Impact of Age Violation Probability on Neighbor Election-Based Distributed Slot Access in Wireless Ad Hoc Networks
In this paper, we propose an analytical model of neighbor election-based distributed slot access by considering the relationship between the age of information (AoI) and the slot access process of nodes in wireless ad hoc networks. A node first maintains the information updates from its neighbors by...
Ausführliche Beschreibung
Autor*in: |
Wenjun Huang [verfasserIn] Xu Li [verfasserIn] Yanan Liang [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2023 |
---|
Schlagwörter: |
---|
Übergeordnetes Werk: |
In: Electronics - MDPI AG, 2013, 12(2023), 2, p 351 |
---|---|
Übergeordnetes Werk: |
volume:12 ; year:2023 ; number:2, p 351 |
Links: |
---|
DOI / URN: |
10.3390/electronics12020351 |
---|
Katalog-ID: |
DOAJ081814739 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | DOAJ081814739 | ||
003 | DE-627 | ||
005 | 20240414134145.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230310s2023 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.3390/electronics12020351 |2 doi | |
035 | |a (DE-627)DOAJ081814739 | ||
035 | |a (DE-599)DOAJa36fb7f92aad4e009d70503d7b3da660 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
050 | 0 | |a TK7800-8360 | |
100 | 0 | |a Wenjun Huang |e verfasserin |4 aut | |
245 | 1 | 0 | |a Impact of Age Violation Probability on Neighbor Election-Based Distributed Slot Access in Wireless Ad Hoc Networks |
264 | 1 | |c 2023 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a In this paper, we propose an analytical model of neighbor election-based distributed slot access by considering the relationship between the age of information (AoI) and the slot access process of nodes in wireless ad hoc networks. A node first maintains the information updates from its neighbors by relaying and receiving messages and determines message transmission slots by holding elections with its relevant competing neighbors. We first find out and analyze the interaction relationship between the transmission probability of nodes, the competing probability of neighbor nodes, and the violation probability that AoI exceeds the timeliness threshold of the neighbor election. Next, we obtain the approximated expression of the competing probability and the age violation probability based on the comprehensive analysis of the neighbor election process. Numerical and simulation results show that our approximation is tighter than the one in the literature and also provides insights into enhancing the design of network-aware distributed multiple access schemes. | ||
650 | 4 | |a neighbor election | |
650 | 4 | |a age of information | |
650 | 4 | |a slot access | |
650 | 4 | |a wireless ad hoc networks | |
653 | 0 | |a Electronics | |
700 | 0 | |a Xu Li |e verfasserin |4 aut | |
700 | 0 | |a Yanan Liang |e verfasserin |4 aut | |
773 | 0 | 8 | |i In |t Electronics |d MDPI AG, 2013 |g 12(2023), 2, p 351 |w (DE-627)718626478 |w (DE-600)2662127-7 |x 20799292 |7 nnns |
773 | 1 | 8 | |g volume:12 |g year:2023 |g number:2, p 351 |
856 | 4 | 0 | |u https://doi.org/10.3390/electronics12020351 |z kostenfrei |
856 | 4 | 0 | |u https://doaj.org/article/a36fb7f92aad4e009d70503d7b3da660 |z kostenfrei |
856 | 4 | 0 | |u https://www.mdpi.com/2079-9292/12/2/351 |z kostenfrei |
856 | 4 | 2 | |u https://doaj.org/toc/2079-9292 |y Journal toc |z kostenfrei |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_DOAJ | ||
912 | |a GBV_ILN_20 | ||
912 | |a GBV_ILN_22 | ||
912 | |a GBV_ILN_23 | ||
912 | |a GBV_ILN_24 | ||
912 | |a GBV_ILN_39 | ||
912 | |a GBV_ILN_40 | ||
912 | |a GBV_ILN_60 | ||
912 | |a GBV_ILN_62 | ||
912 | |a GBV_ILN_63 | ||
912 | |a GBV_ILN_65 | ||
912 | |a GBV_ILN_69 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_73 | ||
912 | |a GBV_ILN_95 | ||
912 | |a GBV_ILN_105 | ||
912 | |a GBV_ILN_110 | ||
912 | |a GBV_ILN_151 | ||
912 | |a GBV_ILN_161 | ||
912 | |a GBV_ILN_170 | ||
912 | |a GBV_ILN_213 | ||
912 | |a GBV_ILN_230 | ||
912 | |a GBV_ILN_285 | ||
912 | |a GBV_ILN_293 | ||
912 | |a GBV_ILN_370 | ||
912 | |a GBV_ILN_602 | ||
912 | |a GBV_ILN_2014 | ||
912 | |a GBV_ILN_4012 | ||
912 | |a GBV_ILN_4037 | ||
912 | |a GBV_ILN_4112 | ||
912 | |a GBV_ILN_4125 | ||
912 | |a GBV_ILN_4126 | ||
912 | |a GBV_ILN_4249 | ||
912 | |a GBV_ILN_4305 | ||
912 | |a GBV_ILN_4306 | ||
912 | |a GBV_ILN_4307 | ||
912 | |a GBV_ILN_4313 | ||
912 | |a GBV_ILN_4322 | ||
912 | |a GBV_ILN_4323 | ||
912 | |a GBV_ILN_4324 | ||
912 | |a GBV_ILN_4325 | ||
912 | |a GBV_ILN_4335 | ||
912 | |a GBV_ILN_4338 | ||
912 | |a GBV_ILN_4367 | ||
912 | |a GBV_ILN_4700 | ||
951 | |a AR | ||
952 | |d 12 |j 2023 |e 2, p 351 |
author_variant |
w h wh x l xl y l yl |
---|---|
matchkey_str |
article:20799292:2023----::matfgvoainrbbltonihoeetobsditiuesoac |
hierarchy_sort_str |
2023 |
callnumber-subject-code |
