Showing 2,721 - 2,740 results of 3,333 for search 'more node', query time: 0.12s Refine Results
  1. 2721

    Estimation of interpolation projectors using Legendre polynomials by Mikhail V. Nevskii

    Published 2024-09-01
    “…The interpolation projector $P:C(\Omega)\to \Pi_1({\mathbb R}^n)$ with the nodes $x^{(j)}$ is defined by the equations $Pf\left(x^{(j)}\right)=f\left(x^{(j)}\right)$. …”
    Get full text
    Article
  2. 2722

    SEEG-Based Bilateral Seizure Network Analysis for Neurostimulation Treatment by Genchang Peng, Mehrdad Nourani, Jay Harvey

    Published 2025-01-01
    “…Epilepsy patients with drug-resistant seizures emanating from two or more distinct regions of left and right hemispheres are the primary candidates for neurostimulation treatment. …”
    Get full text
    Article
  3. 2723

    Key technologies and equipment for intelligent sensor network by optical media by Qiang GAO, Wenzhuo LI, Daiyong ZHOU

    Published 2025-05-01
    “…Compared with the existing bus sensor network, the optical medium sensor network has the characteristics of faster communication speed, stronger anti-interference ability, less system level, better interconnection, more reasonable control logic and higher intelligent service.…”
    Get full text
    Article
  4. 2724

    Significance of ultrasonography of the terminal ileum in moderate Crohn's disease by Jović Jasna, Lukić-Kostić Leposava, Sekulović Slobodan

    Published 2006-01-01
    “…The comparison of the ultrasonographic findings of the three groups revealed that more serious clinical laboratory image of CD significantly correlated with the higher length of the affected segment (p < 0.001), higher thickness of the wall (p < 0.001), the higher number and the larger lymph nodes of the mesenterium (p < 0.001). …”
    Get full text
    Article
  5. 2725

    Video Endoscopic Inguinal Lymphadenectomy in Post Saphenous Vein Graft Harvest (Coronary Artery Bypass) Status by Anandan Murugesan, Ramesh Chinnasamy

    Published 2021-12-01
    “…Video endoscopic inguinal lymphadenectomy (VEIL), either by the classical or robot-assisted approach, is performed to manage inguinal lymph nodes in penile carcinoma. Coronary artery bypass graft (CABG) is common in the age group affected by penile carcinoma. …”
    Get full text
    Article
  6. 2726

    Using effective subnetworks to predict selected properties of gene networks. by Gemunu H Gunaratne, Preethi H Gunaratne, Lars Seemann, Andrei Török

    Published 2010-10-01
    “…However, since they contain a large number of nodes, the computation of influence networks requires a prohibitively large set of microarray experiments. …”
    Get full text
    Article
  7. 2727

    APPLICATION OF EXTREME LEARNING MACHINE METHOD ON STOCK CLOSING PRICE FORECASTING PT ANEKA TAMBANG (PERSERO) TBK by Rita Apriliyanti, Neva Satyahadewi, Wirda Andani

    Published 2023-06-01
    “…This method is believed to be able to produce more accurate forecasting results with a low level of forecasting error. …”
    Get full text
    Article
  8. 2728

    Association patterns of work-family balance, perceived stress and turnover intentions among female medical workers in China (2022–2023): integration network and pathway analysis by Yin Lin, Jia li

    Published 2025-06-01
    “…Results The feedback, adjustment and defense nodes were the important nodes of the work-family balance, perceived stress and turnover intention network. …”
    Get full text
    Article
  9. 2729

    Relationship extraction between entities with long distance dependencies and noise based on semantic and syntactic features by Lei Wang, Fei Wu, Xiaoqing Liu, Jilong Cao, Mingwei Ma, Zhaoyang Qu

    Published 2025-05-01
    “…To further improve robustness, we introduce a Self-Attention-based Graph Convolutional Network (SA-GCN) to rank neighboring nodes within the syntactic graph, filtering out irrelevant nodes and capturing long-distance dependencies more precisely in noisy environments. …”
    Get full text
    Article
  10. 2730

    iFQS: An Integrated FCNP-Q-Learning-Based Scheduling Algorithm for On-Demand Charging in Wireless Rechargeable Sensor Networks by Man Gun Ri, Chun Hyok Kim, Se Hun Pak, Chol Min Pong

    Published 2024-01-01
    “…In wireless rechargeable sensor networks (WRSNs), charging request nodes (RNs) are characterized by several criteria which are contradictory. …”
    Get full text
    Article
  11. 2731

    Random traveling wave pulse-coupled oscillator algorithm of energy-efficient wireless sensor networks by Zeyad Ghaleb Al-Mekhlafi, Zurina Mohd Hanapi, Mohamed Othman, Zuriati Ahmad Zukarnain, Ahmed M Shamsan Saleh

    Published 2018-04-01
    “…Energy-efficient pulse-coupled oscillators have recently gained significant research attention in wireless sensor networks, where the wireless sensor network applications mimic the firefly synchronization for attracting mating partners. As a result, it is more suitable and harder to identify demands in all applications. …”
    Get full text
    Article
  12. 2732

    The effect of main tillage methods on pea productivity by S. I. Kambulov, Yu. A. Semenikhina, E. B. Demina

    Published 2022-07-01
    “…The most favorable effect on pea productivity was provided by variants ‘no-tillage’ and subsurface tillage due to the maximum formation of number of nodes, beans and seeds in plants, as well as seed weight increase. …”
    Get full text
    Article
  13. 2733

    Increase of steel channel resistance through the application and formation of antifriction powder coating in the knots by Ivanov V.V., Marchenko E.V., Panfilov A.V.

