Suggested Topics within your search.
Suggested Topics within your search.
-
821
Distributed and Fault-Tolerant Routing for Borel Cayley Graphs
Published 2012-10-01“…We explore the use of a pseudorandom graph family, Borel Cayley graph family, as the network topology with thousands of nodes operating in a packet switching environment. …”
Get full text
Article -
822
Power control strategy with joint of multi-packet reception and fuzzy logic control
Published 2015-02-01“…In order to meet the needs of energy saving in wireless networks,a power control strategy with joint of multi-packet reception and fuzzy logic was proposed.Firstly,based on the power control with successive interference cancellation (SIC),transmission power was divided into several decodable power levels.Secondly,fuzzy logic control algorithm was adopted to select the optimal transmission power for SIC.In addition,three parameters were designed as fuzzy logic control inputs for power selection,which were the distance between transmitters and receivers,the number of neighboring nodes and the residual energy of transmitters.Simulation results show that power control strategy with joint of multi-packet reception and fuzzy logic control not only betters average network throughput than other power control strategy for SIC,but also saves more energy so that the network lifecycle would be significantly extended.…”
Get full text
Article -
823
Power control strategy with joint of multi-packet reception and fuzzy logic control
Published 2015-02-01“…In order to meet the needs of energy saving in wireless networks,a power control strategy with joint of multi-packet reception and fuzzy logic was proposed.Firstly,based on the power control with successive interference cancellation (SIC),transmission power was divided into several decodable power levels.Secondly,fuzzy logic control algorithm was adopted to select the optimal transmission power for SIC.In addition,three parameters were designed as fuzzy logic control inputs for power selection,which were the distance between transmitters and receivers,the number of neighboring nodes and the residual energy of transmitters.Simulation results show that power control strategy with joint of multi-packet reception and fuzzy logic control not only betters average network throughput than other power control strategy for SIC,but also saves more energy so that the network lifecycle would be significantly extended.…”
Get full text
Article -
824
Cache replacement strategy based on content value
Published 2018-11-01“…The cache replacement mechanism is one of the important research issues of the content center network.Considering the limited cache space,the reasonable replacement of the cache content becomes a key factor affecting the overall performance of the network.Therefore,a cache replacement scheme based on content value was designed.Considering the dynamic popularity of content,the cost of caching,and the time of the most recently requested,a more realistic content value function was built,and an effective content storage and replacement scheme was designed based on the content value function.Specifically,when the cache space was insufficient,the existing cache contents were replaced according to the value from small to large.Simulation results show that compared with the traditional replacement algorithms LRU,LFU and FIFO,the proposed scheme effectively improves the content cache hit rate of network nodes and reduces the average hops of users’ content acquisition.…”
Get full text
Article -
825
Complex Network in Solar Features
Published 2024-10-01“…Applying the detrended fluctuation and rescaled range analysis and nodes degree power-law distributions confirmed the non-randomness of the solar features complex networks. …”
Get full text
Article -
826
Study of biological activity of 2-quinoline-2-yl-derivative 1,3-tropolone in experiment
Published 2022-06-01“…Antitumor tropolone effects were studied in subcutaneous patient‑derived xenograft (PDX) models of human squamous cell lung cancer in Balb/c Nude mice. The average volumes of tumor nodes and tumor growth inhibition (TGI %) rate were taken into account. …”
Get full text
Article -
827
QUANTITATIVE RHOA Gly17Val ALLELE-SPECIFIC POLYMERASE CHAIN REACTION AND T-CELL CLONALITY ANALYSIS IN ANGIOIMMUNOBLASTIC T-CELL LYMPHOMA
Published 2018-02-01“…Аngioimmunoblastic T-cell lymphoma (AITL) is a T-cell lymphoma, characterized by abundant polymorphocellular infiltrate of lymph nodes with the small number of tumor CD4+ T-cells. …”
Get full text
Article -
828
Understanding the Dynamics of Knowledge Building Process in Online Knowledge-Sharing Platform: A Structural Analysis of Zhihu Tag Network
Published 2022-01-01“…Based on the preference attachment, the triadic closure mechanism is employed to construct the edges between the old nodes, which revises the limitation that the BA model only connects edges between old and new nodes. …”
Get full text
Article -
829
A weighted and distributed algorithm for multi-hop localization
Published 2019-06-01“…Most applications assume the knowledge of geographic location of sensor nodes; however, in practical scenarios, the high accuracy on position estimates of sensor nodes is still a great challenge. …”
Get full text
Article -
830
and Epidemiological Characteristics of Tuberculosis in Children in the Astrakhan Region
Published 2018-12-01“…The incidence of tuberculosis of children in the region exceeds the average Russian Federation 2.9, the southern Federal district in 3.2 time. …”
Get full text
Article -
831
