Suggested Topics within your search.
Suggested Topics within your search.
-
661
Predicting the Robustness of Large Real-World Social Networks Using a Machine Learning Model
Published 2022-01-01“…., the capacity of a network holding its main functionality when a proportion of its nodes/edges are damaged, is useful in many real applications. …”
Get full text
Article -
662
Is body mass index a risk factor for lymphnode metastasis in penile cancer?
Published 2025-03-01“…Abstract Introduction Obese patients with penile cancer may have more advanced disease. This study evaluated the association of obesity with penile cancer and the risk of lymph node metastases in patients who underwent inguinal lymphadenectomy. …”
Get full text
Article -
663
Generalized Load Sharing for Homogeneous Networks of Distributed Environment
Published 2008-01-01“…We propose a method for job migration policies by considering effective usage of global memory in addition to CPU load sharing in distributed systems. When a node is identified for lacking sufficient memory space to serve jobs, one or more jobs of the node will be migrated to remote nodes with low memory allocations. …”
Get full text
Article -
664
A novel pigeon-inspired optimization with QUasi-Affine TRansformation evolutionary algorithm for DV-Hop in wireless sensor networks
Published 2020-06-01“…Simultaneously, the algorithm verifies its optimization ability by node location. According to the experimental results, they demonstrate that it is more outstanding than the Pigeon-Inspired Optimization algorithm, the QUasi-Affine TRansformation Evolutionary algorithm, and particle swarm optimization algorithm. …”
Get full text
Article -
665
Congestion control algorithms in wireless sensor networks: Trends and opportunities
Published 2017-07-01“…Therefore, special considerations are required to develop more sophisticated techniques to avoid, detect, and resolve congestion. …”
Get full text
Article -
666
Ranking Spreaders in Complex Networks Based on the Most Influential Neighbors
Published 2018-01-01“…The experimental results on both real and artificial networks show that the proposed method can quantify the node influence more accurately than degree centrality, betweenness centrality, closeness centrality, and k-shell decomposition method.…”
Get full text
Article -
667
Conjunct model of cloud & client computing based on multi-agent
Published 2010-01-01“…In order to utilize the resources of all nodes in networks fully,a novel conjunct model of cloud & client computing based on multi-agent was proposed,dividing the computing environment into three layers in accordance with the type of node and adopting agent to represent the behavior and resource of node to realize more efficient resource sharing and collaboration.The model takes full account of available resources owned by terminal nodes and deploys tasks in an orderly manner to the core nodes,servers and terminal nodes in order to maximize the efficiency of the resource utilization.To assure that tasks could be completed efficiently and reliably,a multi-agent-based collaborative multi-ring management mechanism was also presented,which is particularly suitable for the cloud & client conjunct computing environment and propitious to enhance the stability of resources sharing and nodes cooperation and relieve the load of core nodes.Finally,the construction method of experimental system and application demonstration based on the model was provided for reference.…”
Get full text
Article -
668
Network synchronizability enhancement via adding antagonistic interactions
Published 2024-12-01“…Abstract We discover a “less-is-more” effect that adding local antagonistic interactions (negative edge weights) can enhance the overall synchronizability of a dynamical network system. …”
Get full text
Article -
669
Energy-Efficient Probabilistic Routing Algorithm for Internet of Things
Published 2014-01-01“…In the simulations, we verify that the proposed algorithm has longer network lifetime and consumes the residual energy of each node more evenly when compared with the typical AODV protocol.…”
Get full text
Article -
670
Cluster-Based Architecture for Range-Free Localization in Wireless Sensor Networks
Published 2014-04-01“…The scanning process helps in estimating the location of target nodes with reference to the anchor nodes position. …”
Get full text
Article -
671
Transient Fault Detection in Networked Control Systems
Published 2014-11-01“…However, they can not be accurately identified due to various kinds of causes, so the detection of them needs more systematic and comprehensive system knowledge. …”
Get full text
Article -
672
A Dynamic Pricing Scheme for Congestion Game in Wireless Machine-to-Machine Networks
Published 2012-08-01“…The problem of assigning a set of source nodes to a set of routes in wireless machine-to-machine (M2M) networks is addressed using a game theoretic approach. …”
Get full text
Article -
673
A Multimodel Based Range Query Processing Algorithm for Information Collection in CPS
Published 2015-08-01“…Experimental results show that the cost model based algorithm can save 13.3% energy consumption more than that of the single model based algorithm.…”
Get full text
Article -
674
Partially Binarized Deep MUSIC for Multiple Target Angle Estimation Using Wireless Sensor Array Systems
Published 2025-05-01“…Since the sensor array system has limited computing power, it is not desirable to put the entire neural network on a single sensor node. Accordingly, the neural network was partitioned into two parts: the sensor node and the ground server. …”
Get full text
Article -
675
Experience and technique of simultaneous robotic resection for synchronous advanced gastric and rectal cancers: a case report
Published 2020-07-01“…Abstract Background Recently, robotic surgery has become more common as a minimally invasive treatment for gastric cancer (GC) and rectal cancer (RC). …”
Get full text
Article -
676
Squamous cell carcinoma of the uterine cervix metastasising to the thyroid gland: a case report
Published 2021-12-01“…We discuss a patient with cervical cancer presenting with thyroid and cervical lymph node metastasis, exploring the diagnostic difficulty, evaluation and treatment options. …”
Get full text
Article -
677
Neighbor-Enhanced Link Prediction in Bipartite Networks
Published 2025-05-01“…Link prediction in bipartite networks is a challenging task due to their distinct structural characteristics, where edges only exist between nodes of different types. Most existing methods are based on structural similarity, assigning similarity scores to node pairs under the assumption that a higher similarity corresponds to a higher likelihood of connection. …”
Get full text
Article -
678
An energy-balanced multi-sensor scheduling scheme for collaborative target tracking in wireless sensor networks
Published 2017-03-01“…We propose an effective scheme to extend the lifespan of wireless sensor networks while guaranteeing preset tracking quality. More specifically, with regard to practical circumstances, we perform analysis on the target detection probability, as well as residual energy of sensor nodes, when selecting a suitable set of candidate sensor nodes. …”
Get full text
Article -
679
The data dimensionality reduction and bad data detection in the process of smart grid reconstruction through machine learning.
Published 2020-01-01“…The results show that in the IEEE14-bus node and IEEE118-bus node systems, the overall distribution of the state estimated before and after the attack vector injection is consistent with the initial value. …”
Get full text
Article -
680
Evaluation of Lymphorrhea and Incidence of Lymphoceles: 4DryField® PH in Radical Retropubic Prostatectomy
Published 2016-01-01“…To investigate impact of polysaccharide hemostat 4DryField PH (4DF) applied on lymph node dissection area after radical retropubic prostatectomy (RRP) on lymphorrhea and lymphocele (LC) formation. …”
Get full text
Article