Results 1-7 of 7.
piyatumrong
![]() Fiscarelli, Antonio Maria ![]() ![]() in Scientific Reports (2021) Detailed reference viewed: 133 (27 UL)![]() Esmaeilzadeh Dilmaghani, Saharnaz ![]() ![]() ![]() in Heuristics for Optimization and Learning (2020) We consider the problem of automatizing network generation from inter-organizational research collaboration data. The resulting networks promise to obtain crucial advanced insights. In this paper, we ... [more ▼] We consider the problem of automatizing network generation from inter-organizational research collaboration data. The resulting networks promise to obtain crucial advanced insights. In this paper, we propose a method to convert relational data to a set of networks using a single parameter, called Linkage Threshold (LT). To analyze the impact of the LT-value, we apply standard network metrics such as network density and centrality measures on each network produced. The feasibility and impact of our approach are demonstrated by using a real-world collaboration data set from an established research institution. We show how the produced network layers can reveal insights and patterns by presenting a correlation matrix. [less ▲] Detailed reference viewed: 167 (26 UL)![]() Esmaeilzadeh Dilmaghani, Saharnaz ![]() ![]() in Frontiers in Big Data (2019), 2 Detailed reference viewed: 175 (23 UL)![]() Esmaeilzadeh Dilmaghani, Saharnaz ![]() ![]() Scientific Conference (2019, February 25) We consider the problem of automatically generating networks from data of collaborating researchers. The objective is to apply network analysis on the resulting network layers to reveal supplemental ... [more ▼] We consider the problem of automatically generating networks from data of collaborating researchers. The objective is to apply network analysis on the resulting network layers to reveal supplemental patterns and insights of the research collaborations. In this paper, we describe our data-to-networks method, which automatically generates a set of logical network layers from the relational input data using a linkage threshold. We, then, use a series of network metrics to analyze the impact of the linkage threshold on the individual network layers. Moreover, results from the network analysis also provide beneficial information to improve the network visualization. We demonstrate the feasibility and impact of our approach using real-world collaboration data. We discuss how the produced network layers can reveal insights and patterns to direct the data analytics more intelligently. [less ▲] Detailed reference viewed: 173 (33 UL)![]() Dorronsoro, Bernabé ![]() ![]() in Optimizing AEDB Broadcasting Protocol with Parallel Multi-objective Cooperative Coevolutionary NSGAII (2014) Detailed reference viewed: 147 (1 UL)![]() Piyatumrong, Apivadee ![]() Doctoral thesis (2010) Delay-tolerant mobile ad hoc network (DT-MANETs) feature frequent and long duration partitioned MANETs. It is a challenged environment where end-to-end connectivity cannot always be obtained. Furthermore ... [more ▼] Delay-tolerant mobile ad hoc network (DT-MANETs) feature frequent and long duration partitioned MANETs. It is a challenged environment where end-to-end connectivity cannot always be obtained. Furthermore, communication in such network is heavily relying on collaboration between nodes since there is no central authority. Limited resources of communication nodes present another facet of problems in such network. Moreover, the communication is typically done using wireless technologies which are sharing among communication nodes. In order to provide a better quality of service in such environment, topology management technique is used to help controlling network topology. The aim is to manage network resource and to enhance efficiency of communication. In this work, we proposed to do it by constructing an efficient and robust tree-based topology. We model the environment using dynamic and partitioned graph. Under such circumstances, protocols must withstand topology and condition changing. In summary, doing topology management in DT-MANETs encounters the following issues: cooperation among nodes, limitation of resources of mobile node, sharing medium, dynamic and partitioned topology and unrealistic and unscalable approach of centralized algorithm in such environment. This study focuses on managing tree-based topology in DT-MANETs. A set of active links is managed such that the deterioration of network is avoid and the quality of service in DT-MANETs is enhanced. Efficiency and robustness metrics are proposed accordingly. This work proposed to use different quality criteria based on communication node and edge for the selection topology. Both single- and multi-objectives tree-based topology are studied. Algorithms for managing tree-based topology are proposed according to different objectives. All proposed algorithms are purely decentralized, asynchronous algorithm and use one-hop information. [less ▲] Detailed reference viewed: 184 (2 UL)![]() Piyatumrong, Apivadee ![]() ![]() ![]() in IAIT (2009) This paper presents three distributed and decentralized strategies used for token traversal in spanning forest over Mobile Ad Hoc Delay Tolerant Networks. Such networks are characterized by behaviors like ... [more ▼] This paper presents three distributed and decentralized strategies used for token traversal in spanning forest over Mobile Ad Hoc Delay Tolerant Networks. Such networks are characterized by behaviors like disappearance of mobile devices, connection disruptions, network partitioning, etc. Techniques based on tree topologies are well known for increasing the efficiency of network protocols and/or applications, such as Dynamicity Aware - Graph Relabeling System (DA-GRS). One of the main features of these tree based topologies is the existence of a token traversing in every tree. The use of tokens enables the creation and maintenance of spanning trees in dynamic environments. Subsequently, managing tree-based backbones relies heavily on the token behavior. An efficient and optimal token traversal can highly impact the design of the tree and its usage. In this article, we present a comparison of three distributed and decentralized techniques available for token management, which are Randomness, TABU and Depth First Search. [less ▲] Detailed reference viewed: 158 (0 UL) |
||