegal discharges of pollutants into sewage networks are a growing problem in large European cities. Such events often require restarting wastewater treatment plants, which cost up to a hundred thousand Euros. A system for localization and quantification of pollutants in utility networks could discourage such behavior and indicate a culprit if it happens. We propose an enhanced algorithm for multisensor data fusion for the detection, localization, and quantification of pollutants in wastewater networks. The algorithm processes data from multiple heterogeneous sensors in real-time, producing current estimates of network state and alarms if one or many sensors detect pollutants. Our algorithm models the network as a directed acyclic graph, uses adaptive peak detection, estimates the amount of specific compounds, and tracks the pollutant using a Kalman filter. We performed numerical experiments for several real and artificial sewage networks, and measured the quality of discharge event reconstruction. We report the correctness and performance of our system. We also propose a method to assess the importance of specific sensor locations. The experiments show that the algorithm’s success rate is equal to sensor coverage of the network. Moreover, the median distance between nodes pointed out by the fusion algorithm and nodes where the discharge was introduced equals zero when more than half of the network nodes contain sensors. The system can process around 5000 measurements per second, using 1 MiB of memory per 4600 measurements plus a constant of 97 MiB, and it can process 20 tracks per second, using 1.3 MiB of memory per 100 tracks.

2022 ◽  
Myrthe G. Rijpma ◽  
Winson F.Z. Yang ◽  
Gianina Toller ◽  
Giovanni Battistella ◽  
Arseny A. Sokolov ◽  

Sensors ◽  
2021 ◽  
Vol 22 (1) ◽  
pp. 128
Tomasz Górski

Ensuring a production-ready state of the application under development is the imminent feature of the Continuous Delivery (CD) approach. In a blockchain network, nodes communicate and store data in a distributed manner. Each node executes the same business application but operates in a distinct execution environment. The literature lacks research focusing on continuous practices for blockchain and Distributed Ledger Technology (DLT). Specifically, it lacks such works with support for both design and deployment. The author has proposed a solution that takes into account the continuous delivery of a business application to diverse deployment environments in the DLT network. As a result, two continuous delivery pipelines have been implemented using the Jenkins automation server. The first pipeline prepares a business application whereas the second one generates complete node deployment packages. As a result, the framework ensures the deployment package in the actual version of the business application with the node-specific up-to-date version of deployment configuration files. The Smart Contract Design Pattern has been used when building a business application. The modeling aspect of blockchain network installation has required using Unified Modeling Language (UML) and the UML Profile for Distributed Ledger Deployment. The refined model-to-code transformation generates deployment configurations for nodes. Both the business application and deployment configurations are stored in the GitHub repositories. For the sake of verification, tests have been conducted for the electricity consumption and supply management system designed for prosumers of renewable energy.

Sign in / Sign up

Export Citation Format

Share Document