Showing 621 - 640 results of 3,333 for search 'more node', query time: 0.10s Refine Results
  1. 621

    Routing protocol based on energy aware in ad hoc networks by Shi ZHENG, Wei-qiang WU, Qin-yu ZHANG, Nai-tong ZHANG

    Published 2012-04-01
    “…An energy-aware routing protocol (EARP) was presented to minimize the effect of limit energy supply of terminals in ad hoc network.In the novel protocol,different transmission paths based on service state of single node and energy consumption of the whole network could be chosen.When transmission path was broken,local maintaining strategy was evoked to reduce re-transmission of data packets and therefore route efficiency was improved.Moreover,node energy levels were introduced to avoid transmission link brake caused by energy exhaustion.Simulations were carried out on NS2 platform.The results show that,in the same simulation environment,comparing to other routing protocols,this routing protocol performs more effectively on balancing the traffic load,protecting low energy nodes and prolonging the network lifetime.…”
    Get full text
    Article
  2. 622

    Improved Artificial Bee Colony Optimization Underwater Localization Algorithm by Logistic Chaos Mapping and Differential Evolution by Jiaxing CHEN, Yang LIU, Xiaoqian LIU, Zhihua LIU

    Published 2025-01-01
    “…Objective Localization algorithms for underwater acoustic sensor networks typically depend on distance estimation methods, such as point-to-point distance estimation or angle estimation, to achieve node localization between nodes. However, techniques like least squares may yield multiple coordinate values, leading to significant inaccuracies in node localization. …”
    Get full text
    Article
  3. 623

    Including the Optimization Method of High-Proportion Distributed Photovoltaic Distribution Grid Subdivision Voltage Adjustment Coefficient by MO Jingshan, SONG Na, FAN Kaimin

    Published 2025-08-01
    “…[Results] The simulation results of the IEEE 33 node standard example show that the partition-based reactive voltage adjustment coefficient optimization method can effectively use the reactive to regulate node voltage,which is more conducive to meeting the requirements of accuracy and speed of reactive optimization. …”
    Get full text
    Article
  4. 624

    An Azimuth-Based Dead-End Avoiding Routing Mechanism for Providing Reliable IP Connectivity in Multihop Wireless Networks by Hyun Yu, Sanghyun Ahn

    Published 2016-05-01
    “…Hence, at some point, packets may experience no more place to be forwarded to (i.e., dead-ends). …”
    Get full text
    Article
  5. 625

    A hybrid clustering routing protocol based on machine learning and graph theory for energy conservation and hole detection in wireless sensor network by Mohammad Z Masoud, Yousef Jaradat, Ismael Jannoud, Mustafa A Al Sibahee

    Published 2019-06-01
    “…In this work, a new hybrid clustering routing protocol is proposed to prolong network life time through detecting holes and edges nodes. The detection process attempts to generate a connected graph without any isolated nodes or clusters that have no connection with the sink node. …”
    Get full text
    Article
  6. 626

    Development of a LoRa-based air quality monitoring system with user interface for public utility vehicles by Tolentino Aaron, Chua Anna Margarita, Co Paul Jason, De Guzman Jaybie, Rosales Marc, Hizon John Richard

    Published 2025-01-01
    “…Results were visualized in a Grafana-based web application with time series and heatmaps. The indoor node consumed more power due to frequent transmission. …”
    Get full text
    Article
  7. 627

    Temperature aware energy-efficient task scheduling strategies for mapreduce by Bin LIAO, Tao ZHANG, Jiong YU, Ji LIU, tong YINLu, Gang GUO

    Published 2016-01-01
    “…On one hand, utilization of the CPU becomes higher, which means more energy is consumed at each node. And as a result of task processing speed dropping off, more time will be needed to complete the same task.On the other hand, the prone downtime phenomenon will ectly lead to the failure of the task, and speculative execution mechanism is easy to make the runtime task suspend. …”
    Get full text
    Article
  8. 628

    Investigating How User's Activities in Both Virtual and Physical World Impact Each Other Leveraging LBSN Data by Zhiwen Yu, Yue Yang, Xingshe Zhou, Yu Zheng, Xing Xie

    Published 2014-02-01
    “…Then, we propose an algorithm to calculate the weight of each edge based on our findings that the more overlap of linked nodes they have, the heavier weight the edge has and the more popular the nodes in their overlap are, the lighter the weight of the edge is. …”
    Get full text
    Article
  9. 629
  10. 630

    An Intelligent IoT and ML-Based Water Leakage Detection System by Mohammed Rezwanul Islam, Sami Azam, Bharanidharan Shanmugam, Deepika Mathur

    Published 2023-01-01
    “…The device’s maximum current draw was 216.8 mA while transmitting data, and the minimum current draw was only 5.46 mA while sleeping. The node could run for more than 25 days on a single 3500 mAh battery.…”
    Get full text
    Article
  11. 631

