Suggested Topics within your search.
Suggested Topics within your search.
-
2721
Estimation of interpolation projectors using Legendre polynomials
Published 2024-09-01“…The interpolation projector $P:C(\Omega)\to \Pi_1({\mathbb R}^n)$ with the nodes $x^{(j)}$ is defined by the equations $Pf\left(x^{(j)}\right)=f\left(x^{(j)}\right)$. …”
Get full text
Article -
2722
SEEG-Based Bilateral Seizure Network Analysis for Neurostimulation Treatment
Published 2025-01-01“…Epilepsy patients with drug-resistant seizures emanating from two or more distinct regions of left and right hemispheres are the primary candidates for neurostimulation treatment. …”
Get full text
Article -
2723
Key technologies and equipment for intelligent sensor network by optical media
Published 2025-05-01“…Compared with the existing bus sensor network, the optical medium sensor network has the characteristics of faster communication speed, stronger anti-interference ability, less system level, better interconnection, more reasonable control logic and higher intelligent service.…”
Get full text
Article -
2724
Significance of ultrasonography of the terminal ileum in moderate Crohn's disease
Published 2006-01-01“…The comparison of the ultrasonographic findings of the three groups revealed that more serious clinical laboratory image of CD significantly correlated with the higher length of the affected segment (p < 0.001), higher thickness of the wall (p < 0.001), the higher number and the larger lymph nodes of the mesenterium (p < 0.001). …”
Get full text
Article -
2725
Video Endoscopic Inguinal Lymphadenectomy in Post Saphenous Vein Graft Harvest (Coronary Artery Bypass) Status
Published 2021-12-01“…Video endoscopic inguinal lymphadenectomy (VEIL), either by the classical or robot-assisted approach, is performed to manage inguinal lymph nodes in penile carcinoma. Coronary artery bypass graft (CABG) is common in the age group affected by penile carcinoma. …”
Get full text
Article -
2726
Using effective subnetworks to predict selected properties of gene networks.
Published 2010-10-01“…However, since they contain a large number of nodes, the computation of influence networks requires a prohibitively large set of microarray experiments. …”
Get full text
Article -
2727
APPLICATION OF EXTREME LEARNING MACHINE METHOD ON STOCK CLOSING PRICE FORECASTING PT ANEKA TAMBANG (PERSERO) TBK
Published 2023-06-01“…This method is believed to be able to produce more accurate forecasting results with a low level of forecasting error. …”
Get full text
Article -
2728
Association patterns of work-family balance, perceived stress and turnover intentions among female medical workers in China (2022–2023): integration network and pathway analysis
Published 2025-06-01“…Results The feedback, adjustment and defense nodes were the important nodes of the work-family balance, perceived stress and turnover intention network. …”
Get full text
Article -
2729
Relationship extraction between entities with long distance dependencies and noise based on semantic and syntactic features
Published 2025-05-01“…To further improve robustness, we introduce a Self-Attention-based Graph Convolutional Network (SA-GCN) to rank neighboring nodes within the syntactic graph, filtering out irrelevant nodes and capturing long-distance dependencies more precisely in noisy environments. …”
Get full text
Article -
2730
iFQS: An Integrated FCNP-Q-Learning-Based Scheduling Algorithm for On-Demand Charging in Wireless Rechargeable Sensor Networks
Published 2024-01-01“…In wireless rechargeable sensor networks (WRSNs), charging request nodes (RNs) are characterized by several criteria which are contradictory. …”
Get full text
Article -
2731
Random traveling wave pulse-coupled oscillator algorithm of energy-efficient wireless sensor networks
Published 2018-04-01“…Energy-efficient pulse-coupled oscillators have recently gained significant research attention in wireless sensor networks, where the wireless sensor network applications mimic the firefly synchronization for attracting mating partners. As a result, it is more suitable and harder to identify demands in all applications. …”
Get full text
Article -
2732
The effect of main tillage methods on pea productivity
Published 2022-07-01“…The most favorable effect on pea productivity was provided by variants ‘no-tillage’ and subsurface tillage due to the maximum formation of number of nodes, beans and seeds in plants, as well as seed weight increase. …”
Get full text
Article -
2733
Increase of steel channel resistance through the application and formation of antifriction powder coating in the knots
Published 2019-06-01“…The cause abrasion and breakage of the wire strands in the locks (nodes) to couple the pusher is lack of mobility due to the lack of necessary quantity of lubricant for normal operation of a steel rope. …”
