-
121
Adaptive Policy-Oriented Cybersecurity: A Decentralized Framework Using Message Passing Algorithms for Dynamic Threat Mitigation
Published 2025-01-01“…In the face of increasingly sophisticated and dynamic cyber threats, policy-based cybersecurity deployment has emerged as a critical strategy for securing modern, complex network infrastructures. …”
Get full text
Article -
122
Novel approaches to diagnostic imaging of locally advanced cervical cancer
Published 2019-04-01“…However, the use of functional mRitechniques has not yet been included in the standards. cervical cancer tissue has been found to show significantly lower diffusion-weighted imaging (dWi) values than normal cervical tissue, thus facilitating the detection of tumor and its spread. dWiis also used for differentiating changes after biopsy from residual tumor and for identifying small lymph nodes. the pEt/cttechnique combines the metabolic images of pEtwith anatomical images of ctand is more accurate than high resolution ctalone, especially in determining the involvement of regional lymph nodes and distant organs. 18-Fdg-pEt/cthas been successfully used for accurate staging of the disease (especially late stage), assessment of treatment response, radiotherapy planning, and detection of disease progression. in patients with advanced stages of cervical cancer (iiBiV stage), the 18-Fdg-pEt/ ctfindings can determine the treatment strategy in most cases, primarily due to high sensitivity (75–100 %) and specificity (87–100 %) in the detection of lymph node metastases.…”
Get full text
Article -
123
Real-time analysis of soccer ball–player interactions using graph convolutional networks for enhanced game insights
Published 2025-07-01“…Our approach leverages the power of deep computer vision models, employing a CSPDarknet53 backbone for detection and a Graph Convolutional Network (GCN) for predictive analytics. …”
Get full text
Article -
124
Early introduction of IL-10 weakens BCG revaccination’s protection by suppressing CD4+Th1 cell responses
Published 2024-12-01“…IL-10 expression peaked in the lungs 3–6 weeks post-revaccination and was also detected in lymph nodes and spleen as early as 2 weeks following the booster dose, regardless of the intervals between the prime and booster vaccinations. …”
Get full text
Article -
125
HMS-PAU-IN: A heterogeneous multi-scale spatiotemporal interaction network model for population analysis units
Published 2025-06-01“…In the temporal dimension, the changes of PAUs are captured through the evolutionary relationships of nodes between different time windows. To validate the model, we developed a population prediction model that integrates the multi-scale features of PAUs and introduced Leiden-IES-PMS, a community detection method based on the Leiden algorithm, which integrates internal and external environmental semantics and adopts a proximity merging strategy. …”
Get full text
Article -
126
A receive-coherent detector for airborne distributed coherent aperture radar under heterogeneous clutter and random phase errors
Published 2025-05-01“…Then, a detection strategy without prior information is proposed to enhance the proposed algorithm’s feasibility further. …”
Get full text
Article -
127
On the academic ideology of “Transport is traffic”
Published 2025-07-01“…In order to continuously improve the intelligent level of coal mine continuous transportation system, the academic thought of “transport is traffic” is proposed, the connotation of academic thought is defined, the logical structure of academic thought is constructed, the four key technologies of intelligent coal mine continuous transportation system are condensed, and the four key technologies of continuous transportation system based on coal flow and their solutions are given. The coal flow detection model of each node of the coal mine continuous transportation system is established, the coal flow detection method of multi-information fusion is proposed, the coal flow database is constructed, the continuous transportation system is digitized, and the solid foundation of the intelligent continuous transportation system is laid. …”
Get full text
Article -
128
Security decision method for the edge of multi-layer satellite network based on reinforcement learning
Published 2022-06-01“…Selection;the strategy acts on the satellite network,which will change the state of the environment,and the environment will evaluate the strategy and feed it back to the edge center node in the form of reward;the edge center node will perform error calculation and update the Q value based on the new environment state and income,in order to optimize the action selection strategy,so as to obtain higher rewards and new environmental states; the above process is continuously iterated to finally obtain the optimal strategy. …”
Get full text
Article -
129
