Academic literature on the topic 'SPREADER NODES'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SPREADER NODES.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "SPREADER NODES"

1

Sheikhahmadi, Amir, and Mohammad Ali Nematbakhsh. "Identification of multi-spreader users in social networks for viral marketing." Journal of Information Science 43, no. 3 (April 1, 2016): 412–23. http://dx.doi.org/10.1177/0165551516644171.

Full text
Abstract:
Identifying high spreading power nodes is an interesting problem in social networks. Finding super spreader nodes becomes an arduous task when the nodes appear in large numbers, and the number of existing links becomes enormous among them. One of the methods that is used for identifying the nodes is to rank them based on k-shell decomposition. Nevertheless, one of the disadvantages of this method is that it assigns the same rank to the nodes of a shell. Another disadvantage of this method is that only one indicator is fairly used to rank the nodes. k-Shell is an approach that is used for ranking separate spreaders, yet it does not have enough efficiency when a group of nodes with maximum spreading needs to be selected; therefore, this method, alone, does not have enough efficiency. Accordingly, in this study a hybrid method is presented to identify the super spreaders based on k-shell measure. Afterwards, a suitable method is presented to select a group of superior nodes in order to maximize the spread of influence. Experimental results on seven complex networks show that our proposed methods outperforms other well-known measures and represents comparatively more accurate performance in identifying the super spreader nodes.
APA, Harvard, Vancouver, ISO, and other styles
2

Fu, Yu-Hsiang, Chung-Yuan Huang, and Chuen-Tsai Sun. "Identifying Super-Spreader Nodes in Complex Networks." Mathematical Problems in Engineering 2015 (2015): 1–8. http://dx.doi.org/10.1155/2015/675713.

Full text
Abstract:
Identifying the most influential individuals spreading information or infectious diseases can assist or hinder information dissemination, product exposure, and contagious disease detection. Hub nodes, high betweenness nodes, high closeness nodes, and highk-shell nodes have been identified as good initial spreaders, but efforts to use node diversity within network structures to measure spreading ability are few. Here we describe a two-step framework that combines global diversity and local features to identify the most influential network nodes. Results from susceptible-infected-recovered epidemic simulations indicate that our proposed method performs well and stably in single initial spreader scenarios associated with various complex network datasets.
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Ruixia, and Deyu Li. "Identifying Influential Rumor Spreader in Social Network." Discrete Dynamics in Nature and Society 2019 (May 15, 2019): 1–10. http://dx.doi.org/10.1155/2019/8938195.

Full text
Abstract:
It is of great significance to identify influential rumor spreaders for preventing and controlling the rumor propagation. In this paper, on four real social networks, based on the classical rumor model and combining one-to-many modes of propagation, we investigate the rumor propagation by Monte Carlo simulations when the spreading rate is small. Firstly, we layer the network nodes according to network characteristics. If the assortative coefficient is positive, we layer the network nodes by the degree centrality and the nodes with large degree are in high layers. If the assortative coefficient is negative, we layer the network nodes by the K-Shell method and the nodes with large Ks value are in high layers. Then the performance of nodes in different layers as origination of rumors and as informed nodes is investigated. We find that the propagation size is larger and the peak prevalence of the rumor is reached in a shorter time when the nodes in higher layers act as origination. Moreover, when the nodes in higher layer are not the origination of the rumor, they are more likely to be informed and they are informed more faster, and they terminate propagation faster. That is, their attendance is more beneficial to propagation size, peak prevalence, and the arrival time of peak prevalence. The conclusion can provide powerful theoretical support for controlling rumor propagation or enhancing information transmission.
APA, Harvard, Vancouver, ISO, and other styles
4

Lin, Jianhong, Bo-Lun Chen, Zhao Yang, Jian-Guo Liu, and Claudio J. Tessone. "Rank the spreading influence of nodes using dynamic Markov process." New Journal of Physics 25, no. 2 (February 1, 2023): 023014. http://dx.doi.org/10.1088/1367-2630/acb590.

Full text
Abstract:
Abstract Ranking the spreading influence of nodes is of great importance in practice and research. The key to ranking a node’s spreading ability is to evaluate the fraction of susceptible nodes being infected by the target node during the outbreak, i.e. the outbreak size. In this paper, we present a dynamic Markov process (DMP) method by integrating the Markov chain and the spreading process to evaluate the outbreak size of the initial spreader. Following the idea of the Markov process, this method solves the problem of nonlinear coupling by adjusting the state transition matrix and evaluating the probability of the susceptible node being infected by its infected neighbors. We have employed the susceptible-infected-recovered and susceptible-infected-susceptible models to test this method on real-world static and temporal networks. Our results indicate that the DMP method could evaluate the nodes’ outbreak sizes more accurately than previous methods for both single and multi-spreaders. Besides, it can also be employed to rank the influence of nodes accurately during the spreading process.
APA, Harvard, Vancouver, ISO, and other styles
5

Zhu, Xuejin, and Jie Huang. "SpreadRank: A Novel Approach for Identifying Influential Spreaders in Complex Networks." Entropy 25, no. 4 (April 10, 2023): 637. http://dx.doi.org/10.3390/e25040637.

Full text
Abstract:
Identifying influential spreaders in complex networks is critical for information spread and malware diffusion suppression. In this paper, we propose a novel influential spreader identification method, called SpreadRank, which considers the path reachability in information spreading and uses its quantitative index as a measure of node spread centrality to obtain the spread influence of a single node. To avoid the overlapping of the influence range of the node spread, this method establishes a dynamic influential node set selection mechanism based on the spread centrality value and the principle of minimizing the maximum connected branch after network segmentation, and it selects a group of nodes with the greatest overall spread influence. Experiments based on the SIR model demonstrate that, compared to other existing methods, the selected influential spreaders of SpreadRank can quickly diffuse or suppress information more effectively.
APA, Harvard, Vancouver, ISO, and other styles
6

Saha, Sovan, Piyali Chatterjee, Mita Nasipuri, and Subhadip Basu. "Detection of spreader nodes in human-SARS-CoV protein-protein interaction network." PeerJ 9 (September 6, 2021): e12117. http://dx.doi.org/10.7717/peerj.12117.

Full text
Abstract:
The entire world is witnessing the coronavirus pandemic (COVID-19), caused by a novel coronavirus (n-CoV) generally distinguished as Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2). SARS-CoV-2 promotes fatal chronic respiratory disease followed by multiple organ failure, ultimately putting an end to human life. International Committee on Taxonomy of Viruses (ICTV) has reached a consensus that SARS-CoV-2 is highly genetically similar (up to 89%) to the Severe Acute Respiratory Syndrome Coronavirus (SARS-CoV), which had an outbreak in 2003. With this hypothesis, current work focuses on identifying the spreader nodes in the SARS-CoV-human protein–protein interaction network (PPIN) to find possible lineage with the disease propagation pattern of the current pandemic. Various PPIN characteristics like edge ratio, neighborhood density, and node weight have been explored for defining a new feature spreadability index by which spreader proteins and protein–protein interaction (in the form of network edges) are identified. Top spreader nodes with a high spreadability index have been validated by Susceptible-Infected-Susceptible (SIS) disease model, first using a synthetic PPIN followed by a SARS-CoV-human PPIN. The ranked edges highlight the path of entire disease propagation from SARS-CoV to human PPIN (up to level-2 neighborhood). The developed network attribute, spreadability index, and the generated SIS model, compared with the other network centrality-based methodologies, perform better than the existing state-of-art.
APA, Harvard, Vancouver, ISO, and other styles
7

Huo, Liang’an, Tingting Lin, Chen Liu, and Xing Fang. "How the node’s vital and tie strength effect rumor spreading on social network." International Journal of Modern Physics C 30, no. 06 (June 2019): 1950046. http://dx.doi.org/10.1142/s0129183119500463.

