Showing 2,561 - 2,580 results of 3,333 for search 'more node', query time: 0.12s Refine Results
  1. 2561

    Development of Practical Finite Element Models for Collapse of Reinforced Concrete Structures and Experimental Validation by Mario Bermejo, Anastasio P. Santos, José M. Goicolea

    Published 2017-01-01
    “…The continuum finite element model is more accurate for interpreting local failure but has an excessive computational cost for a complete building. …”
    Get full text
    Article
  2. 2562

    Efficient heuristic algorithm for the mobile sink routing problem by YUAN yuan1, PENG Yu-xing1, LI Shan-shan2, TANG Wen-sheng3

    Published 2011-01-01
    “…In large-scale monitoring region,randomly deployed wireless sensor networks may not be fully connected with high probability.Using mobile sink for data collection is one of the feasible solutions.Mobile sink shortest routing prob-lem can be regarded as a special case of TSP with neighborhoods(TSPN) problem,since the neighborhoods are the radio ranges of the sensor nodes,which can be modeled as possibly overlapped disks with diverse sizes.This kind of TSPN problem has no polynomial algorithms so far.To handle it,a novel approximation algorithm was proposed,which first forms a "racetrack" by utilizing the non-intersecting loop property of TSP routes,and then through the inner lane heuris-tic,the bend heuristic and the shortcut searching,the algorithm can find an approximation solution within O(n2) computa-tion time.The formal proofs and the large-scale simulations all verify that our algorithm can achieve a good approxima-tion ratio and can be more efficient than the related algorithms.…”
    Get full text
    Article
  3. 2563

    Content Patterns in Topic-Based Overlapping Communities by Sebastián A. Ríos, Ricardo Muñoz

    Published 2014-01-01
    “…Most state-of-the-art algorithms only consider structural properties to detect disjoint subcommunities and do not include the fact that people can belong to more than one community and also ignore the information contained in posts that users have made. …”
    Get full text
    Article
  4. 2564

    INVESTIGATION ON FINITE ELEMENT MODELING METHOD OF WITH TRIPLE JUNCTION POLYCRYSTALLINE INTERGRANULAR FRACTURE by SHI JunLin, ZHAO JianPing

    Published 2018-01-01
    “…Cohesive zone model was used to simulate polycrystalline intergranular fracture at the grain level model,the finite element model build-ing reflected the actual situation is a difficult point.In this paper,Mixed Programming of Matlab,Python and Abaqus,An algorithm was presented which can easily and quickly generated Voronoi geometric model and the grain sizes distribution agrees with lognormal distribution.Realized the automatically insert the zero-thickness cohesive interface element by writing nodes and elements at crystal boundary,firstly solved the void zone at the intersection of the three zerothickness cohesive element,which is the triple junction,And to make up the defect of cohesive zone model.The whole process of the finite element analysis was performed automatically by secondary development,including the assignation material properties,material orientation,load application,model solution.Finally,polycrystalline aluminum was used as an example to simulate the intergranular fracture process without the initial damage.The results show that the method is more effectively and practically,which can be used to simulate polycrystalline intergranular crack initiation and propagation in random microscopic grains.…”
    Get full text
    Article
  5. 2565

    Multimodal Control by Variable-Structure Neural Network Modeling for Coagulant Dosing in Water Purification Process by Jun Zhang, Da-Yong Luo

    Published 2020-01-01
    “…Different with the normal neural network mode, PCA is used to optimize hidden-layer nodes and update the neural network structure at every computation. …”
    Get full text
    Article
  6. 2566

    Research on the security of national secret algorithm based compute first networking by Jie PAN, Lan YE, Pengfei ZHANG, Zhonggui BU

    Published 2023-08-01
    “…With the promotion of national secret algorithm, in-depth research on the arithmetic network was carried out, a more efficient and reasonable security scheme for the arithmetic network was proposed, ensuring the data security and privacy of the arithmetic network with the help of the state secret algorithm.The main elements of the design program included: Supporting arithmetic demand and cryptographic invocation through the underlying resources, the arithmetic orchestration layer provided the ability to orchestrate data arithmetic, meanwhile, the arithmetic scheduling layer intelligently discerned the optimal nodes for arithmetic resource scheduling and allocation; the cryptographic reinforcement layer used the national secret algorithm based on hardware support with the help of public key cryptosystem, hash function, digital envelope, homomorphic encryption, blockchain and other technologies.Focusing on arithmetic network access security, transmission security, data security and privacy protection aspects of security implementation.An architecture and application form was innovatively proposed to guarantee the data security of the arithmetic network, which could meet the needs of the application layer arithmetic in the scenarios of big data, intelligent technology, etc..The security of the arithmetic network is enhanced by empowering the arithmetic network through the state-secret algorithm.…”
    Get full text
    Article
  7. 2567

    Adaptive Policy-Oriented Cybersecurity: A Decentralized Framework Using Message Passing Algorithms for Dynamic Threat Mitigation by Spyridon Evangelatos, Eleni Veroni, Mariza Konidi, Sophia Karagiorgou, Georgia Dede, Anargyros Baklezos, Christos Nikolopoulos, Panagiotis Sarigiannidis, Sotirios K. Goudos

    Published 2025-01-01
    “…This paper introduces a novel framework based on Message Passing algorithms that enables decentralized, adapted and optimized policy deployment across complex cybersecurity infrastructures. More specifically, we extend the traditional Min-Sum algorithm by incorporating dynamic trust weights that influence policy enforcement decisions, allowing more reliable nodes to have a greater impact while mitigating the risks posed by untrusted entities. …”
    Get full text
    Article
  8. 2568

    Research on the Resilience of a Railway Network Based on a Complex Structure Analysis of Physical and Service Networks by Tiansheng Dong, Yizhang Li, Kairan Sun, Junhua Chen