TK |
publishDate |
2023 |
allfields |
10.3390/electronics12020351 doi (DE-627)DOAJ081814739 (DE-599)DOAJa36fb7f92aad4e009d70503d7b3da660 DE-627 ger DE-627 rakwb eng TK7800-8360 Wenjun Huang verfasserin aut Impact of Age Violation Probability on Neighbor Election-Based Distributed Slot Access in Wireless Ad Hoc Networks 2023 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier In this paper, we propose an analytical model of neighbor election-based distributed slot access by considering the relationship between the age of information (AoI) and the slot access process of nodes in wireless ad hoc networks. A node first maintains the information updates from its neighbors by relaying and receiving messages and determines message transmission slots by holding elections with its relevant competing neighbors. We first find out and analyze the interaction relationship between the transmission probability of nodes, the competing probability of neighbor nodes, and the violation probability that AoI exceeds the timeliness threshold of the neighbor election. Next, we obtain the approximated expression of the competing probability and the age violation probability based on the comprehensive analysis of the neighbor election process. Numerical and simulation results show that our approximation is tighter than the one in the literature and also provides insights into enhancing the design of network-aware distributed multiple access schemes. neighbor election age of information slot access wireless ad hoc networks Electronics Xu Li verfasserin aut Yanan Liang verfasserin aut In Electronics MDPI AG, 2013 12(2023), 2, p 351 (DE-627)718626478 (DE-600)2662127-7 20799292 nnns volume:12 year:2023 number:2, p 351 https://doi.org/10.3390/electronics12020351 kostenfrei https://doaj.org/article/a36fb7f92aad4e009d70503d7b3da660 kostenfrei https://www.mdpi.com/2079-9292/12/2/351 kostenfrei https://doaj.org/toc/2079-9292 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 12 2023 2, p 351 |
spelling |
10.3390/electronics12020351 doi (DE-627)DOAJ081814739 (DE-599)DOAJa36fb7f92aad4e009d70503d7b3da660 DE-627 ger DE-627 rakwb eng TK7800-8360 Wenjun Huang verfasserin aut Impact of Age Violation Probability on Neighbor Election-Based Distributed Slot Access in Wireless Ad Hoc Networks 2023 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier In this paper, we propose an analytical model of neighbor election-based distributed slot access by considering the relationship between the age of information (AoI) and the slot access process of nodes in wireless ad hoc networks. A node first maintains the information updates from its neighbors by relaying and receiving messages and determines message transmission slots by holding elections with its relevant competing neighbors. We first find out and analyze the interaction relationship between the transmission probability of nodes, the competing probability of neighbor nodes, and the violation probability that AoI exceeds the timeliness threshold of the neighbor election. Next, we obtain the approximated expression of the competing probability and the age violation probability based on the comprehensive analysis of the neighbor election process. Numerical and simulation results show that our approximation is tighter than the one in the literature and also provides insights into enhancing the design of network-aware distributed multiple access schemes. neighbor election age of information slot access wireless ad hoc networks Electronics Xu Li verfasserin aut Yanan Liang verfasserin aut In Electronics MDPI AG, 2013 12(2023), 2, p 351 (DE-627)718626478 (DE-600)2662127-7 20799292 nnns volume:12 year:2023 number:2, p 351 https://doi.org/10.3390/electronics12020351 kostenfrei https://doaj.org/article/a36fb7f92aad4e009d70503d7b3da660 kostenfrei https://www.mdpi.com/2079-9292/12/2/351 kostenfrei https://doaj.org/toc/2079-9292 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 12 2023 2, p 351 |
allfields_unstemmed |
10.3390/electronics12020351 doi (DE-627)DOAJ081814739 (DE-599)DOAJa36fb7f92aad4e009d70503d7b3da660 DE-627 ger DE-627 rakwb eng TK7800-8360 Wenjun Huang verfasserin aut Impact of Age Violation Probability on Neighbor Election-Based Distributed Slot Access in Wireless Ad Hoc Networks 2023 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier In this paper, we propose an analytical model of neighbor election-based distributed slot access by considering the relationship between the age of information (AoI) and the slot access process of nodes in wireless ad hoc networks. A node first maintains the information updates from its neighbors by relaying and receiving messages and determines message transmission slots by holding elections with its relevant competing neighbors. We first find out and analyze the interaction relationship between