Showing 461 - 480 results of 1,116 for search 'Node average', query time: 0.09s Refine Results
  1. 461

    Two-hop distance estimation in wireless sensor networks by Sunyong Kim, Sun Young Park, Daehoon Kwon, Jaehyun Ham, Young-Bae Ko, Hyuk Lim

    Published 2017-02-01
    “…In this article, we propose a two-hop distance estimation method, which first obtains the region in which the two-hop neighbor nodes possibly exist and then takes the average of the distances to the points in that region. …”
    Get full text
    Article
  2. 462

    Bluetooth-Based Dynamic Nexus Mesh Communication Network for High-Density Urban Interaction Spaces by Yufei Hu, Ngai Cheong, Muya Yao, Qingwen Long, Yide Yu

    Published 2025-04-01
    “…DNMC reduces the reliance on central super nodes in traditional centralized networks by redistributing network centrality while increasing the betweenness centrality of a broader set of nodes. …”
    Get full text
    Article
  3. 463

    EasiLIR: Lightweight Incremental Reprogramming for Sensor Networks by Jiefan Qiu, Dong Li, Hailong Shi, Li Cui

    Published 2014-01-01
    “…However, the program rebuilding phase on target node is possibly as another significant part of the total reprogramming energy consumption, due to the high energy overhead of reading or writing operation on the energy-hungry nonvolatile memory. …”
    Get full text
    Article
  4. 464
  5. 465

    User-Centric Federated Learning: Trading off Wireless Resources for Personalization by Mohamad Mestoukirdi, Matteo Zecchin, David Gesbert, Qianrui Li

    Published 2023-01-01
    “…Our algorithm outperforms popular personalized FL baselines in terms of average accuracy, worst node performance, and training communication overhead.…”
    Get full text
    Article
  6. 466

    Electronic Information Signal Recognition Based on a Stochastic Neural Network Algorithm by Jiaye Wang

    Published 2022-01-01
    “…After the hidden layer node L=20, the training error decline speed of RVFL tends to be gentle. …”
    Get full text
    Article
  7. 467

    Optimizing Wireless Sensor Network longevity with hierarchical chain-based routing and vertical network partitioning techniques by V. Rama Krishna, Vuppala Sukanya, Mohd Abdul Hameed

    Published 2024-12-01
    “…According to this approach, the transition is carried out when the node's residual energy is about to run out. The suggested method has the potential to enhance the average network longevity substantially when compared to existing routing techniques. …”
    Get full text
    Article
  8. 468

    Space-Time Coded Buffer-Aided Relaying for Improving the Reliability of Cooperative Networks by Chadi Abou-Rjeily

    Published 2025-01-01
    “…Unlike the existing DF BA relay selection solutions where the relays attempt independently to deliver the information message to the destination node, this work introduces a new methodology for leveraging the outage performance of the network by enabling space-time (ST) coded transmissions. …”
    Get full text
    Article
  9. 469

    Immunohistochemical analysis of angiogenesis in invasive ductal breast carcinoma with correlations to clinic pathological factor by Ivković-Kapicl Tatjana, Knežević-Ušaj Slavica, Panjković Milana, Mastilović Katarina

    Published 2006-01-01
    “…In the cases with a high MVC, there was a significant number of tumors with lymph node metastases. Conclusion. Our findings showed that a high MVC might point out an aggressive tumor phenotype. …”
    Get full text
    Article
  10. 470

    Scalable THz Network-On-Chip Architecture for Multichip Systems by Esmaeel Tahanian, Alireza Tajary, Mohsen Rezvani, Mansoor Fateh

    Published 2020-01-01
    “…Each chip has a wireless node as a gateway for communicating with other chips. …”
    Get full text
    Article
  11. 471

    Efficacy of combined colorectal cancer treatment in senile patients by P. V. Tsarkov, D. R. Markaryan, V. M. Nekoval

    Published 2018-08-01
    “…Patients with the IV stage of CRC underwent standard volume surgery with high-grade lymph node dissection due to the high risk of obstruction or tumor bleeding. …”
    Get full text
    Article
  12. 472