Key Lines Identification in Power Grid Based on Comprehensive Index Calculated by the Entropy Weight-Analytical Hierarchy Process
Published 2020-05-01“…In order to accurately identify the key lines of the power grid, the paper firstly proposes the Theil entropy of voltage variation and power flow variation based on the Theil entropy theory, in view of the state of the power grid and with consideration of the types of grid nodes and line load rate. The maximum flow contribution betweenness and average closeness index is proposed, so as to make the evaluation results more consistent with the complex network and the actual grid structure model. the entropy weight method and the analytic hierarchy process are used to determine the weight of indexes, and the comprehensive evaluation index of the key lines are obtained, which not only takes into account the changes of the power grid state and the power grid structure, but also the objective data and subjective experience. …”
Get full text
Article -
832
Boundary Recognition by Simulating a Diffusion Process in Wireless Sensor Networks
Published 2014-01-01“…By simulating a diffusion process in discrete form, the end point of semi-contours suggests the boundary nodes of a WSN. The simulation cases show the algorithm is well worked in WSN with average degree higher than 10. …”
Get full text
Article -
833
The Effectiveness of the Method Chiva in Patients with Chronic Venous Insufficiency and Comorbid Lesions: own Experience
Published 2015-12-01“…In the postoperative period the recurrent bleeding from varicose nodes was not observed in any of the patients. Paresthesia in the cut places was observed in 14 (37.8 %) patients, subcutaneous hematomas were observed in 3 (8.1 %) patients. …”
Get full text
Article -
834
Transcervical approach for oropharyngeal cancer
Published 2018-07-01“…Tracheostomy tube was removed on postoperative day 6.4 on average. In 43 (91.5 %) cases patients were able to resume oral diet 14 days after the operation on average. …”
Get full text
Article -
835
Adaptive MANET Multipath Routing Algorithm Based on the Simulated Annealing Approach
Published 2014-01-01“…Mobile ad hoc network represents a system of wireless mobile nodes that can freely and dynamically self-organize network topologies without any preexisting communication infrastructure. …”
Get full text
Article -
836
Exploiting interests and behavior prediction for dynamic resource discovery in mobile social networking
Published 2016-04-01“…Simulations results show that the proposed scheme consistently outperforms the state-of-the-art resource discovery schemes in terms of the searching efficiency the average delay and the communication cost.…”
Get full text
Article -
837
Efficient algorithm for calculating short cycles in Tanner graph based on matrix computation
Published 2017-04-01“…Loop distribution of Tanner graph affects the BER performance of low-density parity-check codes(LDPC) decoding.To count short cycles in the Tanner graph efficiently,a side by side recursion algorithm based on matrix computation was proposed.Firstly,5 basic graph structures were defined to realize recursive calculate in the implementation process.Compared with previous works,the algorithm provided many methods for counting the same length of cycles.The same result confirmed the correctness of the algorithm.The new algorithm could not only calculate the total number of cycles,but also gave the number each edge participating in fixed-length cycles.Its complexity was proportional to the product of D and square of N,where D was the average degree of variable nodes,and N denoted the code length.For LDPC codes,D was far less than N.For most of the LDPC codes,the calculation for numbers of cycle-length g、g+2、g+4 was only several seconds.…”
Get full text
Article -
838
Efficient algorithm for calculating short cycles in Tanner graph based on matrix computation
Published 2017-04-01“…Loop distribution of Tanner graph affects the BER performance of low-density parity-check codes(LDPC) decoding.To count short cycles in the Tanner graph efficiently,a side by side recursion algorithm based on matrix computation was proposed.Firstly,5 basic graph structures were defined to realize recursive calculate in the implementation process.Compared with previous works,the algorithm provided many methods for counting the same length of cycles.The same result confirmed the correctness of the algorithm.The new algorithm could not only calculate the total number of cycles,but also gave the number each edge participating in fixed-length cycles.Its complexity was proportional to the product of D and square of N,where D was the average degree of variable nodes,and N denoted the code length.For LDPC codes,D was far less than N.For most of the LDPC codes,the calculation for numbers of cycle-length g、g+2、g+4 was only several seconds.…”
Get full text
Article -
839
An Adaptive Energy-Efficient Data Collection System for ZigBee Wireless Sensor Networks
Published 2015-12-01“…The effectiveness of the proposed system has been demonstrated via simulation and experimental studies and verified that, using a single robot for data collection, the lifetime of the network can be extended by 2.3 times in average.…”
Get full text
Article -
840
An Optimized Replica Distribution Method in Cloud Storage System
Published 2017-01-01“…Moreover, the deputy catalog acquisition method to design and copy the information is given. Then, the nodes with the global replica of the information replicate data resources, which have the high access frequency and the long response time. …”
Get full text
Article