the transmission probability of nodes, the competing probability of neighbor nodes, and the violation probability that AoI exceeds the timeliness threshold of the neighbor election. Next, we obtain the approximated expression of the competing probability and the age violation probability based on the comprehensive analysis of the neighbor election process. Numerical and simulation results show that our approximation is tighter than the one in the literature and also provides insights into enhancing the design of network-aware distributed multiple access schemes. neighbor election age of information slot access wireless ad hoc networks Electronics Xu Li verfasserin aut Yanan Liang verfasserin aut In Electronics MDPI AG, 2013 12(2023), 2, p 351 (DE-627)718626478 (DE-600)2662127-7 20799292 nnns volume:12 year:2023 number:2, p 351 https://doi.org/10.3390/electronics12020351 kostenfrei https://doaj.org/article/a36fb7f92aad4e009d70503d7b3da660 kostenfrei https://www.mdpi.com/2079-9292/12/2/351 kostenfrei https://doaj.org/toc/2079-9292 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 12 2023 2, p 351 |
allfieldsGer |
10.3390/electronics12020351 doi (DE-627)DOAJ081814739 (DE-599)DOAJa36fb7f92aad4e009d70503d7b3da660 DE-627 ger DE-627 rakwb eng TK7800-8360 Wenjun Huang verfasserin aut Impact of Age Violation Probability on Neighbor Election-Based Distributed Slot Access in Wireless Ad Hoc Networks 2023 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier In this paper, we propose an analytical model of neighbor election-based distributed slot access by considering the relationship between the age of information (AoI) and the slot access process of nodes in wireless ad hoc networks. A node first maintains the information updates from its neighbors by relaying and receiving messages and determines message transmission slots by holding elections with its relevant competing neighbors. We first find out and analyze the interaction relationship between the transmission probability of nodes, the competing probability of neighbor nodes, and the violation probability that AoI exceeds the timeliness threshold of the neighbor election. Next, we obtain the approximated expression of the competing probability and the age violation probability based on the comprehensive analysis of the neighbor election process. Numerical and simulation results show that our approximation is tighter than the one in the literature and also provides insights into enhancing the design of network-aware distributed multiple access schemes. neighbor election age of information slot access wireless ad hoc networks Electronics Xu Li verfasserin aut Yanan Liang verfasserin aut In Electronics MDPI AG, 2013 12(2023), 2, p 351 (DE-627)718626478 (DE-600)2662127-7 20799292 nnns volume:12 year:2023 number:2, p 351 https://doi.org/10.3390/electronics12020351 kostenfrei https://doaj.org/article/a36fb7f92aad4e009d70503d7b3da660 kostenfrei https://www.mdpi.com/2079-9292/12/2/351 kostenfrei https://doaj.org/toc/2079-9292 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 12 2023 2, p 351 |
allfieldsSound |
10.3390/electronics12020351 doi (DE-627)DOAJ081814739 (DE-599)DOAJa36fb7f92aad4e009d70503d7b3da660 DE-627 ger DE-627 rakwb eng TK7800-8360 Wenjun Huang verfasserin aut Impact of Age Violation Probability on Neighbor Election-Based Distributed Slot Access in Wireless Ad Hoc Networks 2023 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier In this paper, we propose an analytical model of neighbor election-based distributed slot access by considering the relationship between the age of information (AoI) and the slot access process of nodes in wireless ad hoc networks. A node first maintains the information updates from its neighbors by relaying and receiving messages and determines message transmission slots by holding elections with its relevant competing neighbors. We first find out and analyze the interaction relationship between the transmission probability of nodes, the competing probability of neighbor nodes, and the violation probability that AoI exceeds the timeliness threshold of the neighbor election. Next, we obtain the approximated expression of the competing probability and the age violation probability based on the comprehensive analysis of the neighbor election process. Numerical and simulation results show that our approximation is tighter than the one in the literature and also provides insights into enhancing the design of network-aware distributed multiple access schemes. neighbor election age of information slot access wireless ad hoc networks Electronics Xu Li verfasserin aut Yanan Liang verfasserin aut In Electronics MDPI AG, 2013 12(2023), 2, p 351 (DE-627)718626478 (DE-600)2662127-7 20799292 nnns volume:12 year:2023 number:2, p 351 https://doi.org/10.3390/electronics12020351 kostenfrei https://doaj.org/article/a36fb7f92aad4e009d70503d7b3da660 kostenfrei https://www.mdpi.com/2079-9292/12/2/351 kostenfrei https://doaj.org/toc/2079-9292 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 12 2023 2, p 351 |
