Showing 421 - 440 results of 1,116 for search 'Node average', query time: 0.08s Refine Results
  1. 421

    Contextual Deep Semantic Feature Driven Multi-Types Network Intrusion Detection System for IoT-Edge Networks by Shaho Hassen, Ahmed Abdlrazaq

    Published 2024-12-01
    “…There exists an array of applications employing edge- internet of things (Edge-IoT) where the edge nodes collect local data to perform real-time decisions. …”
    Get full text
    Article
  2. 422

    Sistem Smart Trash Pemilah Sampah Organik dan Anorganik Berbasis Internet of Things by Ismail Ismail, Andi Zulkifli Nusri, Syariful Rahman

    Published 2023-09-01
    “…Arduino microcontroller, Node MCU ESP8266. The ultrasonic sensor reads the presence of object in front of the sensor then servo opens the trash can lid, and the garbage is put in the trash can. …”
    Get full text
    Article
  3. 423

    Use Linear Weighted Genetic Algorithm to Optimize the Scheduling of Fog Computing Resources by Ruisheng Li

    Published 2021-01-01
    “…This paper establishes a mathematical model for the resource management and scheduling of the fog node cluster and establishes the optimization goals of delay, communication load, and service cost. …”
    Get full text
    Article
  4. 424

    Data poisoning attack detection approach for quality of service aware cloud API recommender system by Zhen CHEN, Wenchao QI, Taiyu BAO, Limin SHEN

    Published 2023-08-01
    “…To solve the problem that existing studies usually assumed that the QoS data of cloud API recommender system was reliable, ignoring the data poisoning attack on cloud API recommender system by malicious users in open network environment, a data poisoning attack detection approach based on multi-feature fusion was proposed.Firstly, a user connected network graph was constructed based on the designed similarity function, and users’ neighborhood features were captured using Node2vec.Secondly, sparse auto-encoder was used to mine user QoS deep feature, and user interpretation feature based on QoS data weighted average deviation was designed.Furthermore, a fake user detection model based on support vector machine was established by integrating user neighborhood feature, QoS deep feature, and interpretation feature, the model parameters were learned using grid search and alternating iterative optimization strategy to complete fake user detection.Finally, the effectiveness and superiority of the proposed approach were verified through extensive experiments, realizing the poison attack defense against QoS aware cloud API recommender system at the data side.…”
    Get full text
    Article
  5. 425

    A Multiobjective Evolutionary Algorithm for Energy-Efficient Cooperative Spectrum Sensing in Cognitive Radio Sensor Network by Weirong Liu, Gaorong Qin, Shuo Li, Jian He, Xiaoyong Zhang

    Published 2015-05-01
    “…The simulation results show that the proposed algorithm can reduce the average energy consumption of cognitive sensor node, while improving the global probability of spectrum sensing.…”
    Get full text
    Article
  6. 426

    An effective scheduling in data centres for efficient CPU usage and service level agreement fulfilment using machine learning by Rohit Daid, Yogesh Kumar, Yu-Chen Hu, Wu-Lin Chen

    Published 2021-10-01
    “…In addition, the power consumption, as well as management of the node clusters is also a problematic situation when the CPU utilisation increases up to the limit. …”
    Get full text
    Article
  7. 427

    A Scalable Multi-Target Tracking Algorithm for Wireless Sensor Networks by Songhwai Oh

    Published 2012-09-01
    “…The task of tracking multiple objects in a wireless sensor network is challenging due to constraints on a sensor node such as short communication and sensing ranges, a limited amount of memory, and limited computational power. …”
    Get full text
    Article
  8. 428

    A self-configuration framework for balancing services in the fog of things by Edson Mota, Jurandir Barbosa, Gustavo B. Figueiredo, Maycon Peixoto, Cássio Prazeres

    Published 2024-01-01
    “…Specifically, in scenarios with ten fog nodes, our approach increases average availability by 10 ​%–20 ​% and achieves 70 ​%–80 ​% load balancing. …”
    Get full text
    Article
  9. 429

    Multi-level clustering and Prediction based energy efficient routing protocol to eliminate Hotspot problem in Wireless Sensor Networks. by Bhaskar Prince, Prabhat Kumar, Sunil Kumar Singh

    Published 2025-01-01
    “…Analysis indicates that the proposed protocol effectively mitigates the hot-spot problem and reduces data transmission overhead of sensor nodes. In simulation, the proposed protocol on an average improves network life by 34.5%, 23.5%, 14.5% and 5.5% as compared to existing protocols FCEEC, DBSCAN, LPGCR and FBECS respectively for deployment of nodes between 600 to 1200. …”
    Get full text
    Article
  10. 430

    Energy-Efficient Hybrid Adaptive Clustering for Dynamic MANETs by Kudret Yilmaz, Resul Kara, Ferzan Katircioglu

    Published 2025-01-01
    “…Mobile ad hoc network (MANET) is a wireless, mobile node network in which the nodes move randomly and operate without centralized management. …”
    Get full text
    Article
  11. 431

    Deep Reinforcement Learning-Based Routing Method for Low Earth Orbit Mega-Constellation Satellite Networks with Service Function Constraints by Yan Chen, Huan Cao, Longhe Wang, Daojin Chen, Zifan Liu, Yiqing Zhou, Jinglin Shi

