Showing 1,041 - 1,060 results of 2,064 for search 'network evaluation (pattern OR patterns)', query time: 0.17s Refine Results
  1. 1041
  2. 1042
  3. 1043

    Path Prediction Method for Effective Sensor Filtering in Sensor Registry System by Sukhoon Lee, Dongwon Jeong, Doo-Kwon Baik, Dae-Kyoo Kim

    Published 2015-07-01
    “…We also propose a method for learning and predicting user paths based on the Collective Behavior Pattern. To improve prediction accuracy, we consider a time feature to measure weights and predict a path. …”
    Get full text
    Article
  4. 1044

    On Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR Protocol by Mouhannad Alattar, Françoise Sailhan, Julien Bourgeois

    Published 2013-06-01
    “…Mobile ad hoc networks mostly operate over open, adverse, or even hostile environments and are, therefore, vulnerable to a large body of threats. …”
    Get full text
    Article
  5. 1045
  6. 1046
  7. 1047
  8. 1048

    RACH Traffic Prediction in Massive Machine Type Communications by Hossein Mehri, Hani Mehrpouyan, Hao Chen

    Published 2025-01-01
    “…Traffic pattern prediction has emerged as a promising approach for efficiently managing and mitigating the impacts of event-driven bursty traffic in massive machine-type communication (mMTC) networks. …”
    Get full text
    Article
  9. 1049

    Causally-Aware Reinforcement Learning for Joint Communication and Sensing by Anik Roy, Serene Banerjee, Jishnu Sadasivan, Arnab Sarkar, Soumyajit Dey

    Published 2025-01-01
    “…The next-generation wireless network, 6G and beyond, envisions to integrate communication and sensing to overcome interference, improve spectrum efficiency, and reduce hardware and power consumption. …”
    Get full text
    Article
  10. 1050
  11. 1051
  12. 1052
  13. 1053

    Incremental Adversarial Learning for Polymorphic Attack Detection by Ulya Sabeel, Shahram Shah Heydari, Khalil El-Khatib, Khalid Elgazzar

    Published 2024-01-01
    “…The employed attack quality analysis ensures that the adversarial atypical/polymorphic attacks generated through our system resemble original network attacks. We showcase the high performance of the IDS that we have proposed by training it using the CICIDS2017 and CICIoT2023 benchmark datasets and evaluating its performance against several atypical/polymorphic attack flows. …”
    Get full text
    Article
  14. 1054

    AERO: Adaptive Edge-Cloud Orchestration With a Sub-1K-Parameter Forecasting Model by Berend J. D. Gort, Godfrey M. Kibalya, Angelos Antonopoulos

    Published 2025-01-01
    “…Effective resource management in edge-cloud networks is crucial for meeting Quality of Service (QoS) requirements while minimizing operational costs. …”
    Get full text
    Article
  15. 1055

    Spatiotemporal analysis of land use and land cover changes, LST and NDVI in Thatta district, Sindh, Pakistan

    Published 2025-01-01
    “…The purpose of this work is to determine land-use and land-cover (LULC) patterns, land surface temperature (LST), and normalized difference vegetation index (NDVI) changes in Thatta district using Landsat data from 1991 to 2021 and evaluate the relationship between LST and NDVI. …”
    Get full text
    Article
  16. 1056

    Improving unsupervised pedestrian re‐identification with enhanced feature representation and robust clustering by Jiang Luo, Lingjun Liu

    Published 2024-12-01
    “…Second, a dispersion‐based clustering method, which can effectively evaluate the quality of clustering and discover potential patterns in the data is designed. …”
    Get full text
    Article
  17. 1057

    Evolution of foraging behaviour induces variable complexity-stability relationships in mutualist-exploiter-predator communities. by Lin Wang, Ting Wang, Xiao-Wei Zhang, Xiao-Fen Lin, Jia Li, Jin-Bao Liao, Rui-Wu Wang

    Published 2025-07-01
    “…Here, we explored an adaptive network model to evaluate how the evolution of foraging preference to determine the relationship between network complexity (i.e., connectance) and stability (i.e., community persistence at steady state) in mutualist-exploiter-predator communities (MEST). …”
    Get full text
    Article
  18. 1058

    Defecting or not defecting: how to "read" human behavior during cooperative games by EEG measurements. by Fabrizio De Vico Fallani, Vincenzo Nicosia, Roberta Sinatra, Laura Astolfi, Febo Cincotti, Donatella Mattia, Christopher Wilke, Alex Doud, Vito Latora, Bin He, Fabio Babiloni

    Published 2010-12-01
    “…The decision to defect can be "read" in advance by evaluating the changes of connectivity pattern in the hyper-brain network.…”
    Get full text
    Article
  19. 1059

    Research on the Layout of Courtyard Space in Underground Commercial Streets by Yu He, Xiaowei Chen, Meixuan Tian, Chi Zhang, Jing Kang

    Published 2025-05-01
    “…This research investigates the rationality of atrium spatial distribution in underground pedestrian streets, with particular emphasis on developing an evaluation framework for assessing atrium layout appropriateness, using pedestrian congregation patterns shaped by spatial network morphology as the primary evaluation criterion. …”
    Get full text
    Article
  20. 1060

    Uncovering glycolysis-driven molecular subtypes in diabetic nephropathy: a WGCNA and machine learning approach for diagnostic precision by Chenglong Fan, Guanglin Yang, Cheng Li, Jiwen Cheng, Shaohua Chen, Hua Mi

    Published 2025-01-01
    “…Methods In this study, the expression patterns of glycolysis-related genes (GRGs) were first analyzed using the GSE30122, GSE30528, and GSE96804  datasets, followed by an evaluation of the immune landscape in DN. …”
    Get full text
    Article