{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:32:37Z","timestamp":1760243557004,"version":"build-2065373602"},"reference-count":24,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2013,8,12]],"date-time":"2013-08-12T00:00:00Z","timestamp":1376265600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Algorithms"],"abstract":"<jats:p>Nowadays, due to the concern regarding environmental issues, establishing pedestrian\/bike friendly urbanism is widely encouraged. To promote safety-assured, mobile communication environments, efficient, reliable maintenance, and information integrity need to be designed, especially in highly possibly interfered places. For busy traffic areas, regular degree-3 dedicated short range communication (DSRC) networks are safety and information featured with availability, reliability, and maintainability in paths of multi-lanes. For sparsely populated areas, probes of wireless sensors are rational, especially if sensor nodes can be organized to enhance security, reliability, and flexibility. Applying alternative network topologies, such as spider-webs, generalized honeycomb tori, and cube-connected cycles, for comparing and analyzing is proposed in DSRC and cellular communications to enhance integrity in communications.<\/jats:p>","DOI":"10.3390\/a6030459","type":"journal-article","created":{"date-parts":[[2013,8,12]],"date-time":"2013-08-12T11:44:25Z","timestamp":1376307865000},"page":"459-470","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Ubiquitous Integrity via Network Integration and  Parallelism\u2014Sustaining Pedestrian\/Bike Urbanism"],"prefix":"10.3390","volume":"6","author":[{"given":"Li-Yen","family":"Hsu","sequence":"first","affiliation":[{"name":"Department of Aviation Services and Management, China University of Science and Technology,  Hsinchu campus, Taiwan"}]}],"member":"1968","published-online":{"date-parts":[[2013,8,12]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1016\/j.aml.2005.05.012","article-title":"On mutually independent hamiltonian paths","volume":"19","author":"Teng","year":"2006","journal-title":"Appl. Math. Lett."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Ashford, N., Mumayiz, S., and Wright, P. (2011). Airport Engineering: Planning, Design, and Development of 21st Century Airports, John Wiley.","DOI":"10.1002\/9780470950074"},{"key":"ref_3","unstructured":"Atlanta Regional Commission (ARC) Hartsfield-Jackson Atlanta International Airport\u2014Issues and Opportunities around the \u201cWorlds\u2019 Busiest Airport\u201d. Available online: http:\/\/www.atlantaregional.com\/FileLibrary\/LandUse\/airport\/HJAIAIssuesOpportunities.pdf."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Leighton, F.T. (1992). Introduction to Parallel Algorithms and Architectures: Arrays, Trees, Hypercubes, Morgan Kaufmann.","DOI":"10.1016\/B978-1-4832-0772-8.50005-4"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1016\/S0020-0190(02)00310-1","article-title":"Ring embedding in faulty honeycomb rectangular Torus","volume":"84","author":"Cho","year":"2002","journal-title":"Inform. Process. Lett."},{"key":"ref_6","first-page":"13","article-title":"Learning from truckers: Truck drivers\u2019 view on the planning and design of urban and suburban centers","volume":"19","author":"Pivo","year":"2002","journal-title":"J. Archit. Plan. Res."},{"key":"ref_7","unstructured":"Keeble, L. (1969). Principles and Practice of Town and Country Planning, Estates Gazette."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Hsu, L.-H., and Lin, C.-K. (2008). Graph Theory and Interconnection Networks, CRC Press, Taylor & Francis.","DOI":"10.1201\/9781420044829"},{"key":"ref_9","first-page":"311","article-title":"Developing dual-surveillance and dual-tele-paths in surveillance-information networks of tunnel\/mining spaces","volume":"30","author":"Hsu","year":"2009","journal-title":"J. Northeast. Univ. Nat. Sci."},{"key":"ref_10","unstructured":"Damjanovski, V. (2005). CCTV Networking and Digital Technology, Elsevier."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1145\/358645.358660","article-title":"The cube-connected cycles: A versatile network for parallel computation","volume":"24","author":"Preparata","year":"1981","journal-title":"Commun. ACM"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Chen, Y., Xu, W., Trappe, W., and Zhang, Y.-Y. (2009). Securing Emerging Wireless Systems: Lower-Layer Approaches, Springer.","DOI":"10.1007\/978-0-387-88491-2"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1016\/S0020-0190(02)00507-0","article-title":"Generalized honeycomb torus","volume":"86","author":"Cho","year":"2003","journal-title":"Inform. Process. Lett."},{"key":"ref_14","first-page":"169","article-title":"Scalable parallelism in spider-web networks","volume":"2","author":"Hsu","year":"2012","journal-title":"Int. J. Inf. Eng."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1063\/1.3037078","article-title":"Hamiltonian laceability of some generalized honeycomb tori","volume":"1060","author":"Hsu","year":"2008","journal-title":"AIP Conf. Proc."},{"key":"ref_16","unstructured":"Hsu, L.-Y., Hsu, L.-H., Ho, Y.-H., Tsay, C.-W., and Ho, T.-Y. (2012, January 16\u201318). Embedding Cycles in Cube-Connected-Cycles Graphs. Proceedings of IET International Conference of Frontier Computing\u2014Theory, Technologies and Applications, Xining, China."},{"key":"ref_17","first-page":"269","article-title":"Spider-web networks: A family of optimal, fault tolerant, hamiltonian bipartite graphs","volume":"160","author":"Kao","year":"2005","journal-title":"Appl. Math. Comput."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1036","DOI":"10.1109\/71.629486","article-title":"Honeycomb networks: Topological properties and communication algorithms","volume":"8","author":"Stojmenovic","year":"1997","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"3344","DOI":"10.1080\/00207160903315524","article-title":"Ring embedding in faulty generalized honeycomb tori\u2014GHT(m, n, n\/2)","volume":"87","author":"Hsu","year":"2010","journal-title":"Int. J. Comput. Math."},{"key":"ref_20","unstructured":"Knezevic, J. (1997). Systems Maintainability\u2014Analysis, Engineering and Management, Chapman Hall."},{"key":"ref_21","first-page":"1","article-title":"Hamiltonian laceability of spider-web networks","volume":"33","author":"Kao","year":"2005","journal-title":"Chung Yuan J."},{"key":"ref_22","unstructured":"National Space-Based Positioning, Navigation, and Timing Advisory Board (2010). National PNT Advisory Board comments on Jamming the Global Positioning System\u2014A National Security Threat: Recent Events and Potential Cures, November 4, 2010, Available online: http:\/\/www.gps.gov\/governance\/advisory\/recommendations\/2010-11-jammingwhitepaper.pdf."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Hutter, D., and Ullmann, M. (2005). Security in Pervasive Computing, LNCS3450, Springer.","DOI":"10.1007\/b135497"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/0966-6362(96)80645-X","article-title":"Compatibility of two 3D Kinematic motion analysis systems during simultaneous real time gait acquisition","volume":"4","author":"Polak","year":"1996","journal-title":"Gait Posture"}],"container-title":["Algorithms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-4893\/6\/3\/459\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T21:48:34Z","timestamp":1760219314000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-4893\/6\/3\/459"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,12]]},"references-count":24,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2013,9]]}},"alternative-id":["a6030459"],"URL":"https:\/\/doi.org\/10.3390\/a6030459","relation":{},"ISSN":["1999-4893"],"issn-type":[{"type":"electronic","value":"1999-4893"}],"subject":[],"published":{"date-parts":[[2013,8,12]]}}}