Showing 381 - 400 results of 1,116 for search 'Node average', query time: 0.10s Refine Results
  1. 381

    Sporadic Cloud-Based Mobile Augmentation on the Top of a Virtualization Layer: A Case Study of Collaborative Downloads in VANETs by Esteban Fernando Ordóñez-Morales, Martín López-Nores, Yolanda Blanco-Fernández, Efren Patricio Reinoso-Mendoza, Jack Fernando Bravo-Torres, José Víctor Saiáns-Vázquez, José Juan Pazos-Arias, Manuel Ramos-Cabrer, Alberto Gil-Solla

    Published 2019-01-01
    “…Current approaches to Cloud-based Mobile Augmentation (CMA) leverage (cloud-based) resources to meet the requirements of rich mobile applications, so that a terminal (the so-called application node or AppN) can borrow resources lent by a set of collaborator nodes (CNs). …”
    Get full text
    Article
  2. 382

    In Vitro Propagation of <i>Clausena lenis</i> Drake by Pajaree Sathuphan, Srunya Vajrodaya, Nuttha Sanevas, Narong Wongkantrakorn

    Published 2025-04-01
    “…When cultured on MS medium containing 0.5 mg/L 2,4-D, seed, stem-node, and 1-week-old seedling explants produced abundant callus. …”
    Get full text
    Article
  3. 383

    Optimal Scheduling of Multi-Storage Tank-Based Hydrogen Refueling Stations in Distribution Systems via Joint Power and Hydrogen Peak Shaving by Md Mohaiminul Islam Mahin, Sangyoon Lee, Dae-Hyun Choi

    Published 2025-01-01
    “…Numerical examples conducted on IPHDSs (IEEE 33-node and 69-node power distribution systems with three and five on-site HRSs) show that, compared to a method with S-HST and only power peak shaving, the proposed CCO method with M-HST based on dual-peak shaving of power and hydrogen increases the total profit by 5.88% and 8.19% on average, respectively, under varying HV charging demand adjustment period and chance-constraint violation probability.…”
    Get full text
    Article
  4. 384

    Research on the connectivity reliability analysis and optimization of natural gas pipeline network based on topology by Xiuxuan Yang, Kun Chen, Minghui Liu

    Published 2025-04-01
    “…Case studies on a regional pipeline network (89 nodes, 98 segments) demonstrate that loop structures exhibit 25.7% higher average reliability ( $$\:{R}_{j}$$ = 0.87792) than branch nodes (v79: $$\:{R}_{j}$$ =0.60933). …”
    Get full text
    Article
  5. 385

    Federated Learning Framework Based on Distributed Storage and Diffusion Model for Intrusion Detection on IoT Networks by Ricardo Manzano, Marzia Zaman, Darshana Upadhyay, Nishith Goel, Srinivas Sampalli

    Published 2025-01-01
    “…To address this challenge, we have integrated a diffusion model for data augmentation at each local node, which strengthens model robustness. Furthermore, to protect data privacy at each local node, we utilize transmitting and averaging model parameters instead of raw data. …”
    Get full text
    Article
  6. 386

    Stochastic and Percolating Models of Blocking Computer Networks Dynamics during Distribution of Epidemics of Evolutionary Computer Viruses by S. A. Lesko, A. S. Alyoshkin, V. V. Filatov

    Published 2019-06-01
    “…On one hand, this model is based on the use of percolation theory methods, which makes it possible to determine such structural-information characteristics of networks as the dependence of the percolation threshold on the average number of connections per one node (network density). …”
    Get full text
    Article
  7. 387

    Revisiting hospital patient safety culture in China: a nationwide network analysis by Haoning Shi, Zhiyu Chen, Xingyao Du, Jing Jiang, Ying Peng, Chunni Wang, Shuangjiang Zheng, Qi Huang, Mingzhao Xiao, Qinghua Zhao, Huanhuan Huang

    Published 2025-05-01
    “…After the COVID-19 pandemic, the core node position of management support for patient safety has become more prominent. …”
    Get full text
    Article
  8. 388

    MOT: A Low-Latency, Multichannel Wireless Surface Electromyography Acquisition System Based on the AD8232 Front-End by Augusto Tetsuo Prado Inafuco, Pablo Machoski, Daniel Prado Campos, Sergio Francisco Pichorim, José Jair Alves Mendes Junior

    Published 2025-06-01
    “…A 180 mAh Li-ion cell was used to power each node for 1.8 h of continuous operation at 100 mA average draw, and the complete sensor, including enclosure, was found to weigh 22 g. …”
    Get full text
    Article
  9. 389