    Published 2025-05-01
    “…The simulation results demonstrate that targeted disruptions cause significantly more damage than random disturbances, particularly when high-betweenness nodes are affected. …”
    Get full text
    Article
  9. 2569

    Metastasizing Pleomorphic Adenoma: A Fascinating Enigma by Luis E. IV Santaliz-Ruiz, Gary Morales, Héctor Santini, María Sánchez-Santiago, Axel Arroyo

    Published 2012-01-01
    “…The present paper reports a case of pleomorphic adenoma (PA) in submandibular gland that, after more than 30 years of initial treatment, recurred and metastasized to ipsilateral neck lymph nodes and parotid gland. …”
    Get full text
    Article
  10. 2570

    Early clinical and metabolic response to tazemetostat in advanced relapsed INI1 negative epithelioid sarcoma by Ghazal Tansir, Sameer Rastogi, Shamim Ahmed Shamim, Adarsh Barwad

    Published 2021-04-01
    “…It is characterized by multiple local recurrences and regional lymph nodes form the commonest site of metastases. The function of Integrase Inhibitor 1 (INI1) protein is lost in more than 90% of cases, which was the basis for the introduction of tazemetostat into the therapeutic armamentarium for management of advanced ES. …”
    Get full text
    Article
  11. 2571

    Analysis of Core–Periphery Structure Based on Clustering Aggregation in the NFT Transfer Network by Zijuan Chen, Jianyong Yu, Yulong Wang, Jinfang Xie

    Published 2025-03-01
    “…The experimental results indicate that core nodes in the NFT transfer network constitute approximately 2.3–5% of all nodes. …”
    Get full text
    Article
  12. 2572

    Improved A*-based Path Planning for Mining Inspection Robots by ZHANG Hui, SU Guoyong, ZHAO Dongyang, YANG Yuhao, HE Kai

    Published 2025-05-01
    “…The proposed path smoothing algorithm is able to reduce the number of path nodes and improve the path smoothing, which makes it more suitable for the mining inspection robot path planning.…”
    Get full text
    Article
  13. 2573

    An Empirical Evaluation of Lightweight Random Walk Based Routing Protocol in Duty Cycle Aware Wireless Sensor Networks by Adnan Noor Mian, Mehwish Fatima, Raees Khan, Ravi Prakash

    Published 2014-01-01
    “…Energy efficiency is an important design paradigm in Wireless Sensor Networks (WSNs) and its consumption in dynamic environment is even more critical. Duty cycling of sensor nodes is used to address the energy consumption problem. …”
    Get full text
    Article
  14. 2574

    Genitourinary tuberculosis in the structure of autopsy morphological findings in deceased patients at the late stages of HIV infection by L. V. Puzyreva, A. V. Mordyk, S. A. Rudenko

    Published 2021-03-01
    “…A pathomorphological examination revealed TB of intrathoracic lymph nodes in 37.4 ± 4.5%, intra-abdominal lymph nodes — in 22.6 ± 3.9%, peripheral — 6.1 ± 2.2%, more often in miliary and disseminated pulmonary TB. …”
    Get full text
    Article
  15. 2575

    Improving Synchronization in an Air and High-Speed Rail Integration Service via Adjusting a Rail Timetable: A Real-World Case Study in China by Yu Ke, Lei Nie, Christian Liebchen, Wuyang Yuan, Xin Wu

    Published 2020-01-01
    “…A well-designed feeder train timetable with good synchronization is of great significance in an AH integration service, because it can improve the connectivity at transfer nodes and offer more opportunities for intermodal passengers to travel. …”
    Get full text
    Article
  16. 2576

    GSIDroid: A Suspicious Subgraph-Driven and Interpretable Android Malware Detection System by Hong Huang, Weitao Huang, Feng Jiang

    Published 2025-07-01
    “…Machine learning-based detection approaches have improved the accuracy of malware identification, thereby providing more effective protection for Android users. However, graph-based detection methods rely on whole-graph computations instead of subgraph-level analyses, and they often ignore the semantic information of individual nodes. …”
    Get full text
    Article
  17. 2577

    Determination of selection criteria for yield traits to improve okra (Abelmoschus esculentus L. Moench) breeding in Indonesia by H. A. Reswari, M. Syukur, A. W. Ritonga, W. Nurcholis

    Published 2025-03-01
    “…This method of determining selection criteria is more comprehensive than research on okra in Indonesia. …”
    Get full text
    Article
  18. 2578

    Trust-Based Consensus and ABAC for Blockchain Using Deep Learning to Secure Internet of Things by Arunkumar Muniswamy, R. Rathi

    Published 2025-12-01
    “…By leveraging blockchain, IoT systems can enhance their security protocols, making it more difficult for attackers to exploit vulnerabilities and access sensitive data. …”
    Get full text
    Article
  19. 2579

    Research on multi-objective hierarchical site selection coverage of fire station. by Junjie He, Xin Guan, Houjun Lu, Juntao Yang

    Published 2024-01-01
    “…To study the multi-objective siting problem of fire stations, we firstly divided demand areas and fire stations into three levels to form a comprehensive hierarchical emergency coverage network covering fire risk areas. Secondly, the nodes of the original location of the fire station were added to the set of nodes of the planned construction of the fire station. …”
    Get full text
    Article
  20. 2580

    MAC protocol with clock synchronization correction for a practical infrastructure monitoring system by Yasutaka Kawamoto, Toshihiko Matsunaga, Yuichi Kado

    Published 2018-04-01
    “…In addition, we found that through actual equipment evaluation that sensor nodes that adopt NES-MAC can operate for more than 10 years with two CR123A-type batteries.…”
    Get full text
    Article