Suggested Topics within your search.
Suggested Topics within your search.
-
561
A Study on Prognostic Factors in Management of Breast Carcinoma in A Tertiary Care Hospital
Published 2023-10-01“…Involvement of 1-3 lymph nodes carry better prognosis than 4-9 and more than 9 lymph nodes involvement. …”
Get full text
Article -
562
Development of an IoT-based MANET for Healthcare Monitoring System Using Data Loss Aware Routing Protocol
Published 2025-08-01“…Then, the cluster head (CH) of every cluster is computed through a cuckoo search based deep probability neural network (CS-DPNN) with different design metrics. The CH node is acting as an intermediate node between cluster members and the next neighbouring CH node. …”
Get full text
Article -
563
Vulnerability Analysis of the China Railway Express Network Under Emergency Scenarios
Published 2025-07-01“…Our findings show that deliberate attacks targeting cities with high node strength result in more significant damage than attacks on cities with a high node degree or betweenness. …”
Get full text
Article -
564
Research on Deep Integration of the “Belt and Road” Aviation Network Based on Community Structure from the Perspective of China
Published 2023-01-01“…The international airline links in the “Belt and Road” aviation network are more complex. A total of 118 key nodes were identified, of which 83.1% were in the top 20% of overall network centrality.…”
Get full text
Article -
565
Multifactor task allocation problem in wireless sensor and actuator networks
Published 2017-10-01“…Task allocation is an essential part of many military applications of WSAN such as intelligent minefield.The key problem of task allocation decision in these systems for the optimal scheme on task allocation is how to obtain the node-target assignment.Combing with the factors of target’s parameters and node’s own status,the various influence factors of task efficiency were analyzed and the positive and negative indicators were processed by range normalization method separately.The linear-weighted task efficiency function was proposed in the applications of WSAN such as intelligent minefield.It can be utilized as the evaluation index of assignment schemes since it reflected the integrated impact of target’s threat and node’s value on the system more comprehensively.Task efficiency function can be constructed flexibly based on the demand of different multifactor task allocation application.The essence of the problem was how to make node-target assignment to achieve the maximum task efficiency of the whole system.This problem turned into assignment problem and can be solved.Finally,an application was implemented to demonstrate this scheme.The results show that the model is suitable for small-scale multifactor task allocation problem in intelligent minefield system.…”
Get full text
Article -
566
Multifactor task allocation problem in wireless sensor and actuator networks
Published 2017-10-01“…Task allocation is an essential part of many military applications of WSAN such as intelligent minefield.The key problem of task allocation decision in these systems for the optimal scheme on task allocation is how to obtain the node-target assignment.Combing with the factors of target’s parameters and node’s own status,the various influence factors of task efficiency were analyzed and the positive and negative indicators were processed by range normalization method separately.The linear-weighted task efficiency function was proposed in the applications of WSAN such as intelligent minefield.It can be utilized as the evaluation index of assignment schemes since it reflected the integrated impact of target’s threat and node’s value on the system more comprehensively.Task efficiency function can be constructed flexibly based on the demand of different multifactor task allocation application.The essence of the problem was how to make node-target assignment to achieve the maximum task efficiency of the whole system.This problem turned into assignment problem and can be solved.Finally,an application was implemented to demonstrate this scheme.The results show that the model is suitable for small-scale multifactor task allocation problem in intelligent minefield system.…”
Get full text
Article -
567
Energy-Efficient Adaptive Routing and Context-Aware Lifetime Maximization in Wireless Sensor Networks
Published 2014-11-01“…It is important to stress the fact that evenly regulating the routing task among the more nodes of the network can also protect a node from failure considering that a node with heavy duty is likely to deplete its power quickly. …”
Get full text
Article -
568
Trust-Region Method for Load Flow Solution of Three-Phase Unbalanced Electric Power Distribution System
Published 2022-01-01“…At present, the electric power system is getting bigger and more complex, and its loading is also increasing. …”
Get full text
Article -
569
Analysis of Internet Marketing Forecast Model Based on Parallel K-Means Algorithm
Published 2021-01-01“…The basic idea is that if a feature word appears more often in this document but less frequently in other nodes, the word will be assigned higher. …”
Get full text
Article -
570
The Cluster-Heads Selection Method considering Energy Balancing for Wireless Sensor Networks
Published 2013-11-01“…However, the CH that is already previously selected could not be selected again unless the round process is over even though the node has more energy than others. Following this fact, in WSNs, there is a kind of irregular energy consumption status among sensor nodes because of CHs' overhead energy usages. …”
Get full text
Article -
571
A Cooperative Spectrum Sensing Method of Aeronautical Radio Based on Reputation
Published 2015-09-01“…The traditional cooperative spectrum sensing algorithm of aeronautical radio can't distinguish the node type(normal/malicious), though weighted sequential probability ratio test(WSPRT)method meets the requirement but when the spectrum sensing data falsification(SSDF)node is exist, it can't keep high sensing accuracy any more. …”
Get full text
Article -
572
Social Networks Link Prediction Based on Incremental Learning
Published 2025-03-01“…Objective Various types of relationships in social networks exist between nodes, and the number of nodes changes over time. …”
Get full text
Article -
573
Energy-aware data compression and transmission range control for energy-harvesting wireless sensor networks
Published 2017-04-01“…Energy-harvesting nodes are now being employed in wireless sensor networks to extend the lifetime of the network by harvesting energy from the surrounding environments. …”
Get full text
Article -
574
ReAHGN: Adaptive Heterogeneous Graph Neural Network With Relation-Aware Embedding
Published 2025-01-01“…Heterogeneous graph neural networks (HGNs) have attracted more and more attention recently due to their wide applications such as node classification, community detection, and recommendation. …”
Get full text
Article -
575
The Fourth-Party Logistics Routing Problem Using Ant Colony System-Improved Grey Wolf Optimization
Published 2020-01-01“…The transportation scheme not only meets the customer’s time and cost requirements but also meets the carrying capacity and reputation constraints of 3PL. Between the two nodes, one or more 3PLs will undertake the transportation task. …”
Get full text
Article -
576
Efficient and Secure Resource Management in Home M2M Networks
Published 2013-11-01“…With the centralized node, our system is more efficient and secure, because of efficient resource management and users' anonymity protection. …”
Get full text
Article -
577
Evolution and vulnerability analysis of global photovoltaic industry chain trade pattern
Published 2025-02-01“…The trend of multipolarization is becoming more and more obvious. China’s position in each link of the industry chain is increasingly prominent. ② The vulnerability of the PV industry chain network shows a weakening trend. …”
Get full text
Article -
578
Rational analysis of authentication protocols based on NGUYEN L H scheme
Published 2013-08-01“…Using the ideas of game theory,NGUYEN L H transformed two families of authentication protocols where the honest party transmitted some useless data with probability α before the normal protocol run,so that even if an attacker attacks a protocol,the attacker’s payoff will still be lower than that when it does not.In such a way,the security of the protocol was guaranteed.However,this scheme suffers from two shortcomings:the considered is too attacker powerful,and only its payoff was considered and the cost of the attacks was ignored; the situation in which the honest node would choose to send useless data was not considered.To improve this scheme,the value of α,with the consideration of the attack cost,of which the value is more general was given.What’s more,the attack probability β was introduced.Based on this,the precondition that the honest node transmits the useless data was presented,as well as the value of α under the different β values.Compared with the original scheme,this results are more generic and comprehensive.Meanwhile,through a case analysis in the P2P network,the correctness of the conclusion is proved.…”
Get full text
Article -
579
CSpredR: A Multi-Site mRNA Subcellular Localization Prediction Method Based on Fusion Encoding and Hybrid Neural Networks
Published 2025-01-01“…They can encode the k-mer units in the sequence into word vectors, thus serving as the node feature vectors of the graph. In this way, each node in the graph is assigned a feature vector containing rich semantic information. …”
Get full text
Article -
580
An Improved Trust Model Based on Interactive Ant Algorithms and Its Applications in Wireless Sensor Networks
Published 2013-07-01“…s ant algorithm based trust model is improved from several aspects: new interactive ant algorithm, new node types, more reasonable meta-assumption on node behaviors, new trust evaluation function, new penalty mechanism, and so on. …”
Get full text
Article