Showing 481 - 500 results of 2,265 for search 'average degree (method OR methods)', query time: 0.15s Refine Results
  1. 481

    Adaptive random early detection algorithm based on network traffic level grade prediction by Debin WEI, Chengsheng PAN, Li YANG, Zuoren YAN

    Published 2023-06-01
    “…In view of the problem that the calculation of average queue length and maximum packet drop probability in random early detection algorithm and its variants reflect the changes of network traffic slowly, an adaptive random early detection algorithm based on network traffic level grade prediction was proposed.Based on the statistical characteristics of self-similar network traffic, the transition probability table of network traffic level grade was established, and a grade prediction method of self-similar network traffic level with low complexity and high accuracy was proposed.Furthermore, the prediction results were applied to calculate the average queue length in equal interval and adjust the maximum packet drop probability.Under the condition of fixed and variable bottleneck link capacity, it is found that regardless of the degree of self-similarity of network traffic, the proposed algorithm can improve the throughput and packet loss rate, especially when the Hurst parameter is large and the traffic is light.…”
    Get full text
    Article
  2. 482

    Distributed Voronoi coverage algorithm in wireless sensor networks by XU Peng-fei1, CHEN Zhi-gang1, DENG Xiao-heng1

    Published 2010-01-01
    “…On the hypothesis conditions that wireless sensor networks only covered partial target region and the commu-nication radius was no less than twice of the sensing radius,a coverage-preserved and connected distributed Voronoi cov-erage algorithm was presented.Firstly,a method of detecting coverage redundancy sensors based on the local Voronoi re-gions was proposed,whose computational complexity was unconcerned with the density of sensors.Then,an en-ergy-prior self-scheduling strategy based on local Voronoi neighbors was proposed,where those sensors that were com-munication neighbors but not local Voronoi neighbors could synchronously execute self-scheduling,which improved the astringency of distributed scheduling.The simulation results show that the average number and coverage-degree of active sensors produced by the proposed algorithm are close to the centralized algorithm and smaller than the general distributed algorithm,while the proposed algorithm has more advantages in terms of active sensors’ average energy,scheduling as-tringency and runtime.…”
    Get full text
    Article
  3. 483

    Relay selection algorithm based on selfish behavior analysis in ultra-dense D2D by Yijun WANG, Youxu ZHANG, Dakun LIU, Guifen CHEN

    Published 2021-04-01
    “…In ultra-dense D2D communication, the current relay selection schemes mainly assume that the relay device has the initiative to participate in data forwarding, but some rational relay devices may delay or refuse to forward due to their own considerations, thus affecting the user experience.From the perspective of selfish behavior of relay devices, a method to identify selfish relay devices in D2D communication was proposed, and then an ultra-dense D2D relay selection algorithm based on selfish behavior analysis was proposed.Firstly, three relay identification attribute factors, namely joint interest degree (JID), forwarding history ratio (FHR) and relay physical state (RPS) were defined, and their weights were calculated by triangular fuzzy function to identify relay devices with selfish behavior.Secondly, based on the TOPSIS (technique for order of preference by similarity to ideal solution) method, the final relay equipment selection scheme relay was realized.Simulation results show that the proposed algorithm can identify selfish relay devices more effectively in D2D communication.Compared with other relay selection algorithms, the proposed algorithm has made significant progress in the aspects of D2D communication forwarding success rate, system average throughput and average time delay.…”
    Get full text
    Article
  4. 484

    Full Implementation of the Secondary 1 Program of Project P.A.T.H.S.: Observations Based on the Co-Walker Scheme by Daniel T. L. Shek Shek, Rachel C. F. Sun, Vivian W. M. Kan

    Published 2009-01-01
    “…Multiple regression analyses revealed that (1) overall implementation quality was significantly predicted by interactive delivery method, use of positive and supportive feedback, opportunity for reflection, degree of achievement of the objectives, and lesson preparation; whereas (2) success of implementation was significantly predicted by student interest, interactive delivery method, use of positive and supportive feedback, opportunity for reflection, and degree of achievement of the objectives. …”
    Get full text
    Article
  5. 485