Full text
Abstract:
The spread of rumors on complex networks has attracted wide attention in the field of management. In this paper, the generalized rumor spreading model is modified to take into account the vital of the spreader and the tie strength for the pairwise contacts between nodes in complex networks at degree-dependent spreading rate. Concretely, we introduce the infectivity exponent [Formula: see text], and the degree influenced real exponent [Formula: see text] into the analytical rumor spreading model. Rumor infectivity, [Formula: see text], where [Formula: see text], defines that each spreader node may contact [Formula: see text] neighbors within one time step. The tie strength between two nodes with degrees [Formula: see text] and [Formula: see text] are measured by [Formula: see text], [Formula: see text] is the degree influenced real exponent which depends on the type of complex networks and [Formula: see text] is a positive quantity. We use a tuning parameter [Formula: see text] to combine both the effect of the vital nodes and the strength of connectivity between nodes. We use analytical and numerical solutions to examine the threshold behavior and dynamics of the model on several models of social network. It was found that the infectivity exponent [Formula: see text], the degree influenced real exponent [Formula: see text] and tuning parameter [Formula: see text] affect the rumor threshold, one can adjust the parameters to control the rumor threshold which is absent for the standard rumor spreading model.
APA, Harvard, Vancouver, ISO, and other styles
8

Durón, Christina. "Heatmap centrality: A new measure to identify super-spreader nodes in scale-free networks." PLOS ONE 15, no. 7 (July 7, 2020): e0235690. http://dx.doi.org/10.1371/journal.pone.0235690.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shirly, Geofrin, and N. Kumar. "A survey on energy efficiency in mobile ad hoc networks." International Journal of Engineering & Technology 7, no. 2.21 (April 20, 2018): 382. http://dx.doi.org/10.14419/ijet.v7i2.21.12447.

Full text
Abstract:
A mobile ad-hoc network is a collection of wireless mobile nodes which temporarily forms a network without any type of centralized administration which is already in use. In adhoc network, the battery lifetime of the mobile nodes is less. If suppose any nodes battery power is drained it leads to spreading of many divisions in the networks. Hence these spreader nodes are the very important spot in this network. For the purpose of data forwarding some very important nodes can drain their battery power in advance because of increase in load and processing for forwarding the data. Because of the variance in loads developed, the network of nodes will be collapsed very badly, the route lifetime will be reduced, network will be partitioned and route reliability is reduced in MANETs. Because of this, the most important criteria which have to be improved is the consumption of energy in mobile ad-hoc networks. The very important technique is power aware routing technique in MANETs. Hence minimization of energy in the network of mobile nodes individually can be done by using some of the routing techniques. The most important thing is to study the power aware protocol in order to help the new research doers and application developers to find a new idea for designing more efficient routing protocols.
APA, Harvard, Vancouver, ISO, and other styles
10

Mei, Xuehui, Ziyu Zhang, and Haijun Jiang. "Dynamical Analysis of Hyper-ILSR Rumor Propagation Model with Saturation Incidence Rate." Entropy 25, no. 5 (May 16, 2023): 805. http://dx.doi.org/10.3390/e25050805.

Full text
Abstract:
With the development of the Internet, it is more convenient for people to obtain information, which also facilitates the spread of rumors. It is imperative to study the mechanisms of rumor transmission to control the spread of rumors. The process of rumor propagation is often affected by the interaction of multiple nodes. To reflect higher-order interactions in rumor-spreading, hypergraph theories are introduced in a Hyper-ILSR (Hyper-Ignorant–Lurker–Spreader–Recover) rumor-spreading model with saturation incidence rate in this study. Firstly, the definition of hypergraph and hyperdegree is introduced to explain the construction of the model. Secondly, the existence of the threshold and equilibrium of the Hyper-ILSR model is revealed by discussing the model, which is used to judge the final state of rumor propagation. Next, the stability of equilibrium is studied by Lyapunov functions. Moreover, optimal control is put forward to suppress rumor propagation. Finally, the differences between the Hyper-ILSR model and the general ILSR model are shown in numerical simulations.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "SPREADER NODES"

1

Sato, Sumito. "High-affinity urokinase-derived cyclic peptides inhibiting urokinase-urokinase receptor-interaction : effects on tumor growth and spread." kostenfrei, 2009. https://mediatum2.ub.tum.de/node?id=653320.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ben, Ayed Ghamgui Myriam. "Essais sur le risque de crédit des obligations : Analyse de la migration des notes et des effets de contagion." Phd thesis, Université de Cergy Pontoise, 2013. http://tel.archives-ouvertes.fr/tel-00925547.

Full text
Abstract:
Nous avons essayé dans le cadre de cette thèse de comprendre le processus de notation des entreprises de différentes zones géographiques et secteurs d'activité. Pour ce faire, nous avons décidé de ventiler notre étude en trois phases principales, en l'occurrence une première phase réservée à l'étude du processus de notation en tenant compte de la durée des épisodes, une seconde phase consacrée à l'étude de l'effet de la crise sur ce processus et une troisième phase consacrée à l'étude de la contagion.
APA, Harvard, Vancouver, ISO, and other styles
3

Pelon, Floriane. "Fibroblastic heterogeneity and metastatic spread in breast cancers Fibroblast heterogeneity drives metastatic spread in breast cancer through distinct mechanisms." Thesis, Sorbonne Paris Cité, 2018. https://wo.app.u-paris.fr/cgi-bin/WebObjects/TheseWeb.woa/wa/show?t=2392&f=17330.

