Showing 821 - 840 results of 1,116 for search 'Node average', query time: 0.08s Refine Results
  1. 821

    Distributed and Fault-Tolerant Routing for Borel Cayley Graphs by Junghun Ryu, Eric Noel, K. Wendy Tang

    Published 2012-10-01
    “…We explore the use of a pseudorandom graph family, Borel Cayley graph family, as the network topology with thousands of nodes operating in a packet switching environment. …”
    Get full text
    Article
  2. 822

    Power control strategy with joint of multi-packet reception and fuzzy logic control by Jiang-hong HAN, Song-hua HU, Bin LIU, Zhen CHEN, Lei LIU

    Published 2015-02-01
    “…In order to meet the needs of energy saving in wireless networks,a power control strategy with joint of multi-packet reception and fuzzy logic was proposed.Firstly,based on the power control with successive interference cancellation (SIC),transmission power was divided into several decodable power levels.Secondly,fuzzy logic control algorithm was adopted to select the optimal transmission power for SIC.In addition,three parameters were designed as fuzzy logic control inputs for power selection,which were the distance between transmitters and receivers,the number of neighboring nodes and the residual energy of transmitters.Simulation results show that power control strategy with joint of multi-packet reception and fuzzy logic control not only betters average network throughput than other power control strategy for SIC,but also saves more energy so that the network lifecycle would be significantly extended.…”
    Get full text
    Article
  3. 823

    Power control strategy with joint of multi-packet reception and fuzzy logic control by Jiang-hong HAN, Song-hua HU, Bin LIU, Zhen CHEN, Lei LIU

    Published 2015-02-01
    “…In order to meet the needs of energy saving in wireless networks,a power control strategy with joint of multi-packet reception and fuzzy logic was proposed.Firstly,based on the power control with successive interference cancellation (SIC),transmission power was divided into several decodable power levels.Secondly,fuzzy logic control algorithm was adopted to select the optimal transmission power for SIC.In addition,three parameters were designed as fuzzy logic control inputs for power selection,which were the distance between transmitters and receivers,the number of neighboring nodes and the residual energy of transmitters.Simulation results show that power control strategy with joint of multi-packet reception and fuzzy logic control not only betters average network throughput than other power control strategy for SIC,but also saves more energy so that the network lifecycle would be significantly extended.…”
    Get full text
    Article
  4. 824

    Cache replacement strategy based on content value by Dan HUANG, Rongfang SONG

    Published 2018-11-01
    “…The cache replacement mechanism is one of the important research issues of the content center network.Considering the limited cache space,the reasonable replacement of the cache content becomes a key factor affecting the overall performance of the network.Therefore,a cache replacement scheme based on content value was designed.Considering the dynamic popularity of content,the cost of caching,and the time of the most recently requested,a more realistic content value function was built,and an effective content storage and replacement scheme was designed based on the content value function.Specifically,when the cache space was insufficient,the existing cache contents were replaced according to the value from small to large.Simulation results show that compared with the traditional replacement algorithms LRU,LFU and FIFO,the proposed scheme effectively improves the content cache hit rate of network nodes and reduces the average hops of users’ content acquisition.…”
    Get full text
    Article
  5. 825

    Complex Network in Solar Features by Somayeh Taran

    Published 2024-10-01
    “…Applying the detrended fluctuation and rescaled range analysis and nodes degree power-law distributions confirmed the non-randomness of the solar features complex networks. …”
    Get full text
    Article
  6. 826

    Study of biological activity of 2-quinoline-2-yl-derivative 1,3-tropolone in experiment by E. A. Lukbanova, E. A. Dzhenkova, A. S. Goncharova, A. Yu. Maksimov, E. F. Komarova, V. I. Minkin, Yu. A. Sayapin, E. A. Gusakov, L. Z. Kurbanova, A. A. Kiblitskaya, E. V. Zaikina, M. V. Mindar, M. V. Voloshin, A. V. Shaposhnikov, I. B. Lysenko, N. V. Nikolaeva

    Published 2022-06-01
    “…Antitumor tropolone effects were studied in subcutaneous patient‑derived xenograft (PDX) models of human squamous cell lung cancer in Balb/c Nude mice. The average volumes of tumor nodes and tumor growth inhibition (TGI %) rate were taken into account. …”
    Get full text
    Article
  7. 827

    QUANTITATIVE RHOA Gly17Val ALLELE-SPECIFIC POLYMERASE CHAIN REACTION AND T-CELL CLONALITY ANALYSIS IN ANGIOIMMUNOBLASTIC T-CELL LYMPHOMA by Yu. V. Sidorova, N. G. Chernova, I. A. Yakutik, S. Yu. Smirnova, N. V. Ryzhikova, E. E. Nikulina, M. Yu. Aleksenko, M. N. Sinitsyna, A. M. Kovrigina, T. N. Moiseeva, E. E. Zvonkov, A. B. Sudarikov

    Published 2018-02-01
    “…Аngioimmunoblastic T-cell lymphoma (AITL) is a T-cell lymphoma, characterized by abundant polymorphocellular infiltrate of lymph nodes with the small number of tumor CD4+ T-cells. …”
    Get full text
    Article
  8. 828

    Understanding the Dynamics of Knowledge Building Process in Online Knowledge-Sharing Platform: A Structural Analysis of Zhihu Tag Network by Yongning Li, Lun Zhang, Ye Wu

    Published 2022-01-01
    “…Based on the preference attachment, the triadic closure mechanism is employed to construct the edges between the old nodes, which revises the limitation that the BA model only connects edges between old and new nodes. …”
    Get full text
    Article
  9. 829

    A weighted and distributed algorithm for multi-hop localization by Juan Cota-Ruiz, Rafael Gonzalez-Landaeta, Jose David Diaz-Roman, Boris Mederos-Madrazo, Ernesto Sifuentes

    Published 2019-06-01
    “…Most applications assume the knowledge of geographic location of sensor nodes; however, in practical scenarios, the high accuracy on position estimates of sensor nodes is still a great challenge. …”
    Get full text
    Article
  10. 830

    and Epidemiological Characteristics of Tuberculosis in Children in the Astrakhan Region by G. A. Kharchenko, O. G. Kimirilova, E. N. Streltsovа, O. N. Chabanova

    Published 2018-12-01
    “…The incidence of tuberculosis of children in the region exceeds the average Russian Federation 2.9, the southern Federal district in 3.2 time. …”
    Get full text
    Article
  11. 831

    Key Lines Identification in Power Grid Based on Comprehensive Index Calculated by the Entropy Weight-Analytical Hierarchy Process by Hao WU, Ziwei ZHU

    Published 2020-05-01
    “…In order to accurately identify the key lines of the power grid, the paper firstly proposes the Theil entropy of voltage variation and power flow variation based on the Theil entropy theory, in view of the state of the power grid and with consideration of the types of grid nodes and line load rate. The maximum flow contribution betweenness and average closeness index is proposed, so as to make the evaluation results more consistent with the complex network and the actual grid structure model. the entropy weight method and the analytic hierarchy process are used to determine the weight of indexes, and the comprehensive evaluation index of the key lines are obtained, which not only takes into account the changes of the power grid state and the power grid structure, but also the objective data and subjective experience. …”
    Get full text
    Article
  12. 832

    Boundary Recognition by Simulating a Diffusion Process in Wireless Sensor Networks by De Gu, Jishuai Wang, Ji Li

    Published 2014-01-01
    “…By simulating a diffusion process in discrete form, the end point of semi-contours suggests the boundary nodes of a WSN. The simulation cases show the algorithm is well worked in WSN with average degree higher than 10. …”
    Get full text
    Article
  13. 833

    The Effectiveness of the Method Chiva in Patients with Chronic Venous Insufficiency and Comorbid Lesions: own Experience by Yarka A.