    Optimization of dynamic parameters of straddle monorail vehicle to improve pantograph-catenary contact quality by ZHANG Yuejun, YANG Zhen, DU Zixue, WEN Xiaoxia, XU Zhouzhou

    Published 2022-09-01
    “…In order to reduce the abrasion on the sliding block, a sensitivity analysis method was used in this paper to analyze the influence degree of vehicle dynamics parameters on the coupling force of pantograph and catenary based on the dynamic simulation analysis model of "vehicle-pantograph-catenary" system. …”
    Get full text
    Article
  6. 486

    Predicting patient visits at the psychiatric polyclinic of a public hospital in Bali, Indonesia: A forecasting approach using single exponential smoothing by Ni Made Ratih Comala Dewi Dewi, Putu Cintariasih, Ni Wayan Suryani, Luh Gde Nita Sri Wahyuningsih

    Published 2024-12-01
    “…With a high degree of forecasting accuracy, the method offers practical applications for hospital administrators to plan for future patient volume, optimize resource allocation, and ensure sufficient service capacity. …”
    Get full text
    Article
  7. 487

    Traffic characteristic based privacy leakage assessment scheme for Android device by Zhu WANG, Kun HE, Xinyu WANG, Ben NIU, Fenghua LI

    Published 2020-02-01
    “…Aiming at the privacy leakage,which was caused by collecting user information by third-party host in Android operating system App,a privacy leakage evaluation scheme HostRisk was proposed.HostRisk was based on TF-IDF model and hierarchical clustering method,which was applied in mobile device.The TF-IDF model calculated the business relevance between Apps and hosts via the behavior characteristics of the hosts in these Apps.For the business related hosts that fail to express the business relevance characteristics,those hosts were adjusted and optimized via the average connected hierarchical agglomerative clustering method.Finally,the harmful degree of privacy leakage was evaluated based on the ranking of all hosts in the App.The experimental results verify the effectiveness and efficiency of the scheme.…”
    Get full text
    Article
  8. 488

    Traffic characteristic based privacy leakage assessment scheme for Android device by Zhu WANG, Kun HE, Xinyu WANG, Ben NIU, Fenghua LI

    Published 2020-02-01
    “…Aiming at the privacy leakage,which was caused by collecting user information by third-party host in Android operating system App,a privacy leakage evaluation scheme HostRisk was proposed.HostRisk was based on TF-IDF model and hierarchical clustering method,which was applied in mobile device.The TF-IDF model calculated the business relevance between Apps and hosts via the behavior characteristics of the hosts in these Apps.For the business related hosts that fail to express the business relevance characteristics,those hosts were adjusted and optimized via the average connected hierarchical agglomerative clustering method.Finally,the harmful degree of privacy leakage was evaluated based on the ranking of all hosts in the App.The experimental results verify the effectiveness and efficiency of the scheme.…”
    Get full text
    Article
  9. 489

    Harmonizing musculoskeletal health: transformative effects of 8-week intervention program on posture in music students by Stanislav Azor, Michal Marko, Štefan Adamčák, Pavol Bartik

    Published 2024-04-01
    “…All participants were enrolled in the second year of a master's degree program in Performing Arts. Standardized measures for evaluating posture (utilizing Klein and Thomas's method, as refined by Mayer) were conducted both before (Week 1, September 18) and after (Week 8, November 12) the intervention. …”
    Get full text
    Article
  10. 490

    Heuristic Usability Evaluation of Web-Based COVID-19 Management Dashboard by Somayyeh Zakerabasali, Farnaz Salehian

    Published 2024-07-01
    “…The highest number of problems was related to the feature “Help and Documentation” (12 problems), and the lowest number of problems was related to the features “Aesthetic and Minimalist Design” (2 problems) and “Privacy” (1 problem). 45.58% of the identified problems were in the category of major problems. The average degree of severity of the problems was from 2.05 (minor problem) related to the feature of “Pleasurable and Respectful Interaction with the User” to 2.99 (major problem) related to the feature of “User Control and Freedom”. …”
    Get full text
    Article
  11. 491

