Loading...
Search for: critical-nodes
0.006 seconds

    An Optimization Model for Train Rescheduling Problem in a Disrupted Rail Network

    , M.Sc. Thesis Sharif University of Technology Bafandkar, Shayan (Author) ; Shafahi, Yousef (Supervisor)
    Abstract
    Nowadays a lot of people from all around the world travel by inter-city trains and this phenomenon is the direct result of the fact that this travel mode is more affordable and relatively comfortable in comparison to other modes. Furthermore, recent developments such as the emergence of high-speed rail lines have made rail transportation able to compete with other means of transportation such as airplanes. Therefore, the practice of maximizing train networks’ resilience against probable disruptions has drawn significant attention to itself. This study introduces a novel methodology in which train network resilience can be maximized through three stages. In the first stage, the critical nodes... 

    A novel matrix based systematic approach for vulnerability assessment

    , Article COMPEL - The International Journal for Computation and Mathematics in Electrical and Electronic Engineering ; 2020 Sabouhi, H ; Doroudi, A ; Fotuhi Firuzabad, M ; Bashiri, M ; Sharif University of Technology
    Emerald Group Holdings Ltd  2020
    Abstract
    Purpose: This paper aims to propose a novel matrix-based systematic approach for vulnerability assessment. Design/methodology/approach: The proposed method consists of two major steps. First, the power network is modeled as a topological combination of edges (transmission lines, transformers, etc.) and nodes (buses, substations, etc.). The second step is to use an axiomatic design-based index for topology analysis. This index is based on the systematic counting of possible routes from the start (generators) to destination (loads), considering load importance, before and after a disruption. Findings: The effectiveness of the proposed method is demonstrated through an illustrative example and... 

    Identifying monitoring nodes in MANET by detecting unauthorized and malicious nodes

    , Article International Symposium on Information Technology 2008, ITSim, Kuala Lumpur, 26 August 2008 through 29 August 2008 ; Volume 3 , 2008 ; 9781424423286 (ISBN) Kuchaki Rafsanjani, M ; Movaghar, A ; Sharif University of Technology
    2008
    Abstract
    Mobile ad hoc networks have different characteristics from wired networks. There are new challenges related to security issues that need to be addressed. In this paper, first, critical nodes and authentication in mobile ad hoc networks are discussed. Then, a monitoring nodes selection method with high battery power in these networks is presented. We propose a three-phase detection scheme. In the first phase, unauthorized nodes and in the second phase, malicious nodes are detected. Finally in the third phase, nodes with the largest battery power as monitoring nodes are considered. In the first and the second phases, detection scheme uses non-interactive zero knowledge technique in order to...