Skip to main content

Showing 1–40 of 40 results for author: Singh, Y N

.
  1. arXiv:2404.01704  [pdf, other

    cs.NI

    Application of S-band for Protection in Multi-band Flexible-Grid Optical Networks

    Authors: Varsha Lohani, Anjali Sharma, Yatindra Nath Singh

    Abstract: The core network is experiencing bandwidth capacity constraints as internet traffic grows. As a result, the notion of a Multi-band flexible-grid optical network was established to increase the lifespan of an optical core network. In this paper, we use the C+L band for working traffic transmission and the S-band for protection against failure. Furthermore, we compare the proposed method with the ex… ▽ More

    Submitted 2 April, 2024; originally announced April 2024.

    Comments: First Draft

  2. arXiv:2311.11565  [pdf, other

    cs.NI

    Protected Working Groups-based Resilient Resource Provisioning in MCF-enabled SDM-EONs

    Authors: Anjali Sharma, Varsha Lohani, Yatindra Nath Singh

    Abstract: Space Division Multiplexed- Elastic Optical Networks using Multicore Fibers are a promising and viable solution to meet the increasing heterogeneous bandwidth demands. The extra capacity gained due to spatial parameters in SDM-EONs could encounter detrimental losses if any link fails and timely restoration is not done. This paper proposes a Protected and Unprotected Working Core Groups assignment… ▽ More

    Submitted 20 November, 2023; originally announced November 2023.

  3. arXiv:2310.09020   

    cs.NI cs.GT

    Credit Blockchain for Faster Transactions in P2P Energy Trading

    Authors: Amit kumar Vishwakarma, Yatindra Nath Singh

    Abstract: P2P trading of energy can be a good alternative to incentivize distributed non-conventional energy production and meet the burgeoning energy demand. For efficient P2P trading, a free market for trading needs to be established while ensuring the information reliability, security, and privacy. Blockchain has been used to provide this framework, but it consumes very high energy and is slow. Further,… ▽ More

    Submitted 21 November, 2023; v1 submitted 13 October, 2023; originally announced October 2023.

    Comments: I am submitting the paper to another journal

    MSC Class: NA ACM Class: F.2.2

  4. arXiv:2303.13965  [pdf, other

    cs.NI

    Generalized Distance Metric for Various DHT Routing Algorithms in Peer-to-Peer Networks

    Authors: Rashmi Kushwaha, Shreyas Kulkarni, Yatindra Nath Singh

    Abstract: We present a generalized distance metric that can be used to implement routing strategies and identify routing table entries to reach the root node for a given key, in a DHT (Distributed Hash Table) network based on either Chord, Kademlia, Tapestry, or Pastry. The generalization shows that all the above four DHT algorithms are in fact, the same algorithm but with different parameters in distance r… ▽ More

    Submitted 28 February, 2024; v1 submitted 24 March, 2023; originally announced March 2023.

    Comments: 8 pages, 4 figures, 14 Tables

  5. arXiv:2206.04933  [pdf, other

    cs.NI

    Availability-Aware Dynamic RSA with Protection using Consecutive Sub-Channels

    Authors: Varsha Lohani, Anjali Sharma, Yatindra Nath Singh

    Abstract: Flexible grid Optical Networks provide efficient spectrum utilization by employing the mechanisms to provide flexibility in the optical channel (spectrum slot) sizes. One of the research problems in Flexible grid Optical Networks is their survivability against failure. On the other hand, p-Cycles have not found practical use due to the significant compute time required for finding optimal configur… ▽ More

    Submitted 10 June, 2022; originally announced June 2022.