    Published 2025-02-01
    “…Specifically, this method constructs the system model based on the latest NTN low-orbit satellite network end-to-end transmission architecture, taking into account the SFC constraints, transmission delays, and network node loads in the end-to-end traffic transmission, uses a GNN to extract node attributes and dynamic topology features, and uses the DRL method to design specific reward functions to train the model to learn routing policies that satisfy the SFC constraints. …”
    Get full text
    Article
  12. 432

    From MRI to FEM: an automated pipeline for biomechanical simulations of vertebrae and intervertebral discs by Kati Nispel, Kati Nispel, Tanja Lerchl, Gabriel Gruber, Hendrik Moeller, Robert Graf, Veit Senner, Jan S. Kirschke, Jan S. Kirschke

    Published 2025-01-01
    “…We rated mesh quality metrics and processing times.ResultsWith an average number of 21 vertebrae and 20 IVDs per subject, the average processing time was 4.4 min for a vertebra and 31 s for an IVD. …”
    Get full text
    Article
  13. 433

    GNODEVAE: a graph-based ODE-VAE enhances clustering for single-cell data by Zeyu Fu, Chunlin Chen, Song Wang, Junping Wang, Shilei Chen

    Published 2025-08-01
    “…Results We present GNODEVAE, a novel architecture integrating Graph Attention Networks (GAT), Neural Ordinary Differential Equations (NODE), and Variational Autoencoders (VAE) for comprehensive single-cell analysis. …”
    Get full text
    Article
  14. 434

    Heap Optimization in A* Pathfinding for Horror Games by Risaldi Angga Buana Putra, Ary Setijadi Prihatmanto, Rahadian Yusuf, Agus Sukoco

    Published 2025-03-01
    “…Heap optimization is introduced to enhance A* performance by reducing the time required to identify the lowest-cost node in the Open List. Experimental results from a Unity-based prototype demonstrate that the optimized A* achieves an average pathfinding time of 1.6 ms, compared to 3.16 ms without optimization—representing a 49.37% improvement. …”
    Get full text
    Article
  15. 435

    Synchronous Firefly Algorithm for Cluster Head Selection in WSN by Madhusudhanan Baskaran, Chitra Sadagopan

    Published 2015-01-01
    “…Wireless Sensor Network (WSN) consists of small low-cost, low-power multifunctional nodes interconnected to efficiently aggregate and transmit data to sink. …”
    Get full text
    Article
  16. 436

    Hyperspectral target detection based on graph sampling and aggregation network. by Tie Li, Hongfeng Jin, Zhiqiu Li

    Published 2025-01-01
    “…This proposed model is capable of autonomously learning the effective feature representations of nodes within the graph, thereby facilitating the extraction and processing of graph data. …”
    Get full text
    Article
  17. 437

    Crowd-based collaboration caching mechanism in smart identifier network by Haifeng LI, Wei QUAN, Nan CHENG, Hongke ZHANG, Xuemin SHEN

    Published 2018-12-01
    “…Smart identifier network (SINET) is an innovative network architecture.Through dynamic collaboration of service resource,function groups and physical components,the network scalability,resource utilization and service quality were effectively improved by SINET,and an effective solution for the development of industrial Internet of things(IoT) could be provided.To promote content delivery in resource-constrained IoT,caching function was introduced in network components by SINET,and the bandwidth waste caused by traffic redundancy in resource-constrained node could be reduced.Therefore,how to efficiently cache content became an important research topic.Based on SINET architecture,a crowd-based collaboration cache (C2Cache) mechanism was proposed in this scheme.According to the actual network topology,the caching function group was dynamically created and optimized by C2Cache,and a function group as crowd minimum unit to execute the maximum benefit cache (MBC) algorithm was defined to maximize the caching space efficiency.With the self-developed emulation system,named EmuStack,the performance of C2Cache was evaluated.The experimental results show that,comparing with LCE,Random,Prob Cache,LCD and Greedy caching mechanisms,the cache hit rate can be improved effectively,then the average access time can be reduced significantly by C2Cache.In the simulated network scenario,the performance increases 15% to 30%.…”
    Get full text
    Article
  18. 438

    Self-Adaptive Trust Based ABR Protocol for MANETs Using Q-Learning by Anitha Vijaya Kumar, Akilandeswari Jeyapal

    Published 2014-01-01
    “…Thus secure and stable route is calculated as a weighted average of the trust value of the nodes in the route and associativity ticks ensure the stability of the route. …”
    Get full text
    Article
  19. 439

    A high‐performance full swing 1‐bit hybrid full adder cell by Shahbaz Hussain, Mehedi Hasan, Gazal Agrawal, Mohd Hasan

    Published 2022-05-01
    “…The performance evaluation of the proposed FA cell has been carried out using an HSPICE simulator at the 16 nm process node by comparing it with eight existing FAs over the supply voltage ranging from 0.4 to 1.0 V. …”
    Get full text
    Article
  20. 440

    Minimizing the Number of Mobile Chargers to Keep Large-Scale WRSNs Working Perpetually by Cheng Hu, Yun Wang

    Published 2015-06-01
    “…Wireless Rechargeable Sensor Networks, in which mobile chargers ( M C s) are employed to recharge the sensor nodes, have attracted wide attention in recent years. …”
    Get full text
    Article