    Extended adjuvant tamoxifen for early breast cancer: a meta-analysis. by Mustafa Al-Mubarak, Ariadna Tibau, Arnoud J Templeton, David W Cescon, Alberto Ocana, Bostjan Seruga, Eitan Amir

    Published 2014-01-01
    “…Subgroup analysis suggested that a greater effect size among lymph node positive patients compared with those who are lymph node negative (NNT: 25 vs. 49). …”
    Get full text
    Article
  12. 632

    The Effective Healing Strategy against Localized Attacks on Interdependent Spatially Embedded Networks by Kai Gong, Jia-Jian Wu, Ying Liu, Qing Li, Run-Ran Liu, Ming Tang

    Published 2019-01-01
    “…Furthermore, HPMD considers the distance between a pair of nodes to control the variation in the network structures, which is more applicable to spatial networks than previous methods.…”
    Get full text
    Article
  13. 633

    FEATURES OF BILATERAL BREAST CANCER NODAL METASTASIS by Ye. A. Fesik, N. V. Krakhmal, M. V. Zaviyalova, Ye. M. Slonimskaya, S. V. Vtoryshin, V. M. Perelmuter

    Published 2014-12-01
    “…The patients of this group of metastatic lymph nodes was detected more frequently in the presence of infiltrative component of three or more types of structures with the presence of these discrete groups of tumor cells, and the observed maximum degree of inflammatory infiltration of the tumor stroma. …”
    Get full text
    Article
  14. 634
  15. 635
  16. 636

    TransPath: Representation Learning for Heterogeneous Information Networks via Translation Mechanism by Yang Fang, Xiang Zhao, Zhen Tan, Weidong Xiao

    Published 2018-01-01
    “…We take advantage of the concept of translation mechanism in knowledge graph which regards a meta-path, instead of an edge, as a translating operation from the first node to the last node. Moreover, we propose a user-guided meta-path sampling strategy which takes users’ preference as a guidance, which could explore the semantics of a path more precisely, and meanwhile improve model efficiency via the avoidance of other noisy and meaningless meta-paths. …”
    Get full text
    Article
  17. 637

    A Novel Method Defends against the Path-Based DoS for Wireless Sensor Network by Dong Chen, Zhenjiang Zhang, Fan-Hsun Tseng, Han-Chieh Chao, Li-Der Chou

    Published 2014-07-01
    “…In a PDoS attack, an adversary can overwhelm sensor node and cluster head node to flood packets along the routing path so that intermediate node must keep active mode and exhaust the energy. …”
    Get full text
    Article
  18. 638

    Cellular automata model based power network attack prediction technology by Lijuan YE, Yiting WANG, Licheng ZHU

    Published 2023-04-01
    “…The prediction range of the traditional power network attack range prediction technology was not wide enough, resulting in the poor effect of power network security improvement.For this reason, a power network attack prediction technology based on cellular automata model was proposed.A cellular automata model was built, regarding the cells in the cellular automata as power cells, a cell vitality value conversion rule was established and combined with the attack probability of attackers to predict the development and change of power cells.The power network attack was predicted according to the change trend of central power cells and neighboring power cells.The experimental result shows that, under the influence of time factors, the predicted attack node location of the proposed power network attack prediction technology based on cellular automata model is basically consistent with the original node, and the predicted load removal is always below 100 MW, the proposed technology is more effective.…”
    Get full text
    Article
  19. 639

    An open-source parallel topology optimization framework based on unstructured 3D FEA using PETSc and Eigen by Yu Wang, Renfu Li, Kun Wang

    Published 2025-05-01
    “…The framework supports both eight-node hexahedral and four-node tetrahedral meshes and solves the compliance and stress topology optimization problem. …”
    Get full text
    Article
  20. 640

    One-bit maximum likelihood algorithm for sensor networks in non-ideal channels by Nana WANG, Zhaoting LIU, Yingbiao YAO

    Published 2020-03-01
    “…Wireless sensor networks typically consist of wireless sensor nodes that are distributed in a certain spatial range.In general,the energy storage,computing and communication capabilities of nodes are extremely limited.Direct transmission of the sampled signals of the various nodes to the fusion center will result in more energy consumption and greater network communication load.If the sampled signal value of each sensor node is compressed into a one-bit measurement value and then transmitted,the energy consumption and the communication load can be greatly reduced.The parameter estimation problem based on one-bit measurement of sensor networks in multiplicative noise environment was studied.Considering the non-ideal binary channel with interference between the node and the fusion center,a parameter estimation algorithm based on maximum likelihood was proposed,Cramér-Rao lower bound of the parameter estimation was analyzed,and the effectiveness of the algorithm was verified through a series of simulation experiments.…”
    Get full text
    Article