Suggested Topics within your search.
Suggested Topics within your search.
-
2321
Asian Zika virus can acquire generic African-lineage mutations during in utero infection
Published 2023-12-01“…It will be essential to identify how persistent in utero infection affects virus evolution and whether in utero-emerged Zika variants have the potential for shedding into the environment, more efficient transmission, and more aggressive infection phenotypes.…”
Get full text
Article -
2322
Effective Stochastic Modeling of Energy-Constrained Wireless Sensor Networks
Published 2012-01-01“…Since these nodes usually operate on batteries, the maximum utility of the network is dependent upon the optimal energy usage of these nodes. …”
Get full text
Article -
2323
LED lights and plant growth regulators enhance the in vitro mass propagation of rosemary (Rosmarinus officinalis L.)
Published 2025-04-01“…The highest number of nodes (3.91 ± 0.08) was recorded under BL in the cytokinin-free medium. …”
Get full text
Article -
2324
Soft value flipping decoding algorithm for LDPC codes based on adjoint vectors sum
Published 2009-01-01“…By analyzing the soft value distribution while belief propagation defeated, a soft value flipping decoding algo-rithm based on adjoint vectors sum was presented.With translating the error times of check equation which obtained by adjoint vectors sum into error bits distribution parameter and flipping some bit nodes soft value only once at certain itera-tion by a selection regulation, the frame error rate of the proposed algorithm for LDPC codes which have much more correlative rows can be reduced to a larger extent without complexity increase nearly(only O(N)).…”
Get full text
Article -
2325
Coverage Restoration Method for Wireless Sensor Networks of Distributed PV System
Published 2015-02-01“…Continuous capacity increase of distributed grid-connected photovoltaic (PV) system produces more obvious disturbance on the grid. Monitoring network technology can provide protection for the safety and stability of power grid operation, but sensor nodes of the monitoring network will fall to failure due to environmental interference. …”
Get full text
Article -
2326
A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Published 2013-04-01“…The comparisons show that our protocol is more suitable for WSNs.…”
Get full text
Article -
2327
IDUC: An Improved Distributed Unequal Clustering Protocol for Wireless Sensor Networks
Published 2015-08-01“…Due to the imbalanced energy consumption among nodes in wireless sensor networks, some nodes die prematurely, which decreases the network lifetime. …”
Get full text
Article -
2328
Self-Organized Connectivity Control and Optimization Subjected to Dispersion of Mobile Ad Hoc Sensor Networks
Published 2012-11-01“…This paper addresses the problem of the connectivity control and the self-organized deployment/dispersion of a team of mobile ad hoc sensor nodes. First, to reduce redundant communication links while preserving global connectivity, a distributed link removal algorithm is developed that only requires local information of no more than two-hop neighbors. …”
Get full text
Article -
2329
Energy-Efficiency of Cooperative Communication with Guaranteed E2E Reliability in WSNs
Published 2013-04-01“…It is found that the cooperative communication is more suitable for harsh transmission environment with long-haul distance. …”
Get full text
Article -
2330
Increasing Coverage in Wireless Sensor Networks by Minimizing Displacements Using a Greedy Method based on Nodesâ Location and Neighborhood
Published 2022-06-01“…Then a greedy method based on the topology and properties of the nodes and the network deployment region is presented to select the optimal nodes and cover the region. …”
Get full text
Article -
2331
Energy-Efficient Routing Protocol Based on Zone for Heterogeneous Wireless Sensor Networks
Published 2021-01-01“…The cluster head will consume much more energy to receive and transmit data than the other nodes. …”
Get full text
Article -
2332
Weighted zigzag decodable fountain codes for unequal error protection
Published 2022-10-01“…In the proposed scheme, the input symbols of different importance levels are first pre‐coded into variable nodes using low‐density parity‐check codes. Then, bit‐shift operations prior to exclusive‐or are performed on the non‐uniformly selected variable nodes to generate encoded symbols. …”
Get full text
Article -
2333
Detecting Pragmatic Ambiguity in Requirement Specification Using Novel Concept Maximum Matching Approach Based on Graph Network
Published 2024-01-01“…This research aims to develop a more effective model for identifying pragmatic ambiguity in requirement definition. …”
Get full text
Article -
2334
A Key Distribution Scheme for WSN Based on Hash Chains and Deployment Knowledge
Published 2015-07-01“…In DKH-KD scheme, before the nodes in the network are deployed, the offline server constructs a number of hash chains and uses the values from a pair of reverse hash chains to establish their pairwise keys among the nodes in the same region, while, among the neighbor nodes in the different regions, some pairs of the hash chains based on the deployment knowledge are employed to establish the pairwise keys. …”
Get full text
Article -
2335
Soft value flipping decoding algorithm for LDPC codes based on adjoint vectors sum
Published 2009-01-01“…By analyzing the soft value distribution while belief propagation defeated, a soft value flipping decoding algo-rithm based on adjoint vectors sum was presented.With translating the error times of check equation which obtained by adjoint vectors sum into error bits distribution parameter and flipping some bit nodes soft value only once at certain itera-tion by a selection regulation, the frame error rate of the proposed algorithm for LDPC codes which have much more correlative rows can be reduced to a larger extent without complexity increase nearly(only O(N)).…”
Get full text
Article -
2336
Latent Tuberculosis Infection and Residual Post-Tuberculous Changes in Children
Published 2018-01-01“…It was noted that with the introduction of new technologies (computer programs, immunological tests) into the practice of a phthisiopaediatrician, small calcified foci in the intrathoracic lymph nodes and lungs, previously invisible with traditional radiation methods of examination (plan radiography, fluorography), began to be detected more often. …”
Get full text
Article -
2337
Topologically inferring active miRNA‐mediated subpathways toward precise cancer classification by directed random walk
Published 2019-10-01“…The high‐frequency miRNA‐mediated subpathways are more reliable in classifying samples and for selecting therapeutic strategies.…”
Get full text
Article -
2338
Scintigraphy in Thyroid Nodular Pathology
Published 2022-10-01“…Thyroid scintigraphy is a method that formed more than 60 years ago and retains its importance for the diagnosis and assessment of the risk of nodular malignancy. …”
Get full text
Article -
2339
Near-Optimal Diagnosis System Deployment in Wireless Sensor Networks
Published 2013-10-01“…The existing approaches fail to consider this multidimensional feature of evidence in diagnosis nodes selection problem. To address the above issues, we propose a solution for the multidimensional diagnosis nodes selection problem and give the corresponding upper bound. …”
Get full text
Article -
2340
Distributed Hybrid Localization Using RSS Threshold Based Connectivity Information and Iterative Location Update
Published 2015-02-01“…Finally, locations of the nodes are iteratively updated using both connectivity information and RSS-based distance information between the nodes to get more precise localization accuracy. …”
Get full text
Article