Full text
Abstract:
Les cancers du sein, premiers cancers féminins et causes aujourd’hui encore de nombreux décès, sont classés en 3 sous-types moléculaires : luminaux –les plus répandus, HER2 et triple-négatifs (TN) –les plus agressifs. Lors du diagnostic, l’envahissement des ganglions lymphatiques axillaires par les cellules tumorales est établi. Il s’agit, en plus de la classification moléculaire, d’un marqueur pronostique utilisé en clinique pour stratifier les patientes, car il informe sur le risque de développement ultérieur de métastases, cause majeure des décès à l’heure actuelle. Les tumeurs solides, et notamment les cancers du sein, sont des écosystèmes complexes comprenant de nombreux types cellulaires qui interagissent avec les cellules cancéreuses. Parmi eux, les fibroblastes associés au cancer (CAF) sont les plus abondants et participent activement à de nombreux aspects de la tumorigenèse dont la croissance, l’invasion, l’angiogenèse, l’immunosuppression. Cependant, ils constituent une population hétérogène et à ce jour, très peu d’études ont analysé cette hétérogénéité tout en la liant aux diverses fonctions décrites des CAF. Dans ce projet, nous nous sommes intéressés au rôle de cette hétérogénéité fibroblastique dans la dissémination métastatique des cancers du sein. En combinant l’étude de plusieurs marqueurs de CAF, nous avons montré que les ganglions lymphatiques envahis par les cellules tumorales sont constitués de 4 sous-populations de CAF (CAF-S1, S2, S3 et S4), similaires à celles identifiées dans les tumeurs primaires appariées. De façon intéressante, ce sont les deux sous-types de CAF myofibroblastiques (αSMA+), CAF-S1 et particulièrement CAF-S4, qui s’accumulent préférentiellement dans les ganglions métastatiques. Ils présentent les mêmes signatures transcriptomiques entre les deux localisations tissulaires (ganglions envahis et tumeurs primaires correspondantes). Or, ces deux populations CAF-S1 et CAF-S4 augmentent le phénotype invasif des cellules tumorales, en régulant des fonctions complémentaires. D’un côté, les CAF-S1 sont hautement motiles, et stimulent la prolifération, la migration, l’invasion et l’initiation d’une transition épithélio-mésenchymateuse des cellules de cancer du sein. De l’autre, les CAF-S4 sont très contractiles, capables de remodeler la matrice extracellulaire et promeuvent ainsi l’invasion et la motilité des cellules tumorales dans des systèmes en 3 dimensions. Des expériences fonctionnelles suggèrent que l’action des CAF-S1 implique CXCL12 et TGFβ tandis que celle des CAF-S4 dépend de la voie NOTCH. En accord avec ces résultats, l’accumulation des CAF et leur identité dans les ganglions envahis constituent deux nouveaux facteurs pronostics dans les cancers du sein, indépendants du sous-type de cancers du sein et de l’envahissement ganglionnaire. En effet, un fort contenu en CAF-S4 y est associé avec un développement ultérieur de métastases à longue distance. Ainsi, analyser le contenu fibroblastique des ganglions axillaires au diagnostic pourrait constituer une information nouvelle et utile à la prise en charge des patientes
Breast cancers are the most common cancers in women and despite great improvements in treatments, they are still responsible for many deaths worldwide. They are classified into 3 main molecular subtypes: Luminal cancers are the most frequent ones, while HER2 and TN are the most aggressive. At diagnostic, lymph node involvement is also assessed as it constitutes, in addition to molecular classification, a strong prognostic marker. Indeed, it informs on the risk to develop further distant metastases, which is the main cause of death by cancer. Solid tumors, including breast cancers, are complex ecologies comprising numerous different cell types that interact with cancer cells. Among them, cancer-associated-fibroblasts (CAF) are the most abundant and actively participate in many tumor hallmarks such as tumor growth, invasion, immunosuppression and angiogenesis. However, they do not constitute a homogeneous population but so far, only few studies have characterized this heterogeneity and linked it to CAF previously described functions. In this project, we focused on the potential involvement of CAF heterogeneity in breast cancer metastatic spread. Combining the analysis of several CAF markers, we showed that invaded LN comprise 4 CAF subsets (CAF-S1, S2, S3 and S4), similar to those found in primary tumors. Interestingly, the two myofibroblastic subsets (αSMA+) CAF-S1 and especially CAF-S4 preferentially accumulate in metastatic LN and present the same transcriptomic profiles in both tumors and LN. Importantly, both CAF-S1 and CAF-S4 display pro-invasive properties, by acting at different levels on tumor cells. On the one hand, highly motile CAF-S1 stimulate breast cancer cell proliferation, migration and EMT initiation. On the other hand, CAF-S4 exhibit an important contractility and by remodeling the matrix they are able to promote tumor cell invasion in 3D. Functional studies highlight a CXCL12/TGFβ involvement in CAF-S1 functions while CAF-S4 pro-invasive phenotype appears to be Notch-dependent. In agreement with these data, we found that CAF accumulation and subset enrichment in involved LN were two new prognostic factors, independent of breast cancer molecular subtypes and LN status at diagnosis. Indeed, stromal rich LN with a predominance of CAF-S4 are associated with long distance metastases development and poor overall survival. Thus, we propose that analyzing LN fibroblastic content at diagnosis could constitute new and useful information to breast cancer patients’ care
APA, Harvard, Vancouver, ISO, and other styles
4

Megahed, Mohamed Helmy Mostafa. "SurvSec Security Architecture for Reliable Surveillance WSN Recovery from Base Station Failure." Thèse, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/31154.

Full text
Abstract:
Surveillance wireless sensor networks (WSNs) are highly vulnerable to the failure of the base station (BS) because attackers can easily render the network useless for relatively long periods of time by only destroying the BS. The time and effort needed to destroy the BS is much less than that needed to destroy the numerous sensing nodes. Previous works have tackled BS failure by deploying a mobile BS or by using multiple BSs, which requires extra cost. Moreover, despite using the best electronic countermeasures, intrusion tolerance systems and anti-traffic analysis strategies to protect the BSs, an adversary can still destroy them. The new BS cannot trust the deployed sensor nodes. Also, previous works lack both the procedures to ensure network reliability and security during BS failure such as storing then sending reports concerning security threats against nodes to the new BS and the procedures to verify the trustworthiness of the deployed sensing nodes. Otherwise, a new WSN must be re-deployed which involves a high cost and requires time for the deployment and setup of the new WSN. In this thesis, we address the problem of reliable recovery from a BS failure by proposing a new security architecture called Surveillance Security (SurvSec). SurvSec continuously monitors the network for security threats and stores data related to node security, detects and authenticates the new BS, and recovers the stored data at the new BS. SurvSec includes encryption for security-related information using an efficient dynamic secret sharing algorithm, where previous work has high computations for dynamic secret sharing. SurvSec includes compromised nodes detection protocol against collaborative work of attackers working at the same time where previous works have been inefficient against collaborative work of attackers working at the same time. SurvSec includes a key management scheme for homogenous WSN, where previous works assume heterogeneous WSN using High-end Sensor Nodes (HSN) which are the best target for the attackers. SurvSec includes efficient encryption architecture against quantum computers with a low time delay for encryption and decryption, where previous works have had high time delay to encrypt and decrypt large data size, where AES-256 has 14 rounds and high delay. SurvSec consists of five components, which are: 1. A Hierarchical Data Storage and Data Recovery System. 2. Security for the Stored Data using a new dynamic secret sharing algorithm. 3. A Compromised-Nodes Detection Algorithm at the first stage. 4. A Hybrid and Dynamic Key Management scheme for homogenous network. 5. Powerful Encryption Architecture for post-quantum computers with low time delay. In this thesis, we introduce six new contributions which are the followings: 1. The development of the new security architecture called Surveillance Security (SurvSec) based on distributed Security Managers (SMs) to enable distributed network security and distributed secure storage. 2. The design of a new dynamic secret sharing algorithm to secure the stored data by using distributed users tables. 3. A new algorithm to detect compromised nodes at the first stage, when a group of attackers capture many legitimate nodes after the base station destruction. This algorithm is designed to be resistant against a group of attackers working at the same time to compromise many legitimate nodes during the base station failure. 4. A hybrid and dynamic key management scheme for homogenous network which is called certificates shared verification key management. 5. A new encryption architecture which is called the spread spectrum encryption architecture SSEA to resist quantum-computers attacks. 6. Hardware implementation of reliable network recovery from BS failure. The description of the new security architecture SurvSec components is done followed by a simulation and analytical study of the proposed solutions to show its performance.
APA, Harvard, Vancouver, ISO, and other styles
5

Palseur, Alban. "Participation à l'étude de la qualification juridique des produits dérivés de crédit en droit français." Thesis, Lyon 3, 2011. http://www.theses.fr/2011LYO30075/document.

