نتایج جستجو برای: network theory

تعداد نتایج: 1394020  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده علوم پزشکی 1389

introduction: diabetes mellitus is an growing national and international public health concern. the number of people affected by diabetes in world by 2030 will be 69% in developing countries. regular physical activity plays a key role in the management of type 2 diabetes melitus, particularly glycemic control. it has been recommended that peoples with type 2 diabetes participate in moderate-int...

Journal: :international journal of transportation engineereing 2015
milad haghani zahra shahhoseini majid sarvi

probabilistic approach of traffic assignment has been primarily developed to provide a more realistic and flexible theoretical framework to represent traveler’s route choice behavior in a transportation network. the problem of path overlapping in network modelling has been one of the main issues to be tackled. due to its flexible covariance structure, probit model can adequately address the pro...

2016
José Figueiredo

to be in the broad domain of social networks. Michel Callon and Bruno Latour, STS academics of the École Supérieure des Mines de Paris, are their uncontested continental parents. We can report John Law, in Lancaster University, as the leading British key proponent of ANT from the very beginning. Lancaster University provides a lot of papers’ references and sources on ANT in their site (see refe...

2012
James D. Westaby

Dynamic network theory is a multidisciplinary framework that shows how social networks influence goal pursuits in social, organizational, and international systems (Westaby, 2012). It integrates social network analysis and psychological science to provide new perspectives on goal achievement, social influence, social capital, and human complexity. This document presents a brief sampling of the ...

2008
Mohit Saxena

Recent research in the domain of network coding has promised a complete paradigm shift for wired and wireless networks. In case of wired networks, improvements in the network capacity especially magnify for multicast scenarios. For wireless networks, the inherent broadcast nature of the medium provides ample opportunities for intelligent mixing of the information. The two major benefits offered...

2009
H. B. Acharya M. G. Gouda

A widely used mechanism for computing the topology of any network in the Internet is Traceroute. Using Traceroute, one simply needs to choose any two nodes in a network and then obtain the sequence of nodes that occur between these two nodes, as specified by the routing tables in these nodes. Thus, each use of Traceroute in a network produces a trace of nodes that constitute a simple path in th...

2008
Leila Shayanpour

In many cases it is expensive or impossible to regulate the network in a systemwide manner in which the whole network is administered by a central authority. In the absence of central regulation, each user tries to rout his traffic so that minimizes his cost function. Such users, acting in a selfish manner, are not concerned about the performance of the network as a whole and hence, in noncoope...

Journal: :Physical review. E 2017
Debsankha Manik Martin Rohden Henrik Ronellenfitsch Xiaozhu Zhang Sarah Hallerberg Dirk Witthaut Marc Timme

We introduce the concept of network susceptibilities quantifying the response of the collective dynamics of a network to small parameter changes. We distinguish two types of susceptibilities: vertex susceptibilities and edge susceptibilities, measuring the responses due to changes in the properties of units and their interactions, respectively. We derive explicit forms of network susceptibiliti...

2009
Hrishikesh B. Acharya Mohamed G. Gouda

Traceroute is a widely used program for computing the topology of any network in the Internet. Using Traceroute, one starts from a node and chooses any other node in the network. Traceroute obtains the sequence of nodes that occur between these two nodes, as specified by the routing tables in these nodes. Each use of Traceroute in a network produces a trace of nodes that constitute a simple pat...

Journal: :J. Information Security 2010
Yi Luo Ferenc Szidarovszky Youssif B. Al-Nashif Salim Hariri

The interactions between attackers and network administrator are modeled as a non-cooperative non-zero-sum dynamic game with incomplete information, which considers the uncertainty and the special properties of multi-stage attacks. The model is a Fictitious Play approach along a special game tree when the attacker is the leader and the administrator is the follower. Multi-objective optimization...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید