Showing 561 - 580 results of 3,333 for search 'more node', query time: 0.09s Refine Results
  1. 561

    A Study on Prognostic Factors in Management of Breast Carcinoma in A Tertiary Care Hospital by Sivaramakrishna Valluru, C Srikanth Reddy, Shanmukha Srinivasulu Udayagiri, Sada Surya Vidavaluru

    Published 2023-10-01
    “…Involvement of 1-3 lymph nodes carry better prognosis than 4-9 and more than 9 lymph nodes involvement. …”
    Get full text
    Article
  2. 562

    Development of an IoT-based MANET for Healthcare Monitoring System Using Data Loss Aware Routing Protocol by K. Balasubramanian, S. Senthilkumar, N. Kopperundevi, S. Sivakumar

    Published 2025-08-01
    “…Then, the cluster head (CH) of every cluster is computed through a cuckoo search based deep probability neural network (CS-DPNN) with different design metrics. The CH node is acting as an intermediate node between cluster members and the next neighbouring CH node. …”
    Get full text
    Article
  3. 563

    Vulnerability Analysis of the China Railway Express Network Under Emergency Scenarios by Huiyong Li, Wenlu Zhou, Laijun Zhao, Lixin Zhou, Pingle Yang

    Published 2025-07-01
    “…Our findings show that deliberate attacks targeting cities with high node strength result in more significant damage than attacks on cities with a high node degree or betweenness. …”
    Get full text
    Article
  4. 564

    Research on Deep Integration of the “Belt and Road” Aviation Network Based on Community Structure from the Perspective of China by Hongguang Yao, Huihui Xiao

    Published 2023-01-01
    “…The international airline links in the “Belt and Road” aviation network are more complex. A total of 118 key nodes were identified, of which 83.1% were in the top 20% of overall network centrality.…”
    Get full text
    Article
  5. 565

    Multifactor task allocation problem in wireless sensor and actuator networks by Lei MU, Jian-ying CHEN, Xiao-mei QU, Tao LIU

    Published 2017-10-01
    “…Task allocation is an essential part of many military applications of WSAN such as intelligent minefield.The key problem of task allocation decision in these systems for the optimal scheme on task allocation is how to obtain the node-target assignment.Combing with the factors of target’s parameters and node’s own status,the various influence factors of task efficiency were analyzed and the positive and negative indicators were processed by range normalization method separately.The linear-weighted task efficiency function was proposed in the applications of WSAN such as intelligent minefield.It can be utilized as the evaluation index of assignment schemes since it reflected the integrated impact of target’s threat and node’s value on the system more comprehensively.Task efficiency function can be constructed flexibly based on the demand of different multifactor task allocation application.The essence of the problem was how to make node-target assignment to achieve the maximum task efficiency of the whole system.This problem turned into assignment problem and can be solved.Finally,an application was implemented to demonstrate this scheme.The results show that the model is suitable for small-scale multifactor task allocation problem in intelligent minefield system.…”
    Get full text
    Article
  6. 566

    Multifactor task allocation problem in wireless sensor and actuator networks by Lei MU, Jian-ying CHEN, Xiao-mei QU, Tao LIU

    Published 2017-10-01
    “…Task allocation is an essential part of many military applications of WSAN such as intelligent minefield.The key problem of task allocation decision in these systems for the optimal scheme on task allocation is how to obtain the node-target assignment.Combing with the factors of target’s parameters and node’s own status,the various influence factors of task efficiency were analyzed and the positive and negative indicators were processed by range normalization method separately.The linear-weighted task efficiency function was proposed in the applications of WSAN such as intelligent minefield.It can be utilized as the evaluation index of assignment schemes since it reflected the integrated impact of target’s threat and node’s value on the system more comprehensively.Task efficiency function can be constructed flexibly based on the demand of different multifactor task allocation application.The essence of the problem was how to make node-target assignment to achieve the maximum task efficiency of the whole system.This problem turned into assignment problem and can be solved.Finally,an application was implemented to demonstrate this scheme.The results show that the model is suitable for small-scale multifactor task allocation problem in intelligent minefield system.…”
    Get full text
    Article
  7. 567

    Energy-Efficient Adaptive Routing and Context-Aware Lifetime Maximization in Wireless Sensor Networks by Shaohua Wan

    Published 2014-11-01
    “…It is important to stress the fact that evenly regulating the routing task among the more nodes of the network can also protect a node from failure considering that a node with heavy duty is likely to deplete its power quickly. …”
    Get full text
    Article
  8. 568

    Trust-Region Method for Load Flow Solution of Three-Phase Unbalanced Electric Power Distribution System by Rudy Gianto, null Purwoharjono

    Published 2022-01-01
    “…At present, the electric power system is getting bigger and more complex, and its loading is also increasing. …”
    Get full text
    Article
  9. 569

    Analysis of Internet Marketing Forecast Model Based on Parallel K-Means Algorithm by Xiaolei Chen, Sikun Ge

    Published 2021-01-01
    “…The basic idea is that if a feature word appears more often in this document but less frequently in other nodes, the word will be assigned higher. …”
    Get full text
    Article
  10. 570

