-
61
Survival benefit from adjuvant chemoradiotherapy in local advanced gastric cancer without accurate D2 confirmation: a real-world retrospective study (TJ-ARK01)
Published 2025-07-01“…Also, the extent of “D2 surgery” varied geographically due to the diversity in surgical techniques of radical lymphadenectomy and pathological accuracy in detecting positive lymph nodes detection. The purpose was to explore the role of adjuvant chemoradiation for gastric cancer and focus on patient stratification strategy. …”
Get full text
Article -
62
Lightweight obstacle detection for unmanned mining trucks in open-pit mines
Published 2025-03-01“…The experimental results show that the lightweight improvement strategy significantly improves the detection accuracy of the model, while greatly reducing the number of parameters and calculations of the model. …”
Get full text
Article -
63
High‐Sensitivity Dopamine Detection with Copper Terephthalate‐Modified Carbon Electrode
Published 2025-05-01“…In this study, four MOFs with copper nodes and terephthalate or trimesate linkers are synthesized, both with and without modulators, to investigate the influence of synthetic strategies and morphological characteristics on sensor performance. …”
Get full text
Article -
64
Optimal Arrangement Strategy of IoT Sensors in Urban Drainage Networks: A Review
Published 2025-04-01“…However, the intricate topology and numerous nodes of drainage pipes complicate IoT sensor placement strategies, especially in the selection of sensors and the location of monitoring points. …”
Get full text
Article -
65
Data augmentation based multi-view contrastive learning graph anomaly detection
Published 2024-10-01“…Layer-by-layer sampling combined with node-subgraph contrast was introduced, and optimization strategies for the contrast model were developed based on the importance of the subgraph. …”
Get full text
Article -
66
Fortifying Intrusion Detection Systems in Dynamic Ad Hoc and Wireless Sensor Networks
Published 2014-12-01“…The second aspect is nature dynamicity that occurs when a malicious node is continuously switching its behavior between normal and anomalous to cause maximum network disruption without being detected by the IDS. …”
Get full text
Article -
67
Mixed and Continuous Strategy Monitor-Forward Game Based Selective Forwarding Solution in WSN
Published 2015-11-01“…Due to the resource limitations and multihop communication in WSN, selective forwarding attacks launched by compromised insider nodes are a serious threat. A trust-based scheme for identifying and isolating malicious nodes is proposed and a mixed strategy and a continuous strategy Monitor-Forward game between the sender node and its one-hop neighboring node is constructed to mitigate the selective dropping attacks in WSN. …”
Get full text
Article -
68
Research on control strategies for joint point tracking in coordinated motion of dual-redundant robots
Published 2025-06-01“…Combined with the joint point tracking, real-time positional parameters during motion were captured. The mapping of each node position on the closed chain motion path of the dual-redundant robot system was realized based on the time interpolation.ResultsThe test results show that the maximum error between the real-time tracking point parameters of each joint and the actual node position parameters of the dual-redundant robot system under arbitrary attitude is 0.465 mm, which realizes the virtual and real interactive trajectory mapping, and provides accurate position data for the application of collision detection algorithm in the actual dual-redundant robot system.…”
Get full text
Article -
69
Mobility model detection method based on birth and death model in DTN environment
Published 2015-01-01“…A mobility model detection method based on birth and death model (MMD-BDM) in DTN environment was proposed.It first computed the connected channel capacity of sampling times according to the data traffic during the data transfer process,and then constructed the time varying intercommunication metrics at local,which composed of channel capacity between local node and others.Based on these,the connection birth and death mode of nodes based on connected edges was deduced,and then the birth and death features of the connected nodes was analyzed to detect the mobility model,which used to improve the routing strategy during the packages deliver process.Ultimately,the mobility model detection method was put into use in spray and wait routing (SWR) method and random network coding routing (RNCR) method to experiment,the simulation results show that,it can improve the opportunity routing performance of the data deliver rate and transfer latency in DTN environment.…”
Get full text
Article -
70
Enhancing Anti-Money Laundering Detection with Self-Attention Graph Neural Networks
Published 2025-01-01“…The paper also discusses potential strategies for further optimizing precision and recall, such as advanced graph architectures, oversampling methods, and enhanced node embedding techniques. …”
Get full text
Article -
71
