Topological structure of complex networks and its importance in diffusion
The availability of huge data, due to the tremendous storage capacity of modern computers has allowed the systematic collection, and high processing speed has permitted analysis on that data by researchers on a scale far larger than previously possible. Due to this, complex network formatio...
| Main Authors: | Mahesar, Abdul Waheed, Chandio, Fida Hussain, Shaikh Awadz, Azlina, Naqvi, H. F., Nizamani, Qurat-Ul-Ain, Wahiddin, Mohamed Ridza |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
University of Sindh Jamshoro, Pakistan
2015
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/40259/ http://irep.iium.edu.my/40259/1/40259_topological_structure_of_complex_networks.pdf |
Similar Items
Node status detection and information diffusion in router network using scale-free network
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
Two-mode complex network modeling of dengue epidemic in Selangor, Malaysia
by: Mahmood Malik, Hafiz Abid, et al.
Published: (2014)
by: Mahmood Malik, Hafiz Abid, et al.
Published: (2014)
Formal analysis of weighted longitudinal routers network via scale-free network: a case study
by: Chandio, Fida Hussain, et al.
Published: (2015)
by: Chandio, Fida Hussain, et al.
Published: (2015)
Availability evaluation of scalable complex networks
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2012)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2012)
Analyzing the weighted dark networks using scale-free network approach
by: Mahesar, Abdul Waheed, et al.
Published: (2015)
by: Mahesar, Abdul Waheed, et al.
Published: (2015)
The importance of building a conscience in business actions
by: Wahiddin, Mohamed Ridza
Published: (2016)
by: Wahiddin, Mohamed Ridza
Published: (2016)
A real-time integrated fire detection and alarm (FDA) system for network based building automation
by: Anwar, Farhat, et al.
Published: (2017)
by: Anwar, Farhat, et al.
Published: (2017)
Calculus and its applications in scale-free networks
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
Cardioid graph based ECG biometric using compressed QRS complex
by: Iqbal, Fatema-tuz-Zohra, et al.
Published: (2015)
by: Iqbal, Fatema-tuz-Zohra, et al.
Published: (2015)
Two-mode network modeling and analysis of dengue epidemic behaviour in Gombak, Malaysia
by: Malik, Hafiz Abid Mahmood, et al.
Published: (2017)
by: Malik, Hafiz Abid Mahmood, et al.
Published: (2017)
Secure annihilation of out-of-band authorization for
online transactions
by: Hussain, Sabahat, et al.
Published: (2018)
by: Hussain, Sabahat, et al.
Published: (2018)
Investigating the empirical relation and importance of perceived usefulness, perceived ease of use and intention to use online information resources for evidence based medicine
by: Chandio, Fida Hussain, et al.
Published: (2015)
by: Chandio, Fida Hussain, et al.
Published: (2015)
Electrocardiogram identification: Use a simple set of features in QRS complex to identify individuals
by: , Tuerxunwaili, et al.
Published: (2016)
by: , Tuerxunwaili, et al.
Published: (2016)
ECG biometric recognition in different physiological conditions using robust normalized QRS complexes
by: Sidek, Khairul Azami, et al.
Published: (2012)
by: Sidek, Khairul Azami, et al.
Published: (2012)
ECG biometric recognition in different physiological conditions using robust normalized QRS complexes
by: Sidek, Khairul Azami, et al.
Published: (2012)
by: Sidek, Khairul Azami, et al.
Published: (2012)
Development of autonomous lane following and collision avoiding robot using image processing
by: Fazili, Atif, et al.
Published: (2012)
by: Fazili, Atif, et al.
Published: (2012)
Securing electronic transactions via payment gateways: a systematic review
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
Towards using CMU sphinx tools for the Holy Quran recitation verification
by: El Amrani, Mohamed Yassine, et al.
Published: (2016)
by: El Amrani, Mohamed Yassine, et al.
Published: (2016)
Rehashing system security solutions in e-banking
by: Khan, Burhan ul Islam, et al.
Published: (2018)
by: Khan, Burhan ul Islam, et al.
Published: (2018)
Influence of caregiving and personality on the stress level of caregivers of cancer patients: Role of social support as a mediating variable
by: Ul-Ain, Ansa Qurat
Published: (2017)
by: Ul-Ain, Ansa Qurat
Published: (2017)
Topological disorder of microstructure in fiber-reinforced polymer composites: Diffusion response
by: Jain, D., et al.