language |
English |
source |
In Electronics 12(2023), 2, p 351 volume:12 year:2023 number:2, p 351 |
sourceStr |
In Electronics 12(2023), 2, p 351 volume:12 year:2023 number:2, p 351 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
neighbor election age of information slot access wireless ad hoc networks Electronics |
isfreeaccess_bool |
true |
container_title |
Electronics |
authorswithroles_txt_mv |
Wenjun Huang @@aut@@ Xu Li @@aut@@ Yanan Liang @@aut@@ |
publishDateDaySort_date |
2023-01-01T00:00:00Z |
hierarchy_top_id |
718626478 |
id |
DOAJ081814739 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">DOAJ081814739</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20240414134145.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230310s2023 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.3390/electronics12020351</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)DOAJ081814739</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DOAJa36fb7f92aad4e009d70503d7b3da660</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK7800-8360</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Wenjun Huang</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Impact of Age Violation Probability on Neighbor Election-Based Distributed Slot Access in Wireless Ad Hoc Networks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2023</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In this paper, we propose an analytical model of neighbor election-based distributed slot access by considering the relationship between the age of information (AoI) and the slot access process of nodes in wireless ad hoc networks. A node first maintains the information updates from its neighbors by relaying and receiving messages and determines message transmission slots by holding elections with its relevant competing neighbors. We first find out and analyze the interaction relationship between the transmission probability of nodes, the competing probability of neighbor nodes, and the violation probability that AoI exceeds the timeliness threshold of the neighbor election. Next, we obtain the approximated expression of the competing probability and the age violation probability based on the comprehensive analysis of the neighbor election process. Numerical and simulation results show that our approximation is tighter than the one in the literature and also provides insights into enhancing the design of network-aware distributed multiple access schemes.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">neighbor election</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">age of information</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">slot access</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">wireless ad hoc networks</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Electronics</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Xu Li</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Yanan Liang</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">In</subfield><subfield code="t">Electronics</subfield><subfield code="d">MDPI AG, 2013</subfield><subfield code="g">12(2023), 2, p 351</subfield><subfield code="w">(DE-627)718626478</subfield><subfield code="w">(DE-600)2662127-7</subfield><subfield code="x">20799292</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:12</subfield><subfield code="g">year:2023</subfield><subfield code="g">number:2, p 351</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.3390/electronics12020351</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doaj.org/article/a36fb7f92aad4e009d70503d7b3da660</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.mdpi.com/2079-9292/12/2/351</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/2079-9292</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_DOAJ</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_170</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4367</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">12</subfield><subfield code="j">2023</subfield><subfield code="e">2, p 351</subfield></datafield></record></collection>
|
callnumber-first |
T - Technology |
author |
Wenjun Huang |
spellingShingle |
Wenjun Huang misc TK7800-8360 misc neighbor election misc age of information misc slot access misc wireless ad hoc networks misc Electronics Impact of Age Violation Probability on Neighbor Election-Based Distributed Slot Access in Wireless Ad Hoc Networks |
authorStr |
Wenjun Huang |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)718626478 |
format |
electronic Article |
delete_txt_mv |
keep |
author_role |
