Showing 981 - 1,000 results of 1,116 for search 'Node average', query time: 0.12s Refine Results
  1. 981

    A Data-Driven Method for Deriving the Dynamic Characteristics of Marginal Carbon Emissions for Power Systems by Bing Fang, Jiayi Zhang, Shuangyin Chen, Li Li, Shanli Wang, Mingzhe Wen

    Published 2025-06-01
    “…However, the existing research has normally considered the average carbon emissions as the indicator for the operation and planning of power systems. …”
    Get full text
    Article
  2. 982

    Research and application of mining AI video edge computing technology by ZHANG Liya, HAO Bonan, MA Zheng, YANG Zhifang

    Published 2024-12-01
    “…The mining AI video server was developed by integrating the domestic intelligent chips and 5G communication modules, enabling the deployment and calculation of mine edge nodes. The experimental results showed that the mining AI video edge computing system had excellent response. …”
    Get full text
    Article
  3. 983

    A Hybrid Graph-Based Risk Assessment and Attack Path Detection Model for IoT Systems by Ferhat Arat, Sedat Akleylek, Zaliha Yuce Tok

    Published 2025-01-01
    “…However, identifying vulnerable nodes within the system, individually assessing devices, and performing compact and efficient analyses of the entire topology remain underexplored areas. …”
    Get full text
    Article
  4. 984

    Interpersonal Relationship Detection Using Multi-Head Graph Attention Networks With Multi-Feature Fusion by Simge Akay, Duygu Cakir, Nafiz Arica

    Published 2025-01-01
    “…By representing features as graph nodes and employing multi-head attention mechanisms within each module, MHF-GAT effectively captures complex feature interactions while reducing redundancy and overfitting risks. …”
    Get full text
    Article
  5. 985

    An edge sensitivity based gradient attack on graph isomorphic networks for graph classification problems by Srinitish Srinivasan, Chandraumakantham OmKumar

    Published 2025-04-01
    “…However, owing to the abstract nature of graphs, there exists no ideal transformation to represent nodes and edges in the euclidean space. Moreover, GNNs are highly susceptible to adversarial attacks. …”
    Get full text
    Article
  6. 986

    Routing algorithm for heterogeneous computing force requests based on computing first network by ZHANG Gang, LI Xi

    Published 2025-02-01
    “…Due to the particularity and uniqueness of computing force requests, how to find an effective path set with non-intersecting transmission links for a group of heterogeneous computing force requests, so that the group of requests can reach their respective destination computing force nodes, and thus allocate computing force resources for the group of requests, is a key issue facing current computing first networks. …”
    Get full text
    Article
  7. 987

    Intraoperative conversion from thoracoscopy to thoracotomy in anatomical lung resections by A. L. Akopov, R. P. Mishra, S. Yu. Dvoreckiy, A. S. Agishev, M. G. Kovalev

    Published 2023-07-01
    “…The severity of the pain syndrome in 24 hours after the surgery assessed by visual analogue scale was also comparable; the average values of pain assessment were 3+2 in the thoracoscopy group and 4+2 in the conversion group (p=0.19).  …”
    Get full text
    Article
  8. 988

    The role of thoracoscopic pneumonectomy in surgical treatment of lung diseases by V. A. Porkhanov, V. V. Danilov, V. B. Kononenko, N. V. Naryzhnyi, A. L. Kovalenko, V. V. Shtraub, V. A. Zhikharev

    Published 2019-02-01
    “…The number of removed lymph nodes during lymphadenectomy in group 1 was (19±10) nodes (from 6 to 40), in group 2 – (18±9) nodes (from 6 to 38). …”
    Get full text
    Article
  9. 989

    PROPERTIES OF LEXICAL NETWORKS BUILT ON NATURAL AND RANDOM TEXTS by Oleh Kushnir, A. Drebot, D. Ostrikov, O. Kravchuk

    Published 2024-12-01
    “…Another subject of our interest is a random-graph-type (RG) network having the same number of nodes as in the NT network and randomized links among those nodes. …”
    Get full text
    Article
  10. 990

    Graph-based reinforcement learning for software-defined networking traffic engineering by Jingwen Lu, Chaowei Tang, Wenyu Ma, Wenjuan Xing

    Published 2025-07-01
    “…Extensive experiments on six real-world WAN topologies ranging from 12 to 1,739 nodes demonstrate that GRL-TE achieves an overall average demand satisfaction rate of 89.36%, outperforming state-of-the-art learning-based methods (Teal: 82.04%, Figret: 82.20%) and the clustering-based NCFlow (76.48%), while providing 3-4 orders of magnitude speedup compared to LP solvers on large-scale networks. …”
    Get full text
    Article
  11. 991

    CPFT-MOSA: A Comprehensive Parallel Fault-Tolerant Multi-Objective Simulated Annealing Framework for UAV-Assisted Edge Computing in Smart City Traffic Management by Ahmed Shamil Mustafa, Salman Yussof, Nurul Asyikin Mohamed Radzi

    Published 2025-01-01
    “…Our results show quantitative improvements in three key metrics: efficient resource utilization with an average of 16.8 active nodes; a 21% improvement in energy distribution efficiency with a value of 0.063; and an 8.5% reduction in execution time to 1.6 units compared to conventional approaches. …”
    Get full text
    Article
  12. 992

    Brainwide Analysis of Functional Connectivity Patterns in Specific Phobia and Its Treatment by Markus Muehlhan, Judith Schäfer, Kevin Hilbert, Esther Seidl, Katja Beesdo-Baum

    Published 2025-11-01
    “…The SP group then received a one-session exposure treatment and was scanned again 9 weeks later on average. Results: fc-MVPA identified the largest differences between the SP group and CG in sensorimotor regions, with lower connectivity to temporal nodes of the default network and anticorrelations with the frontoparietal network in the SP group compared with the CG. …”
    Get full text
    Article
  13. 993
  14. 994

    MFHG-DDI: An Enhanced Hybrid Graph Method Leveraging Multiple Features for Predicting Drug–Drug Interactions by Xiang Li, Xiangmin Ji, Chengzhen Xu, Jie Hou, Xiaoyu Zhao, Guodong Peng

    Published 2024-01-01
    “…Many effective DDI prediction methods have been proposed using graph neural networks; however, these methods only aggregate information from directly connected nodes restricted to a drug-related manner and fail to capture long-range dependencies in heterogeneous networks. …”
    Get full text
    Article
  15. 995

    Pseudo-Labeling Domain Adaptation Using Multi-Model Learning by Victor Akihito Kamada Tomita, Ricardo Marcondes Marcacini

    Published 2025-01-01
    “…Experiments on six different datasets show an average F1-score improvement of 8 points, measuring the harmonic mean of precision and recall, compared to existing methods in the literature. …”
    Get full text
    Article
  16. 996

    Evaluation of nerve‑sparing radical hysterectomy introduction efficiency in the regional cancer center by Yu. A. Kolotilov, E. A. Kruglov, A. N. Kazantsev, V. M. Unguryan

    Published 2023-06-01
    “…The age category ranged from 31 to 69 years, the average age was 47.3 years. The following postoperative indicators were analyzed: duration of surgery, blood loss, amount of residual urine, duration of hospital stay after surgery, complications, mortality, number of lymph nodes examined. …”
    Get full text
    Article
  17. 997

    FedSW-TSAD: SWGAN-Based Federated Time Series Anomaly Detection by Xiuxian Zhang, Hongwei Zhao, Weishan Zhang, Shaohua Cao, Haoyun Sun, Baoyu Zhang

    Published 2025-06-01
    “…In response to this trend, federated time series anomaly detection enables collaborative analysis across distributed sensing nodes without exposing raw data. However, federated anomaly detection experiences issues with unstable training and poor generalization due to client heterogeneity and the limited expressiveness of single-path detection methods. …”
    Get full text
    Article
  18. 998

    An Auto-Adjusting Algorithm to Enhance Indoor Localization Accuracy: A Real-Time Experimental Analysis by Othman A. Alfahad, Husham Saied, Emad Malaekah, Ahmed Al Rashdi, Mohammed Emam, Mohsen Bakouri

    Published 2025-01-01
    “…The system is designed to track lost items and individuals using a wearable central unit (mini-Raspberry Pi) as a controller and BLE nodes as peripheral devices. The developed system includes Bluetooth beacons, data aggregation, storage, and a web interface for real-time tracking and visualization. …”
    Get full text
    Article
  19. 999

    Leveraging Historical Process Data for Recombinant <i>P. pastoris</i> Fermentation Hybrid Deep Modeling and Model Predictive Control Development by Emils Bolmanis, Vytautas Galvanauskas, Oskars Grigs, Juris Vanags, Andris Kazaks

    Published 2025-07-01
    “…Bayesian optimization and grid search techniques were employed to identify the best-performing hybrid model architecture: an LSTM layer with 2 hidden units followed by a fully connected layer with 8 nodes and ReLU activation. This design balanced accuracy (NRMSE 4.93%) and computational efficiency (AICc 998). …”
    Get full text
    Article
  20. 1000

    Optimal Honeypot Allocation Using Core Attack Graph in Partially Observable Stochastic Games by Achile Leonel Nguemkam, Ahmed Hemida Anwar, Vianney Kengne Tchendji, Deepak K. Tosh, Charles Kamhoua

    Published 2024-01-01
    “…Our method achieves an average solution accuracy within an epsilon value of 0.68%. …”
    Get full text
    Article