  6. arXiv:2112.07831  [pdf, other

    cs.NI

    Optimal Slot Size under Various Bandwidth Distributions in the Flexible-grid Optical Networks

    Authors: Varsha Lohani, Anjali Sharma, Yatindra Nath Singh

    Abstract: Flexible grid Optical Networks are efficient mechanism to provide flexibility in the optical spectrum utilization. For such networks, the slot width size as specified by the ITU-T G.694.1 is 12.5 GHz. However, one should question if it is the optimal grid size? In this paper, under different bandwidth distribution scenarios, we review which slot size give appropriate spectrum efficiency. Moreover,… ▽ More

    Submitted 14 December, 2021; originally announced December 2021.

  7. Dynamic Routing and Spectrum Assignment based on the Availability of Consecutive Sub-channels in Flexi-grid Optical Networks

    Authors: Varsha Lohani, Anjali Sharma, Yatindra Nath Singh

    Abstract: Using Optical Orthogonal Frequency Multiplexing (O-OFDM), variable bandwidth channels can be created in Elastic Optical Networks (EON). This allows the use of spectrum more efficiently by allocating integral multiple of basic bandwidth slots to the lightpath requests. Consequently, such networks are also called flexible grid optical networks. It also adds a constraint of kee** all the allocated… ▽ More

    Submitted 2 October, 2021; v1 submitted 16 May, 2021; originally announced May 2021.

  8. A Vectored Fragmentation Metric for Elastic Optical Networks

    Authors: Anjali Sharma, Varsha Lohani, Yatindra Nath Singh

    Abstract: When circuits are set up and dismantled dynamically in elastic optical networks, spectrum tends to become fragmented in the fiber links. The fragmentation limits the available path choices and may lead to significant blocking of connection requests. There are two types of fragmentation in the network spectrum in the links due to contiguity constraints and over the paths due to continuity. Study of… ▽ More

    Submitted 17 February, 2021; originally announced February 2021.

    Comments: 11 pages

    Journal ref: Photonic Network Communication, 2022, (https://rdcu.be/cYvcV)

  9. Sub-Graph p-cycle formation for span failures in all-Optical Networks

    Authors: Varsha Lohani, Anjali Sharma, Yatindra Nath Singh

    Abstract: p-Cycles offer ring-like switching speed and mesh-like spare capacity efficiency for protecting network against link failures. This makes them extremely efficient and effective protection technique. p-Cycles can also protect all the links in a network against simultaneous failures of multiple links. But it has been mostly studied for single link failure scenarios in the networks with the objective… ▽ More

    Submitted 15 February, 2021; originally announced February 2021.

  10. arXiv:1909.00760  [pdf, other

    cs.NI

    On Partial Coverage and Connectivity Relationship in Deterministic WSN Topologies

    Authors: Rameshwar Nath Tripathi, Kumar Gaurav, Yatindra Nath Singh

    Abstract: The primary function of a sensor network is to perform the sensing task. For proper sensing, the coverage and connectivity property of the network must be maintained. Relationship between coverage and connectivity has been extensively investigated for full coverage scenarios. But, investing in full coverage incurs unnecessary cost when partial coverage is sufficient. In this work, we focus on the… ▽ More

    Submitted 2 September, 2019; originally announced September 2019.

  11. arXiv:1808.03780  [pdf, other

    cs.CY

    Going Viral: The Epidemiological Strategy of Referral Marketing

    Authors: Sayantari Ghosh, Saumik Bhattacharya, Kumar Gaurav, Yatindra Nath Singh

    Abstract: By now, Internet word-of-mouth marketing has established its importance for almost every kind of products. When word-of-mouth spread of a marketing campaign goes viral, the success of its strategy has been proved to be path-breaking for the firms. The current study is designed to extend knowledge about customer response to these campaigns, and is focused on the motivations that lead them to differ… ▽ More

    Submitted 11 August, 2018; originally announced August 2018.

