Boundary Node Detection and Unfolding of Complex Non-Convex Ad Hoc Networks

by   Se-Hang Cheong, et al.

Complex non-convex ad hoc networks (CNCAH) contain intersecting polygons and edges. In many instances, the layouts of these networks are not entirely convex in shape. In this article, we propose a Kamada-Kawai-based algorithm called W-KK-MS for boundary node detection problems, which is capable of aligning node positions while achieving high sensitivity, specificity, and accuracy in producing a visual drawing from the input network topology. The algorithm put forward in this article selects and assigns weights to top-k nodes in each iteration to speed up the updating process of nodes. We also propose a novel approach to detect and unfold stacked regions in CNCAH networks. Experimental results show that the proposed algorithms can achieve fast convergence on boundary node detection in CNCAH networks and are able to successfully unfold stacked regions. The design and implementation of a prototype system called ELnet for analyzing CNCAH networks is also described in this article. The ELnet system is capable of generating synthetic networks for testing, integrating with force-directed algorithms, and visualizing and analyzing algorithms' outcomes.


page 18

page 19

page 21

page 22

page 30

page 31

page 32

page 33


CWBound: boundary node detection algorithm for complex non-convex mobile ad hoc networks

Efficient message forwarding in mobile ad hoc network in disaster scenar...

Linear Network Coding Based Fast Data Synchronization for Wireless Ad Hoc Networks with Controlled Topology

Fast data synchronization in wireless ad hoc networks is a challenging a...

An Immuno-Inspired Approach to Misbehavior Detection in Ad Hoc Wireless Networks

We propose and evaluate an immuno-inspired approach to misbehavior detec...

An Adaptive Channel Reservation MAC Protocol Based on Forwarding Traffic of Key Nodes

Ad Hoc networks with multi-hop topology are widely used in military and ...

OpTopNET: A Learning Optimal Topology Synthesizer for Ad-hoc Robot Networks

In this paper, we synthesize a machine-learning stacked ensemble model a...

Automatic Detection of Node-Replication Attack in Vehicular Ad-hoc Networks

Recent advances in smart cities applications enforce security threads su...

DeepFake Detection by Analyzing Convolutional Traces

The Deepfake phenomenon has become very popular nowadays thanks to the p...

Please sign up or login with your details

Forgot password? Click here to reset