Full text
Abstract:
Depuis la succession des récentes crises financières, les « dérivés de crédit » connaissent une notoriété médiatique très intense qui dépasse la seule sphère des spécialistes. Créés au début des années 1990, ils sont des instruments financiers de transfert du risque de crédit. Ils autorisent tant la protection que la spéculation. Ils sont juridiquement documentés par des conventions-Cadres proposées par l’International Swaps and Derivatives Association (ISDA), et dans une très petite mesure, par la Fédération Bancaire Française en France. Ils regroupent cinq grandes catégories de contrat : « credit default swap » ou « contrat d’échange sur le risque de crédit », « credit linked notes » ou « dérivé de crédit titrisé », « credit spread option » ou « option sur écart de taux », « credit spread forward » ou « dérivé sur écart de taux » et « total rate of return swap » ou « dérivé de transfert total de rendement ». La nature et la diversité des « dérivés de crédit » posent depuis toujours de sérieuses difficultés de qualification dans de nombreux pays. En droit français, si une qualification commune semble émerger, celle d’instrument financier, elle est hélas insuffisante à apporter un régime juridique complet. Un travail complémentaire de qualification est indispensable pour chaque contrat membre des « dérivés de crédit »
Nowadays, since financial crisis, « credit derivatives » are famous. Born in 1990’s, they transfer the credit risk. They are speculation’s instrument or margin’s instrument. International Swaps and Derivatives Association (ISDA), and the Fédération Bancaire Française (in France), point to pattern juridical agreement. Credit derivatives include five big sort of agreement : « credit default swap » (« contrat d’échange sur le risque de crédit »), « credit linked notes » (« dérivé de crédit titrisé »), « credit spread option » (« option sur écart de taux »), « credit spread forward » (« dérivé sur écart de taux ») and « total rate of return swap » (« dérivé de transfert total de rendement »). Their variety and essence ask difficult question of juridical appreciation in many countries. In French law, credit derivatives are « instrument financier ». But this juridical appreciation is incomplete. Every sort of agreement must being individually studies
APA, Harvard, Vancouver, ISO, and other styles
6

Ciappuccini, Renaud. "Apport de l'imagerie fonctionnelle par TEMP/TDM et TEP/TDM dans la prise en charge des cancers différenciés de la thyroïde Incremental Value of a Dedicated Head and Neck Acquisition during 18F-FDG PET/CT in Patients with Differentiated Thyroid Cancer Full text links full-text provider logo Actions Favorites Share Page navigation Title & authors Abstract Conflict of interest statement Figures Similar articles Cited by References Related information LinkOut - more resources EJNMMI Res . 2018 Dec 3;8(1):104. doi: 10.1186/s13550-018-0461-x. Optimization of a dedicated protocol using a small-voxel PSF reconstruction for head-and-neck 18 FDG PET/CT imaging in differentiated thyroid cancer 78 Lymph node involvement in head-and-neck and thyroid cancers with digital PET/CT: the impact of ultra-high definition voxels and point-spread function Tumor burden of persistent disease in patients with differentiated thyroid cancer: correlation with postoperative risk-stratification and impact on outcome 133 18F-Fluorocholine PET/CT is a highly sensitive but poorly specific tool for identifying malignancy in thyroid nodules with indeterminate cytology: The Chocolate study PSMA expression in neovasculature of persistent/recurrent differentiated thyroid cancerin the neck: relationship with radioiodine uptake, 18Fluorodeoxyglucose avidity and outcome." Thesis, Normandie, 2020. http://www.theses.fr/2020NORMC424.

Full text
Abstract:
L’imagerie scintigraphique des cancers thyroïdiens différenciés (CTD) présente la particularité d’utiliser deux radiopharmaceutiques, l’iode 131 (131I) et le 18-Fluorodésoxyglucose (18FDG). La fixation de ces traceurs dépend habituellement du degré de différenciation et de l’agressivité de la tumeur. L’objectif de ce travail était d’étudier l’apport de différents aspects techniques et d’instrumentation, à savoir l’imagerie hybride par TEMP/TDM et TEP/TDM, la point-spread function (PSF), la taille des voxels et la technologie TEP digitale, et d’explorer si d’autres traceurs TEP pouvaient présenter un intérêt. Le but de la première partie était d’étudier les performances de la TEP/TDM au 18FDG à l’étage cervical pour la détection de la maladie ganglionnaire. Une acquisition TEP/TDM dédiée a amélioré la détection de la maladie tumorale par rapport à l’acquisition classique. L’utilisation de la PSF a permis de détecter des tailles de lésions plus petites et la durée optimale de cette acquisition a été évaluée. Des reconstructions avec des tailles de voxels ultra-fines ont été réalisées sur TEP digitale pour étudier l’impact de la PSF et des voxels ultra-fins sur les données quantitatives. La seconde partie a porté sur l’imagerie 131I-TEMP/TDM et 18FDG-TEP/TDM, afin de quantifier le volume de la maladie persistante. Il a ainsi été montré que la masse tumorale était corrélée au risque post-opératoire et avait un impact sur la réponse au traitement. L’objectif de la troisième partie était d’étudier un autre traceur TEP, la 18-Fluorocholine (FCH), ainsi qu’un marqueur de la néovascularisation, l’antigène membranaire spécifique de la prostate (PSMA). Nos données suggèrent qu’un examen TEP à la FCH négatif au sein d’un nodule thyroïdien à cytologie indéterminée permettrait d’éliminer la malignité, et pourrait éviter des chirurgies inutiles. Par ailleurs, le marquage au PSMA évalué par immunohistochimie dans les néo-vaisseaux est associé à des facteurs de mauvais pronostic. D’autres études sont nécessaires pour confirmer l’intérêt éventuel des examens TEP à la FCH et au 68Ga-PSMA en oncologie thyroïdienne
Radioiodine (131I) and 18-Fluorodeoxyglucose (18FDG) are two radiopharmaceuticals used for scintigraphic imaging in differentiated thyroid cancers (DTC). Tumour uptake of each tracer depends on tumour differentiation and aggressiveness. Our goal was to further assess various technical aspects in DTC imaging workup, such as SPECT/CT and PET/CT, point-spread function (PSF), voxel size, digital PET, and to explore further other PET tracers. The aim of the first part was to assess the performance of 18FDG PET/CT for the detection of neck lymph node involvement. A dedicated PET/CT acquisition improved tumour detection compared to the whole-body acquisition. PSF reconstruction allowed detection of smaller cancer deposits and the optimal acquisition duration time was assessed. Using digital PET acquisitions, ultra-thin voxels reconstructions were performed. The impact of ultra-thin voxels and PSF on quantitative values was evaluated. The second part focused on 131I-SPECT/CT and 18FDG-PET/CT imaging, in an attempt to assess tumour burden of persistent disease. Tumor burden was correlated with the postoperative risk and affected the response to therapy. In the third part, another PET tracer, i.e. 18-Fluorocholine (FCH), and a marker of neovasculature, i.e. prostate-specific membrane antigen (PSMA), were studied. FCH PET/CT offered high negative predictive value to reliably exclude cancer in PET-negative nodules with indeterminate cytology and might prevent unnecessary surgeries. Also, PSMA expression assessed with immunohistochemistry was associated with poor prognosis factors. Further studies are needed to confirm new insights of FCH PET and 68Ga-PSMA PET in DTC
APA, Harvard, Vancouver, ISO, and other styles
7

