Journal articles on the topic 'NODE DETECTION'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'NODE DETECTION.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Lee, S., J. Yang, S. Nam, J. Lee, W. Kim, J. Choi, G. Kim, and G. Kim. "Triple detection method for sentinel lymph node detection." Journal of Clinical Oncology 27, no. 15_suppl (May 20, 2009): e11605-e11605. http://dx.doi.org/10.1200/jco.2009.27.15_suppl.e11605.
Full textImam Rahmani, Mohammad Khalid, Moizuddin Mohammed, Reyazur Rashid Irshad, Sadaf Yasmin, Swati Mishra, Pooja Asopa, Asharul Islam, Sultan Ahmad, and Aleem Ali. "Design a Secure Routing and Monitoring Framework Based on Hybrid Optimization for IoT-Based Wireless Sensor Networks." Journal of Nanoelectronics and Optoelectronics 18, no. 3 (March 1, 2023): 338–46. http://dx.doi.org/10.1166/jno.2023.3397.
Full textLei, Yang, and Ying Jiang. "Anomaly Detection for Nodes Under the Cloud Computing Environment." International Journal of Distributed Systems and Technologies 12, no. 1 (January 2021): 30–48. http://dx.doi.org/10.4018/ijdst.2021010103.
Full textMasoud, Mohammad Z., Yousef Jaradat, Ismael Jannoud, and Mustafa A. Al Sibahee. "A hybrid clustering routing protocol based on machine learning and graph theory for energy conservation and hole detection in wireless sensor network." International Journal of Distributed Sensor Networks 15, no. 6 (June 2019): 155014771985823. http://dx.doi.org/10.1177/1550147719858231.
Full textEzeh, Chinenye, Ren Tao, Li Zhe, Wang Yiqun, and Qu Ying. "Multi-Type Node Detection in Network Communities." Entropy 21, no. 12 (December 17, 2019): 1237. http://dx.doi.org/10.3390/e21121237.
Full textFeng, You Bing, and Rong Biao Zhang. "Fault Detection of WSN Based on Spatial Correlation." Applied Mechanics and Materials 58-60 (June 2011): 1504–10. http://dx.doi.org/10.4028/www.scientific.net/amm.58-60.1504.
Full textLi, Feng, Yali Si, Ning Lu, Zhen Chen, and Limin Shen. "A Security and Efficient Routing Scheme with Misbehavior Detection in Delay-Tolerant Networks." Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/2761486.
Full textM, Sajitha, D. Kavitha, and P. Chenna Reddy. "Clone Node Detection in Heterogeneous WSN with Low Memory Overhead." International Journal of Recent Technology and Engineering (IJRTE) 11, no. 3 (September 30, 2022): 21–26. http://dx.doi.org/10.35940/ijrte.c7206.0911322.
Full textGanesh, P., G. B. S. R. Naidu, Korla Swaroopa, R. Rahul, Ahmad Almadhor, C. Senthilkumar, Durgaprasad Gangodkar, A. Rajaram, and Alazar Yeshitla. "Implementation of Hidden Node Detection Scheme for Self-Organization of Data Packet." Wireless Communications and Mobile Computing 2022 (March 26, 2022): 1–9. http://dx.doi.org/10.1155/2022/1332373.
Full textSindhuja, L. S., and G. Padmavathi. "Replica Node Detection Using Enhanced Single Hop Detection with Clonal Selection Algorithm in Mobile Wireless Sensor Networks." Journal of Computer Networks and Communications 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/1620343.
Full textLu, Peng, Guang Wei Zhang, and Fang Chun Yang. "Node Capture Attack Detection in Dynamic WSNs Based on New Node Tracking." Advanced Materials Research 945-949 (June 2014): 2372–79. http://dx.doi.org/10.4028/www.scientific.net/amr.945-949.2372.
Full textKumari, Shabnam, and Sumit Dalal. "Malicious Node Detection in WSN Using WTE." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (June 30, 2018): 2386–90. http://dx.doi.org/10.31142/ijtsrd14611.