Detecting memberships in multiplex networks via nonnegative matrix factorization and tensor decomposition
Published 2025-01-01“…Multiplex networks provide a powerful data structure for capturing diverse relationships among nodes, and the challenge of community detection within these networks has recently attracted considerable attention. …”
Get full text
Article -
72
GCN-based weakly-supervised community detection with updated structure centres selection
Published 2024-12-01“…Community detection is a classic problem in network learning. …”
Get full text
Article -
73
Systematic Analysis of Federated Learning Approaches for Intrusion Detection in the Internet of Things Environment
Published 2025-01-01“…However, this growing connectivity has heightened concerns regarding data privacy and security, particularly for sensitive information. Intrusion detection systems (IDSs) have emerged as an effective strategy by incorporating machine learning (ML) methodologies to identify sophisticated cybersecurity threats. …”
Get full text
Article -
74
Application Specific Sleep-Awake Strategy for Increasing Network Lifetime in Wireless Sensor Networks
Published 2018-08-01“…In traditional strategy, the nodes in the cluster sense data and send it to the Cluster Head (CH), if CHs detect redundancy of some data; they remove the duplication and send it to the base station. …”
Get full text
Article -
75
On Detection of Sybil Attack in Large-Scale VANETs Using Spider-Monkey Technique
Published 2018-01-01“…It performs better over long transmission distances for the detection of Sybil in dynamic VANETs’ system in terms of measurement precision, intrusion detection rate, and energy efficiency.…”
Get full text
Article -
76
Research on intrusion response strategy based on static Bayesian game in mobile edge computing network
Published 2023-02-01“…In the mobile edge computing (MEC) environment, the resources of edge nodes are limited.It is difficult to detect the intrusion process accurately, and there is no effective intrusion response strategy to deal with external intrusions.An intrusion detection network structure suitable for mobile edge computing environment was proposed and an intrusion response decision model based on static Bayesian game was established to simulate the network interaction behavior between edge nodes and external intruders.The probability of attackers and defenders in the game process was predicted respectively.The influence of the system resource, the cost of intrusion response, the detection rate and false alarm rate were considered comprehensively by the intrusion response decision model.The response decision of the intrusion detection system was optimized on the basis of the considering both resource consumption of the intrusion detection and the privacy protection of the edge nodes.The factors that affected the decision-making of intrusion response were analyzed, and the experimental basis for the specific application was provided.…”
Get full text
Article -
77
Research on intrusion response strategy based on static Bayesian game in mobile edge computing network
Published 2023-02-01“…In the mobile edge computing (MEC) environment, the resources of edge nodes are limited.It is difficult to detect the intrusion process accurately, and there is no effective intrusion response strategy to deal with external intrusions.An intrusion detection network structure suitable for mobile edge computing environment was proposed and an intrusion response decision model based on static Bayesian game was established to simulate the network interaction behavior between edge nodes and external intruders.The probability of attackers and defenders in the game process was predicted respectively.The influence of the system resource, the cost of intrusion response, the detection rate and false alarm rate were considered comprehensively by the intrusion response decision model.The response decision of the intrusion detection system was optimized on the basis of the considering both resource consumption of the intrusion detection and the privacy protection of the edge nodes.The factors that affected the decision-making of intrusion response were analyzed, and the experimental basis for the specific application was provided.…”
Get full text
Article -
78
Mitigation strategy against spectrum-sensing data falsification attack in cognitive radio sensor networks
Published 2019-09-01Get full text
Article -
79
A cloud-edge collaborative optimization control strategy for voltage in distribution networks with PV stations
Published 2025-06-01“…The voltage threshold device detects the node voltage overrun and triggers the collaborative optimization computation of the edge computing devices, which sends a command to the cloud to call the partitioning result of this time period, and the cloud sends the result to each edge computing device, which determines the area it is responsible for, and adjusts the voltage overrun partitioning by using the mixed-integer second-order conic planning, and ultimately realizes the optimization strategy within the minute-level zone. …”
Get full text
Article -
80