Showing 601 - 620 results of 3,333 for search 'more node', query time: 0.10s Refine Results
  1. 601

    IoT-Enabled Real-Time Monitoring of Urban Garbage Levels Using Time-of-Flight Sensing Technology by Luis Miguel Pires, João Figueiredo, Ricardo Martins, José Martins

    Published 2025-03-01
    “…By integrating sensor data and network communication, the system supports informed decision-making for optimizing collection logistics, contributing to cleaner and more sustainable cities. The ToF-Node was tested in four scenarios, with a PCB measuring 40 × 18 × 4 mm and an enclosure of 65 × 40 × 30 mm. …”
    Get full text
    Article
  2. 602

    A Study on the Tracking Problem in Vehicular Ad Hoc Networks by Xing Zhang, Bang Liu, Jinchuan Tang

    Published 2013-02-01
    “…Vehicles have the characteristic of high mobility which makes vehicular ad hoc networks (VANETs) different from other mobile ad hoc networks (MANETs), it is more difficult to establish an end-to-end route in VANETs, and the source and destination nodes keep moving fast from their original locations. …”
    Get full text
    Article
  3. 603

    Fault Tolerant Coverage and Connectivity in Presence of Channel Randomness by Anil Kumar Sagar, D. K. Lobiyal

    Published 2014-01-01
    “…Some applications of wireless sensor network require K-coverage and K-connectivity to ensure the system to be fault tolerance and to make it more reliable. Therefore, it makes coverage and connectivity an important issue in wireless sensor networks. …”
    Get full text
    Article
  4. 604

    Relevance of Platelet-lymphocyte Ratio in Tumor Characteristics and Survival in Clear Cell-renal Cell Carcinoma by Santhosh Srinivasan, Poulose Chally, Abdul Azeez, Pankaj Bhirud

    Published 2025-04-01
    “…Conclusion: The use of PLR in ccRCC shows a strong correlation with renal vein extension and lymph node positivity. Implementing PLR for key treatment decisions can result in quicker, more efficient outcomes for patients.…”
    Get full text
    Article
  5. 605

    Child-Sum (N2E2N)Tree-LSTMs: An interactive Child-Sum Tree-LSTMs to extract biomedical event by Lei Wang, Han Cao, Liu Yuan

    Published 2024-12-01
    “…Next, it superimposes the updated edge into the parent node once more. Repeat the above steps from bottom to top. …”
    Get full text
    Article
  6. 606

    Learning to solving vehicle routing problems via local–global feature fusion transformer by Wei Li, Bing Tian Dai, Xueming Yan, Junying Zou, Zhijie Liang, Jingwen Li

    Published 2025-07-01
    “…Specifically, we introduce a Distance-Assisted Multi-Head Attention (DA-MHA) mechanism that incorporates explicit spatial distance information into the attention computation, thereby preserving spatial consistency and facilitating more robust global representation learning. In addition, we design a Proximity-Guided Attention (PGA) mechanism that dynamically fuses local and global contexts based on node proximity, enabling the model to focus on more relevant decision-making information while reducing sensitivity to distributional shifts. …”
    Get full text
    Article
  7. 607

    Factors associated with postoperative recurrence in perforated colorectal cancer: unraveling the high recurrence rate of perforated colorectal cancer by Makoto Takagi, Seongcheol Kim, Masaomi Suzuki, Tetsuyoshi Takayama, Hiroshi Asano

    Published 2025-04-01
    “…Clinicopathological background factors (age, sex, localization, surgical procedure, stoma, T stage, lymphatic invasion, venous invasion, differentiation, extent of lymph node dissection, number of dissected lymph nodes, lymph node metastasis, postoperative complications, and 30-day postoperative death) of perforated and non-perforated colorectal cancers were investigated. …”
    Get full text
    Article
  8. 608

    Correlation and autocorrelation of data on complex networks by Rudy Arthur

    Published 2025-01-01
    “…Abstract Networks where each node has one or more associated numerical values are common in applications. …”
    Get full text
    Article
  9. 609

