Showing 641 - 660 results of 3,333 for search 'more node', query time: 0.10s Refine Results
  1. 641

    Conjunct model of cloud & client computing based on multi-agent by XU Xiao-long, CHENG Chun-ling, XIONG Jing-yi

    Published 2010-01-01
    “…In order to utilize the resources of all nodes in networks fully,a novel conjunct model of cloud & client computing based on multi-agent was proposed,dividing the computing environment into three layers in accordance with the type of node and adopting agent to represent the behavior and resource of node to realize more efficient resource sharing and collaboration.The model takes full account of available resources owned by terminal nodes and deploys tasks in an orderly manner to the core nodes,servers and terminal nodes in order to maximize the efficiency of the resource utilization.To assure that tasks could be completed efficiently and reliably,a multi-agent-based collaborative multi-ring management mechanism was also presented,which is particularly suitable for the cloud & client conjunct computing environment and propitious to enhance the stability of resources sharing and nodes cooperation and relieve the load of core nodes.Finally,the construction method of experimental system and application demonstration based on the model was provided for reference.…”
    Get full text
    Article
  2. 642

    Dual-channel attribute graph clustering beyond the homogeneity assumption by AN Junxiu, LIU Yuan, YANG Linwang

    Published 2025-01-01
    “…Simultaneously, by integrating contrastive learning and clustering, more precise node embeddings were achieved. Compared to other methods, DCAGC demonstrates significant clustering performance when handling heterogeneous graph datasets and exhibits strong resilience to anomalous connections.…”
    Get full text
    Article
  3. 643

    Cellular automata model based power network attack prediction technology by Lijuan YE, Yiting WANG, Licheng ZHU

    Published 2023-04-01
    “…The prediction range of the traditional power network attack range prediction technology was not wide enough, resulting in the poor effect of power network security improvement.For this reason, a power network attack prediction technology based on cellular automata model was proposed.A cellular automata model was built, regarding the cells in the cellular automata as power cells, a cell vitality value conversion rule was established and combined with the attack probability of attackers to predict the development and change of power cells.The power network attack was predicted according to the change trend of central power cells and neighboring power cells.The experimental result shows that, under the influence of time factors, the predicted attack node location of the proposed power network attack prediction technology based on cellular automata model is basically consistent with the original node, and the predicted load removal is always below 100 MW, the proposed technology is more effective.…”
    Get full text
    Article
  4. 644

    Distributed key sharing based scheme for security clustering in unattended wireless sensor network by HONGHong Z, HANGQing-yang Z, IANLi-chao T, ANGLiang-min W

    Published 2015-05-01
    “…For unattended wireless sensor network (UWSN),considering the collecting and efficiency and security prob-lems,a secure clustering scheme for UWSN was proposed,which implements a clustering algorithm with the secure au-thentication of mobile nodes.The clustering algorithm uses triangle's characteristic to improve connectivity,balances collect efficiency and power consumption.The distributed key sharing scheme is used to improve the security of the clustering algorithm,in which mobile node's public key is able to be searched with high efficiency in the distributed static nodes,and the signature of mobile nodes will be checked by using the searched public key.Simulation results show that the clustering algorithm is tend to triangular meshes when node density is increasing,and more than 95% attacks are tol-erated when compromised nodes are less than 20%.…”
    Get full text
    Article
  5. 645

    Solving the shortest path Problem in an interval-valued Neutrosophic Pythagorean environment using an enhanced A* search algorithm by Prasanta Kumar Raut, Sakya Singh Satapathy, Siva Prasad Behera, Said Broumi, Ajay Kumar Sahoo

    Published 2025-02-01
    “…These sets provide a more flexible way to capture uncertainty by allowing the values of nodes in the graph to vary within certain intervals rather than having fixed values. …”
    Get full text
    Article
  6. 646

    Temperature aware energy-efficient task scheduling strategies for mapreduce by Bin LIAO, Tao ZHANG, Jiong YU, Ji LIU, tong YINLu, Gang GUO