    Enriched HARQ Feedback for Link Adaptation in 6G: Optimizing Uplink Overhead for Enhanced Downlink Spectral Efficiency by Aritra Mazumdar, Abolfazl Amiri, Stefano Paris, Klaus I. Pedersen, Ramoni Adeogun

    Published 2025-01-01
    “…To address this, we introduce an enriched HARQ feedback (EHF) framework that goes beyond reliability gains to enhance spectral efficiency by reporting delta adjustments in modulation and coding scheme (MCS) levels from user equipment (UE) to the gNodeB (gNB). This framework features two innovations. …”
    Get full text
    Article
  13. 473

    Analysis of Aftershocks from California and Synthetic Series by Using Visibility Graph Algorithm by Alejandro Muñoz-Diosdado, Ana María Aguilar-Molina, Eric Eduardo Solis-Montufar, José Alberto Zamora-Justo

    Published 2025-02-01
    “…Specifically, VGA transforms time series into a network representation in which structural properties such as node connectivity, clustering, and community structure can be quantitatively measured, thereby revealing underlying correlations and dynamics that may remain hidden in traditional linear or spectral analyses. …”
    Get full text
    Article
  14. 474
  15. 475

    Static Voltage Stability Evaluation and Correction Strategy Based on Stage Solving Strategy and SIFT by Yan Wen, Xiaoming Liu, Yongzhi Zhou, Huiwen Zhang, Donglei Sun

    Published 2025-01-01
    “…In addition, in time phase 1 of the IEEE30 node system, the average value of load margin for each scenario in the first phase was 18.62 MW, which was below the load margin threshold. …”
    Get full text
    Article
  16. 476

    Research on Lightweight Dynamic Security Protocol for Intelligent In-Vehicle CAN Bus by Yuanhao Wang, Yinan Xu, Zhiquan Liu, Suya Liu, Yujing Wu

    Published 2025-05-01
    “…Each Electronic Control Unit (ECU) node independently performs compression, encryption, and authentication while periodically updating its keys to enhance system security and strengthen defense capabilities. …”
    Get full text
    Article
  17. 477

    Securing fog computing in healthcare with a zero-trust approach and blockchain by Navjeet Kaur, Ayush Mittal, Umesh Kumar Lilhore, Sarita Simaiya, Surjeet Dalal, Kashif Saleem, Ehab Seif Ghith

    Published 2025-02-01
    “…Additionally, tasks are dynamically allocated to fog nodes based on a multi-metric scheduling mechanism that considers fog node capacity, proximity, and compliance with predefined security protocols. …”
    Get full text
    Article
  18. 478

    LTEM: Lightweight Trust Evaluation Model in IoT Environment by Somya Abdulkarim Alhandi, Hazalila Kamaludin, Nayef Abdulwahab Mohammed Alduais, Noor Zuraidin Mohd Safar, Salama A. Mostafa

    Published 2024-06-01
    “…Moreover, LTEM enhances the operational efficiency of sensor nodes regarding energy consumption, achieving an average energy utilization of 1.33J out of 4J, resulting in savings of approximately 2.67J on average, thereby extending the lifespan of nodes. …”
    Get full text
    Article
  19. 479

    Routing Protocols in Underwater Acoustic Sensor Networks: A Quantitative Comparison by Guangjie Han, Na Bao, Li Liu, Daqiang Zhang, Lei Shu

    Published 2015-10-01
    “…In order to make the underwater application possible, the unique characteristics of underwater acoustic channels and continuous node movement inspired the emergence of routing protocols for underwater environment. …”
    Get full text
    Article
  20. 480

    Pairing-free Proxy Re-Encryption scheme with Equality Test for data security of IoT by Gang Han, Le Li, Baodong Qin, Dong Zheng

    Published 2024-07-01
    “…The construction of IoT cloud platform brings great convenience to the storage of massive IoT node data. To ensure security of data collected by the IoT nodes, the data must be encrypted when the nodes upload it. …”
    Get full text
    Article