Suggested Topics within your search.
Suggested Topics within your search.
-
461
Two-hop distance estimation in wireless sensor networks
Published 2017-02-01“…In this article, we propose a two-hop distance estimation method, which first obtains the region in which the two-hop neighbor nodes possibly exist and then takes the average of the distances to the points in that region. …”
Get full text
Article -
462
Bluetooth-Based Dynamic Nexus Mesh Communication Network for High-Density Urban Interaction Spaces
Published 2025-04-01“…DNMC reduces the reliance on central super nodes in traditional centralized networks by redistributing network centrality while increasing the betweenness centrality of a broader set of nodes. …”
Get full text
Article -
463
EasiLIR: Lightweight Incremental Reprogramming for Sensor Networks
Published 2014-01-01“…However, the program rebuilding phase on target node is possibly as another significant part of the total reprogramming energy consumption, due to the high energy overhead of reading or writing operation on the energy-hungry nonvolatile memory. …”
Get full text
Article -
464
Predictors of breakfast consumption among Iranian students: applying social cognitive theory
Published 2022-06-01Get full text
Article -
465
User-Centric Federated Learning: Trading off Wireless Resources for Personalization
Published 2023-01-01“…Our algorithm outperforms popular personalized FL baselines in terms of average accuracy, worst node performance, and training communication overhead.…”
Get full text
Article -
466
Electronic Information Signal Recognition Based on a Stochastic Neural Network Algorithm
Published 2022-01-01“…After the hidden layer node L=20, the training error decline speed of RVFL tends to be gentle. …”
Get full text
Article -
467
Optimizing Wireless Sensor Network longevity with hierarchical chain-based routing and vertical network partitioning techniques
Published 2024-12-01“…According to this approach, the transition is carried out when the node's residual energy is about to run out. The suggested method has the potential to enhance the average network longevity substantially when compared to existing routing techniques. …”
Get full text
Article -
468
Space-Time Coded Buffer-Aided Relaying for Improving the Reliability of Cooperative Networks
Published 2025-01-01“…Unlike the existing DF BA relay selection solutions where the relays attempt independently to deliver the information message to the destination node, this work introduces a new methodology for leveraging the outage performance of the network by enabling space-time (ST) coded transmissions. …”
Get full text
Article -
469
Immunohistochemical analysis of angiogenesis in invasive ductal breast carcinoma with correlations to clinic pathological factor
Published 2006-01-01“…In the cases with a high MVC, there was a significant number of tumors with lymph node metastases. Conclusion. Our findings showed that a high MVC might point out an aggressive tumor phenotype. …”
Get full text
Article -
470
Scalable THz Network-On-Chip Architecture for Multichip Systems
Published 2020-01-01“…Each chip has a wireless node as a gateway for communicating with other chips. …”
Get full text
Article -
471
Efficacy of combined colorectal cancer treatment in senile patients
Published 2018-08-01“…Patients with the IV stage of CRC underwent standard volume surgery with high-grade lymph node dissection due to the high risk of obstruction or tumor bleeding. …”
Get full text
Article -
472
Enriched HARQ Feedback for Link Adaptation in 6G: Optimizing Uplink Overhead for Enhanced Downlink Spectral Efficiency
Published 2025-01-01“…To address this, we introduce an enriched HARQ feedback (EHF) framework that goes beyond reliability gains to enhance spectral efficiency by reporting delta adjustments in modulation and coding scheme (MCS) levels from user equipment (UE) to the gNodeB (gNB). This framework features two innovations. …”
Get full text
Article -
473
Analysis of Aftershocks from California and Synthetic Series by Using Visibility Graph Algorithm
Published 2025-02-01“…Specifically, VGA transforms time series into a network representation in which structural properties such as node connectivity, clustering, and community structure can be quantitatively measured, thereby revealing underlying correlations and dynamics that may remain hidden in traditional linear or spectral analyses. …”
Get full text
Article -
474
Surgical Anatomy of the Lateral Thoracic Artery and Its Perforators: A Computed Tomographic Angiography and Cadaveric Dissection Study
Published 2024-12-01“…At least 1-2 cutaneous perforators and 1 proximal lymph node were found across both thoracic CTAs and cadavers. …”
Get full text
Article -
475
Static Voltage Stability Evaluation and Correction Strategy Based on Stage Solving Strategy and SIFT
Published 2025-01-01“…In addition, in time phase 1 of the IEEE30 node system, the average value of load margin for each scenario in the first phase was 18.62 MW, which was below the load margin threshold. …”
Get full text
Article -
476
Research on Lightweight Dynamic Security Protocol for Intelligent In-Vehicle CAN Bus
Published 2025-05-01“…Each Electronic Control Unit (ECU) node independently performs compression, encryption, and authentication while periodically updating its keys to enhance system security and strengthen defense capabilities. …”
Get full text
Article -
477
Securing fog computing in healthcare with a zero-trust approach and blockchain
Published 2025-02-01“…Additionally, tasks are dynamically allocated to fog nodes based on a multi-metric scheduling mechanism that considers fog node capacity, proximity, and compliance with predefined security protocols. …”
Get full text
Article -
478
LTEM: Lightweight Trust Evaluation Model in IoT Environment
Published 2024-06-01“…Moreover, LTEM enhances the operational efficiency of sensor nodes regarding energy consumption, achieving an average energy utilization of 1.33J out of 4J, resulting in savings of approximately 2.67J on average, thereby extending the lifespan of nodes. …”
Get full text
Article -
479
Routing Protocols in Underwater Acoustic Sensor Networks: A Quantitative Comparison
Published 2015-10-01“…In order to make the underwater application possible, the unique characteristics of underwater acoustic channels and continuous node movement inspired the emergence of routing protocols for underwater environment. …”
Get full text
Article -
480
Pairing-free Proxy Re-Encryption scheme with Equality Test for data security of IoT
Published 2024-07-01“…The construction of IoT cloud platform brings great convenience to the storage of massive IoT node data. To ensure security of data collected by the IoT nodes, the data must be encrypted when the nodes upload it. …”
Get full text
Article