SHARMA, SANJEEV. "FINDING INFLUENTIAL NODES IN SOCIAL NETWORKS." Thesis, 2021. http://dspace.dtu.ac.in:8080/jspui/handle/repository/18931.

Full text
Abstract:
We can get useful information about personal preferences, hobbies, and connections through social networks. This data could be useful in the development of recommender systems, the prediction of social influence-based outcomes, and the acquisition of knowledge. The most influential nodes in the network, also known as spreader nodes, are a strategic technique of optimizing and tracking the influence and transmission of certain information. Despite the existence of a variety of methods for identifying influential nodes in a network, recent research shows that ensuring all-round performance of selected nodes based on influence, spread, and reach is a difficult challenge. We developed a hybrid filter-based approach in which nodes are filtered based on different centrality measures and the top filtered nodes are elected as spreaders in our research. Our proposed work beats all other relevant research works when tested on a range of real-life networks across numerous judging parameters, thanks to its strategic teaming of selected spreaders and overall performance in network simulations. Another approach is also discussed where we take in the advantage of community detection and neighborhood distinctness to find out the seeds set of the social graph.
APA, Harvard, Vancouver, ISO, and other styles
8

Fu, Yu-Hsiang, and 傅昱翔. "How Nodes’ Topological Properties, Community and Hierarchy Structures affect Spreaders Selection in Complex Networks." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/42wx8z.

Full text
Abstract:
博士
國立交通大學
資訊科學與工程研究所
106
The selection of influential network spreaders can be used to assist information diffusion on an online social website, to make a strategy for viral marketing, to monitor and control epidemic disease outbreak in a population, to analyze cascading failures in electrical power grids and the Internet, among many others. In this dissertation, we proposed solutions of an influence measure, a community detection algorithm and a community-centroid measure for selecting the maximal or multiple influential network spreaders. The computer simulation was used to verify the network-spreading ability of selected network spreaders. In our first research work, we proposed a two-step framework as a robust and reliable influence measure, which combines global diversity and local feature for selecting the maximal influential network spreader. The experiment results indicate that our proposed influence measure performs well and insensitively in network-spreading simulation for various network datasets. In our second research work, we proposed a rule-based hierarchical arc-merging (HAM) algorithm, which has good performance efficiency for community detection tasks of large-scale real-world networks; we also proposed a community-centroid measure to select the central nodes of community structures as multiple influential network spreaders. The experiment results indicate that our measure could result in the maximal 40% (or an average 30%) benefit in network-spreading simulations. In final, according to our results, we provided a decision diagram for determining an appropriate selection strategy of influential network spreaders for a network.
APA, Harvard, Vancouver, ISO, and other styles
9

Tu, Chih-pin, and 涂志彬. "Interest Rate Linked Notes Pricing and Risk Analysis- an Example Study on HSBC Bank PLC 3.5-Year Leveraged CMS Spread Notes." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/32678645222600842334.

Full text
Abstract:
碩士
國立高雄第一科技大學
風險管理與保險所
95
ABSTRACT The interest-linked bond, a new financial product, is a combination of fixed Income security and interest rate derivative, and belongs to structure notes. In order to help investors to examine the risks and returns of Interest-Linked Bonds, this study aims to simulate the price evaluation analysis and sensitivity analysis using the Monte Carlo method to analyze risks and returns of Interest-Linked Bonds , including inverse floating rate notes. The results show that the Interest-Linked Bonds are related to foreign currency and assume the linked interest rate is conformed to CIR interest rate model. Furthermore, in order to reveal the real rewards of investing in the domestic market, this study adds the factor of the currency exchange rate to evaluate the price in NTD against USD for the product. The empirical results of this study are stated as follows: 1. The product, which ared simulatee by reasonable prices in foreign exchange currency, are all larger than or close to their issue prices. In contrast, the reasonable prices in NT dollars are all less than the issue prices. 2. Excluding the foreign exchange rate factor, the probability of positive returns of investing Interest-Linked Bonds is over 90%. However, Including the factor of the foreign exchange rate, the probability is below 40%. 3. The sensibility analysis reveals that the mean reverse speed of interest rate and the volatility of the interest rate are not significant for the bonds’ price. Only the average interest rate in the long term has the significant effect on the bond’s price.
APA, Harvard, Vancouver, ISO, and other styles
10

-jing, Ying, and 陳映嘉. "Interest Rate Linked Notes Pricing and Risk Analysis –an Example Study on HSBC Bank 5-year and 10-year CMS Spread Notes." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/r4xa55.

Full text
Abstract:
碩士
國立高雄第一科技大學
風險管理與保險所
96
The interest-linked bond, a new financial product, is a combination of fixed Income security and interest rate derivative, and belongs to structure notes. In order to help investors to examine the risks and returns of Interest-Linked Bonds, this study aims to simulate the price evaluation analysis and sensitivity analysis using the Monte Carlo method to analyze risks and returns of four different Interest-Linked Bonds , including inverse floating rate notes. The results show that the four Interest-Linked Bonds are related to foreign currency and assume the linked interest rate is conformed to CIR interest rate model. The empirical results of this study are stated as follows: The products, which are simulated by reasonable prices in foreign exchange currency, are all larger than or close to their issue prices. In contrast, the reasonable prices long year are better than shot year the issue prices.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "SPREADER NODES"

1

Dickson, Lisa. Tarot Journal Daily One Card Spread, Three Card Spread, Monthly Tarot Tracker, Notes, Gift. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Epidemic Influenza: Notes on Its Origin and Method of Spread. Creative Media Partners, LLC, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Epidemic Influenza: Notes on Its Origin and Method of Spread. Creative Media Partners, LLC, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Garland, Baalla. Congratulations on Your New Job Spreader I: Spreader I Gift - Blank Lined Notebook Job Congratulations Gifts. This Journal Is a Perfect for Taking Notes, Ideas, Writing Goals and Plans, or Writing Diary. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

PRIDE, Proud. Spread Love: LGBTQ+ Themed Lined Notebook for Capturing Inspiration, Notes and Doddles. Independently Published, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

MultiCarrier Systems Solutions 2009 Lecture Notes in Electrical Engineering. Springer, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Conception, Circé de la. Tarot Journal: Tarot Journal Three Card Spread for Recording and Interpreting Notes Readings. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Conception, Circé de la. Tarot Journal: Tarot Journal Three Card Spread for Recording and Interpreting Notes Readings. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Conception, Circé de la. Tarot Journal: Tarot Journal Three Card Spread for Recording and Interpreting Notes Readings. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Conception, Circé de la. Tarot Journal: Tarot Journal Three Card Spread for Recording and Interpreting Notes Readings. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "SPREADER NODES"

1

Kirsch, Brian James, Shu-Jyuan Chang, Michael James Betenbaugh, and Anne Le. "Non-Hodgkin Lymphoma Metabolism." In The Heterogeneity of Cancer Metabolism, 103–16. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-65768-0_7.

Full text
Abstract:
AbstractNon-Hodgkin lymphomas (NHLs) are a heterogeneous group of lymphoid neoplasms with different biological characteristics. About 90% of all lymphomas in the United States originate from B lymphocytes, while the remaining originate from T cells [1]. The treatment of NHLs depends on the neoplastic histology and stage of the tumor, which will indicate whether radiotherapy, chemotherapy, or a combination is the best suitable treatment [2]. The American Cancer Society describes the staging of lymphoma as follows: Stage I is lymphoma in a single node or area. Stage II is when that lymphoma has spread to another node or organ tissue. Stage III is when it has spread to lymph nodes on two sides of the diaphragm. Stage IV is when cancer has significantly spread to organs outside the lymph system. Radiation therapy is the traditional therapeutic route for localized follicular and mucosa-associated lymphomas. Chemotherapy is utilized for the treatment of large-cell lymphomas and high-grade lymphomas [2]. However, the treatment of indolent lymphomas remains problematic as the patients often have metastasis, for which no standard approach exists [2].
APA, Harvard, Vancouver, ISO, and other styles
2

Bhooshan, Sunil. "Spread Spectrum Modulation." In Lecture Notes in Electrical Engineering, 499–516. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4277-7_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhao, Jiong, Xiaolei Xiong, Wenjun Li, and Yujun Hu. "Design of the Special Spreader of Super-Tonnage Crane." In Lecture Notes in Electrical Engineering, 217–28. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-44674-4_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rath, Bhavtosh, and Jaideep Srivastava. "Spreader-Centric Fake News Mitigation Framework Based on Epidemiology." In Lecture Notes in Social Networks, 31–54. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-07869-9_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ball, Simeon, and Michael Zieve. "Symplectic Spreads and Permutation Polynomials." In Lecture Notes in Computer Science, 79–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24633-6_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Knarr, Norbert. "Spreads of 3-dimensional projective spaces." In Lecture Notes in Mathematics, 25–39. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/bfb0096313.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Basaras, Pavlos, and Dimitrios Katsaros. "Identifying Influential Spreaders in Complex Networks with Probabilistic Links." In Lecture Notes in Social Networks, 57–84. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-78256-0_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Soysal, Atakan, Pınar Demircioğlu, and İsmail Böğrekçi. "Improvement of Solid Spreader Blade Design Using Discrete Element Method (DEM) Applications." In Lecture Notes in Mechanical Engineering, 192–201. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90421-0_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sampath, Aishwarya, Bhargavi Kumaran, Vidyacharan Prabhakaran, and Cinu C. Kiliroor. "Pandemic Simulation and Contact Tracing: Identifying Super Spreaders." In Lecture Notes on Data Engineering and Communications Technologies, 81–95. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9113-3_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kumar, Sanjay, Nipun Aggarwal, and B. S. Panda. "Identifying Influential Spreaders On a Weighted Network Using HookeRank Method." In Lecture Notes in Computer Science, 609–22. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50371-0_45.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "SPREADER NODES"

1

N. Zehmakan, Ahad, Charlotte Out, and Sajjad Hesamipour Khelejan. "Why Rumors Spread Fast in Social Networks, and How to Stop It." In Thirty-Second International Joint Conference on Artificial Intelligence {IJCAI-23}. California: International Joint Conferences on Artificial Intelligence Organization, 2023. http://dx.doi.org/10.24963/ijcai.2023/27.

Full text
Abstract:
We study a rumor spreading model where individuals are connected via a network structure. Initially, only a small subset of the individuals are spreading a rumor. Each individual who is connected to a spreader, starts spreading the rumor with some probability as a function of their trust in the spreader, quantified by the Jaccard similarity index. Furthermore, the probability that a spreader diffuses the rumor decreases over time until they fully lose their interest and stop spreading. We focus on determining the graph parameters which govern the magnitude and pace that the rumor spreads in this model. We prove that for the rumor to spread to a sizable fraction of the individuals, the network needs to enjoy ``strong'' expansion properties and most nodes should be in ``well-connected'' communities. Both of these characteristics are, arguably, present in real-world social networks up to a certain degree, shedding light on the driving force behind the extremely fast spread of rumors in social networks. Furthermore, we formulate a large range of countermeasures to cease the spread of a rumor. We introduce four fundamental criteria which a countermeasure ideally should possess. We evaluate all the proposed countermeasures by conducting experiments on real-world social networks such as Facebook and Twitter. We conclude that our novel decentralized countermeasures (which are executed by the individuals) generally outperform the previously studied centralized ones (which need to be imposed by a third entity such as the government).
APA, Harvard, Vancouver, ISO, and other styles
2

Khosravi, Ehsan, Fatemeh Yazdanifar, Nikoo Salimi, and Hamid Ahmadi Beni. "Identify Initial Nodes for Spreader in A New Diffusion Model Based on Topology (DBT) in Social Networks." In 2023 9th International Conference on Web Research (ICWR). IEEE, 2023. http://dx.doi.org/10.1109/icwr57742.2023.10138958.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Huang, Hao, Keqi Han, Beicheng Xu, and Ting Gan. "Reconstructing Diffusion Networks from Incomplete Data." In Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. California: International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/428.

Full text
Abstract:
To reconstruct the topology of a diffusion network, existing approaches customarily demand not only eventual infection statuses of nodes, but also the exact times when infections occur. In real-world settings, such as the spread of epidemics, tracing the exact infection times is often infeasible; even obtaining the eventual infection statuses of all nodes is a challenging task. In this work, we study topology reconstruction of a diffusion network with incomplete observations of the node infection statuses. To this end, we iteratively infer the network topology based on observed infection statuses and estimated values for unobserved infection statuses by investigating the correlation of node infections, and learn the most probable probabilities of the infection propagations among nodes w.r.t. current inferred topology, as well as the corresponding probability distribution of each unobserved infection status, which in turn helps update the estimate of unobserved data. Extensive experimental results on both synthetic and real-world networks verify the effectiveness and efficiency of our approach.
APA, Harvard, Vancouver, ISO, and other styles
4

Scheideler, Christian. "How to spread adversarial nodes?" In the thirty-seventh annual ACM symposium. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1060590.1060694.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cho, Hyeonwoo, Jewon Lee, and Sang Woo Kim. "An algorithm to arbitrate multiple chirp-spread-spectrum nodes for ranging: The three node case." In 2011 IEEE 5th International Conference on Robotics, Automation and Mechatronics (RAM). IEEE, 2011. http://dx.doi.org/10.1109/ramech.2011.6070507.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nazareth, Ian, Conrad Hamann, Rosemary Heyworth, and Lisa Gargano. "Intensive Boundaries and Liminality: What drives Melbourne’s Suburban Sprawl." In The 39th Annual Conference of the Society of Architectural Historians Australia and New Zealand. PLACE NAME: SAHANZ, 2023. http://dx.doi.org/10.55939/a5033p7byu.

Full text
Abstract:
The dominance of protective dispersal then freeway building in 1950s and 1960s Melbourne planning reflects a view of its suburbs as an undifferentiated sprawl, with little internal agency, difference, nuance, cultural or visual texture. It is seen as primarily determined by demands of Melbourne’s CBD, and is assumed to spread in almost magic fashion: landscape one minute, ‘suburbia’ the next. For varied reasons this view is consolidated in planning imagery, responding to concerns at commuting and transport distance, disappearing food-producing land near the city, and concerns at raising population density. The result is urban form perceived constantly through liminality and outer boundary conditions: extensive borderlines. This suited urbanism that dealt with cities through quantification and circulation routes. This paper argues the dynamics of Melbourne’s suburban development come not from concentric spread but from the steady, sequential emergence of nodal suburbs, themselves major generators of commercial, industrial and transport activity. The original determinants for these suburban nodes were (i) the inability of Melbourne suburbs to remain in walk-to-work scales; (ii) the means to commute lowering urban density – initially through train and tram, and later cars commuting; (iii) these nodal suburbs’ breaking of the long arterial road system that shaped Melbourne’s early suburban form till the 1880s, largely by developing off or away from these arteries; (iv) the imagery of clustered institutional buildings with increased mass and expression beyond those of surrounding suburbs; (v) the specialisation of tributary suburbs as a residential hinterland, not for Melbourne the collected city, but for each of these localised nodes; and (vi) each suburban node gained a series of standard assets in making it an urban focus. These nodes form part of a series of intensive boundaries: more nuanced and individually distinctive. Intensive boundaries also encompass the miniature urban forms and specific urban models emulated in suburban nodes.
APA, Harvard, Vancouver, ISO, and other styles
7

Jamalian, Samira, James E. Moore, Christopher D. Bertram, and Will Richardson. "Parameter Sensitivity Analysis of a Lumped-Parameter Model of Lymphangions in Series." In ASME 2012 Summer Bioengineering Conference. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/sbc2012-80849.

Full text
Abstract:
The lymphatic system is responsible for vital functions in the human body. In particular, it plays an important role in the immune system mechanism whereby undesirable elements are destroyed in the lymph nodes. But cancer cells also spread via the lymphatic system. The system maintains fluid and protein balance by gathering approximately 4 L/day of interstitial fluid and returning it to the venous system. Lymphedema, an ailment of the system for which there is no known cure, primarily affects cancer patients who have undergone lymph node dissection [1]. To understand how to treat such pathologies of the lymphatic system, it is first necessary to examine its fluid flow and pumping mechanisms quantitatively.
APA, Harvard, Vancouver, ISO, and other styles
8

McClain, Jacob, Sara L. Tuell, and Susan N. Thomas. "Tumors Change the Elastic and Viscoelastic Properties of Draining Lymph Node Tissues." In ASME 2013 Summer Bioengineering Conference. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/sbc2013-14419.

Full text
Abstract:
Changes in tissue mechanical properties are often the first indication of malignant disease, with the detection of a stiff lump by a patient. These changes include growth-induced solid stresses, increased matrix stiffness, high fluid pressure, and increased interstitial flow, which in turn enhance fluid flux away from the tumor to downstream lymph nodes (LNs). But in addition to changing the way a tumor feels to a patient, altered tumor tissue mechanics promote cancer cell invasion into lymphatic vessels, allowing their metastatic dissemination to draining LNs. LN swelling and stiffening is another common indicator of tumor growth, and the presence of metastatic cells in the sentinel LN, or tumor draining lymph node (TDLN), is used clinically to stage disease. Recent studies indicate the LN microenvironment determines whether metastatic cancers can spread to the sentinel LNs. Yet despite the known correlation of LN swelling and stiffening with tumorigenesis and the role of the LN microenvironment in metastasis, our understanding of how changes in LN mechanical properties relate to tumor progression, anti-tumor immune response and metastatic colonization of the LN is limited. This lack of a quantitative understanding limits functional analyses of the role of LN mechanics in determining cancer cell colonization of the TDLN, their influence on immune suppression taking place within the TDLN, as well as the development of strategies to mitigate these effects.
APA, Harvard, Vancouver, ISO, and other styles
9

Sheng, Yunlong, and Henri H. Arsenault. "Optical mesh and hypercube perfect shuffle by space invariant multiple imaging." In OSA Annual Meeting. Washington, D.C.: Optica Publishing Group, 1989. http://dx.doi.org/10.1364/oam.1989.mq4.

Full text
Abstract:
Incoherent space invariant multiple imaging is used in a class of systems for free-space interconnections. They are classical imaging systems using mirror array, off-axis lens array, beam splitter, or holograms for multiple imaging. Their point spread function is a number of points shifted by tilting the mirrors. These systems can implement many types of regular interconnection. In mesh networks, the input nodes in a 2-D array have the same interconnection pattern. They are implemented by multiple imaging with the number of images equal to the fan out number. In the hypercube and perfect shuffle networks, the input nodes in different locations in a 2-D array require different interconnection patterns. They can also be implemented in space invariant systems. Only the number of multiple images has to be larger than the fan out number. This introduces a loss of power. We used eight mirrors for four-cube network and four mirrors for 2-D perfect shuffle. The space invariant systems can have a very large number of input nodes, high spatial density of interconnects, and potentially a very large fan out number for massive parallel interconnections.
APA, Harvard, Vancouver, ISO, and other styles
10

Pozhidaeva, Vyara. "Determining the Roughness of Contact Surfaces of the Rolling Bearings by the Method of Shock Pulses." In World Tribology Congress III. ASMEDC, 2005. http://dx.doi.org/10.1115/wtc2005-64221.

Full text
Abstract:
One of the most effective methods for bearing diagnostics is the method of shock pulses. The fixed pulse levels for specific type of bearings and a specific working position are in corresponds with the parameters, characterizing the resource of the bearing. Roughness is one of those parameters. Adaptation and application of that method to slow-revolutionary large rolling bearings of wheel excavators, spreaders and belt conveyers is commented in the paper. A diagnostic system for control directed towards repair is worked out as a result of the adaptation of standard diagnostic approach for application to non-standard (from a vibrodiagnostics point of view) bearing nodes of mechanization at the bulgarian open-pit mine “Maritza-East Mine” Ltd. In Bulgaria.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "SPREADER NODES"

1

Ying, Hongan, Jinfan Shao, Xijuan Xu, Wenfeng Yu, and Weiwen Hong. Perineural Invasion is an Indication of Adjuvant Chemotherapy in Node Negative Colorectal cancer. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, December 2021. http://dx.doi.org/10.37766/inplasy2021.12.0103.

Full text
Abstract:
Review question / Objective: Perineural invasion (PNI) is a possible route for metastatic spread in various cancer types, including colorectal cancer (CRC). PNI is linked to poor prognosis. For patients with lymph node positive colorectal cancer, a number of large-scale RCT studies have confirmed that they can benefit from chemotherapy, but there are still many controversies about whether colorectal patients with negative lymph nodes need adjuvant chemotherapy. At present, there is a general consensus that patients with stage II colorectal cancer who have risk factors such as PNI+ need chemotherapy. However, there are many recent literatures that show that patients with stage II colorectal cancer with nerve invasion risk factors can not prolong the OS and DFS of patients. At the same time, chemotherapy increases the toxicity, economic and mental burden of patients. Therefore, we hope to write this review to summarize the current research findings and provide some clinical guidance on whether patients with lymph node negative colon cancer who have perineural invasion should receive chemotherapy. Condition being studied: Patients with high-risk such as PNI+ stage II colon cancer (CC) are recommended to undergo adjuvant chemotherapy (ACT). However, whether such patients can benefit from ACT remains unclear. And recently studies shown that, ACT had no significant benefit among patients with PNI.
APA, Harvard, Vancouver, ISO, and other styles
2

Martin, Torge. Runoff remapping for ocean model forcing. GEOMAR Helmholtz Centre for Ocean Research Kiel, 2021. http://dx.doi.org/10.3289/sw_2_2021.

Full text
Abstract:
A Pyhton-based toolbox to remap daily runoff fields of the JRA55-do reanalysis (Tsujino et al., 2018, https://doi.org/10.1016/j.ocemod.2018.07.002) onto any ocean model grid. Runoff from the original global JRA grid is collected and redistributed to a given model coastline. A particular feature is the optional treatment of river mouths: runoff from grid nodes, which is of exceptionally large magnitude after the basic remapping, can be radially spread to ocean nodes farther offshore. The scripts were tested successfully for NEMO ocean model configurations of various resolution (global grids ORCA025 and ORC05 as well as regional nests VIKING10, ORION10, VIKING20X and INALT20X) at GEOMAR, Kiel (see Biastoch et al., 2021, https://doi.org/10.5194/os-2021-37 for an application). General instructions are provided for how to process the original JRA runoff files and also for the optional river mouth treatment. The technique is illustrated by examples of the fragmented coast of Greenland and the Amazon river mouth. While the code is versatile, examples are given for an application with the NEMO ocean model.
APA, Harvard, Vancouver, ISO, and other styles
3

Bednarz, Natalia, Elke Eltze, Axel Semjonow, Michael Rink, Antje Andreas, Lennart Mulder, Juliane Hannemann, et al. BRCA1 loss pre-existing in small subpopulations of prostate cancer is associated with advanced disease and metastatic spread to lymph nodes and peripheral blood. Office of Scientific and Technical Information (OSTI), March 2010. http://dx.doi.org/10.2172/986921.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Du, Xinming, Elaine S. Tan, Yesim Elhan-Kayalar, and Yasuyuki Sawada. Economic Impact of COVID-19 Containment Policies: Evidence Based on Novel Surface Heat Data from the People’s Republic of China. Asian Development Bank, October 2022. http://dx.doi.org/10.22617/wps220243-2.

Full text
Abstract:
This paper uses spatially granular surface urban heat island (SUHI) data to quantify the impact of COVID-19-related containment policies on economic output in the People’s Republic of China (PRC). Governments have adopted various policies and measures to control the spread of coronavirus disease (COVID-19). Results of the study suggest containment measures in the PRC decreased SUHI in locked cities marginally yet generated positive and negative spillover effects in unlocked cities, with positive effects dominating. The paper also notes that initial experiences helped inform the management of containment measures in the country.
APA, Harvard, Vancouver, ISO, and other styles
5

Eschen, Andrea. Community-based AIDS prevention and care in Africa: Workshop report. Population Council, 1993. http://dx.doi.org/10.31899/hiv1993.1000.

Full text
Abstract:
Representatives from community-based AIDS prevention and care programs in five sub-Saharan African countries spoke about their programs’ strengths, shortcomings, and hopes for the future at a meeting organized by the Population Council that took place on June 5, 1993, in Berlin just prior to the IXth International Conference on AIDS. Participants’ experiences and insights demonstrated the ingenuity and imagination that communities have generated to prevent the spread of HIV and AIDS and how they have taken action where government activities have fallen short. The workshop brought representatives of these programs together with staff of governmental and nongovernmental organizations, funding institutions, technical assistance agencies, and national and international AIDS-prevention programs to present their experiences. Discussion focused on strategies to strengthen community-based AIDS prevention and care in Africa. The meeting was the culmination of the first year of a three-year project established by the Population Council as part of the Positive Action Program’s Developing Country Initiative. This report notes that the aim was to identify successful elements of community-based AIDS prevention and care programs and promote a global exchange of expertise.
APA, Harvard, Vancouver, ISO, and other styles
6

Lynch, Clifford, and Diane Goldenberg-Hart. Beyond the Pandemic: The Future of the Research Enterprise in Academic Year 2021-22 and Beyond. Coalition for Networked Information, August 2021. http://dx.doi.org/10.56561/mwrp9673.

Full text
Abstract:
In early June 2021, representatives from a number of CNI member institutions gathered for the third in a series of Executive Roundtable discussions that began in spring 2020, during the early days of the COVID-19 emergency. The conversations were intended to inform our understanding of how the pandemic had impacted the research enterprise and to share information about how institutions were planning to shape investments and strategies surrounding the research enterprise going forward. Previous Roundtables were held in April and September 2020 and reports from those conversations are available from http://www.cni.org/tag/executive-roundtable-report. As with the earlier Roundtables on this topic, June participants primarily included senior library administrators, directors of research computing and information technology, and chief research officers from a variety of higher education institutions across the US and Canada; most participating member institutions were public universities with high research activity, though some mid-sized and private institutions participated as well. The June Roundtable took place in a single convening, supplemented by an additional conversation with a key institution unable to join the group meeting due to last-minute scheduling conflicts. As before, we urged participants to think about research broadly, encompassing the humanities, social sciences, and fieldwork activities, as well as the work that takes place in campus laboratories or facilities shared by broader research communities; indeed, the discussions occasionally considered adjacent areas such as the performing arts. The discussion was wide-ranging, including, but not limited to: the challenges involving undergraduate, graduate and international students; labs and core instrumentation; access to physical collections (libraries, museums, herbaria, etc.) and digital materials; patterns of impact on various disciplines and mitigation strategies; and institutional approaches to improving research resilience. We sensed a growing understanding and sensitivity to the human toll the pandemic has taken on the research community. There were several consistent themes throughout the Roundtable series, but shifts in assumptions, planning, and preparation have been evident as vaccination rates have increased and as organizations have grown somewhat more confident in their ability to sustain largely in-person operations by fall 2021. Still, uncertainties abound and considerable notes of tentativeness remain, and indeed, events subsequent to the Roundtable, such as the large-scale spread of the Delta variant of COVID-19 in the US, have eroded much of the confidence we heard in June 2021, though probably more around instructional strategies than the continuity of the research enterprise. The events of the past 18 months, combined with a growing series of climate change-driven disruptions, have infused a certain level of humility into institutional planning, and they continue to underscore the importance of approaches that emphasize resilience and flexibility.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography