Suggested Topics within your search.
Suggested Topics within your search.
-
621
Routing protocol based on energy aware in ad hoc networks
Published 2012-04-01“…An energy-aware routing protocol (EARP) was presented to minimize the effect of limit energy supply of terminals in ad hoc network.In the novel protocol,different transmission paths based on service state of single node and energy consumption of the whole network could be chosen.When transmission path was broken,local maintaining strategy was evoked to reduce re-transmission of data packets and therefore route efficiency was improved.Moreover,node energy levels were introduced to avoid transmission link brake caused by energy exhaustion.Simulations were carried out on NS2 platform.The results show that,in the same simulation environment,comparing to other routing protocols,this routing protocol performs more effectively on balancing the traffic load,protecting low energy nodes and prolonging the network lifetime.…”
Get full text
Article -
622
Improved Artificial Bee Colony Optimization Underwater Localization Algorithm by Logistic Chaos Mapping and Differential Evolution
Published 2025-01-01“…Objective Localization algorithms for underwater acoustic sensor networks typically depend on distance estimation methods, such as point-to-point distance estimation or angle estimation, to achieve node localization between nodes. However, techniques like least squares may yield multiple coordinate values, leading to significant inaccuracies in node localization. …”
Get full text
Article -
623
Including the Optimization Method of High-Proportion Distributed Photovoltaic Distribution Grid Subdivision Voltage Adjustment Coefficient
Published 2025-08-01“…[Results] The simulation results of the IEEE 33 node standard example show that the partition-based reactive voltage adjustment coefficient optimization method can effectively use the reactive to regulate node voltage,which is more conducive to meeting the requirements of accuracy and speed of reactive optimization. …”
Get full text
Article -
624
An Azimuth-Based Dead-End Avoiding Routing Mechanism for Providing Reliable IP Connectivity in Multihop Wireless Networks
Published 2016-05-01“…Hence, at some point, packets may experience no more place to be forwarded to (i.e., dead-ends). …”
Get full text
Article -
625
A hybrid clustering routing protocol based on machine learning and graph theory for energy conservation and hole detection in wireless sensor network
Published 2019-06-01“…In this work, a new hybrid clustering routing protocol is proposed to prolong network life time through detecting holes and edges nodes. The detection process attempts to generate a connected graph without any isolated nodes or clusters that have no connection with the sink node. …”
Get full text
Article -
626
Development of a LoRa-based air quality monitoring system with user interface for public utility vehicles
Published 2025-01-01“…Results were visualized in a Grafana-based web application with time series and heatmaps. The indoor node consumed more power due to frequent transmission. …”
Get full text
Article -
627
Temperature aware energy-efficient task scheduling strategies for mapreduce
Published 2016-01-01“…On one hand, utilization of the CPU becomes higher, which means more energy is consumed at each node. And as a result of task processing speed dropping off, more time will be needed to complete the same task.On the other hand, the prone downtime phenomenon will ectly lead to the failure of the task, and speculative execution mechanism is easy to make the runtime task suspend. …”
Get full text
Article -
628
Investigating How User's Activities in Both Virtual and Physical World Impact Each Other Leveraging LBSN Data
Published 2014-02-01“…Then, we propose an algorithm to calculate the weight of each edge based on our findings that the more overlap of linked nodes they have, the heavier weight the edge has and the more popular the nodes in their overlap are, the lighter the weight of the edge is. …”
Get full text
Article -
629
Mutation status and prognostic value of KRAS and NRAS mutations in Moroccan colon cancer patients: A first report.
Published 2021-01-01“…Rare RAS-mutated tumors, compared with wild-type tumors were more frequently moderately differentiated and associated with lower lymph node rate. …”
Get full text
Article -
630
An Intelligent IoT and ML-Based Water Leakage Detection System
Published 2023-01-01“…The device’s maximum current draw was 216.8 mA while transmitting data, and the minimum current draw was only 5.46 mA while sleeping. The node could run for more than 25 days on a single 3500 mAh battery.…”
Get full text
Article -
631
Extended adjuvant tamoxifen for early breast cancer: a meta-analysis.
Published 2014-01-01“…Subgroup analysis suggested that a greater effect size among lymph node positive patients compared with those who are lymph node negative (NNT: 25 vs. 49). …”
Get full text
Article -
632
The Effective Healing Strategy against Localized Attacks on Interdependent Spatially Embedded Networks
Published 2019-01-01“…Furthermore, HPMD considers the distance between a pair of nodes to control the variation in the network structures, which is more applicable to spatial networks than previous methods.…”
Get full text
Article -
633
FEATURES OF BILATERAL BREAST CANCER NODAL METASTASIS
Published 2014-12-01“…The patients of this group of metastatic lymph nodes was detected more frequently in the presence of infiltrative component of three or more types of structures with the presence of these discrete groups of tumor cells, and the observed maximum degree of inflammatory infiltration of the tumor stroma. …”
Get full text
Article -
634
Energy-Aware and Reliability-Based Localization-Free Cooperative Acoustic Wireless Sensor Networks
Published 2020-01-01“…In EPACA protocol, a source node computes a function value for every neighbor node. …”
Get full text
Article -
635
Clinical characteristics of cervical lymphadenopathy in Kawasaki disease and the generation of related cervical complications: a retrospective cohort study
Published 2025-04-01“…KD patients with enlarged cervical lymph nodes were more likely to exhibit systemic involvement. …”
Get full text
Article -
636
TransPath: Representation Learning for Heterogeneous Information Networks via Translation Mechanism
Published 2018-01-01“…We take advantage of the concept of translation mechanism in knowledge graph which regards a meta-path, instead of an edge, as a translating operation from the first node to the last node. Moreover, we propose a user-guided meta-path sampling strategy which takes users’ preference as a guidance, which could explore the semantics of a path more precisely, and meanwhile improve model efficiency via the avoidance of other noisy and meaningless meta-paths. …”
Get full text
Article -
637
A Novel Method Defends against the Path-Based DoS for Wireless Sensor Network
Published 2014-07-01“…In a PDoS attack, an adversary can overwhelm sensor node and cluster head node to flood packets along the routing path so that intermediate node must keep active mode and exhaust the energy. …”
Get full text
Article -
638
Cellular automata model based power network attack prediction technology
Published 2023-04-01“…The prediction range of the traditional power network attack range prediction technology was not wide enough, resulting in the poor effect of power network security improvement.For this reason, a power network attack prediction technology based on cellular automata model was proposed.A cellular automata model was built, regarding the cells in the cellular automata as power cells, a cell vitality value conversion rule was established and combined with the attack probability of attackers to predict the development and change of power cells.The power network attack was predicted according to the change trend of central power cells and neighboring power cells.The experimental result shows that, under the influence of time factors, the predicted attack node location of the proposed power network attack prediction technology based on cellular automata model is basically consistent with the original node, and the predicted load removal is always below 100 MW, the proposed technology is more effective.…”
Get full text
Article -
639
An open-source parallel topology optimization framework based on unstructured 3D FEA using PETSc and Eigen
Published 2025-05-01“…The framework supports both eight-node hexahedral and four-node tetrahedral meshes and solves the compliance and stress topology optimization problem. …”
Get full text
Article -
640
One-bit maximum likelihood algorithm for sensor networks in non-ideal channels
Published 2020-03-01“…Wireless sensor networks typically consist of wireless sensor nodes that are distributed in a certain spatial range.In general,the energy storage,computing and communication capabilities of nodes are extremely limited.Direct transmission of the sampled signals of the various nodes to the fusion center will result in more energy consumption and greater network communication load.If the sampled signal value of each sensor node is compressed into a one-bit measurement value and then transmitted,the energy consumption and the communication load can be greatly reduced.The parameter estimation problem based on one-bit measurement of sensor networks in multiplicative noise environment was studied.Considering the non-ideal binary channel with interference between the node and the fusion center,a parameter estimation algorithm based on maximum likelihood was proposed,Cramér-Rao lower bound of the parameter estimation was analyzed,and the effectiveness of the algorithm was verified through a series of simulation experiments.…”
Get full text
Article