Suggested Topics within your search.
Suggested Topics within your search.
-
2561
Development of Practical Finite Element Models for Collapse of Reinforced Concrete Structures and Experimental Validation
Published 2017-01-01“…The continuum finite element model is more accurate for interpreting local failure but has an excessive computational cost for a complete building. …”
Get full text
Article -
2562
Efficient heuristic algorithm for the mobile sink routing problem
Published 2011-01-01“…In large-scale monitoring region,randomly deployed wireless sensor networks may not be fully connected with high probability.Using mobile sink for data collection is one of the feasible solutions.Mobile sink shortest routing prob-lem can be regarded as a special case of TSP with neighborhoods(TSPN) problem,since the neighborhoods are the radio ranges of the sensor nodes,which can be modeled as possibly overlapped disks with diverse sizes.This kind of TSPN problem has no polynomial algorithms so far.To handle it,a novel approximation algorithm was proposed,which first forms a "racetrack" by utilizing the non-intersecting loop property of TSP routes,and then through the inner lane heuris-tic,the bend heuristic and the shortcut searching,the algorithm can find an approximation solution within O(n2) computa-tion time.The formal proofs and the large-scale simulations all verify that our algorithm can achieve a good approxima-tion ratio and can be more efficient than the related algorithms.…”
Get full text
Article -
2563
Content Patterns in Topic-Based Overlapping Communities
Published 2014-01-01“…Most state-of-the-art algorithms only consider structural properties to detect disjoint subcommunities and do not include the fact that people can belong to more than one community and also ignore the information contained in posts that users have made. …”
Get full text
Article -
2564
INVESTIGATION ON FINITE ELEMENT MODELING METHOD OF WITH TRIPLE JUNCTION POLYCRYSTALLINE INTERGRANULAR FRACTURE
Published 2018-01-01“…Cohesive zone model was used to simulate polycrystalline intergranular fracture at the grain level model,the finite element model build-ing reflected the actual situation is a difficult point.In this paper,Mixed Programming of Matlab,Python and Abaqus,An algorithm was presented which can easily and quickly generated Voronoi geometric model and the grain sizes distribution agrees with lognormal distribution.Realized the automatically insert the zero-thickness cohesive interface element by writing nodes and elements at crystal boundary,firstly solved the void zone at the intersection of the three zerothickness cohesive element,which is the triple junction,And to make up the defect of cohesive zone model.The whole process of the finite element analysis was performed automatically by secondary development,including the assignation material properties,material orientation,load application,model solution.Finally,polycrystalline aluminum was used as an example to simulate the intergranular fracture process without the initial damage.The results show that the method is more effectively and practically,which can be used to simulate polycrystalline intergranular crack initiation and propagation in random microscopic grains.…”
Get full text
Article -
2565
Multimodal Control by Variable-Structure Neural Network Modeling for Coagulant Dosing in Water Purification Process
Published 2020-01-01“…Different with the normal neural network mode, PCA is used to optimize hidden-layer nodes and update the neural network structure at every computation. …”
Get full text
Article -
2566
Research on the security of national secret algorithm based compute first networking
Published 2023-08-01“…With the promotion of national secret algorithm, in-depth research on the arithmetic network was carried out, a more efficient and reasonable security scheme for the arithmetic network was proposed, ensuring the data security and privacy of the arithmetic network with the help of the state secret algorithm.The main elements of the design program included: Supporting arithmetic demand and cryptographic invocation through the underlying resources, the arithmetic orchestration layer provided the ability to orchestrate data arithmetic, meanwhile, the arithmetic scheduling layer intelligently discerned the optimal nodes for arithmetic resource scheduling and allocation; the cryptographic reinforcement layer used the national secret algorithm based on hardware support with the help of public key cryptosystem, hash function, digital envelope, homomorphic encryption, blockchain and other technologies.Focusing on arithmetic network access security, transmission security, data security and privacy protection aspects of security implementation.An architecture and application form was innovatively proposed to guarantee the data security of the arithmetic network, which could meet the needs of the application layer arithmetic in the scenarios of big data, intelligent technology, etc..The security of the arithmetic network is enhanced by empowering the arithmetic network through the state-secret algorithm.…”
Get full text
Article -
2567
Adaptive Policy-Oriented Cybersecurity: A Decentralized Framework Using Message Passing Algorithms for Dynamic Threat Mitigation
