Suggested Topics within your search.
Suggested Topics within your search.
-
581
Towards the Integration of Additive Manufacturing for Freeform Steel and Glass Façade Construction
Published 2024-04-01“…For the gasket node, a preliminary benchmark node design is printed using four different elastomeric AM methods and materials. …”
Get full text
Article -
582
Effective Seed Scheduling for Directed Fuzzing with Function Call Sequence Complexity Estimation
Published 2025-07-01“…However, the distance can only reflect the relationship between the current node and the target node, and it does not consider the impact of the reaching sequence before the target node. …”
Get full text
Article -
583
CSC-GCN: Contrastive semantic calibration for graph convolution network
Published 2023-11-01“…However, the performance of GCNs drops rapidly when the labeled data are severely scarce, and the node features are prone to being indistinguishable with stacking more layers, causing over-fitting and over-smoothing problems. …”
Get full text
Article -
584
A Sister Mary Joseph’s nodule in fallopian tube cancer: exploring the metastatic pathway through gene expression profiling—a case report
Published 2025-08-01“…The results showed that genes involved in cell adhesion, migration, and stromal remodeling associated with the metastatic processes were more highly expressed in both inguinal lymph node metastasis and Sister Mary Joseph’s nodule than in the primary lesion. …”
Get full text
Article -
585
Centralized Regulation and Optimization Strategy for MV Distribution Network with PV Integration
Published 2023-02-01“…With increasing PV connected to MV distribution network, the problem of node voltage fluctuation and network loss is becoming more and more serious. …”
Get full text
Article -
586
An Energy-Efficient CKN Algorithm for Duty-Cycled Wireless Sensor Networks
Published 2012-05-01“…The algorithm EC-CKN, which takes the nodes' residual energy information as the parameter to decide whether a node to be active or sleep, not only can achieve the k -connected neighborhoods problem, but also can assure the k -awake neighbor nodes have more residual energy than other neighbor nodes in current epoch.…”
Get full text
Article -
587
Meta-analysis of the clinicopathologic features of endometrial cancer molecular staging
Published 2025-01-01“…There was no difference in POLE in the presence or absence of LVSI. Lymph node metastasis with and without lymph node metastasis in POLE (OR = 0.25) and CNL (OR = 0.31) were lower, and CNH (OR = 3.06) was higher in lymph node metastasis than in no lymph node metastasis. …”
Get full text
Article -
588
Gastric Cancer Showing Rapid Recurrence and Progression: A Case of Gastric Adenocarcinoma With Enteroblastic Differentiation
Published 2024-03-01“…However, reports indicate that it exhibits more aggressive characteristics, including lymph node metastasis or liver metastasis, than a conventional gastric adenocarcinoma. …”
Get full text
Article -
589
Localization with a Mobile Beacon Based on Compressive Sensing in Wireless Sensor Networks
Published 2013-10-01“…LMCS does not ask for all nodes hearing directly with beacon node, so it is more suitable for practical application than other localization algorithms. …”
Get full text
Article -
590
Mobile Tracking Based on Support Vector Regressors Ensemble and Game Theory
Published 2014-03-01“…A two-step tracking strategy is proposed to mitigate the adverse effect of non-line-of-sight (NLOS) propagation to the mobile node tracking. This strategy firstly uses support vector regressors ensemble (SVRM) to establish the mapping of node position to radio parameters by supervising learning. …”
Get full text
Article -
591
Rational analysis of authentication protocols based on NGUYEN L H scheme
Published 2013-08-01“…Using the ideas of game theory,NGUYEN L H transformed two families of authentication protocols where the honest party transmitted some useless data with probability α before the normal protocol run,so that even if an attacker attacks a protocol,the attacker’s payoff will still be lower than that when it does not.In such a way,the security of the protocol was guaranteed.However,this scheme suffers from two shortcomings:the considered is too attacker powerful,and only its payoff was considered and the cost of the attacks was ignored; the situation in which the honest node would choose to send useless data was not considered.To improve this scheme,the value of α,with the consideration of the attack cost,of which the value is more general was given.What’s more,the attack probability β was introduced.Based on this,the precondition that the honest node transmits the useless data was presented,as well as the value of α under the different β values.Compared with the original scheme,this results are more generic and comprehensive.Meanwhile,through a case analysis in the P2P network,the correctness of the conclusion is proved.…”
Get full text
Article -
592
Coverage optimization of wireless sensor network utilizing an improved CS with multi-strategies
Published 2025-08-01“…Additionally, the algorithm demonstrates enhanced stability, more uniform node distribution, and reduced optimization randomness. …”
Get full text
Article -
593
Can international railway express improve green total factor productivity?
Published 2025-05-01“…The findings indicate that the opening of CR Express significantly enhances the GTFP of node cities. Specifically, the introduction of freight trains on average increases the GTFP of node cities by 3.3%. …”
Get full text
Article -
594
Forest Fire Detection Using Wireless Sensors and Networks
Published 2022-09-01“…This technology can provide a real time monitoring for forest fire, where it can provide information at the ignition instance or at very small delay, depends on the node used wake up/sleep schedule. It’s more reliable because it can influence the world in the surrounded area, if it is used in appropriate methods, rather than expecting events over large distances and long delay like other satellite and camera towers techniques. …”
Get full text
Article -
595
MUC1 Predicts Colorectal Cancer Metastasis: A Systematic Review and Meta-Analysis of Case Controlled Studies.
Published 2015-01-01“…The pooled OR in the meta-analysis of 15 studies indicated that positive MUC1 expression correlated with more CRC node metastasis (OR = 2.32, 95% CI = 1.63-3.29). …”
Get full text
Article -
596
Underwater Energy Consumption and Target Localization Balancing Driven by Network Coverage Optimization
Published 2024-01-01“…Next, considering that the underwater relay node needs to consume more energy in the process of forwarding more data, the non-uniform deployment combined with hierarchy routing is proposed to reduce the coverage holes caused by node energy exhaustion. …”
Get full text
Article -
597
Optimizing Random Forest Parameters with Hyperparameter Tuning for Classifying School-Age KIP Eligibility in West Java
Published 2025-02-01“…Hyperparameter tuning through grid search identifies the optimal combination of parameters, including the number of trees (ntree), random variables per split (mtry), and terminal node size (node_size). Model performance is evaluated using balanced accuracy, sensitivity, and specificity. …”
Get full text
Article -
598
The increased matrix stiffness caused by LOXL2 activates Piezo1 channels to promote the migration and invasion of cervical cancer cells
Published 2025-04-01“…Results We quantitatively confirmed that CC with lymph node metastases was more rigid and more abundant in connective tissue proliferation than CC without lymph node metastases, and further demonstrated that stromal stiffness significantly modulated CC progression. …”
Get full text
Article -
599
Real-time Evaluation Model for Metro Station Passenger Flow Streamline Congestion State
Published 2025-07-01“…[Result & Conclusion] The congestion state of passenger flow streamline is related to that of multiple individual node facilities. By conducting a comprehensive analysis, this model provides a more holistic basis for determining the initiation timing, sequencing, and effectiveness of large passenger flow management and control measures across diffe-rent levels of nodes and streamlines.…”
Get full text
Article -
600
Research on the A* Algorithm for Automatic Guided Vehicles in Large-Scale Maps
Published 2024-11-01“…The traditional A* algorithm faces the challenges of low search efficiency and large node extension range in the field of path planning. …”
Get full text
Article