    Optimization control strategy for active distribution areas with E-SOP considering energy storage characteristics by Weixu YU, Yewen WEI, Peng YUAN, Sijia ZHANG, Zhipeng ZHOU, Jie ZHANG

    Published 2025-07-01
    “…Finally, simulations on an IEEE 33-node flexible interconnected system validate the effectiveness of the proposed strategy, and further simulations on an IEEE 69-node system confirm its applicability and superiority. …”
    Get full text
    Article
  10. 390

    Peringkasan Artikel Berbahasa Indonesia Menggunakan TextRank dengan Pembobotan BM25 by Yurdha Fadhila Hernawan, Putra Pandu Adikara, Randy Cahya Wihandika

    Published 2022-02-01
    “…Metode TextRank yang digunakan pada penelitian ini merepresentasikan dokumen sebagai graf, setiap kalimat dianggap sebagai node dan hubungan antara kalimat (node) merupakan nilai similarity antar kalimat. …”
    Get full text
    Article
  11. 391

    Control System of an SVC Based on ARMA Model to Improve the Displacement Power Factor of an Electric Arc Furnace by J. Marulanda-Durango, A. Escobar-Mejía, E. Giraldo

    Published 2025-01-01
    “…The SVC is designed to improve the DPF at the connection node of the SVC. When the SVC connects to the power system, the proposed control technique enhances the DPF, achieving an average increase of 30%. …”
    Get full text
    Article
  12. 392
  13. 393

    Blockchain Integration in Agriculture for Transparent Farm-to-Fork Supply Chains: Leveraging IoT and Decentralized Identity for Enhanced Traceability and Security by Soy Aakansha, Balkrishna Sutar Manisha

    Published 2025-01-01
    “…The PBFT consensus algorithm allows the system to reach dependable results even with faulty node distribution of up to 33% where the average delay remains below 500 ms. …”
    Get full text
    Article
  14. 394

    A Credible Routing Based on a Novel Trust Mechanism in Ad Hoc Networks by Renjian Feng, Shenyun Che, Xiao Wang, Ning Yu

    Published 2013-04-01
    “…Simulation results reveal that TDS-AODV can eliminate malicious nodes effectively when building the route; furthermore, it also achieves better performance than TAODV and AODV in terms of throughput, packet delivery ratio, and average end to end delay.…”
    Get full text
    Article
  15. 395

    Energy-efficient and fast method on storage and querying in wireless sensor networks by PENG Shao-liang, LI Shan-shan, PENG Yu-xing, LIAO Xiang-ke, XIAO Nong

    Published 2008-01-01
    “…The second one can guarantee each node accepts a packet in the same probability according to the area of its own Voronoi cell. …”
    Get full text
    Article
  16. 396

    Method of dynamic random network coding in DTN environment by Guang-hong DENG, Wan-hua CAO, Jian ZHANG, Li FENG, Xiong CHENG

    Published 2014-02-01
    “…Based on the Markov channel model, it first computed the transmit speeds of every network channel according to the receive data states of nodes, and then constructed the network flow graphic with channel capacities at the source node, calculated and forecasted the current network multicast capacity, after that, the random network coding scenario was extended and tailored according to the multicast capacity to transmit data packages under DTN environment. …”
    Get full text
    Article
  17. 397

    Improved AODV route recovery in mobile ad-hoc networks using a genetic algorithm by Ahmad Maleki, Mehdi Sadeghzadeh

    Published 2014-09-01
    “…This paper evaluates the metrics of routing overhead, average end-to-end delay, and packet delivery ratio. …”
    Get full text
    Article
  18. 398

    Robust Multihop Localization for Wireless Sensor Networks with Unreliable Beacons by Renjian Feng, Xiaolei Guo, Ning Yu, Jiangwen Wan

    Published 2012-06-01
    “…Then, the normal nodes integrate the evaluation results to obtain the total trust degrees of their multihop communication beacons, by use of an average method or an enhanced D-S evidence combination rule. …”
    Get full text
    Article
  19. 399

    An Optimized Data Obtaining Strategy for Large-Scale Sensor Monitoring Networks by Yan Wang, Junlu Wang, Fengtong Wang, Ling Wang, Wei Wei

    Published 2016-06-01
    “…First, because of the large-scale features of sensor node network, this paper proposes a large-scale monitoring network area clustering optimization strategy. …”
    Get full text
    Article
  20. 400