Filters








278,525 Hits in 5.2 sec

Page 273 of American Society of Civil Engineers. Collected Journals Vol. 114, Issue 3 [page]

1988 American Society of Civil Engineers. Collected Journals  
REFERENCES Agrawal, A., and Barlow, R. E. (1984). ‘‘A survey of network reliability and domination theory.”’ Oper. Res., 32(3), 478-492. Agrawal, A., and Satyanarayana, A. (1984). ‘‘An O(IE!)  ...  Statistical theory of reliability and life testing: probability models. Holt, Rinehart, and Winston, New York, N.Y. Billinton, R. (1972).  ... 

Application of Clonal Selection Clustering Algorithm for Anomaly Detection in Network Security Management

Qian Zhang, Xiaoyu Wang, Yan Li
2015 Open Automation and Control Systems Journal  
Network security being of practical significance, the importance of network application, the network anomaly detection and the generalization ability are studied as a key link in the network security management  ...  The key technology of network security management is based on: artificial intelligence theory as the research object; the clonal selection method of anomaly detection based on fuzzy clustering algorithm  ...  Cluster Analysis Cluster analysis is to group information network on the basis of the maximum and minimum within class similarity and between class similarity.  ... 
doi:10.2174/1874444301507011482 fatcat:en3etianc5hcvnaxec45qcxwza

Application of Graph Theory in Transportation Networks

Sanjay kumar Bisen
2017 International Journal of Scientific Research and Management  
Firstly, the basic description of domination in graph theory has been introduced.  ...  The main aim of this paper has been to show the possibilities of the application of the selected domination-oriented concepts to modelling and improving the transportation and/or logistics networks.  ...  of this article has been the application of the theory of domination, in graphs and related concepts, to transportation networks analysis and modelling.  ... 
doi:10.18535/ijsrm/v5i7.48 fatcat:5fi7r3yddjhxllsuwyg5kzbutu

An outline of the three-layer survivability analysis architecture for strategic information warfare research

Zhanshan (Sam) Ma, Axel W. Krings, Frederick T. Sheldon
2009 Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research Cyber Security and Information Intelligence Challenges and Strategies - CSIIRW '09  
This architecture integrates four closely related fields: reliability analysis, survivability analysis, dynamic hybrid fault models, and agent-based computing under a unified architecture.  ...  We apply the three-layer survivability analysis architecture developed by Ma & Krings (Ma & Krings 2009 , Ma 2008 in the context of distributed networks (such as wireless sensor networks) to the study  ...  These offensive networks are in the heart of OODA loop and the intelligence of human commanders play dominant roles.  ... 
doi:10.1145/1558607.1558639 dblp:conf/csiirw/MaKS09 fatcat:wzcweg2dc5e43gbipgfuyymxua

Page 1239 of Mathematical Reviews Vol. , Issue 88c [page]

1988 Mathematical Reviews  
analogue of Hoffman’s circulation theorem for directed networks [Some recent applications of the theory of lin- ear inequalities to extremal combinatorial analysis, 113-127; Proc.  ...  The authors exploit the underlying algebraic structure of network reliability problems to develop a general iterative algo-: rithm which is applicable to arbitrary directed networks.  ... 

A complex network approach to robustness and vulnerability of spatially organized water distribution networks [article]

A. Yazdani, P. Jeffrey
2010 arXiv   pre-print
A brief discussion on the scope and limitations of the provided measurements in the analysis of operational reliability of water distribution systems is presented.  ...  Deterministic techniques from complex networks and spectral graph theory are utilized to quantify well-connectedness and estimate loop redundancy in the studied benchmark networks.  ...  However, the use of purely topological graph theory in reliability analysis of WDNs was shown to have limited scope.  ... 
arXiv:1008.1770v2 fatcat:epeyt32tyfcefhqnk6uauukk3e

Data Analytics of Social Networking sites using Game Theory Model

2019 International Journal of Engineering and Advanced Technology  
The application under this research work is based on two giants of the social networking sites viz Facebook and Instagram.  ...  The primary requirement of a Game theory model is to have such competitors or says players and their interaction parameters.  ...  The social network perspective provides various methods for analysis of the structure of the social entities and also variety of theories explaining the patterns within these structures.  ... 
doi:10.35940/ijeat.f1332.0986s319 fatcat:tosqirnhrrgclksxgovpdivbi4

Non-dominated Sorting Genetic Algorithms-IIBased on Multi-objective Optimization Model in the Water Distribution System