    Published 2019-06-01
    “…The cause abrasion and breakage of the wire strands in the locks (nodes) to couple the pusher is lack of mobility due to the lack of necessary quantity of lubricant for normal operation of a steel rope. …”
    Get full text
    Article
  14. 2734

    A Deep Reinforcement Learning Framework for Last-Mile Delivery with Public Transport and Traffic-Aware Integration: A Case Study in Casablanca by Amine Mohamed El Amrani, Mouhsene Fri, Othmane Benmoussa, Naoufal Rouky

    Published 2025-05-01
    “…A custom-built environment is developed, utilizing public transportation nodes as transshipment nodes for standardized packets of goods, combined with a realistic simulation of traffic conditions through the integration of the travel time index (TTI) for Casablanca. …”
    Get full text
    Article
  15. 2735

    High-performance reconfigurable encryption scheme for distributed storage by Zhihua FENG, Yuxuan ZHANG, Chong LUO, Jianing WANG

    Published 2023-10-01
    “…As the world embraces the digital economy and enters an information society, data has emerged as a critical production factor.The collection, processing, and storage of data have become increasingly prevalent.Distributed storage systems, known for their efficiency, are widely used in various data fields.However, as the scale of data storage continues to expand, distributed storage faces more significant security risks, such as information leakage and data destruction.These challenges drive the need for innovative advancements in big data distributed storage security technology and foster the integration of domestic cryptographic technology with computing storage technology.This work focused on addressing security issues, particularly information leakage, in distributed storage nodes.A dynamic and reconfigurable encryption storage solution was proposed, which considered the requirements for encryption performance and flexibility.A high-performance reconfigurable cryptographic module was designed based on the bio mapping framework.Based on this module, multiple storage pools equipped with different cryptographic algorithms were constructed to facilitate high-performance encryption and decryption operations on hard disk data.The scheme also enabled dynamic switching of cryptographic algorithms within the storage pools.A cryptographic protocol with remote online loading functions for cryptographic algorithms and keys was developed to meet the unified management and convenient security update requirements of reconfigurable cryptographic modules in various storage nodes.Furthermore, the scheme implemented fine-grained data encryption protection and logical security isolation functions based on cryptographic reconstruction technology.Experimental results demonstrate that the performance loss of this scheme for encryption protection and security isolation of stored data is approximately 10%.It provides a technical approach for distributed storage systems to meet the cryptographic application technology requirements outlined in GB/T 39786-2021 “Information Security Technology-Basic Requirements for Cryptography Applications” Level 3 and above in terms of device and computing security, application and data security.…”
    Get full text
    Article
  16. 2736

    Identification of Structural Sealant Damage in Hidden Frame Glass Curtain Wall Based on Curvature Mode by Yuqin Yan, Xiangcheng Wang, Xiaonan Li, Xin Zhang, Fan Yang, Jie Sun

    Published 2025-06-01
    “…Boundary modes provide more targeted and accurate damage identification. …”
    Get full text
    Article
  17. 2737

    Distributed Broadcast with Minimum Latency in Asynchronous Wireless Sensor Networks under SINR-Based Interference by Shiliang Xiao, Lebing Pan, Jianpo Liu, Baoqing Li, Xiaobing Yuan

    Published 2013-11-01
    “…However, WSNs in practice are more likely to be distributed asynchronous systems. …”
    Get full text
    Article
  18. 2738

    Effective deployment strategies for optimizing area coverage in multistatic sonar detection based on Cassini oval approximation and a virtual force algorithm by Liufang Fu, Ming Zhou, Linzhou Xu, Xiaoming Dong, Zhu Kou, Chunyu Kang

    Published 2024-12-01
    “…However, the sources are more expensive than receivers and performance of multistatic sonar depends strongly on the relative positions of the sources and receivers. …”
    Get full text
    Article
  19. 2739

    Q-DMAC: Quality-Aware Distributed Channel Selection MAC Protocol for Enhancing Multi-Channel Communication in Directional Sensor Networks by Maheen Islam, Fernaz Narin Nur, Selina Sharmin, Sajeeb Saha, Majharul Haque, Ahsan Habib

    Published 2025-01-01
    “…Proposed Q-DMAC assigns a higher number of slots inside a data window to nodes carrying more packets waiting to be sent and prioritizes medium access to nodes carrying a significant amount of data packets. …”
    Get full text
    Article
  20. 2740

    Thalamus and consciousness: a systematic review on thalamic nuclei associated with consciousness by Martina Cacciatore, Francesca Giulia Magnani, Filippo Barbadoro, Camilla Ippoliti, Mario Stanziano, Mario Stanziano, Letizia Clementi, Anna Nigri, Lorenzo Nanetti, Silvia Marino, Fabio La Porta, Lucia Francesca Lucca, Francesco Prada, Francesco Prada, Matilde Leonardi

    Published 2025-06-01
    “…., either healthy and pathological humans or animals) across studies, the greatest amount of evidence supported a key role of CM-Pf for the generation, modulation, and maintenance of the level of consciousness.DiscussionThough there is more research on the role of intralaminar nuclei, there is proportionally more positive evidence supporting these nuclei (particularly the CM-Pf) as key nodes in the network underlying consciousness compared to other thalamic nuclei. …”
    Get full text
    Article