Full textLin, Y. S., C. C. Tzeng, K. F. Huang, C. Y. Kang, C. C. Chia, and J. F. Hsieh. "Sentinel node detection with radiocolloid lymphatic mapping in early invasive cervical cancer." International Journal of Gynecologic Cancer 15, no. 2 (2005): 273–77. http://dx.doi.org/10.1136/ijgc-00009577-200503000-00014.
Full textNikitenko, R. P. "Efficiency of detection of lymph nodes in breast cancer." Reproductive health of woman, no. 6 (October 27, 2022): 13–17. http://dx.doi.org/10.30841/2708-8731.6.2022.267679.
Full textSideri, Mario, Concetta De Cicco, Angelo Maggioni, Nicoletta Colombo, Luca Bocciolone, Giuseppe Trifirò, Maria De Nuzzo, Costantino Mangioni, and Giovanni Paganelli. "Detection of Sentinel Nodes by Lymphoscintigraphy and Gamma Probe Guided Surgery in Vulvar Neoplasia." Tumori Journal 86, no. 4 (July 2000): 359–63. http://dx.doi.org/10.1177/030089160008600431.
Full textHua, Jiwei, Bo Zhang, Jinao Wang, Xin Shao, and Jinqi Zhu. "Rogue Node Detection Based on a Fog Network Utilizing Parked Vehicles." Applied Sciences 13, no. 2 (January 4, 2023): 695. http://dx.doi.org/10.3390/app13020695.
Full textShao, Qing, Jia Lin Ma, and Yun Wei. "Study of Fault Detection Based on Benzene Ring in Wireless Sensor Networks." Advanced Engineering Forum 6-7 (September 2012): 1167–72. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.1167.
Full textMerisio, C., R. Berretta, M. Gualdi, D. C. Pultrone, S. Anfuso, G. Agnese, C. Aprile, et al. "Radioguided sentinel lymph node detection in vulvar cancer." International Journal of Gynecologic Cancer 15, no. 3 (2005): 493–97. http://dx.doi.org/10.1136/ijgc-00009577-200505000-00013.
Full textLalar, Sachin, Shashi Bhushan, Surender Jangra, Mehedi Masud, and Jehad F. Al-Amri. "An Efficient Three-Phase Fuzzy Logic Clone Node Detection Model." Security and Communication Networks 2021 (April 26, 2021): 1–17. http://dx.doi.org/10.1155/2021/9924478.
Full textMishra, Alekha Kumar, Asis Kumar Tripathy, Arun Kumar, and Ashok Kumar Turuk. "A Replica Detection Scheme Based on the Deviation in Distance Traveled Sliding Window for Wireless Sensor Networks." Wireless Communications and Mobile Computing 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/8457616.
Full textZhou, Yong, Guibin Sun, Yan Xing, Ranran Zhou, and Zhixiao Wang. "Local Community Detection Algorithm Based on Minimal Cluster." Applied Computational Intelligence and Soft Computing 2016 (2016): 1–11. http://dx.doi.org/10.1155/2016/3217612.
Full textAbdelhamid, Ashraf, Mahmoud Said Elsayed, Anca D. Jurcut, and Marianne A. Azer. "A Lightweight Anomaly Detection System for Black Hole Attack." Electronics 12, no. 6 (March 8, 2023): 1294. http://dx.doi.org/10.3390/electronics12061294.
Full textMuruganandam, D., and J. Martin Leo Manickam. "Detection and Countermeasure of Packet Misrouting in Wireless Adhoc Networks." Sensor Letters 17, no. 9 (September 1, 2019): 696–700. http://dx.doi.org/10.1166/sl.2019.4127.
Full textGuo, Lin, and Miao Zhang. "Overlapping Community Detection Based on Strong Tie Detection and Non-Overlapping Link Clustering." Mathematical Problems in Engineering 2022 (December 22, 2022): 1–10. http://dx.doi.org/10.1155/2022/5931727.
Full textEuscher, Elizabeth. "Pathology of sentinel lymph nodes: historical perspective and current applications in gynecologic cancer." International Journal of Gynecologic Cancer 30, no. 3 (February 19, 2020): 394–401. http://dx.doi.org/10.1136/ijgc-2019-001022.
Full textWang, Biao, Hai Bin Zheng, Ying Jue Fang, and Jun Jie Wei. "Overlapping Community Detection Algorithm Based on Seed Diffusion." Applied Mechanics and Materials 556-562 (May 2014): 3300–3304. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.3300.
Full textDaniel, G. Victor, Kandasamy Chandrasekaran, Venkatesan Meenakshi, and Prabhavathy Paneer. "Robust Graph Neural-Network-Based Encoder for Node and Edge Deep Anomaly Detection on Attributed Networks." Electronics 12, no. 6 (March 22, 2023): 1501. http://dx.doi.org/10.3390/electronics12061501.
Full textSujihelen, L., Rajasekhar Boddu, S. Murugaveni, Ms Arnika, Anandakumar Haldorai, Pundru Chandra Shaker Reddy, Suili Feng, and Jiayin Qin. "Node Replication Attack Detection in Distributed Wireless Sensor Networks." Wireless Communications and Mobile Computing 2022 (May 31, 2022): 1–11. http://dx.doi.org/10.1155/2022/7252791.
Full textWang, Zhixiao, Ya Zhao, Zhaotong Chen, and Qiang Niu. "An Improved Topology-Potential-Based Community Detection Algorithm for Complex Network." Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/121609.
Full textPelosi, E., V. Arena, B. Baudino, M. Bellò, R. Giani, D. Lauro, A. Ala, R. Bussone, and G. Bisi. "Sentinel Node Detection in Breast Carcinoma." Tumori Journal 88, no. 3 (May 2002): S10—S11. http://dx.doi.org/10.1177/030089160208800323.
Full textLewandowski, Marcin, and Bartłomiej Płaczek. "Data Transmission Reduction in Wireless Sensor Network for Spatial Event Detection." Sensors 21, no. 21 (October 31, 2021): 7256. http://dx.doi.org/10.3390/s21217256.
Full textZhang, Bo, Qianqian Song, Tao Yang, Zhonghua Zheng, and Huan Zhang. "A Fuzzy Collusive Attack Detection Mechanism for Reputation Aggregation in Mobile Social Networks: A Trust Relationship Based Perspective." Mobile Information Systems 2016 (2016): 1–16. http://dx.doi.org/10.1155/2016/5185170.
Full textVenu, Nookala, M. Revanesh, M. Supriya, Manjunath B. Talawar, A. Asha, Lydia D. Isaac, and Alachew Wubie Ferede. "Energy Auditing and Broken Path Identification for Routing in Large-Scale Mobile Networks Using Machine Learning." Wireless Communications and Mobile Computing 2022 (August 21, 2022): 1–12. http://dx.doi.org/10.1155/2022/9418172.
Full textYu, Wenjin, Yong Li, and Yuangeng Xu. "Research on Pseudo-Node Detection Algorithm in Wireless Sensor Networks." International Journal of Online Engineering (iJOE) 13, no. 03 (March 28, 2017): 113. http://dx.doi.org/10.3991/ijoe.v13i03.6864.
Full textWang, Jiang-Tao, and Zhi-Xiong Liu. "An active detection of compromised nodes based on en-route trap in wireless sensor network." International Journal of Distributed Sensor Networks 17, no. 8 (August 2021): 155014772110403. http://dx.doi.org/10.1177/15501477211040367.
Full textHuang, Bingyang, Chaokun Wang, and Binbin Wang. "NMLPA: Uncovering Overlapping Communities in Attributed Networks via a Multi-Label Propagation Approach." Sensors 19, no. 2 (January 10, 2019): 260. http://dx.doi.org/10.3390/s19020260.
Full textLuo, Hairu, Peng Jia, Anmin Zhou, Yuying Liu, and Ziheng He. "Bridge Node Detection between Communities Based on GNN." Applied Sciences 12, no. 20 (October 13, 2022): 10337. http://dx.doi.org/10.3390/app122010337.
Full textVermeeren, L., W. M. C. Klop, M. W. M. van den Brekel, A. J. M. Balm, O. E. Nieweg, and R. A. Valdés Olmos. "Sentinel Node Detection in Head and Neck Malignancies: Innovations in Radioguided Surgery." Journal of Oncology 2009 (2009): 1–10. http://dx.doi.org/10.1155/2009/681746.
Full textVOKOROKOS, Liberios, Michal ENNERT, Zuzana DUDLÁKOVÁ, and Olympia FORTOTIRA. "A CONTROL NODE FOR INTRUSION DETECTION SYSTEMS MANAGEMENT." Acta Electrotechnica et Informatica 14, no. 3 (September 1, 2014): 28–31. http://dx.doi.org/10.15546/aeei-2014-0025.
Full textLu, Biao, and Wansu Liu. "Nonuniform Clustering of Wireless Sensor Network Node Positioning Anomaly Detection and Calibration." Journal of Sensors 2021 (October 16, 2021): 1–10. http://dx.doi.org/10.1155/2021/5733308.
Full textJiang, Weinuo, and Shihong Wang. "Detecting hidden nodes in networks based on random variable resetting method." Chaos: An Interdisciplinary Journal of Nonlinear Science 33, no. 4 (April 2023): 043109. http://dx.doi.org/10.1063/5.0134953.
Full textPagliarulo, Vincenzo, Debra Hawes, Frank H. Brands, Susan Groshen, Jie Cai, John P. Stein, Gary Lieskovsky, Donald G. Skinner, and Richard J. Cote. "Detection of Occult Lymph Node Metastases in Locally Advanced Node-Negative Prostate Cancer." Journal of Clinical Oncology 24, no. 18 (June 20, 2006): 2735–42. http://dx.doi.org/10.1200/jco.2005.05.4767.
Full textLiu, Jiaxi, Weizhong Gao, Jian Dong, Na Wu, and Fei Ding. "Low-Power Failure Detection for Environmental Monitoring Based on IoT." Sensors 21, no. 19 (September 28, 2021): 6489. http://dx.doi.org/10.3390/s21196489.
Full textWang, Guishen, Yuanwei Wang, Kaitai Wang, Zhihua Liu, Lijuan Zhang, Yu Zhou, and Qinan Yao. "An overlapping community detection algorithm based on node distance of line graph." Modern Physics Letters B 33, no. 26 (September 20, 2019): 1950322. http://dx.doi.org/10.1142/s0217984919503226.
Full textZhang, Yajing, Kai Wang, and Jinghui Zhang. "Adaptive and Lightweight Abnormal Node Detection via Biological Immune Game in Mobile Multimedia Networks." Algorithms 14, no. 12 (December 20, 2021): 368. http://dx.doi.org/10.3390/a14120368.
Full textWang, Qizhou, Guansong Pang, Mahsa Salehi, Wray Buntine, and Christopher Leckie. "Cross-Domain Graph Anomaly Detection via Anomaly-Aware Contrastive Alignment." Proceedings of the AAAI Conference on Artificial Intelligence 37, no. 4 (June 26, 2023): 4676–84. http://dx.doi.org/10.1609/aaai.v37i4.25591.
Full textMahapatro, Arunanshu, and Pabitra Mohan Khilar. "Detection of Node Failure in Wireless Image Sensor Networks." ISRN Sensor Networks 2012 (January 29, 2012): 1–8. http://dx.doi.org/10.5402/2012/342514.
Full textRamalakshmi, R., S. Subash Prabhu, and C. Balasubramanian. "Detection of Compromised Nodes in Wireless Sensor Networks using GPSR Protocol and Iterative Filtering Algorithm." APTIKOM Journal on Computer Science and Information Technologies 1, no. 3 (November 1, 2016): 141–48. http://dx.doi.org/10.11591/aptikom.j.csit.122.
Full textKaur, Kamaljit, and Amandeep Kaur. "Detection of Sybil Attack in VANETs." International Journal of Emerging Research in Management and Technology 6, no. 6 (June 29, 2018): 296. http://dx.doi.org/10.23956/ijermt.v6i6.285.
Full textThanigaivelan, Nanda Kumar, Ethiopia Nigussie, Seppo Virtanen, and Jouni Isoaho. "Hybrid Internal Anomaly Detection System for IoT: Reactive Nodes with Cross-Layer Operation." Security and Communication Networks 2018 (August 15, 2018): 1–15. http://dx.doi.org/10.1155/2018/3672698.
Full text