Mingming Li, Shuming Liu, Ling Zhang, Huanhuan Wang, Fanlin Meng, Lu Bai
2012 Procedia Engineering  
In order to make the water distribution network design more scientific and reasonable, the economy and reliability analysis should be considered.  ...  MATLAB and EPANET platform, along with a non-dominated sorting genetic algorithm (NSGA-) are applied to solve the optimization problem.  ...  biological evolution theory and genetic theory.  ... 
doi:10.1016/j.proeng.2012.04.245 fatcat:mqew45fcbzgyhnthn3pdx525da

Identification of the dominant harmonic source in the LV network on the base of anomalous power flows considerations

H. Schau, A. Novitskiy
2005 2005 IEEE Russia Power Tech  
Based on the analysis carried out it is shown that the direction of harmonic active power flows is a more common and reliable criterion in comparison with the correlation analysis for the identification  ...  analysis of the harmonic voltage and current phasors.  ...  The direction of harmonic active power flow is a more common and reliable criterion in comparison with the correlation analysis for the identification of dominant harmonic sources in electric power systems  ... 
doi:10.1109/ptc.2005.4524730 fatcat:urgzl3debbbxnfsbel45tyjsvy

MATHEMATICAL RELIABILITY THEORY: FROM THE BEGINNING TO THE PRESENT TIME [chapter]

Richard E. Barlow
2003 Mathematical and Statistical Methods in Reliability  
It is argued that the mathematical theory of reliability as a separate discipline began in 1961 with the publication of Multi-component systems and their structures and their reliability by Birnbaum, Esary  ...  Prior to this time, mathematicians were just applying standard mathematical techniques such as queueing theory, statistics and probability to engineering reliability problems.  ...  Arne Huseby in 1984 provided a more abstract unified theory of domination and signed domination with application to exact reliability calculation.  ... 
doi:10.1142/9789812795250_0001 fatcat:vp6625tf3jbmfcowj6rnsnrmti

Page 551 of Mathematical Reviews Vol. , Issue 90A [page]

1990 Mathematical Reviews  
and network reliability.  ...  Stabler, Jr., Logic grammar and lin- guistic theories (pp. 335-345).  ... 

Multiobjective Optimization of Water Distribution Networks Using Fuzzy Theory and Harmony Search

Zong Geem
2015 Water  
Results show that the model successfully found a Pareto set of multiobjective design solutions in terms of cost minimization and reliability maximization.  ...  The velocity reliability index is included in the existing cost optimization formulation and this extended multiobjective formulation is applied to two bench-mark problems.  ...  HS applications include structural design [30] , geotechnical analysis [31] , road property analysis [32] , groundwater management [33] , and project scheduling [34] .  ... 
doi:10.3390/w7073613 fatcat:w4vjk4boxjgdpjzlq3yaq5i6ha

Robust and resilient critical infrastructure systems

J. Chandra, W.A. Wallace
2003 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the  
Topics include system trustworthiness in information warfare environment, fault tolerant design for mobile wireless networks, and system reliability analysis for electric power distribution systems.  ...  First session concentrates on the modeling and analysis of some specific networked systems.  ... 
doi:10.1109/hicss.2003.1173872 fatcat:jtmaxfvhp5eeffqdksnmf6jyb4

Application of Graph Theory Concepts in Computer Networks and its Suitability for the Resource Provisioning Issues in Cloud Computing-A Review

Kanniga Devi Rangaswamy, Murugaboopathi Gurusamy
2018 Journal of Computer Science  
Hence, this paper begins with exploration of graph theory applications in computer networks with specific focus on graph theory applications in cloud computing.  ...  Graph-based representations of complex networks provide simpler views and graph theoretical techniques provide simpler solutions for lot of issues inherent in networks.  ...  Conclusion and Future Work In this study, an analysis is done on the application of graph theory concepts in computer networks and its suitability to address resource provisioning issues in cloud.  ... 
doi:10.3844/jcssp.2018.163.172 fatcat:ltbdhpra4nd4bd5r7jek4cjtqu

Analysis of the reliability of the components of a multiservice communication network based on the theory of fuzzy sets

Alevtina Aleksandrovna Muradova, Aybek Fayzullaevich Khaytbaev
2021 TELKOMNIKA (Telecommunication Computing Electronics and Control)  
networks, communication centers and information distribution, and her Ph.D. in models and algorithms of a research of reliability indicators of a multiservice communication network.  ...  The article presents the results of modeling the solution to the problem of determining the reliability of the components of a multiservice communication network (MCN) based on the theory of fuzzy sets  ...  ACKNOWLEDGEMENTS This work was supported by Ministry for development of information technologies and communications of the Uzbekistan Republic under the Research program through Scientific-Research Centre  ... 
doi:10.12928/telkomnika.v19i5.19854 fatcat:4ac2kc37gvhx5eukoqm2gjear4
« Previous Showing results 1 — 15 out of 278,525 results