نتایج جستجو برای: hidden node effect
تعداد نتایج: 1859524 فیلتر نتایج به سال:
Link prediction has been widely used to extract missing information, identify spurious interactions, evaluate network evolving mechanisms, and so on. In this context, similaritybased algorithms have become the mainstream. However, most of them take into account the contributions of each common neighbor equally to the connection likelihood of two nodes. This paper proposes a model for link predi...
This article presents description of the simulation study of the low rate wireless personal area networks, defined by the IEEE 802.15.4 standard. The obtained results make available an evaluation of the effective transmission rate of a transmission channel, the resistance to the phenomenon of hidden station as well as sensibility to the problem of the exposed node. Index Terms – low rate wirele...
The effects of hidden nodes can lead to erroneous identification of connections among measured nodes in a network. For example, common input from a hidden node may cause correlations among a pair of measured nodes that could be misinterpreted as arising from a direct connection between the measured nodes. We present an approach to control for effects of hidden nodes in networks driven by a repe...
Given a complex geospatial network with nodes distributed in a two-dimensional region of physical space, can the locations of the nodes be determined and their connection patterns be uncovered based solely on data? We consider the realistic situation where time series/signals can be collected from a single location. A key challenge is that the signals collected are necessarily time delayed, due...
The hidden-node problem has been shown to be a major source of Quality-of-Service (QoS) degradation in Wireless Sensor Networks (WSNs) due to factors such as the limited communication range of sensor nodes, link asymmetry and the characteristics of the physical environment. In wireless contention-based Medium Access Control protocols, if two nodes that are not visible to each other transmit to ...
Abstract We study the type of distributions that restricted Boltzmann machines (RBMs) with different activation functions can express by investigating effect function hidden nodes on marginal distribution they impose observed binary nodes. report an exact expression for these marginals in form a model interacting variables explicit interactions depending node function. properties detail and eva...
We introduce an over-sketching interface for feature-preserving surface mesh editing. The user sketches a stroke that is the suggested position of part of a silhouette of the displayed surface. The system then segments all image-space silhouettes of the projected surface, identifies among all silhouette segments the best matching part, derives vertices in the surface mesh corresponding to the s...
Tor’s Hidden Services allow a server to offer a service anonymously through the Tor network. Hidden Services are associated with an identity key and need to publish descriptors that allow clients to locate introduction points to which the hidden service has already established anonymous circuits. As Biryukov et al. show [2], in the current Hidden Service design, a Tor Node that is in position t...
in the qur'an, men and women are equal in terms of human dignity and spiritual interest and faith; but god did not speak to women immediately and directly; especially in law verses, god speaks to men directly but he speaks to women as a third person (hidden person). in this paper, this problem has been analyzed in view of divine-social tasks in the quran and it became clear that god has gi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید