Showing 41 - 60 results of 302 for search 'node detection strategy', query time: 0.10s Refine Results
  1. 41

    Machine learning based intrusion detection framework for detecting security attacks in internet of things by V. Kantharaju, H. Suresh, M. Niranjanamurthy, Syed Immamul Ansarullah, Farhan Amin, Amerah Alabrah

    Published 2024-12-01
    “…Abstract The Internet of Things (IoT) consist of a network of interconnected nodes constantly communicating, exchanging, and transferring data over various network protocols. …”
    Get full text
    Article
  2. 42

    Preoperative DBT-based radiomics for predicting axillary lymph node metastasis in breast cancer: a multi-center study by Shuyan He, Biao Deng, Jiaqi Chen, Jiamin Li, Xuefeng Wang, Guanxing Li, Siyu Long, Jian Wan, Yan Zhang

    Published 2025-05-01
    “…Abstract Background In the prognosis of breast cancer, the status of axillary lymph nodes (ALN) is critically important. While traditional axillary lymph node dissection (ALND) provides comprehensive information, it is associated with high risks. …”
    Get full text
    Article
  3. 43
  4. 44

    Predicting lymph node metastasis of clinical T1 non-small cell lung cancer: a brief review of possible methodologies and controversies by Li Zhang, Feiyue Zhang, Feiyue Zhang, Gaofeng Li, Xudong Xiang, Haifeng Liang, Yan Zhang

    Published 2024-12-01
    “…However, the preoperative lymph node staging and intraoperative lymph node dissection patterns of operable clinical T1 NSCLC are still subject to much disagreement, as well as the heterogeneity between primary tumors and metastatic lymph nodes poses a challenge in designing effective treatment strategies. …”
    Get full text
    Article
  5. 45

    Incidental discovery of invasive lobular carcinoma and anaplastic large cell lymphoma during sentinel lymph node biopsy: a case report by Euitae Kim

    Published 2024-11-01
    “…This study reports a rare case of concurrent invasive lobular carcinoma (ILC) of the breast and ALK-negative anaplastic large cell lymphoma (ALCL) detected during sentinel lymph node biopsy (SLNB). …”
    Get full text
    Article
  6. 46

    Lung cancer-associated fibroblasts-mediated collagen deposition drives mediastinal lymph node metastasis in non-small cell lung cancer by Caoyang Chen, Caoyang Chen, Yuqian Feng, Yuqian Feng, Frankie Chi Fat Ko, Sze Kwan Lam, Sheng Yan, James Chung Man Ho

    Published 2025-06-01
    “…Primary tumors and mediastinal lymph node metastases were analyzed using hematoxylin and eosin (H&E) staining for general morphology, supplemented by immunohistochemistry/immunofluorescence to detect specific protein markers. …”
    Get full text
    Article
  7. 47

    Role of upper respiratory tract fibroscopy in patients with cervical lymph node metastases from squamous-cell carcinoma without the primary tumor found by M. A. Krylovetskaya, I. G. Komarov, A. Yu. Kontsevaya, O. A. Malikhova

    Published 2021-01-01
    “…Background. The detection of primary tumor in patients with cervical lymph node metastases without the primary tumor found is very important, because its location often determines the treatment strategy. …”
    Get full text
    Article
  8. 48
  9. 49

    Transcriptome sequencing revealed that lymph node metastasis of papillary thyroid microcarcinoma is associated with high THBS4 expression and PDGFRA+ cancer-associated fibroblasts by LeYin Hu, Yi Lin, JingYu Zheng, Li Wan, Rui Zhao, Yi Ma, JianMin Li

    Published 2025-04-01
    “…The research question addressed whether specific genes, such as thrombospondin-4 (THBS4), could serve as predictive biomarkers for guiding surgical strategies, particularly in cases where current imaging modalities fail to detect LNM in the central region, and the decision for prophylactic central neck dissection remains controversial.MethodsTranscriptome sequencing was employed to screen for differentially expressed genes and perform enrichment analysis. …”
    Get full text
    Article
  10. 50
  11. 51

    Fault Diagnosis Strategy based on EWMA-BN for Chillers by Shang Pengtao, Guo Yabin, Tan Zehan, Chen Huanxin, Ding Xinlei

    Published 2019-01-01
    “…The results also showed that the increase of evidence nodes could improve the accuracy of fault diagnosis results, but the order of the input nodes had no effect on the final results. …”
    Get full text
    Article
  12. 52
  13. 53

    Fast loop-free path migration strategy in software defined network by Binghao YAN, Qinrang LIU, Jianliang SHEN, Xiantuo TANG, Dong LIANG

    Published 2022-05-01
    “…Aiming at the problems of slow and faulty path migration caused by distributed deployment and asynchronous operation of data plane forwarding devices in software defined network, a fast loop-free path migration strategy was proposed.First, a fast loop detection algorithm based on node ranking was proposed.By comparing the position differences of adjacent nodes on the old and new paths of the flow, whether there was a forwarding loop in the path migration process and the location detection where the loop occurs could be quickly determined.Then, a greedy update mechanism based on node relaxation dependency was proposed.The fast loop detection algorithm was used to uncover the relaxation dependency between the common switches on the old and new paths, and the number of switches updated in each round of the migration process was ensured to be maximized.Simulation results show that the proposed strategy can effectively avoid migration loops and obtain the optimal update time overhead under different network states compared with existing migration schemes.…”
    Get full text
    Article
  14. 54

    Spatial-Temporal Correlative Fault Detection in Wireless Sensor Networks by Zhiping Kang, Honglin Yu, Qingyu Xiong, Haibo Hu

    Published 2014-12-01
    “…The proposed fault detection strategy is decentralized, coordinate-free, and node-based, and it uses time series analysis and spatial correlations in the collected data. …”
    Get full text
    Article
  15. 55
  16. 56

    Model-Based Detection of Coordinated Attacks (DCA) in Distribution Systems by Nitasha Sahani, Chen-Ching Liu

    Published 2024-01-01
    “…In this paper, a novel proactive DCA strategy is proposed for early detection of CCA by establishing correlations among distinct attack events through model-based reinforcement learning that utilizes abductive reasoning to conclude the attacker goal. …”
    Get full text
    Article
  17. 57
  18. 58
  19. 59

    Multi-view adversarial attack defending method for host intrusion detection by WANG Fei, QIAN Kehan, LYU Mingqi, ZHU Tiantian, CHEN Honglong

    Published 2025-01-01
    “…Host-based intrusion detection (HID) aims to identify attack behaviors through the analysis of host logs. …”
    Get full text
    Article
  20. 60

    RMFKAN: Network Spammers Detection Method Based on Improved Graph Mamba by WANG Yuzhe, YAN Jinghua, BU Fanliang, WANG Yifan, LI Jia, HAN Zhuxuan

    Published 2025-05-01
    “…Existing graph Transformer-based methods for network spammers detection face challenges due to indiscriminate information propagation between nodes within communities. …”
    Get full text
    Article