    Long-term results of Nd:YAG laser destruction of epithelial ingrowth after Femto-LASIK and ReLEx Smile by I.V. Dutchin, M.V. Pshenichnov

    Published 2023-06-01
    “…The average degree of myopia is –4.75 diopters. The Femto-LASIK technique was performed in 3 eyes, and ReLEx Smile – in 3 eyes. …”
    Get full text
    Article
  12. 492

    Spatial analysis and trend extraction of urban heat islands in Iran's major cities in the summer season by Mahmoud Ahmadi

    Published 2023-12-01
    “…Finally, for trend analysis, the Mann-Kendall method was used.Results and Discussion: The results showed that the average LST in the built-up areas within the city limits is higher than the average LST in the surrounding non-urban areas and even sometimes the city itself, and the strongest (SUHI) has occurred in areas such as the asphalt surfaces of airport runways, parking lots and roofs. …”
    Get full text
    Article
  13. 493

    RADIOSURGICAL TREATMENT OF BENIGN SMALL EYELID TUMORS by S. V. Saakyan, M. P. Kharlampidi, E. B. Myakoshina, R. A. Tatskov, G. A. Gusev

    Published 2019-09-01
    “…Aim of the study – to evaluate the long-term results of the radiosurgical method using microsurgical techniques for the treatment of small benign eyelid tumors. …”
    Get full text
    Article
  14. 494

    Pathomorphological analysis of budding in colorectal carcinomas by I. S. Shponka, O. V. Poslavska, I. K. Kharkhalis, T. V. Shynkarenko

    Published 2023-08-01
    “…In one third of the number of samples, differences were determined not only in the number of clusters, but also in the budding category when stained by routine and immunohistochemical methods. Peritumoral budding of the invasive front with category Bd3 was always accompanied by intratumoral budding of varying degrees of intensity. …”
    Get full text
    Article
  15. 495
  16. 496

    Structural characterization of gamma irradiated ZnS thin films by Nadir Fadhil Habubi, Mustafa Shakir Hashim, Amal Yousif Al-Yasiri

    Published 2010-12-01
    “… The effects of gamma irradiation on the structure of ZnS films , which preparing by flash evaporation method, are studied using XRD. Two peaks of (111), (220) orientations are appeared in X ray chart indicating the cubic phase of the films .The lattice parameter, grain size, average internal stress, microstrain, dislocation density and degree of preferred orientation in the film are calculated and correlated with gamma irradiation. …”
    Get full text
    Article
  17. 497

    The influence of population on the economic efficiency of the metropolitan governance by Yuriy V. Pavlov

    Published 2017-07-01
    “…If the comparison showed the non-optimality of the implemented model for some index of the economic growth, then the values of the economic growth in the metropolitan area and the national average were compared. As a result, a recommendationwas given for the metropolitan area on the degree of need for the management reform and an optimal metropolitan governance model was selected.Results. …”
    Get full text
    Article
  18. 498

    Enhanced Edge Feature Fusion and Visual State Space for Precise Detection of Switch Tip Close Fitting by Chang Zhengtang, Lan Xiangui, Lai Yihui

    Published 2025-01-01
    “…Switches are critical components in railway transportation, and the detection of close fitting between switch tips is essential for ensuring operational safety. Current methods primarily rely on manual on-site measurements, which are time-consuming and prone to errors. …”
    Get full text
    Article
  19. 499

    Self-assessment of the Musculoskeletal System Load of the Nurses Employed in Conservative and Surgical Departments by Karolina Filipska, Dorota Wolska, Beata Haor, Anna Antczak-Komoterska

    Published 2018-06-01
    “…Material and Methods. The study involved 50 nurses employed in surgical (32%) and conservative (68%) departments. …”
    Get full text
    Article
  20. 500

    Experience of using intraosseous access in infants with severe dehydration by O. N. Pulkina, D. G. Gogichaeva, E. V. Parshin, E. S. Savina

    Published 2025-06-01
    “…Intraosseous access is an alternative method that provides the possibility of rapid administration of medications and infusion media, including when resuscitation is necessary. …”
    Get full text
    Article