    Comments: 25 pages, 7 figures

  12. arXiv:1806.08274  [pdf, other

    cs.NI

    Impact Zone Analysis of p-Cycle

    Authors: Pallavi Athe, Yatindra Nath Singh

    Abstract: Pre-configured cycle (p-Cycle) method has been studied in literature extensively for optical network protection. A large p-cycle has high capacity efficiency and can protect a large number of nodes against the single link failure scenarios. All the links protected by such a p-cycle lose protection when the p-cycle is consumed to restore traffic after a failure. As the probability of multiple link… ▽ More

    Submitted 21 June, 2018; originally announced June 2018.

  13. arXiv:1806.03932  [pdf, other

    eess.SY

    Analysis of Average Consensus Algorithm for Asymmetric Regular Networks

    Authors: Sateeshkrishna Dhuli, Y. N. Singh

    Abstract: Average consensus algorithms compute the global average of sensor data in a distributed fashion using local sensor nodes. Simple execution, decentralized philosophy make these algorithms suitable for WSN scenarios. Most of the researchers have studied the average consensus algorithms by modeling the network as an undirected graph. But, WSNs in practice consist of asymmetric links and the undirecte… ▽ More

    Submitted 18 August, 2018; v1 submitted 11 June, 2018; originally announced June 2018.

    Comments: 7 pages, 7 figures

  14. Convergence Rate Analysis for Periodic Gossip Algorithms in Wireless Sensor Networks

    Authors: S. Kouachi, Sateeshkrishna Dhuli, Y. N. Singh

    Abstract: Periodic gossip algorithms have generated a lot of interest due to their ability to compute the global statistics by using local pairwise communications among nodes. Simple execution, robustness to topology changes, and distributed nature make these algorithms quite suitable for wireless sensor networks (WSN). However, these algorithms converge to the global statistics after certain rounds of pair… ▽ More

    Submitted 14 August, 2018; v1 submitted 7 May, 2018; originally announced May 2018.

    Comments: 10 pages, 7 figures

  15. arXiv:1702.07992  [pdf, ps, other

    cs.NI

    Simplified Biased Contribution Index (SBCI): A Mechanism to Make P2P Network Fair and Efficient for Resource Sharing

    Authors: Sateesh Kumar Awasthi, Yatindra Nath Singh

    Abstract: To balance the load and to discourage the free-riding in peer-to-peer (P2P) networks, many incentive mechanisms and policies have been proposed in recent years. Global peer ranking is one such mechanism. In this mechanism, peers are ranked based on a metric called contribution index. Contribution index is defined in such a manner that peers are motivated to share the resources in the network. Fair… ▽ More

    Submitted 26 February, 2017; originally announced February 2017.

  16. arXiv:1701.00898  [pdf, other

    cs.NI

    Double Link Failure Protection using a Single P-cycle

    Authors: Pallavi Athe, Yatindra Nath Singh

    Abstract: In this letter, we investigate survivability in optical networks for protection from two simultaneous link failures. Failure probability of two links with overlap** protection can be high if these links are geographically close. In a network with deterministic single link protection, simultaneous failure of two links may lead to partial or full loss of traffic on the failed links. Two link failu… ▽ More

    Submitted 3 May, 2017; v1 submitted 4 January, 2017; originally announced January 2017.

  17. arXiv:1609.06888   

    eess.SY cs.NI

    Analysis of Network Robustness for Finite Sized Wireless Sensor Networks

    Authors: Sateeshkrishna Dhuli, Chakravarthy Gopi, Yatindra Nath Singh

    Abstract: Studying network robustness for wireless sensor networks(WSNs) is an exciting topic of research as sensor nodes often fail due to hardware degradation, resource constraints, and environmental changes. The application of spectral graph theory to networked systems has generated several important results. However, previous research has often failed to consider the network parameters, which is crucial… ▽ More

    Submitted 1 April, 2021; v1 submitted 22 September, 2016; originally announced September 2016.