    FedBFGCN: A Graph Federated Learning Framework Based on Balanced Channel Attention and Cross-Layer Feature Fusion Convolution by Hefei Wang, Ruichun Gu, Jingyu Wang, Xiaolin Zhang, Hui Wei

    Published 2025-01-01
    “…However, existing methods normally assign equal attention to all nodes within a single graph, focusing too much on the information of neighboring nodes, even if some nodes are more important in the graph structure or task (such as high consumption users or popular products), which inevitably leads to inefficient node embedding. …”
    Get full text
    Article
  10. 610

    An Optimized and Energy-Efficient Ad-Hoc On-Demand Distance Vector Routing Protocol Based on Dynamic Forwarding Probability (AODVI) by Hailu Gizachew Yirga, Gizatie Desalegn Taye, Henock Mulugeta Melaku

    Published 2022-01-01
    “…The suggested technique is more efficient, has a longer network lifetime, and uniformly utilizes node residual energy, enhancing network throughput and minimizing routing overhead when compared to regular and modified AODV protocols.…”
    Get full text
    Article
  11. 611

    Implementation of Bayesian Network Based on Ultra-High-Speed Superconductor Random Number Generators by Rikuo Yamanaka, Nobuyuki Yoshikawa, Yuki Yamanashi

    Published 2024-01-01
    “…We used a superconductor random number generator, where the output probability of “1” can be controlled by adjusting the input control current, as a node in the BN. Since the “1” output probability is controlled according to the previous node’s output, the conditional probability table (CPT) in the BN can be represented. …”
    Get full text
    Article
  12. 612

    CENSor: Detecting Illicit Bitcoin Operation via GCN-Based Hyperedge Classification by Suyeol Lee, Jaehan Kim, Minjae Seo, Seung Ho Na, Seungwon Shin, Jinwoo Kim

    Published 2024-01-01
    “…Additionally, we propose a framework named CENSor (Cluster-based Edge Node Switching Detector), which offers more powerful and robust detection capabilities compared to traditional techniques for both illegal entity detection and illegal transaction detection. …”
    Get full text
    Article
  13. 613

    Hierarchical proxy consensus optimization for IoV based on blockchain and trust value by Baoqin ZHAI, Jian WANG, Lei HAN, Jiqiang LIU, Jiahao HE, Tianhao LIU

    Published 2022-06-01
    “…With the rapid development of Internet of vehicles, 5G and artificial intelligence technologies, intelligent transportation has become the development trend of transportation technology.As a vehicle-vehicle and vehicle-road information interaction platform, the Internet of vehicles is the basic support platform for intelligent traffic information sharing and processing.At the same time, the security of Internet of vehicles has attracted much attention, especially data security which may cause user privacy leakage.The blockchain technology has become a solution, but it still faces new challenges in efficiency, security and other aspects.With the increase of vehicle nodes and information, how to efficiently achieve information consensus in high-speed vehicle moving environment has become a key problem.Then a bottom-up RSU (road side unit) chain consensus protocol was proposed based on blockchain and trust value.Several typical consensus structures were compared, and bottom-up two-layer consensus structure was adopted according to the actual scenarios of the Internet of vehicles.Moreover, a group leader node election algorithm was proposed which is based on node participation, work completion and message value.The system security was ensured by assigning trust value to each vehicle.Following the consensus structure and algorithm work mentioned above, the specific process of the protocol was comprehensively described, which was divided into six steps: region division, group leader node selection, local consensus, leader primary node selection, global consensus, and intra-domain broadcast.Then the experiments were analyzed from four aspects: security, communication complexity, consensus algorithm delay and fault tolerance rate.Experiments showed that, compared with other schemes, the proposed protocol can effectively reduce communication complexity and shorten consensus delay under the condition of resisting conspiracy attack, witch attack and other attacks.On the premise of security, the protocol improves fault tolerance rate and enables more nodes to participate in information sharing to satisfy the requirements of Internet of vehicles scenarios.…”
    Get full text
    Article
  14. 614

    The Routing Algorithm Based on Fuzzy Logic Applied to the Individual Physiological Monitoring Wearable Wireless Sensor Network by Jie Jiang, Yun Liu, Fuxing Song, Ronghao Du, Mengsen Huang

    Published 2015-01-01
    “…Simulation results illustrate that, with the F-CTP protocol, the sensor node can transmit data to the sink node in real time with higher reliability and the energy of the nodes consumes balance. …”
    Get full text
    Article
  15. 615

    GMM-based localization algorithm under NLOS conditions by Wei CUI, Cheng-dong WU, Yun-zhou ZHANG, Zi-xi JIA, Long CHENG

    Published 2014-01-01
    “…Aiming at indoor node localizations of WSN,a node localization algorithm,where priori-knowledge is not necessary,was proposed.on basis of analyzing the error model,combined with Gaussian mixture model (GMM).By training the distance measurements containing NLOS errors,the more accurate range estimations can be obtained.For higher localization accuracy,the particle swarm optimization (PSO) was introduced to optimize the expectation-maximization (EM)algorithm.Finally,by using the residual weighting algorithm to estimate the distance,the estimation coordinates of target nodes can be determined.The proposed algorithm was proved to be effective through simulation experiments.…”
    Get full text
    Article
  16. 616

    Robustness assessment of urban road networks in densely populated cities by Assemgul Kozhabek, Wei Koong Chai

    Published 2025-07-01
    “…The targeted node removal strategies are based on different centrality measures. …”
    Get full text
    Article
  17. 617

    Establishment and performance analysis of RIS-assisted coded relay cooperation system based on LDPC product codes by Shunwai ZHANG, Jin WANG

    Published 2023-11-01
    “…To pursue the ultra-reliable information transmission, the system which combined the reconfigurable intelligent surface (RIS) technology and coded relay cooperation technology was investigated.The RIS-assisted coded relay cooperation system model based on low density parity check (LDPC) product codes was established.Based on LDPC product codes, the information matrix was row-encoded by the source node and column-encoded by the relay node, respectively.An efficient joint iterative decoding algorithm was proposed.The two received signals at the destination were row-decoded and column-decoded iteratively to update the logarithmic likelihood ratios of information bits, and then the decoding decision was made.The closed-form solutions of the outage probability and the channel capacity with finite codelength were theoretically derived.Theoretical analysis and simulation results show that the proposed system obviously outperforms the traditional coded relay cooperation.The more number of RIS elements, the more significant advantage can be obtained.Simulation results also demonstrate that the channel capacity with finite codelength approaches the ideal channel capacity with the codelength of LDPC product codes increasing.…”
    Get full text
    Article
  18. 618

    Thymidine kinase 1 expression in ovarian serous adenocarcinoma is superior to Ki-67: A new prognostic biomarker by Jianjun Wang, Qi Liu, Xiaodie Zhou, Yan He, Qing Guo, Qunli Shi, Staffan Eriksson, Ji Zhou, Ellen He, Sven Skog

    Published 2017-06-01
    “…Although TK1 expression, MDACC grade, pTNM stage and lymph node metastasis significantly correlate to relapse in the Cox univariate analysis, in the multivariate Cox analysis only TK1 expression and lymph node metastasis were independent prognostic factors. …”
    Get full text
    Article
  19. 619

    A Topology Controlling Scheme Based on Guard Region in Wireless Sensor Network by Xiaojuan Wang, Lin Kang, Jingwen You, Mei Song

    Published 2016-05-01
    “…The channel environment becomes more complex, which results in difficulty to control topology under a mass node distribution according to the accurate interference model. …”
    Get full text
    Article
  20. 620

    An Uncommon Presentation of Carcinosarcoma of the Stomach and a Minimally Invasive Approach for Treatment by Anoush Calikyan, Agedi N. Boto, Valeriia Klymenko, Imran M. Siddiqui

    Published 2022-01-01
    “…Gastric carcinosarcoma is even more rare and is often diagnosed at a late stage. …”
    Get full text
    Article