Get full text
Article -
2734
A Deep Reinforcement Learning Framework for Last-Mile Delivery with Public Transport and Traffic-Aware Integration: A Case Study in Casablanca
Published 2025-05-01“…A custom-built environment is developed, utilizing public transportation nodes as transshipment nodes for standardized packets of goods, combined with a realistic simulation of traffic conditions through the integration of the travel time index (TTI) for Casablanca. …”
Get full text
Article -
2735
High-performance reconfigurable encryption scheme for distributed storage
Published 2023-10-01“…As the world embraces the digital economy and enters an information society, data has emerged as a critical production factor.The collection, processing, and storage of data have become increasingly prevalent.Distributed storage systems, known for their efficiency, are widely used in various data fields.However, as the scale of data storage continues to expand, distributed storage faces more significant security risks, such as information leakage and data destruction.These challenges drive the need for innovative advancements in big data distributed storage security technology and foster the integration of domestic cryptographic technology with computing storage technology.This work focused on addressing security issues, particularly information leakage, in distributed storage nodes.A dynamic and reconfigurable encryption storage solution was proposed, which considered the requirements for encryption performance and flexibility.A high-performance reconfigurable cryptographic module was designed based on the bio mapping framework.Based on this module, multiple storage pools equipped with different cryptographic algorithms were constructed to facilitate high-performance encryption and decryption operations on hard disk data.The scheme also enabled dynamic switching of cryptographic algorithms within the storage pools.A cryptographic protocol with remote online loading functions for cryptographic algorithms and keys was developed to meet the unified management and convenient security update requirements of reconfigurable cryptographic modules in various storage nodes.Furthermore, the scheme implemented fine-grained data encryption protection and logical security isolation functions based on cryptographic reconstruction technology.Experimental results demonstrate that the performance loss of this scheme for encryption protection and security isolation of stored data is approximately 10%.It provides a technical approach for distributed storage systems to meet the cryptographic application technology requirements outlined in GB/T 39786-2021 “Information Security Technology-Basic Requirements for Cryptography Applications” Level 3 and above in terms of device and computing security, application and data security.…”
Get full text
Article -
2736
Identification of Structural Sealant Damage in Hidden Frame Glass Curtain Wall Based on Curvature Mode
Published 2025-06-01“…Boundary modes provide more targeted and accurate damage identification. …”
Get full text
Article -
2737
Distributed Broadcast with Minimum Latency in Asynchronous Wireless Sensor Networks under SINR-Based Interference
Published 2013-11-01“…However, WSNs in practice are more likely to be distributed asynchronous systems. …”
Get full text
Article -
2738
Effective deployment strategies for optimizing area coverage in multistatic sonar detection based on Cassini oval approximation and a virtual force algorithm
Published 2024-12-01“…However, the sources are more expensive than receivers and performance of multistatic sonar depends strongly on the relative positions of the sources and receivers. …”
Get full text
Article -
2739
Q-DMAC: Quality-Aware Distributed Channel Selection MAC Protocol for Enhancing Multi-Channel Communication in Directional Sensor Networks
Published 2025-01-01“…Proposed Q-DMAC assigns a higher number of slots inside a data window to nodes carrying more packets waiting to be sent and prioritizes medium access to nodes carrying a significant amount of data packets. …”
Get full text
Article -
2740
Thalamus and consciousness: a systematic review on thalamic nuclei associated with consciousness
Published 2025-06-01“…., either healthy and pathological humans or animals) across studies, the greatest amount of evidence supported a key role of CM-Pf for the generation, modulation, and maintenance of the level of consciousness.DiscussionThough there is more research on the role of intralaminar nuclei, there is proportionally more positive evidence supporting these nuclei (particularly the CM-Pf) as key nodes in the network underlying consciousness compared to other thalamic nuclei. …”
Get full text
Article