    Comments: Paper has some fundamental mistakes in calculations. So we would like to withdraw our work from arxiv

  18. arXiv:1606.00717  [pdf, ps, other

    cs.NI

    Biased Contribution Index: A Simpler Mechanism to Maintain Fairness in Peer to Peer Network

    Authors: Sateesh Kumar Awasthi, Yatindra Nath Singh

    Abstract: To maintain fairness, in the terms of resources shared by an individual peer, a proper incentive policy is required in a peer to peer network. This letter proposes, a simpler mechanism to rank the peers based on their resource contributions to the network. This mechanism will suppress the free riders from downloading the resources from the network. Contributions of the peers are biased in such a w… ▽ More

    Submitted 2 June, 2016; originally announced June 2016.

  19. arXiv:1603.00589  [pdf, ps, other

    cs.NI

    Generalized Analysis of Convergence of Absolute Trust in Peer to Peer Networks

    Authors: Sateesh Kumar Awasthi, Yatindra Nath Singh

    Abstract: Open and anonymous nature of peer to peer networks provides an opportunity to malicious peers to behave unpredictably in the network. This leads the lack of trust among the peers. To control the behavior of peers in the network, reputation system can be used. In a reputation system, aggregation of trust is a primary issue. Algorithm for aggregation of trust should be designed such that, it can con… ▽ More

    Submitted 2 March, 2016; originally announced March 2016.

  20. arXiv:1601.01419  [pdf, ps, other

    cs.NI cs.CR

    Absolute Trust: Algorithm for Aggregation of Trust in Peer-to- Peer Networks

    Authors: Sateesh Kumar Awasthi, Yatindra Nath Singh

    Abstract: To mitigate the attacks by malicious peers and to motivate the peers to share the resources in peer-to-peer networks, several reputation systems have been proposed in the past. In most of them, the peers evaluate other peers based on their past interactions and then aggregate this information in the whole network. However such an aggregation process requires approximations in order to converge at… ▽ More

    Submitted 7 January, 2016; originally announced January 2016.

  21. arXiv:1601.01245  [pdf

    cs.NI

    Loop Free Multipath Routing Algorithm

    Authors: Rashmi Singh, Yatindra Nath Singh, Anita Yadav

    Abstract: Single path routing that is currently used in the internet routers,is easy to implement as it simplifies the routing tables and packet flow paths. However it is not optimal and has shortcomings in utilizing the network resources optimally, load balancing & fast recovery in case of faults (fault tolerance). The given algorithm resolves all these problems by using all possible multiple paths for tra… ▽ More

    Submitted 6 January, 2016; originally announced January 2016.

  22. arXiv:1509.07989  [pdf, ps, other

    cs.NI cs.DC

    Resource allocation in Peer-to-Peer Networks: A Control-Theoretical Perspective

    Authors: Nitin Singha, Ruchir Gupta, Yatindra Nath Singh

    Abstract: P2P system rely on voluntary allocation of resources by its members due to absence of any central controlling authority. This resource allocation can be viewed as classical control problem where feedback is the amount of resource received, which controls the output i.e. the amount of resources shared back to the network by the node. The motivation behind the use of control system in resource alloc… ▽ More

    Submitted 24 December, 2015; v1 submitted 26 September, 2015; originally announced September 2015.

  23. arXiv:1507.05409  [pdf, other

    cs.CV

    A Parameter-free Affinity Based Clustering

    Authors: Bhaskar Mukhoty, Ruchir Gupta, Y. N. Singh

    Abstract: Several methods have been proposed to estimate the number of clusters in a dataset; the basic ideal behind all of them has been to study an index that measures inter-cluster separation and intra-cluster cohesion over a range of cluster numbers and report the number which gives an optimum value of the index. In this paper we propose a simple, parameter free approach that is like human cognition to… ▽ More

    Submitted 11 January, 2016; v1 submitted 20 July, 2015; originally announced July 2015.

  24. arXiv:1412.3102  [pdf, other

    cs.NI

    Analysis of Average Travel Time for Stateless Opportunistic Routing Techniques

    Authors: Sateeshkrishna Dhuli, Yatindra Nath Singh

    Abstract: Wireless network applications, such as, searching, routing, self stabilization and query processing can be modeled as random walks on graphs. Stateless Opportunistic routing technique is a robust distributed routing technique based on random walk approach, where nodes transfer the packets to one of their direct neighbors uniformly, until the packets reach their destinations. Simplicity in executio… ▽ More

    Submitted 9 December, 2014; originally announced December 2014.

    Comments: 6 pages, 12 figures. arXiv admin note: text overlap with arXiv:1412.2934

  25. arXiv:1412.2934   

    cs.NI

    Network Criticality Analysis for Finite Sized Wireless Sensor Networks

    Authors: Sateeshkrishna Dhuli, Yatindra Nath Singh

    Abstract: The topology of a sensor network changes very frequently due to node failures because of power constraints or physical destruction. Robustness to topology changes is one of the important design factors of wireless sensor networks which makes them suitable to military, communications, health and surveillance applications. Network criticality is a measure which capture the properties of network robu… ▽ More

    Submitted 30 March, 2021; v1 submitted 9 December, 2014; originally announced December 2014.

    Comments: Paper has some fundamental mistakes. Hence, we would like to withdraw the same

  26. arXiv:1411.4577  [pdf, other

    math.DS

    Exact Analysis of Synchronizability for Complex Networks using Regular Graphs

    Authors: Sateeshkrishna Dhuli, Y. N. Singh

    Abstract: Network synchronization is an emerging phenomenon in complex networks. The spectrum of Laplacian matrix will be immensely helpful for getting the network dynamics information. Especially, network synchronizability is characterized by the ratio of second smallest eigen value to largest eigen value of the Laplacian matrix. We study the synchronization of complex networks modeled by regular graphs. W… ▽ More

    Submitted 17 November, 2014; originally announced November 2014.

    Comments: 6 pages, 12 figures

  27. Convergence Analysis for Regular Wireless Consensus Networks

    Authors: Sateeshkrishna Dhuli, Kumar Gaurav, Y. N. Singh

    Abstract: Average consensus algorithms can be implemented over wireless sensor networks (WSN), where global statistics can be computed using communications among sensor nodes locally. Simple execution, robustness to global topology changes due to frequent node failures and underlying distributed philosophy has made consensus algorithms more suitable to WSNs. Since these algorithms are iterative in nature, t… ▽ More

    Submitted 22 September, 2016; v1 submitted 4 November, 2014; originally announced November 2014.

    Comments: 10 pages, 19 figures

    Journal ref: IEEE Sensors Journal, 2015, Volume: 15 Issue: 8, Page(s): 4522-4531

  28. arXiv:1310.5985  [pdf

    cs.NI cs.DC cs.SI

    Adaptive Push-Then-Pull Gossip Algorithm for Scale-free Networks

    Authors: Ruchir Gupta, Abhijeet C. Maali, Yatindra Nath Singh

    Abstract: Real life networks are generally modelled as scale free networks. Information diffusion in such networks in decentralised environment is a difficult and resource consuming affair. Gossip algorithms have come up as a good solution to this problem. In this paper, we have proposed Adaptive First Push Then Pull gossip algorithm. We show that algorithm works with minimum cost when the transition round… ▽ More

    Submitted 22 October, 2013; originally announced October 2013.

  29. arXiv:1310.4291  [pdf

    cs.NI

    Approaches to Maintain Bi-connectivity for Resilience in Overlaid Multicasting

    Authors: Ashutosh Singh, Yatindra Nath Singh

    Abstract: Application layer multicast (ALM) also called Overlay Multicast, is an attractive alternative solution to most of the problems associated with IP multicast. In ALM, multicast-related functionalities are moved to end-hosts. Application layer multicast builds a peer-to-peer (P2P) overlay topology consisting of end-to-end unicast connections between end-hosts. The key advantages, overlays offer, are… ▽ More

    Submitted 2 March, 2017; v1 submitted 16 October, 2013; originally announced October 2013.

  30. arXiv:1309.3628  [pdf

    cs.NI

    Multipath Approach for Reliability in Query Network based Overlaid Multicasting

    Authors: Ashutosh Singh, Yatindra Nath Singh

    Abstract: In Application layer multicast (ALM) also called Overlay Multicast, multicast-related functionalities are moved to end-hosts. The key advantages, overlays offers, are flexibility, adaptability and ease of deployment [1]. Application layer multicast builds a peer-to-peer (P2P) overlay multicast tree topology consisting of end-to-end unicast connections between end-hosts. End users self organize the… ▽ More

    Submitted 14 September, 2013; originally announced September 2013.

  31. arXiv:1309.2254  [pdf

    cs.IT

    Design of Two Dimensional Unipolar (Optical) Orthogonal Codes Through One Dimensional Unipolar (Optical) Orthogonal Codes

    Authors: Ram Chandra Singh Chauhan, Yatindra Nath Singh, Rachna Asthana

    Abstract: In this paper, an algorithm for construction of multiple sets of two dimensional (2D) or matrix unipolar (optical) orthogonal codes has been proposed. Representations of these 2D codes in difference of positions representation (DoPR) have also been discussed along-with conventional weighted positions representation (WPR) of the code. This paper also proposes less complex methods for calculation of… ▽ More

    Submitted 9 September, 2013; originally announced September 2013.

  32. arXiv:1309.2250  [pdf

    cs.IT

    A Search Algorithm to Find Multiple Sets of One Dimensional Unipolar (Optical) Orthogonal Codes with Same Code-length and Low Weight

    Authors: R. C. S. Chauhan, Y. N. Singh, R. Asthana

    Abstract: This paper describes a search algorithm to find multiple sets of one dimensional unipolar (optical) orthogonal codes characterized by parameters, binary code sequence of length (n bits) and weight w (number of bit 1s in the sequence) as well as auto-correlation and cross-correlation constraint respectively for the codes within a set. For a given code length n and code weight w all possible differe… ▽ More

    Submitted 9 September, 2013; originally announced September 2013.

  33. arXiv:1309.0193  [pdf

    cs.IT

    Design of Minimum Correlated, Maximal Clique Sets of One-Dimensional Uni-polar (Optical) Orthogonal Codes

    Authors: Ram Chandra Singh Chauhan, Yatindra Nath Singh, Rachna Asthana

    Abstract: This paper proposes an algorithm to search a family of multiple sets of minimum correlated one dimensional uni-polar (optical) orthogonal codes (1-DUOC) or optical orthogonal codes (OOC) with fixed as well as variable code parameters. The cardinality of each set is equal to upper bound. The codes within a set can be searched for general values of code length, code weight, auto-correlation constrai… ▽ More

    Submitted 1 September, 2013; originally announced September 2013.

  34. A Reputation Based Framework to Avoid Free-riding in Unstructured Peer-to-Peer network

    Authors: Ruchir Gupta, Yatindra Nath singh

    Abstract: Free riding is a major problem in peer-to-peer networks. Reputation management systems are generally proposed to overcome this problem. In this paper we have discussed a possible way of resource allocation on the basis of reputation management system i.e. probabilistic allocation based on reputation. This seems to be a better way for allocation of resources because in this case nodes that do not h… ▽ More

    Submitted 25 July, 2013; originally announced July 2013.

  35. arXiv:1307.5057  [pdf, ps, other

    cs.NI cs.MA

    Avoiding Whitewashing in Unstructured Peer-to-Peer Resource Sharing Network

    Authors: Ruchir Gupta, Yatindra Nath Singh

    Abstract: In peer-to-peer file sharing network, it is hard to distinguish between a legitimate newcomer and a whitewasher. This makes whitewashing a big problem in peer-to-peer networks. Although the problem of whitewashing can be solved using permanent identities, it may take away the right of anonymity for users. In this paper, we a have proposed a novel algorithm to avoid this problem when network uses f… ▽ More

    Submitted 18 July, 2013; originally announced July 2013.

  36. arXiv:1304.1649  [pdf, ps, other

    cs.NI

    Trust Estimation in Peer-to-Peer Network Using BLUE

    Authors: Ruchir Gupta, Yatindra Nath Singh

    Abstract: In peer-to-peer networks, free riding is a major problem. Reputation management systems can be used to overcome this problem. Reputation estimation methods generally do not consider the uncertainties in the inputs. We propose a reputation estimation method using BLUE (Best Linear Unbiased estimator) estimator that consider uncertainties in the input variables.

    Submitted 5 April, 2013; originally announced April 2013.

    Comments: arXiv admin note: substantial text overlap with arXiv:1210.4301

  37. arXiv:1301.4204  [pdf, other

    cs.NI cs.DC

    DSAT-MAC : Dynamic Slot Allocation based TDMA MAC protocol for Cognitive Radio Networks

    Authors: Rajeev K. Shakya, Satyam Agarwal, Y. N. Singh, Nishchal K. Verma, Amitabha Roy

    Abstract: Cognitive Radio Networks (CRN) have enabled us to efficiently reuse the underutilized radio spectrum. The MAC protocol in CRN defines the spectrum usage by sharing the channels efficiently among users. In this paper we propose a novel TDMA based MAC protocol with dynamically allocated slots. Most of the MAC protocols proposed in the literature employ Common Control Channel (CCC) to manage the reso… ▽ More

    Submitted 17 January, 2013; originally announced January 2013.

    Comments: 19 pages, 20 figures, Initial work in proc. of the Ninth IEEE International Conference on Wireless and Optical Communications Networks (IEEE WOCN-2012), Indore, INDIA, 20-22 September, 2012

  38. Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm

    Authors: Ruchir Gupta, Y. N. Singh

    Abstract: Reputation aggregation in peer to peer networks is generally a very time and resource consuming process. Moreover, most of the methods consider that a node will have same reputation with all the nodes in the network, which is not true. This paper proposes a reputation aggregation algorithm that uses a variant of gossip algorithm called differential gossip. In this paper, estimate of reputation is… ▽ More

    Submitted 28 January, 2014; v1 submitted 16 October, 2012; originally announced October 2012.

  39. arXiv:1208.6063  [pdf, ps, other

    cs.SI physics.soc-ph

    Nonlinear spread of rumor and inoculation strategies in the nodes with degree dependent tie strength in complex networks

    Authors: Anurag Singh, Yatindra Nath Singh

    Abstract: In earlier rumor spreading models, at each time step nodes contact all of their neighbors. In more realistic scenario it is possible that a node may contact only some of its neighbors to spread the rumor. Therefore it is must in real world complex networks, the classic rumor spreading model need to be modified to consider the dependence of rumor spread rate on the degree of the spreader and the in… ▽ More

    Submitted 29 August, 2012; originally announced August 2012.

    Comments: 27 pages 15 figures

    Journal ref: Acta Physica Polonica B Vol. 44, No. 1, January 2013, page 5

  40. arXiv:1203.5874  [pdf, ps, other

    cs.NI

    Optimizing Channel Access for Event-Driven Wireless Sensor Networks: Analysis and Enhancements

    Authors: Rajeev K. Shakya, Yatindra Nath Singh, Nishchal K. Verma

    Abstract: We study the problem of medium access control in domain of event-driven wireless sensor networks (WSNs). In this kind of WSN, sensor nodes send data to sink node only when an event occurs in the monitoring area. The nodes in this kind of WSNs encounter correlated traffic as a subset of nodes start sending data by sensing a common event simultaneously. We wish to rethink of medium access control (M… ▽ More

    Submitted 20 May, 2012; v1 submitted 27 March, 2012; originally announced March 2012.

    Report number: tr-1225141594