A Survey on Deployment Algorithms in Underwater Acoustic Sensor Networks
Published 2013-12-01“…Node deployment is one of the fundamental tasks for underwater acoustic sensor networks (UASNs) where the deployment strategy supports many fundamental network services, such as network topology control, routing, and boundary detection. …”
Get full text
Article -
130
Improved RRT-Based Obstacle-Avoidance Path Planning for Dual-Arm Robots in Complex Environments
Published 2025-07-01“…Second, a dynamic safety step-size strategy adapts each extension based on obstacle size and approach angle, enhancing collision detection reliability and search efficiency. …”
Get full text
Article -
131
Distributed multi‐target tracking via consensus‐based Arithmetic Average fusion
Published 2024-12-01“…Labelled Multi‐Bernoulli (LMB) filters are executed locally when each node estimates multi‐target tracks. A consensus strategy is utilised to execute the information interaction among sensors, taking into account the limited detection field of view of a single sensor. …”
Get full text
Article -
132
Effective and fair cognitive terminal assignment scheme for cooperative spectrum sensing
Published 2024-06-01“…Cooperative spectrum sensing is regarded as the foundation and a key stage of cognitive radio networks. The node allocation strategy during the spectrum detection process was directly determined by the results of joint spectrum sensing. …”
Get full text
Article -
133
Use of the GenoType MTBDRplus for early diagnosis of multidrug-resistant tuberculosis
Published 2017-04-01“…It is recommended for detection of MDR TB in contact persons, for screening of multi-resistant tuberculosis patients and for detection of multi-resistant tuberculosis in TB patients with treatment failure, for determination of genotype of Mycobacterium tuberculosis in the region. …”
Get full text
Article -
134
A novel robust network construction and analysis workflow for mining infant microbiota relationships
Published 2025-02-01“…In this study, we created a test data pool using public infant microbiome data sets to assess the performance of four different network-based methods, employing repeated sampling strategies. We found that our proposed Probability-Based Co-Detection Model (PBCDM) demonstrated the best stability and robustness, particularly in network attributes such as node counts, average links per node, and the positive-to-negative link (P/N) ratios. …”
Get full text
Article -
135
Secure Neighbor Discovery in Wireless Sensor Networks Using Range-Free Localization Techniques
Published 2012-11-01“…Simulations show that both strategies are effective in detecting wormhole attacks, and their performances are compared with that of a conventional likelihood ratio test (LRT).…”
Get full text
Article -
136
Recovery Routing Based on Q-Learning for Satellite Network Faults
Published 2020-01-01“…In this paper, we propose a new satellite network routing technology for fault recovery based on fault detection. Based on Bayesian decision, this technology judges the probability of each fault by a priori probability of the two faults to achieve the purpose of effectively distinguishing between two types of faults and locate faulty links and node ports. …”
Get full text
Article -
137
Enhancing Incentive Schemes in Edge Computing through Hierarchical Reinforcement Learning
Published 2025-04-01“…The framework focuses on three key components: pricing strategy, resource distribution and malicious node detection. …”
Get full text
Article -
138
Hybrid Trust-Based Models and Protocols for Enhanced Security and Performance in Dynamic Wireless Sensor Networks and Wireless Ad Hoc Networks
Published 2025-07-01“…In the context of WANETs, we unveil a non-linear integrity-based intrusion detection model, complemented by a hybrid security protocol that combines an integrity-centric approach with an encryption framework for secure node-to-node communication. …”
Get full text
Article -
139
Improved Artificial Bee Colony Optimization Underwater Localization Algorithm by Logistic Chaos Mapping and Differential Evolution
Published 2025-01-01“…It is relatively straightforward to implement and comprises four phases: population initialization, leading bee, following bee, and detecting bee. The artificial bee colony algorithm offers a novel approach to improving the accuracy of underwater node localization. …”
Get full text
Article -
140
Joint Modulation Identification and IQ Impairment Handling in Two-Path Relayed Multiple Users OFDMA Over Unknown Channels
Published 2025-01-01“…The proposed solution is reinforced by utilizing the data detection mechanism included in TCR systems. Theoretical analysis confirms that the cumulative IQ distortions from each node can be effectively embedded within the link parameters, leading to the formulation of aggregated link parameters (ALPs). …”
Get full text
Article