    The Cluster-Heads Selection Method considering Energy Balancing for Wireless Sensor Networks by Choon-Sung Nam, Young-Shin Han, Dong-Ryeol Shin

    Published 2013-11-01
    “…However, the CH that is already previously selected could not be selected again unless the round process is over even though the node has more energy than others. Following this fact, in WSNs, there is a kind of irregular energy consumption status among sensor nodes because of CHs' overhead energy usages. …”
    Get full text
    Article
  11. 571

    A Cooperative Spectrum Sensing Method of Aeronautical Radio Based on Reputation by Yufeng Li, Nairui Hu, Yupeng Wang

    Published 2015-09-01
    “…The traditional cooperative spectrum sensing algorithm of aeronautical radio can't distinguish the node type(normal/malicious), though weighted sequential probability ratio test(WSPRT)method meets the requirement but when the spectrum sensing data falsification(SSDF)node is exist, it can't keep high sensing accuracy any more. …”
    Get full text
    Article
  12. 572

    Social Networks Link Prediction Based on Incremental Learning by Jian SHU, Zhichen CHEN

    Published 2025-03-01
    “…Objective Various types of relationships in social networks exist between nodes, and the number of nodes changes over time. …”
    Get full text
    Article
  13. 573

    Energy-aware data compression and transmission range control for energy-harvesting wireless sensor networks by Jun Min Yi, Eom Ji Oh, Dong Kun Noh, Ikjune Yoon

    Published 2017-04-01
    “…Energy-harvesting nodes are now being employed in wireless sensor networks to extend the lifetime of the network by harvesting energy from the surrounding environments. …”
    Get full text
    Article
  14. 574

    ReAHGN: Adaptive Heterogeneous Graph Neural Network With Relation-Aware Embedding by Xiaoyu Zhu, Xinzhe Yu, Enze Zha, Shiyang Lin

    Published 2025-01-01
    “…Heterogeneous graph neural networks (HGNs) have attracted more and more attention recently due to their wide applications such as node classification, community detection, and recommendation. …”
    Get full text
    Article
  15. 575

    The Fourth-Party Logistics Routing Problem Using Ant Colony System-Improved Grey Wolf Optimization by Fuqiang Lu, Wenjing Feng, Mengying Gao, Hualing Bi, Suxin Wang

    Published 2020-01-01
    “…The transportation scheme not only meets the customer’s time and cost requirements but also meets the carrying capacity and reputation constraints of 3PL. Between the two nodes, one or more 3PLs will undertake the transportation task. …”
    Get full text
    Article
  16. 576

    Efficient and Secure Resource Management in Home M2M Networks by Yue Lai, Jiawen Kang, Rong Yu

    Published 2013-11-01
    “…With the centralized node, our system is more efficient and secure, because of efficient resource management and users' anonymity protection. …”
    Get full text
    Article
  17. 577

    Evolution and vulnerability analysis of global photovoltaic industry chain trade pattern by Chao Ding, Xiaobei Ren

    Published 2025-02-01
    “…The trend of multipolarization is becoming more and more obvious. China’s position in each link of the industry chain is increasingly prominent. ② The vulnerability of the PV industry chain network shows a weakening trend. …”
    Get full text
    Article
  18. 578

    Rational analysis of authentication protocols based on NGUYEN L H scheme by Xing-hua LI, Ling-juan DENG, Yuan ZHANG, Jian-feng MA

    Published 2013-08-01
    “…Using the ideas of game theory,NGUYEN L H transformed two families of authentication protocols where the honest party transmitted some useless data with probability α before the normal protocol run,so that even if an attacker attacks a protocol,the attacker’s payoff will still be lower than that when it does not.In such a way,the security of the protocol was guaranteed.However,this scheme suffers from two shortcomings:the considered is too attacker powerful,and only its payoff was considered and the cost of the attacks was ignored; the situation in which the honest node would choose to send useless data was not considered.To improve this scheme,the value of α,with the consideration of the attack cost,of which the value is more general was given.What’s more,the attack probability β was introduced.Based on this,the precondition that the honest node transmits the useless data was presented,as well as the value of α under the different β values.Compared with the original scheme,this results are more generic and comprehensive.Meanwhile,through a case analysis in the P2P network,the correctness of the conclusion is proved.…”
    Get full text
    Article
  19. 579

    CSpredR: A Multi-Site mRNA Subcellular Localization Prediction Method Based on Fusion Encoding and Hybrid Neural Networks by Xiao Wang, Wenshuai Suo, Rong Wang

    Published 2025-01-01
    “…They can encode the k-mer units in the sequence into word vectors, thus serving as the node feature vectors of the graph. In this way, each node in the graph is assigned a feature vector containing rich semantic information. …”
    Get full text
    Article
  20. 580

    An Improved Trust Model Based on Interactive Ant Algorithms and Its Applications in Wireless Sensor Networks by Yun Pan, Yafang Yu, Li Yan

    Published 2013-07-01
    “…s ant algorithm based trust model is improved from several aspects: new interactive ant algorithm, new node types, more reasonable meta-assumption on node behaviors, new trust evaluation function, new penalty mechanism, and so on. …”
    Get full text
    Article