Suggested Topics within your search.
Suggested Topics within your search.
-
381
Sporadic Cloud-Based Mobile Augmentation on the Top of a Virtualization Layer: A Case Study of Collaborative Downloads in VANETs
Published 2019-01-01“…Current approaches to Cloud-based Mobile Augmentation (CMA) leverage (cloud-based) resources to meet the requirements of rich mobile applications, so that a terminal (the so-called application node or AppN) can borrow resources lent by a set of collaborator nodes (CNs). …”
Get full text
Article -
382
In Vitro Propagation of <i>Clausena lenis</i> Drake
Published 2025-04-01“…When cultured on MS medium containing 0.5 mg/L 2,4-D, seed, stem-node, and 1-week-old seedling explants produced abundant callus. …”
Get full text
Article -
383
Optimal Scheduling of Multi-Storage Tank-Based Hydrogen Refueling Stations in Distribution Systems via Joint Power and Hydrogen Peak Shaving
Published 2025-01-01“…Numerical examples conducted on IPHDSs (IEEE 33-node and 69-node power distribution systems with three and five on-site HRSs) show that, compared to a method with S-HST and only power peak shaving, the proposed CCO method with M-HST based on dual-peak shaving of power and hydrogen increases the total profit by 5.88% and 8.19% on average, respectively, under varying HV charging demand adjustment period and chance-constraint violation probability.…”
Get full text
Article -
384
Research on the connectivity reliability analysis and optimization of natural gas pipeline network based on topology
Published 2025-04-01“…Case studies on a regional pipeline network (89 nodes, 98 segments) demonstrate that loop structures exhibit 25.7% higher average reliability ( $$\:{R}_{j}$$ = 0.87792) than branch nodes (v79: $$\:{R}_{j}$$ =0.60933). …”
Get full text
Article -
385
Federated Learning Framework Based on Distributed Storage and Diffusion Model for Intrusion Detection on IoT Networks
Published 2025-01-01“…To address this challenge, we have integrated a diffusion model for data augmentation at each local node, which strengthens model robustness. Furthermore, to protect data privacy at each local node, we utilize transmitting and averaging model parameters instead of raw data. …”
Get full text
Article -
386
Stochastic and Percolating Models of Blocking Computer Networks Dynamics during Distribution of Epidemics of Evolutionary Computer Viruses
Published 2019-06-01“…On one hand, this model is based on the use of percolation theory methods, which makes it possible to determine such structural-information characteristics of networks as the dependence of the percolation threshold on the average number of connections per one node (network density). …”
Get full text
Article -
387
Revisiting hospital patient safety culture in China: a nationwide network analysis
Published 2025-05-01“…After the COVID-19 pandemic, the core node position of management support for patient safety has become more prominent. …”
Get full text
Article -
388
MOT: A Low-Latency, Multichannel Wireless Surface Electromyography Acquisition System Based on the AD8232 Front-End
Published 2025-06-01“…A 180 mAh Li-ion cell was used to power each node for 1.8 h of continuous operation at 100 mA average draw, and the complete sensor, including enclosure, was found to weigh 22 g. …”
Get full text
Article -
389
Optimization control strategy for active distribution areas with E-SOP considering energy storage characteristics
Published 2025-07-01“…Finally, simulations on an IEEE 33-node flexible interconnected system validate the effectiveness of the proposed strategy, and further simulations on an IEEE 69-node system confirm its applicability and superiority. …”
Get full text
Article -
390
Peringkasan Artikel Berbahasa Indonesia Menggunakan TextRank dengan Pembobotan BM25
Published 2022-02-01“…Metode TextRank yang digunakan pada penelitian ini merepresentasikan dokumen sebagai graf, setiap kalimat dianggap sebagai node dan hubungan antara kalimat (node) merupakan nilai similarity antar kalimat. …”
Get full text
Article -
391
Control System of an SVC Based on ARMA Model to Improve the Displacement Power Factor of an Electric Arc Furnace
Published 2025-01-01“…The SVC is designed to improve the DPF at the connection node of the SVC. When the SVC connects to the power system, the proposed control technique enhances the DPF, achieving an average increase of 30%. …”
Get full text
Article -
392
Effectiveness of various endodontic systems in treating teeth with C-shaped root canals
Published 2021-03-01Get full text
Article -
393
Blockchain Integration in Agriculture for Transparent Farm-to-Fork Supply Chains: Leveraging IoT and Decentralized Identity for Enhanced Traceability and Security
Published 2025-01-01“…The PBFT consensus algorithm allows the system to reach dependable results even with faulty node distribution of up to 33% where the average delay remains below 500 ms. …”
Get full text
Article -
394
A Credible Routing Based on a Novel Trust Mechanism in Ad Hoc Networks
Published 2013-04-01“…Simulation results reveal that TDS-AODV can eliminate malicious nodes effectively when building the route; furthermore, it also achieves better performance than TAODV and AODV in terms of throughput, packet delivery ratio, and average end to end delay.…”
Get full text
Article -
395
Energy-efficient and fast method on storage and querying in wireless sensor networks
Published 2008-01-01“…The second one can guarantee each node accepts a packet in the same probability according to the area of its own Voronoi cell. …”
Get full text
Article -
396
Method of dynamic random network coding in DTN environment
Published 2014-02-01“…Based on the Markov channel model, it first computed the transmit speeds of every network channel according to the receive data states of nodes, and then constructed the network flow graphic with channel capacities at the source node, calculated and forecasted the current network multicast capacity, after that, the random network coding scenario was extended and tailored according to the multicast capacity to transmit data packages under DTN environment. …”
Get full text
Article -
397
Improved AODV route recovery in mobile ad-hoc networks using a genetic algorithm
Published 2014-09-01“…This paper evaluates the metrics of routing overhead, average end-to-end delay, and packet delivery ratio. …”
Get full text
Article -
398
Robust Multihop Localization for Wireless Sensor Networks with Unreliable Beacons
Published 2012-06-01“…Then, the normal nodes integrate the evaluation results to obtain the total trust degrees of their multihop communication beacons, by use of an average method or an enhanced D-S evidence combination rule. …”
Get full text
Article -
399
An Optimized Data Obtaining Strategy for Large-Scale Sensor Monitoring Networks
Published 2016-06-01“…First, because of the large-scale features of sensor node network, this paper proposes a large-scale monitoring network area clustering optimization strategy. …”
Get full text
Article -
400
Synchronization of autonomic control loops of blood circulation in patients with COVID-19
Published 2021-09-01Get full text
Article