    Published 2015-12-01
    “…In the postoperative period the recurrent bleeding from varicose nodes was not observed in any of the patients. Paresthesia in the cut places was observed in 14 (37.8 %) patients, subcutaneous hematomas were observed in 3 (8.1 %) patients. …”
    Get full text
    Article
  14. 834

    Transcervical approach for oropharyngeal cancer by A. V. Karpenko, R. R. Sibgatullin, A. A. Boyko, N. S. Chumanikhina, M. G. Kostova, O. M. Nikolayeva, I. A Togo

    Published 2018-07-01
    “…Tracheostomy tube was removed on postoperative day 6.4 on average. In 43 (91.5 %) cases patients were able to resume oral diet 14 days after the operation on average. …”
    Get full text
    Article
  15. 835

    Adaptive MANET Multipath Routing Algorithm Based on the Simulated Annealing Approach by Sungwook Kim

    Published 2014-01-01
    “…Mobile ad hoc network represents a system of wireless mobile nodes that can freely and dynamically self-organize network topologies without any preexisting communication infrastructure. …”
    Get full text
    Article
  16. 836

    Exploiting interests and behavior prediction for dynamic resource discovery in mobile social networking by Zhi-yuan LI, Ru-long CHEN, Ru-chuan WANG

    Published 2016-04-01
    “…Simulations results show that the proposed scheme consistently outperforms the state-of-the-art resource discovery schemes in terms of the searching efficiency the average delay and the communication cost.…”
    Get full text
    Article
  17. 837

    Efficient algorithm for calculating short cycles in Tanner graph based on matrix computation by Qing ZHU, Le-nan WU, Yong-biao YANG, Jie LI, Shi-ming XU

    Published 2017-04-01
    “…Loop distribution of Tanner graph affects the BER performance of low-density parity-check codes(LDPC) decoding.To count short cycles in the Tanner graph efficiently,a side by side recursion algorithm based on matrix computation was proposed.Firstly,5 basic graph structures were defined to realize recursive calculate in the implementation process.Compared with previous works,the algorithm provided many methods for counting the same length of cycles.The same result confirmed the correctness of the algorithm.The new algorithm could not only calculate the total number of cycles,but also gave the number each edge participating in fixed-length cycles.Its complexity was proportional to the product of D and square of N,where D was the average degree of variable nodes,and N denoted the code length.For LDPC codes,D was far less than N.For most of the LDPC codes,the calculation for numbers of cycle-length g、g+2、g+4 was only several seconds.…”
    Get full text
    Article
  18. 838

    Efficient algorithm for calculating short cycles in Tanner graph based on matrix computation by Qing ZHU, Le-nan WU, Yong-biao YANG, Jie LI, Shi-ming XU

    Published 2017-04-01
    “…Loop distribution of Tanner graph affects the BER performance of low-density parity-check codes(LDPC) decoding.To count short cycles in the Tanner graph efficiently,a side by side recursion algorithm based on matrix computation was proposed.Firstly,5 basic graph structures were defined to realize recursive calculate in the implementation process.Compared with previous works,the algorithm provided many methods for counting the same length of cycles.The same result confirmed the correctness of the algorithm.The new algorithm could not only calculate the total number of cycles,but also gave the number each edge participating in fixed-length cycles.Its complexity was proportional to the product of D and square of N,where D was the average degree of variable nodes,and N denoted the code length.For LDPC codes,D was far less than N.For most of the LDPC codes,the calculation for numbers of cycle-length g、g+2、g+4 was only several seconds.…”
    Get full text
    Article
  19. 839

    An Adaptive Energy-Efficient Data Collection System for ZigBee Wireless Sensor Networks by Tareq Alhmiedat

    Published 2015-12-01
    “…The effectiveness of the proposed system has been demonstrated via simulation and experimental studies and verified that, using a single robot for data collection, the lifetime of the network can be extended by 2.3 times in average.…”
    Get full text
    Article
  20. 840

    An Optimized Replica Distribution Method in Cloud Storage System by Yan Wang, Jinkuan Wang

    Published 2017-01-01
    “…Moreover, the deputy catalog acquisition method to design and copy the information is given. Then, the nodes with the global replica of the information replicate data resources, which have the high access frequency and the long response time. …”
    Get full text
    Article