    Published 2016-01-01
    “…On one hand, utilization of the CPU becomes higher, which means more energy is consumed at each node. And as a result of task processing speed dropping off, more time will be needed to complete the same task.On the other hand, the prone downtime phenomenon will ectly lead to the failure of the task, and speculative execution mechanism is easy to make the runtime task suspend. …”
    Get full text
    Article
  7. 647

    Composite Tor traffic features extraction method of webpage in actual network flow based on SDN by Hongping YAN, Qiang ZHOU, Shihao WANG, Wang YAO, Liukun HE, Liangmin WANG

    Published 2022-03-01
    “…Website fingerprinting (WF) methods for Tor webpage traffic are often based on the separated Tor traffic or even the separated Tor webpage traffic.However, distinguishing Tor traffic from the original traffic of the actual network and Tor webpage traffic from the Tor traffic costs amount of computation, which is more difficult than the WF attack itself.According to the current architecture of the Internet and the characteristics of network traffic converging to regional central nodes, the bi-directional statistical feature (BSF) was proposed for distinguishing Tor traffic through the intra-domain global perspective provided by the SDN structure of the central node and the node information disclosed by the Tor network.Furthermore, a hidden feature extraction method for Web traffic based on lifted structure fingerprinting (LSF) was proposed, and a composited Tor-webpage-identification traffic feature (CTTF) was proposed based on BSF and LSF deep features.For solving the problem of traffic training data scarcity, a traffic data augmentation method based on translation was proposed, which made the augmented traffic data as consistent as the Tor traffic data captured in the real working environment.The experimental results show that the identification rate based on CTTF can be improved by about 4% compared with using only the original data features.When there is less training data, the classification accuracy is improved more obvious after using the traffic data augmentation method, and the false positive rate can be effectively reduced.…”
    Get full text
    Article
  8. 648

    Changes in Intestinal Microbiota and Their Relationship With Patient Characteristics in Colorectal Cancer by Lu Zhao, Yongkun Fang, Jingqiu Zhang, Chen Wei, Hao Ji, Jiahao Zhao, Daorong Wang, Dong Tang

    Published 2024-12-01
    “…Firmicutes and Bacteroidetes were the most abundant phyla in both groups, while Verrucomicrobi was significantly more abundant in the CRC group. Megamonas , Lachnospira , and Romboutsia were more abundant in the control group; 18 genera differed significantly in abundance between the groups, which were found to involve 21 metabolic pathways. …”
    Get full text
    Article
  9. 649

    Distance Analysis in Regular OWC Deployments by Ali Mahbas, John Cosmas, Hamed Al-Raweshidy

    Published 2024-01-01
    “…The framework is extended to study the 3D distance, accounting for both fixed and random height differences between the UE and nodes. The coverage probability (CP) is also derived using the proposed framework, providing a more accurate representation of network performance. …”
    Get full text
    Article
  10. 650

    Clinical and imaging features of co-existent pulmonary tuberculosis and lung cancer: a population-based matching study in China by Fan Zhang, Fei Qi, Yi Han, Hongjie Yang, Yishuo Wang, Guirong Wang, Yujie Dong, Hongxia Li, Yuan Gao, Hongmei Zhang, Tongmei Zhang, Liang Li

    Published 2025-01-01
    “…Additionally, in comparison to LC alone, patients with IAPTB-LC exhibited more complex symptoms, imaging features, and lymph node metastases. …”
    Get full text
    Article
  11. 651

    Optimizing IoT Intrusion Detection—A Graph Neural Network Approach with Attribute-Based Graph Construction by Tien Ngo, Jiao Yin, Yong-Feng Ge, Hua Wang

    Published 2025-06-01
    “…Instead of relying on physical links, the TKSGF constructs graphs based on Top-K attribute similarity, ensuring a more meaningful representation of node relationships. …”
    Get full text
    Article
  12. 652