aut aut aut |
collection |
DOAJ |
remote_str |
true |
callnumber-label |
TK7800-8360 |
illustrated |
Not Illustrated |
issn |
20799292 |
topic_title |
TK7800-8360 Impact of Age Violation Probability on Neighbor Election-Based Distributed Slot Access in Wireless Ad Hoc Networks neighbor election age of information slot access wireless ad hoc networks |
topic |
misc TK7800-8360 misc neighbor election misc age of information misc slot access misc wireless ad hoc networks misc Electronics |
topic_unstemmed |
misc TK7800-8360 misc neighbor election misc age of information misc slot access misc wireless ad hoc networks misc Electronics |
topic_browse |
misc TK7800-8360 misc neighbor election misc age of information misc slot access misc wireless ad hoc networks misc Electronics |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
Electronics |
hierarchy_parent_id |
718626478 |
hierarchy_top_title |
Electronics |
isfreeaccess_txt |
true |
familylinks_str_mv |
(DE-627)718626478 (DE-600)2662127-7 |
title |
Impact of Age Violation Probability on Neighbor Election-Based Distributed Slot Access in Wireless Ad Hoc Networks |
ctrlnum |
(DE-627)DOAJ081814739 (DE-599)DOAJa36fb7f92aad4e009d70503d7b3da660 |
title_full |
Impact of Age Violation Probability on Neighbor Election-Based Distributed Slot Access in Wireless Ad Hoc Networks |
author_sort |
Wenjun Huang |
journal |
Electronics |
journalStr |
Electronics |
callnumber-first-code |
T |
lang_code |
eng |
isOA_bool |
true |
recordtype |
marc |
publishDateSort |
2023 |
contenttype_str_mv |
txt |
author_browse |
Wenjun Huang Xu Li Yanan Liang |
container_volume |
12 |
class |
TK7800-8360 |
format_se |
Elektronische Aufsätze |
author-letter |
Wenjun Huang |
doi_str_mv |
10.3390/electronics12020351 |
author2-role |
verfasserin |
title_sort |
impact of age violation probability on neighbor election-based distributed slot access in wireless ad hoc networks |
callnumber |
TK7800-8360 |
title_auth |
Impact of Age Violation Probability on Neighbor Election-Based Distributed Slot Access in Wireless Ad Hoc Networks |
abstract |
In this paper, we propose an analytical model of neighbor election-based distributed slot access by considering the relationship between the age of information (AoI) and the slot access process of nodes in wireless ad hoc networks. A node first maintains the information updates from its neighbors by relaying and receiving messages and determines message transmission slots by holding elections with its relevant competing neighbors. We first find out and analyze the interaction relationship between the transmission probability of nodes, the competing probability of neighbor nodes, and the violation probability that AoI exceeds the timeliness threshold of the neighbor election. Next, we obtain the approximated expression of the competing probability and the age violation probability based on the comprehensive analysis of the neighbor election process. Numerical and simulation results show that our approximation is tighter than the one in the literature and also provides insights into enhancing the design of network-aware distributed multiple access schemes. |
abstractGer |
In this paper, we propose an analytical model of neighbor election-based distributed slot access by considering the relationship between the age of information (AoI) and the slot access process of nodes in wireless ad hoc networks. A node first maintains the information updates from its neighbors by relaying and receiving messages and determines message transmission slots by holding elections with its relevant competing neighbors. We first find out and analyze the interaction relationship between the transmission probability of nodes, the competing probability of neighbor nodes, and the violation probability that AoI exceeds the timeliness threshold of the neighbor election. Next, we obtain the approximated expression of the competing probability and the age violation probability based on the comprehensive analysis of the neighbor election process. Numerical and simulation results show that our approximation is tighter than the one in the literature and also provides insights into enhancing the design of network-aware distributed multiple access schemes. |
abstract_unstemmed |
In this paper, we propose an analytical model of neighbor election-based distributed slot access by considering the relationship between the age of information (AoI) and the slot access process of nodes in wireless ad hoc networks. A node first maintains the information updates from its neighbors by relaying and receiving messages and determines message transmission slots by holding elections with its relevant competing neighbors. We first find out and analyze the interaction relationship between the transmission probability of nodes, the competing probability of neighbor nodes, and the violation probability that AoI exceeds the timeliness threshold of the neighbor election. Next, we obtain the approximated expression of the competing probability and the age violation probability based on the comprehensive analysis of the neighbor election process. Numerical and simulation results show that our approximation is tighter than the one in the literature and also provides insights into enhancing the design of network-aware distributed multiple access schemes. |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 |