Published: (2015)
by: Jain, D., et al.
Published: (2015)
A comprehensive analysis of improving QoS and IMM traffic of high speed wireless campus network
by: Jameel Shehu, Yalli, et al.
Published: (2014)
by: Jameel Shehu, Yalli, et al.
Published: (2014)
Internet of things security vulnerabilities and recommended solutions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
An adaptive and viable face identification for Android mobile devices
by: Mehraj, Tehseen, et al.
Published: (2019)
by: Mehraj, Tehseen, et al.
Published: (2019)
Critical challenges in access management schemes for smartphones: an appraisal
by: Mehraj, Tehseen, et al.
Published: (2019)
by: Mehraj, Tehseen, et al.
Published: (2019)
A critical insight into the effectiveness of research
methods evolved to secure IoT ecosystem
by: Khan, Burhan ul Islam, et al.
Published: (2018)
by: Khan, Burhan ul Islam, et al.
Published: (2018)
DFAM: A distributed feedback analysis mechanism for knowledge based educational big data
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
Multicolour object detection using multithreading
by: Saaidon, Nur'Ain, et al.
Published: (2015)
by: Saaidon, Nur'Ain, et al.
Published: (2015)
Application of multithreading technique for multiple input and multiple output mechatronic system
by: Saaidon, Nur'Ain, et al.
Published: (2017)
by: Saaidon, Nur'Ain, et al.
Published: (2017)
3D colour marker based tracking of surgical tool in image-guided surgery
by: Sediono, Wahju, et al.
Published: (2017)
by: Sediono, Wahju, et al.
Published: (2017)
Handover analysis for multicast enabled network mobility management using network simulator
by: Mohd Aman, Azana Hafizah, et al.
Published: (2017)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2017)
Internet of things: the concept, inherent security challenges
and recommended solutions
by: Khan, Burhan Ul Islam, et al.
Published: (2019)
by: Khan, Burhan Ul Islam, et al.
Published: (2019)
Queuing theory approach for evaluating rate of transmission in wireless network using network coding
by: Ahmed, Muhammed Zaharadeen, et al.
Published: (2017)
by: Ahmed, Muhammed Zaharadeen, et al.
Published: (2017)
Recovery modeling in MPLS networks
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2014)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2014)
An Investigation of Femtocell Network Synchronization
by: Hasan, Mohammad Kamrul, et al.
Published: (2011)
by: Hasan, Mohammad Kamrul, et al.
Published: (2011)
Altitude tracking using colour marker based navigation system for image guided surgery
by: Saaidon, Nur'Ain, et al.
Published: (2016)
by: Saaidon, Nur'Ain, et al.
Published: (2016)
Packet loss and packet delivery evaluation using network simulator for multicast enabled network nobility management
by: Mohd Aman, Hazana Afizah, et al.
Published: (2017)
by: Mohd Aman, Hazana Afizah, et al.
Published: (2017)
An efficient cache replacement algorithm for minimizing the error rate in L2-STT-MRAM caches
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
Time variability analysis of photoplethysmogram biometric identification system
by: Mohd Azam, Siti Nurfarah Ain, et al.
Published: (2016)
by: Mohd Azam, Siti Nurfarah Ain, et al.
Published: (2016)
Ubiquitous RFID network for highway monitoring and management
by: Johari, Jaiz A. Y, et al.
Published: (2014)
by: Johari, Jaiz A. Y, et al.
Published: (2014)
Similar Items
-
Node status detection and information diffusion in router network using scale-free network
by: Mahesar, Abdul Waheed, et al.
Published: (2014) -
Two-mode complex network modeling of dengue epidemic in Selangor, Malaysia
by: Mahmood Malik, Hafiz Abid, et al.
Published: (2014) -
Formal analysis of weighted longitudinal routers network via scale-free network: a case study
by: Chandio, Fida Hussain, et al.
Published: (2015) -
Availability evaluation of scalable complex networks
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2012) -
Analyzing the weighted dark networks using scale-free network approach
by: Mahesar, Abdul Waheed, et al.
Published: (2015)