Published 2025-01-01“…This paper introduces a novel framework based on Message Passing algorithms that enables decentralized, adapted and optimized policy deployment across complex cybersecurity infrastructures. More specifically, we extend the traditional Min-Sum algorithm by incorporating dynamic trust weights that influence policy enforcement decisions, allowing more reliable nodes to have a greater impact while mitigating the risks posed by untrusted entities. …”
Get full text
Article -
2568
Research on the Resilience of a Railway Network Based on a Complex Structure Analysis of Physical and Service Networks
Published 2025-05-01“…The simulation results demonstrate that targeted disruptions cause significantly more damage than random disturbances, particularly when high-betweenness nodes are affected. …”
Get full text
Article -
2569
Metastasizing Pleomorphic Adenoma: A Fascinating Enigma
Published 2012-01-01“…The present paper reports a case of pleomorphic adenoma (PA) in submandibular gland that, after more than 30 years of initial treatment, recurred and metastasized to ipsilateral neck lymph nodes and parotid gland. …”
Get full text
Article -
2570
Early clinical and metabolic response to tazemetostat in advanced relapsed INI1 negative epithelioid sarcoma
Published 2021-04-01“…It is characterized by multiple local recurrences and regional lymph nodes form the commonest site of metastases. The function of Integrase Inhibitor 1 (INI1) protein is lost in more than 90% of cases, which was the basis for the introduction of tazemetostat into the therapeutic armamentarium for management of advanced ES. …”
Get full text
Article -
2571
Analysis of Core–Periphery Structure Based on Clustering Aggregation in the NFT Transfer Network
Published 2025-03-01“…The experimental results indicate that core nodes in the NFT transfer network constitute approximately 2.3–5% of all nodes. …”
Get full text
Article -
2572
Improved A*-based Path Planning for Mining Inspection Robots
Published 2025-05-01“…The proposed path smoothing algorithm is able to reduce the number of path nodes and improve the path smoothing, which makes it more suitable for the mining inspection robot path planning.…”
Get full text
Article -
2573
An Empirical Evaluation of Lightweight Random Walk Based Routing Protocol in Duty Cycle Aware Wireless Sensor Networks
Published 2014-01-01“…Energy efficiency is an important design paradigm in Wireless Sensor Networks (WSNs) and its consumption in dynamic environment is even more critical. Duty cycling of sensor nodes is used to address the energy consumption problem. …”
Get full text
Article -
2574
Genitourinary tuberculosis in the structure of autopsy morphological findings in deceased patients at the late stages of HIV infection
Published 2021-03-01“…A pathomorphological examination revealed TB of intrathoracic lymph nodes in 37.4 ± 4.5%, intra-abdominal lymph nodes — in 22.6 ± 3.9%, peripheral — 6.1 ± 2.2%, more often in miliary and disseminated pulmonary TB. …”
Get full text
Article -
2575
Improving Synchronization in an Air and High-Speed Rail Integration Service via Adjusting a Rail Timetable: A Real-World Case Study in China
Published 2020-01-01“…A well-designed feeder train timetable with good synchronization is of great significance in an AH integration service, because it can improve the connectivity at transfer nodes and offer more opportunities for intermodal passengers to travel. …”
Get full text
Article -
2576
GSIDroid: A Suspicious Subgraph-Driven and Interpretable Android Malware Detection System
Published 2025-07-01“…Machine learning-based detection approaches have improved the accuracy of malware identification, thereby providing more effective protection for Android users. However, graph-based detection methods rely on whole-graph computations instead of subgraph-level analyses, and they often ignore the semantic information of individual nodes. …”
Get full text
Article -
2577
Determination of selection criteria for yield traits to improve okra (Abelmoschus esculentus L. Moench) breeding in Indonesia
Published 2025-03-01“…This method of determining selection criteria is more comprehensive than research on okra in Indonesia. …”
Get full text
Article -
2578
Trust-Based Consensus and ABAC for Blockchain Using Deep Learning to Secure Internet of Things
Published 2025-12-01“…By leveraging blockchain, IoT systems can enhance their security protocols, making it more difficult for attackers to exploit vulnerabilities and access sensitive data. …”
Get full text
Article -
2579
Research on multi-objective hierarchical site selection coverage of fire station.
Published 2024-01-01“…To study the multi-objective siting problem of fire stations, we firstly divided demand areas and fire stations into three levels to form a comprehensive hierarchical emergency coverage network covering fire risk areas. Secondly, the nodes of the original location of the fire station were added to the set of nodes of the planned construction of the fire station. …”
Get full text
Article -
2580
MAC protocol with clock synchronization correction for a practical infrastructure monitoring system
Published 2018-04-01“…In addition, we found that through actual equipment evaluation that sensor nodes that adopt NES-MAC can operate for more than 10 years with two CR123A-type batteries.…”
Get full text
Article