    Application of Large-Scale Cognitive Social Networks Based on Cooperative Transmission Mechanisms in Exploration of Flipped Classroom Teaching Strategy by Chen Zeng

    Published 2021-01-01
    “…The source-destination node distribution is constructed with a model based on node affinity to restore the actual network node distribution architecture. …”
    Get full text
    Article
  13. 653

    Research on routing strategy of wireless sensor network in intelligent substation based on improved EEUC algorithm by LIU Yuming, CUI Chen, SUN Yanzhi, LI Xu, TIAN Feng

    Published 2025-07-01
    “…The cluster head nodes are selected from two aspects (residual energy and spatial position) to make their distribution more uniform, and balance the energy consumption of cluster head nodes through dynamic competition radius. …”
    Get full text
    Article
  14. 654

    Exploring the Spatial Spillovers of Digital Finance on Urban Innovation and Its Synergy with Traditional Finance by Xiaoling Song, Xuan Qin, Wanmeng Wang, Rita Yi Man Li

    Published 2025-02-01
    “…Most existing literature focuses on whether digital or traditional finance contributes more to innovation, ignoring the spatial spillover effect of digital finance and failing to explore whether digital finance complements traditional finance in promoting innovation. …”
    Get full text
    Article
  15. 655

    The Role of Bilateral Versus Ipsilateral Neck Dissection in Oropharyngeal and Oral Cancer with Contralateral cN0 Neck in cT3 and cT4 Disease by Bhut Vishal, Vinod Kumar Dhakad

    Published 2025-03-01
    “…Result: In OC/OPC, midline-reaching/crossing tumors were more common with bilateral neck dissection, but contralateral neck node metastasis was rare. …”
    Get full text
    Article
  16. 656

    Target search on networks-within-networks with applications to protein-DNA interactions by Lucas Hedström, Seong-Gyu Yang, Ludvig Lizana

    Published 2025-01-01
    “…We present a novel framework for understanding node target search in systems organized as hierarchical networks-within-networks. …”
    Get full text
    Article
  17. 657

    Global confidence degree based graph neural network for financial fraud detection by Jiaxun Liu, Yue Tian, Guanjun Liu

    Published 2025-04-01
    “…This paper presents the concept and calculation formula of Global Confidence Degree (GCD) and thus designs GCD-based GNN (GCD-GNN) that can address the challenges of camouflage in fraudulent activities and thus can capture more global information. To obtain a precise GCD for each node, we use a multilayer perceptron to transform features and then the new features and the corresponding prototype are used to eliminate unnecessary information. …”
    Get full text
    Article
  18. 658

    Fuzzy-Logic-Based Energy Optimized Routing for Wireless Sensor Networks by Haifeng Jiang, Yanjing Sun, Renke Sun, Hongli Xu

    Published 2013-08-01
    “…Since the radio transceiver typically consumes more energies than any other hardware component on a sensor node, it is of great importance to design energy optimized routing algorithm to prolong network lifetime. …”
    Get full text
    Article
  19. 659

    Location-Aware Source Routing Protocol for Underwater Acoustic Networks of AUVs by Edward A. Carlson, Pierre-Philippe J. Beaujean, Edgar An

    Published 2012-01-01
    “…This allows LASR to make more informed routing decisions, which greatly increases performance compared to DSR. …”
    Get full text
    Article
  20. 660

    Advantages, disadvantages and optimization of organ-sparing methods for uterine fibroids treatment by A. L. Tikhomirov, V. V. Kazenashev, O. V. Maksimova, M. V. Maminova, N. L. Davydenko, N. V. Rurua, T. A. Sonina

    Published 2024-11-01
    “…After therapy in group 1, dominant node size significantly regressed: after therapy course  1 an effect size of quantitated difference between UF two sizes and the dominant node (Δ) was 8.70 (4.11; 13.29) mm (p < 0.001). …”
    Get full text
    Article