container_issue |
2, p 351 |
title_short |
Impact of Age Violation Probability on Neighbor Election-Based Distributed Slot Access in Wireless Ad Hoc Networks |
url |
https://doi.org/10.3390/electronics12020351 https://doaj.org/article/a36fb7f92aad4e009d70503d7b3da660 https://www.mdpi.com/2079-9292/12/2/351 https://doaj.org/toc/2079-9292 |
remote_bool |
true |
author2 |
Xu Li Yanan Liang |
author2Str |
Xu Li Yanan Liang |
ppnlink |
718626478 |
callnumber-subject |
TK - Electrical and Nuclear Engineering |
mediatype_str_mv |
c |
isOA_txt |
true |
hochschulschrift_bool |
false |
doi_str |
10.3390/electronics12020351 |
callnumber-a |
TK7800-8360 |
up_date |
2024-07-03T22:06:27.921Z |
_version_ |
1803597264109699072 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">DOAJ081814739</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20240414134145.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230310s2023 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.3390/electronics12020351</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)DOAJ081814739</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DOAJa36fb7f92aad4e009d70503d7b3da660</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK7800-8360</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Wenjun Huang</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Impact of Age Violation Probability on Neighbor Election-Based Distributed Slot Access in Wireless Ad Hoc Networks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2023</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In this paper, we propose an analytical model of neighbor election-based distributed slot access by considering the relationship between the age of information (AoI) and the slot access process of nodes in wireless ad hoc networks. A node first maintains the information updates from its neighbors by relaying and receiving messages and determines message transmission slots by holding elections with its relevant competing neighbors. We first find out and analyze the interaction relationship between the transmission probability of nodes, the competing probability of neighbor nodes, and the violation probability that AoI exceeds the timeliness threshold of the neighbor election. Next, we obtain the approximated expression of the competing probability and the age violation probability based on the comprehensive analysis of the neighbor election process. Numerical and simulation results show that our approximation is tighter than the one in the literature and also provides insights into enhancing the design of network-aware distributed multiple access schemes.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">neighbor election</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">age of information</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">slot access</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">wireless ad hoc networks</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Electronics</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Xu Li</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Yanan Liang</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">In</subfield><subfield code="t">Electronics</subfield><subfield code="d">MDPI AG, 2013</subfield><subfield code="g">12(2023), 2, p 351</subfield><subfield code="w">(DE-627)718626478</subfield><subfield code="w">(DE-600)2662127-7</subfield><subfield code="x">20799292</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:12</subfield><subfield code="g">year:2023</subfield><subfield code="g">number:2, p 351</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.3390/electronics12020351</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doaj.org/article/a36fb7f92aad4e009d70503d7b3da660</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.mdpi.com/2079-9292/12/2/351</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/2079-9292</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_DOAJ</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_170</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4367</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">12</subfield><subfield code="j">2023</subfield><subfield code="e">2, p 351</subfield></datafield></record></collection>
|
score |
7.4008226 |