Showing 101 - 120 results of 1,116 for search 'Node average', query time: 0.10s Refine Results
  1. 101

    A Blockchain-Based Architecture of Web3.0: A Comprehensive Decentralized Model With Relay Nodes, Unique IDs and P2P by Hyunjoo Yang, Sejin Park

    Published 2025-01-01
    “…This dual-layered approach mitigates risks associated with reputation inflation, identity manipulation, and malicious node behavior. When faced with malicious requests, the system significantly reduces verification latency to an average of 0.0106 ms, ensuring rapid rejection and preserving network stability, while legitimate requests are processed efficiently with an average latency of 0.4125 ms.Experiments comparing latency-based and random-based relay selection methods across various network configurations (public-public, public-private, private-private) demonstrate that latency-based selection optimizes connection setup times in low-latency environments, while random-based selection provides robust performance in complex network scenarios. …”
    Get full text
    Article
  2. 102
  3. 103

    Efficient low-delay routing algorithm for opportunistic networks based on cross-layer sensing of encountered nodes by Zhi REN, Jian-wei SUO, Hong CHEN, Zhong-hao XU, Qian-bin CHEN

    Published 2013-10-01
    “…An efficient low-delay routing algorithin,name epidemic routing based on cross-layer encountered-node sens-ing (ERCES)was proposed to address the issue that the epidemic-based routing algorithms have some extralatency in sensing encountered nodes and extra overhead in exchanging data packets.ERCES achieves to speed sensing encountered nodes through cross-layer design among the PHY,MAC,and network layers.Moreover,to reduce overhead and to de-crease data latency,it makes a node send novel data packet immediately after encountering other nodes,sends the packets close-by their destinations firstly after receiving summary vector(SV)packets,adaptively varies the period of HELLO packets and deletes the packets reaching their destinations from nodes' memory with the help of SVs.Theoretical anal-,ysis verifies the effectiveness of ERCES.And simulation results show that ERCES reduces by at least 11.3% the control overhead by at least 8.2%,2.1% memory overhead by more than 2.1%,and the average end-to-end delay by at least 11.3%.…”
    Get full text
    Article
  4. 104

    A novel hybrid extreme learning machine-based diagnosis model for sensor node faults in aquaculture by Bing Shi, Zelin Gao, Tianheng Pu, Jianming Jiang, Yueping Sun

    Published 2025-08-01
    “…Abstract Sensor nodes in a wireless sensor network are influenced by the surrounding environment while monitoring data, which can lead to faults and data biases, resulting in erroneous decisions and losses. …”
    Get full text
    Article
  5. 105

    Charging Scheduling Method for Wireless Rechargeable Sensor Networks Based on Energy Consumption Rate Prediction for Nodes by Songjiang Huang, Chao Sha, Xinyi Zhu, Jingwen Wang, Ruchuan Wang

    Published 2024-09-01
    “…The incorrect estimation of node energy requirement may lead to the death of critical nodes, resulting in missing events. …”
    Get full text
    Article
  6. 106

    Detection of Malware Propagation in Sensor Node and Botnet Group Clustering Based on E-mail Spam Analysis by Taejin Lee, Hesun Cho, Haeryong Park, Jin Kwak

    Published 2015-09-01
    “…This paper proposes a method of detecting malware propagation in sensor Node and botnet clustering automatically by analyzing e-mails. …”
    Get full text
    Article
  7. 107

    Pharmacoeconomic study of fluorescent lymphography and radionuclide diagnostics methods for sentinel lymph node detection in breast cancer by E. P. Kulikov, M. V. Shomova, D. S. Titov, A. N. Demko, M. A. Maistrenko

    Published 2024-02-01
    “…Background. Sentinel lymph node (SLN) biopsy is a reliable diagnostic method used to assess the spread of the malignant process in regional lymph nodes. …”
    Get full text
    Article
  8. 108

    Clinical–radiomics model for predicting internal mammary lymph node metastasis in operable breast cancer patients by Wei Wang, Wenyu Zhang, Ting Yu, Ting Yu, QingWei Wu, ChengLin Yang, ChengLin Yang, Jianbin Li

    Published 2025-04-01
    “…ObjectiveAlthough preoperative prediction of axillary lymph nodes status has been achieved using radiomics and combined models, there is a dearth of research on internal mammary lymph node (IMN) metastasis status prediction. …”
    Get full text
    Article
  9. 109

    The Application of Three-dimensional Shear Wave Elastography in the Detection of Inguinal Lymph Node Metastasis in Gynecological Malignancies by Yuping Shen, Jiulong Dai, Jiami Li, Man Lu

    Published 2025-01-01
    “…Results: Final pathology confirmed 65 metastatic and 55 benign lymph nodes. The maximum (Emax) and average (Emean) elasticity values from 2D-SWE and 3D-SWE for malignant lymph nodes were significantly higher than those for benign lymph nodes (p < 0.0001). …”
    Get full text
    Article
  10. 110

    Histopathological evaluation of the efficacy of carbon nanoparticle staining in detecting lymph node metastasis in colorectal cancer surgery by Qingzhao Feng, Xin Zhang, Shuyang Yang, Yingqi Feng, Hong Chen, Jiafeng Wang, Zijian Li, Shuang Fu, Qi Sun, Min Feng

    Published 2025-07-01
    “…There were no statistically significant differences in sex, age, body mass index, operation time, blood loss, tumor location, and postoperative pathological stage between the CNs group and the control group. However, the average number of lymph nodes differed significantly between the two groups (P = 0.001). …”
    Get full text
    Article
  11. 111

    Hybridization and Optimization of Bio and Nature-Inspired Metaheuristic Techniques of Beacon Nodes Scheduling for Localization in Underwater IoT Networks by Umar Draz, Tariq Ali, Sana Yasin, Muhammad Hasanain Chaudary, Muhammad Ayaz, El-Hadi M. Aggoune, Isha Yasin

    Published 2024-11-01
    “…To implement these optimization techniques, the Scheduled Routing Algorithm for Localization (SRAL) is introduced, aiming to enhance node scheduling and localization. This framework is crucial for improving data delivery, optimizing Route REQuest (RREQ) and Routing Overhead (RO), while minimizing Average End-to-End (AE2E) delays and localization errors. …”
    Get full text
    Article
  12. 112

    Slim-sugarcane: a lightweight and high-precision method for sugarcane node detection and edge deployment in natural environments by Lijiao Wei, Lijiao Wei, Shuo Wang, Xinwei Liang, Dongjie Du, Xinyi Huang, Ming Li, Yuangang Hua, Weihua Huang, Zhenhui Zheng, Zhenhui Zheng

    Published 2025-07-01
    “…Accurate detection of sugarcane nodes in complex field environments is a critical prerequisite for intelligent seed cutting and automated planting. …”
    Get full text
    Article
  13. 113
  14. 114

    AoI-enabled multi-node cooperative sensing based on integration of sensing, communication, and computing in vehicular networks by Yiqing ZHOU, Haoyue ZHANG, Yanli QI, Qing CAI, Ling LIU, Jiangzhou WANG

    Published 2024-03-01
    “…For the requirements of real-time services in autonomous driving systems, such as high-definition (HD) maps, based on the integration of sensing, communication, and computing, a multi-node cooperative sensing mechanism was proposed with the age of information (AoI) as the real-time indicator.Considering the constraints on communication and computing resources and vehicle energy consumption, the information collection, transmission and processing of sensing nodes were optimally scheduled to minimize the AoI averaged over time.A Lyapunov-based online scheduling algorithm was proposed to transform the long-term stochastic optimization problem into an online optimization problem, which could be solved with low complexity.Compared with the existing mechanism considering integrated communication and computing, the proposed mechanism can improve real-time performance by 9%~50%.…”
    Get full text
    Article
  15. 115

    Variable Transmission Range Routing Protocol Based on Vehicle Density in VANET by Rong Cai, Guoan Zhang, Yuebo Wu

    Published 2015-03-01
    “…In order to solve the problem of unstable connectivity and high bit error rate,which are caused by rapid changes in the density of vehicles on the road,while the transmission radius remained unchanged,a variable transmission range routing protocols based on vehicle density in vehicular Ad-Hoc network was proposed.According to different vehicle density,node could adjust the farthest transmission distance and reduce the transmission latency of the message,which could ensure high connection probability of the network.Based on homogeneous poisson point process model,the change conditions of transmission range with different vehicle density were deduced,and its feasible was proved.Furthermore,mathematical calculate formula of average latency was obtained according to the theoretical analysis.At last,variable transmission range routing protocol based on vehicle density and fixed transmission range routing protocol were compared by simulation.The simulated results show that the proposed protocol can be applied in actual environments,and the message can be transmitted fast from source node to destination node under the condition of high connection probability.…”
    Get full text
    Article
  16. 116

    The clinical value of computed tomography Hounsfield unit for diagnosing palpable inguinal lymph node metastasis in patients with penile cancer by Yu Li, Yu Chen, Gansheng Xie, Gang Li, Huming Yin

    Published 2025-02-01
    “…We outlined the edge of target lymph nodes, and the software automatically calculated its area, maximum CT HU, and average CT HU. …”
    Get full text
    Article
  17. 117

    Bypass node non-redundant adding algorithm for crossing-level data transmission in two-dimension reconfigurable cell array by Nai-jin CHEN, Zhi-yong FENG, Jian-hui JIANG

    Published 2015-04-01
    “…As for the problem of hardware task crossing-level data transmission,a preorder traversing backtracking adding_bypass_node (PTBA) algorithm is presented which maintains logic relation among original computing nodes and does not add redundancy nodes based on data flow graph with crossing-level-in-tree(CLIT) and crossing-level-out-tree (CLOT).The pipelined model of partitioning mapping and the quantitative evaluation indexes are presented for the dynamic reconfigurable system.The critical condition of PTBA mapping is proposed.Compared with preorder traversing backtracking no adding_bypass_node (PTBNA) mapping,and under the premise of critical condition,experimental results show PTBA mapping can improve the number of modules,the number of non-original input times and non-original output times,the total execution delay and powers of all partitioning based on the same system architecture and partitioning mapping algorithm.The proposed algorithm obtains the less average execution total cycles by 23.3%(RCA<sub>5×5</sub>),30.5%(RCA<sub>8×8</sub>),and the less average power consumption by 15.7%(RCA<sub>5×5</sub>),18.6%(RCA<sub>8×8</sub>) than previous advanced split-push kernel mapping(SPKM).PTBA has rationality and effectiveness.…”
    Get full text
    Article
  18. 118

    The diagnostic value of two-dimensional shear-wave elastography in identifying malignant lesions in lymph nodes: a prospective study by Jing Chen, Yao Deng, Jiajia Xiong, WenQu Li, Gongqun Shang, Hui Li, Yu Wu, Xiaojuan Qin

    Published 2025-05-01
    “…Abstract This study evaluates the diagnostic performance of two-dimensional shear wave elastography (2D-SWE) in differentiating between benign, metastatic lymph nodes (LNs) and lymphomas. From May 2022 to February 2023, a total of 137 patients who presented with unexplained LN enlargement were examined at the Ultrasound Medical Department of Union Hospital of Huazhong University of Science and Technology. …”
    Get full text
    Article
  19. 119

    Replica Node Detection Using Enhanced Single Hop Detection with Clonal Selection Algorithm in Mobile Wireless Sensor Networks by L. S. Sindhuja, G. Padmavathi

    Published 2016-01-01
    “…One among them is the node replication attack. In this, the physically insecure nodes are acquired by the adversary to clone them by having the same identity of the captured node, and the adversary deploys an unpredictable number of replicas throughout the network. …”
    Get full text
    Article
  20. 120

    Point clouds to as-built two-node wireframe digital twin: a novel method to support autonomous robotic inspection by Farzad Azizi Zade, Arvin Ebrahimkhanlou

    Published 2024-11-01
    “…Abstract Previous studies have primarily focused on converting point clouds (PC) into a dense mech of 3D finite element models, neglecting the conversion of PCs into as-built wireframe models with two-node elements for line elements such as beams and columns. …”
    Get full text
    Article