An Opinion Evolution Model Based on Heterogeneous Benefit with Malicious Nodes Added
نویسندگان
چکیده
منابع مشابه
mortality forecasting based on lee-carter model
over the past decades a number of approaches have been applied for forecasting mortality. in 1992, a new method for long-run forecast of the level and age pattern of mortality was published by lee and carter. this method was welcomed by many authors so it was extended through a wider class of generalized, parametric and nonlinear model. this model represents one of the most influential recent d...
15 صفحه اولOn agent-based aggregation schemes in networks with malicious nodes
Mobile agents can be used to efficiently aggregate information in sensor networks. The originator aims at obtaining the correct result, even in the presence of byzantine nodes or a malicious aggregator agent. Secure information aggregation considers these situations. We propose to use a mobile agent for the hierarchical in-network aggregation scheme of Chan et al. and we introduce a greedy stra...
متن کاملIncretin action on bone: An added benefit?
Identification of the incretin hormones has led to revolutionary advances in the management of type 2 diabetes. There has been much recent excitement about the extrapancreatic actions of incretin hormones. Experimental studies have suggested that glucagon-like peptide-1 (GLP-1) could have beneficial effects on the cardiovascular system as well as the kidney, and this is currently an area of int...
متن کاملCEAACK based Detector for Malicious Nodes
MANET stands for Mobile Ad Hoc Network. The Ad Hoc network that is used for mobile communication is called MANET. The MANETS are used when the user is moving. Because MANET does not depends on fixed infrastructure. Wireless networks are used to connect with different networks in MANETs. Security is more critical in wireless communication when compared to the wired communication. So the security...
متن کاملA novel key management scheme for heterogeneous sensor networks based on the position of nodes
Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Complexity
سال: 2021
ISSN: 1099-0526,1076-2787
DOI: 10.1155/2021/6642698