Showing 1,241 - 1,260 results of 2,202 for search 'distributed data low model', query time: 0.19s Refine Results
  1. 1241
  2. 1242
  3. 1243
  4. 1244
  5. 1245
  6. 1246
  7. 1247

    An efficient reconfigurable ad-hoc algorithm for multi-sink wireless sensor networks by Miriam Carlos-Mancilla, Ernesto López-Mellado, Mario Siller, Abraham Fapojuwo

    Published 2017-09-01
    “…In the third stage, the sinks collect sensed data through the trees. The protocol has been modelled by a timed Petri net, which is used first for a qualitative validation in which deadlocks, operational functionality, overflows, bottlenecks, and delays were checked, and later for network performance analysis.…”
    Get full text
    Article
  8. 1248
  9. 1249

    Ant-Based Transmission Range Assignment Scheme for Energy Hole Problem in Wireless Sensor Networks by Ming Liu, Chao Song

    Published 2012-12-01
    “…We investigate the problem of uneven energy consumption in large-scale many-to-one sensor networks (modeled as concentric coronas) with constant data reporting, which is known as an energy hole around the sink. …”
    Get full text
    Article
  10. 1250
  11. 1251
  12. 1252

    Global high-resolution fire-sourced PM<sub>2.5</sub> concentrations for 2000–2023 by Y. Hu, C. Tian, X. Yue, Y. Lei, Y. Cao, R. Xu, Y. Guo

    Published 2025-08-01
    “…However, research on the climatic and health impacts of fire emissions is severely limited by the scarcity of air pollution data directly attributed to these emissions. Here, we develop a global daily fire-sourced PM<span class="inline-formula"><sub>2.5</sub></span> concentration ([PM<span class="inline-formula"><sub>2.5</sub></span>]) dataset at a spatial resolution of 0.25° for the period 2000–2023, using the GEOS-Chem chemical transport model driven with two fire emission inventories, the Global Fire Emissions Database version 4.1 with small fires (GFED4.1s) and the Quick Fire Emission Dataset version 2.5r1 (QFED2.5). …”
    Get full text
    Article
  13. 1253

    Federated learning based intelligent edge computing technique for video surveillance by Yu ZHAO, Jie YANG, Miao LIU, Jinlong SUN, Guan GUI

    Published 2020-10-01
    “…With the explosion of global data,centralized cloud computing cannot provide low-latency,high-efficiency video surveillance services.A distributed edge computing model was proposed,which directly processed video data at the edge node to reduce the transmission pressure of the network,eased the computational burden of the central cloud server,and reduced the processing delay of the video surveillance system.Combined with the federated learning algorithm,a lightweight neural network was used,which trained in different scenarios and deployed on edge devices with limited computing power.Experimental results show that,compared with the general neural network model,the detection accuracy of the proposed method is improved by 18%,and the model training time is reduced.…”
    Get full text
    Article
  14. 1254

    Based on Regular Expression Matching of Evaluation of the Task Performance in WSN: A Queue Theory Approach by Jie Wang, Kai Cui, Kuanjiu Zhou, Yanshuo Yu

    Published 2014-01-01
    “…Due to the limited resources of wireless sensor network, low efficiency of real-time communication scheduling, poor safety defects, and so forth, a queuing performance evaluation approach based on regular expression match is proposed, which is a method that consists of matching preprocessing phase, validation phase, and queuing model of performance evaluation phase. …”
    Get full text
    Article
  15. 1255

    Enhancing anomaly detection and prevention in Internet of Things (IoT) using deep neural networks and blockchain based cyber security by Sathyabama A R, Jeevaa Katiravan

    Published 2025-07-01
    “…The synergy between DNN-based anomaly detection and Blockchain-based security provides a robust, scalable, and adaptive solution for real-time cybersecurity threats in IoT networks. With a low false-positive rate of 15.42% and a strong detection accuracy of 99.18%, the proposed model successfully identifies malicious activity, including malware injections and Distributed Denial of Service (DDoS) assaults. …”
    Get full text
    Article
  16. 1256

    Fusion of DS-InSAR and THPF-LSTM for monitoring and predicting surface deformation in closed mines by Jianyang ZHANG, Hongdong FAN, Xiangyang ZHU, Minghu SUN

    Published 2025-06-01
    “…Due to the lack of supervision of mine closure, the spatial and temporal evolution of surface deformation and prediction and warning models are not well studied. To this end, we proposed a prediction model for surface deformation of closed mines combining distributed scatter interferometric synthetic aperture radar (DS-InSAR), temporal high pass filtering (THPF), and a long short term memory network (LSTM). …”
    Get full text
    Article
  17. 1257

    Spatial variability of hydraulic parameters of a cropped soil using horizontal crosshole ground penetrating radar by Lena Lärm, Lutz Weihermüller, Jan Rödder, Jan van derKruk, Harry Vereecken, Anja Klotzsche

    Published 2025-01-01
    “…Therefore, sequential inversion of the GPR‐derived SWCs was performed using the hydrological model HYDRUS‐1D, whereby the SWC data were either averaged prior inversion or used in a spatially distributed way. …”
    Get full text
    Article
  18. 1258

    Federated learning and information sharing between competitors with different training effectiveness by Jiajun Meng, Jing Chen, Dongfang Zhao

    Published 2025-11-01
    “…Despite its substantial benefits, the adoption of FL in competitive markets faces significant challenges, particularly due to concerns about training effectiveness and price competition. In practice, data from different firms may not be independently and identically distributed (non-IID) and heterogenous, which can lead to differences in model training effectiveness when aggregated through FL. …”
    Get full text
    Article
  19. 1259

    Hybrid AI for Predictive Cyber Risk Assessment: Federated Graph-Transformer Architecture With Explainability by Jaime Govea, Rommel Gutierrez, William Villegas-Ch, Alexandra Maldonado Navarro

    Published 2025-01-01
    “…Traditional risk assessment methods, often based on static rules and signature matching, fail to provide sufficient predictive capabilities in scenarios characterized by high-volume, heterogeneous data and evolving attack patterns. Furthermore, conventional machine learning models lack architectural flexibility and contextual awareness to detect stealthy or multi-stage attacks across distributed environments. …”
    Get full text
    Article
  20. 1260

    Exploring the impact of urban spatial morphology on land surface temperature: A case study in Linyi City, China. by Yongyu Feng, Huimin Wang, Jing Wu, Yan Wang, Hui Shi, Jun Zhao

    Published 2025-01-01
    “…The High-High LISA values are distributed in the central and western areas, and the Low-Low LISA values are found in the northern regions and some scattered counties. …”
    Get full text
    Article