Loading...
Search for: degree-distribution
0.009 seconds

    A network model for vehicular Ad hoc networks: an introduction to obligatory attachment rule

    , Article IEEE Transactions on Network Science and Engineering ; Volume 3, Issue 2 , 2016 , Pages 82-94 ; 23274697 (ISSN) Ghafourian Ghahramani, S. A. A ; Hemmatyar, A. M. A ; Kavousi, K ; Sharif University of Technology
    Abstract
    In the past few years, the study of complex networks has attracted the attention of researchers. Many real networks, ranging from technological networks such as the Internet to biological networks, have been considered as special types of complex networks. Through application of the network science, important structural properties of such networks have been analyzed and the mechanisms that form such characteristics have been introduced. In this paper, we address the structural characteristics of a technological network called Vehicular Ad hoc Networks (VANETs). Recent studies reveal that the communication graph of VANETs has some interesting characteristics including: the Gaussian degree... 

    A graph-based performance analysis of the 802.11p MAC protocol for safety communications in highway vehicular ad hoc networks

    , Article Computer Journal ; Volume 60, Issue 2 , 2017 , Pages 185-209 ; 00104620 (ISSN) Ghafourian Ghahramani, S. A. A ; Hemmatyar, A. M. A ; Sharif University of Technology
    Oxford University Press  2017
    Abstract
    We address the performance of the 802.11p protocol in terms of the packet delivery ratio (PDR) and the packet reception ratio (PRR) for broadcasting safety messages in highway environments. Regarding the semi-sparse and intermediate traffic, we try to answer to questions such as what are the upper, dominant and lower bounds of PDR and PRR in each traffic condition? How they may deviate from their average values? and What fraction of vehicles may experience such bounds? To answer to such questions, we propose to consider the communication graph formed among vehicles as a special type of the complex networks and we apply the recently proposed obligatory attachment ruleto synthesize such... 

    Modeling topological characteristics of BitTorrent-like peer-to-peer networks

    , Article IEEE Communications Letters ; Volume 15, Issue 8 , August , 2011 , Pages 896-898 ; 10897798 (ISSN) Farzad, A ; Rabiee, H. R ; Sharif University of Technology
    2011
    Abstract
    This letter presents a complex network model for the BitTorrent; the most popular peer-to-peer network. Three important topological characteristics; (i) degree distribution, (ii) clustering coefficient and (iii) average path length of this network are analytically modeled. The analytical computations are confirmed by simulations. Moreover, the accuracy of the proposed model was confirmed by exploiting a BitTorrent simulator  

    Topology and vulnerability of the Iranian power grid

    , Article Physica A: Statistical Mechanics and its Applications ; Vol. 406, issue , July , 2014 , p. 24-33 ; ISSN: 03784371 Saniee Monfared, M. A ; Jalili, M ; Alipour, Z ; Sharif University of Technology
    Abstract
    In this paper we investigated the structural properties of the ultra high voltage power transmission network of Iran. We modeled the power grid as a network with 105 nodes and 142 connection links. We found that the Iranian power grid displays a relatively moderate clustering coefficient-much larger than that of corresponding random networks-and small characteristics path length comparable to that of corresponding random networks; i.e. the power grid is a small-world network with exponential degree distribution. Global efficiency was considered as an indicator of grid's performance and the influence of random and intentional nodal failures on the efficiency was investigated. We also studied... 

    Centrality-based epidemic control in complex social networks

    , Article Social Network Analysis and Mining ; Volume 10, Issue 1 , 2020 Doostmohammadian, M ; Rabiee, H. R ; Khan, U. A ; Sharif University of Technology
    Springer  2020
    Abstract
    Recent progress in the areas of network science and control has shown a significant promise in understanding and analyzing epidemic processes. A well-known model to study epidemics processes used by both control and epidemiological research communities is the susceptible–infected–susceptible (SIS) dynamics to model the spread of disease/viruses over contact networks of infected and susceptible individuals. The SIS model has two metastable equilibria: one is called the endemic equilibrium and the other is known as the disease-free or healthy-state equilibrium. Control theory provides the tools to design control actions (allocating curing or vaccination resources) in order to achieve and...